Abstract
The dominant operation in cryptographic scheme of elliptic curve is the multiplication using point on an elliptic curve by an integer. This paper specifically discusses the competent algorithms for scalar multiplication a very tedious process in Elliptic Curve Cryptography that are relevant for systems using constrained resources like smart cards. The taxonomy of the work in the open literature for these devices is not only from security perspectives, but likewise some implementation attack, such as fault attacks, must be considered. We survey different implementation approaches and algorithms with the purpose of providing a valuable reference of implementing scalar multiplication in order to retrieve information with a way to determine secret signing key. In addition, this paper provides a review of injecting different fault attacks in a system constrained environment with Elliptic Curve Cryptography. Finally, some arguments about future scope that should be undertaken are provided.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Biehl I, Meyer B, Müller V (2000) Differential fault attacks on elliptic curve cryptosytems. In: Advances in cryptology—CRYPTO 2000. Springer, pp 131–146
Blömer J, Otto M, Seifert J-P (2006) Sign change fault attacks on elliptic curve crytosystems. In: Fault diagnosis and tolerance in cryptography. Springer, pp 36–52
Boneh D, DeMillo RA, Lipton RJ (2001) On the importance of eliminating errors in cryptographic computations. J Cryptology 14(2):101–119
Saxena VP, Nalwaya P (2014) A novel cryptographic approach based on feedback mode of elgamal system. Int J Adv Res Sci Eng (IJARSE) 3(2):128–138. ISSN – 23198354
Saxena VP, Priya Nalwaya PN (2014) A cryptographic approach based on integrating running key in feedback mode of elgamal system. In: 2014 international conference on computational intelligence and communication networks (CICN). IEEE Computer Society, pp 719–724. http://doi.ieeecomputersociety.org/10.11
Biham E, Shamir A (1997) Differential fault analysis of secret key cryptosystems. In: Advances in cryptology—CRYPTO’97. Springer, pp 513–525
Barenghi A, Bertoni G, Palomba A, Susella R (2011) A novel fault attack against ECDSA. In: IEEE international symposium on hardware-oriented security and trust (HOST). IEEE, pp 161–166
Hankerson D, Menezes AJ, Vanstone S (2006) Guide to elliptic curve cryptography. Springer Science & Business Media
Booth AD (1980) A signed binary multiplication technique. Computer arithmetic-benchmark papers in electrical engineering and computer science, vol 21
Reitwiesner GW (1960) Binary arithmetic. Adv Comput 1:231–308
Li H, Zhang R, Yi J, Lv H (2013) A novel algorithm for scalar multiplication in ECDSA. In: 2013 fifth international conference on computational and information sciences (ICCIS). IEEE, pp 943–946
Fan J, Verbauwhede I (2012) An updated survey on secure ecc implementations: attacks, countermeasures and cost. In: Cryptography and security: from theory to applications. Springer, pp 265–282
Saxena VP, Anubhav Saxena SM (2015) Implementation of fault attacks on elliptic curve cryptosystems. Reading, vol 3, no 4, p 0
Amiel F, Clavier C, Tunstall M (2006) Fault analysis of dpa-resistant algorithms. In: Fault diagnosis and tolerance in cryptography. Springer, pp 223–236
Ciet M, Joye M (2005) Elliptic curve cryptosystems in the presence of permanent and transient faults. Des Codes Crypt 36(1):33–43
Schmidt J-M, Medwed M (2009) A fault attack on ECDSA. In: 2009 Workshop on fault diagnosis and tolerance in cryptography (FDTC). IEEE, pp 93–99
Ling J, King B (2013) Smart card fault attacks on elliptic curve cryptography. In: 2013 IEEE 56th international midwest symposium on circuits and systems (MWSCAS). IEEE, pp 1255–1258
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Jyotiyana, D., Saxena, V.P. (2017). A Fault Attack for Scalar Multiplication in Elliptic Curve Digital Signature Algorithm. In: Vishwakarma, H., Akashe, S. (eds) Computing and Network Sustainability. Lecture Notes in Networks and Systems, vol 12. Springer, Singapore. https://doi.org/10.1007/978-981-10-3935-5_29
Download citation
DOI: https://doi.org/10.1007/978-981-10-3935-5_29
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-3934-8
Online ISBN: 978-981-10-3935-5
eBook Packages: EngineeringEngineering (R0)