A Fault-Based Secret Key Retrieval Method for ECDSA: Analysis and Countermeasure

@article{Barenghi2016AFS,
  title={A Fault-Based Secret Key Retrieval Method for ECDSA: Analysis and Countermeasure},
  author={Alessandro Barenghi and G. Bertoni and L. Breveglieri and Gerardo Pelosi and S. Sanfilippo and Ruggero Susella},
  journal={ACM J. Emerg. Technol. Comput. Syst.},
  year={2016},
  volume={13},
  pages={8:1-8:26}
}
  • Alessandro Barenghi, G. Bertoni, +3 authors Ruggero Susella
  • Published 2016
  • Computer Science
  • ACM J. Emerg. Technol. Comput. Syst.
  • Elliptic curve cryptosystems proved to be well suited for securing systems with constrained resources like embedded and portable devices. In a fault-based attack, errors are induced during the computation of a cryptographic primitive, and the results are collected to derive information about the secret key safely stored in the device. We introduce a novel attack methodology to recover the secret key employed in implementations of the Elliptic Curve Digital Signature Algorithm. Our attack… CONTINUE READING
    Differential Attacks on Deterministic Signatures
    10
    Efficient and Secure ECDSA Algorithm and its Applications: A Survey
    5
    A Rainbow-Based Authentical Scheme for Securing Smart Connected Health Systems
    1
    SH-SecNet: An Enhanced Secure Network Architecture for the Diagnosis of Security Threats in a Smart Home
    12

    References

    Publications referenced by this paper.
    SHOWING 1-3 OF 3 REFERENCES
    An Updated Survey on Secure ECC Implementations: Attacks, Countermeasures and Cost
    98
    The OpenSSL Project, ver.1.0.1j. Retrieved from http://www.openssl.org
    • 2014
    The FIPS 186-4 Elliptic Curve Digital Signature Algorithm Validation System
    • 2014