Differential fault attacks on elliptic curve cryptosystems

Ingrid Biehl, Bernd Meyer, Volker Müller

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

209 Citations (Scopus)

Abstract

In this paper we extend the ideas for differential fault attacks on the RSA cryptosystem (see [4]) to schemes using elliptic curves. We present three different types of attacks that can be used to derive information about the secret key if bit errors can be inserted into the elliptic curve computations in a tamper-proof device. The effectiveness of the attacks was proven in a software simulation of the described ideas.

Original languageEnglish
Title of host publicationAdvances in Cryptology - CRYPTO 2000 - 20th Annual International Cryptology Conference, Proceedings
EditorsMihir Bellare
PublisherSpringer
Pages131-146
Number of pages16
ISBN (Print)9783540445982
Publication statusPublished - 2000
Externally publishedYes
Event20th Annual International Cryptology Conference, CRYPTO 2000 - Santa Barbara, United States of America
Duration: 20 Aug 200024 Aug 2000

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Volume1880
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference20th Annual International Cryptology Conference, CRYPTO 2000
CountryUnited States of America
CitySanta Barbara
Period20/08/0024/08/00

Keywords

  • Differential fault attack
  • Elliptic curve cryptosystem

Cite this

Biehl, I., Meyer, B., & Müller, V. (2000). Differential fault attacks on elliptic curve cryptosystems. In M. Bellare (Ed.), Advances in Cryptology - CRYPTO 2000 - 20th Annual International Cryptology Conference, Proceedings (pp. 131-146). (Lecture Notes in Computer Science ; Vol. 1880). Springer.
Biehl, Ingrid ; Meyer, Bernd ; Müller, Volker. / Differential fault attacks on elliptic curve cryptosystems. Advances in Cryptology - CRYPTO 2000 - 20th Annual International Cryptology Conference, Proceedings. editor / Mihir Bellare. Springer, 2000. pp. 131-146 (Lecture Notes in Computer Science ).
@inproceedings{323c3e10191842a29f8797c2c19ae00f,
title = "Differential fault attacks on elliptic curve cryptosystems",
abstract = "In this paper we extend the ideas for differential fault attacks on the RSA cryptosystem (see [4]) to schemes using elliptic curves. We present three different types of attacks that can be used to derive information about the secret key if bit errors can be inserted into the elliptic curve computations in a tamper-proof device. The effectiveness of the attacks was proven in a software simulation of the described ideas.",
keywords = "Differential fault attack, Elliptic curve cryptosystem",
author = "Ingrid Biehl and Bernd Meyer and Volker M{\"u}ller",
year = "2000",
language = "English",
isbn = "9783540445982",
series = "Lecture Notes in Computer Science",
publisher = "Springer",
pages = "131--146",
editor = "Mihir Bellare",
booktitle = "Advances in Cryptology - CRYPTO 2000 - 20th Annual International Cryptology Conference, Proceedings",

}

Biehl, I, Meyer, B & Müller, V 2000, Differential fault attacks on elliptic curve cryptosystems. in M Bellare (ed.), Advances in Cryptology - CRYPTO 2000 - 20th Annual International Cryptology Conference, Proceedings. Lecture Notes in Computer Science , vol. 1880, Springer, pp. 131-146, 20th Annual International Cryptology Conference, CRYPTO 2000, Santa Barbara, United States of America, 20/08/00.

Differential fault attacks on elliptic curve cryptosystems. / Biehl, Ingrid; Meyer, Bernd; Müller, Volker.

Advances in Cryptology - CRYPTO 2000 - 20th Annual International Cryptology Conference, Proceedings. ed. / Mihir Bellare. Springer, 2000. p. 131-146 (Lecture Notes in Computer Science ; Vol. 1880).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

TY - GEN

T1 - Differential fault attacks on elliptic curve cryptosystems

AU - Biehl, Ingrid

AU - Meyer, Bernd

AU - Müller, Volker

PY - 2000

Y1 - 2000

N2 - In this paper we extend the ideas for differential fault attacks on the RSA cryptosystem (see [4]) to schemes using elliptic curves. We present three different types of attacks that can be used to derive information about the secret key if bit errors can be inserted into the elliptic curve computations in a tamper-proof device. The effectiveness of the attacks was proven in a software simulation of the described ideas.

AB - In this paper we extend the ideas for differential fault attacks on the RSA cryptosystem (see [4]) to schemes using elliptic curves. We present three different types of attacks that can be used to derive information about the secret key if bit errors can be inserted into the elliptic curve computations in a tamper-proof device. The effectiveness of the attacks was proven in a software simulation of the described ideas.

KW - Differential fault attack

KW - Elliptic curve cryptosystem

UR - http://www.scopus.com/inward/record.url?scp=84983134283&partnerID=8YFLogxK

M3 - Conference Paper

AN - SCOPUS:84983134283

SN - 9783540445982

T3 - Lecture Notes in Computer Science

SP - 131

EP - 146

BT - Advances in Cryptology - CRYPTO 2000 - 20th Annual International Cryptology Conference, Proceedings

A2 - Bellare, Mihir

PB - Springer

ER -

Biehl I, Meyer B, Müller V. Differential fault attacks on elliptic curve cryptosystems. In Bellare M, editor, Advances in Cryptology - CRYPTO 2000 - 20th Annual International Cryptology Conference, Proceedings. Springer. 2000. p. 131-146. (Lecture Notes in Computer Science ).