Download presentation
1
In The Name of Allah Fault attacks on ECC
Fereshte Mozafari Arezoo Dabaghi
2
FLOW Introduction Fault attacks
Differential fault attack & its countermeasure Sign change fault attack & its countermeasure References Hardware Security and Trust, CE, SUT
3
Introduction Elliptic curve is cryptographically strong
An EC over Fp (p > 3) satisfy with: Y2 = x3 + ax2 + b (mod p) In cryptosystems based on EC, a crucial computation is the scalar multiplication of a public base point P with a secret scalar factor k. Q = kP Attacks aim to recover the value of k. Elliptic curve is cryptographically strong Hardware Security and Trust, CE, SUT
4
Fault Attacks Differential Fault Attack(DFA)
Sign Change Fault Attack(SCFA) M Safe- Error Analysis C Safe- Error Analysis Invalid Curve Analysis Invalid Point Analysis Hardware Security and Trust, CE, SUT
5
Differential fault attack(0)
Scalar multiplication Q = k.P P, πΈ /πΉ π , p
6
Differential fault attack(1)
Preliminaries If enforce a fault randomly in a register than can recover secret key in expected polynomial time binary length of n is k π π value stored in variable Q before iteration I πβ² π ππ a disturbed Qβvalue Hardware Security and Trust, CE, SUT
7
Differential fault attack(2)
Method Run ECSM once and collect the correct result ( π π ) Enforce register fault in a register holding the variable Q , in iteration n-m < j < n n-1 j πβ² π Hardware Security and Trust, CE, SUT
8
Differential fault attack(3)
3. Find the index of the first iteration jβ with jβ > j and π πβ² =1 n-1 jβ j πβ² πβ² Hardware Security and Trust, CE, SUT
9
Differential fault attack(4)
4. find candidate for the disturbed Q-value πβ² πβ² 1. check each i with ( n-m < i < n) as candidate for jβ 2. x = {0; 1} πβπ as candidate for the n-i most significant bit of k n-1 jβ=i j π₯ π₯ Hardware Security and Trust, CE, SUT
10
Differential fault attack(4)
4. find candidate for the disturbed Q-value πβ² πβ² n-1 jβ=i j (π₯ π₯ . 2 π .P)β πβ² π₯π = πβ² πβ² π π₯π π‘ = π π - π₯ π₯ . 2 π .P Hardware Security and Trust, CE, SUT
11
Differential fault attack(5)
5. For each choice of x and i we consider all disturbed Q- values ( πβ² π₯π ) with can derive from π π₯π by flipping one bit. 6. calculate πβ² π by : Hardware Security and Trust, CE, SUT
12
Differential fault attack(6)
7. if πβ² π is identical by πβ² π of device i as a candidate for jβ πβ² π₯π as a candidate for πβ² πβ² binary representation of x as a candidate for upper n-jβ of k Hardware Security and Trust, CE, SUT
13
Countermeasure for DFA
intermediate results (Qi , Hi )should be regularly checked randomize the scalar k Hardware Security and Trust, CE, SUT
14
SCFA on ECC(1) Over NAF-based left-to-right doubling algorithm
Hardware Security and Trust, CE, SUT
15
SCFA on ECC(2) Basic idea: recover the bits of k in pieces of 1 β€ r β€ m bits A SCF changes the sign of y-coordinate of an attacked point Q ο Qf Hardware Security and Trust, CE, SUT
16
SCFA on ECC(3) the only unknown part is Li (k)
This allows to recover bits of k starting from the LSB Hardware Security and Trust, CE, SUT
17
Injection of SCF on Qi β(1)
Input: access to algorithm1 n the length of private key, k > 0 in NAF Q = kP, m a parameter for acceptable amount of oο¬ine work Output: k with probability at least 1/2 #Step1: Collect faulty output collect the set S by including SCF on Qiβ Hardware Security and Trust, CE, SUT
18
Injection of SCF on Qi β(2)
#step2: Inductive Retrieval of Secret Key Bits 1. Set s := -1 2. While(s < n-1) do 3. Set 4. For all lengths of r = 1,2,β¦,m do 5. For all valid NAF-patterns x = (xs+1,xs+2,β¦,xs+r) do S+1 LSBs of k are known Compute known LSB part Try all possible bit pattern with length r Hardware Security and Trust, CE, SUT
19
Injection of SCF on Qi β(3)
6. Set 7. For all do 8. If then 9. conclude ks+1 = xs+1, ks+2 = xs+2,β¦, ks+r = xs+r , set s := s + r Compute test condidate Tx Verify Tx Hardware Security and Trust, CE, SUT
20
Injection of SCF on Qi β(4)
10. If no test candidate satisο¬es the veriο¬cation step,then assume that ks+1 = 0, set s := s continue at Line Verify Q = kP If this fails then output βfailureβ 13. Output βkβ Hardware Security and Trust, CE, SUT
21
Countermeasure for SCFA(1)
Uses a second elliptic curve whose order is a small prime number(t) to verify the ο¬nal results E = Ep := E( Fp ) Et := E( Ft ) Ept is deο¬ned with parameters Apt and Bpt Apt β‘ Ap mod p, Apt β‘ At mod t Bpt β‘ Bp mod p, Bpt β‘ Bt mod t Qpt = k Ppt Hardware Security and Trust, CE, SUT
22
Countermeasure for SCFA(2)
Attacks in Line 4 cannot yield a faulty output Hardware Security and Trust, CE, SUT
23
References 1. J. Blomer, M. Otto, J. SeifertβSign Change Fault Attacks On Elliptic Curve Cryptosystems,β Fault Diagnousis and Tolerance iv Cryptograghy , pp , J. Fan, I. Verbouwhede, βAn Updated Survey on Secure ECC Implementations: Attacks, Countermeasures and Cost,β Cryptography and Security, pp , J. Fan, X. Gue, E. Mulder, βState-of-the-art of secure ECC implementations: a survey on known side-channel attacks and countermeasures,β International Symposium on Hardware-Oriented Security and Trust , pp , I. Biehel, B. Meyer, V. Muller, "Diferential Fault Attacks on Elliptic Curve Cryptosystems," Advance in Cryptography, pp , B. Johannes, O. Martin, S. Jean-Pierre, βSign Change Fault Attacks on Elliptic Curve Cryptosystemsβ Hardware Security and Trust, CE, SUT
24
When that you think every thing is hidden and no one can see within , remember my friend , God can
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.