期刊文献+

二进制方法点乘的椭圆曲线密码故障攻击 被引量:6

Fault Attacks on Elliptic Curve Cryptosystems with Binary Method Point Multiplication
下载PDF
导出
摘要 研究椭圆曲线密码(ECC)算法及符号变换故障攻击原理,提出一种改进的符号变换故障攻击算法。该算法通过改变故障注入位置,减少故障对私钥的数值依赖,有效地解决原算法中出现的"零块失效"问题。采用改进算法对二进制方法点乘的ECC进行符号变换故障攻击,通过仿真实验验证该算法的可行性。 Researching the algorithm of Elliptic Curve Cryptosystems(ECC) and the principle of sign change fault attacks,this paper presents an improved algorithm of sign change fault attacks which can effectively solve the "zero block failure" problem and reduce the dependence of faults on private key by changing the location of induced faults.Using the improved algorithm attacks on ECC with binary scalar multiplication,simulation experiment verifies the feasibility of the algorithm.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第20期100-102,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60772082) 河北省自然科学基金数学研究专项资助项目(08M010) 军械工程学院科学研究基金资助项目(YJJXM07033)
关键词 旁路攻击 故障攻击 椭圆曲线密码 点乘 零块失效 side channel attack fault attacks Elliptic Curve Cryptosystems(ECC) point multiplication zero block failure
  • 相关文献

参考文献7

  • 1Boneh D, DeMillo R A, Lipton R J. On the Importance of Checking Cryptographic Protocols for Faults[C]//Proceedings of EUROCRYPT’97. [S. 1.]: Springer-Verlag, 1997: 512-525. 被引量:1
  • 2Biehl I, Meyer B, Mller V. Differential Fault Attacks on Elliptic Curve Cryptosystems[C]//Proceedings of CRYPTO’00. [S. 1.]: Springer-Verlag, 2000: 131-146. 被引量:1
  • 3Antipa A, Brown D R L, Menezes A, et al. Validation of Elliptic Curve Public Keys[C]//Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography. [S. 1.]: Springer-Verlag, 2003: 211-223. 被引量:1
  • 4Fouque P A, Lercier R. Fault Attack on Elliptic Curve with Montgomery Ladder Implementation[C]//Proceedings of FDTC’08. [S. 1.]: IEEE Computer Society, 2008: 92-98. 被引量:1
  • 5Chilikov A. New Fault Attack on Elliptic Curve Scalar Multiplica- tion[EB/OL]. (2009-10-21). http://eprint.iacr.org/2009/528. 被引量:1
  • 6Bl?mer J, Otto M, Seifert J P. Sign Change Fault Attacks on Elliptic Curve Cryptosystems[C]//Proceedings of FDTC’06. [S. 1.]: Springer-Verlag, 2006: 36-52. 被引量:1
  • 7端木庆峰,王衍波,张凯泽,雷凤宇.GF(3^m)-ECC算法及其软件实现[J].计算机工程,2009,35(14):1-3. 被引量:2

二级参考文献5

  • 1Menezes A J.Elliptic Curve Public Key Cryptosystems[M].Boston,USA:Kluwer Academic Publishers,1993. 被引量:1
  • 2Loidreau P.On the Factorization of Trinomials over F3[EB/OL].(2000-02-18).http://www.inria.fr/RRRT/RR-3918.html. 被引量:1
  • 3Bertoni G,Guajardo J,Kumar S,et al.Efficient GF(pm) Arithmetic Architectures for Cryptographic Applications[C]//Proceedings of CTRSA'03.Berlin,Germany:Springer-Verlag,2003:158-175. 被引量:1
  • 4Smart N P,Westwood E J.Point Multiplication on Ordinary Elliptic Curves over Fields of Characteristic Three[J].Applicable Algebra in Engineering,Communication and Computing,2003,13(6):485-497. 被引量:1
  • 5Shoup V.NTL:A Library for Doing Number Theory[EB/OL].(2003-09-01).http://shoup.net/ntl/. 被引量:1

共引文献1

同被引文献45

引证文献6

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部