Degenerate curve attacks: extending invalid curve attacks to Edwards curves and other models. (1st May 2018)
- Record Type:
- Journal Article
- Title:
- Degenerate curve attacks: extending invalid curve attacks to Edwards curves and other models. (1st May 2018)
- Main Title:
- Degenerate curve attacks: extending invalid curve attacks to Edwards curves and other models
- Authors:
- Neves, Samuel
Tibouchi, Mehdi - Abstract:
- Abstract : Invalid curve attacks are a well known attack class targeting elliptic curve arithmetic implementations. In such attacks, the adversary tricks the cryptographic device into carrying out scalar multiplications on a weaker curve instead of on the expected, secure curve. The original approach of Antipa et al ., however, only affects elliptic curve implementations using addition and doubling formulas that are independent of at least one of the curve parameters. This property is satisfied for elliptic curves in Weierstrass form, but not newer, increasingly popular models such as (twisted) Edwards curves. It has, therefore, been suggested that invalid curve attacks would not be applicable against these alternate models. In this study, the authors demonstrate that this is not the case, and present the first attack of this nature against (twisted) Edwards curves, Jacobi quartics, Jacobi intersections, and more. They also extend the analysis to characteristic 2 models, namely binary Huff, Edwards, and Lambda coordinates. They also show that our result may be used constructively as a fault attack countermeasure inspired by Shamir's trick, particularly on curves over random base fields.
- Is Part Of:
- IET information security. Volume 12:Number 3(2018)
- Journal:
- IET information security
- Issue:
- Volume 12:Number 3(2018)
- Issue Display:
- Volume 12, Issue 3 (2018)
- Year:
- 2018
- Volume:
- 12
- Issue:
- 3
- Issue Sort Value:
- 2018-0012-0003-0000
- Page Start:
- 217
- Page End:
- 225
- Publication Date:
- 2018-05-01
- Subjects:
- cryptography
invalid curve attacks -- Edwards curves -- elliptic curve arithmetic implementations -- Lambda coordinates -- Edwards coordinates -- binary Huff coordinates
Computer security -- Periodicals
Cryptography -- Periodicals
Computer networks -- Security measures -- Periodicals
Database security -- Periodicals
005.8 - Journal URLs:
- https://ietresearch.onlinelibrary.wiley.com/journal/17518717 ↗
http://digital-library.theiet.org/content/journals/iet-ifs ↗
http://www.ietdl.org/IET-IFS ↗
http://www.theiet.org/ ↗ - DOI:
- 10.1049/iet-ifs.2017.0075 ↗
- Languages:
- English
- ISSNs:
- 1751-8709
- Deposit Type:
- Legaldeposit
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library DSC - 4363.252660
British Library DSC - BLDSS-3PM
British Library HMNTS - ELD Digital store - Ingest File:
- 16484.xml