z-logo
open-access-imgOpen Access
Differential Fault Attacks and Countermeasures in Elliptic Curve Cryptography
Author(s) -
Anissa Sghaier,
Medien Zeghid,
Mohsen Machhout
Publication year - 2016
Publication title -
international journal of computer applications
Language(s) - English
Resource type - Journals
ISSN - 0975-8887
DOI - 10.5120/ijca2016909348
Subject(s) - computer science , elliptic curve cryptography , computer security , fault (geology) , differential (mechanical device) , cryptography , elliptic curve , public key cryptography , encryption , geology , mathematics , seismology , physics , mathematical analysis , thermodynamics
In asymetric cryptography, Elliptic Curve Cryptography (ECC) is the fastest in term of computation and the strongest in term of security. It can be used in message encryption/decryption, digital signature or key exchange. ECC can be implemented in hard over binary field GF(2 n ) or in soft over prime field GF(p). This paper presents an efficient software implementation of ECC scalar multiplication over prime field using GNU Multiple Precision (GMP) Library. The differential fault attacks (DFA) on the RSA cryptosystem can be extended to ECC one by inserting bit errors during computation. In this paper, a ”No Correctness Check for Input Points” (NCCIP) attacks was applied and a countermeasures was given to protect ECC cryptosystem against it. Software implementation in C language, using GMP library, was simulated on Intel(R) Core(TM) i3 CPU M380 @ 2.87GHz(3 GB RAM, 32-bit architecture).

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom