...
首页> 外文期刊>Journal of Cryptology >Fault-Based Attack on Montgomery's Ladder Algorithm
【24h】

Fault-Based Attack on Montgomery's Ladder Algorithm

机译:基于故障的蒙哥马利阶梯算法攻击

获取原文
获取原文并翻译 | 示例
           

摘要

In this paper we present invalid-curve attacks that apply to the Montgomery ladder elliptic curve scalar multiplication (ECSM) algorithm. An elliptic curve over the binary field is defined using two parameters, a and b. We show that with a different "value" for curve parameter a, there exists a cryptographically weaker group in nine of the ten NIST-recommended elliptic curves over IF_2~m. Thereafter, we present two attacks that are based on the observation that parameter a is not utilized for the Montgomery ladder algorithms proposed by L6pez and Dahab (CHES 1999: Cryptographic Hardware and Embedded Systems, LNCS, vol. 1717, pp. 316-327, Springer, Berlin, 1999). We also present the probability of success of such attacks for general and NIST-recommended elliptic curves. In addition we give some countermeasures to resist these attacks.
机译:在本文中,我们提出了适用于蒙哥马利阶梯椭圆曲线标量乘法(ECSM)算法的无效曲线攻击。使用两个参数a和b定义二进制字段上的椭圆曲线。我们表明,对于曲线参数a使用不同的“值”,在IF_2〜m上的10条NIST推荐的椭圆曲线中的9条中,有9条密码学弱。此后,我们提出了两种攻击,其依据是L6pez和Dahab提出的Montgomery阶梯算法未使用参数a(CHES 1999:Cryptographic Hardware and Embedded Systems,LNCS,第1717卷,第316-327页,柏林,施普林格(1999)。我们还介绍了对普通和NIST推荐的椭圆曲线进行此类攻击的成功概率。此外,我们提供了一些应对这些攻击的对策。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号