ElGamal signature scheme immune to fault analysis

被引:0
|
作者
Nikodem, Maciej [1 ]
机构
[1] Wroclaw Univ Technol, Inst Comp Engn Control & Robot, PL-50372 Wroclaw, Poland
关键词
ElGamal signature scheme; fault attacks; error diffusion;
D O I
10.1109/DepCoS-RELCOMEX.2008.55
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Fault attacks have been introduced in late 90's and since then they attracted a lot of attention. Last years many authors have presented that almost all contemporary cryptographic algorithms are susceptible to the fault analysis. Unfortunately, only a few propositions to overcome this threat have been proposed. Moreover most works focus on secret key cryptosystems (e.g. AES, RC6, Blowfish) and the RSA encryption. and signing algorithm. On the other hand much less attention have been paid to other signature and identification schemes. OF In this paper we will investigate the fault attack on the ElGamal signature scheme. We briefly present two attacks on this scheme and propose a modification that ensures immunity to transient and permanent faults. This is achieved without using comparisons, at cost of increased computational overhead similar to signature verification.
引用
收藏
页码:355 / 362
页数:8
相关论文
共 50 条
  • [1] Fault cryptanalysis of ElGamal signature scheme
    Biernat, J
    Nikodem, M
    COMPUTER AIDED SYSTEMS THEORY - EUROCAST 2005, 2005, 3643 : 327 - 336
  • [2] On Elgamal signature scheme
    Kuo, Wen-Chung
    PROCEEDINGS OF FUTURE GENERATION COMMUNICATION AND NETWORKING, WORKSHOP PAPERS, VOL 2, 2007, : 151 - 153
  • [3] A blind signature scheme based on ElGamal signature
    Mohammed, E
    Emarah, AE
    El-Shennawy, K
    IEEE/AFCEA EUROCOMM 2000, CONFERENCE RECORD: INFORMATION SYSTEMS FOR ENHANCED PUBLIC SAFETY AND SECURITY, 2000, : 51 - 53
  • [4] Security analysis on a blind signature scheme based on Elgamal signature equation
    Yu Eaozheng
    Xu Congwei
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 741 - 744
  • [5] ENHANCING THE SECURITY OF ELGAMAL SIGNATURE SCHEME
    HE, J
    KIESLER, T
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1994, 141 (04): : 249 - 252
  • [6] A New Proxy Signature Scheme As Secure As ElGamal Signature
    Han, Song
    Chang, Elizabeth
    Wang, Jie
    Liu, Wanquan
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 6, 2005, : 286 - 290
  • [7] DSA signature scheme immune to the fault cryptanalysis
    Nikodem, Maciej
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS, PROCEEDINGS, 2008, 5189 : 61 - 73
  • [8] Cryptanalysis of the enhanced ElGamal's signature scheme
    Laih, CS
    Kuo, WC
    CRYPTOGRAPHY: POLICY AND ALGORITHMS, 1996, 1029 : 228 - 231
  • [9] New ElGamal type threshold digital signature scheme
    Electronics and Telecommunications, Research Inst, Taejon, Korea, Republic of
    IEICE Trans Fund Electron Commun Comput Sci, 1 (86-93):
  • [10] New ElGamal type threshold digital signature scheme
    Park, C
    Kurosawa, K
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1996, E79A (01) : 86 - 93