ElGamal signature scheme immune to fault analysis

被引:0
|
作者
Nikodem, Maciej [1 ]
机构
[1] Wroclaw Univ Technol, Inst Comp Engn Control & Robot, PL-50372 Wroclaw, Poland
关键词
ElGamal signature scheme; fault attacks; error diffusion;
D O I
10.1109/DepCoS-RELCOMEX.2008.55
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Fault attacks have been introduced in late 90's and since then they attracted a lot of attention. Last years many authors have presented that almost all contemporary cryptographic algorithms are susceptible to the fault analysis. Unfortunately, only a few propositions to overcome this threat have been proposed. Moreover most works focus on secret key cryptosystems (e.g. AES, RC6, Blowfish) and the RSA encryption. and signing algorithm. On the other hand much less attention have been paid to other signature and identification schemes. OF In this paper we will investigate the fault attack on the ElGamal signature scheme. We briefly present two attacks on this scheme and propose a modification that ensures immunity to transient and permanent faults. This is achieved without using comparisons, at cost of increased computational overhead similar to signature verification.
引用
收藏
页码:355 / 362
页数:8
相关论文
共 50 条
  • [31] Capture resilient ElGamal signature protocols
    Acan, Huseyin
    Kaya, Kamer
    Selcuk, Ali Aydin
    Computer and Information Sciences - ISCIS 2006, Proceedings, 2006, 4263 : 943 - 951
  • [32] Use of ElGamal signature scheme for key-exchange in peer-to-peer radio networks
    Dawoud, D. S.
    Akorli, Felix K.
    WMSCI 2007: 11TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS, 2007, : 57 - +
  • [33] An efficient ElGamal cryptosystem scheme
    Hussein H.I.
    Abduallah W.M.
    International Journal of Computers and Applications, 2021, 43 (10) : 1088 - 1094
  • [34] A New Fault Attack on UOV Multivariate Signature Scheme
    Furue, Hiroki
    Kiyomura, Yutaro
    Nagasawa, Tatsuya
    Takagi, Tsuyoshi
    POST-QUANTUM CRYPTOGRAPHY (PQCRYPTO 2022), 2022, 13512 : 124 - 143
  • [35] Insecure primitive elements in an ElGamal signature protocol
    Khadir, Omar
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2015, 18 (03): : 237 - 245
  • [36] Machine Fault Signature Analysis
    Jayaswal, Pratesh
    Wadhwani, A. K.
    Mulchandani, K. B.
    INTERNATIONAL JOURNAL OF ROTATING MACHINERY, 2008, 2008
  • [37] On the Security of a Variant of ElGamal Encryption Scheme
    Rao, Fang-Yu
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (04) : 725 - 728
  • [38] On the uniformity of distribution of the elliptic curve ElGamal signature
    El Mahassni, E
    Shparlinski, I
    FINITE FIELDS AND THEIR APPLICATIONS, 2002, 8 (04) : 589 - 596
  • [39] Use of ElGamal signature scheme for key-exchange in peer-to-peer radio networks (Part II)
    Dawoud, D. S.
    Akorli, Felix K.
    WMSCI 2007: 11TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS, 2007, : 63 - +
  • [40] The Iso-ElGamal Cryptographic Scheme
    Wade, Mamadou, I
    Gill, Tepper
    2022 IEEE INTERNATIONAL IOT, ELECTRONICS AND MECHATRONICS CONFERENCE (IEMTRONICS), 2022, : 365 - 372