Lattice-Based Fault Attacks Against ECMQV

被引:1
|
作者
Cao, Weiqiong [1 ]
Chen, Hua [1 ]
Feng, Jingyi [1 ]
Fan, Limin [1 ]
Wu, Wenling [1 ]
机构
[1] Chinese Acad Sci, Inst Software, Trusted Comp & Informat Assurance Lab, South Fourth St 4, Beijing 100190, Peoples R China
关键词
ECC; Fault attack; Lattice attack; ECMQV; REDUCTION; VALIDATION;
D O I
10.1007/978-3-319-89641-0_6
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
ECMQV is a standardized key agreement protocol based on ECC with an additional implicit signature authentication. In this paper we investigate the vulnerability of ECMQV against fault attacks and propose two efficient lattice-based fault attacks. In our attacks, by inducing a storage fault to the ECC parameter a before the execution of ECMQV, we can construct two kinds of weak curves and successfully pass the public-key validation step in the protocol. Then, by solving ECDLP and using a guess-and-determine method, some information of the victim's temporary private key and the implicit-signature result can be deduced. Based on the retrieved information, we build two new lattice-attack models and recover the upper half of the static private key. Compared with the previous lattice-attack models, our models relax the attack conditions and do not require the exact partial knowledge of the nonces. The validity of the attacks is proven by experimental simulations, which show our attacks pose real threats to the unprotected ECMQV implementations since only one permanent fault is sufficient to retrieve half bits of the secret key.
引用
收藏
页码:101 / 116
页数:16
相关论文
共 50 条
  • [31] Lattice-based PKEs/KEMs
    Lu, Xianhui
    Zhang, Jiang
    NATIONAL SCIENCE REVIEW, 2021, 8 (09)
  • [32] Lattice-based geometric shaping
    Mirani, Ali
    Agrell, Erik
    Karlsson, Magnus
    2020 EUROPEAN CONFERENCE ON OPTICAL COMMUNICATIONS (ECOC), 2020,
  • [33] Lattice-Based Cryptography: A Survey
    Wang, Xiaoyun
    Xu, Guangwu
    Yu, Yang
    CHINESE ANNALS OF MATHEMATICS SERIES B, 2023, 44 (06) : 945 - 960
  • [34] Lattice-based memory allocation
    Darte, A
    Schreiber, R
    Villard, G
    IEEE TRANSACTIONS ON COMPUTERS, 2005, 54 (10) : 1242 - 1257
  • [35] Lattice-Based Blind Signatures
    Rueckert, Markus
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 : 413 - 430
  • [36] Lattice-based paraconsistent logic
    MacCaull, Wendy
    Vakarelov, Dimiter
    RELATIONAL METHODS IN COMPUTER SCIENCE, 2005, 2006, 3929 : 173 - 187
  • [37] Against fault attacks based on random infection mechanism
    Zhang, Jinbao
    Wu, Ning
    Zhang, Xiaoqiang
    Zhou, Fang
    IEICE ELECTRONICS EXPRESS, 2016, 13 (21):
  • [38] Lattice-Based Cryptography:A Survey
    Xiaoyun WANG
    Guangwu XU
    Yang YU
    Chinese Annals of Mathematics,Series B, 2023, (06) : 945 - 960
  • [39] Lattice-Based Cryptography: A Survey
    Xiaoyun Wang
    Guangwu Xu
    Yang Yu
    Chinese Annals of Mathematics, Series B, 2023, 44 : 945 - 960
  • [40] Lattice-based PKEs/KEMs
    Xianhui Lu
    Jiang Zhang
    National Science Review, 2021, 8 (09) : 7 - 8