Lattice-Based Fault Attacks Against ECMQV

被引:1
|
作者
Cao, Weiqiong [1 ]
Chen, Hua [1 ]
Feng, Jingyi [1 ]
Fan, Limin [1 ]
Wu, Wenling [1 ]
机构
[1] Chinese Acad Sci, Inst Software, Trusted Comp & Informat Assurance Lab, South Fourth St 4, Beijing 100190, Peoples R China
关键词
ECC; Fault attack; Lattice attack; ECMQV; REDUCTION; VALIDATION;
D O I
10.1007/978-3-319-89641-0_6
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
ECMQV is a standardized key agreement protocol based on ECC with an additional implicit signature authentication. In this paper we investigate the vulnerability of ECMQV against fault attacks and propose two efficient lattice-based fault attacks. In our attacks, by inducing a storage fault to the ECC parameter a before the execution of ECMQV, we can construct two kinds of weak curves and successfully pass the public-key validation step in the protocol. Then, by solving ECDLP and using a guess-and-determine method, some information of the victim's temporary private key and the implicit-signature result can be deduced. Based on the retrieved information, we build two new lattice-attack models and recover the upper half of the static private key. Compared with the previous lattice-attack models, our models relax the attack conditions and do not require the exact partial knowledge of the nonces. The validity of the attacks is proven by experimental simulations, which show our attacks pose real threats to the unprotected ECMQV implementations since only one permanent fault is sufficient to retrieve half bits of the secret key.
引用
收藏
页码:101 / 116
页数:16
相关论文
共 50 条
  • [41] Lattice-based information retrieval
    Priss, U
    KNOWLEDGE ORGANIZATION, 2000, 27 (03): : 132 - 142
  • [42] Lattice-based digital signatures
    Vadim Lyubashevsky
    National Science Review, 2021, 8 (09) : 9 - 10
  • [43] Lattice-Based Timed Cryptography
    Lai, Russell W. F.
    Malavolta, Giulio
    ADVANCES IN CRYPTOLOGY - CRYPTO 2023, PT V, 2023, 14085 : 782 - 804
  • [44] Lattice-based lightweight cryptosystem
    Jain, Shivani
    Padmavathy, R.
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2022, 41 (03) : 135 - 146
  • [45] Generic side-channel attacks on cca-secure lattice-based pke and kems
    Ravi P.
    Roy S.S.
    Chattopadhyay A.
    Bhasin S.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2020 (03): : 307 - 335
  • [46] Lattice-Based Searchable Encryption Scheme against Inside Keywords Guessing Attack
    Yu, Xiaoling
    Xu, Chungen
    Xu, Lei
    Wang, Yuntao
    CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 64 (02): : 1107 - 1125
  • [47] Lattice-based searchable encryption scheme against inside keywords guessing attack
    Yu X.
    Xu C.
    Xu L.
    Wang Y.
    Computers, Materials and Continua, 2020, 64 (02): : 1107 - 1125
  • [48] Security of Lattice-Based Data Hiding Against the Watermarked-Only Attack
    Perez-Freire, Luis
    Perez-Gonzalez, Fernando
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2008, 3 (04) : 593 - 610
  • [49] Parity Check Based Fault Detection against Timing Fault Injection Attacks
    Zhang, Maoshen
    Li, He
    Wang, Peijing
    Liu, Qiang
    ELECTRONICS, 2022, 11 (24)
  • [50] Side-channel and Fault-injection attacks over Lattice-based Post-quantum Schemes (Kyber, Dilithium): Survey and New Results
    Ravi, Prasanna
    Chattopadhyay, Anupam
    D'Anvers, Jan Pieter
    Baksi, Anubhab
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2024, 23 (02)