Title :
Attacks on Authentication and Signature Schemes Involving Corruption of Public Key (Modulus)
Author :
Kara-Ivaniov, M. ; Iceland, Eran ; Kipnis, Aviad
Author_Institution :
NDS Technol. Israel Ltd., Jerusalem
Abstract :
Brier et al (2006) showed how to attack RSA by induction of faults in public modulus n. We propose to use the same kind of technique to attack other asymmetric cryptographic schemes. The most interesting case in which we use a somewhat different approach is the attack on Elliptic Curves based signature protocol (namely ECDSA). Here we also take advantage of the short keys to offer a nontrivial practical attack that enables us to fully recover the private key. Different idea is used to attack Guillou-Quisquater authentication scheme (GQ). This demonstrates how the difference between schemes influences the details of the modulus corruption attacks. Special efforts were devoted to calculate the amount of corrupted data to perform the attack on each scheme. Various ways of protection against fault injection attacks on public key elements are discussed.
Keywords :
authorisation; private key cryptography; protocols; public key cryptography; Guillou-Quisquater authentication; asymmetric cryptographic schemes; authentication attacks; elliptic curves; fault injection attacks; private key; public key corruption; signature protocol; signature schemes; Authentication; Concrete; Cryptographic protocols; Elliptic curve cryptography; Elliptic curves; Protection; Public key; Public key cryptography; Security; Smart cards; Attacks on Signature and Authentication schemes; Corruption of Public Key (Modulus); Elliptic curve cryptography; Fault Injection Attacks; Smart Cards;
Conference_Titel :
Fault Diagnosis and Tolerance in Cryptography, 2008. FDTC '08. 5th Workshop on
Conference_Location :
Washington, DC
Print_ISBN :
978-0-7695-3314-8
DOI :
10.1109/FDTC.2008.20