作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2011, Vol. 37 ›› Issue (20): 100-102. doi: 10.3969/j.issn.1000-3428.2011.20.035

• 安全技术 • 上一篇    下一篇

二进制方法点乘的椭圆曲线密码故障攻击

张金中,寇应展,陈财森,田军舰   

  1. (军械工程学院计算机工程系,石家庄 050003)
  • 收稿日期:2011-03-14 出版日期:2011-10-20 发布日期:2011-10-20
  • 作者简介:张金中(1985-),男,硕士研究生,主研方向:网络安全;寇应展,教授;陈财森,博士研究生;田军舰,硕士研究生
  • 基金资助:
    国家自然科学基金资助项目(60772082);河北省自然科学基金数学研究专项资助项目(08M010);军械工程学院科学研究基金资助项目(YJJXM07033)

Fault Attacks on Elliptic Curve Cryptosystems with Binary Method Point Multiplication

ZHANG Jin-zhong, KOU Ying-zhan, CHEN Cai-sen, TIAN Jun-jian   

  1. (Dept. of Computer Engineering, Ordnance Engineering College, Shijiazhuang 050003, China)
  • Received:2011-03-14 Online:2011-10-20 Published:2011-10-20

摘要: 研究椭圆曲线密码(ECC)算法及符号变换故障攻击原理,提出一种改进的符号变换故障攻击算法。该算法通过改变故障注入位置,减少故障对私钥的数值依赖,有效地解决原算法中出现的“零块失效”问题。采用改进算法对二进制方法点乘的ECC进行符号变换故障攻击,通过仿真实验验证该算法的可行性。

关键词: 旁路攻击, 故障攻击, 椭圆曲线密码, 点乘, 零块失效

Abstract: Researching the algorithm of Elliptic Curve Cryptosystems(ECC) and the principle of sign change fault attacks, this paper presents an improved algorithm of sign change fault attacks which can effectively solve the “zero block failure” problem and reduce the dependence of faults on private key by changing the location of induced faults. Using the improved algorithm attacks on ECC with binary scalar multiplication, simulation experiment verifies the feasibility of the algorithm.

Key words: side channel attack, fault attacks, Elliptic Curve Cryptosystems(ECC), point multiplication, zero block failure

中图分类号: