Skip to main content

Fault Attacks on Signature Schemes

  • Conference paper
Information Security and Privacy (ACISP 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3108))

Included in the following conference series:

Abstract

In 1996, Bao, Deng, Han, Jeng, Narasimhalu and Ngair presented bit-fault attacks on some signature schemes such as DSA, El Gamal and Schnorr signatures schemes. Unfortunately nowadays, their fault model is still very difficult to apply in practice. In this paper we extend Bao et al.’s attacks on the DSA, the ElGamal and the Schnorr signature by using a byte-fault model which is easier to put into practice. We also present byte-fault attacks on two other signature schemes: ECDSA and XTR-DSA. All these fault attacks are based on a common principle which allows us to obtain a 160-bit secret key by using 2300 faulty signatures on average.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bao, F., Deng, R., Han, Y., Jeng, A., Narasimhalu, A.D., Ngair, T.-H.: Breaking Public Key Cryptosystems an Tamper Resistance Devices in the Presence of Transient Fault. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol. 1361, pp. 115–124. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  2. Biehl, I., Meyer, B., Müller, V.: Differential Fault Analysis on Elliptic Curve Cryptosystems. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 131–146. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  3. Biham, E., Shamir, A.: Differential Fault Analysis of Secret Key Cryptosystem. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513–525. Springer, Heidelberg (1997)

    Google Scholar 

  4. Blömer, J., Otto, M., Seifert, J.-P.: A New RSA-CRT Algorithm Secure Against Bellcore Attacks. In: ACM-CCS 2003, ACM Press, New York (2003)

    Google Scholar 

  5. Blömer, J., Seifert, J.-P.: Fault based cryptanalysis of the Advanced Encryption Standard. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 162–181. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  6. Boneh, D., DeMillo, R.A., Lipton, R.J.: On the Importance of Checking Cryptographic Protocols for Faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37–51. Springer, Heidelberg (1997)

    Google Scholar 

  7. Chen, C.-N., Yen, S.-M.: Differential Fault Analysis on AES Key Schedule and Some Countermeasures. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, pp. 118–129. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  8. Ciet, M., Joye, M.: Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults. In: Designs, Codes and Cryptography (2004) (to appear)

    Google Scholar 

  9. Dottax, E.: Fault Attacks on NESSIE Signature and Identification Schemes. Technical report, NESSIE (October 2002), Available from http://www.cosic.esat.kuleuven.ac.be/nessie/reports/phase2/SideChan_1.pdf

  10. Dusart, P., Letourneux, G., Vivolo, O.: Differential Fault Analysis on A.E.S. Cryptology ePrint Archive, Report 2003/010 (2003), http://eprint.iacr.org/

  11. Giraud, C.: DFA on AES. Cryptology ePrint Archive, Report 2003/008 (2003), http://eprint.iacr.org/

  12. Lenstra, A.K.: Memo on RSA Signature Generation in the Presence of Faults. Manuscript (1996), Available from the author at arjen.lenstra@citicorp.com

    Google Scholar 

  13. Lenstra, A.K., Verheul, E.R.: An overview of the XTR public key system. In: Public Key Cryptography and Computational Number Theory Conference (2000)

    Google Scholar 

  14. Lenstra, A.K., Verheul, E.R.: The XTR public key system. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 1–19. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  15. Piret, G., Quisquater, J.-J.: A Differential Fault Attack Technique Against SPN Structures, with Application to the AES and Khazad. In: Walter, C.D., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 77–88. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  16. Wolfram Research, http://mathworld.wolfram.com/Inclusion-ExclusionPrinciple.html

  17. Skorobogatov, S., Anderson, R.: Optical Fault Induction Attack. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 2–12. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  18. Yen, S.-M., Chen, J.Z.: A DFA on Rijndael. In: Chan, A.H., Gligor, V. (eds.) Information Security – ISC 2002. LNCS, vol. 2433, Springer, Heidelberg (2002)

    Google Scholar 

  19. Yen, S.-M., Joye, M.: Checking before output not be enough against faultbased cryptanalysis. IEEE Transactions on Computers 49(9), 967–970 (2000)

    Article  Google Scholar 

  20. Yen, S.-M., Kim, S.-J., Lim, S.-G., Moon, S.-J.: A Countermeasure against one Physical Cryptanalysis May Benefit Another Attack. In: Kim, K.-c. (ed.) ICISC 2001. LNCS, vol. 2288, pp. 414–427. Springer, Heidelberg (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Giraud, C., Knudsen, E.W. (2004). Fault Attacks on Signature Schemes. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds) Information Security and Privacy. ACISP 2004. Lecture Notes in Computer Science, vol 3108. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-27800-9_41

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-27800-9_41

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22379-5

  • Online ISBN: 978-3-540-27800-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics