Differential Fault Attacks on Elliptic Curve Cryptosystems View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2000-08-11

AUTHORS

Ingrid Biehl , Bernd Meyer , Volker Müller

ABSTRACT

In this paper we extend the ideas for differential fault attacks on the RSA cryptosystem (see [4]) to schemes using elliptic curves. We present three different types of attacks that can be used to derive information about the secret key if bit errors can be inserted into the elliptic curve computations in a tamper-proof device. The effectiveness of the attacks was proven in a software simulation of the described ideas. More... »

PAGES

131-146

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/3-540-44598-6_8

DOI

http://dx.doi.org/10.1007/3-540-44598-6_8

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1029752514


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0802", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Computation Theory and Mathematics", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Computer Science Department, University of Technology, Alexanderstra\u00dfe 10, 64283, Darmstadt, Germany", 
          "id": "http://www.grid.ac/institutes/grid.6546.1", 
          "name": [
            "Computer Science Department, University of Technology, Alexanderstra\u00dfe 10, 64283, Darmstadt, Germany"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Biehl", 
        "givenName": "Ingrid", 
        "id": "sg:person.015256060506.90", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015256060506.90"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Siemens AG, Corporate Technology, 81730, M\u00fcnchen, Germany", 
          "id": "http://www.grid.ac/institutes/grid.5406.7", 
          "name": [
            "Siemens AG, Corporate Technology, 81730, M\u00fcnchen, Germany"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Meyer", 
        "givenName": "Bernd", 
        "id": "sg:person.013256413541.81", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013256413541.81"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Universitas Kristen Duta Wacana, Jl. Dr. Wahidin 5-19, 55224, Yogyakarta, Indonesia", 
          "id": "http://www.grid.ac/institutes/grid.444636.7", 
          "name": [
            "Universitas Kristen Duta Wacana, Jl. Dr. Wahidin 5-19, 55224, Yogyakarta, Indonesia"
          ], 
          "type": "Organization"
        }, 
        "familyName": "M\u00fcller", 
        "givenName": "Volker", 
        "type": "Person"
      }
    ], 
    "datePublished": "2000-08-11", 
    "datePublishedReg": "2000-08-11", 
    "description": "In this paper we extend the ideas for differential fault attacks on the RSA cryptosystem (see [4]) to schemes using elliptic curves. We present three different types of attacks that can be used to derive information about the secret key if bit errors can be inserted into the elliptic curve computations in a tamper-proof device. The effectiveness of the attacks was proven in a software simulation of the described ideas.", 
    "editor": [
      {
        "familyName": "Bellare", 
        "givenName": "Mihir", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/3-540-44598-6_8", 
    "inLanguage": "en", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-540-67907-3", 
        "978-3-540-44598-2"
      ], 
      "name": "Advances in Cryptology \u2014 CRYPTO 2000", 
      "type": "Book"
    }, 
    "keywords": [
      "fault attacks", 
      "tamper-proof devices", 
      "elliptic curve computations", 
      "differential fault attack", 
      "elliptic curve cryptosystem", 
      "secret key", 
      "software simulation", 
      "RSA cryptosystem", 
      "bit errors", 
      "elliptic curves", 
      "curve computation", 
      "cryptosystem", 
      "attacks", 
      "computation", 
      "idea", 
      "scheme", 
      "key", 
      "information", 
      "different types", 
      "error", 
      "effectiveness", 
      "devices", 
      "simulations", 
      "types", 
      "curves", 
      "paper", 
      "Curve Cryptosystems"
    ], 
    "name": "Differential Fault Attacks on Elliptic Curve Cryptosystems", 
    "pagination": "131-146", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1029752514"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/3-540-44598-6_8"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/3-540-44598-6_8", 
      "https://app.dimensions.ai/details/publication/pub.1029752514"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2021-11-01T18:59", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20211101/entities/gbq_results/chapter/chapter_392.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/3-540-44598-6_8"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/3-540-44598-6_8'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/3-540-44598-6_8'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/3-540-44598-6_8'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/3-540-44598-6_8'


 

This table displays all metadata directly associated to this object as RDF triples.

106 TRIPLES      23 PREDICATES      52 URIs      45 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/3-540-44598-6_8 schema:about anzsrc-for:08
2 anzsrc-for:0802
3 schema:author N35752440ef8547fb9d5c7250f6c4b489
4 schema:datePublished 2000-08-11
5 schema:datePublishedReg 2000-08-11
6 schema:description In this paper we extend the ideas for differential fault attacks on the RSA cryptosystem (see [4]) to schemes using elliptic curves. We present three different types of attacks that can be used to derive information about the secret key if bit errors can be inserted into the elliptic curve computations in a tamper-proof device. The effectiveness of the attacks was proven in a software simulation of the described ideas.
7 schema:editor Nb9b32fc6c46342fc949edc4d8318c3bb
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree true
11 schema:isPartOf N5bfebaa8731c42cfb319b8f1f919dcca
12 schema:keywords Curve Cryptosystems
13 RSA cryptosystem
14 attacks
15 bit errors
16 computation
17 cryptosystem
18 curve computation
19 curves
20 devices
21 different types
22 differential fault attack
23 effectiveness
24 elliptic curve computations
25 elliptic curve cryptosystem
26 elliptic curves
27 error
28 fault attacks
29 idea
30 information
31 key
32 paper
33 scheme
34 secret key
35 simulations
36 software simulation
37 tamper-proof devices
38 types
39 schema:name Differential Fault Attacks on Elliptic Curve Cryptosystems
40 schema:pagination 131-146
41 schema:productId N10a06197f3cb4c2fb205d7bf9019a095
42 N4e07fdd7ae9340bda873e3749c63a7f8
43 schema:publisher Nd7cc6189817244a796b5704d4e90416b
44 schema:sameAs https://app.dimensions.ai/details/publication/pub.1029752514
45 https://doi.org/10.1007/3-540-44598-6_8
46 schema:sdDatePublished 2021-11-01T18:59
47 schema:sdLicense https://scigraph.springernature.com/explorer/license/
48 schema:sdPublisher N341f6318560d4e03a277e984594efddc
49 schema:url https://doi.org/10.1007/3-540-44598-6_8
50 sgo:license sg:explorer/license/
51 sgo:sdDataset chapters
52 rdf:type schema:Chapter
53 N107f6e09808c466bb9383b79873b4c46 schema:affiliation grid-institutes:grid.444636.7
54 schema:familyName Müller
55 schema:givenName Volker
56 rdf:type schema:Person
57 N10a06197f3cb4c2fb205d7bf9019a095 schema:name dimensions_id
58 schema:value pub.1029752514
59 rdf:type schema:PropertyValue
60 N19aa4bacb24947cd89a82269994adc5a rdf:first sg:person.013256413541.81
61 rdf:rest N8783fb68072e4799812b5a076028fd6c
62 N341f6318560d4e03a277e984594efddc schema:name Springer Nature - SN SciGraph project
63 rdf:type schema:Organization
64 N35752440ef8547fb9d5c7250f6c4b489 rdf:first sg:person.015256060506.90
65 rdf:rest N19aa4bacb24947cd89a82269994adc5a
66 N4e07fdd7ae9340bda873e3749c63a7f8 schema:name doi
67 schema:value 10.1007/3-540-44598-6_8
68 rdf:type schema:PropertyValue
69 N5bfebaa8731c42cfb319b8f1f919dcca schema:isbn 978-3-540-44598-2
70 978-3-540-67907-3
71 schema:name Advances in Cryptology — CRYPTO 2000
72 rdf:type schema:Book
73 N8783fb68072e4799812b5a076028fd6c rdf:first N107f6e09808c466bb9383b79873b4c46
74 rdf:rest rdf:nil
75 Nb9b32fc6c46342fc949edc4d8318c3bb rdf:first Nd9846e8a58ec479ab8171ce55da6145d
76 rdf:rest rdf:nil
77 Nd7cc6189817244a796b5704d4e90416b schema:name Springer Nature
78 rdf:type schema:Organisation
79 Nd9846e8a58ec479ab8171ce55da6145d schema:familyName Bellare
80 schema:givenName Mihir
81 rdf:type schema:Person
82 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
83 schema:name Information and Computing Sciences
84 rdf:type schema:DefinedTerm
85 anzsrc-for:0802 schema:inDefinedTermSet anzsrc-for:
86 schema:name Computation Theory and Mathematics
87 rdf:type schema:DefinedTerm
88 sg:person.013256413541.81 schema:affiliation grid-institutes:grid.5406.7
89 schema:familyName Meyer
90 schema:givenName Bernd
91 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013256413541.81
92 rdf:type schema:Person
93 sg:person.015256060506.90 schema:affiliation grid-institutes:grid.6546.1
94 schema:familyName Biehl
95 schema:givenName Ingrid
96 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015256060506.90
97 rdf:type schema:Person
98 grid-institutes:grid.444636.7 schema:alternateName Universitas Kristen Duta Wacana, Jl. Dr. Wahidin 5-19, 55224, Yogyakarta, Indonesia
99 schema:name Universitas Kristen Duta Wacana, Jl. Dr. Wahidin 5-19, 55224, Yogyakarta, Indonesia
100 rdf:type schema:Organization
101 grid-institutes:grid.5406.7 schema:alternateName Siemens AG, Corporate Technology, 81730, München, Germany
102 schema:name Siemens AG, Corporate Technology, 81730, München, Germany
103 rdf:type schema:Organization
104 grid-institutes:grid.6546.1 schema:alternateName Computer Science Department, University of Technology, Alexanderstraße 10, 64283, Darmstadt, Germany
105 schema:name Computer Science Department, University of Technology, Alexanderstraße 10, 64283, Darmstadt, Germany
106 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...