access icon free Degenerate curve attacks: extending invalid curve attacks to Edwards curves and other models

Invalid curve attacks are a well known attack class targeting elliptic curve arithmetic implementations. In such attacks, the adversary tricks the cryptographic device into carrying out scalar multiplications on a weaker curve instead of on the expected, secure curve. The original approach of Antipa et al., however, only affects elliptic curve implementations using addition and doubling formulas that are independent of at least one of the curve parameters. This property is satisfied for elliptic curves in Weierstrass form, but not newer, increasingly popular models such as (twisted) Edwards curves. It has, therefore, been suggested that invalid curve attacks would not be applicable against these alternate models. In this study, the authors demonstrate that this is not the case, and present the first attack of this nature against (twisted) Edwards curves, Jacobi quartics, Jacobi intersections, and more. They also extend the analysis to characteristic 2 models, namely binary Huff, Edwards, and Lambda coordinates. They also show that our result may be used constructively as a fault attack countermeasure inspired by Shamir's trick, particularly on curves over random base fields.

Inspec keywords: cryptography

Other keywords: binary Huff coordinates; Lambda coordinates; Edwards curves; invalid curve attacks; elliptic curve arithmetic implementations; Edwards coordinates

Subjects: Cryptography; Data security

http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2017.0075
Loading

Related content

content/journals/10.1049/iet-ifs.2017.0075
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading