ElGamal Signature Scheme Immune to Fault Analysis

Maciej Nikodem
{"title":"ElGamal Signature Scheme Immune to Fault Analysis","authors":"Maciej Nikodem","doi":"10.1109/DepCoS-RELCOMEX.2008.55","DOIUrl":null,"url":null,"abstract":"Fault attacks have been introduced in late 90's and since then they attracted a lot of attention. Last years many authors have presented that almost all contemporary cryptographic algorithms are susceptible to the fault analysis. Unfortunately, only a few propositions to overcome this threat have been proposed. Moreover most works focus on secret key cryptosystems (e.g. AES, RC6, Blowfish) and the RSA encryption and signing algorithm. On the other hand much less attention have been paid to other signature and identification schemes.In this paper we will investigate the fault attack on the ElGamal signature scheme. We briefly present two attacks on this scheme and propose a modification that ensures immunity to transient and permanent faults. This is achieved without using comparisons, at cost of increased computational overhead similar to signature verification.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.55","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Fault attacks have been introduced in late 90's and since then they attracted a lot of attention. Last years many authors have presented that almost all contemporary cryptographic algorithms are susceptible to the fault analysis. Unfortunately, only a few propositions to overcome this threat have been proposed. Moreover most works focus on secret key cryptosystems (e.g. AES, RC6, Blowfish) and the RSA encryption and signing algorithm. On the other hand much less attention have been paid to other signature and identification schemes.In this paper we will investigate the fault attack on the ElGamal signature scheme. We briefly present two attacks on this scheme and propose a modification that ensures immunity to transient and permanent faults. This is achieved without using comparisons, at cost of increased computational overhead similar to signature verification.
不受故障分析影响的电子签名方案
断层攻击在上世纪90年代末被引入,引起了人们的广泛关注。近年来,许多作者提出,几乎所有的当代密码算法都容易受到故障分析的影响。不幸的是,人们只提出了几项克服这一威胁的建议。此外,大多数工作集中在密钥密码系统(如AES, RC6, Blowfish)和RSA加密和签名算法。另一方面,对其他签名和识别方案的关注则少得多。本文主要研究了ElGamal签名方案中的故障攻击问题。我们简要介绍了对该方案的两种攻击,并提出了一种改进方案,以确保对瞬态和永久故障的免疫。这是在不使用比较的情况下实现的,其代价是增加了与签名验证类似的计算开销。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信