Paper 2024/882
Lattice-based Fault Attacks against ECMQV
Abstract
ECMQV is a standardized key agreement protocol based on ECC with an additional implicit signature authentication. In this paper we investigate the vulnerability of ECMQV against fault attacks and propose two efficient lattice-based fault attacks. In our attacks, by inducing a storage fault to the ECC parameter $a$ before the execution of ECMQV, we can construct two kinds of weak curves and successfully pass the public-key validation step in the protocol. Then, by solving ECDLP and using a guess-and-determine method, some information of the victim's temporary private key and the implicit-signature result can be deduced. Based on the retrieved information, we build two new lattice-attack models and recover the upper half of the static private key. Compared with the previous lattice-attack models, our models relax the attack conditions and do not require the exact partial knowledge of the nonces. The validity of the attacks is proven by experimental simulations, which show our attacks pose real threats to the unprotected ECMQV implementations since only one permanent fault is sufficient to retrieve half bits of the secret key.
Metadata
- Available format(s)
- Category
- Attacks and cryptanalysis
- Publication info
- Published elsewhere. COSADE 2018
- Keywords
- ECCFault AttackLattice AttackECMQV
- Contact author(s)
-
caoweiqiong @ iscas ac cn
chenhua @ iscas ac cn - History
- 2024-06-05: approved
- 2024-06-03: received
- See all versions
- Short URL
- https://ia.cr/2024/882
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2024/882, author = {Weiqiong Cao and Hua Chen and Jingyi Feng and Linmin Fan and Wenling Wu}, title = {Lattice-based Fault Attacks against {ECMQV}}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/882}, year = {2024}, url = {https://eprint.iacr.org/2024/882} }