Title :
ElGamal Signature Scheme Immune to Fault Analysis
Author_Institution :
Inst. of Comput. Eng. Control & Robot., Wroclaw Univ. of Technol., Warsaw
Abstract :
Fault attacks have been introduced in late 90´s and since then they attracted a lot of attention. Last years many authors have presented that almost all contemporary cryptographic algorithms are susceptible to the fault analysis. Unfortunately, only a few propositions to overcome this threat have been proposed. Moreover most works focus on secret key cryptosystems (e.g. AES, RC6, Blowfish) and the RSA encryption and signing algorithm. On the other hand much less attention have been paid to other signature and identification schemes.In this paper we will investigate the fault attack on the ElGamal signature scheme. We briefly present two attacks on this scheme and propose a modification that ensures immunity to transient and permanent faults. This is achieved without using comparisons, at cost of increased computational overhead similar to signature verification.
Keywords :
cryptography; digital signatures; security of data; ElGamal signature scheme; contemporary cryptographic algorithms; fault analysis; secret key cryptosystems; Circuit faults; Control engineering computing; Control systems; Cryptography; Error correction; Fault detection; Hardware; Protection; Robot control; Security; ElGamal signature scheme; error diffusion; fault attacks;
Conference_Titel :
Dependability of Computer Systems, 2008. DepCos-RELCOMEX '08. Third International Conference on
Conference_Location :
Szklarska Poreba
Print_ISBN :
978-0-7695-3179-3
DOI :
10.1109/DepCoS-RELCOMEX.2008.55