Elliptic Curve Cryptography in Practice

被引:125
作者
Bos, Joppe W. [4 ]
Halderman, J. Alex [2 ]
Heninger, Nadia [3 ]
Moore, Jonathan
Naehrig, Michael [1 ]
Wustrow, Eric [2 ]
机构
[1] Microsoft Res, Redmond, WA USA
[2] Univ Michigan, Ann Arbor, MI 48109 USA
[3] Univ Penn, Philadelphia, PA 19104 USA
[4] NXP Semicond, Leuven, Belgium
来源
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014 | 2014年 / 8437卷
关键词
ATTACKS; COMPUTATION;
D O I
10.1007/978-3-662-45472-5_11
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we perform a review of elliptic curve cryptography (ECC) as it is used in practice today in order to reveal unique mistakes and vulnerabilities that arise in implementations of ECC. We study four popular protocols that make use of this type of public-key cryptography: Bitcoin, secure shell (SSH), transport layer security (TLS), and the Austrian e-ID card. We are pleased to observe that about 1 in 10 systems support ECC across the TLS and SSH protocols. However, we find that despite the high stakes of money, access and resources protected by ECC, implementations suffer from vulnerabilities similar to those that plague previous cryptographic systems.
引用
收藏
页码:157 / 175
页数:19
相关论文
共 51 条
[21]  
DigitalOcean, 2013, AV DUPL SSH HOST KEY
[22]  
Dobbertin H., 1996, Fast Software Encryption. Third International Workshop Proceedings, P71
[23]  
Durumeric Z., 2013, USENIX SEC S AUG
[24]  
Duursma I, 1999, LECT NOTES COMPUT SC, V1716, P103
[25]   Fault attack on elliptic curve with Montgomery ladder implementation [J].
Fouque, Pierre-Alain ;
Real, Denis ;
Lercier, Reynald ;
Valette, Fredric .
FDTC 2008: FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY, PROCEEDINGS, 2008, :92-+
[26]  
Gallant R. P., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P190
[27]  
Gilson D., 2013, BLOCKCHAIN INFO ISSU
[28]  
Heninger N., 2012, USENIX SEC S AUG
[29]  
Hollosi A., 2008, OSTERREICHISCHE BURG
[30]   Lattice attacks on digital signature schemes [J].
Howgrave-Graham, NA ;
Smart, NP .
DESIGNS CODES AND CRYPTOGRAPHY, 2001, 23 (03) :283-290