Fault analysis of the NTRUSign digital signature scheme

  • Authors:
  • Abdel Alim Kamal;Amr M. Youssef

  • Affiliations:
  • Concordia Institute for Information Systems Engineering, Concordia University, Montreal, Canada H3G 1M8;Concordia Institute for Information Systems Engineering, Concordia University, Montreal, Canada H3G 1M8

  • Venue:
  • Cryptography and Communications
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

We present a fault analysis of the NTRUSign digital signature scheme. The utilized fault model is the one in which the attacker is assumed to be able to fault a small number of coefficients in a specific polynomial during the signing process but cannot control the exact location of the injected transient faults. For NTRUsign with parameters (N, q驴=驴p l , $\mathcal{B}$ , standard, $\mathcal{N}$ ), when the attacker is able to skip the norm-bound signature checking step, our attack needs one fault, succeeds with probability $\approx 1-\frac{1}{p}$ and requires O((qN) t ) steps when the number of faulted polynomial coefficients is upper bounded by t. The attack is also applicable to NTRUSign utilizing the transpose NTRU lattice but it requires double the number of fault injections. Different countermeasures against the proposed attack are investigated.