Elliptic curve cryptography (ECC) is ubiquitous and used to secure everything from internet traffic to embedded devices. Fault injection attacks are a powerful class of attack technique capable of recovering secrets by introducing errors during the implementation of a cryptographic algorithm.
This guide provides an overview of fault injection attacks which target Elliptic Curve Digital Signature Algorithm (ECDSA) and Elliptic Curve Diffie-Hellman (ECDH). We will illustrate what is possible to achieve with the current attack techniques, provide the prerequisites and assumptions for the attacks along with examples and references to real-world FI attacks on ECC.