Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection

作者: Sung-Ming Yen , Dongryeol Kim , SangJae Moon

DOI: 10.1007/11889700_5

关键词: CryptographyComputationChinese remainder theoremSpeedupCryptanalysisModulusFactorizationTheoretical computer scienceCryptosystemComputer scienceResidue number systemComputer engineeringFault (power engineering)Fault tolerance

摘要: The technique of RSA private computation speedup by using Chinese Remainder Theorem (CRT) is well known and has already been widely employed in almost all implementations. A recent CRT-based factorization attack exploiting hardware fault received growing attention because its potential vulnerability on most existing In this any single erroneous will make the system be vulnerable to factorizing public modulus. Recently, two immune protocols for CRT were reported based concept infective computation. special property these that they do not assume existence totally free tamper comparison operation within machine order enhance reliability. However, it shown paper are still a computational an auxiliary process was considered usual attack.

参考文章(23)
C. Aumüller, P. Bier, W. Fischer, P. Hofreiter, J.-P. Seifert, Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures cryptographic hardware and embedded systems. pp. 260- 275 ,(2002) , 10.1007/3-540-36400-5_20
Y. Han, A. Jeng, A. D. Narasimhalu, T. Ngair, F. Bao, R. H. Deng, Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults international workshop on security. ,vol. 1361, pp. 115- 124 ,(1997) , 10.1007/BFB0028164
Alfred J Menezes, Paul C van Oorschot, Scott A Vanstone, Handbook of Applied Cryptography ,(1996)
Marc Joye, Jean-Jacques Quisquater, Feng Bao, Robert H. Deng, RSA-type Signatures in the Presence of Transient Faults Lecture Notes in Computer Science. ,vol. 1355, pp. 155- 160 ,(1997) , 10.1007/BFB0024460
Dan Boneh, Richard A. DeMillo, Richard J. Lipton, On the importance of checking cryptographic protocols for faults theory and application of cryptographic techniques. pp. 37- 51 ,(1997) , 10.1007/3-540-69053-0_4
Marc Joye, Arjen K. Lenstra, Jean-Jacques Quisquater, Chinese Remaindering Based Cryptosystems in the Presence of Faults Journal of Cryptology. ,vol. 12, pp. 241- 245 ,(1999) , 10.1007/S001459900055
R. L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems Communications of the ACM. ,vol. 26, pp. 96- 99 ,(1983) , 10.1145/357980.358017