A new CRT-RSA algorithm secure against bellcore attacks

作者: Johannes Bl?mer , Martin Otto , Jean-Pierre Seifert

DOI: 10.1145/948109.948151

关键词:

摘要: In this paper we describe a new algorithm to prevent fault attacks on RSA signature algorithms using the Chinese Remainder Theorem (CRT-RSA). This variant of is widely used smartcards. Smartcards other hand are particularly susceptible like one described in [7]. Recent results have shown that practical and easy accomplish ([21], [17]).Therefore, they establish need for attack protected CRT-RSA schemes. Starting from careful derivation classification models, algorithm. For most realistic model described, rigorously analyze success probability an adversary against our Thereby, prove secure Bellcore attack.

参考文章(21)
Wolfgang Rankl, Smart Card Handbook ,(1997)
Marc Joye, Quisquater Jean-Jacques, Yen Sung-Ming, Moti Yung, Observability Analysis - Detecting When Improved Cryptosystems Fail the cryptographers track at the rsa conference. pp. 17- 29 ,(2002) , 10.1007/3-540-45760-7_2
C. Aumüller, P. Bier, W. Fischer, P. Hofreiter, J.-P. Seifert, Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures cryptographic hardware and embedded systems. pp. 260- 275 ,(2002) , 10.1007/3-540-36400-5_20
Yen Sung-Ming, Seungjoo Kim, Seongan Lim, Sangjae Moon, A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack international conference on information security and cryptology. pp. 414- 427 ,(2001) , 10.1007/3-540-45861-1_31
Ivars Peterson, Chinks in digital armor: Exploiting faults to break smart‐card cryptosystems Science News. ,vol. 151, pp. 78- 79 ,(1997) , 10.2307/3980615
Mihir Bellare, Phillip Rogaway, Optimal asymmetric encryption theory and application of cryptographic techniques. pp. 92- 111 ,(1994) , 10.1007/BFB0053428
Yen Sung-Ming, Seungjoo Kim, Seongan Lim, Sangjae Moon, RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis international conference on information security and cryptology. pp. 397- 413 ,(2001) , 10.1007/3-540-45861-1_30
Christophe Clavier, Jean-Sébastien Coron, Nora Dabbous, Differential Power Analysis in the Presence of Hardware Countermeasures cryptographic hardware and embedded systems. pp. 252- 263 ,(2000) , 10.1007/3-540-44499-8_20
Jean-Sébastien Coron, Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems cryptographic hardware and embedded systems. pp. 292- 302 ,(1999) , 10.1007/3-540-48059-5_25