Safe-error attack on SPA-FA resistant exponentiations using a HW modular multiplier

作者: Chong Hee Kim , Jong Hoon Shin , Jean-Jacques Quisquater , Pil Joong Lee

DOI: 10.1007/978-3-540-76788-6_22

关键词:

摘要: The RSA is one of the most widely used algorithms nowadays in smart cards. main part modular exponentiation composed multiplications. Therefore cards have a hardware multiplier to speed up computation. However, secure implementation cryptographic algorithm an embedded device such as card has now become big challenge since advent side channel analysis and fault attacks. In 2005 Giraud proposed algorithm, which against Simple Power Analysis (SPA) Fault Attacks (FA). Recently Boscher et al. another SPA-FA resistant algorithm. To authors' best knowledge, only these two provide security SPA FA simultaneously Both are also C safe-error attack M when they implemented software. with multiplier, this usual card, could be vulnerable type safe error attack. paper, we show how possible on both algorithms.

参考文章(21)
C. Aumüller, P. Bier, W. Fischer, P. Hofreiter, J.-P. Seifert, Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures cryptographic hardware and embedded systems. pp. 260- 275 ,(2002) , 10.1007/3-540-36400-5_20
Johannes Blömer, Martin Otto, Wagner’s Attack on a Secure CRT-RSA Algorithm Reconsidered Lecture Notes in Computer Science. pp. 13- 23 ,(2006) , 10.1007/11889700_2
Yen Sung-Ming, Seungjoo Kim, Seongan Lim, Sangjae Moon, RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis international conference on information security and cryptology. pp. 397- 413 ,(2001) , 10.1007/3-540-45861-1_30
Emmanuel Prouff, Robert Naciri, Arnaud Boscher, CRT RSA algorithm protected against fault attacks workshop in information security theory and practice. pp. 229- 243 ,(2007) , 10.5555/1763190.1763216
Y. Han, A. Jeng, A. D. Narasimhalu, T. Ngair, F. Bao, R. H. Deng, Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults international workshop on security. ,vol. 1361, pp. 115- 124 ,(1997) , 10.1007/BFB0028164
Paul C. Kocher, Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems international cryptology conference. ,vol. 1109, pp. 104- 113 ,(1996) , 10.1007/3-540-68697-5_9
Dan Boneh, Richard A. DeMillo, Richard J. Lipton, On the importance of checking cryptographic protocols for faults theory and application of cryptographic techniques. pp. 37- 51 ,(1997) , 10.1007/3-540-69053-0_4
David Wagner, Cryptanalysis of a provably secure CRT-RSA algorithm computer and communications security. pp. 92- 97 ,(2004) , 10.1145/1030083.1030097
Dan Boneh, Richard A. DeMillo, Richard J. Lipton, On the Importance of Eliminating Errors in Cryptographic Computations Journal of Cryptology. ,vol. 14, pp. 101- 119 ,(2001) , 10.1007/S001450010016