Public Key Perturbation of Randomized RSA Implementations

被引:0
|
作者
Berzati, Alexandre [1 ,2 ]
Canovas-Dumas, Cecile [1 ]
Goubin, Louis [2 ]
机构
[1] CEA, LETI, MINATEC, 17 Rue Martyrs, F-38054 Grenoble 9, France
[2] Versailles St Quentin En Yvelines Univ, F-78035 Versailles, France
关键词
RSA; fault attacks; exponent randomization/blinding; public modulus; ELLIPTIC CURVE CRYPTOSYSTEMS; FAULT ATTACKS; EXPONENT;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Among all countermeasures that have been proposed to thwart side-channel attacks against RSA implementations, the exponent randomization method - also known as exponent blinding - has been very early suggested by P. Kocher in 1996, and formalized by J.-S. Coron at CHES 1999. Although it has been used for a long time, some authors pointed out the fact that it does not intrinsically remove all sources of leakage. At CHES 2003, P.-A. Fouque and F. Valette devised the so-called "Doubling Attack" that can recover the blinded secret exponent from an SPA analysis. In this paper, we consider the case of fault injections. Although it was conjectured by A. Berzati et al. at CT-RSA 2009 that exponent randomization avoids fault attacks, we describe here how to recover the RSA private key under a practical fault model. Our attack belongs to the family of public key perturbations and is the first fault attack against RSA implementations with the exponent randomization countermeasure. In practice, for a 1024-bit RSA signature algorithms, the attack succeeds from about 1000 faulty signatures.
引用
收藏
页码:306 / +
页数:4
相关论文
共 50 条
  • [1] RSA public key validation
    Silverman, RD
    [J]. CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, 2001, 20 : 369 - 378
  • [2] The RSA public key cryptosystem
    Wardlaw, WP
    [J]. CODING THEORY AND CRYPTOGRAPHY: FROM ENIGMA AND GEHEIMSCHREIBER TO QUANTUM THEORY, 2000, : 101 - 123
  • [3] On the Authentication of Certificateless RSA Public Key
    Yang, Wu-Chuan
    Ting, Lien-Yuan
    Kuo, Tzu-Chun
    [J]. 2018 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2018, : 378 - 379
  • [4] A systolic RSA public key cryptosystem
    Chen, PS
    Hwang, SA
    Wu, CW
    [J]. ISCAS 96: 1996 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS - CIRCUITS AND SYSTEMS CONNECTING THE WORLD, VOL 4, 1996, : 408 - 411
  • [5] Modified RSA Public Key Algorithm
    Aswathy, B. G.
    Resmi, R.
    [J]. 2014 FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL SYSTEMS AND COMMUNICATIONS (ICCSC), 2014, : 252 - 255
  • [6] A Fast and Secure RSA Public Key Cryptosystem
    Mohammadi, M.
    Zolghadrasli, A.
    Pourmina, M. A.
    [J]. JOURNAL OF MATHEMATICAL EXTENSION, 2020, 14 (04) : 1 - 20
  • [7] An efficient RSA public key encryption scheme
    Aboud, Sattar J.
    AL-Fayoumi, Mohammad A.
    Al-Fayoumi, Mustafa
    Jabbar, Haidar S.
    [J]. PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 127 - +
  • [8] ATTACKING RSA PUBLIC-KEY CRYPTOSYSTEMS
    HAWKER, P
    [J]. ELECTRONICS WORLD & WIRELESS WORLD, 1990, 96 (1655): : 826 - 827
  • [9] RSA Public Key Acceleration on CUDA GPU
    Tembhurne, Jitendra V.
    Sathe, S. R.
    [J]. ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY COMPUTATIONS IN ENGINEERING SYSTEMS, ICAIECES 2015, 2016, 394 : 365 - 375
  • [10] Cryptoanalysis of RSA system of enciphering with public key
    Popovych, R
    [J]. MODERN PROBLEMS OF RADIO ENGINEERING, TELECOMMUNICATIONS AND COMPUTER SCIENCE, PROCEEDINGS, 2004, : 301 - 302