publication . Part of book or chapter of book . 2016

Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT

Kiss, Ágnes; Krämer, Juliane; Rauzy, Pablo; Seifert, Jean-Pierre;
Open Access
  • Published: 01 Jan 2016
  • Country: France
International audience; In this work, we analyze all existing RSA-CRT countermeasures against the Bellcore attack that use binary self-secure exponentiation algorithms. We test their security against a powerful adversary by simulating fault injections in a fault model that includes random, zeroing, and skipping faults at all possible fault locations. We find that most of the countermeasures are vulnerable and do not provide sufficient security against all attacks in this fault model. After investigating how additional measures can be included to counter all possible fault injections, we present three countermeasures which prevent both power analysis and many kin...
ACM Computing Classification System: Hardware_PERFORMANCEANDRELIABILITY
free text keywords: Bellcore attack, RSA-CRT, modular exponentiation, power analysis, [INFO]Computer Science [cs], Countermeasure, Fault model, Adversary, Power analysis, Modular exponentiation, Engineering, business.industry, business, Binary number, Embedded system, Exponentiation
Funded by
PRACTICE: Privacy-Preserving Computation in the Cloud
  • Funder: European Commission (EC)
  • Project Code: 609611
  • Funding stream: FP7 | SP1 | ICT
Download fromView all 6 versions
Part of book or chapter of book . 2016
Provider: ZENODO
Part of book or chapter of book . 2016
Provider: HAL-Inserm
Hyper Article en Ligne
Part of book or chapter of book . 2016
Part of book or chapter of book
Provider: UnpayWall
28 references, page 1 of 2

1. Aumuller, C., Bier, P., Fischer, W., Hofreiter, P., Seifert, J.: Fault attacks on RSA with CRT: concrete results and practical countermeasures. In: Cryptographic Hardware and Embedded Systems, (CHES '02). pp. 260{275. Springer (2003)

2. Baek, Y.: Regular 2w -ary right-to-left exponentiation algorithm with very e cient DPA and FA countermeasures. Int. J. Inf. Sec. 9(5), 363{370 (2010)

3. Blomer, J., Gomes Da Silva, R., Gunther, P., Kramer, J., Seifert, J.P.: A practical second-order fault attack against a real-world pairing implementation. In: Fault Diagnosis and Tolerance in Cryptography (FDTC '14). pp. 123{136. IEEE (2014)

4. Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Advances in Cryptology { EUROCRYPT 1997. pp. 37{51. Springer (1997) [OpenAIRE]

5. Boscher, A., Handschuh, H., Trichina, E.: Blinded fault resistant exponentiation revisited. In: Fault Diagnosis and Tolerance in Cryptography (FDTC '09). pp. 3{9. IEEE (2009)

6. Boscher, A., Naciri, R., Prou , E.: CRT RSA algorithm protected against fault attacks. In: Information Security Theory and Practices. pp. 229{243. Springer (2007) [OpenAIRE]

7. Coron, J.: Resistance against di erential power analysis for elliptic curve cryptosystems. In: Cryptographic Hardware and Embedded Systems (CHES '99). pp. 292{302. Springer (1999) [OpenAIRE]

8. Fumaroli, G., Vigilant, D.: Blinded fault resistant exponentiation. In: Fault Diagnosis and Tolerance in Cryptography (FDTC '06). pp. 62{70. Springer (2006) [OpenAIRE]

9. Giraud, C.: An RSA implementation resistant to fault attacks and to simple power analysis. IEEE Trans. Computers 55(9), 1116{1120 (2006)

10. Joye, M., Karroumi, M.: Memory-e cient fault countermeasures. In: Smart Card Research and Advanced Applications. pp. 84{101. Springer (2011) [OpenAIRE]

11. Joye, M., Lenstra, A.K., Quisquater, J.: Chinese remaindering based cryptosystems in the presence of faults. J. Cryptology 12(4), 241{245 (1999)

12. Joye, M., Paillier, P., Yen, S.M.: Secure evaluation of modular functions (2001)

13. Joye, M., Yen, S.: The Montgomery powering ladder. In: Cryptographic Hardware and Embedded Systems, CHES 2002. pp. 291{302. Springer (2003)

14. Kim, C.H., Quisquater, J.: How can we overcome both side channel analysis and fault attacks on RSA-CRT? In: Fault Diagnosis and Tolerance in Cryptography (FDTC '07). pp. 21{29. IEEE (2007)

15. Kiss, A., Kramer, J., Rauzy, P., Seifert, J.P.: Algorithmic countermeasures against fault attacks and power analysis for RSA-CRT. Cryptology ePrint Archive, Report 2016/238 (2016),

28 references, page 1 of 2
Powered by OpenAIRE Research Graph
Any information missing or wrong?Report an Issue