Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT

Part of book or chapter of book English OPEN
Kiss , Ágnes; Krämer , Juliane; Rauzy , Pablo; Seifert , Jean-Pierre;
(2016)
  • Publisher: Springer Verlag (Germany)
  • Related identifiers: doi: 10.1007/978-3-319-43283-0_7
  • Subject: [ INFO ] Computer Science [cs] | Bellcore attack, RSA-CRT, modular exponentiation, power analysis
    acm: Hardware_PERFORMANCEANDRELIABILITY

International audience; In this work, we analyze all existing RSA-CRT countermeasures against the Bellcore attack that use binary self-secure exponentiation algorithms. We test their security against a powerful adversary by simulating fault injections in a fault model t... View more
  • References (28)
    28 references, page 1 of 3

    1. Aumuller, C., Bier, P., Fischer, W., Hofreiter, P., Seifert, J.: Fault attacks on RSA with CRT: concrete results and practical countermeasures. In: Cryptographic Hardware and Embedded Systems, (CHES '02). pp. 260{275. Springer (2003)

    2. Baek, Y.: Regular 2w -ary right-to-left exponentiation algorithm with very e cient DPA and FA countermeasures. Int. J. Inf. Sec. 9(5), 363{370 (2010)

    3. Blomer, J., Gomes Da Silva, R., Gunther, P., Kramer, J., Seifert, J.P.: A practical second-order fault attack against a real-world pairing implementation. In: Fault Diagnosis and Tolerance in Cryptography (FDTC '14). pp. 123{136. IEEE (2014)

    4. Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Advances in Cryptology { EUROCRYPT 1997. pp. 37{51. Springer (1997)

    5. Boscher, A., Handschuh, H., Trichina, E.: Blinded fault resistant exponentiation revisited. In: Fault Diagnosis and Tolerance in Cryptography (FDTC '09). pp. 3{9. IEEE (2009)

    6. Boscher, A., Naciri, R., Prou , E.: CRT RSA algorithm protected against fault attacks. In: Information Security Theory and Practices. pp. 229{243. Springer (2007)

    7. Coron, J.: Resistance against di erential power analysis for elliptic curve cryptosystems. In: Cryptographic Hardware and Embedded Systems (CHES '99). pp. 292{302. Springer (1999)

    8. Fumaroli, G., Vigilant, D.: Blinded fault resistant exponentiation. In: Fault Diagnosis and Tolerance in Cryptography (FDTC '06). pp. 62{70. Springer (2006)

    9. Giraud, C.: An RSA implementation resistant to fault attacks and to simple power analysis. IEEE Trans. Computers 55(9), 1116{1120 (2006)

    10. Joye, M., Karroumi, M.: Memory-e cient fault countermeasures. In: Smart Card Research and Advanced Applications. pp. 84{101. Springer (2011)

  • Similar Research Results (3)
  • Metrics
Share - Bookmark