首页> 外文会议>Fault Diagnosis and Tolerance in Cryptography; Lecture Notes in Computer Science; 4236 >Attacking Right-to-Left Modular Exponentiation with Timely Random Faults
【24h】

Attacking Right-to-Left Modular Exponentiation with Timely Random Faults

机译:随时间随机故障攻击从右到左的模幂

获取原文
获取原文并翻译 | 示例

摘要

We show that timely induction of random failures can potentially be used to mount very cost effective attacks against smartcards deploying cryptographic schemes based on (right-to-left) modular exponentiation. We introduce a model where an external perturbation, or glitch, may cause a single modular multiplication to produce a truly random result. Based on this assumption, we present a probabilistic attack against the implemented cryptosystem. Under reasonable assumptions, we prove that using a single faulty signature the attack recovers a target bit of the secret exponent with an error probability bounded by 3/7. We show the attack is effective even in the presence of message blinding.
机译:我们表明,及时诱发随机故障可以潜在地用于针对部署基于(从右到左)模块化指数的加密方案的智能卡发起非常经济有效的攻击。我们介绍了一个模型,其中外部扰动或毛刺可能会导致单个模乘法产生真正的随机结果。基于此假设,我们提出了对已实施密码系统的概率攻击。在合理的假设下,我们证明使用单个错误签名,攻击会以3/7的错误概率来恢复秘密指数的目标位。我们证明,即使在出现消息盲目的情况下,攻击也有效。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号