首页> 外文会议>International conference on information security and cryptology >Improved CRT-RSA Secret Key Recovery Method from Sliding Window Leakage
【24h】

Improved CRT-RSA Secret Key Recovery Method from Sliding Window Leakage

机译:改进的CRT-RSA秘密钥匙恢复方法滑动窗口泄漏

获取原文
获取外文期刊封面目录资料

摘要

In this paper, we discuss side-channel attacks on the CRT-RSA scheme (RSA scheme with Chinese Remainder Theorem) implemented by the left-to-right sliding window method. This method calculates exponentiations by repeating squaring and multiplication. In CHES 2017, Bernstein et al. proposed side-channel attacks on the CRT-RSA signature scheme implemented by the left-to-right sliding window method. We can obtain square-and-multiply sequences by their side-channel attacks, but cannot calculate CRT-RSA secret keys because there are multiple candidates of multiplications. Then, Bernstein et al. calculated CRT-RSA secret keys by using two methods. First, they recovered CRT-RSA secret keys partially and calculated all secret key bits by using the Heninger-Shacham method. Second, they applied the Heninger-Shacham method to square-and-multiply sequences directly. They showed that we can calculate CRT-RSA secret keys more efficiently when we use square-and-multiply sequences directly. They also showed that we can recover CRT-RSA secret keys in polynomial time when w < 4. Moreover, they experimentally showed that we can recover secret keys of 2048-bit CRT-RSA scheme when w = 5. However, their latter method is simple and has room for improvement. Here, we study bit recovery more profoundly to improve their method. First, we calculate the exact rate of all knowable bits. Next, we propose a new method for calculating the proportion of each bit 0 or 1 in each nonrecovery bit. Finally, we propose a new method for calculating CRT-RSA secret key using this bit information. In our proposed algorithm, we extend Bernstein et al.'s method in combination with Kunihiro et al.'s method. We calculate more secret keys when w = 5 by our proposed method compared to Bernstein et al.'s method.
机译:在本文中,我们讨论了由左右滑动窗口方法实现的CRT-RSA方案(RSA方案)的侧通道攻击。该方法通过重复平方和乘法来计算指数。在Ches 2017中,Bernstein等人。提出对由左右滑动窗口方法实现的CRT-RSA签名方案的侧通道攻击。我们可以通过它们的侧频攻击获得方形和常量序列,但不能计算CRT-RSA秘密密钥,因为有多个乘法候选候选。然后,伯恩斯坦等人。使用两种方法计算CRT-RSA秘密键。首先,它们通过使用HENPER-SHACHAM方法恢复了CRT-RSA秘密密钥并计算了所有秘密密钥位。其次,它们将HENEER-SHACHAM方法直接应用于方形和繁殖序列。他们认为,当我们直接使用Square-And-Multiply序列时,我们可以更有效地计算CRT-RSA秘密密钥。他们还表明,当W <4.此外,我们可以在多项式时间中恢复CRT-RSA秘密键。当W = 5时,我们可以恢复2048位CRT-RSA方案的秘密键。但是,后一种方法是简单,有改进的空间。在这里,我们更深刻地研究比特恢复以改善它们的方法。首先,我们计算所有知识位的确切速率。接下来,我们提出了一种用于计算每个非脱离位中每个位0或1的比例的新方法。最后,我们提出了一种使用该位信息计算CRT-RSA密钥的新方法。在我们提出的算法中,我们扩展了Bernstein等人。的方法与Kunihiro等人组合。的方法。当我们的提出方法与Bernstein等人相比,我们计算更多秘密密钥。的方法。的方法。的方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号