首页> 外文会议>International Conference on Security and Cryptology >RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis
【24h】

RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis

机译:RSA加速与残留号码系统免受硬件故障密码分析

获取原文

摘要

This article considers the problem of how to prevent the fast RSA signature and decryption computation with residue number system (or called the CRT-based approach) speedup from a hardware fault cryptanalysis in a highly reliable and efficient approach. The CRT-based speedup for RSA signature has been widely adopted as an implementation standard ranging from large servers to very tiny smart IC cards. However, given a single erroneous computation result, a hardware fault cryptanalysis can totally break the RSA system by factoring the public modulus. Some countermeasures by using a simple verification function (e.g., raising a signature to the power of public key) or fault detection (e.g., an expanded modulus approach) have been reported in the literature, however it will be pointed out in this paper that very few of these existing solutions are both sound and efficient. Unreasonably, in these methods, they assume that a comparison instruction will always be fault free when developing countermeasures against hardware fault cryptanalysis. Researches show that the expanded modulus approach proposed by Shamir is superior to the approach of using a simple verification function when other physical cryptanalysis (e.g., timing cryptanalysis) is considered. So, we intend to improve Shamir's method. In this paper, the new concept of fault infective CRT computation and fault infective CRT recombination are proposed. Based on the new concept, two novel protocols are developed with rigorous proof of security. Two possible parameter settings are provided for the protocols. One setting is to select a small public key e and the proposed protocols can have comparable performance to Shamir's scheme. The other setting is to have better performance than Shamir's scheme (i.e., having comparable performance to conventional CRT speedup) but with a large public key. Most importantly, we wish to emphasize the importance of developing and proving the security of physically secure protocols without relying on unreliable or unreasonable assumptions, e.g., always fault free instructions.
机译:本文考虑如何防止使用残留号系统(或基于CRT的方法)快速RSA签名和解密计算以高度可靠和高效的方法从硬件故障密码分析加速。 RSA签名的基于CRT的加速已被广泛采用,作为从大型服务器到非常微小的智能IC卡的实现标准。但是,鉴于单个错误的计算结果,硬件故障密码分析可以通过编写公共模量来完全打破RSA系统。通过使用简单验证功能(例如,向公钥的力量提高签名)或故障检测(例如,扩展模数方法)的一些对策已经在文献中报告,但是本文将指出,非常这些现有解决方案中的很少都很高兴。在这些方法中,他们假设在对硬件故障密码分析的对策时,比较指令始终是无故障的。研究表明,Shamir提出的扩展模数方法优于使用在考虑其他物理密码分析(例如,定时密码分析)时使用简单验证功能的方法。因此,我们打算改善Shamir的方法。在本文中,提出了出现故障感染CRT计算和故障感染CRT重组的新概念。基于新概念,三种新颖的协议是以严谨的安全证据制定的。为协议提供了两种可能的参数设置。一个设置是选择一个小公钥E,所提出的协议可以对Shamir的计划具有可比性。另一个设置是具有比Shamir的方案更好的性能(即,对传统CRT加速具有可比性的性能),但具有大公钥。最重要的是,我们希望强调在不依赖于不可靠或不合理的假设的情况下强调发展和证明身体安全议定书的安全性,例如,始终有故障说明。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号