【24h】

Hardware Fault Attackon RSA with CRT Revisited

机译:硬件故障攻击局RSA与CRT重新讨论

获取原文

摘要

In this paper, some powerful fault attacks will be pointed out which can be used to factorize the RSA modulus if CRT is employed to speedup the RSA computation. These attacks are generic and can be applicable to Shamir's countermeasure and also applicable to a recently published enhanced countermeasure (trying to improve Shamir's method) for RSA with CRT. These two countermeasures share some similar structure in their designs and both suffer from some of the proposed attacks. The first kind of attack proposed in this paper is to induce a fault (which can be either a computational fault or any fault when data being accessed) into an important modulo reduction operation of the above two countermeasures. Note that this hardware fault attack can neither be detected by Shamir's countermeasure nor by the recently announced enhancement. The second kind of attack proposed in this paper considers permanent fault on some stored parameters in the above two countermeasures. The result shows that some permanent faults cannot be detected. Hence, the CRT-based factorization attack still works. The proposed CRT-based fault attacks once again reveals the importance of developing a sound countermeasure against RSA with CRT.
机译:在本文中,将指出一些强大的故障攻击,如果使用CRT以加速RSA计算,则可以用于将RSA模量进行分解。这些攻击是通用的,可以适用于Shamir的对策,也适用于最近公布的增强的对策(试图改善Shamir的方法)与CRT的RSA。这两种对策在其设计中分享了一些类似的结构,两者都遭受了一些拟议的攻击。本文提出的第一种攻击是诱导故障(当数据被访问时,可以是计算故障或任何故障)进入上述两个对策的重要模型减少操作。请注意,Shamir的对策也无法通过最近宣布的增强来检测该硬件故障攻击。本文提出的第二种攻击在上述两项对策中考虑了一些存储参数的永久性。结果表明,无法检测到一些永久性故障。因此,基于CRT的分子化攻击仍然有效。拟议的基于CRT的故障攻击再次揭示了利用CRT开发对RSA的声音对策的重要性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号