首页> 外文会议>PKC 2013 >Combined Attack on CRT-RSA Why Public Verification Must Not Be Public?
【24h】

Combined Attack on CRT-RSA Why Public Verification Must Not Be Public?

机译:组合攻击CRT-RSA为何公开验证不得公开?

获取原文

摘要

This article introduces a new Combined Attack on a CRTRSA implementation resistant against Side-Channel Analysis and Fault Injection attacks. Such implementations prevent the attacker from obtaining the signature when a fault has been induced during the computation. Indeed, such a value would allow the attacker to recover the RSA private key by computing the gcd of the public modulus and the faulty signature. The principle of our attack is to inject a fault during the signature computation and to perform a Side-Channel Analysis targeting a sensitive value processed during the Fault Injection countermeasure execution. The resulting information is then used to factorize the public modulus, leading to the disclosure of the whole RSA private key. After presenting a detailed account of our attack, we explain how its complexity can be significantly reduced by using lattice reduction techniques. We also provide simulations that confirm the efficiency of our attack as well as two different countermeasures having a very small impact on the performance of the algorithm. As it performs a Side-Channel Analysis during a Fault Injection countermeasure to retrieve the secret value, this article recalls the need for Fault Injection and Side-Channel Analysis countermeasures as monolithic implementations.
机译:本文介绍了对CRTRSA实现对侧通道分析和故障注入攻击的新组合攻击。当在计算期间引起故障时,这种实现阻止攻击者获得签名。实际上,这样的值将允许攻击者通过计算公共模数的GCD和故障签名来恢复RSA私钥。我们的攻击原理是在签名计算期间注入故障,并执行针对在故障注射对策执行期间处理的敏感值的侧通道分析。然后使用所得到的信息来定向公共模量,导致整个RSA私钥的公开内容。在介绍我们攻击的详细说明后,我们解释了通过使用晶格减少技术可以显着降低其复杂性。我们还提供了确认我们攻击效率的模拟,以及对算法性能影响非常小的不同对策。由于在故障注入对策期间执行侧通道分析以检索秘密值,因此本文召回了对单片实现的故障注入和侧通道分析对策的需求。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号