首页> 外文期刊>Information Forensics and Security, IEEE Transactions on >Double Counting in $2^{t}$ -ary RSA Precomputation Reveals the Secret Exponent
【24h】

Double Counting in $2^{t}$ -ary RSA Precomputation Reveals the Secret Exponent

机译: $ 2 ^ {t} $ -ary RSA Precomputation中的重复计数揭示了秘密指数

获取原文
获取原文并翻译 | 示例

摘要

A new fault attack, double counting attack (DCA), on the precomputation of -ary modular exponentiation for a classical RSA digital signature (i.e., RSA without the Chinese remainder theorem) is proposed. The -ary method is the most popular and widely used algorithm to speed up the RSA signature process. Developers can realize the fastest signature process by choosing optimum . For example, is optimum for a 1536-bit classical RSA implementation. The -ary method requires precomputation to generate small exponentials of message. Conventional fault attack research has paid little attention to precomputation, even though precomputation could be a target of a fault attack. The proposed DCA induces faults in precomputation using instruction skip technique, which is equivalent to replacing an instruction with a no operation in assembly language. This paper also presents a useful position checker tool to determine the position of the -ary coefficients of the secret exponent from signatures based on faulted precomputations. The DCA is demonstrated to be an effective attack method for some widely used parameters. DCA can reconstruct an entire secret exponent using the position checker with faulted signatures in a short time for a 1536-bit RSA implementation using the -ary method. The DCA process can be accelerated for a small public exponent (e.- ., 65537). To the best of our knowledge, the proposed DCA is the first fault attack against classical RSA precomputation.
机译:提出了一种针对经典RSA数字签名(即不带中文余数定理的RSA)的-ary模幂的预计算的新的故障攻击,重复计数攻击(DCA)。 -ary方法是用于加速RSA签名过程的最流行和广泛使用的算法。通过选择最优值,开发人员可以实现最快的签名过程。例如,对于1536位经典RSA实现来说是最优的。 -ary方法要求进行预计算以生成较小的消息指数。尽管预计算可能是故障攻击的目标,但传统的故障攻击研究很少关注预计算。提出的DCA使用指令跳过技术在预计算中引起错误,这等效于用汇编语言中的no操作替换指令。本文还提出了一种有用的位置检查器工具,用于基于错误的预计算从签名中确定秘密指数的-ary系数的位置。对于某些广泛使用的参数,DCA被证明是一种有效的攻击方法。对于使用-ary方法的1536位RSA实现,DCA可以在短时间内使用带有错误签名的位置检查器来重建整个秘密指数。对于较小的公共指数(例如-65537),可以加快DCA流程。据我们所知,提出的DCA是针对传统RSA预计算的第一个故障攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号