期刊文献+

Cryptanalysis of a Type of CRT-Based RSA Algorithms 被引量:1

Cryptanalysis of a Type of CRT-Based RSA Algorithms
原文传递
导出
摘要 It is well known that the Chinese Remainder Theorem (CRT) can greatly improve the performances of RSA cryptosystem in both running times and memory requirements. However, if the implementation of CRT-based RSA is careless, an attacker can reveal some secret information by exploiting hardware fault cryptanalysis. In this paper, we present some fault attacks on a type of CRT-RSA algorithms namely BOS type schemes including the original BOS scheme proposed by Blomer, Otto, and Seifert at CCS 2003 and its modified scheme proposed by Liu et al. at DASC 2006. We first demonstrate that if some special signed messages such as m = 0, ±1 are dealt carelessly, they can be exploited by an adversary to completely break the security of both the BOS scheme and Liu et al.'s scheme. Then we present a new permanent fault attack on the BOS scheme with a success probability about 25%. Lastly, we propose a polynomial time attack on Liu et al.'s CRT-RSA algorithm, which combines physical fault injection and lattice reduction techniques when the public exponent is short. It is well known that the Chinese Remainder Theorem (CRT) can greatly improve the performances of RSA cryptosystem in both running times and memory requirements. However, if the implementation of CRT-based RSA is careless, an attacker can reveal some secret information by exploiting hardware fault cryptanalysis. In this paper, we present some fault attacks on a type of CRT-RSA algorithms namely BOS type schemes including the original BOS scheme proposed by Blomer, Otto, and Seifert at CCS 2003 and its modified scheme proposed by Liu et al. at DASC 2006. We first demonstrate that if some special signed messages such as m = 0, ±1 are dealt carelessly, they can be exploited by an adversary to completely break the security of both the BOS scheme and Liu et al.'s scheme. Then we present a new permanent fault attack on the BOS scheme with a success probability about 25%. Lastly, we propose a polynomial time attack on Liu et al.'s CRT-RSA algorithm, which combines physical fault injection and lattice reduction techniques when the public exponent is short.
出处 《Journal of Computer Science & Technology》 SCIE EI CSCD 2008年第2期214-221,共8页 计算机科学技术学报(英文版)
关键词 Chinese remainder theorem RSA BOS scheme CRYPTANALYSIS fault attack LLL Chinese remainder theorem, RSA, BOS scheme, cryptanalysis, fault attack, LLL
  • 相关文献

参考文献23

  • 1Boneh D, DeMillo R A, Lipton R J. On the importance of checking cryptographic protocols for fault. In Proc. EU- ROCRYPT'97, Konstanz, Germany, Springer-Verlag, 1997, pp.37-51.
  • 2Christian Aumuller, Peter Bier, Wieland Fischer, Peter Hofreiter, Jean-Pierre Seifert. Fault attacks on RSA with CRT: Concrete results and practical countermeasures. In Proc. CHES'02, Redwood Shores, USA, August 13-15, 2002, pp. 260-275.
  • 3Bar-El H, Choukri H, Naccache D, Tunstall M, Whelan C. The sorcerer's apprentice guide to fault attacks. In Proc. Workshop on Fault Detection and Tolerance in Cryptography, Florence, Italy, June 2004.
  • 4Couvreur C, Quisquater J. Fast decipherment algorithm for RSA public-key cryptosystem. Electronic Letters, 1982, 18(21): 905-907.
  • 5Yen S', Kim S, Lim S, Moon S. RSA Speedup with Chinese remainder theorem immune against hardware fault Cryptanalysis. IEEE Transactions on Computers, April 2003, 52: 461- 472.
  • 6Ross J Anderson, Markus G Kuhn. Low cost attacks on tamper resistant devices. In Proc. 5th International Workshop on Security Protocols, Paris, France, April 07-09, 1997, pp.125- 136.
  • 7Skorobogatov S, Anderson R. Optical fault induction attacks. In Proc. Workshop on Cryptographic Hardware and Erabedded Systems, Hotel Sofitel, San Francisco Bay (Redwood City), USA, August 13-15, 2002.
  • 8Bellcore Press Release. New threat model breaks crypto codes. Sept. 1996, http://www.bellcore.com/PRESS/ADVSRY96/facts.html.
  • 9Ciet M, Joye M. Practical fault countermeasures for Chinese remaindering based RSA. In Proc. FDTC'05, Edinburgh, Scotland, September 2, 2005, pp.124-131.
  • 10Johannes Blomer, Martin Otto. Wagner's attack on a secure CRT-RSA algorithm reconsidered. In Proc. FDTC'06, Yokohama, Japan, Springer-Verlag, 2006, pp.13-23.

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部