Photonic Side Channel Attacks Against RSA

被引:0
|
作者
Carmon, Elad [1 ]
Seifert, Jean-Pierre [2 ,3 ]
Wool, Avishai [1 ]
机构
[1] Tel Aviv Univ, IL-69978 Tel Aviv, Israel
[2] Tech Univ Berlin, Secur Telecommun, Darmstadt, Germany
[3] FhG SIT, Darmstadt, Germany
关键词
EMISSION; SILICON; AES;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper describes the first attack utilizing the photonic side channel against a public-key crypto-system. We evaluated three common implementations of RSA modular exponentiation, all using the Karatsuba multiplication method. We discovered that the key length had marginal impact on resilience to the attack: attacking a 2048-bit key required only 9% more decryption attempts than a 1024-bit key. We found that the most dominant parameter impacting the attacker's effort is the minimal block size at which the Karatsuba method reverts to naive multiplication: even for parameter values as low as 32 or 64 bits our attacks achieve 100% success rate with under 10,000 decryption operations. Somewhat surprisingly, we discovered that Montgomery's Ladder-commonly perceived as the most resilient of the three implementations to side-channel attacks-was actually the most susceptible: for 2048-bit keys, our attack reveals 100% of the secret key bits with as few as 4000 decryptions.
引用
收藏
页码:74 / 78
页数:5
相关论文
共 50 条
  • [31] An Efficient Method against Side-Channel Attacks on ECC
    LIU Shuanggen~ 1
    2. College of Computer Information Engineering
    Wuhan University Journal of Natural Sciences, 2006, (06) : 1573 - 1576
  • [32] Thwarting side-channel analysis against RSA cryptosystems with additive blinding
    Kim, HeeSeok
    INFORMATION SCIENCES, 2017, 412 : 36 - 49
  • [33] An Improved Square-always Exponentiation Resistant to Side-channel Attacks on RSA Implementation
    Choi, Yongje
    Choi, Dooho
    Lee, Hoonjae
    Ha, Jaecheol
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2016, 22 (03): : 353 - 363
  • [34] Winter is here! A decade of cache-based side-channel attacks, detection & mitigation for RSA
    Mushtaq, Maria
    Mukhtar, Muhammad Asim
    Lapotre, Vianney
    Bhatti, Muhammad Khurram
    Gogniat, Guy
    INFORMATION SYSTEMS, 2020, 92
  • [35] How can we overcome both side channel analysis and fault attacks on RSA-CRT?
    Kim, Chona Hee
    Quisquater, Jean-Jacques
    WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY, PROCEEDINGS, 2007, : 21 - +
  • [36] TreasureCache: Hiding Cache Evictions Against Side-Channel Attacks
    Li, Mengming
    Bu, Kai
    Miao, Chenlu
    Ren, Kui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (05) : 4574 - 4588
  • [37] Practical Side-Channel Attacks against WPA-TKIP
    Schepers, Domien
    Ranganathan, Aanjhan
    Vanhoef, Mathy
    PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19), 2019, : 415 - 426
  • [38] Efficient Solution to Secure ECC Against Side-channel Attacks
    Wu Keke
    Li Huiyun
    Zhu Dingju
    Yu Fengqi
    CHINESE JOURNAL OF ELECTRONICS, 2011, 20 (03): : 471 - 475
  • [39] A Lightweight Implementation of Saber Resistant Against Side-Channel Attacks
    Abdulgadir, Abubakr
    Mohajerani, Kamyar
    Dang, Viet Ba
    Kaps, Jens-Peter
    Gaj, Kris
    PROGRESS IN CRYPTOLOGY, INDOCRYPT 2021, 2021, 13143 : 224 - 245
  • [40] On security of XTR public key cryptosystems against side channel attacks
    Han, DG
    Lim, J
    Sakurai, K
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2004, 3108 : 454 - 465