Protecting RSA Against Fault Attacks: The Embedding Method

被引:0
|
作者
Joye, Marc [1 ]
机构
[1] Thomson R&D, Secur Competence Ctr, Cesson Sevigne, France
关键词
RSA cryptosystem; fault attacks; countermeasures; DIGITAL-SIGNATURES; CRT; ALGORITHM; RESISTANT; MODULI;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Fault attacks constitute a major threat toward cryptographic products supporting RSA-based technologies. Most often, the public exponent is unknown, turning resistance to fault attacks into an intricate problem. Over the past few years, several techniques for secure implementations have been published, but none of them is fully satisfactory. We propose a completely different approach by embedding the public exponent into [the description of] the private key. As a result, we obtain a very efficient countermeasure with a 100% fault detection.
引用
收藏
页码:41 / 45
页数:5
相关论文
共 50 条
  • [41] Design of an RSA module against power analysis attacks
    Jiang, HP
    Mao, ZG
    2003 5TH INTERNATIONAL CONFERENCE ON ASIC, VOLS 1 AND 2, PROCEEDINGS, 2003, : 1308 - 1311
  • [42] Trade-offs in Protecting KECCAK Against Combined Side-Channel and Fault Attacks
    Purnal, Antoon
    Arribas, Victor
    De Meyer, Lauren
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2019), 2019, 11421 : 285 - 302
  • [43] Fault attacks for CRT based RSA: New attacks, new results, and new countermeasures
    Kim, Chong Hee
    Quisquater, Jean-Jacques
    INFORMATION SECURITY THEORY AND PRACTICES: SMART CARDS, MOBILE AND UBIQUITOUS COMPUTING SYSTEMS, PROCEEDINGS, 2007, 4462 : 215 - +
  • [44] Protecting JPEG Images Against Adversarial Attacks
    Prakash, Aaditya
    Moran, Nick
    Garber, Solomon
    DiLillo, Antonella
    Storer, James
    2018 DATA COMPRESSION CONFERENCE (DCC 2018), 2018, : 137 - 146
  • [45] Protecting Location Privacy against Inference Attacks
    Minami, Kazuhiro
    Borisov, Nikita
    PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 711 - 713
  • [46] Protecting buildings against vehicle bomb attacks
    Longinow, Anatol
    Mniszewski, Kim R.
    Practice Periodical on Structural Design and Construction, 1996, 1 (01) : 51 - 54
  • [47] Protecting against cyber attacks in biometric technologies
    IEC
    ChinaStandardization, 2023, (05) : 57 - 57
  • [48] SABRE: Protecting Bitcoin against Routing Attacks
    Apostolaki, Maria
    Marti, Gian
    Mueller, Jan
    Vanbever, Laurent
    26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019), 2019,
  • [49] Protecting users against phishing attacks with AntiPhish
    Kirda, E
    Kruegel, C
    Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005, : 517 - 524
  • [50] PROTECTING COMMUNICATIONS INFRASTRUCTURE AGAINST CYBER ATTACKS
    Gu Dawu
    Jiang Xuxian
    Xue Yibo
    Zou Wei
    Guo Li
    CHINA COMMUNICATIONS, 2014, 11 (08) : I - II