Side-Channel Attack against RSA Key Generation Algorithms

被引:0
|
作者
Bauer, Aurelie [1 ]
Jaulmes, Eliane [1 ]
Lomne, Victor [1 ]
Prouff, Emmanuel [1 ]
Roche, Thomas [1 ]
机构
[1] ANSSI, F-75700 Paris 07, SP, France
关键词
IMPLEMENTATION; CRT;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Many applications of embedded devices require the generation of cryptographic secret parameters during the life cycle of the product. In such an unsafe context, several papers have shown that key generation algorithms are vulnerable to side-channel attacks. This is in particular the case of the generation of the secret prime factors in RSA. Until now, the threat has been demonstrated against naive implementations whose operations' flow depends on secret data, and a simple countermeasure is to avoid such kind of dependency. In this paper, we propose a new attack that renders this defence strategy ineffective. It is in particular able to break secure implementations recommended by the ANSI X9.31 and FIPS 186-4 standards. We analyse its efficiency for various realistic attack contexts and we demonstrate its practicality through experiments against a smart-card implementation. Possible countermeasures are eventually proposed, drawing the following main conclusion: prime generation algorithms should avoid the use of a prime sieve combined with a deterministic process to generate the prime candidates from a random seed.
引用
收藏
页码:223 / 241
页数:19
相关论文
共 50 条
  • [21] Side-channel attack on substitution blocks
    Novak, R
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2003, 2846 : 307 - 318
  • [22] SIDE-CHANNEL ATTACK ON THE HUMANAUTH CAPTCHA
    Javier Hernandez-Castro, Carlos
    Ribagorda, Arturo
    Saez, Yago
    SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2010, : 59 - 65
  • [23] USB side-channel attack on Tor
    Yang, Qing
    Gasti, Paolo
    Balagani, Kiran
    Li, Yantao
    Zhou, Gang
    COMPUTER NETWORKS, 2018, 141 : 57 - 66
  • [24] Cache Side-channel Attack to Recover Plaintext against Datagram TLS
    Tang, Ye
    Li, Huiyun
    Xu, Guoqing
    2015 5TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2015,
  • [25] Power Profile Equalizer: a Lightweight Countermeasure against Side-channel Attack
    Wang, Chenguang
    Yan, Ming
    Cai, Yici
    Zhou, Qiang
    Yang, Jianlei
    2017 IEEE 35TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2017, : 305 - 312
  • [26] Electromagnetic Equalizer: An Active Countermeasure Against EM Side-channel Attack
    Wang, Chenguang
    Cai, Yici
    Wang, Haoyi
    Zhou, Qiang
    2018 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD) DIGEST OF TECHNICAL PAPERS, 2018,
  • [27] Deep learning side-channel attack against hardware implementations of AES
    Kubota, Takaya
    Yoshida, Kota
    Shiozaki, Mitsuru
    Fujino, Takeshi
    MICROPROCESSORS AND MICROSYSTEMS, 2021, 87
  • [28] Hardware/Software Obfuscation against Timing Side-channel Attack on a GPU
    Karimi, Elmira
    Fei, Yunsi
    Kaeli, David
    PROCEEDINGS OF THE 2020 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2020, : 122 - 131
  • [29] Randomly Encrypted Key Generation Algorithm Against Side Channel Attack in Cloud Computing
    Rashid, Md. Bajlur
    Islam, Nazrul
    Sabuj, Abdullah Al Mahedi
    Waheed, Sajjad
    Miah, Mohammad Badrul Alam
    2ND INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATION COMMUNICATION TECHNOLOGY (ICEEICT 2015), 2015,
  • [30] Deep Learning Side-Channel Attack against Hardware Implementations of AES
    Kubota, Takaya
    Yoshida, Kota
    Shiozaki, Mitsuru
    Fujino, Takeshi
    2019 22ND EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2019, : 261 - 268