Recovering CRT-RSA Secret Keys from Message Reduced Values with Side-Channel Analysis

被引:4
|
作者
Feix, Benoit [1 ]
Thiebeauld, Hugues [1 ]
Tordella, Lucille [1 ]
机构
[1] UK Evaluat Lab, UL Transact Secur, Basingstoke, Hants, England
来源
关键词
Long integer arithmetic; Modular reduction; Exponentiation; Embedded devices; Side-Channel Analysis; POWER ANALYSIS; EXPONENTIATION; ALGORITHM;
D O I
10.1007/978-3-319-13039-2_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
a Long integer modular reduction is an operation executed when processing public-key cryptographic algorithms such as a CRT-RSA signature. This operation is sensitive as it manipulates a part of the secret key. When computing a CRT-RSA signature or a decryption the input message is first reduced modulo the two secret prime values p and q. These two reductions are executed preliminarily before the exponentiations with d(p) and d(q). Amongst the range of published side-channel attacks so far, few target these initial reductions whereas it represents a significant threat for the secret key confidentiality. One of them, the MRED attack from den Boer et al. makes use of chosen messages for attacking the reduced values. This attack is interesting as it does not require the knowledge of the algorithm used for the reduction. Besides it defeats the countermeasures aiming at randomizing the intermediate data during the reduction but not the final reduced value, as it is the case with the message additive blinding method. However this attack requires a large amount of traces to be successful. This paper introduces two efficient side-channel attacks considered more efficient than the MRED. Indeed it requires much less side-channel traces to expose the secret primes. The new techniques are exposed in this paper with practical results and discussion about their efficiency against the different existing countermeasures.
引用
收藏
页码:53 / 67
页数:15
相关论文
共 31 条