Recovering CRT-RSA Secret Keys from Message Reduced Values with Side-Channel Analysis
被引:4
|
作者:
Feix, Benoit
论文数: 0引用数: 0
h-index: 0
机构:
UK Evaluat Lab, UL Transact Secur, Basingstoke, Hants, EnglandUK Evaluat Lab, UL Transact Secur, Basingstoke, Hants, England
Feix, Benoit
[1
]
Thiebeauld, Hugues
论文数: 0引用数: 0
h-index: 0
机构:
UK Evaluat Lab, UL Transact Secur, Basingstoke, Hants, EnglandUK Evaluat Lab, UL Transact Secur, Basingstoke, Hants, England
Thiebeauld, Hugues
[1
]
Tordella, Lucille
论文数: 0引用数: 0
h-index: 0
机构:
UK Evaluat Lab, UL Transact Secur, Basingstoke, Hants, EnglandUK Evaluat Lab, UL Transact Secur, Basingstoke, Hants, England
Tordella, Lucille
[1
]
机构:
[1] UK Evaluat Lab, UL Transact Secur, Basingstoke, Hants, England
来源:
PROGRESS IN CRYPTOLOGY - INDOCRYPT 2014
|
2014年
/
8885卷
关键词:
Long integer arithmetic;
Modular reduction;
Exponentiation;
Embedded devices;
Side-Channel Analysis;
POWER ANALYSIS;
EXPONENTIATION;
ALGORITHM;
D O I:
10.1007/978-3-319-13039-2_4
中图分类号:
TP [自动化技术、计算机技术];
学科分类号:
0812 ;
摘要:
a Long integer modular reduction is an operation executed when processing public-key cryptographic algorithms such as a CRT-RSA signature. This operation is sensitive as it manipulates a part of the secret key. When computing a CRT-RSA signature or a decryption the input message is first reduced modulo the two secret prime values p and q. These two reductions are executed preliminarily before the exponentiations with d(p) and d(q). Amongst the range of published side-channel attacks so far, few target these initial reductions whereas it represents a significant threat for the secret key confidentiality. One of them, the MRED attack from den Boer et al. makes use of chosen messages for attacking the reduced values. This attack is interesting as it does not require the knowledge of the algorithm used for the reduction. Besides it defeats the countermeasures aiming at randomizing the intermediate data during the reduction but not the final reduced value, as it is the case with the message additive blinding method. However this attack requires a large amount of traces to be successful. This paper introduces two efficient side-channel attacks considered more efficient than the MRED. Indeed it requires much less side-channel traces to expose the secret primes. The new techniques are exposed in this paper with practical results and discussion about their efficiency against the different existing countermeasures.
机构:
Hubei Key Laboratory of Intelligent Geo-Information Processing, School of Computer Science, China University of Geosciences, Wuhan, China
State Key Laboratory of Integrated Services Networks, Xidian University, Xian, ChinaHubei Key Laboratory of Intelligent Geo-Information Processing, School of Computer Science, China University of Geosciences, Wuhan, China
Yu, Tianrun
Cheng, Chi
论文数: 0引用数: 0
h-index: 0
机构:
Hubei Key Laboratory of Intelligent Geo-Information Processing, School of Computer Science, China University of Geosciences, Wuhan, China
State Key Laboratory of Integrated Services Networks, Xidian University, Xian, ChinaHubei Key Laboratory of Intelligent Geo-Information Processing, School of Computer Science, China University of Geosciences, Wuhan, China
Cheng, Chi
Yang, Zilong
论文数: 0引用数: 0
h-index: 0
机构:
Hubei Key Laboratory of Intelligent Geo-Information Processing, School of Computer Science, China University of Geosciences, Wuhan, China
State Key Laboratory of Integrated Services Networks, Xidian University, Xian, ChinaHubei Key Laboratory of Intelligent Geo-Information Processing, School of Computer Science, China University of Geosciences, Wuhan, China
Yang, Zilong
Wang, Yingchen
论文数: 0引用数: 0
h-index: 0
机构:
The University of Texas at Austin, Austin,TX, United StatesHubei Key Laboratory of Intelligent Geo-Information Processing, School of Computer Science, China University of Geosciences, Wuhan, China
Wang, Yingchen
Pan, Yanbin
论文数: 0引用数: 0
h-index: 0
机构:
Key Laboratory of Mathematics Mechanization, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing, ChinaHubei Key Laboratory of Intelligent Geo-Information Processing, School of Computer Science, China University of Geosciences, Wuhan, China
Pan, Yanbin
Weng, Jian
论文数: 0引用数: 0
h-index: 0
机构:
College of Information Science and Technology, Jinan University, Guangzhou, ChinaHubei Key Laboratory of Intelligent Geo-Information Processing, School of Computer Science, China University of Geosciences, Wuhan, China
Weng, Jian
IACR Transactions on Cryptographic Hardware and Embedded Systems,
2024,
2024
(03):
: 200
-
223