CRT RSA algorithm protected against fault attacks

Embedded devices performing RSA signatures are subject to Fault Attacks, particularly when the Chinese Remainder Theorem is used. In most cases, the modular exponentiation and the Garner recombination algorithms are targeted. To thwart Fault Attacks, we propose a new generic method of computing modu...

Full description

Saved in:
Bibliographic Details
Published inProceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems pp. 229 - 243
Main Authors Boscher, Arnaud, Naciri, Robert, Prouff, Emmanuel
Format Conference Proceeding
LanguageEnglish
Published Berlin, Heidelberg Springer-Verlag 09.05.2007
SeriesACM Conferences
Subjects
Online AccessGet full text
ISBN3540723536
9783540723530
DOI10.5555/1763190.1763216

Cover

Abstract Embedded devices performing RSA signatures are subject to Fault Attacks, particularly when the Chinese Remainder Theorem is used. In most cases, the modular exponentiation and the Garner recombination algorithms are targeted. To thwart Fault Attacks, we propose a new generic method of computing modular exponentiation and we prove its security in a realistic fault model. By construction, our proposal is also protected against Simple Power Analysis. Based on our new resistant exponentiation algorithm, we present two different ways of computing CRT RSA signatures in a secure way. We show that those methods do not increase execution time and can be easily implemented on low-resource devices.
AbstractList Embedded devices performing RSA signatures are subject to Fault Attacks, particularly when the Chinese Remainder Theorem is used. In most cases, the modular exponentiation and the Garner recombination algorithms are targeted. To thwart Fault Attacks, we propose a new generic method of computing modular exponentiation and we prove its security in a realistic fault model. By construction, our proposal is also protected against Simple Power Analysis. Based on our new resistant exponentiation algorithm, we present two different ways of computing CRT RSA signatures in a secure way. We show that those methods do not increase execution time and can be easily implemented on low-resource devices.
Author Prouff, Emmanuel
Boscher, Arnaud
Naciri, Robert
Author_xml – sequence: 1
  givenname: Arnaud
  surname: Boscher
  fullname: Boscher, Arnaud
  organization: Spansion, Levallois-Perret Cedex, France
– sequence: 2
  givenname: Robert
  surname: Naciri
  fullname: Naciri, Robert
  organization: Oberthur Card Systems, Nanterre Cedex, France
– sequence: 3
  givenname: Emmanuel
  surname: Prouff
  fullname: Prouff, Emmanuel
  organization: Oberthur Card Systems, Nanterre Cedex, France
BookMark eNqNj71OwzAURi0BErR0ZvXIkuDrG8fJWEX8SZWQSpmta8cupWmCYvP-pCIPwFnO9H3SWbDLfug9Y3cgcjXxALpEqEV-toTygi1QFUJLVFhes1WMX2ICoZI13DBotju-fV9z6vbDeEifJ_49Dsm75FtOezr0MfFAP13ilBK5Y7xlV4G66Fezl-zj6XHXvGSbt-fXZr3JCJROmS0qsAjBIVqrhAhehlYUrfOtKjS0yoKFoEpXo6ZQWaeV9agICpJeyBKXLP_7JXcydhiO0YAw50QzJ5o50djx4MM0uP_nAH8BGEZTQA
ContentType Conference Proceeding
DOI 10.5555/1763190.1763216
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
Editor Bilas, Angelos
Sauveron, Damien
Markantonakis, Konstantinos
Quisquater, Jean-Jacques
Editor_xml – sequence: 1
  givenname: Damien
  surname: Sauveron
  fullname: Sauveron, Damien
  organization: XLIM, UMR Université de Limoges, CNRS, Limoges, France
– sequence: 2
  givenname: Konstantinos
  surname: Markantonakis
  fullname: Markantonakis, Konstantinos
  organization: Royal Holloway, University of London, Information Security Group, Smart Card Centre, Egham, Surrey, UK
– sequence: 3
  givenname: Angelos
  surname: Bilas
  fullname: Bilas, Angelos
  organization: FORTH, ICS, Heraklion, Greece
– sequence: 4
  givenname: Jean-Jacques
  surname: Quisquater
  fullname: Quisquater, Jean-Jacques
  organization: UCL Crypto Group, Louvain-la-Neuve, Belgium
EndPage 243
GroupedDBID -7M
-7P
-BG
089
0D6
0DA
0E8
2HV
38.
A4I
A4J
AABBV
AABFA
AAHDE
AAUKK
ABBVZ
ABMNI
ACFGI
ACM
ADQVG
AEDXK
AEKFX
AETDV
AEZAY
AGNDD
ALMA_UNASSIGNED_HOLDINGS
AZZ
BBABE
CZZ
IEZ
IV0
JJU
LDH
LZA
MA.
MW~
NUC
NUP
SAO
SBO
TPJZQ
TSXQS
Z7R
Z7S
Z7U
Z7V
Z7W
Z7X
Z7Y
Z7Z
Z81
Z83
Z84
Z87
Z88
Z8R
Z8W
Z92
ID FETCH-LOGICAL-a157t-b481b31fc33bb500fe2fd04dced5471d5b1b1f56c937af8bc75be35a14a2e0263
ISBN 3540723536
9783540723530
IngestDate Wed Jan 31 06:45:20 EST 2024
Wed Jan 31 06:46:16 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords RSA
fault attacks
smart card
chinese remainder theorem
modular exponentiation
simple power analysis
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-a157t-b481b31fc33bb500fe2fd04dced5471d5b1b1f56c937af8bc75be35a14a2e0263
PageCount 15
ParticipantIDs acm_books_10_5555_1763190_1763216_brief
acm_books_10_5555_1763190_1763216
PublicationCentury 2000
PublicationDate 20070509
PublicationDateYYYYMMDD 2007-05-09
PublicationDate_xml – month: 05
  year: 2007
  text: 20070509
  day: 09
PublicationDecade 2000
PublicationPlace Berlin, Heidelberg
PublicationPlace_xml – name: Berlin, Heidelberg
PublicationSeriesTitle ACM Conferences
PublicationTitle Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
PublicationYear 2007
Publisher Springer-Verlag
Publisher_xml – name: Springer-Verlag
SSID ssj0000318291
Score 1.7983549
Snippet Embedded devices performing RSA signatures are subject to Fault Attacks, particularly when the Chinese Remainder Theorem is used. In most cases, the modular...
SourceID acm
SourceType Publisher
StartPage 229
SubjectTerms Information systems
Information systems -- Data management systems
Information systems -- Data management systems -- Data structures
Information systems -- Data management systems -- Data structures -- Data layout
Information systems -- Data management systems -- Data structures -- Data layout -- Data encryption
Security and privacy
Security and privacy -- Cryptography
Social and professional topics
Social and professional topics -- Computing -- technology policy
Social and professional topics -- Computing -- technology policy -- Computer crime
Theory of computation
Theory of computation -- Computational complexity and cryptography
Title CRT RSA algorithm protected against fault attacks
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Li9swEBbZlEJPfW3p9oULhR6MU9uybOUYQtLdpS3LNtvuLUiytQ2sY7q2Du0_6r_s6BE5GwJ95ODYwshI33g0M55vhNAb0HhUck6jnKbjSO9xFfFckoiB9cGKKsYFN9kWn_Lji-z0klwOBr-2spZUx0fi515eyf-gCm2Aq2bJ_gOyvlNogHPAF46AMBx3jN-968yZb2w3n_qTtgtP5idn4WKaA6rzr-_piNqTBPxUUx2iDwAKT_fT3wwcM8kIROu2tbNExx-unIAlVJkkurYGmdN1rUsjCHXDQb2Y2xRffVegJ1Rr8tWVyatutwqjOwGdni_C88-TkF1fNfCob3XoakaACcyu2Ars1lAyda35lp2uBOAjB027kbQJjEWVPqDNxMoS522-uFf7N42yxSdndc3WyrEENERVC8L4cYv3eDsMUpikw17Z7guDGi9Zx7WKFBN8S027KItd8VNbKGp3MSHw03EN0MBgNY30f5rkB-igoPEQ3ZnMTj988eE8rRvTceLYQ_aBd31gzVzHtrKU7vbdTqfaNBL1lmGzeIAO-6EHvTw9RINq_Qjd3-z5Ebgl4DFKALYAYAs8bIGHLXCwBQa2wMF2iC7ms8X0OHLbbsALSoou4hm4MjiRAmPOSRzLKpVlnJWiKgmYMiXhCU8kyQVYtkxSLgrCK0xYkrG0ApceP0HDdbOunqKgzDG29S8lyUqc0TgXhWCcZXRMBOVH6DWMe6lfqXYJ7qiem6Wbm6WbmyP09o_3LDkIjHz2F709R_d66XmBht2Nql6CWdnxVw7S3zo5cdY
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Proceedings+of+the+1st+IFIP+TC6+%2FWG8.8+%2FWG11.2+international+conference+on+Information+security+theory+and+practices%3A+smart+cards%2C+mobile+and+ubiquitous+computing+systems&rft.atitle=CRT+RSA+algorithm+protected+against+fault+attacks&rft.au=Boscher%2C+Arnaud&rft.au=Naciri%2C+Robert&rft.au=Prouff%2C+Emmanuel&rft.series=ACM+Conferences&rft.date=2007-05-09&rft.pub=Springer-Verlag&rft.isbn=3540723536&rft.spage=229&rft.epage=243&rft_id=info:doi/10.5555%2F1763190.1763216
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9783540723530/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9783540723530/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9783540723530/sc.gif&client=summon&freeimage=true