CRT RSA algorithm protected against fault attacks
Embedded devices performing RSA signatures are subject to Fault Attacks, particularly when the Chinese Remainder Theorem is used. In most cases, the modular exponentiation and the Garner recombination algorithms are targeted. To thwart Fault Attacks, we propose a new generic method of computing modu...
Saved in:
| Published in | Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems pp. 229 - 243 |
|---|---|
| Main Authors | , , |
| Format | Conference Proceeding |
| Language | English |
| Published |
Berlin, Heidelberg
Springer-Verlag
09.05.2007
|
| Series | ACM Conferences |
| Subjects | |
| Online Access | Get full text |
| ISBN | 3540723536 9783540723530 |
| DOI | 10.5555/1763190.1763216 |
Cover
| Abstract | Embedded devices performing RSA signatures are subject to Fault Attacks, particularly when the Chinese Remainder Theorem is used. In most cases, the modular exponentiation and the Garner recombination algorithms are targeted. To thwart Fault Attacks, we propose a new generic method of computing modular exponentiation and we prove its security in a realistic fault model. By construction, our proposal is also protected against Simple Power Analysis. Based on our new resistant exponentiation algorithm, we present two different ways of computing CRT RSA signatures in a secure way. We show that those methods do not increase execution time and can be easily implemented on low-resource devices. |
|---|---|
| AbstractList | Embedded devices performing RSA signatures are subject to Fault Attacks, particularly when the Chinese Remainder Theorem is used. In most cases, the modular exponentiation and the Garner recombination algorithms are targeted. To thwart Fault Attacks, we propose a new generic method of computing modular exponentiation and we prove its security in a realistic fault model. By construction, our proposal is also protected against Simple Power Analysis. Based on our new resistant exponentiation algorithm, we present two different ways of computing CRT RSA signatures in a secure way. We show that those methods do not increase execution time and can be easily implemented on low-resource devices. |
| Author | Prouff, Emmanuel Boscher, Arnaud Naciri, Robert |
| Author_xml | – sequence: 1 givenname: Arnaud surname: Boscher fullname: Boscher, Arnaud organization: Spansion, Levallois-Perret Cedex, France – sequence: 2 givenname: Robert surname: Naciri fullname: Naciri, Robert organization: Oberthur Card Systems, Nanterre Cedex, France – sequence: 3 givenname: Emmanuel surname: Prouff fullname: Prouff, Emmanuel organization: Oberthur Card Systems, Nanterre Cedex, France |
| BookMark | eNqNj71OwzAURi0BErR0ZvXIkuDrG8fJWEX8SZWQSpmta8cupWmCYvP-pCIPwFnO9H3SWbDLfug9Y3cgcjXxALpEqEV-toTygi1QFUJLVFhes1WMX2ICoZI13DBotju-fV9z6vbDeEifJ_49Dsm75FtOezr0MfFAP13ilBK5Y7xlV4G66Fezl-zj6XHXvGSbt-fXZr3JCJROmS0qsAjBIVqrhAhehlYUrfOtKjS0yoKFoEpXo6ZQWaeV9agICpJeyBKXLP_7JXcydhiO0YAw50QzJ5o50djx4MM0uP_nAH8BGEZTQA |
| ContentType | Conference Proceeding |
| DOI | 10.5555/1763190.1763216 |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| Editor | Bilas, Angelos Sauveron, Damien Markantonakis, Konstantinos Quisquater, Jean-Jacques |
| Editor_xml | – sequence: 1 givenname: Damien surname: Sauveron fullname: Sauveron, Damien organization: XLIM, UMR Université de Limoges, CNRS, Limoges, France – sequence: 2 givenname: Konstantinos surname: Markantonakis fullname: Markantonakis, Konstantinos organization: Royal Holloway, University of London, Information Security Group, Smart Card Centre, Egham, Surrey, UK – sequence: 3 givenname: Angelos surname: Bilas fullname: Bilas, Angelos organization: FORTH, ICS, Heraklion, Greece – sequence: 4 givenname: Jean-Jacques surname: Quisquater fullname: Quisquater, Jean-Jacques organization: UCL Crypto Group, Louvain-la-Neuve, Belgium |
| EndPage | 243 |
| GroupedDBID | -7M -7P -BG 089 0D6 0DA 0E8 2HV 38. A4I A4J AABBV AABFA AAHDE AAUKK ABBVZ ABMNI ACFGI ACM ADQVG AEDXK AEKFX AETDV AEZAY AGNDD ALMA_UNASSIGNED_HOLDINGS AZZ BBABE CZZ IEZ IV0 JJU LDH LZA MA. MW~ NUC NUP SAO SBO TPJZQ TSXQS Z7R Z7S Z7U Z7V Z7W Z7X Z7Y Z7Z Z81 Z83 Z84 Z87 Z88 Z8R Z8W Z92 |
| ID | FETCH-LOGICAL-a157t-b481b31fc33bb500fe2fd04dced5471d5b1b1f56c937af8bc75be35a14a2e0263 |
| ISBN | 3540723536 9783540723530 |
| IngestDate | Wed Jan 31 06:45:20 EST 2024 Wed Jan 31 06:46:16 EST 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | RSA fault attacks smart card chinese remainder theorem modular exponentiation simple power analysis |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-a157t-b481b31fc33bb500fe2fd04dced5471d5b1b1f56c937af8bc75be35a14a2e0263 |
| PageCount | 15 |
| ParticipantIDs | acm_books_10_5555_1763190_1763216_brief acm_books_10_5555_1763190_1763216 |
| PublicationCentury | 2000 |
| PublicationDate | 20070509 |
| PublicationDateYYYYMMDD | 2007-05-09 |
| PublicationDate_xml | – month: 05 year: 2007 text: 20070509 day: 09 |
| PublicationDecade | 2000 |
| PublicationPlace | Berlin, Heidelberg |
| PublicationPlace_xml | – name: Berlin, Heidelberg |
| PublicationSeriesTitle | ACM Conferences |
| PublicationTitle | Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems |
| PublicationYear | 2007 |
| Publisher | Springer-Verlag |
| Publisher_xml | – name: Springer-Verlag |
| SSID | ssj0000318291 |
| Score | 1.7983549 |
| Snippet | Embedded devices performing RSA signatures are subject to Fault Attacks, particularly when the Chinese Remainder Theorem is used. In most cases, the modular... |
| SourceID | acm |
| SourceType | Publisher |
| StartPage | 229 |
| SubjectTerms | Information systems Information systems -- Data management systems Information systems -- Data management systems -- Data structures Information systems -- Data management systems -- Data structures -- Data layout Information systems -- Data management systems -- Data structures -- Data layout -- Data encryption Security and privacy Security and privacy -- Cryptography Social and professional topics Social and professional topics -- Computing -- technology policy Social and professional topics -- Computing -- technology policy -- Computer crime Theory of computation Theory of computation -- Computational complexity and cryptography |
| Title | CRT RSA algorithm protected against fault attacks |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Li9swEBbZlEJPfW3p9oULhR6MU9uybOUYQtLdpS3LNtvuLUiytQ2sY7q2Du0_6r_s6BE5GwJ95ODYwshI33g0M55vhNAb0HhUck6jnKbjSO9xFfFckoiB9cGKKsYFN9kWn_Lji-z0klwOBr-2spZUx0fi515eyf-gCm2Aq2bJ_gOyvlNogHPAF46AMBx3jN-968yZb2w3n_qTtgtP5idn4WKaA6rzr-_piNqTBPxUUx2iDwAKT_fT3wwcM8kIROu2tbNExx-unIAlVJkkurYGmdN1rUsjCHXDQb2Y2xRffVegJ1Rr8tWVyatutwqjOwGdni_C88-TkF1fNfCob3XoakaACcyu2Ars1lAyda35lp2uBOAjB027kbQJjEWVPqDNxMoS522-uFf7N42yxSdndc3WyrEENERVC8L4cYv3eDsMUpikw17Z7guDGi9Zx7WKFBN8S027KItd8VNbKGp3MSHw03EN0MBgNY30f5rkB-igoPEQ3ZnMTj988eE8rRvTceLYQ_aBd31gzVzHtrKU7vbdTqfaNBL1lmGzeIAO-6EHvTw9RINq_Qjd3-z5Ebgl4DFKALYAYAs8bIGHLXCwBQa2wMF2iC7ms8X0OHLbbsALSoou4hm4MjiRAmPOSRzLKpVlnJWiKgmYMiXhCU8kyQVYtkxSLgrCK0xYkrG0ApceP0HDdbOunqKgzDG29S8lyUqc0TgXhWCcZXRMBOVH6DWMe6lfqXYJ7qiem6Wbm6WbmyP09o_3LDkIjHz2F709R_d66XmBht2Nql6CWdnxVw7S3zo5cdY |
| linkProvider | Library Specific Holdings |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Proceedings+of+the+1st+IFIP+TC6+%2FWG8.8+%2FWG11.2+international+conference+on+Information+security+theory+and+practices%3A+smart+cards%2C+mobile+and+ubiquitous+computing+systems&rft.atitle=CRT+RSA+algorithm+protected+against+fault+attacks&rft.au=Boscher%2C+Arnaud&rft.au=Naciri%2C+Robert&rft.au=Prouff%2C+Emmanuel&rft.series=ACM+Conferences&rft.date=2007-05-09&rft.pub=Springer-Verlag&rft.isbn=3540723536&rft.spage=229&rft.epage=243&rft_id=info:doi/10.5555%2F1763190.1763216 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9783540723530/lc.gif&client=summon&freeimage=true |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9783540723530/mc.gif&client=summon&freeimage=true |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9783540723530/sc.gif&client=summon&freeimage=true |