[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1030083.1030097acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Cryptanalysis of a provably secure CRT-RSA algorithm

Published: 25 October 2004 Publication History

Abstract

We study a countermeasure proposed to protect Chinese remainder theorem (CRT) computations for RSA against fault attacks. The scheme was claimed to be provably secure. However, we demonstrate that the proposal is in fact insecure: it can be broken with a simple and practical fault attack. We conclude that the proposed countermeasure is not safe for use in its present form.

References

[1]
R. Anderson, M. Kuhn, "Tamper resistance---a cautionary note," 2nd USENIX Workshop on Electronic Commerce, pp.1--11, 1996.
[2]
R. Anderson, M. Kuhn, "Low cost attacks on tamper resistant devices," 1997 Security Protocols Workshop.
[3]
H. Bar-El, H. Choukri, D. Naccache, M. Tunstall, C. Whelan, "The sorcerer's apprentice guide to fault attacks," Workshop on Fault Detection and Tolerance in Cryptography, June 2004.
[4]
J. Blࣆmer, M. Otto, J.-P. Seifert, "A new CRT-RSA algorithm secure against Bellcore attacks," ACM CCS 2003, ACM Press, pp.311--320, 2003.
[5]
D. Boneh, R.A. DeMillo, R.J. Lipton, "On the importance of checking cryptographic protocols for fault," EUROCRYPT'97, Springer-Verlag, LNCS 1233, pp.37--51, 1997.
[6]
M. Joye, A.K. Lenstra, J.-J. Quisquater, "Chinese remaindering based cryptosystems in the presence of faults," Journal of Cryptology, vol. 12, no. 4, pp.241--245, 1999.
[7]
A.K. Lenstra, "Memo on RSA signature generation in the presence of faults," Sept. 1996.
[8]
S.-M. Yen, M. Joye, "Checking before output may not be enough against fault-based cryptanalysis," IEEE Transactions on Computers, vol. 49, no. 9, pp.96--970, 2000.
[9]
S.-M. Yen, S. Kim, S. Lim, S. Moon, "RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis," ICICS 2001, Springer-Verlag, LNCS 2288, pp.397--413, 2002.

Cited By

View all
  • (2023)All Shall FA-LLL: Breaking CT-RSA 2022 and CHES 2022 Infective Countermeasures with Lattice-Based Fault AttacksTopics in Cryptology – CT-RSA 202310.1007/978-3-031-30872-7_17(445-468)Online publication date: 19-Apr-2023
  • (2021)A Hybrid Approach to Formal Verification of Higher-Order Masked Arithmetic ProgramsACM Transactions on Software Engineering and Methodology10.1145/342801530:3(1-42)Online publication date: 11-Feb-2021
  • (2019)Fault-injection Attack and Improvement of a CRT-RSA Exponentiation AlgorithmProceedings of the 2019 9th International Conference on Communication and Network Security10.1145/3371676.3371699(123-127)Online publication date: 15-Nov-2019
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CCS '04: Proceedings of the 11th ACM conference on Computer and communications security
October 2004
376 pages
ISBN:1581139616
DOI:10.1145/1030083
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 October 2004

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. RSA
  2. chinese remainder theorem
  3. cryptanalysis
  4. fault attacks

Qualifiers

  • Article

Conference

CCS04
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2023)All Shall FA-LLL: Breaking CT-RSA 2022 and CHES 2022 Infective Countermeasures with Lattice-Based Fault AttacksTopics in Cryptology – CT-RSA 202310.1007/978-3-031-30872-7_17(445-468)Online publication date: 19-Apr-2023
  • (2021)A Hybrid Approach to Formal Verification of Higher-Order Masked Arithmetic ProgramsACM Transactions on Software Engineering and Methodology10.1145/342801530:3(1-42)Online publication date: 11-Feb-2021
  • (2019)Fault-injection Attack and Improvement of a CRT-RSA Exponentiation AlgorithmProceedings of the 2019 9th International Conference on Communication and Network Security10.1145/3371676.3371699(123-127)Online publication date: 15-Nov-2019
  • (2019)Predicting the Effect of Hardware Fault Injection2019 International Workshop on Big Data and Information Security (IWBIS)10.1109/IWBIS.2019.8935864(103-108)Online publication date: Oct-2019
  • (2019)A lightweight and efficient Secure Hybrid RSA (SHRSA) messaging scheme with four-layered authentication stackIEEE Access10.1109/ACCESS.2019.2900300(1-1)Online publication date: 2019
  • (2019)Hiding a fault enabled virus through code constructionJournal of Computer Virology and Hacking Techniques10.1007/s11416-019-00340-z16:2(103-124)Online publication date: 24-Oct-2019
  • (2019)A Secure Hybrid RSA (SHRSA)-based Lightweight and Efficient Personal Messaging Communication ProtocolDigital Twin Technologies and Smart Cities10.1007/978-3-030-18732-3_11(191-212)Online publication date: 23-Jul-2019
  • (2018)Secure Approach For Encrypting Data2018 International Conference on Smart City and Emerging Technology (ICSCET)10.1109/ICSCET.2018.8537290(1-3)Online publication date: Jan-2018
  • (2017)Fault Attack on an Improved CRT-RSA Algorithm with the Modulus Chaining Method22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)10.1109/CSE-EUC.2017.174(866-869)Online publication date: Jul-2017
  • (2017)Using modular extension to provably protect Edwards curves against fault attacksJournal of Cryptographic Engineering10.1007/s13389-017-0167-47:4(321-330)Online publication date: 13-Jun-2017
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media