Sliding Right into Disaster: Left-to-Right Sliding Windows Leak

نویسندگان

  • Daniel J. Bernstein
  • Joachim Breitner
  • Daniel Genkin
  • Leon Groot Bruinderink
  • Nadia Heninger
  • Tanja Lange
  • Christine van Vredendaal
  • Yuval Yarom
چکیده

It is well known that constant-time implementations of modular exponentiation cannot use sliding windows. However, software libraries such as Libgcrypt, used by GnuPG, continue to use sliding windows. It is widely believed that, even if the complete pattern of squarings and multiplications is observed through a side-channel attack, the number of exponent bits leaked is not sufficient to carry out a full key-recovery attack against RSA. Specifically, 4-bit sliding windows leak only 40% of the bits, and 5-bit sliding windows leak only 33% of the bits. In this paper we demonstrate a complete break of RSA-1024 as implemented in Libgcrypt. Our attack makes essential use of the fact that Libgcrypt uses the left-to-right method for computing the sliding-window expansion. We show for the first time that the direction of the encoding matters: the pattern of squarings and multiplications in left-to-right sliding windows leaks significantly more information about the exponent than right-to-left. We show how to extend the Heninger-Shacham algorithm for partial key reconstruction to make use of this information and obtain a very efficient full key recovery for RSA-1024. For RSA-2048 our attack is efficient for 13% of keys.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fractional Windows Revisited: Improved Signed-Digit Representations for Efficient Exponentiation

This paper extends results concerning efficient exponentiation in groups where inversion is easy (e.g. in elliptic curve cryptography). It examines the right-to-left and left-to-right signed fractional window (RL-SFW and LR-SFW) techniques and shows that both RL-SFW and LR-SFW representations have minimal weight among all signed-digit representations with digit set {±1,±3, . . .,±m, 0}. (Fracti...

متن کامل

Segmentation-free optical character recognition for printed Urdu text

This paper presents a segmentation-free optical character recognition system for printed Urdu Nastaliq font using ligatures as units of recognition. The proposed technique relies on statistical features and employs Hidden Markov Models for classification. A total of 1525 unique high-frequency Urdu ligatures from the standard Urdu Printed Text Images (UPTI) database are considered in our study. ...

متن کامل

Transactions on Alogorithms 1 (2005), 123–142 ANALYSIS OF LINEAR COMBINATION ALGORITHMS IN CRYPTOGRAPHY

Several cryptosystems rely on fast calculations of linear combinations in groups. One way to achieve this is to use joint signed binary digit expansions of small “weight.” We study two algorithms, one based on non adjacent forms of the coefficients of the linear combination, the other based on a certain joint sparse form specifically adapted to this problem. Both methods are sped up using the s...

متن کامل

Signed Binary Representations Revisited

The most common method for computing exponentiation of random elements in Abelian groups are sliding window schemes, which enhance the efficiency of the binary method at the expense of some precomputation. In groups where inversion is easy (e.g. elliptic curves), signed representations of the exponent are meaningful because they decrease the amount of required precomputation. The asymptotic bes...

متن کامل

پژوهشی در رابطه با حرکت دندان کانین با روش لغزشی با قلاب (Hook) و بدون قلاب (Hook)

Normal 0 false false false EN-US X-NONE AR-SA Canine retraction was done for 19 patients. Movement , Tipping and rotation of canine and molar movements  was done by two approaches of sliding hook and sliding mechanics using 16% wire and 18% twin edgewise brackets and were compared. 350 g force via elastic chin was applied and measurements were done ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2017  شماره 

صفحات  -

تاریخ انتشار 2017