A Survey of Differential Fault Analysis Against Classical RSA Implementations

نویسندگان

  • Alexandre Berzati
  • Cécile Canovas
  • Louis Goubin
چکیده

Since the advent of side channel attacks, classical cryptanalysis is no longer sufficient to ensure the security of cryptographic algorithms. In practice, the implementation of algorithms on electronic devices is a potential source of leakage that an attacker can use to completely break a system [29, 15, 21]. The injection of faults during the execution of cryptographic algorithms is considered as an intrusive side channel method because secret information may leak from malicious modifications of a device’s behavior [13, 11]. In this context, the security of public key cryptosystems [13] and symmetric ciphers in both block [11] and stream modes [23] has been challenged. Recently, some interesting results have been obtained by attacking public key cryptosystems. More precisely, several papers demonstrated that the perturbation of public elements may induce critical flaws in implementations of public key cryptosystems [10, 14, 25]. We propose here a survey of the applications of fault attacks against different RSA implementations, classical or sophisticated. After a presentation of the RSA cryptosystem and its classical implementation, we review chronologically the attacks and some of the proposed countermeasures. Although first attackers focused their efforts to exploit perturbations of secret elements or related operations (see Sect. 3), recent works adressed the security of public elements (see Sect. 4). This new trend is all the more interesting since public elements are usually handled in a less secure way than private ones. Furthermore it may lead to powerful attacks regardless to the kind of induced perturbations.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Public Key Perturbation of Randomized RSA Implementations

Among all countermeasures that have been proposed to thwart side-channel attacks against RSA implementations, the exponent randomization method – also known as exponent blinding – has been very early suggested by P. Kocher in 1996, and formalized by J.-S. Coron at CHES 1999. Although it has been used for a long time, some authors pointed out the fact that it does not intrinsically remove all so...

متن کامل

Practical Fault Countermeasures for Chinese Remaindering Based RSA

Most implementations of the widely-used RSA cryptosystem rely on Chinese remaindering (CRT) as this greatly improves the performances in both running times and memory requirements. Unfortunately, CRT-based implementations are also known to be more sensitive to fault attacks: a single fault in an RSA exponentiation may reveal the secret prime factors trough a GCD computation, that is, a total br...

متن کامل

Fault Attacks on the Montgomery Powering Ladder

Security-aware embedded devices which are likely to operate in hostile environments need protection against physical attacks. For the RSA public-key algorithm, protected versions of the Montgomery powering ladder have gained popularity as countermeasures for such attacks. In this paper, we present a general fault attack against RSA implementations which use the Montgomery powering ladder. In a ...

متن کامل

Fault Attacks on RSA Public Keys: Left-To-Right Implementations Are Also Vulnerable

After attacking the RSA by injecting fault and corresponding countermeasures, works appear now about the need for protecting RSA public elements against fault attacks. We provide here an extension of a recent attack [BCG08] based on the public modulus corruption. The difficulty to decompose the ”Left-To-Right” exponentiation into partial multiplications is overcome by modifying the public modul...

متن کامل

Formal verification of an implementation of CRT-RSA algorithm

Cryptosystems are highly sensitive to physical attacks, which leads security developers to design more and more complex countermeasures. Nonetheless, no proof of flaw absence has been given for any implementation of these countermeasures. This paper aims to formally verify an implementation of one published countermeasure against fault injection attacks. More precisely, the formal verification ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012