Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...
Ergebnis 6 von 8372
IEEE transactions on information forensics and security, 2015-07, Vol.10 (7), p.1394-1401
2015

Details

Autor(en) / Beteiligte
Titel
Double Counting in 2^ -ary RSA Precomputation Reveals the Secret Exponent
Ist Teil von
  • IEEE transactions on information forensics and security, 2015-07, Vol.10 (7), p.1394-1401
Ort / Verlag
IEEE
Erscheinungsjahr
2015
Link zum Volltext
Quelle
IEEE Xplore
Beschreibungen/Notizen
  • A new fault attack, double counting attack (DCA), on the precomputation of 2 t -ary modular exponentiation for a classical RSA digital signature (i.e., RSA without the Chinese remainder theorem) is proposed. The 2 t -ary method is the most popular and widely used algorithm to speed up the RSA signature process. Developers can realize the fastest signature process by choosing optimum t . For example, t=6 is optimum for a 1536-bit classical RSA implementation. The 2 t -ary method requires precomputation to generate small exponentials of message. Conventional fault attack research has paid little attention to precomputation, even though precomputation could be a target of a fault attack. The proposed DCA induces faults in precomputation using instruction skip technique, which is equivalent to replacing an instruction with a no operation in assembly language. This paper also presents a useful position checker tool to determine the position of the 2 t -ary coefficients of the secret exponent from signatures based on faulted precomputations. The DCA is demonstrated to be an effective attack method for some widely used parameters. DCA can reconstruct an entire secret exponent using the position checker with 63=2 6 -1) faulted signatures in a short time for a 1536-bit RSA implementation using the2 t -ary method. The DCA process can be accelerated for a small public exponent (e.g., 65537). To the best of our knowledge, the proposed DCA is the first fault attack against classical RSA precomputation.
Sprache
Englisch
Identifikatoren
ISSN: 1556-6013
eISSN: 1556-6021
DOI: 10.1109/TIFS.2015.2411213
Titel-ID: cdi_crossref_primary_10_1109_TIFS_2015_2411213

Weiterführende Literatur

Empfehlungen zum selben Thema automatisch vorgeschlagen von bX