메뉴 건너뛰기




Volumn 4462 LNCS, Issue , 2007, Pages 229-243

CRT RSA algorithm protected against fault attacks

Author keywords

Chinese remainder theorem; Fault attacks; Modular exponentiation; RSA; Simple power analysis; Smart card

Indexed keywords

ALGORITHMS; FAILURE ANALYSIS; MATHEMATICAL MODELS; SMART CARDS; THEOREM PROVING; COMPUTATION THEORY; INTELLIGENT BUILDINGS; NETWORK SECURITY; SECURITY OF DATA; TRANSPORTATION; UBIQUITOUS COMPUTING;

EID: 37249007426     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-72354-7_19     Document Type: Conference Paper
Times cited : (49)

References (29)
  • 1
    • 84957355967 scopus 로고    scopus 로고
    • On the Importance of Checking Cryptographic Protocols for Faults
    • Fumy, W, ed, Advances in Cryptology, EUROCRYPT '97. of, Springer
    • Boneh, D., DeMillo, R., Lipton, R.: On the Importance of Checking Cryptographic Protocols for Faults. In Fumy, W., ed.: Advances in Cryptology - EUROCRYPT '97. Volume 1233 of Lecture Notes in Computer Science., Springer (1997) 37-51
    • (1997) Lecture Notes in Computer Science , vol.1233 , pp. 37-51
    • Boneh, D.1    DeMillo, R.2    Lipton, R.3
  • 2
    • 35248880671 scopus 로고    scopus 로고
    • Aumüller, C., Bier, P., Fischer, W., Hofreiter, P., Seifert, J.P.: Fault attacks on RSA with CRT: Concrete Results and Practical Countermeasures. In Kaliski Jr., B., Koç, Ç., Paar, C., eds.: Cryptographic Hardware and Embedded Systems -CHES 2002. 2523 of Lecture Notes in Computer Science., Springer (2002) 260-275
    • Aumüller, C., Bier, P., Fischer, W., Hofreiter, P., Seifert, J.P.: Fault attacks on RSA with CRT: Concrete Results and Practical Countermeasures. In Kaliski Jr., B., Koç, Ç., Paar, C., eds.: Cryptographic Hardware and Embedded Systems -CHES 2002. Volume 2523 of Lecture Notes in Computer Science., Springer (2002) 260-275
  • 4
    • 33845212887 scopus 로고    scopus 로고
    • Practical Fault Countermeasures for Chinese Remaindering Based RSA
    • Breveglieri, L, Koren, I, eds
    • Ciet, M., Joye, M.: Practical Fault Countermeasures for Chinese Remaindering Based RSA. In Breveglieri, L., Koren, I., eds.: Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC'05. (2005) 124-132
    • (2005) Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC'05 , pp. 124-132
    • Ciet, M.1    Joye, M.2
  • 6
    • 4243387122 scopus 로고    scopus 로고
    • Improved method and apparatus for protecting public key schemes from timing and fault attacks
    • International Patent Number, WO 98/52319 () Also presented at the rump session of EUROCRYPT'97
    • Shamir, A.: Improved method and apparatus for protecting public key schemes from timing and fault attacks. International Patent Number : WO 98/52319 (1998) Also presented at the rump session of EUROCRYPT'97.
    • (1998)
    • Shamir, A.1
  • 7
    • 84949936541 scopus 로고    scopus 로고
    • RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis
    • Kim, K, ed, Information Security and Cryptology, ICISC, of, Springer
    • Yen, S.M., Kim, S.J., Lim, S.G., Moon, S.J.: RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis. In Kim, K., ed.: Information Security and Cryptology - ICISC 2001. Volume 2288 of Lecture Notes in Computer Science., Springer (2001) 397-413
    • (2001) Lecture Notes in Computer Science , vol.2288 , pp. 397-413
    • Yen, S.M.1    Kim, S.J.2    Lim, S.G.3    Moon, S.J.4
  • 8
    • 33747617679 scopus 로고    scopus 로고
    • Cryptanalysis of a Provable Secure CRT-RSA Algorithm
    • Pfitzmann, B, Liu, P, eds, ACM Press
    • Wagner, D.: Cryptanalysis of a Provable Secure CRT-RSA Algorithm. In Pfitzmann, B., Liu, P., eds.: ACM Conference on Computer and Communications Security - CCS'04, ACM Press (2004) 82-91
    • (2004) ACM Conference on Computer and Communications Security - CCS'04 , pp. 82-91
    • Wagner, D.1
  • 10
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21 (1978) 120-126
    • (1978) Communications of the ACM , vol.21 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 11
    • 0020194569 scopus 로고
    • Fast decipherment algorithm for RSA public-key cryptosystem
    • Couvreur, C., Quisquater, J.J.: Fast decipherment algorithm for RSA public-key cryptosystem. Electronics Letters 18 (1982) 905-907
    • (1982) Electronics Letters , vol.18 , pp. 905-907
    • Couvreur, C.1    Quisquater, J.J.2
  • 13
    • 84943632039 scopus 로고    scopus 로고
    • Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
    • Koblitz, N, ed, Advances in Cryptology, CRYPTO '96. of, Springer
    • Kocher, P.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In Koblitz, N., ed.: Advances in Cryptology - CRYPTO '96. Volume 1109 of Lecture Notes in Computer Science., Springer (1996) 104-113
    • (1996) Lecture Notes in Computer Science , vol.1109 , pp. 104-113
    • Kocher, P.1
  • 14
    • 84939573910 scopus 로고    scopus 로고
    • Differential Power Analysis
    • Wiener, M, ed, Advances in Cryptology, CRYPTO '99. of, Springer
    • Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In Wiener, M., ed.: Advances in Cryptology - CRYPTO '99. Volume 1666 of Lecture Notes in Computer Science., Springer (1999) 388-397
    • (1999) Lecture Notes in Computer Science , vol.1666 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 15
    • 84949514743 scopus 로고    scopus 로고
    • Power analysis attacks on modular exponentiation in smartcards. In Koç, Ç
    • Paar, C, eds, Cryptographic Hardware and Embedded Systems, CHES '99. of, Springer
    • Messerges, T., Dabbish, E., Sloan, R.: Power analysis attacks on modular exponentiation in smartcards. In Koç, Ç., Paar, C, eds.: Cryptographic Hardware and Embedded Systems - CHES '99. Volume 1717 of Lecture Notes in Computer Science., Springer (1999) 144-157
    • (1999) Lecture Notes in Computer Science , vol.1717 , pp. 144-157
    • Messerges, T.1    Dabbish, E.2    Sloan, R.3
  • 16
    • 84944878354 scopus 로고    scopus 로고
    • Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press (1997) Electronic version available at http://www.cacr.math.uwaterloo.ca/hac/.
    • Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press (1997) Electronic version available at http://www.cacr.math.uwaterloo.ca/hac/.
  • 17
    • 84880293917 scopus 로고    scopus 로고
    • Resistance Against Differential Power Analysis for Elliptic Curve Cryptosystems
    • Koç, Ç, Paar, C, eds, Cryptographic Hardware and Embedded Systems, CHES '99. of, Springer
    • Coron, J.S.: Resistance Against Differential Power Analysis for Elliptic Curve Cryptosystems. In Koç, Ç., Paar, C., eds.: Cryptographic Hardware and Embedded Systems - CHES '99. Volume 1717 of Lecture Notes in Computer Science., Springer (1999) 292-302
    • (1999) Lecture Notes in Computer Science , vol.1717 , pp. 292-302
    • Coron, J.S.1
  • 18
    • 0004794569 scopus 로고    scopus 로고
    • Chinese Remaindering Based Cryptosystems in the Presence of Faults
    • Joye, M., Lenstra, A., Quisquater, J.J.: Chinese Remaindering Based Cryptosystems in the Presence of Faults. Journal of Cryptology 12 (1999) 241-246
    • (1999) Journal of Cryptology , vol.12 , pp. 241-246
    • Joye, M.1    Lenstra, A.2    Quisquater, J.J.3
  • 19
    • 0034276289 scopus 로고    scopus 로고
    • Checking before output may not be enough against fault-based cryptanalysis
    • Yen, S.M., Joye, M.: Checking before output may not be enough against fault-based cryptanalysis. IEEE Transactions on Computers 49 (2000) 967-970
    • (2000) IEEE Transactions on Computers , vol.49 , pp. 967-970
    • Yen, S.M.1    Joye, M.2
  • 20
    • 35248874869 scopus 로고    scopus 로고
    • Joye, M., Yen, S.M.: The Montgomery Powering Ladder. In Kaliski Jr., B., Koç, Ç., Paar, C, eds.: Cryptographic Hardware and Embedded Systems - CHES 2002. 2523 of Lecture Notes in Computer Science., Springer (2002) 291-302
    • Joye, M., Yen, S.M.: The Montgomery Powering Ladder. In Kaliski Jr., B., Koç, Ç., Paar, C, eds.: Cryptographic Hardware and Embedded Systems - CHES 2002. Volume 2523 of Lecture Notes in Computer Science., Springer (2002) 291-302
  • 21
    • 33845218764 scopus 로고    scopus 로고
    • An Adversarial Model for Fault Analysis Against LowCost Cryptographic Devices
    • Breveglieri, L, Koren, I, Naccache, D, Seifert, J.P, eds, Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC'06. of, Springer
    • Lemke-Rust, K., Paar, C.: An Adversarial Model for Fault Analysis Against LowCost Cryptographic Devices. In Breveglieri, L., Koren, I., Naccache, D., Seifert, J.P., eds.: Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC'06. Volume 4236 of Lecture Notes in Computer Science., Springer (2006) 131-143
    • (2006) Lecture Notes in Computer Science , vol.4236 , pp. 131-143
    • Lemke-Rust, K.1    Paar, C.2
  • 22
    • 63449111952 scopus 로고    scopus 로고
    • Yen, S.M., Moon, S., Ha, J.C.: Permanent Fault Attack on RSA with CRT. In Safavi-Naini, R., Seberry, J., eds.: Information Security and Privacy - 8th Australasian Conference - ACISP 2003. 2727 of Lecture Notes in Computer Science., Springer (2003) 285-296
    • Yen, S.M., Moon, S., Ha, J.C.: Permanent Fault Attack on RSA with CRT. In Safavi-Naini, R., Seberry, J., eds.: Information Security and Privacy - 8th Australasian Conference - ACISP 2003. Volume 2727 of Lecture Notes in Computer Science., Springer (2003) 285-296
  • 25
    • 33845191171 scopus 로고    scopus 로고
    • Attacking Right-to-Left Modular Exponentiation with Timely Random Faults
    • Breveglieri, L, Koren, I, Naccache, D, Seifert, J.P, eds, Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC'06. of, Springer
    • Boréale, M.: Attacking Right-to-Left Modular Exponentiation with Timely Random Faults. In Breveglieri, L., Koren, I., Naccache, D., Seifert, J.P., eds.: Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC'06. Volume 4236 of Lecture Notes in Computer Science., Springer (2006) 24-35
    • (2006) Lecture Notes in Computer Science , vol.4236 , pp. 24-35
    • Boréale, M.1
  • 26
    • 35248881073 scopus 로고    scopus 로고
    • Fouque, P.A., Valette, F.: The Doubling Attack: Why Upwards is better than Downwards. In Walter, C., Koç, Ç., Paar, C., eds.: Cryptographic Hardware and Embedded Systems - CHES 2003. 2779 of Lecture Notes in Computer Science., Springer (2003) 269-280
    • Fouque, P.A., Valette, F.: The Doubling Attack: Why Upwards is better than Downwards. In Walter, C., Koç, Ç., Paar, C., eds.: Cryptographic Hardware and Embedded Systems - CHES 2003. Volume 2779 of Lecture Notes in Computer Science., Springer (2003) 269-280
  • 27
    • 33646183037 scopus 로고    scopus 로고
    • Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSADecryption
    • Dawson, E, Vaudenay, S, eds, Progress in Cryptology, Mycrypt, of, Springer
    • Yen, S.M., Lien, W.C., Moon, S.J., Ha, J.C.: Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSADecryption. In Dawson, E., Vaudenay, S., eds.: Progress in Cryptology - Mycrypt 2005. Volume 3715 of Lecture Notes in Computer Science., Springer (2005) 183-195
    • (2005) Lecture Notes in Computer Science , vol.3715 , pp. 183-195
    • Yen, S.M.1    Lien, W.C.2    Moon, S.J.3    Ha, J.C.4
  • 28
    • 0001604533 scopus 로고
    • Blind signatures for untraceable payments
    • Chaum, D, Rivest, R, Sherman, A, eds, Plenum Press
    • Chaum, D.: Blind signatures for untraceable payments. In Chaum, D., Rivest, R., Sherman, A., eds.: Advances in Cryptology - CRYPTO '82, Plenum Press (1982) 199-204
    • (1982) Advances in Cryptology - CRYPTO '82 , pp. 199-204
    • Chaum, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.