메뉴 건너뛰기




Volumn , Issue , 2008, Pages 101-107

(In)security against fault injection attacks for CRT-RSA implementations

Author keywords

Countermeasures; CRT RSA; Fault attacks; Wagner's attack

Indexed keywords

CRYPTOGRAPHY; ELECTRIC FAULT CURRENTS; EMERGENCY VEHICLES; FAILURE ANALYSIS; FAULT TOLERANCE; FLUORESCENT SCREENS; NETWORK SECURITY; RELIABILITY; TELEVISION PICTURE TUBES;

EID: 52949130693     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/FDTC.2008.9     Document Type: Conference Paper
Times cited : (15)

References (20)
  • 1
    • 52949137579 scopus 로고    scopus 로고
    • C. Aumüler, P. Bier, W. Fischer, P. Hofreiter, and J.-P. Seifert. Fault Attack on RSA with CRT : Concrete Results and Practical Countermeasures. In B. K. Jr., Ç.K. Koç, and C. Parr, editors, Cryptographic Hardware and Embedded Systems (CHES 2002), 2523 of Lecture Notes in Computer Science, pages 260-275. Springer, 2002.
    • C. Aumüler, P. Bier, W. Fischer, P. Hofreiter, and J.-P. Seifert. Fault Attack on RSA with CRT : Concrete Results and Practical Countermeasures. In B. K. Jr., Ç.K. Koç, and C. Parr, editors, Cryptographic Hardware and Embedded Systems (CHES 2002), volume 2523 of Lecture Notes in Computer Science, pages 260-275. Springer, 2002.
  • 2
    • 33745777234 scopus 로고    scopus 로고
    • The Sorcerer's Apprentice Guide to Fault Attacks. Cryptology ePrint Archive
    • Report 2004/100
    • H. Bar-El, H. Choukri, D. Naccache, M. Tunstall, and C. Whelan. The Sorcerer's Apprentice Guide to Fault Attacks. Cryptology ePrint Archive, Report 2004/100, 2004.
    • (2004)
    • Bar-El, H.1    Choukri, H.2    Naccache, D.3    Tunstall, M.4    Whelan, C.5
  • 3
    • 33845214167 scopus 로고    scopus 로고
    • Wagner's Attack on a secure CRTRSA Algorithm Reconsidered
    • L. Breveglieri, I. Koren, D. Naccache, and J.-P. Seifert, editors, Fault Diagnosis and Tolerance in Cryptography FDTC 2006, of, Springer-Verlag
    • J. Blömer and M. Otto. Wagner's Attack on a secure CRTRSA Algorithm Reconsidered. In L. Breveglieri, I. Koren, D. Naccache, and J.-P. Seifert, editors, Fault Diagnosis and Tolerance in Cryptography (FDTC 2006), volume 4236 of Lecture Notes in Computer Science, pages 13-23. Springer-Verlag, 2006.
    • (2006) Lecture Notes in Computer Science , vol.4236 , pp. 13-23
    • Blömer, J.1    Otto, M.2
  • 5
    • 84957355967 scopus 로고    scopus 로고
    • On the Importance of Checking Cryptographic Protocols for Faults
    • W. Fumy, editor, EUROCRYPT'97, of, Springer-Verlag
    • D. Boneh, R. DeMillo, and R. Lipton. On the Importance of Checking Cryptographic Protocols for Faults. In W. Fumy, editor, EUROCRYPT'97, volume 1233 of Lecture Notes in Computer Science, pages 37-51. Springer-Verlag, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1233 , pp. 37-51
    • Boneh, D.1    DeMillo, R.2    Lipton, R.3
  • 6
    • 3042641393 scopus 로고    scopus 로고
    • On the Importance of Eliminating Errors in Cryptographic Computations
    • D. Boneh, R. DeMillo, and R. Lipton. "On the Importance of Eliminating Errors in Cryptographic Computations". Journal of Cryptology, 14(2):101-119, 2001.
    • (2001) Journal of Cryptology , vol.14 , Issue.2 , pp. 101-119
    • Boneh, D.1    DeMillo, R.2    Lipton, R.3
  • 8
    • 52949093349 scopus 로고    scopus 로고
    • C. Giraud. Procédé de traitement de données impliquant une exponentiation modulaire et un dispositif associé, March 2005. Numéro de publication: FR0503083, WO2006103341.
    • C. Giraud. Procédé de traitement de données impliquant une exponentiation modulaire et un dispositif associé, March 2005. Numéro de publication: FR0503083, WO2006103341.
  • 10
    • 33845212887 scopus 로고    scopus 로고
    • Practical Fault Countermeasures for Chinese Remaindering Based RSA
    • L. Breveglieri and I. Koren, editors
    • M. Joye and M. Ciet. Practical Fault Countermeasures for Chinese Remaindering Based RSA. In L. Breveglieri and I. Koren, editors, Fault Diagnosis and Tolerance in Cryptography (FDTC 2005), pages 124-132, 2005.
    • (2005) Fault Diagnosis and Tolerance in Cryptography (FDTC 2005) , pp. 124-132
    • Joye, M.1    Ciet, M.2
  • 11
    • 0004794569 scopus 로고    scopus 로고
    • Chinese Remaindering Based Cryptosystems in the Presence of Faults
    • M. Joye, A. Lenstra, and J.-J. Quisquater. "Chinese Remaindering Based Cryptosystems in the Presence of Faults". Journal of Cryptology, 12(4):241-245, 1999.
    • (1999) Journal of Cryptology , vol.12 , Issue.4 , pp. 241-245
    • Joye, M.1    Lenstra, A.2    Quisquater, J.-J.3
  • 13
    • 37149005270 scopus 로고    scopus 로고
    • Fault Attacks for CRT Based RSA : New Attacks, New Results and New Countermeasures
    • Information Security Theory and Practices, Smart Cards, Mobile and Ubiquitus Computing Systems, of, Springer-Verlag
    • C. Kim and J.-J. Quisquater. Fault Attacks for CRT Based RSA : New Attacks, New Results and New Countermeasures. In Information Security Theory and Practices, Smart Cards, Mobile and Ubiquitus Computing Systems, volume 4462 of Lecture Notes in Computer Science, pages 215-228. Springer-Verlag, 2007.
    • (2007) Lecture Notes in Computer Science , vol.4462 , pp. 215-228
    • Kim, C.1    Quisquater, J.-J.2
  • 14
    • 0017930809 scopus 로고    scopus 로고
    • R. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signature and Public-Key Cryptosystems. In Communications of the ACM, 21, pages 120-126, 1978.
    • R. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signature and Public-Key Cryptosystems. In Communications of the ACM, volume 21, pages 120-126, 1978.
  • 15
    • 4243387122 scopus 로고    scopus 로고
    • Improved Method and Apparatus for Protecting Public Key Schemes from. Timing and Fault Attacks
    • A. Shamir. "Improved Method and Apparatus for Protecting Public Key Schemes from. Timing and Fault Attacks". Presented at the Rump Session of Eurocrypt'97, 1997.
    • (1997) Presented at the Rump Session of Eurocrypt'97
    • Shamir, A.1
  • 17
    • 52949138879 scopus 로고    scopus 로고
    • S.-M. Yen and D. Kim. Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection. In Fault Diagnosis and Tolerance in Cryptography (FDTC 2004), pages 381-385, 2004. IEEE Computer Society.
    • S.-M. Yen and D. Kim. Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection. In Fault Diagnosis and Tolerance in Cryptography (FDTC 2004), pages 381-385, 2004. IEEE Computer Society.
  • 18
    • 84949936541 scopus 로고    scopus 로고
    • RSA Speedup with Residue Number System Immune Against Hardware Fault Cryptanalysis
    • K. Kim, editor, Information Security and Cryptology ISISC 2001, of, Springer-Verlag
    • S.-M. Yen, D. Kim, S. Lim, and S. Moon. RSA Speedup with Residue Number System Immune Against Hardware Fault Cryptanalysis. In K. Kim, editor, Information Security and Cryptology (ISISC 2001), volume 2288 of Lecture Notes in Computer Science, pages 397-413. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2288 , pp. 397-413
    • Yen, S.-M.1    Kim, D.2    Lim, S.3    Moon, S.4
  • 19
    • 33845216123 scopus 로고    scopus 로고
    • Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection
    • L. Breveglieri, I. Koren, D. Naccache, and J.-P. Seifert, editors, Fault Diagnosis and Tolerance in Cryptography FDTC 2006, of, Springer-Verlag
    • S.-M. Yen, D. Kim, and S. Moon. Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection. In L. Breveglieri, I. Koren, D. Naccache, and J.-P. Seifert, editors, Fault Diagnosis and Tolerance in Cryptography (FDTC 2006), volume 4236 of Lecture Notes in Computer Science, pages 53-61. Springer-Verlag, 2006.
    • (2006) Lecture Notes in Computer Science , vol.4236 , pp. 53-61
    • Yen, S.-M.1    Kim, D.2    Moon, S.3
  • 20
    • 35248846556 scopus 로고    scopus 로고
    • Hardware Fault Attack on RSA with CRT Revisited
    • C. Lim and P. Lee, editors, Information Security and Cryptology ICISC 2002, of, Springer
    • S.-M. Yen, S. Moon, and J.-C. Ha. Hardware Fault Attack on RSA with CRT Revisited. In C. Lim and P. Lee, editors, Information Security and Cryptology (ICISC 2002), volume 2587 of Lecture Notes in Computer Science, pages 374-388. Springer, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2587 , pp. 374-388
    • Yen, S.-M.1    Moon, S.2    Ha, J.-C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.