메뉴 건너뛰기




Volumn 5473, Issue , 2009, Pages 459-480

Securing RSA against fault analysis by double addition chain exponentiation

Author keywords

[No Author keywords available]

Indexed keywords

ADDITION CHAINS; CHINESE REMAINDER THEOREM; CRYPTANALYTIC TECHNIQUES; CRYPTOGRAPHIC IMPLEMENTATION; EMBEDDED IMPLEMENTATION; EXPONENTIATION; EXPONENTIATION ALGORITHMS; EXPONENTIATIONS; FAULT ANALYSIS; PORTABLE DEVICE; PRIVATE KEY;

EID: 67650155431     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-00862-7_31     Document Type: Conference Paper
Times cited : (21)

References (42)
  • 2
    • 35248880671 scopus 로고    scopus 로고
    • Fault attacks on RSA with CRT: Concrete results and practical countermeasures
    • In: Kaliski Jr., B.S., Koç, Ç .K., Paar, C. (eds.), Springer, Heidelberg
    • Aum̈uller, C., Bier, P., Fischer, W., Hofreiter, P., Seifert, J.-P.: Fault attacks on RSA with CRT: Concrete results and practical countermeasures. In: Kaliski Jr., B.S., Koç, Ç .K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 260-275. Springer, Heidelberg (2003)
    • (2003) CHES 2002. LNCS , vol.2523 , pp. 260-275
    • Aum̈uller, C.1    Bier, P.2    Fischer, W.3    Hofreiter, P.4    Seifert, J.-P.5
  • 3
    • 84956981493 scopus 로고    scopus 로고
    • Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults
    • Security Protocols
    • Bao, F., Deng, R., Han, Y., Jeng, A., Narasimhalu, A.D., Ngair, T.-H.: Breaking Public Key Cryptosystems an Tamper Resistance Devices in the Presence of Transient Fault. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol. 1361, pp. 115-124. Springer, Heidelberg (1998) (Pubitemid 128023884)
    • (1998) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1361 , pp. 115-124
    • Bao, F.1    Deng, R.H.2    Han, Y.F.3    Jeng, A.B.R.4    Narasimhalu, A.D.5    Ngair, T.H.6
  • 4
    • 52949130693 scopus 로고    scopus 로고
    • (In)security against fault injection attacks for CRT-RSA implementations
    • In: Breveglieri, L., Gueron, S., Koren, I., Naccache, D., Seifert, J.-P. (eds.), Los Alamitos
    • Berzati, A., Canovas, C., Goubin, L.: (In)security Against Fault Injection Attacks for CRT-RSA Implementations. In: Breveglieri, L., Gueron, S., Koren, I., Naccache, D., Seifert, J.-P. (eds.) FDTC 2008, pp. 101-107. IEEE Computer Society, Los Alamitos (2008)
    • (2008) FDTC 2008, IEEE Computer Society , pp. 101-107
    • Berzati, A.1    Canovas, C.2    Goubin, L.3
  • 5
    • 51049098141 scopus 로고    scopus 로고
    • Perturbating RSA public keys: An improved attack
    • In: Oswald, E., Rohatgi, P. (eds.), Springer, Heidelberg
    • Berzati, A., Canovas, C., Goubin, L.: Perturbating RSA public keys: An improved attack. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 380- 395. Springer, Heidelberg (2008)
    • (2008) CHES 2008. LNCS , vol.5154 , pp. 380-395
    • Berzati, A.1    Canovas, C.2    Goubin, L.3
  • 6
    • 84958641478 scopus 로고    scopus 로고
    • Differential Fault Analysis of Secret Key Cryptosystems
    • Advances in Cryptology - CRYPTO '97
    • Biham, E., Shamir, A.: differential fault analysis of secret key cryptosystems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513-525. Springer, Heidelberg (1997) (Pubitemid 127112576)
    • (1997) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1294 , pp. 513-525
    • Biham, E.1    Shamir, A.2
  • 7
    • 14844326209 scopus 로고    scopus 로고
    • A new RSA-CRT algorithm secure against bellcore attacks
    • In: Jajodia, S., Atluri, V., Jaeger, T. (eds.), ACM Press, New York
    • Bl̈omer, J., Otto, M., Seifert, J.-P.: A New RSA-CRT Algorithm Secure against Bellcore Attacks. In: Jajodia, S., Atluri, V., Jaeger, T. (eds.) CCS 2003, pp. 311- 320. ACM Press, New York (2003)
    • (2003) CCS 2003 , pp. 311-320
    • Bl̈omer, J.1    Otto, M.2    Seifert, J.-P.3
  • 8
    • 84957355967 scopus 로고    scopus 로고
    • On the Importance of Checking Cryptographic Protocols for Faults
    • Advances in Cryptology - Eurocrypt '97
    • Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37-51. Springer, Heidelberg (1997) (Pubitemid 127067792)
    • (1997) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1233 , pp. 37-51
    • Boneh, D.1    Demillo, R.A.2    Lipton, R.J.3
  • 11
    • 0000742754 scopus 로고
    • Addition chain heuristics
    • In: Brassard, G. (ed.), Springer, Heidelberg
    • Bos, J., Coster, M.: Addition chain heuristics. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 400-407. Springer, Heidelberg (1990)
    • (1990) CRYPTO 1989. LNCS , vol.435 , pp. 400-407
    • Bos, J.1    Coster, M.2
  • 13
    • 3042527150 scopus 로고    scopus 로고
    • Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity
    • Chevallier-Mames, B., Ciet, M., Joye, M.: Low-cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity. IEEE Transactions on Computers 53(6), 760-768 (2004)
    • (2004) IEEE Transactions on Computers , vol.53 , Issue.6 , pp. 760-768
    • Chevallier-Mames, B.1    Ciet, M.2    Joye, M.3
  • 14
    • 33845212887 scopus 로고    scopus 로고
    • Practical fault countermeasures for chinese remaindering based RSA
    • In: Breveglieri, L., Koren, I. (eds.)
    • Ciet, M., Joye, M.: Practical Fault Countermeasures for Chinese Remaindering Based RSA. In: Breveglieri, L., Koren, I. (eds.) FDTC 2005, pp. 124-132 (2005)
    • (2005) FDTC 2005 , pp. 124-132
    • Ciet, M.1    Joye, M.2
  • 15
    • 84880293917 scopus 로고    scopus 로고
    • Resistance against differential power analysis for elliptic curve cryptosystems
    • In: Koç, Ç .K., Paar, C. (eds.), Springer, Heidelberg
    • Coron, J.-S.: Resistance against differential power analysis for elliptic curve cryptosystems. In: Koç, Ç .K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 292-302. Springer, Heidelberg (1999)
    • (1999) CHES 1999. LNCS , vol.1717 , pp. 292-302
    • Coron, J.-S.1
  • 17
    • 35248881073 scopus 로고    scopus 로고
    • The doubling attack: Why upwards is better than downwards
    • In: Walter, C.D., Koç, Ç .K., Paar, C. (eds.), Springer, Heidelberg
    • Fouque, P.-A., Valette, F.: The Doubling Attack: Why Upwards is Better than Downwards. In: Walter, C.D., Koç, Ç .K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 269-280. Springer, Heidelberg (2003)
    • (2003) CHES 2003. LNCS , vol.2779 , pp. 269-280
    • Fouque, P.-A.1    Valette, F.2
  • 18
    • 33747624721 scopus 로고    scopus 로고
    • An RSA implementation resistant to fault attacks and to simple power analysis
    • DOI 10.1109/TC.2006.135
    • Giraud, C.: An RSA Implementation Resistant to Fault Attacks and to Simple Power Analysis. IEEE Transactions on Computers 55(9), 1116-1120 (2006) (Pubitemid 44263810)
    • (2006) IEEE Transactions on Computers , vol.55 , Issue.9 , pp. 1116-1120
    • Giraud, C.1
  • 19
    • 0000490812 scopus 로고    scopus 로고
    • A Survey of Fast Exponentiation Methods
    • Gordon, D.M.: A Survey of Fast Exponentiation Methods. J. Algorithms 27(1), 129-146 (1998) (Pubitemid 128450297)
    • (1998) Journal of Algorithms , vol.27 , Issue.1 , pp. 129-146
    • Gordon, D.M.1
  • 20
    • 35248898400 scopus 로고    scopus 로고
    • Address-bit differential power analysis of cryptographic schemes OK-ECDH and OK-ECDSA
    • In: Kaliski Jr., B.S., Koç, Ç .K., Paar, C. (eds.), Springer, Heidelberg
    • Itoh, K., Izu, T., Takenak, M.: Address-bit differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA. In: Kaliski Jr., B.S., Koç, Ç .K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 129-143. Springer, Heidelberg (2003)
    • (2003) CHES 2002. LNCS , vol.2523 , pp. 129-143
    • Itoh, K.1    Izu, T.2    Takenak, M.3
  • 21
    • 35248873415 scopus 로고    scopus 로고
    • A practical countermeasure against address-bit differential power analysis
    • In: Walter, C.D., Koç, Ç.K., Paar, C. (eds.), Springer, Heidelberg
    • Itoh, K., Izu, T., Takenaka, M.: A Practical Countermeasure against Address-Bit differential Power Analysis. In: Walter, C.D., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 382-396. Springer, Heidelberg (2003)
    • (2003) CHES 2003. LNCS , vol.2779 , pp. 382-396
    • Itoh, K.1    Izu, T.2    Takenaka, M.3
  • 22
    • 0004794569 scopus 로고    scopus 로고
    • Chinese remaindering based cryptosystems in the presence of faults
    • Joye, M., Lenstra, A., Quisquater, J.-J.: Chinese Remaindering Based Cryptosystems in the Presence of Faults. Journal of Cryptology 12(4), 241-245 (1999)
    • (1999) Journal of Cryptology , vol.12 , Issue.4 , pp. 241-245
    • Joye, M.1    Lenstra, A.2    Quisquater, J.-J.3
  • 24
    • 38149140303 scopus 로고    scopus 로고
    • Safe-error attack on SPA-FA resistant exponentiations using a HW modular multiplier
    • In: Nam, K.-H., Rhee, G. (eds.), Springer, Heidelberg
    • Kim, C.H., Shin, J.H., Quisquater, J.-J., Lee, P.J.: Safe-error attack on SPA-FA resistant exponentiations using a HW modular multiplier. In: Nam, K.-H., Rhee, G. (eds.) ICISC 2007. LNCS, vol. 4817, pp. 273-281. Springer, Heidelberg (2007)
    • (2007) ICISC 2007. LNCS , vol.4817 , pp. 273-281
    • Kim, C.H.1    Shin, J.H.2    Quisquater, J.-J.3    Lee, P.J.4
  • 26
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • In: Wiener, M. (ed.), Springer, Heidelberg
    • Kocher, P., Ja.e, J., Jun, B.: differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388-397. Springer, Heidelberg (1999)
    • (1999) CRYPTO 1999. LNCS , vol.1666 , pp. 388-397
    • Kocher, P.1    Ja.e, J.2    Jun, B.3
  • 27
    • 84943632039 scopus 로고    scopus 로고
    • Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
    • Advances in Cryptology - CRYPTO '96
    • Kocher, P.: Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104-113. Springer, Heidelberg (1996) (Pubitemid 126106234)
    • (1996) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1109 , pp. 104-113
    • Kocher, P.C.1
  • 28
    • 0029406556 scopus 로고
    • Analysis of the sliding window techniques for exponentiation
    • Koç, Ç .: Analysis of the SlidingWindow Techniques for Exponentiation. Computer & Mathematics with applications 30(10), 17-24 (1995)
    • (1995) Computer & Mathematics with applications , vol.30 , Issue.10 , pp. 17-24
    • Koç, Ç.1
  • 30
    • 84949514743 scopus 로고    scopus 로고
    • Power analysis attacks of modular exponentiation in smartcard
    • In: Koç, Ç .K., Paar, C. (eds.), Springer, Heidelberg
    • Messerges, T., Dabbish, E., Sloan, R.: Power Analysis Attacks of Modular Exponentiation in Smartcard. In: Koç, Ç .K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 144-157. Springer, Heidelberg (1999)
    • (1999) CHES 1999. LNCS , vol.1717 , pp. 144-157
    • Messerges, T.1    Dabbish, E.2    Sloan, R.3
  • 32
    • 72749106279 scopus 로고    scopus 로고
    • Algorithms for multi-exponentiation
    • In: Vaudenay, S., Youssef, A.M. (eds.), Springer, Heidelberg
    • M̈oller, B.: Algorithms for multi-exponentiation. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol. 2259, pp. 165-180. Springer, Heidelberg (2001)
    • (2001) SAC 2001. LNCS , vol.2259 , pp. 165-180
    • M̈oller, B.1
  • 33
    • 0017930809 scopus 로고
    • METHOD FOR OBTAINING DIGITAL SIGNATURES AND PUBLIC-KEY CRYPTOSYSTEMS.
    • DOI 10.1145/359340.359342
    • Rivest, R., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21(2), 120-126 (1978) (Pubitemid 8591219)
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 34
    • 52949113084 scopus 로고    scopus 로고
    • A practical fault attack on square and multiply
    • In: Breveglieri, L., Gueron, S., Koren, I., Naccache, D., Seifert, J.-P. (eds.), Los Alamitos
    • Schmidt, J., Herbst, C.: A Practical Fault Attack on Square and Multiply. In: Breveglieri, L., Gueron, S., Koren, I., Naccache, D., Seifert, J.-P. (eds.) FDTC 2008, pp. 53-58. IEEE Computer Society, Los Alamitos (2008)
    • (2008) FDTC 2008, IEEE Computer Society , pp. 53-58
    • Schmidt, J.1    Herbst, C.2
  • 35
    • 33745799002 scopus 로고    scopus 로고
    • On authenticated computing and RSA-based authentication
    • DOI 10.1145/1102120.1102138, CCS 2005 - Proceedings of the 12th ACM Conference on Computer and Communications Security
    • Seifert, J.-P.: On Authenticated Computing and RSA-based Authentication. In: Atluri, V., Meadows, C., Juels, A. (eds.) ACM CCS 2005, pp. 122-127. ACM Press, New York (2005) (Pubitemid 44021996)
    • (2005) Proceedings of the ACM Conference on Computer and Communications Security , pp. 122-127
    • Seifert, J.-P.1
  • 38
    • 51049111850 scopus 로고    scopus 로고
    • RSA with CRT: A new cost-efective solution to thwart fault attacks
    • In: Oswald, E., Rohatgi, P. (eds.), Springer, Heidelberg
    • Vigilant, D.: RSA with CRT: A new cost-efective solution to thwart fault attacks. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 130-145. Springer, Heidelberg (2008)
    • (2008) CHES 2008. LNCS , vol.5154 , pp. 130-145
    • Vigilant, D.1
  • 39
    • 33747617679 scopus 로고    scopus 로고
    • Cryptanalysis of a provable secure CRT-RSA algorithm
    • In: P.tzmann, B., Liu, P. (eds.), ACM Press, New York
    • Wagner, D.: Cryptanalysis of a Provable Secure CRT-RSA Algorithm. In: P.tzmann, B., Liu, P. (eds.) CCS 2004, pp. 82-91. ACM Press, New York (2004)
    • (2004) CCS 2004 , pp. 82-91
    • Wagner, D.1
  • 40
    • 0034276289 scopus 로고    scopus 로고
    • Checking before output may not be enough against fault-based cryptanalysis
    • DOI 10.1109/12.869328
    • Yen, S.-M., Joye, M.: Checking Before Output Not Be Enough Against Fault-Based Cryptanalysis. IEEE Transactions on Computers 49(9), 967-970 (2000) (Pubitemid 30959512)
    • (2000) IEEE Transactions on Computers , vol.49 , Issue.9 , pp. 967-970
    • Yen, S.-M.1    Joye, M.2
  • 41
    • 84949979593 scopus 로고    scopus 로고
    • A countermeasure against one physical cryptanalysis may benefit another attack
    • In: Kim, K.-c. (ed.), Springer, Heidelberg
    • Yen, S.-M., Kim, S.-J., Lim, S.-G., Moon, S.-J.: A countermeasure against one physical cryptanalysis may benefit another attack. In: Kim, K.-c. (ed.) ICISC 2001. LNCS, vol. 2288, pp. 414-427. Springer, Heidelberg (2002)
    • (2002) ICISC 2001. LNCS , vol.2288 , pp. 414-427
    • Yen, S.-M.1    Kim, S.-J.2    Lim, S.-G.3    Moon, S.-J.4
  • 42
    • 0038374937 scopus 로고    scopus 로고
    • RSA speedup with residue number system immune against hardware fault cryptanalysis
    • Yen, S.-M., Kim, S.-J., Lim, S.-G., Moon, S.-J.: RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis. IEEE Transactions on Computers 52(4), 461-472 (2003)
    • (2003) IEEE Transactions on Computers , vol.52 , Issue.4 , pp. 461-472
    • Yen, S.-M.1    Kim, S.-J.2    Lim, S.-G.3    Moon, S.-J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.