메뉴 건너뛰기




Volumn 4, Issue 3, 2014, Pages 173-185

A formal proof of countermeasures against fault injection attacks on CRT-RSA

Author keywords

BellCoRe (Bell Communications Research) attack; CRT (Chinese Remainder Theorem); Fault injection; Formal proof; OCaml; RSA (Rivest, Shamir, Adleman)

Indexed keywords

NETWORK SECURITY;

EID: 84906218019     PISSN: 21908508     EISSN: 21908516     Source Type: Journal    
DOI: 10.1007/s13389-013-0065-3     Document Type: Article
Times cited : (20)

References (25)
  • 1
    • 35248880671 scopus 로고    scopus 로고
    • Fault attacks on RSA with CRT: concrete results and practical countermeasures
    • In: Kaliski, B. S., Jr., Koç, C. K., Paar, C. (eds.), Springer, Berlin
    • Aumüller, C., Bier, P., Fischer, W., Hofreiter, P., Seifert, J.-P.: Fault attacks on RSA with CRT: concrete results and practical countermeasures. In: Kaliski, B. S., Jr., Koç, C. K., Paar, C. (eds.) CHES. Lecture Notes in Computer Science, vol. 2523, pp. 260-275. Springer, Berlin (2002).
    • (2002) CHES. Lecture Notes in Computer Science , vol.2523 , pp. 260-275
    • Aumüller, C.1    Bier, P.2    Fischer, W.3    Hofreiter, P.4    Seifert, J.-P.5
  • 2
    • 84906229243 scopus 로고    scopus 로고
    • A survey of differential fault analysis against classical RSA implementations
    • In: Joye, M., Tunstall, M. (eds.), Springer, Berlin
    • Berzati, A., Canovas-Dumas, C., Goubin, L.: A survey of differential fault analysis against classical RSA implementations. In: Joye, M., Tunstall, M. (eds.) Fault Analysis in Cryptography, Information Security and Cryptography, pp. 111-124. Springer, Berlin (2012).
    • (2012) Fault Analysis in Cryptography, Information Security and Cryptography , pp. 111-124
    • Berzati, A.1    Canovas-Dumas, C.2    Goubin, L.3
  • 3
    • 51849097235 scopus 로고    scopus 로고
    • Bug attacks
    • Springer, Santa Barbara
    • Biham, E., Carmeli, Y., Shamir, A.: Bug attacks. In: CRYPTO. LNCS, vol. 5157, pp. 221-240. Springer, Santa Barbara (2008).
    • (2008) CRYPTO. LNCS , vol.5157 , pp. 221-240
    • Biham, E.1    Carmeli, Y.2    Shamir, A.3
  • 4
    • 84957355967 scopus 로고    scopus 로고
    • On the importance of checking cryptographic protocols for faults
    • Springer, Konstanz, doi: 10. 1007/3-540-69053-0_4
    • Boneh, D., DeMillo, R. A., Lipton, R. J.: On the importance of checking cryptographic protocols for faults. In: Proceedings of Eurocrypt'97. LNCS, vol. 1233, pp. 37-51. Springer, Konstanz (1997). doi: 10. 1007/3-540-69053-0_4.
    • (1997) Proceedings of Eurocrypt'97. LNCS , vol.1233 , pp. 37-51
    • Boneh, D.1    DeMillo, R.A.2    Lipton, R.J.3
  • 6
    • 14844326209 scopus 로고    scopus 로고
    • A new CRT-RSA algorithm secure against Bellcore attacks
    • In: Jajodia, S., Atluri, V., Jaeger, T. (eds.), ACM
    • Blömer, J., Otto, M., Seifert, J. P.: A new CRT-RSA algorithm secure against Bellcore attacks. In: Jajodia, S., Atluri, V., Jaeger, T. (eds.) ACM Conference on Computer and Communications Security, pp. 311-320. ACM (2003).
    • (2003) ACM Conference on Computer and Communications Security , pp. 311-320
    • Blömer, J.1    Otto, M.2    Seifert, J.P.3
  • 7
    • 84958641478 scopus 로고    scopus 로고
    • Analysis, differential fault, of secret key cryptosystems
    • Springer, Santa Barbara, doi: 10. 1007/BFb0052259
    • Biham, E., Shamir, A.: Analysis, differential fault, of secret key cryptosystems. In: CRYPTO. LNCS, vol. 1294, pp. 513-525. Springer, Santa Barbara (1997). doi: 10. 1007/BFb0052259.
    • (1997) CRYPTO. LNCS , vol.1294 , pp. 513-525
    • Biham, E.1    Shamir, A.2
  • 8
    • 84887213530 scopus 로고    scopus 로고
    • Formal verification of an implementation of CRT-RSA Vigilant's algorithm
    • doi: 10. 1007/s13389-013-0049-3
    • Christofi, M., Chetali, B., Goubin, L., Vigilant, D.: Formal verification of an implementation of CRT-RSA Vigilant's algorithm. J. Cryptogr. Eng. 3(3), (2013). doi: 10. 1007/s13389-013-0049-3.
    • (2013) J. Cryptogr. Eng. , vol.3 , Issue.3
    • Christofi, M.1    Chetali, B.2    Goubin, L.3    Vigilant, D.4
  • 9
    • 77958107570 scopus 로고    scopus 로고
    • Fault attacks and countermeasures on vigilant's RSA-CRT Algorithm
    • In: Breveglieri, L., Joye, M., Koren, I., Naccache, D., Verbauwhede, I. (eds.),. IEEE Computer Society
    • Coron, J.-S., Giraud, C., Morin, N., Piret, G., Vigilant, D.: Fault attacks and countermeasures on vigilant's RSA-CRT Algorithm. In: Breveglieri, L., Joye, M., Koren, I., Naccache, D., Verbauwhede, I. (eds.) FDTC, pp. 89-96. IEEE Computer Society (2010).
    • (2010) FDTC , pp. 89-96
    • Coron, J.-S.1    Giraud, C.2    Morin, N.3    Piret, G.4    Vigilant, D.5
  • 10
    • 84875579662 scopus 로고    scopus 로고
    • Wavelet transform based pre-processing for side channel analysis
    • IEEE, Vancouver, doi: 10. 1109/MICROW. 2012. 15
    • Debande, N., Souissi, Y., Elaabid, M. A., Guilley, S., Danger, J.-L.: Wavelet transform based pre-processing for side channel analysis. In: HASP, pp. 32-38. IEEE, Vancouver (2012). doi: 10. 1109/MICROW. 2012. 15.
    • (2012) HASP , pp. 32-38
    • Debande, N.1    Souissi, Y.2    Elaabid, M.A.3    Guilley, S.4    Danger, J.-L.5
  • 11
    • 0001421451 scopus 로고
    • Number systems and arithmetic
    • Garner, H. L.: Number systems and arithmetic. Adv. Comput. 6, 131-194 (1965).
    • (1965) Adv. Comput. , vol.6 , pp. 131-194
    • Garner, H.L.1
  • 12
    • 84881516126 scopus 로고    scopus 로고
    • Provably secure concurrent error detection against differential fault analysis
    • Report 2012/552
    • Guo, X., Mukhopadhyay, D., Karri, R.: Provably secure concurrent error detection against differential fault analysis. Cryptology ePrint Archive, Report 2012/552. 2012. http://eprint. iacr. org/2012/552/.
    • (2012) Cryptology ePrint Archive
    • Guo, X.1    Mukhopadhyay, D.2    Karri, R.3
  • 14
    • 0004794569 scopus 로고    scopus 로고
    • Chinese remaindering based cryptosystems in the presence of faults
    • Joye, M., Lenstra, A. K., Quisquater, J.-J.: Chinese remaindering based cryptosystems in the presence of faults. J. Cryptol. 12(4), 241-245 (1999).
    • (1999) J. Cryptol. , vol.12 , Issue.4 , pp. 241-245
    • Joye, M.1    Lenstra, A.K.2    Quisquater, J.-J.3
  • 15
    • 77950971337 scopus 로고    scopus 로고
    • Protecting RSA against fault attacks: the embedding method
    • In: Breveglieri, L., Koren, I., Naccache, D., Oswald, E., Seifert, J.-P. (eds.), IEEE Computer Society
    • Joye, M.: Protecting RSA against fault attacks: the embedding method. In: Breveglieri, L., Koren, I., Naccache, D., Oswald, E., Seifert, J.-P. (eds.) FDTC, pp. 41-45. IEEE Computer Society (2009).
    • (2009) FDTC , pp. 41-45
    • Joye, M.1
  • 16
    • 35048825596 scopus 로고    scopus 로고
    • GCD-free algorithms for computing modular inverses
    • In: Walter, C. D., Koç, C. K., Paar, C. (eds.), Springer, Berlin
    • Joye, M., Paillier, P.: GCD-free algorithms for computing modular inverses. In: Walter, C. D., Koç, C. K., Paar, C. (eds.) CHES. Lecture Notes in Computer Science, vol. 2779, pp. 243-253. Springer, Berlin (2003).
    • (2003) CHES. Lecture Notes in Computer Science , vol.2779 , pp. 243-253
    • Joye, M.1    Paillier, P.2
  • 17
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • Springer, Berlin
    • Kocher, P. C., Jaffe, J., Jun, B.: Differential power analysis. In: Proceedings of CRYPTO'99. LNCS, vol. 1666, pp. 388-397. Springer, Berlin (1999).
    • (1999) Proceedings of CRYPTO'99. LNCS , vol.1666 , pp. 388-397
    • Kocher, P.C.1    Jaffe, J.2    Jun, B.3
  • 18
    • 79960840652 scopus 로고    scopus 로고
    • An efficient CRT-RSA algorithm secure against power and fault attacks
    • (October)
    • Kim, S.-K., Kim, T. H., Han, D.-G., Hong, S.: An efficient CRT-RSA algorithm secure against power and fault attacks. J. Syst. Softw. 84, 1660-1669 (October 2011).
    • (2011) J. Syst. Softw. , vol.84 , pp. 1660-1669
    • Kim, S.-K.1    Kim, T.H.2    Han, D.-G.3    Hong, S.4
  • 20
    • 84893953821 scopus 로고    scopus 로고
    • Formal analysis of CRT-RSA vigilant's countermeasure against the BellCoRe attack-a pledge for formal methods in the field of implementation security
    • ISBN: 978-1-4503-2649-0
    • Rauzy, P., Guilley, S.: Formal analysis of CRT-RSA vigilant's countermeasure against the BellCoRe attack-a pledge for formal methods in the field of implementation security. In: 3rd ACM SIGPLAN Program Protection and Reverse Engineering Workshop (PPREW 2014) (2014). ISBN: 978-1-4503-2649-0.
    • (2014) 3rd ACM SIGPLAN Program Protection and Reverse Engineering Workshop (PPREW 2014)
    • Rauzy, P.1    Guilley, S.2
  • 21
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest, R. L., Shamir, A., Adleman, L. M.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120-126 (1978).
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 25
    • 51049111850 scopus 로고    scopus 로고
    • RSA with CRT: a new cost-effective solution to thwart fault attacks
    • In Oswald, E., Rohatgi, P. (eds.), Springer, Berlin
    • Vigilant, D.: RSA with CRT: a new cost-effective solution to thwart fault attacks. In Oswald, E., Rohatgi, P. (eds.) CHES. Lecture Notes in Computer Science, vol. 5154, pp. 130-145. Springer, Berlin (2008).
    • (2008) CHES. Lecture Notes in Computer Science , vol.5154 , pp. 130-145
    • Vigilant, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.