How Secure is Exponent-blinded RSA–CRT with Sliding Window Exponentiation?

被引:0
作者
Ueno R. [1 ]
Homma N. [1 ]
机构
[1] Tohoku University, 2–1–1 Katahira, Aoba-ku, Miyagi, Sendai-shi
来源
IACR Transactions on Cryptographic Hardware and Embedded Systems | 2023年 / 2023卷 / 02期
基金
日本学术振兴会;
关键词
Cache attack; Exponent blinding; Partial key exposure attack; RSA–CRT; Side-channel attack; Simple power analysis; Sliding window exponentiation;
D O I
10.46586/tches.v2023.i2.241-269
中图分类号
学科分类号
摘要
This paper presents the first security evaluation of exponent-blinded RSA– CRT implementation with sliding window exponentiation against cache attacks. Our main contributions are threefold. (1) We demonstrate an improved cache attack using Flush+Reload on RSA–CRT to estimate the squaring–multiplication operational sequence. The proposed method can estimate a correct squaring–multiplication sequence from one Flush+Reload trace, while the existing Flush+Reload attacks always contain errors in the sequence estimation. This is mandatory for the subsequent steps in the proposed attack. (2) We present a new and first partial key exposure attack on exponent-blinded RSA–CRT with a random-bit leak. The proposed attack first estimates a random mask for blinding exponent using a modification of the Schindler–Wiemers continued fraction attack, and then recovers the secret key using an extension of the Heninger–Shacham branch-and-prune attack. We experimentally show that the proposed attack on RSA–CRT using a practical window size of 5 with 16-, 32-, and 64-bit masks is carried out with complexity of 225.6, 267.7, and 2161, respectively. (3) We then investigate the tradeoffs between mask bit length and implementation performance. The computational cost of exponent-blinded RSA–CRT using a sliding window with a 32-and 64-bit mask are 15% and 10% faster than that with a 128-bit mask, respectively, as we confirmed that 32-and 64-bit masks are sufficient to defeat the proposed attack. Our source code used in the experiment is publicly available. © 2023, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:241 / 269
页数:28
相关论文
共 50 条
  • [1] Allan Thomas, Brumley Billy Bob, Falkner Katrina, van de Pol Joop, Yarom Yuval, Amplifying side channels through performance degradation, Annual Computer Security Applications Conference, pp. 422-435, (2016)
  • [2] Aono Yoshinori, A new lattice construction for partial key exposure attack for RSA, Public Key Cryptography—PKC 2000, volume 5443 of Lecture Notes in Computer Science, pp. 34-53, (2009)
  • [3] Bauer Sven, Attacking exponent blinding in RSA without CRT, International Workshop on Constructive Side-Channel Analysis and Secure Design, volume 7275 of Lecture Notes in Computer Science, pp. 82-88, (2012)
  • [4] Bernstein Daniel J., Breitner Joachim, Genkin Daniel, Bruin-derink Leon Groot, Heninger Nadia, Lange Tanja, van Vredendaal Christine, Yarom Yuval, Sliding right into disaster: Left-to-right sliding windows leak, International Conference on Cryptographic Hardware and Embedded Systems, volume 10529 of Lecture Notes in Computer Science, (2017)
  • [5] Boneh Dan, Durfee Glenn, Frankel Yair, An attack on RSA given a small fraction of the private key bits, Advances in Cryptology—ASIACRYPT 1997, volume 1514 of Lecture Notes in Computer Seience, pp. 25-34, (1998)
  • [6] Bauer Aurelie, Jaulmes Eliane, Correlation analysis against protected SFM implementations of RSA, Progress in Cryptology—INDOCRYPT 2013, volume 8250 of Lecture Notes in Computer Science, pp. 98-115, (2013)
  • [7] Blomer Johannes, May Alexander, New partial key exposure attacks on RSA, Advances in Cryptology—CRYPTO 2003, volume 2729 of Lecture Notes in Computer Seience, pp. 27-43, (2003)
  • [8] Breitner Joachim, More on dliding right, (2017)
  • [9] Clavier Christophe, Fiex Benoit, Gegnerot Georges, Roussellet Mylene, Verneuil Vincent, Horizontal correlation analysis on exponentiation, International Conference on Information and Communications Security, volume 6476 of Lecture Notes in Computer Science, pp. 46-61, (2010)
  • [10] Cimato Stelvio, Mella Silvia, Susella Ruggero, New results for partial key exposure on RSA with exponent blinding, International Joint Conference on e-Business and Telecommunications, (2015)