A Third is All You Need: Extended Partial Key Exposure Attack on CRT-RSA with Additive Exponent Blinding

被引:4
作者
Zhou, Yuanyuan [1 ]
van de Pol, Joop
Yu, Yu [2 ,3 ]
Standaert, Francois-Xavier [1 ]
机构
[1] UCLouvain, ICTEAM Inst, Crypto Grp, Louvain La Neuve, Belgium
[2] Shanghai Jiao Tong Univ, Shanghai 200240, Peoples R China
[3] Shanghai Qi Zhi Inst, 701 Yunjin Rd, Shanghai 200232, Peoples R China
来源
ADVANCES IN CRYPTOLOGY- ASIACRYPT 2022, PT IV | 2022年 / 13794卷
基金
中国国家自然科学基金;
关键词
Partial key exposure; Additive blinding; CRT-RSA; Coppersmith method; POWER ATTACKS; TIMING ATTACK; SMALL ROOT; EQUATIONS;
D O I
10.1007/978-3-031-22972-5_18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
At Eurocrypt 2022, May et al. proposed a partial key exposure (PKE) attack on CRT-RSA that efficiently factors N knowing only a 1/3-fraction of either most significant bits (MSBs) or least significant bits (LSBs) of private exponents d(p) and d(q) for public exponent e approximate to N-1/12. In practice, PKE attacks typically rely on the side-channel leakage of these exponents, while a side-channel resistant implementation of CRTRSA often uses additively blinded exponents d(p)' = d(p) + r(p)(p - 1) and d(q)' = d(q) + r(q)(q - 1) with unknown random blinding factors r(p) and r(q), which makes PKE attacks more challenging. Motivated by the above, we extend the PKE attack of May et al. to CRT-RSA with additive exponent blinding. While admitting r(p)e is an element of(0, N-1/4), our extended PKE works ideally when r(p)e approximate to N-1/12, in which case the entire private key can be recovered using only 1/3 known MSBs or LSBs of the blinded CRT exponents d(p)' and d(q)'. Our extended PKE follows their novel two-step approach to first compute the key-dependent constant k ' (ed(p)' = 1 + k ' (p - 1), ed(q)' = 1 + l ' (q - 1)), and then to factor N by computing the root of a univariate polynomial modulo k ' p. We extend their approach as follows. For the MSB case, we propose two options for the first step of the attack, either by obtaining a single estimate k ' l ' and calculating k ' via factoring, or by obtaining multiple estimates k ' l(1)', . . . , k ' l(z)' and calculating k ' probabilistically via GCD. For the LSB case, we extend their approach by constructing a different univariate polynomial in the second step of the LSB attack. A formal analysis shows that our LSB attack runs in polynomial time under the standard Coppersmith-type assumption, while our MSB attack either runs in sub-exponential time with a reduced input size (the problem is reduced to factor a number of size e(2)r(p)r(q) approximate to N-1/6) or in probabilistic polynomial time under a novel heuristic assumption. Under the settings of the most common key sizes (1024-bit, 2048-bit, and 3072-bit) and blinding factor lengths (32-bit, 64-bit, and 128-bit), our experiments verify the validity of the Coppersmith-type assumption and our own assumption, as well as the feasibility of the factoring step. To the best of our knowledge, this is the first PKE on CRT-RSA with experimentally verified effectiveness against 128-bit unknown exponent blinding factors. We also demonstrate an application of the proposed PKE attack using real partial side-channel key leakage targeting a Montgomery Ladder exponentiation CRT implementation.
引用
收藏
页码:508 / 536
页数:29
相关论文
共 65 条
[1]   On Bounded Distance Decoding with Predicate: Breaking the "Lattice Barrier" for the Hidden Number Problem [J].
Albrecht, Martin R. ;
Heninger, Nadia .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2021, PT I, 2021, 12696 :528-558
[2]  
Aono Y, 2009, LECT NOTES COMPUT SC, V5443, P34
[3]  
Bauer Sven, 2012, Constructive Side-Channel Analysis and Secure Design. Proceedings Third International Workshop, COSADE 2012, P82, DOI 10.1007/978-3-642-29912-4_7
[4]  
bbuhrow: YAFU, 2022, YAFU AUT INT FACT VE
[5]  
Blömer J, 2003, LECT NOTES COMPUT SC, V2729, P27
[6]  
Boneh D, 1998, LECT NOTES COMPUT SC, V1514, P25
[7]  
Bos J., 2021, COMPUTATIONAL CRYPTO, DOI [10.1017/9781108854207, DOI 10.1017/9781108854207]
[8]  
Botan, 2022, BOT CRYPT TLS MOD C
[9]   Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations [J].
Bronchain, Olivier ;
Hendrickx, Julien M. ;
Massart, Clement ;
Olshevsky, Alex ;
Standaert, Francois-Xavier .
ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT 1, 2019, 11692 :713-737
[10]  
BSI, 2013, AIS46 BSI RSA SCA