Cryptanalysis of a type of CRT-based RSA algorithms

被引:2
|
作者
Qin, Bao-Dong [1 ]
Li, Ming [2 ,3 ]
Kong, Fan-Yu [2 ,3 ]
机构
[1] SW Univ Sci & Technol, Coll Comp Sci & Technol, Mianyang 621010, Peoples R China
[2] Shandong Univ, Inst Network Secur, Jinan 250100, Peoples R China
[3] Key Lab Cryptog Technol & Informat Secur, Jinan 250100, Peoples R China
关键词
Chinese remainder theorem; RSA; BOS scheme; cryptanalysis; fault attack; LLL;
D O I
10.1007/s11390-008-9123-1
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
It is well known that the Chinese Remainder Theorem (CRT) can greatly improve the performances of RSA cryptosystem in both running times and memory requirements. However, if the implementation of CRT-based RSA is careless, an attacker can reveal some secret information by exploiting hardware fault cryptanalysis. In this paper, we present some fault attacks on a type of CRT-RSA algorithms namely BOS type schemes including the original BOS scheme proposed by Blomer, Otto, and Seifert at CCS 2003 and its modified scheme proposed by Liu et al. at DASC 2006. We first demonstrate that if some special signed messages such as m = 0, +/- 1are dealt carelessly, they can be exploited by an adversary to completely break the security of both the BOS scheme and Liu et al.'s scheme. Then we present a new permanent fault attack on the BOS scheme with a success probability about 25%. Lastly, we propose a polynomial time attack on Liu et al.'s CRT-RSA algorithm, which combines physical fault injection and lattice reduction techniques when the public exponent is short.
引用
收藏
页码:214 / 221
页数:8
相关论文
共 50 条
  • [1] Cryptanalysis of a Type of CRT-Based RSA Algorithms
    Bao-Dong Qin
    Ming Li
    Fan-Yu Kong
    Journal of Computer Science and Technology, 2008, 23 : 214 - 221
  • [2] Cryptanalysis of a Type of CRT-Based RSA Algorithms
    秦宝东
    李明
    孔凡玉
    JournalofComputerScience&Technology, 2008, (02) : 214 - 221
  • [3] Security analysis of CRT-based cryptosystems
    Okeya K.
    Takagi T.
    International Journal of Information Security, 2006, 5 (3) : 177 - 185
  • [4] Security analysis of CRT-based cryptosystems
    Okeya, K
    Takagi, T
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2004, 3089 : 383 - 397
  • [5] Generalized cryptanalysis of small CRT-exponent RSA
    Peng, Liqiang
    Takayasu, Atsushi
    THEORETICAL COMPUTER SCIENCE, 2019, 795 : 432 - 458
  • [6] Cryptanalysis of unbalanced RSA with small CRT-exponent
    May, A
    ADVANCES IN CRYPTOLOGY - CRYPTO 2002, PROCEEDINGS, 2002, 2442 : 242 - 256
  • [7] Notes on CRT-based robust frequency estimation
    Xiao, Hanshen
    Xiao, Guoqiang
    SIGNAL PROCESSING, 2017, 133 : 13 - 17
  • [8] CRT-based fully homomorphic encryption over the integers
    Cheon, Jung Hee
    Kim, Jinsu
    Lee, Moon Sung
    Yun, Aaram
    INFORMATION SCIENCES, 2015, 310 : 149 - 162
  • [9] On modular (CRT-based) secret sharing
    Shenets, Nikolay N.
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2024, 20 (04): : 765 - 782
  • [10] Lattice-based cryptanalysis of RSA-type cryptosystems: a bibliometric analysis
    Zheng, Mengce
    Kang, Hao
    CYBERSECURITY, 2024, 7 (01):