Cryptanalysis of a type of CRT-based RSA algorithms

被引:2
|
作者
Qin, Bao-Dong [1 ]
Li, Ming [2 ,3 ]
Kong, Fan-Yu [2 ,3 ]
机构
[1] SW Univ Sci & Technol, Coll Comp Sci & Technol, Mianyang 621010, Peoples R China
[2] Shandong Univ, Inst Network Secur, Jinan 250100, Peoples R China
[3] Key Lab Cryptog Technol & Informat Secur, Jinan 250100, Peoples R China
关键词
Chinese remainder theorem; RSA; BOS scheme; cryptanalysis; fault attack; LLL;
D O I
10.1007/s11390-008-9123-1
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
It is well known that the Chinese Remainder Theorem (CRT) can greatly improve the performances of RSA cryptosystem in both running times and memory requirements. However, if the implementation of CRT-based RSA is careless, an attacker can reveal some secret information by exploiting hardware fault cryptanalysis. In this paper, we present some fault attacks on a type of CRT-RSA algorithms namely BOS type schemes including the original BOS scheme proposed by Blomer, Otto, and Seifert at CCS 2003 and its modified scheme proposed by Liu et al. at DASC 2006. We first demonstrate that if some special signed messages such as m = 0, +/- 1are dealt carelessly, they can be exploited by an adversary to completely break the security of both the BOS scheme and Liu et al.'s scheme. Then we present a new permanent fault attack on the BOS scheme with a success probability about 25%. Lastly, we propose a polynomial time attack on Liu et al.'s CRT-RSA algorithm, which combines physical fault injection and lattice reduction techniques when the public exponent is short.
引用
收藏
页码:214 / 221
页数:8
相关论文
共 50 条
  • [41] Cryptanalysis of RSA for a special case with d>e
    LUO Ping
    Science China(Information Sciences), 2009, (04) : 609 - 616
  • [42] Generalized cryptanalysis of RSA with small public exponent
    Mengce ZHENG
    Honggang HU
    Zilong WANG
    ScienceChina(InformationSciences), 2016, 59 (03) : 97 - 106
  • [43] Cryptanalysis of RSA-type cryptosystems based on Lucas sequences, Gaussian integers and elliptic curves
    Bunder, Martin
    Nitaj, Abderrahmane
    Susilo, Willy
    Tonien, Joseph
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 40 : 193 - 198
  • [44] Efficient CRT-based residue-to-binary converter for the arbitrary moduli set
    Chen JianWen
    Yao RuoHe
    SCIENCE CHINA-INFORMATION SCIENCES, 2011, 54 (01) : 70 - 78
  • [45] CRYPTANALYSIS OF RSA WITH CONSTRAINED KEYS
    Nitaj, Abderrahmane
    INTERNATIONAL JOURNAL OF NUMBER THEORY, 2009, 5 (02) : 311 - 325
  • [46] On an attack on RSA with small CRT-exponents
    HAN LiDong 1
    2 School of Mathematics
    3 Institute for Advanced Study
    4 Department of Electrical Engineering and Computer Science
    Science China(Information Sciences), 2010, 53 (08) : 1511 - 1518
  • [47] On an attack on RSA with small CRT-exponents
    Han LiDong
    Wang XiaoYun
    Xu GuangWu
    SCIENCE CHINA-INFORMATION SCIENCES, 2010, 53 (08) : 1511 - 1518
  • [48] On an attack on RSA with small CRT-exponents
    LiDong Han
    XiaoYun Wang
    GuangWu Xu
    Science China Information Sciences, 2010, 53 : 1511 - 1518
  • [49] Cryptanalysis of a verifiably committed signature scheme based on CPS and RSA
    Cathalo, J
    Libert, B
    Quisquater, JJ
    INFORMATION SECURITY, PROCEEDINGS, 2004, 3225 : 52 - 60
  • [50] A CRT-based verifiable secret sharing scheme secure against unbounded adversaries
    Ersoy, Oguzhan
    Pedersen, Thomas Brochmann
    Kaya, Kamer
    Selcuk, Ali Aydin
    Anarim, Emin
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4416 - 4427