A secure exponentiation algorithm resistant to a combined attack on RSA implementation

被引:8
|
作者
Kim, HyeongDong [1 ]
Choi, YongJe [2 ]
Choi, DooHo [2 ]
Ha, JaeCheol [1 ]
机构
[1] Hoseo Univ, Dept Informat Secur, Asan 336795, Chungnam, South Korea
[2] Elect & Telecommun Res Inst, Daejeon 305700, South Korea
关键词
CRT-RSA algorithm; side-channel attack; combined attack; exponentiation; fault attack; 94A60; 14G50; 68P25; POWER ANALYSIS; CRT;
D O I
10.1080/00207160.2014.935353
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Because two types of side-channel attacks, namely passive information leakages and active fault injections, are considered separate implementation threats to cryptographic modules, most countermeasures against these attacks have been independently developed. However, Amiel et al. demonstrated that a fault injection combined with a simple power analysis (SPA) can break such a classical Rivest, Shamir, and Adelman (RSA) system implementation. In this paper, we show that this combined attack (CA) can be applied to the Boscher, Naciri, and Prouff algorithm, which is an SPA/fault attack (FA)-resistant exponentiation method for RSA implementation. Furthermore, this paper proposes a novel exponentiation algorithm resistant to power analysis and an FA as well as to the CA. The proposed exponentiation algorithm can be employed for secure Chinese remainder theorem-RSA implementation. In addition, the paper presents some experimental results of an SPA under the assumption of a successful fault injection.
引用
收藏
页码:258 / 272
页数:15
相关论文
共 34 条
  • [21] An efficient CRT-RSA algorithm secure against power and fault attacks
    Kim, Sung-Kyoung
    Kim, Tae Hyun
    Han, Dong-Guk
    Hong, Seokhie
    JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (10) : 1660 - 1669
  • [22] Fault Attack on an Improved CRT-RSA algorithm with the Modulus Chaining Method
    Kong, Fanyu
    Zhou, Dashui
    Jiang, Yali
    Shang, Jianwei
    Yu, Jia
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 866 - 869
  • [23] A side-channel attack on a masked IND-CCA secure saber KEM implementation
    Ngo K.
    Dubrova E.
    Guo Q.
    Johansson T.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021, 2021 (04): : 676 - 707
  • [24] Practical chosen-message CPA attack on message blinding exponentiation algorithm and its efficient countermeasure
    Wang, Hui
    Guo, Wei
    Wei, Jizeng
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2018, 21 (01): : 201 - 217
  • [25] Provably secure countermeasure resistant to several types of power attack for ECC
    INFORMATION SECURITY APPLICATIONS, 2007, 4867 : 333 - 344
  • [26] Practical chosen-message CPA attack on message blinding exponentiation algorithm and its efficient countermeasure
    Hui Wang
    Wei Guo
    Jizeng Wei
    World Wide Web, 2018, 21 : 201 - 217
  • [27] A Combined Countermeasure Against Side-Channel and Fault Attack with Threshold Implementation Technique
    Jiao, Zhipeng
    Chen, Hua
    Feng, Jingyi
    Kuang, Xiaoyun
    Yang, Yiwei
    Li, Haoyuan
    Fan, Limin
    CHINESE JOURNAL OF ELECTRONICS, 2023, 32 (02) : 199 - 208
  • [28] Tate pairing algorithm resistant to fault attack over binary field
    Chai Jiajing
    Gu Haihua
    INFORMATION SCIENCE AND MANAGEMENT ENGINEERING, VOLS 1-3, 2014, 46 : 887 - 894
  • [29] Efficient Combined Algorithm for Multiplication and Squaring for Fast Exponentiation over Finite Fields GF(2m)
    Kim, Kee-Won
    Lee, Hyun-Ho
    Kim, Seung-Hoon
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON EMERGING DATABASES: TECHNOLOGIES, APPLICATIONS, AND THEORY, 2018, 461 : 50 - 57
  • [30] Chosen Plaintext Combined Attack against SM4 Algorithm
    Rao, Jintao
    Cui, Zhe
    APPLIED SCIENCES-BASEL, 2022, 12 (18):