Cryptology ePrint Archive: Report 2013/506
A Formal Proof of Countermeasures Against Fault Injection Attacks on CRT-RSA
Pablo Rauzy and Sylvain Guilley
Abstract: In this article, we describe a methodology that aims at either breaking or proving the security of CRT-RSA implementations against fault injection attacks.
In the specific case-study of the BellCoRe attack,
our work bridges a gap between formal proofs and implementation-level attacks.
We apply our results to three implementations of CRT-RSA,
namely the unprotected one, that of Shamir, and that of Aumüller \etal
Our findings are that many attacks are possible on both the unprotected and the Shamir implementations,
while the implementation of Aumüller \etal is resistant to all single-fault attacks.
It is also resistant to double-fault attacks if we consider the less powerful threat-model of its authors.
Category / Keywords: RSA, CRT, fault injection, BellCoRe attack, formal proof, OCaml
Date: received 16 Aug 2013, last revised 5 Dec 2013
Contact author: rauzy at enst fr
Available format(s): PDF | BibTeX Citation
Note: Paper originally published at PROOFS 2013. This is a new version of the paper with fixes and updates corresponding to the extended version which will appear in a PROOFS Special Issue of JCEN.
Version: 20131205:103257 (All versions of this report)
Short URL: ia.cr/2013/506
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]