Paper 2016/238
Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT
Ágnes Kiss, Juliane Krämer, Pablo Rauzy, and Jean-Pierre Seifert
Abstract
In this work, we analyze all existing RSA-CRT countermeasures against the Bellcore attack that use binary self-secure exponentiation algorithms. We test their security against a powerful adversary by simulating fault injections in a fault model that includes random, zeroing, and skipping faults at all possible fault locations. We find that most of the countermeasures are vulnerable and do not provide sufficient security against all attacks in this fault model. After investigating how additional measures can be included to counter all possible fault injections, we present three countermeasures which prevent both power analysis and many kinds of fault attacks.
Metadata
- Available format(s)
- Category
- Public-key cryptography
- Publication info
- Published elsewhere. Minor revision. COSADE 2016
- Keywords
- Bellcore attackRSA-CRTmodular exponentiationpower analysis
- Contact author(s)
- agnes kiss @ crisp-da de
- History
- 2016-03-03: received
- Short URL
- https://ia.cr/2016/238
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2016/238, author = {Ágnes Kiss and Juliane Krämer and Pablo Rauzy and Jean-Pierre Seifert}, title = {Algorithmic Countermeasures Against Fault Attacks and Power Analysis for {RSA}-{CRT}}, howpublished = {Cryptology {ePrint} Archive, Paper 2016/238}, year = {2016}, url = {https://eprint.iacr.org/2016/238} }