Paper 2010/054

An Improved Timing Attack with Error Detection on RSA-CRT

Cai-Sen CHEN, Tao Wang, and Jun-Jian Tian


Several types of timing attacks have been published, but they are either in theory or hard to be taken into practice. In order to improve the feasibility of attack, this paper proposes an advance timing attack scheme on RSA-CRT with T-test statistical tool. Similar timing attacks have been presented, such as BB-Attack and Shindler’s attack, however none of them applied statistical tool in their methods with such efficiency, and showed the complete recovery in practice by attacking on RSA-CRT. With T-test, we enlarge the 0-1 gap, reduce the neighborhood size and improve the precision of decision. However, the most contribution of this paper is that our algorithm has an error detection property which can detect the erroneous decision of guessing qk and correct it. We could make the success rate of recovering q to be 100% indeed for interprocess timing attack, recovery 1024bits RSA key completely in practice.

Note: Supported by the National Natural Science Foundation of China under Grant No. 60772082; the Natural Science Foundation of Hebei Province under Grant No. 08M010.

Available format(s)
Publication info
Published elsewhere. Unknown where it was published
Timing attackRSAT-testMontgomery reductionChinese Remainder TheoremError detection
Contact author(s)
caisenchen @ 163 com
2010-03-05: revised
2010-02-08: received
See all versions
Short URL
Creative Commons Attribution


      author = {Cai-Sen CHEN and Tao Wang and Jun-Jian Tian},
      title = {An Improved Timing Attack with Error Detection on RSA-CRT},
      howpublished = {Cryptology ePrint Archive, Paper 2010/054},
      year = {2010},
      note = {\url{}},
      url = {}
Note: In order to protect the privacy of readers, does not use cookies or embedded third party content.