Paper 2014/559

Countermeasures Against High-Order Fault-Injection Attacks on CRT-RSA

Pablo Rauzy and Sylvain Guilley

Abstract

In this paper we study the existing CRT-RSA countermeasures against fault-injection attacks. In an attempt to classify them we get to achieve deep understanding of how they work. We show that the many countermeasures that we study (and their variations) actually share a number of common features, but optimize them in different ways. We also show that there is no conceptual distinction between test-based and infective countermeasures and how either one can be transformed into the other. Furthermore, we show that faults on the code (skipping instructions) can be captured by considering only faults on the data. These intermediate results allow us to improve the state of the art in several ways: (a) we fix an existing and that was known to be broken countermeasure (namely the one from Shamir); (b) we drastically optimize an existing countermeasure (namely the one from Vigilant) which we reduce to 3 tests instead of 9 in its original version, and prove that it resists not only one fault but also an arbitrary number of randomizing faults; (c) we also show how to upgrade countermeasures to resist any given number of faults: given a correct first-order countermeasure, we present a way to design a provable high-order countermeasure (for a well-defined and reasonable fault model). Finally, we pave the way for a generic approach against fault attacks for any modular arithmetic computations, and thus for the automatic insertion of countermeasures.

Note: Add new section about the limitations of our modelization.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Published elsewhere. Minor revision. FDTC 2014
DOI
10.1109/FDTC.2014.17
Keywords
RSACRTfault injectionBellCoRe attackhigh order
Contact author(s)
rauzy @ enst fr
History
2015-01-20: last of 5 revisions
2014-07-18: received
See all versions
Short URL
https://ia.cr/2014/559
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2014/559,
      author = {Pablo Rauzy and Sylvain Guilley},
      title = {Countermeasures Against High-Order Fault-Injection Attacks on {CRT}-{RSA}},
      howpublished = {Cryptology {ePrint} Archive, Paper 2014/559},
      year = {2014},
      doi = {10.1109/FDTC.2014.17},
      url = {https://eprint.iacr.org/2014/559}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.