Cryptanalysis of two protocols for RSA with CRT based on fault infection

17Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The technique of RSA private computation speedup by using Chinese Remainder Theorem (CRT) is well known and has already been widely employed in almost all RSA implementations. A recent CRT-based factorization attack exploiting hardware fault has received growing attention because of its potential vulnerability on most existing implementations. In this attack any single erroneous computation will make the RSA system be vulnerable to factorizing the public modulus. Recently, two hardware fault immune protocols for CRT speedup on RSA private computation were reported based on the concept of fault infective computation. A special property of these two protocols is that they do not assume the existence of totally fault free and tamper free comparison operation within the machine in order to enhance the reliability. However, it will be shown in this paper that these two protocols are still vulnerable to a potential computational fault attack on an auxiliary process that was not considered in the usual CRT-based factorization attack. © Springer-Verlag Berlin Heidelberg 2006.

Cite

CITATION STYLE

APA

Yen, S. M., Kim, D., & Moon, S. J. (2006). Cryptanalysis of two protocols for RSA with CRT based on fault infection. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4236 LNCS, pp. 53–61). Springer Verlag. https://doi.org/10.1007/11889700_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free