Attacking RSA-CRT signatures with faults on montgomery multiplication

6Citations
Citations of this article
29Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In this paper, we present several efficient fault attacks against implementations of RSA-CRT signatures that use modular exponentiation algorithms based on Montgomery multiplication. They apply to any padding function, including randomized paddings, and as such are the first fault attacks effective against RSA-PSS. The new attacks work provided that a small register can be forced to either zero, or a constant value, or a value with zero high-order bits. We show that these models are quite realistic, as such faults can be achieved against many proposed hardware designs for RSA signatures. © 2012 International Association for Cryptologic Research.

Cite

CITATION STYLE

APA

Fouque, P. A., Guillermin, N., Leresteux, D., Tibouchi, M., & Zapalowicz, J. C. (2012). Attacking RSA-CRT signatures with faults on montgomery multiplication. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7428 LNCS, pp. 447–462). https://doi.org/10.1007/978-3-642-33027-8_26

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free