Fault attacks against EMV signatures

24Citations
Citations of this article
36Readers
Mendeley users who have this article in their library.
Get full text

Abstract

At CHES 2009, Coron, Joux, Kizhvatov, Naccache and Paillier (CJKNP) exhibited a fault attack against rsa signatures with partially known messages. This fault attack allows factoring the public modulus N. While the size of the unknown message part (UMP) increases with the number of faulty signatures available, the complexity of CJKNP's attack increases exponentially with the number of faulty signatures. This paper describes a simpler attack, whose complexity remains polynomial in the number of faults; consequently, the new attack can handle much larger UMPs. The new technique can factor N in a fraction of a second using ten faulty EMV signatures - a target beyond CJKNP's reach. We also show how to apply the attack even when N is unknown, a frequent situation in real-life attacks. © 2010 Springer-Verlag.

Cite

CITATION STYLE

APA

Coron, J. S., Naccache, D., & Tibouchi, M. (2010). Fault attacks against EMV signatures. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5985 LNCS, pp. 208–220). https://doi.org/10.1007/978-3-642-11925-5_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free