Is it wise to publish your public RSA keys?

4Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Only very recently, the study of introducing faults into the public-key elements of the RSA signature scheme was initiated. Following the seminal work of Seifert on fault inductions during the RSA signature verification, Brier, Chevallier-Mames, Ciet, and Clavier considered in a recent paper the signature counterpart and showed how to recover the private exponent - even with absolutely no knowledge of the faults behavior, Consequently, this paper reconsiders the RSA signature verification and proposes two embassaring simple new fault attacks against the RSA verification process. Despite their trivial nature, both of our methods bear heavy practical consequences. While the first new attack of our methods simply eliminates the "somehow cumbersome" and subtle mathematical two-phase attack analysis of Seifert's attack, the second methodology removes the so called "one-shot success" of Seifert's attack and paves the way for a permanent and universal "mass-market" RSA signature forgery. Motivated by the obvious security threats through tampering attacks during the RSA verification process we will also consider some heuristic but practical countermeasures. © Springer-Verlag Berlin Heidelberg 2006.

Cite

CITATION STYLE

APA

Gueron, S., & Seifert, J. P. (2006). Is it wise to publish your public RSA keys? In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4236 LNCS, pp. 1–12). Springer Verlag. https://doi.org/10.1007/11889700_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free