Abstract
This paper describes very efficient attacks on plain RSA encryption as usually described in textbooks. These attacks exploit side channels caused by implementations that, during decryption, incorrectly make certain assumption on the size of message. We highlight different assumptions that are easily made when implementing plain RSA decryption and present corresponding attacks. These attacks make clear that plain RSA is a padding scheme that has to be checked carefully during decryption instead of simply assuming a length of the transported message. Furthermore we note that the attacks presented here do also work against a similar setting of ElGamal encryption with only minimal changes. © Springer-Verlag Berlin Heidelberg 2003.
Author supplied keywords
Cite
CITATION STYLE
Kühn, U. (2003). Side-channel attacks on textbook RSA and ElGamal encryption. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2567, 324–336. https://doi.org/10.1007/3-540-36288-6_24
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.