Abstract
We describe an adaptive chosen-ciphertext attack on a smart card implementation of the RSA decryption algorithm in the presence of side-channel information leakage. We studied the information leakage through power consumption variation. Simple power analysis (SPA) of the smart card that is widely used for secure Internet banking, Web access and remote access to corporate networks, revealed macro characteristics caused by improper implementation of Chinese remaindering. The findings can be used to eventually improve future implementations of fast RSA decryption.
Cite
CITATION STYLE
Novak, R. (2002). Spa-based adaptive chosen-ciphertext attack on rsa implementation. In Lecture Notes in Computer Science (Vol. 2274, pp. 252–262). Springer Verlag. https://doi.org/10.1007/3-540-45664-3_18
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.