Fault Cryptanalysis of RSA with Chinese Remainder Theorem and Exponentiation
碩士 === 國立中央大學 === 資訊工程研究所 === 99 === With the growing of computer technology and networks, many applications, such as micropayment and on-line shopping, have been widely used in our daily life. These applications need to transport much information through the Internet connections. Consequently, to p...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2010
|
Online Access: | http://ndltd.ncl.edu.tw/handle/63389149513041086462 |
id |
ndltd-TW-099NCU05392006 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-099NCU053920062015-10-30T04:10:15Z http://ndltd.ncl.edu.tw/handle/63389149513041086462 Fault Cryptanalysis of RSA with Chinese Remainder Theorem and Exponentiation 應用中國餘數定理之RSA與指數運算之錯誤攻擊分析 Chi-Dian Wu 吳啟典 碩士 國立中央大學 資訊工程研究所 99 With the growing of computer technology and networks, many applications, such as micropayment and on-line shopping, have been widely used in our daily life. These applications need to transport much information through the Internet connections. Consequently, to protect personal secrets and privacy, the security has become more and more important. Since Bellcore laboratory proposed the fault attacks, the fault attacks have become serious threats to the implementation of cryptography, especially on smart cards, and many kinds of fault attacks have been proposed to break various cryptosystems. For security, to resist fault attacks is an important thing when implementing cryptosystems. RSA is a widely used cryptosystem nowadays, and an efficient method to speed up the computation of RSA is using Chinese Remainder Theorem (CRT). However, it has been presented that the RSA modulus N can be factored easily under fault attacks on CRT-RSA. Many countermeasures have been proposed, and the fault infection is a kind of method which can remove the danger of fault attacks against checking procedures. However, most countermeasures based on fault infection have been proved insecure. In this thesis, we will first show that the Yang et al.''s countermeasure based on fault infection is still insecure, and then propose two countermeasures with secure fault infective computation. We prove that our countermeasures can resist all known fault attacks against CRT-RSA. Moreover, the proposed infective computation can combine with other fast checking methods to improve the efficiency. The exponentiation (or scalar multiplication on ECC) is a critical operation in most publickey cryptosystems. Some fault attacks against the exponentiation or the scalar multiplication have been proposed. In this thesis, based on the previous fault attacks against right-to-left exponentiation, we propose an extended fault attack against the left-to-right exponentiation (or scalar multiplication) on discrete logarithm based publickey cryptosystems. Our attack can also extend to the Montgomery ladder algorithm. Sung-Ming Yen 顏嵩銘 2010 學位論文 ; thesis 62 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立中央大學 === 資訊工程研究所 === 99 === With the growing of computer technology and networks, many applications, such as micropayment and on-line shopping, have been widely used in our daily life. These applications need to transport much information through the Internet connections. Consequently, to protect personal secrets and privacy, the security has become more and more important.
Since Bellcore laboratory proposed the fault attacks, the fault attacks have become serious threats to the implementation of cryptography, especially on smart cards, and many kinds of fault attacks have been proposed to break various cryptosystems. For security, to resist fault attacks is an important thing when implementing cryptosystems.
RSA is a widely used cryptosystem nowadays, and an efficient method to speed up the computation of RSA is using Chinese Remainder Theorem (CRT). However, it has been presented that the RSA modulus N can be factored easily under fault attacks on CRT-RSA. Many countermeasures have been proposed, and the fault infection is a kind of method which can remove the danger of fault attacks against checking procedures. However, most countermeasures based on fault infection have been proved insecure. In this thesis, we will first show that the Yang et al.''s countermeasure based on fault infection is still insecure, and then propose two countermeasures with secure fault infective computation. We prove that our countermeasures can resist all known fault attacks against CRT-RSA. Moreover, the proposed infective computation can combine with other fast checking methods to improve the efficiency.
The exponentiation (or scalar multiplication on ECC) is a critical operation in most publickey cryptosystems. Some fault attacks against the exponentiation or the scalar multiplication have been proposed. In this thesis, based on the previous fault attacks against right-to-left exponentiation, we propose an extended fault attack against the left-to-right exponentiation (or scalar multiplication) on discrete logarithm based publickey cryptosystems. Our attack can also extend to the Montgomery ladder algorithm.
|
author2 |
Sung-Ming Yen |
author_facet |
Sung-Ming Yen Chi-Dian Wu 吳啟典 |
author |
Chi-Dian Wu 吳啟典 |
spellingShingle |
Chi-Dian Wu 吳啟典 Fault Cryptanalysis of RSA with Chinese Remainder Theorem and Exponentiation |
author_sort |
Chi-Dian Wu |
title |
Fault Cryptanalysis of RSA with Chinese Remainder Theorem and Exponentiation |
title_short |
Fault Cryptanalysis of RSA with Chinese Remainder Theorem and Exponentiation |
title_full |
Fault Cryptanalysis of RSA with Chinese Remainder Theorem and Exponentiation |
title_fullStr |
Fault Cryptanalysis of RSA with Chinese Remainder Theorem and Exponentiation |
title_full_unstemmed |
Fault Cryptanalysis of RSA with Chinese Remainder Theorem and Exponentiation |
title_sort |
fault cryptanalysis of rsa with chinese remainder theorem and exponentiation |
publishDate |
2010 |
url |
http://ndltd.ncl.edu.tw/handle/63389149513041086462 |
work_keys_str_mv |
AT chidianwu faultcryptanalysisofrsawithchineseremaindertheoremandexponentiation AT wúqǐdiǎn faultcryptanalysisofrsawithchineseremaindertheoremandexponentiation AT chidianwu yīngyòngzhōngguóyúshùdìnglǐzhīrsayǔzhǐshùyùnsuànzhīcuòwùgōngjīfēnxī AT wúqǐdiǎn yīngyòngzhōngguóyúshùdìnglǐzhīrsayǔzhǐshùyùnsuànzhīcuòwùgōngjīfēnxī |
_version_ |
1718116434862669824 |