Fault Cryptanalysis of RSA with Chinese Remainder Theorem and Exponentiation

碩士 === 國立中央大學 === 資訊工程研究所 === 99 === With the growing of computer technology and networks, many applications, such as micropayment and on-line shopping, have been widely used in our daily life. These applications need to transport much information through the Internet connections. Consequently, to p...

Full description

Bibliographic Details
Main Authors: Chi-Dian Wu, 吳啟典
Other Authors: Sung-Ming Yen
Format: Others
Language:en_US
Published: 2010
Online Access:http://ndltd.ncl.edu.tw/handle/63389149513041086462
id ndltd-TW-099NCU05392006
record_format oai_dc
spelling ndltd-TW-099NCU053920062015-10-30T04:10:15Z http://ndltd.ncl.edu.tw/handle/63389149513041086462 Fault Cryptanalysis of RSA with Chinese Remainder Theorem and Exponentiation 應用中國餘數定理之RSA與指數運算之錯誤攻擊分析 Chi-Dian Wu 吳啟典 碩士 國立中央大學 資訊工程研究所 99 With the growing of computer technology and networks, many applications, such as micropayment and on-line shopping, have been widely used in our daily life. These applications need to transport much information through the Internet connections. Consequently, to protect personal secrets and privacy, the security has become more and more important. Since Bellcore laboratory proposed the fault attacks, the fault attacks have become serious threats to the implementation of cryptography, especially on smart cards, and many kinds of fault attacks have been proposed to break various cryptosystems. For security, to resist fault attacks is an important thing when implementing cryptosystems. RSA is a widely used cryptosystem nowadays, and an efficient method to speed up the computation of RSA is using Chinese Remainder Theorem (CRT). However, it has been presented that the RSA modulus N can be factored easily under fault attacks on CRT-RSA. Many countermeasures have been proposed, and the fault infection is a kind of method which can remove the danger of fault attacks against checking procedures. However, most countermeasures based on fault infection have been proved insecure. In this thesis, we will first show that the Yang et al.''s countermeasure based on fault infection is still insecure, and then propose two countermeasures with secure fault infective computation. We prove that our countermeasures can resist all known fault attacks against CRT-RSA. Moreover, the proposed infective computation can combine with other fast checking methods to improve the efficiency. The exponentiation (or scalar multiplication on ECC) is a critical operation in most publickey cryptosystems. Some fault attacks against the exponentiation or the scalar multiplication have been proposed. In this thesis, based on the previous fault attacks against right-to-left exponentiation, we propose an extended fault attack against the left-to-right exponentiation (or scalar multiplication) on discrete logarithm based publickey cryptosystems. Our attack can also extend to the Montgomery ladder algorithm. Sung-Ming Yen 顏嵩銘 2010 學位論文 ; thesis 62 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 國立中央大學 === 資訊工程研究所 === 99 === With the growing of computer technology and networks, many applications, such as micropayment and on-line shopping, have been widely used in our daily life. These applications need to transport much information through the Internet connections. Consequently, to protect personal secrets and privacy, the security has become more and more important. Since Bellcore laboratory proposed the fault attacks, the fault attacks have become serious threats to the implementation of cryptography, especially on smart cards, and many kinds of fault attacks have been proposed to break various cryptosystems. For security, to resist fault attacks is an important thing when implementing cryptosystems. RSA is a widely used cryptosystem nowadays, and an efficient method to speed up the computation of RSA is using Chinese Remainder Theorem (CRT). However, it has been presented that the RSA modulus N can be factored easily under fault attacks on CRT-RSA. Many countermeasures have been proposed, and the fault infection is a kind of method which can remove the danger of fault attacks against checking procedures. However, most countermeasures based on fault infection have been proved insecure. In this thesis, we will first show that the Yang et al.''s countermeasure based on fault infection is still insecure, and then propose two countermeasures with secure fault infective computation. We prove that our countermeasures can resist all known fault attacks against CRT-RSA. Moreover, the proposed infective computation can combine with other fast checking methods to improve the efficiency. The exponentiation (or scalar multiplication on ECC) is a critical operation in most publickey cryptosystems. Some fault attacks against the exponentiation or the scalar multiplication have been proposed. In this thesis, based on the previous fault attacks against right-to-left exponentiation, we propose an extended fault attack against the left-to-right exponentiation (or scalar multiplication) on discrete logarithm based publickey cryptosystems. Our attack can also extend to the Montgomery ladder algorithm.
author2 Sung-Ming Yen
author_facet Sung-Ming Yen
Chi-Dian Wu
吳啟典
author Chi-Dian Wu
吳啟典
spellingShingle Chi-Dian Wu
吳啟典
Fault Cryptanalysis of RSA with Chinese Remainder Theorem and Exponentiation
author_sort Chi-Dian Wu
title Fault Cryptanalysis of RSA with Chinese Remainder Theorem and Exponentiation
title_short Fault Cryptanalysis of RSA with Chinese Remainder Theorem and Exponentiation
title_full Fault Cryptanalysis of RSA with Chinese Remainder Theorem and Exponentiation
title_fullStr Fault Cryptanalysis of RSA with Chinese Remainder Theorem and Exponentiation
title_full_unstemmed Fault Cryptanalysis of RSA with Chinese Remainder Theorem and Exponentiation
title_sort fault cryptanalysis of rsa with chinese remainder theorem and exponentiation
publishDate 2010
url http://ndltd.ncl.edu.tw/handle/63389149513041086462
work_keys_str_mv AT chidianwu faultcryptanalysisofrsawithchineseremaindertheoremandexponentiation
AT wúqǐdiǎn faultcryptanalysisofrsawithchineseremaindertheoremandexponentiation
AT chidianwu yīngyòngzhōngguóyúshùdìnglǐzhīrsayǔzhǐshùyùnsuànzhīcuòwùgōngjīfēnxī
AT wúqǐdiǎn yīngyòngzhōngguóyúshùdìnglǐzhīrsayǔzhǐshùyùnsuànzhīcuòwùgōngjīfēnxī
_version_ 1718116434862669824