Advertisement

Springer Nature is making SARS-CoV-2 and COVID-19 research free. View research | View latest news | Sign up for updates

Side channel attack of multiplication in GF(q)–application to secure RSA-CRT

This is a preview of subscription content, log in to check access.

References

  1. 1

    Kocher P C, Jaffe J, Jun B. Differential power analysis. In: Proceedings of Annual International Cryptology Conference, Santa Barbara, 1999. 15–19

  2. 2

    Brier E, Clavier C, Olivier F. Correlation power analysis with a leakage model. In: Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems, Cambridge, 2004. 16–29

  3. 3

    Boscher A, Naciri R, Prouff E. CRT RSA algorithm protected against fault attack. In: Proceedings of International Conference on Information Security Theory and Practices, Heraklion, 2007. 229–243

  4. 4

    Boscher A, Handschuh H, Trichina E. Blinded fault resistant exponentiation revisited. In: Proceedings of Fault Diagnosis and Tolerance in Cryptography, Lausanne, 2010

  5. 5

    Clavier C, Reynaud L. Improved blind side-channel analysis by exploitation of joint distributions of leakages. In: Proceedings of International Conference on Cryptographic Hardware and Embedded Systems, Taipei, 2017. 24–44

  6. 6

    Xu S, Lu X J, Zhang K Y, et al. Similar operation template attack on RSA-CRT as a case study. Sci China Inf Sci, 2018, 61: 032111

  7. 7

    Giraud C. An RSA implementation resistant to fault attacks and to simple power analysis. IEEE Trans Comput, 2006, 55: 1116–1120

  8. 8

    Kiss Á, Krämer J, Rauzy P. Algorithmic countermeasures against fault attacks and power analysis for RSACRT. In: Proceedings of Constructive Side-Channel Analysis and Secure Design, Graz, 2016. 111–129

  9. 9

    Kim S K, Kim T H, Han D G, et al. An efficient CRTRSA algorithm secure against power and fault attacks. J Syst Softw, 2011, 84: 1660–1669

Download references

Acknowledgements

This work was supported by National Natural Science Foundation of China (Grant Nos. U1536103, 61402286, 61472249, 61602239, 6157–2192, 61472250), and Minhang District Cooperation Plan (Grant No. 2016MH310).

Author information

Correspondence to Dawu Gu.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Xu, S., Wang, W., Lu, X. et al. Side channel attack of multiplication in GF(q)–application to secure RSA-CRT. Sci. China Inf. Sci. 62, 39105 (2018). https://doi.org/10.1007/s11432-018-9488-2

Download citation