Advertisement

Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults

  • F. Bao
  • R. H. Deng
  • Y. Han
  • A. Jeng
  • A. D. Narasimhalu
  • T. Ngair
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1361)

Abstract

In this paper we present a method of attacking public-key cryptosystems (PKCs) on tamper resistant devices. The attack makes use of transient faults and seems applicable to many types of PKCs. In particular, we show how to attack the RSA, the EIGamal signature scheme, the Schnorr signature scheme, and the DSA. We also present some possible methods to counter the attack.

Keywords

Smart Card Signature Scheme Transient Fault Resistant Device Digital Signature Algorithm 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    R. Anderson and M. Kuhn, “Tamper Resistance-A Cautionary Note”, to appear in the Proceedings of the 2nd Workshop on Electronic Commerce, Oakland, CA., Nov. 18-20, 1996.Google Scholar
  2. 2.
    F. Bao, R. Deng, Y. Han, A. Jeng, D. Narasimhalu, and T. Ngair, “Another New Attack to RSA on Tamperproof Devices”, 23rd October. 1996, http:// www.itd.nrl.navy.mil/ITD/5540/ieee/cipher/news-items/961022.sgtamper.html; “A Method to Counter Another New Attack to RSA on Tamperproof Devices”, 24th October. 1996, http://www.itd.nrl.navy.mil/ITD/5540/ieee/cipher/newsitems/ 961024.sgtampercounter.html.Google Scholar
  3. 3.
    F. Bao, R.. Deng, Y. Han, A. Jeng, D. Narasimhalu, and T. Ngair, “New Attacks to Public Key Cryptosystems on Tamperproof Devices”, 29th October. 1996,http://www.itd.nrl.navy.mil/ITD/5540/ieee/cipher/news-items/.Google Scholar
  4. 4.
    Bellcore Press Release, “New Threat Model Breaks Crypto Codes”, Sept. 1996, http://www.bellcore.com/PRESS/ADVSRY96/facts.html.Google Scholar
  5. 5.
    E. Biham and A. Shamir,“Research Announcement: A New Cryptanalytic Attack on DES”, 18th October 1996, http://jya.com/dfa.htm.Google Scholar
  6. 6.
    D. Boneh, R. A. DeMillo, and R. J. Lipton, “On the Importance of Checking Computations”, Submitted to Eurocrypt 96.Google Scholar
  7. 7.
    T. ElGamal, “A Public-Key Cryptosystems and a Signature Scheme Based on Discrete Logarithms”, IEEE Trans. Information Theory, Vol. IT-31, No. 4, 1985, pp. 469–472.CrossRefGoogle Scholar
  8. 8.
    M. Joye and J.-J. Quisquater, “Attacks on systems using Chinese remaindering”, Technical Report CG-1996/9 of UCL, http://www.dice.ucl.ac.be/ci-ypto/.Google Scholar
  9. 9.
    A. K. Lenstra, “Memo on RSA Signature Generation in the Presence of Faults”, Manuscript, Sept. 28, 1996. Available from Author at arjen.lenstra@citicorp.com.Google Scholar
  10. 10.
    R. L. Rivest, A. Shamir, and L. M. Adleman,“A Method for Obtaining Digital Signatures and Public-Key Cryptosystems”, Communications of the ACM, vol. 21, No. 2, Feb. 1978, pp. 120–126.CrossRefGoogle Scholar
  11. 11.
    C. Schnorr, “Efficient Signature Generation by Smart Cards”, J. Cryptology, Vol. 4, 1991, pp. 161–174.CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1998

Authors and Affiliations

  • F. Bao
    • 1
  • R. H. Deng
    • 1
  • Y. Han
    • 1
  • A. Jeng
    • 1
  • A. D. Narasimhalu
    • 1
  • T. Ngair
    • 1
  1. 1.Institute of Systems ScienceNational University of SingaporeSingapore

Personalised recommendations