Skip to main content

Advertisement

SpringerLink
Log in
Menu
Find a journal Publish with us Track your research
Search
Cart
Book cover

International Workshop on Cryptographic Hardware and Embedded Systems

CHES 2006: Cryptographic Hardware and Embedded Systems - CHES 2006 pp 324–338Cite as

  1. Home
  2. Cryptographic Hardware and Embedded Systems - CHES 2006
  3. Conference paper
Why One Should Also Secure RSA Public Key Elements

Why One Should Also Secure RSA Public Key Elements

  • Eric Brier18,
  • Benoît Chevallier-Mames18,19,
  • Mathieu Ciet18 &
  • …
  • Christophe Clavier18 
  • Conference paper
  • 2975 Accesses

  • 20 Citations

Part of the Lecture Notes in Computer Science book series (LNSC,volume 4249)

Abstract

It is well known that a malicious adversary can try to retrieve secret information by inducing a fault during cryptographic operations. Following the work of Seifert on fault inductions during RSA signature verification, we consider in this paper the signature counterpart.

Our article introduces the first fault attack applied on RSA in standard mode. By only corrupting one public key element, one can recover the private exponent. Indeed, similarly to Seifert’s attack, our attack is done by modifying the modulus.

One of the strong points of our attack is that the assumptions on the induced faults’ effects are relaxed. In one mode, absolutely no knowledge of the fault’s behavior is needed to achieve the full recovery of the private exponent. In another mode, based on a fault model defining what is called dictionary, the attack’s efficiency is improved and the number of faults is dramatically reduced. All our attacks are very practical.

Note that those attacks do work even against implementations with deterministic (e.g., RSA-FDH) or random (e.g., RSA-PFDH) paddings, except for cases where we have signatures with randomness recovery (such as RSA-PSS).

The results finally presented on this paper lead us to conclude that it is also mandatory to protect RSA’s public parameters against fault attacks.

Keywords

  • RSA Standard Mode
  • Fault Cryptanalysis
  • Seifert’s Attack

Chapter PDF

Download to read the full chapter text

References

  1. Aumüller, C., Bier, P., Fischer, W., Hofreiter, P., Seifert, J.-P.: Fault attacks on RSA with CRT: Concrete results and practical countermeasures. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 260–275. Springer, Heidelberg (2003)

    CrossRef  Google Scholar 

  2. Bar-El, H., Choukri, H., Naccache, D., Tunstall, M., Whelan, C.: The sorcerer’s apprentice guide to fault attacks. In: Workshop on Fault Detection and Tolerance in Cryptography (2004)

    Google Scholar 

  3. Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: 1st ACM Conference on Computer and Communications Security, pp. 62–73. ACM Press, New York (1993)

    CrossRef  Google Scholar 

  4. Bellare, M., Rogaway, P.: The exact security of digital signatures - How to sign with RSA and Rabin. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 399–416. Springer, Heidelberg (1996)

    Google Scholar 

  5. Biehl, I., Meyer, B., Müller, V.: Differential fault analysis on elliptic curve cryptosystems. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 131–146. Springer, Heidelberg (2000)

    CrossRef  Google Scholar 

  6. Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37–51. Springer, Heidelberg (1997)

    Google Scholar 

  7. Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of eliminating errors in cryptographic computations. Journal of Cryptology 14(2), 101–119 (2001) (An earlier version appears in [6])

    CrossRef  MATH  MathSciNet  Google Scholar 

  8. Ciet, M., Joye, M.: Elliptic curve cryptosystem in presence of permanent and transient faults. Designs Codes and Cryptography 36(1) (2005)

    Google Scholar 

  9. Coron, J.-S.: Optimal security proofs for PSS and other signature schemes. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 272–287. Springer, Heidelberg (2002)

    CrossRef  Google Scholar 

  10. Joye, M., Lenstra, A.K., Quisquater, J.-J.: Chinese remaindering based cryptosystems in the presence of faults. Journal of Cryptology 12(4), 241–245 (1999)

    CrossRef  MATH  Google Scholar 

  11. Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)

    Google Scholar 

  12. Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. CRC Press, Boca Raton (1997)

    MATH  Google Scholar 

  13. Muir, J.A.: Seiferts RSA fault attack: Simplified analysis and generalizations. IACR Eprint archive (2005)

    Google Scholar 

  14. PKCS #1 v 1.5: RSA Cryptography Standard

    Google Scholar 

  15. Quisquater, J.-J., Couvreur, C.: Fast decipherment algorithm for RSA public-key cryptosystem. Electronics Letters 18(21), 905–907 (1982)

    CrossRef  Google Scholar 

  16. Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2), 120–126 (1978)

    CrossRef  MATH  MathSciNet  Google Scholar 

  17. Seifert, J.-P.: On authenticated computing and RSA-based authentication. In: ACM Conference on Computer and Communications Security 2005, pp. 122–127 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Gemalto, Security Labs, La Vigie, Avenue du Jujubier, ZI Athélia IV, F-13705 Cedex, La Ciotat, France

    Eric Brier, Benoît Chevallier-Mames, Mathieu Ciet & Christophe Clavier

  2. Département d’Informatique, École Normale Supérieure, 45 rue d’Ulm, F-75230, Paris 05, France

    Benoît Chevallier-Mames

Authors
  1. Eric Brier
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. Benoît Chevallier-Mames
    View author publications

    You can also search for this author in PubMed Google Scholar

  3. Mathieu Ciet
    View author publications

    You can also search for this author in PubMed Google Scholar

  4. Christophe Clavier
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Editors and Affiliations

  1. Versailles Saint-Quentin-en-Yvelines University, 45 Avenue des Etats-Unis, 78035, Versailles Cedex, France

    Louis Goubin

  2. Information Technology R&D Center, Mitsubishi Electric Corporation, 5-1-1 Ofuna Kamakura Kanagawa, Japan

    Mitsuru Matsui

Rights and permissions

Reprints and Permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Brier, E., Chevallier-Mames, B., Ciet, M., Clavier, C. (2006). Why One Should Also Secure RSA Public Key Elements. In: Goubin, L., Matsui, M. (eds) Cryptographic Hardware and Embedded Systems - CHES 2006. CHES 2006. Lecture Notes in Computer Science, vol 4249. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11894063_26

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/11894063_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-46559-1

  • Online ISBN: 978-3-540-46561-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Publish with us

Policies and ethics

search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Publish your research
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our imprints

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Cancel contracts here

167.114.118.210

Not affiliated

Springer Nature

© 2023 Springer Nature