Skip to main content

Advertisement

SpringerLink
Log in
Menu
Find a journal Publish with us Track your research
Search
Cart
Book cover

International Workshop on Cryptographic Hardware and Embedded Systems

CHES 2006: Cryptographic Hardware and Embedded Systems - CHES 2006 pp 339–353Cite as

  1. Home
  2. Cryptographic Hardware and Embedded Systems - CHES 2006
  3. Conference paper
Power Attack on Small RSA Public Exponent

Power Attack on Small RSA Public Exponent

  • Pierre-Alain Fouque18,
  • Sébastien Kunz-Jacques18,19,
  • Gwenaëlle Martinet19,
  • Frédéric Muller20 &
  • …
  • Frédéric Valette21 
  • Conference paper
  • 3095 Accesses

  • 29 Citations

Part of the Lecture Notes in Computer Science book series (LNSC,volume 4249)

Abstract

In this paper, we present a new attack on RSA when the public exponent is short, for instance 3 or 216+1, and when the classical exponent randomization is used. This attack works even if blinding is used on the messages.

From a Simple Power Analysis (SPA) we study the problem of recovering the RSA private key when non consecutive bits of it leak from the implementation. We also show that such information can be gained from sliding window implementations not protected against SPA.

Keywords

  • RSA cryptosystem
  • sliding window methods
  • exponent randomization
  • Simple Power Analysis

Chapter PDF

Download to read the full chapter text

References

  1. Boneh, D., Durfee, G., Frankel, Y.: An attack on RSA given a fraction of the private key bits. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol. 1514, pp. 25–34. Springer, Heidelberg (1998)

    CrossRef  Google Scholar 

  2. Bos, J., Coster, M.: Addition Chain Heuristics. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 400–407. Springer, Heidelberg (1990)

    Google Scholar 

  3. Knuth, D.E.: The Art of Computer Programming. Semi Numerical Algorithms, vol. 2. Addison Wesley, Reading (1969)

    MATH  Google Scholar 

  4. Koç, C.K.: High Speed RSA Implementation. Technical report, Tech Rep. 201, RSA Laboratories (1994)

    Google Scholar 

  5. Koç, C.K.: Analysis of Sliding Window Technique for Exponentiation. Computers and Mathematics with Applications 10(30), 17–24 (1995)

    CrossRef  Google Scholar 

  6. Kocher, P.C.: Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104–113. Springer, Heidelberg (1996)

    Google Scholar 

  7. Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Power analysis attacks of modular exponentiation in smartcards. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 144–157. Springer, Heidelberg (1999)

    CrossRef  Google Scholar 

  8. Stinson, D.R.: Some Baby-Step Giant-Step Algorithms for the Low Hamming Weight Discrete Logarithm Problem. Mathematics of Computation 71, 379–391 (2002)

    CrossRef  MATH  MathSciNet  Google Scholar 

  9. Walter, C.D.: Sliding Windows Succumbs to Big Mac Attack. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 286–299. Springer, Heidelberg (2001)

    CrossRef  Google Scholar 

  10. Walter, C.D.: Seeing through MIST Given a Small Fraction of an RSA Private Key. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 391–402. Springer, Heidelberg (2003)

    CrossRef  Google Scholar 

Download references

Author information

Authors and Affiliations

  1. École normale supérieure, 45 rue d’Ulm, 75005, Paris, France

    Pierre-Alain Fouque & Sébastien Kunz-Jacques

  2. DCSSI Crypto Lab, 51 boulevard de La Tour-Maubourg, F-75700, Paris 07 SP, France

    Sébastien Kunz-Jacques & Gwenaëlle Martinet

  3. HSBC, France

    Frédéric Muller

  4. CELAR, 35 Bruz, France

    Frédéric Valette

Authors
  1. Pierre-Alain Fouque
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. Sébastien Kunz-Jacques
    View author publications

    You can also search for this author in PubMed Google Scholar

  3. Gwenaëlle Martinet
    View author publications

    You can also search for this author in PubMed Google Scholar

  4. Frédéric Muller
    View author publications

    You can also search for this author in PubMed Google Scholar

  5. Frédéric Valette
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Editors and Affiliations

  1. Versailles Saint-Quentin-en-Yvelines University, 45 Avenue des Etats-Unis, 78035, Versailles Cedex, France

    Louis Goubin

  2. Information Technology R&D Center, Mitsubishi Electric Corporation, 5-1-1 Ofuna Kamakura Kanagawa, Japan

    Mitsuru Matsui

Rights and permissions

Reprints and Permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Fouque, PA., Kunz-Jacques, S., Martinet, G., Muller, F., Valette, F. (2006). Power Attack on Small RSA Public Exponent. In: Goubin, L., Matsui, M. (eds) Cryptographic Hardware and Embedded Systems - CHES 2006. CHES 2006. Lecture Notes in Computer Science, vol 4249. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11894063_27

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/11894063_27

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-46559-1

  • Online ISBN: 978-3-540-46561-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Publish with us

Policies and ethics

search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Publish your research
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our imprints

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Cancel contracts here

167.114.118.210

Not affiliated

Springer Nature

© 2023 Springer Nature