Abstract
In this paper we present a method of attacking public-key cryptosystems (PKCs) on tamper resistant devices. The attack makes use of transient faults and seems applicable to many types of PKCs. In particular, we show how to attack the RSA, the EIGamal signature scheme, the Schnorr signature scheme, and the DSA. We also present some possible methods to counter the attack.
Preview
Unable to display preview. Download preview PDF.
References
R. Anderson and M. Kuhn, “Tamper Resistance-A Cautionary Note”, to appear in the Proceedings of the 2nd Workshop on Electronic Commerce, Oakland, CA., Nov. 18-20, 1996.
F. Bao, R. Deng, Y. Han, A. Jeng, D. Narasimhalu, and T. Ngair, “Another New Attack to RSA on Tamperproof Devices”, 23rd October. 1996, http:// www.itd.nrl.navy.mil/ITD/5540/ieee/cipher/news-items/961022.sgtamper.html; “A Method to Counter Another New Attack to RSA on Tamperproof Devices”, 24th October. 1996, http://www.itd.nrl.navy.mil/ITD/5540/ieee/cipher/newsitems/ 961024.sgtampercounter.html.
F. Bao, R.. Deng, Y. Han, A. Jeng, D. Narasimhalu, and T. Ngair, “New Attacks to Public Key Cryptosystems on Tamperproof Devices”, 29th October. 1996,http://www.itd.nrl.navy.mil/ITD/5540/ieee/cipher/news-items/.
Bellcore Press Release, “New Threat Model Breaks Crypto Codes”, Sept. 1996, http://www.bellcore.com/PRESS/ADVSRY96/facts.html.
E. Biham and A. Shamir,“Research Announcement: A New Cryptanalytic Attack on DES”, 18th October 1996, http://jya.com/dfa.htm.
D. Boneh, R. A. DeMillo, and R. J. Lipton, “On the Importance of Checking Computations”, Submitted to Eurocrypt 96.
T. ElGamal, “A Public-Key Cryptosystems and a Signature Scheme Based on Discrete Logarithms”, IEEE Trans. Information Theory, Vol. IT-31, No. 4, 1985, pp. 469–472.
M. Joye and J.-J. Quisquater, “Attacks on systems using Chinese remaindering”, Technical Report CG-1996/9 of UCL, http://www.dice.ucl.ac.be/ci-ypto/.
A. K. Lenstra, “Memo on RSA Signature Generation in the Presence of Faults”, Manuscript, Sept. 28, 1996. Available from Author at arjen.lenstra@citicorp.com.
R. L. Rivest, A. Shamir, and L. M. Adleman,“A Method for Obtaining Digital Signatures and Public-Key Cryptosystems”, Communications of the ACM, vol. 21, No. 2, Feb. 1978, pp. 120–126.
C. Schnorr, “Efficient Signature Generation by Smart Cards”, J. Cryptology, Vol. 4, 1991, pp. 161–174.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bao, F., Deng, R.H., Han, Y., Jeng, A., Narasimhalu, A.D., Ngair, T. (1998). Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults. In: Christianson, B., Crispo, B., Lomas, M., Roe, M. (eds) Security Protocols. Security Protocols 1997. Lecture Notes in Computer Science, vol 1361. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0028164
Download citation
DOI: https://doi.org/10.1007/BFb0028164
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-64040-0
Online ISBN: 978-3-540-69688-9
eBook Packages: Springer Book Archive