Skip to main content

Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults

  • Conference paper
  • First Online:
Security Protocols (Security Protocols 1997)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1361))

Included in the following conference series:

Abstract

In this paper we present a method of attacking public-key cryptosystems (PKCs) on tamper resistant devices. The attack makes use of transient faults and seems applicable to many types of PKCs. In particular, we show how to attack the RSA, the EIGamal signature scheme, the Schnorr signature scheme, and the DSA. We also present some possible methods to counter the attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. R. Anderson and M. Kuhn, “Tamper Resistance-A Cautionary Note”, to appear in the Proceedings of the 2nd Workshop on Electronic Commerce, Oakland, CA., Nov. 18-20, 1996.

    Google Scholar 

  2. F. Bao, R. Deng, Y. Han, A. Jeng, D. Narasimhalu, and T. Ngair, “Another New Attack to RSA on Tamperproof Devices”, 23rd October. 1996, http:// www.itd.nrl.navy.mil/ITD/5540/ieee/cipher/news-items/961022.sgtamper.html; “A Method to Counter Another New Attack to RSA on Tamperproof Devices”, 24th October. 1996, http://www.itd.nrl.navy.mil/ITD/5540/ieee/cipher/newsitems/ 961024.sgtampercounter.html.

    Google Scholar 

  3. F. Bao, R.. Deng, Y. Han, A. Jeng, D. Narasimhalu, and T. Ngair, “New Attacks to Public Key Cryptosystems on Tamperproof Devices”, 29th October. 1996,http://www.itd.nrl.navy.mil/ITD/5540/ieee/cipher/news-items/.

    Google Scholar 

  4. Bellcore Press Release, “New Threat Model Breaks Crypto Codes”, Sept. 1996, http://www.bellcore.com/PRESS/ADVSRY96/facts.html.

    Google Scholar 

  5. E. Biham and A. Shamir,“Research Announcement: A New Cryptanalytic Attack on DES”, 18th October 1996, http://jya.com/dfa.htm.

    Google Scholar 

  6. D. Boneh, R. A. DeMillo, and R. J. Lipton, “On the Importance of Checking Computations”, Submitted to Eurocrypt 96.

    Google Scholar 

  7. T. ElGamal, “A Public-Key Cryptosystems and a Signature Scheme Based on Discrete Logarithms”, IEEE Trans. Information Theory, Vol. IT-31, No. 4, 1985, pp. 469–472.

    Article  Google Scholar 

  8. M. Joye and J.-J. Quisquater, “Attacks on systems using Chinese remaindering”, Technical Report CG-1996/9 of UCL, http://www.dice.ucl.ac.be/ci-ypto/.

    Google Scholar 

  9. A. K. Lenstra, “Memo on RSA Signature Generation in the Presence of Faults”, Manuscript, Sept. 28, 1996. Available from Author at arjen.lenstra@citicorp.com.

    Google Scholar 

  10. R. L. Rivest, A. Shamir, and L. M. Adleman,“A Method for Obtaining Digital Signatures and Public-Key Cryptosystems”, Communications of the ACM, vol. 21, No. 2, Feb. 1978, pp. 120–126.

    Article  Google Scholar 

  11. C. Schnorr, “Efficient Signature Generation by Smart Cards”, J. Cryptology, Vol. 4, 1991, pp. 161–174.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Bruce Christianson Bruno Crispo Mark Lomas Michael Roe

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bao, F., Deng, R.H., Han, Y., Jeng, A., Narasimhalu, A.D., Ngair, T. (1998). Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults. In: Christianson, B., Crispo, B., Lomas, M., Roe, M. (eds) Security Protocols. Security Protocols 1997. Lecture Notes in Computer Science, vol 1361. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0028164

Download citation

  • DOI: https://doi.org/10.1007/BFb0028164

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64040-0

  • Online ISBN: 978-3-540-69688-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics