DocumentCode
1080474
Title
An RSA Implementation Resistant to Fault Attacks and to Simple Power Analysis
Author
Giraud, Christophe
Author_Institution
Oberthur Card Syst., Pessac
Volume
55
Issue
9
fYear
2006
Firstpage
1116
Lastpage
1120
Abstract
Nowadays, side channel attacks allow an attacker to recover secrets stored in embedded devices more efficiently than any other kind of attack. Among the former, fault attacks (FA) and single power analysis (SPA) are probably the most effective: when applied to straightforward implementations of the RSA cryptosystem, only one execution of the algorithm is required to recover the secret key. Over recent years, many countermeasures have been proposed to prevent side channel attacks on RSA. Regarding fault attacks, only one countermeasure offers effective protection and it can be very costly. In this paper, we focus on a means to counteract fault attacks by presenting a new way of implementing exponentiation algorithms. This method can be used to obtain fast FA-resistant RSA signature generations in both the straightforward method and Chinese remainder theorem modes. Moreover, as it has been shown that fault attacks can benefit from the weaknesses introduced by some SPA countermeasures, we ensure that our method resists SPA and, thus, does not require supplementary SPA countermeasures
Keywords
fault diagnosis; public key cryptography; Chinese remainder theorem modes; RSA cryptosystem; RSA implementation; RSA signature generation; fault attacks; side channel attacks; single power analysis; straightforward method; Algorithm design and analysis; Cathode ray tubes; Electromagnetic radiation; Energy consumption; History; Monitoring; Protection; Public key cryptography; Resists; Smart cards; RSA; Smart cards; exponentiation.; fault injection; public-key cryptosystems; side channel; simple power analysis;
fLanguage
English
Journal_Title
Computers, IEEE Transactions on
Publisher
ieee
ISSN
0018-9340
Type
jour
DOI
10.1109/TC.2006.135
Filename
1668039
Link To Document