...
首页> 外文期刊>Journal of cryptographic engineering >Modulus fault attacks against RSA-CRT signatures
【24h】

Modulus fault attacks against RSA-CRT signatures

机译:针对RSA-CRT签名的模态故障攻击

获取原文
获取原文并翻译 | 示例
           

摘要

RSA-CRT fault attacks have been an active research area since their discovery by Boneh, DeMillo and Lipton in 1997. We present alternative key-recovery attacks on RSA-CRT signatures: instead of targeting one of the sub-exponentiations in RSA-CRT, we inject faults into the public modulus before CRT interpolation, which makes a number of countermeasures against Boneh et al.'s attack ineffective. Our attacks are based on orthogonal lattice techniques and are very efficient in practice: depending on the fault model, between 5 and 45 faults suffice to recover the RSA factorization within a few seconds. Our simplest attack requires that the adversary knows the faulty moduli, but more sophisticated variants work even if the moduli are unknown, under reasonable fault models. All our attacks have been fully validated experimentally with fault-injection laser techniques.
机译:自从Boneh,DeMillo和Lipton在1997年发现RSA-CRT故障攻击以来,它一直是一个活跃的研究领域。我们提出了针对RSA-CRT签名的替代密钥恢复攻击:不是针对RSA-CRT的子指数之一,我们在CRT插值之前将故障注入到公共模数中,这使得针对Boneh等人的攻击的许多对策无效。我们的攻击基于正交晶格技术,并且在实践中非常有效:根据故障模型,在5到45个故障之间可以在几秒钟内恢复RSA分解。我们最简单的攻击方法是要求对手知道错误的模量,但在合理的错误模型下,即使模量未知,也可以使用更复杂的变体。我们所有的攻击都已通过故障注入激光技术进行了实验验证。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号