Computer Science ›› 2011, Vol. 38 ›› Issue (10): 68-71.
Previous Articles Next Articles
CHEN Cai-sen,WANG Tao,KOU Ying-zhan,ZHANG Jin-zhong
Online:
Published:
Abstract: hhe former fault analysis can not attack on RSA-CRh with corresponding countermeasure. In order to find the new vulnerability to fault analysis,this paper took Shamir countermeasure as the analyzed object. An attack model based on fault in CRT combination operation was advanced, and gave a differential fault analysis algorithm that can completely recover the RSA key. The fact that the previous countermeasures can not effectively resist the differential fault analysis was demonstrated,and the complexity of our attack was estimated both by a theoretical analysis and software simulations. Experiment results show that the new fault analysis algorithm has well feasibility; it only requires two fault injections for permanent fault, and an improved scheme of key searching for random fault is advanced. Finally, a corresponding advice on countermeasure to differential fault analysis was given by analyzing the problem of previous countermeasures.
Key words: Side channel attack, Fault model, Differential fault analysis, Error checking, Chinese remainder theorem RSA
CHEN Cai-sen,WANG Tao,KOU Ying-zhan,ZHANG Jin-zhong. Research on Fault Analysis against RSA Based on Fault in CRT Combination Operation[J].Computer Science, 2011, 38(10): 68-71.
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2011/V38/I10/68
Cited