Loading [MathJax]/jax/output/SVG/jax.js
We use cookies to improve your experience with our site.

Indexed in:

SCIE, EI, Scopus, INSPEC, DBLP, CSCD, etc.

Submission System
(Author / Reviewer / Editor)
Bao-Dong Qin, Ming Li, Fan-Yu Kong. Cryptanalysis of a Type of CRT-Based RSA Algorithms[J]. Journal of Computer Science and Technology, 2008, 23(2): 214-221.
Citation: Bao-Dong Qin, Ming Li, Fan-Yu Kong. Cryptanalysis of a Type of CRT-Based RSA Algorithms[J]. Journal of Computer Science and Technology, 2008, 23(2): 214-221.

Cryptanalysis of a Type of CRT-Based RSA Algorithms

More Information
  • Received Date: August 21, 2007
  • Revised Date: November 18, 2007
  • Published Date: March 14, 2008
  • It is well known that the Chinese Remainder Theorem (CRT) can greatlyimprove the performances of RSA cryptosystem in both running times andmemory requirements. However, if the implementation of CRT-based RSA iscareless, an attacker can reveal some secret information by exploitinghardware fault cryptanalysis. In this paper, we present some faultattacks on a type of CRT-RSA algorithms namely BOS type schemesincluding the original BOS scheme proposed by Bl\"{o}mer, Otto, andSeifert at CCS 2003 and its modified scheme proposed by Liu {\it et al.}at DASC 2006. We first demonstrate that if some special signed messagessuch as m=0,±1 are dealt carelessly, they can be exploited by anadversary to completely break the security of both the BOS scheme andLiu {\it et al.}'s scheme. Then we present a new permanent fault attackon the BOS scheme with a success probability about 25\%. Lastly, wepropose a polynomial time attack on Liu {\it et al.}'s CRT-RSA algorithm,which combines physical fault injection and lattice reduction techniqueswhen the public exponent is short.
  • [1]
    Boneh D, DeMillo R A, Lipton R J. On the importance of checking cryptographic protocols for fault. In -\it Proc. EUROCRYPT'97}, Konstanz, Germany, Springer-Verlag, 1997, pp.37--51.
    [2]
    Christian Aum\"-u}ller, Peter Bier, Wieland Fischer, Peter Hofreiter, Jean-Pierre Seifert. Fault attacks on RSA with CRT: Concrete results and practical countermeasures. In -\it Proc. CHES'02}, Redwood Shores, USA, August 13--15, 2002, pp.260--275.
    [3]
    Bar-El H, Choukri H, Naccache D, Tunstall M, Whelan C. The sorcerer's apprentice guide to fault attacks. In -\it Proc. Workshop on Fault Detection and Tolerance in Cryptography}, Florence, Italy, June 2004.
    [4]
    Couvreur C, Quisquater J. Fast decipherment algorithm for RSA public-key cryptosystem. -\it Electronic Letters}, 1982, 18(21): 905--907.
    [5]
    Yen S, Kim S, Lim S, Moon S. RSA Speedup with Chinese remainder theorem immune against hardware fault Cryptanalysis. -\it IEEE Transactions on Computers}, April 2003, 52: 461--472.
    [6]
    Ross J Anderson, Markus G Kuhn. Low cost attacks on tamper resistant devices. In -\it Proc. 5th International Workshop on Security Protocols}, Paris, France, April 07--09, 1997, pp.125--136.
    [7]
    Skorobogatov S, Anderson R. Optical fault induction attacks. In -\it Proc. Workshop on Cryptographic Hardware and Embedded Systems}, Hotel Sofitel, San Francisco Bay (Redwood City), USA, August 13--15, 2002.
    [8]
    Bellcore Press Release. New threat model breaks crypto codes. Sept. 1996, http://www.bellcore.com/PRESS/ADVS\-RY96/facts.html.
    [9]
    Ciet M, Joye M. Practical fault countermeasures for Chinese remaindering based RSA. In -\it Proc. FDTC'05}, Edinburgh, Scotland, September 2, 2005, pp.124--131.
    [10]
    Johannes Bl\"-o}mer, Martin Otto. Wagner's attack on a secure CRT-RSA algorithm reconsidered. In -\it Proc. FDTC'06}, Yokohama, Japan, Springer-Verlag, 2006, pp.13--23.
    [11]
    Shamir A. Method and apparatus for protecting public key schemes from timing and fault attacks. United States Patent, No. 5991415, Nov. 23, 1999.
    [12]
    Joye M, Lenstra A K, Quisquater J J. Chinese remaindering based cryptosystems in the presence of faults. -\it Journal of Cryptology}, 1999, 12(4): 241--245.
    [13]
    Johannes Bl\"-o}mer, Martin Otto, Jean-Pierre Seifert. A new CRT-RSA algorithm secure against bellcore attacks. In -\it Proc. 10th ACM Conference on Computer and Communications Security}, Washington D.C., USA, October 27--30, 2003, pp.311--320.
    [14]
    Ming Li, Baodong Qin, Fanyu Kong, Daxing Li. Further cryptanalysis of a CRT-RSA algorithm at CCS 2003. In -\it Proc. International Workshop on Network and System Security}, Dalian, China, Sept. 18--21, 2007, pp.72--76.
    [15]
    Sining Liu, Brian King, Wei Wang. A CRT-RSA algorithm secure against hardware fault attacks. In -\it Proc. DASC'06}, Indianapolis, USA, 2006, pp.51--66.
    [16]
    David Wagner. Cryptanalysis of a provably secure CRT-RSA algorithm. In -\it Proc. the 11th ACM Conference on Computer and Communications Security}, Washington DC, USA, October 25--29, 2004, pp.92--97.
    [17]
    Coppersmith D. Finding a small root of a univariate modular equation. In -\it Proc. EUROCRYPT'96}, Saragossa, Spain, Springer-Verlag, 1996, pp.155--165.
    [18]
    Coppersmith D. Finding a small root of a bivariate integer equation. In -\it Proc. EUROCRYPT'96}, Saragossa, Spain, Springer-Verlag, 1996, pp.178--189.
    [19]
    Coppersmith D. Small solutions to polynomial equations, and low exponent RSA vulnerabilities. -\it Journal of Cryptology}, 1997, 10: 233--260.
    [20]
    Howgrave-Graham N. Finding small roots of univariate modular equations revisited. In -\it Proc. Cryptography and Coding}, Cirencester, UK, Springer-Verlag, 1997, pp.131--142.
    [21]
    A Lenstra, H Lenstra, Jr., L Lov\,-a}sz. Factoring polynomials with rational coefficients. -\it Mathematische Ann}, 1982, 261: 513--534.
    [22]
    Menezes A J, van Oorschot P C, Vanstone S A. Handbook of Applied Cryptography. CRC Press, 1997.
    [23]
    Bellare M, Rogaway P. Optimal asymmetric encryption. In -\it Proc. EUROCRYPT'94}, Springer-Verlag, Berlin, 1995, pp.92--111.
  • Related Articles

    [1]Ming-Cong Ma, Lu Wang, Yan-Ning Xu, Xiang-Xu Meng. Unsupervised Reconstruction for Gradient-Domain Rendering with Illumination Separation[J]. Journal of Computer Science and Technology, 2024, 39(6): 1281-1291. DOI: 10.1007/s11390-024-3142-4
    [2]Chun-Meng Kang, Lu Wang, Yan-Ning Xu, Xiang-Xu Meng, Yuan-Jie Song. Adaptive Photon Mapping Based on Gradient[J]. Journal of Computer Science and Technology, 2016, 31(1): 217-224. DOI: 10.1007/s11390-016-1622-x
    [3]Yu Zang, Hua Huang, Chen-Feng Li. Stroke Style Analysis for Painterly Rendering[J]. Journal of Computer Science and Technology, 2013, 28(5): 762-775. DOI: 10.1007/s11390-013-1375-8
    [4]Xiao-Hui Liang, Shang Ma, Li-Xia Cen, Zhuo Yu. Light Space Cascaded Shadow Maps Algorithm for Real Time Rendering[J]. Journal of Computer Science and Technology, 2011, 26(1): 176-186. DOI: 10.1007/s11390-011-1120-0
    [5]Jun Teng, Marc Jaeger, Bao-Gang Hu. A Fast Ambient Occlusion Method for Real-Time Plant Rendering[J]. Journal of Computer Science and Technology, 2007, 22(6): 859-866.
    [6]CHEN Wei, HUA Wei, BAO HuJun, PENG QunSheng. Real-Time Ray Casting Rendering of Volume Clipping in Medical Visualization[J]. Journal of Computer Science and Technology, 2003, 18(6).
    [7]Tong Xin, Tang Zesheng. Hardware Assisted Fast Volume Rendering with Boundary Enhancement[J]. Journal of Computer Science and Technology, 1998, 13(5): 393-401.
    [8]Li Bin, Liang Xundong, Liu Shenquan. A Surface Rendering Approach in 3D Rectilinear Datafield[J]. Journal of Computer Science and Technology, 1998, 13(3): 220-227.
    [9]Cai Wenli, Shi Jiaoying. Composed Scattering Model for Direct Volume Rendering[J]. Journal of Computer Science and Technology, 1996, 11(5): 433-442.
    [10]Huang Wenqi, Wang Gangqiang. A Basic Algorithm for Computer-Aided Design of Material Arrangement[J]. Journal of Computer Science and Technology, 1992, 7(1): 56-61.

Catalog

    Article views (53) PDF downloads (9431) Cited by()
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return