DocumentCode :
626955
Title :
Hardware-fault attack handling in RNS-based Montgomery multipliers
Author :
Schinianakis, Dimitrios ; Stouraitis, Thanos
Author_Institution :
Dept. of Electr. & Comput. Eng., Univ. of Patras, Rion, Greece
fYear :
2013
fDate :
19-23 May 2013
Firstpage :
3042
Lastpage :
3045
Abstract :
Hardware-fault attacks have become a prominent threat against secure cipher implementations. Faults are deliberately introduced during the operation of cryptographic hardware so that, based on the faulty outputs, secret keys may be recovered. This work focuses on the RSA-CRT algorithm, which, although famous and widely exploited, is known to be vulnerable to hardware-fault attacks. Most of the counter measures, proposed in the literature for this algorithm, are based on number theory techniques that apply at a protocol level. In these cases, security is offered at the cost of extra operations in the RSA-CRT protocol. Unlike these solutions, this work examines the security potential offered by hardware implementations. It attempts to prove that the use of a well-designed, residue-arithmetic, Montgomery multiplier overcomes hardware-fault attack threats, with no need to alter the basic RSA-CRT protocol.
Keywords :
cryptographic protocols; number theory; public key cryptography; residue number systems; RNS-based Montgomery multipliers; RSA-CRT protocol; cryptographic hardware; hardware-fault attack handling; number theory techniques; protocol level; residue-arithmetic; secret keys; secure cipher implementations; Circuit faults; Conferences; Cryptography; Digital signatures; Hardware; Protocols;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Circuits and Systems (ISCAS), 2013 IEEE International Symposium on
Conference_Location :
Beijing
ISSN :
0271-4302
Print_ISBN :
978-1-4673-5760-9
Type :
conf
DOI :
10.1109/ISCAS.2013.6572280
Filename :
6572280
Link To Document :
بازگشت