Browse > Article
http://dx.doi.org/10.13089/JKIISC.2010.20.4.155

Security Reconsideration on CRT-RSA Algorithm Against Fault Attacks using Opcode Modification  

Ha, Jae-Cheol (Hoseo University)
Baek, Yi-Roo (Hoseo University)
Park, Jea-Hoon (Kyungpook National University)
Moon, Sang-Jae (Kyungpook National University)
Abstract
Since the RSA cryptosystem based on Chinese Remainder Theorem is vulnerable to many fault insertion attacks, some countermeasures against them were proposed. Recently, Kim et al. or Ha et al. respectively proposed each countermeasure scheme based on fault propagation method. Unfortunately, Hur et al. insist that these countermeasures are vulnerable to their opcode modification fault attack. In this paper, we show that the proposed attack can not apply to almost CRT-RSA countermeasures which use multi-precision operations in long bit computation. Therefore, the countermeasure against fault attack proposed by Kim et al. or Ha et al. are still secure.
Keywords
CRT-RSA; Fault attack; Opcode modification; Multi-precision operation;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 하재철, 박제훈, 문상재, "오류 확산 기법을 이용한 CRT-RSA 오류주입 공격 대응방안," 한국정보보호학회 논문지, 18(2), pp. 75-84, 2008년 4월.   과학기술학회마을
2 A. K. Lenstra, "Memo on RSA signature generation in the presence of faults," Sept. 1996.
3 A. Shamir, "Method and Apparatus for Protecting Public Key Schemes from Timing and Fault attacks," US Patent 5991415, 23, Nov. 1999.
4 S. Yen, S. Kim, S. Lim, and S. Moon, "RSA speedup with Chinese Remainder Theorem Immune Against Hardware Fault Cryptanalysis," IEEE Transaction on Computer, Special issue on CHES, Vol. 52, No.4, pp. 461-472, 2003.   DOI   ScienceOn
5 C. Couvreur, J. Quisquater, "Fast Decipherment Algorithm for RSA Public-Key Cryptosystem," Electronics Letters, Vol. 18, pp. 905-907, 1982.   DOI   ScienceOn
6 D. Boneh, R. DeMillo, and R. Lipton, "On the Importance of Checking Cryptographic Protocols for Fault," EUROCRYPT'97, LNCS 1233, pp. 37-51, Springer-Verlag, 1997.
7 S. Yen, D. Kim, and S. Moon, "Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection," FDTC'06, LNCS 4236, pp. 53-61, Springer-Verlag, 2006.
8 허순행, 이형섭, 이현승, 최동현, 원동호, 김승주, "연산자 조작 공격과 패 연산자 조작 공격에 대한 기존 CRT-RSA Scheme의 안전성 분석," 한국정보보호학회 논문지, 19(6), pp. 185-190, 2009년 12월.   과학기술학회마을
9 김성경, 김태현, 한동국, 박영호, 홍석희, "비교연산을 사용하지 않는 오류주입 공격에 안전한 CRT 기반의 RSA," 한국정보보호학회 논문지, 18(4), pp. 17-25, 2008년 8월.   과학기술학회마을
10 R. Rivest, A. Shamir, and L. Adleman, ''A Method for Obtaining Digital Signatures and Public-key Cryptosystems," ACM, Vol. 21, pp. 120-126, 1978.   DOI   ScienceOn