ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Journal Article Improved Shamir''s CRT-RSA Algorithm: Revisit with the Modulus Chaining Method
Cited 10 time in scopus Download 58 time Share share facebook twitter linkedin kakaostory
Authors
Seungkwang Lee, Dooho Choi, Yongje Choi
Issue Date
2014-06
Citation
ETRI Journal, v.36, no.3, pp.469-478
ISSN
1225-6463
Publisher
한국전자통신연구원 (ETRI)
Language
English
Type
Journal Article
DOI
https://dx.doi.org/10.4218/etrij.14.0113.0317
Abstract
RSA signature algorithms using the Chinese remainder theorem (CRT-RSA) are approximately four-times faster than straightforward implementations of an RSA cryptosystem. However, the CRT-RSA is known to be vulnerable to fault attacks; even one execution of the algorithm is sufficient to reveal the secret keys. Over the past few years, several countermeasures against CRT-RSA fault attacks have tended to involve additional exponentiations or inversions, and in most cases, they are also vulnerable to new variants of fault attacks. In this paper, we review how Shamir's countermeasure can be broken by fault attacks and improve the countermeasure to prevent future fault attacks, with the added benefit of low additional costs. In our experiment, we use the sidechannel analysis resistance framework system, a fault injection testing and verification system, which enables us to inject a fault into the right position, even to within 1 μs. We also explain how to find the exact timing of the target operation using an Atmega128 software board. © 2014 ETRI.
KSP Keywords
CRT-RSA, Chinese remainder theorem(CRT), Fault attacks, Fault injection testing, RSA Cryptosystem, RSA algorithm, Verification system, secret key, testing and verification