2005
DOI: 10.1007/11554868_13
|View full text |Cite
|
Sign up to set email alerts
|

Power Analysis by Exploiting Chosen Message and Internal Collisions – Vulnerability of Checking Mechanism for RSA-Decryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
63
0

Year Published

2007
2007
2018
2018

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 71 publications
(63 citation statements)
references
References 13 publications
0
63
0
Order By: Relevance
“…For other attacks against RSA see the power attack by Yen et al [18], and the timing attack by Miyamoto et al [11]. Now to our DPA attack: Every multiplication (in this section this includes squarings) starts with an empty accumulator M = 0, and also a zero adjustment value μ 0 (both for Reduce-by-Feedback and Montgomery multiplication).…”
Section: How To Break Rsa With Differential Power Analysismentioning
confidence: 99%
“…For other attacks against RSA see the power attack by Yen et al [18], and the timing attack by Miyamoto et al [11]. Now to our DPA attack: Every multiplication (in this section this includes squarings) starts with an empty accumulator M = 0, and also a zero adjustment value μ 0 (both for Reduce-by-Feedback and Montgomery multiplication).…”
Section: How To Break Rsa With Differential Power Analysismentioning
confidence: 99%
“…This idea can be seen as a correct form to protect the modular exponentiation. However, it can be observed that algorithm 3 blinds the message and it remains vulnerable to the 1 − N attack [15]. The best technique for message blinding under this scheme is that proposed by Fumaroli and Vigilant [20].…”
Section: Possible Countermeasuresmentioning
confidence: 99%
“…One of the simplest chosen-message attacks is the 1 − N attack proposed by Yen et al in [15]. Though they explained the theoretical form of their attack against the left-to-right SaMA and BRIP algorithms [16], Miyamoto et al demonstrated the effectiveness of an 1 − N attack in practice [17].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…SPAAttacks assuming that the messages can be chosen by the adversary (e.g. [26,27]) are out of the scope of this paper. Classical countermeasures such as the randomization of M (see for instance [28]) can be used together with our SPA/FA countermeasure to counteract such attacks by rendering the value of M unpredictable.…”
Section: Proposalmentioning
confidence: 99%