2012
DOI: 10.1007/978-3-642-29912-4_9
|View full text |Cite
|
Sign up to set email alerts
|

RSA Key Generation: New Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
10
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(10 citation statements)
references
References 12 publications
0
10
0
Order By: Relevance
“…Assuming that the prime candidates are incremented by a constant value in case of a failure, Finke et al establish equations that allow to factor the modulus. Similarly, Vuillaume et al [48] considered differential power analysis (DPA), template attacks, and fault attacks to attack the prime generation procedure. However, Vuillaume et al consider the Fermat test [34,Algorithm 4.9], which is rarely used in practice due to false positives (Carmichael numbers).…”
Section: Microarchitectural Attacks On Rsamentioning
confidence: 99%
See 2 more Smart Citations
“…Assuming that the prime candidates are incremented by a constant value in case of a failure, Finke et al establish equations that allow to factor the modulus. Similarly, Vuillaume et al [48] considered differential power analysis (DPA), template attacks, and fault attacks to attack the prime generation procedure. However, Vuillaume et al consider the Fermat test [34,Algorithm 4.9], which is rarely used in practice due to false positives (Carmichael numbers).…”
Section: Microarchitectural Attacks On Rsamentioning
confidence: 99%
“…The attack presented in this paper differs from previous attacks on RSA key generation as follows. First, contrary to related work which target the prime generation itself [48] or the primality tests [7,19], we target the subsequent parameter checking routine. Second, previous attacks rely on power analysis while we use a purely software-based side channel.…”
Section: Microarchitectural Attacks On Rsamentioning
confidence: 99%
See 1 more Smart Citation
“…The RSA key generation has then left the safe context of production firms for an hostile environment. This assessment has been highlighted in several papers [8,16,28] which show that the key generation security must be taken into account for today open platforms.…”
Section: Introductionmentioning
confidence: 99%
“…For such algorithms, which, to the best of our knowledge, correspond to the most efficient and up-to-date implementations met on embedded devices, we exhibit an Advanced Side-Channel Analysis on the sieving process even when the latter is implemented to defeat the state-of-the-art attacks [16]. Contrary to [28], our attack does not target the probable prime tests but the prime sieve which was believed to be safe if implemented in a regular way. We show how useful information can be extracted from the divisibility phase and how this could finally lead, for practical implementations, to the recovery of more than half bits of information on the prime number generated.…”
Section: Introductionmentioning
confidence: 99%