2014
DOI: 10.1007/978-3-662-44709-3_13
|View full text |Cite
|
Sign up to set email alerts
|

Side-Channel Attack against RSA Key Generation Algorithms

Abstract: Many applications of embedded devices require the generation of cryptographic secret parameters during the life cycle of the product. In such an unsafe context, several papers have shown that key generation algorithms are vulnerable to side-channel attacks. This is in particular the case of the generation of the secret prime factors in RSA. Until now, the threat has been demonstrated against naive implementations whose operations' flow depends on secret data, and a simple countermeasure is to avoid such kind o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
11
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(12 citation statements)
references
References 24 publications
0
11
0
Order By: Relevance
“…However, Vuillaume et al consider the Fermat test [34,Algorithm 4.9], which is rarely used in practice due to false positives (Carmichael numbers). Bauer et al [7] also attacked the prime sieve procedure during the prime number generation. All these side-channel attacks either target the primality test or the prime generation itself and cannot be executed by only running software on the targeted machine.…”
Section: Microarchitectural Attacks On Rsamentioning
confidence: 99%
See 1 more Smart Citation
“…However, Vuillaume et al consider the Fermat test [34,Algorithm 4.9], which is rarely used in practice due to false positives (Carmichael numbers). Bauer et al [7] also attacked the prime sieve procedure during the prime number generation. All these side-channel attacks either target the primality test or the prime generation itself and cannot be executed by only running software on the targeted machine.…”
Section: Microarchitectural Attacks On Rsamentioning
confidence: 99%
“…Although cryptographic implementations (e.g., in OpenSSL [20]) are often hardened against side-channel attacks on secret key operations such as decryption and signature generation of digital signature schemes, the process of key generation has been mostly neglected in these analyses. While power analysis attacks targeting the prime factor generation during RSA key generation have been investigated [7,19,48], software-based side-channel attacks have been considered out of scope for various side-channel attack scenarios. On the one hand, key generation is usually a one-time operation, limiting possible attack observations to a minimum.…”
mentioning
confidence: 99%
“…In [3], the Joye and Pallier method proposed in [4] was analyzed to recover some bits of the secret primes, and the Coppersmith method was used to calculate the remaining ones, with an overall success rate of 0.1% [5]. In [6] and [7], the authors analyzed the leakages that could exist in different methods for checking the divisibility of a prime candidate by a prime sieve. Independent of the specific random prime number generation algorithms analyzed in these works and their intrinsic implementation details, the best success rate achieved was 25% [7].…”
Section: Introductionmentioning
confidence: 99%
“…In [6] and [7], the authors analyzed the leakages that could exist in different methods for checking the divisibility of a prime candidate by a prime sieve. Independent of the specific random prime number generation algorithms analyzed in these works and their intrinsic implementation details, the best success rate achieved was 25% [7].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation