Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

An efficient CRT-RSA algorithm secure against power and fault attacks

Full metadata record
DC Field Value Language
dc.contributor.authorKim, Sung-Kyoung-
dc.contributor.authorKim, Tae Hyun-
dc.contributor.authorHan, Dong-Guk-
dc.contributor.authorHong, Seokhie-
dc.date.accessioned2021-09-07T07:56:12Z-
dc.date.available2021-09-07T07:56:12Z-
dc.date.created2021-06-18-
dc.date.issued2011-10-
dc.identifier.issn0164-1212-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/111502-
dc.description.abstractRSA digital signatures based on the Chinese Remainder Theorem (CRT) are subject to power and fault attacks. In particular, modular exponentiation and CRT recombination are prone to both attacks. However, earlier countermeasures are susceptible to the possibility of advanced and sophisticated attacks. In this paper, we investigate state-of-the-art countermeasures against power and fault attacks from the viewpoint of security and efficiency. Then, we show possible vulnerabilities to fault attacks. Finally, we propose new modular exponentiation and CRT recombination algorithms secure against all known power and fault attacks. Our proposal improves efficiency by replacing arithmetic operations with logical ones to check errors in the CRT recombination step. In addition, since our CRT-RSA algorithm does not require knowledge of the public exponent, it guarantees a more versatile implementation. (C) 2011 Elsevier Inc. All rights reserved.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherELSEVIER SCIENCE INC-
dc.subjectRESISTANCE-
dc.subjectCHECKING-
dc.titleAn efficient CRT-RSA algorithm secure against power and fault attacks-
dc.typeArticle-
dc.contributor.affiliatedAuthorHong, Seokhie-
dc.identifier.doi10.1016/j.jss.2011.04.026-
dc.identifier.scopusid2-s2.0-79960840652-
dc.identifier.wosid000294573000006-
dc.identifier.bibliographicCitationJOURNAL OF SYSTEMS AND SOFTWARE, v.84, no.10, pp.1660 - 1669-
dc.relation.isPartOfJOURNAL OF SYSTEMS AND SOFTWARE-
dc.citation.titleJOURNAL OF SYSTEMS AND SOFTWARE-
dc.citation.volume84-
dc.citation.number10-
dc.citation.startPage1660-
dc.citation.endPage1669-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.subject.keywordPlusRESISTANCE-
dc.subject.keywordPlusCHECKING-
dc.subject.keywordAuthorChinese Remainder Theorem (CRT)-
dc.subject.keywordAuthorFactorization attack-
dc.subject.keywordAuthorFault attack-
dc.subject.keywordAuthorChecking procedure-
dc.subject.keywordAuthorSimple power analysis-
dc.subject.keywordAuthorDifferential power analysis-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Hong, Seok hie photo

Hong, Seok hie
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE