Profiling Attack against RSA Key Generation Based on a Euclidean Algorithm
نویسندگان
چکیده
A profiling attack is a powerful variant among the noninvasive side channel attacks. In this work, we target RSA key generation relying on binary version of extended Euclidean algorithm for modular inverse and GCD computations. To date, has only been exploited by simple power analysis; therefore, countermeasures described in literature are focused mitigating kind attack. We demonstrate that one those not effective preventing The feasibility our approach relies extraction several leakage vectors from single trace. Moreover, because there known relationships between secrets public modulo RSA, uncertainty some guessed can be reduced tests. This increases effectiveness proposed
منابع مشابه
Attack against Ibrahim's Distributed Key Generation for RSA
Distributed RSA key generation protocols aim to generate RSA keys in such a way that no single participant of the protocol can learn factorization of the RSA modulus. In this note we show that two recent protocols of this kind (Journal of Network Security, Vol. 7, No. 1, 2008, pp. 106-113 and Vol. 8, No. 2, 2009, pp. 139-150) fail their security target. We present an attack that can be launched...
متن کاملSide-Channel Attack against RSA Key Generation Algorithms
Many applications of embedded devices require the generation of cryptographic secret parameters during the life cycle of the product. In such an unsafe context, several papers have shown that key generation algorithms are vulnerable to side-channel attacks. This is in particular the case of the generation of the secret prime factors in RSA. Until now, the threat has been demonstrated against na...
متن کاملSecuring RSA algorithm against timing attack
Security plays an important role in many embedded systems. All security based algorithms are implemented in hardware or software, and on physical devices which interact with the systems and influenced by their environments. The attacker extracts, investigate and monitor these physical interactions and extracts side channel information which is used in cryptanalysis. This type of cryptanalysis i...
متن کاملA RSA Key Security Gradating Algorithm Based on Threshold Attack Time
In this paper, we pioneer a key security level gradation scheme which is proved to efficient to counteract Iterative-Encrypting-Attack against RSA. And we make it clear that the bug which hides after the traditional key generation algorithm is exploited by Iterative-EncryptingAttack and weakens RSA security, and that the case can be improved if the traditional key generation algorithm is modifi...
متن کاملPerformance Analysis of Countermeasures against Timing Attack in RSA Algorithm
Public key cryptography is based on two keys, in which decryption key is private key. Among the different cryptanalytic attacks, timing attack is one of the possible attacks on RSA that determines bits of private key. This is done by determining time for each iteration in computing modular exponentiation. There are different mechanisms to counter such attack. Among them, blinding method and ran...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information
سال: 2021
ISSN: ['2078-2489']
DOI: https://doi.org/10.3390/info12110462