The Community for Technology Leaders
Green Image
Nowadays, Side Channel Attacks allow an attacker to recover secrets stored in embedded devices more efficiently than any other kind of attack. Among the former, Fault Attacks (FA) and Single Power Analysis (SPA) are probably the most effective: When applied to straightforward implementations of the RSA cryptosystem, only one execution of the algorithm is required to recover the secret key. Over recent years, many countermeasures have been proposed to prevent Side Channel Attacks on RSA. Regarding Fault Attacks, only one countermeasure offers effective protection and it can be very costly. In this paper, we focus on a means to counteract Fault Attacks by presenting a new way of implementing exponentiation algorithms. This method can be used to obtain fast FA-resistant RSA signature generations in both the Straightforward Method and Chinese Remainder Theorem modes. Moreover, as it has been shown that Fault Attacks can benefit from the weaknesses introduced by some SPA countermeasures, we ensure that our method resists SPA and, thus, does not require supplementary SPA countermeasures.
Smart cards, side channel, fault injection, simple power analysis, public-key cryptosystems, RSA, exponentiation.

C. Giraud, "An RSA Implementation Resistant to Fault Attacks and to Simple Power Analysis," in IEEE Transactions on Computers, vol. 55, no. , pp. 1116-1120, 2006.
84 ms
(Ver 3.3 (11022016))