Hardware-fault attack handling in RNS-based Montgomery multipliers

Dimitrios Schinianakis, Thanos Stouraitis

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

6 Scopus citations

Abstract

Hardware-fault attacks have become a prominent threat against secure cipher implementations. Faults are deliberately introduced during the operation of cryptographic hardware so that, based on the faulty outputs, secret keys may be recovered. This work focuses on the RSA-CRT algorithm, which, although famous and widely exploited, is known to be vulnerable to hardware-fault attacks. Most of the counter measures, proposed in the literature for this algorithm, are based on number theory techniques that apply at a protocol level. In these cases, security is offered at the cost of extra operations in the RSA-CRT protocol. Unlike these solutions, this work examines the security potential offered by hardware implementations. It attempts to prove that the use of a well-designed, residue-arithmetic, Montgomery multiplier overcomes hardware-fault attack threats, with no need to alter the basic RSA-CRT protocol.

Original languageBritish English
Title of host publication2013 IEEE International Symposium on Circuits and Systems, ISCAS 2013
Pages3042-3045
Number of pages4
DOIs
StatePublished - 2013
Event2013 IEEE International Symposium on Circuits and Systems, ISCAS 2013 - Beijing, China
Duration: 19 May 201323 May 2013

Publication series

NameProceedings - IEEE International Symposium on Circuits and Systems
ISSN (Print)0271-4310

Conference

Conference2013 IEEE International Symposium on Circuits and Systems, ISCAS 2013
Country/TerritoryChina
CityBeijing
Period19/05/1323/05/13

Fingerprint

Dive into the research topics of 'Hardware-fault attack handling in RNS-based Montgomery multipliers'. Together they form a unique fingerprint.

Cite this