Power Attack on Small RSA Public Exponent - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu
Communication Dans Un Congrès Année : 2006

Power Attack on Small RSA Public Exponent

Résumé

In this paper, we present a new attack on RSA when the public exponent is short, for instance 3 or 216+1, and when the classical exponent randomization is used. This attack works even if blinding is used on the messages. From a Simple Power Analysis (SPA) we study the problem of recovering the RSA private key when non consecutive bits of it leak from the implementation. We also show that such information can be gained from sliding window implementations not protected against SPA.

Dates et versions

inria-00563960 , version 1 (07-02-2011)

Identifiants

Citer

Pierre-Alain Fouque, Sébastien Kunz-Jacques, Gwenaëlle Martinet, Frédéric Muller, Frédéric Valette. Power Attack on Small RSA Public Exponent. Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, 2006, Yokohama, Japan. pp.339-353, ⟨10.1007/11894063_27⟩. ⟨inria-00563960⟩
92 Consultations
0 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More