Fault Attacks on RSA Public Keys: Left-To-Right Implementations are also Vulnerable
Authors:
Alexandre Berzati,
Cécile Canovas,
Jean-Guillaume Dumas,
Louis Goubin
Abstract:
After attacking the RSA by injecting fault and corresponding countermeasures, works appear now about the need for protecting RSA public elements against fault attacks. We provide here an extension of a recent attack based on the public modulus corruption. The difficulty to decompose the "Left-To-Right" exponentiation into partial multiplications is overcome by modifying the public modulus to a num…
▽ More
After attacking the RSA by injecting fault and corresponding countermeasures, works appear now about the need for protecting RSA public elements against fault attacks. We provide here an extension of a recent attack based on the public modulus corruption. The difficulty to decompose the "Left-To-Right" exponentiation into partial multiplications is overcome by modifying the public modulus to a number with known factorization. This fault model is justified here by a complete study of faulty prime numbers with a fixed size. The good success rate of this attack combined with its practicability raises the question of using faults for changing algebraic properties of finite field based cryptosystems.
△ Less
Submitted 31 January, 2011; v1 submitted 7 January, 2009;
originally announced January 2009.
SOSEMANUK: a fast software-oriented stream cipher
Authors:
Come Berbain,
Olivier Billet,
Anne Canteaut,
Nicolas Courtois,
Henri Gilbert,
Louis Goubin,
Aline Gouget,
Louis Granboulan,
Cedric Lauradoux,
Marine Minier,
Thomas Pornin,
Herve Sibert
Abstract:
Sosemanuk is a new synchronous software-oriented stream cipher, corresponding to Profile 1 of the ECRYPT call for stream cipher primitives. Its key length is variable between 128 and 256 bits. It ac- commodates a 128-bit initial value. Any key length is claimed to achieve 128-bit security. The Sosemanuk cipher uses both some basic design principles from the stream cipher SNOW 2.0 and some transf…
▽ More
Sosemanuk is a new synchronous software-oriented stream cipher, corresponding to Profile 1 of the ECRYPT call for stream cipher primitives. Its key length is variable between 128 and 256 bits. It ac- commodates a 128-bit initial value. Any key length is claimed to achieve 128-bit security. The Sosemanuk cipher uses both some basic design principles from the stream cipher SNOW 2.0 and some transformations derived from the block cipher SERPENT. Sosemanuk aims at improv- ing SNOW 2.0 both from the security and from the efficiency points of view. Most notably, it uses a faster IV-setup procedure. It also requires a reduced amount of static data, yielding better performance on several architectures.
△ Less
Submitted 10 October, 2008;
originally announced October 2008.