Nikodem, M.
In this paper we analyse the digital signature algorithm (DSA) and its immunity to the fault cryptanalysis that takes advantage of errors inducted into the private key a. The focus of our attention is on the DSA scheme as it is a widely adopted by the research community, it is known to be vulnerable to this type of attack, but neither sound nor effective modifications to improve its immunity have been proposed. In our paper we consider a new way of implementing the DSA that enhances its immunity in the presence of faults. Our proposal ensures that inducting errors into the private key has no benefits since the attacker cannot deduce any information about the private key given erroneous signatures. The overhead of our proposal is similar to the overhead of obvious countermeasure based on signature verification. However, our modification generates fewer security issues.
- Anderson, R.J., Kuhn, M.G.: Tamper Resistance - a Cautionary Note. In: The Second USENIX Workshop on Electronic Commerce Proceedings, pp. 18–21 (1996)
- Aumüller C., Bier P., Fischer W., Hofreiter P., Seifert J.-P., Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures, Cryptographic Hardware and Embedded Systems - CHES 2002 (2003) ISBN:9783540004097 p.260-275, 10.1007/3-540-36400-5_20
- Bao F., Deng R. H., Han Y., Jeng A., Narasimhalu A. D., Ngair T., Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults, Security Protocols (1998) ISBN:9783540640400 p.115-124, 10.1007/bfb0028164
- Biham Eli, Shamir Adi, Differential fault analysis of secret key cryptosystems, Advances in Cryptology — CRYPTO '97 (1997) ISBN:9783540633846 p.513-525, 10.1007/bfb0052259
- Blmer, J., Otto, M., Seifert, J.-P.: A New CRT-RSA Algorithm Secure Against Bellcore Attacks. In: Proc. ACM Computer and Communications Security 2003 (ACM CCS 2003), pp. 311–320. ACM Press, New York (2003)
- Boneh Dan, DeMillo Richard A., Lipton Richard J., On the Importance of Checking Cryptographic Protocols for Faults, Advances in Cryptology — EUROCRYPT ’97 (1997) ISBN:9783540629757 p.37-51, 10.1007/3-540-69053-0_4
- Boneh, D., Venkatesan, R.: Rounding in Lattices and Its Cryptographic Applications. In: SODA: ACM-SIAM Symposium on Discrete Algorithms (A Conference on Theoretical, Experimental Analysis of Discrete Algorithms), pp. 675–681 (1997)
- Breveglieri L., Koren I., Maistri P., Ravasio M., Incorporating Error Detection in an RSA Architecture, Lecture Notes in Computer Science (2006) ISBN:9783540462507 p.71-79, 10.1007/11889700_7
- Czapski, M., Nikodem, M.: Error Correction Procedures for Advanced Encryption Standard. In: Int. Workshop on Coding and Cryptography (WCC 2007), April 16-20, 2007, pp. 89–98. INRIA (2007)
- Dusart, P., Letourneux, G., Vivolo, O.: Differential Fault Analysis on A.E.S., ArXiv Computer Science e-prints (January 2003)
- Giraud Christophe, Knudsen Erik W., Fault Attacks on Signature Schemes, Information Security and Privacy (2004) ISBN:9783540223795 p.478-491, 10.1007/978-3-540-27800-9_41
- Joye Marc, Lenstra Arjen K., Quisquater Jean-Jacques, Chinese Remaindering Based Cryptosystems in the Presence of Faults, 10.1007/s001459900055
- Karpovsky, M., Kulikowski, K.J., Taubin, A.: A Differential Fault Analysis Attack Resistant Architecture of the Advanced Encryption Standard. In: Proceedings of CARDIS 2004, pp. 177–192. Kluwer, Dordrecht (2004)
- Karri R., Wu K., Mishra P., Yongkook Kim, Concurrent error detection schemes for fault-based side-channel cryptanalysis of symmetric block ciphers, 10.1109/tcad.2002.804378
- Kim Chong Hee, Quisquater Jean-Jacques, Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasures, Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems (2007) ISBN:9783540723530 p.215-228, 10.1007/978-3-540-72354-7_18
- Kömmerling, O., Kuhn, M.G.: Design Principles for Tamper-Resistant Smartcard Processors. In: USENIX Workshop on Smartcard Technology - Smartcard 1999, USENIX Association, pp. 9–20 (1999)
- Naccache David, Nguyên Phong Q., Tunstall Michael, Whelan Claire, Experimenting with Faults, Lattices and the DSA, Public Key Cryptography - PKC 2005 (2005) ISBN:9783540244547 p.16-28, 10.1007/978-3-540-30580-4_3
- Nguyen, Shparlinski, The Insecurity of the Digital Signature Algorithm with Partially Known Nonces, 10.1007/s00145-002-0021-3
- Rosa, T.: Lattice-based Fault Attacks on DSA - Another Possible Strategy. In: Proceedings of the conference Security and Protection of Information 2005, Brno, Czech Republic, 3-5 May 2005, pp. 91–96 (2005)
- Sung-Ming Yen, Joye M., Checking before output may not be enough against fault-based cryptanalysis, 10.1109/12.869328
- Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon, RSA speedup with chinese remainder theorem immune against hardware fault cryptanalysis, 10.1109/tc.2003.1190587
- Yen Sung-Ming, Kim Dongryeol, Moon SangJae, Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection, Lecture Notes in Computer Science (2006) ISBN:9783540462507 p.53-61, 10.1007/11889700_5
Bibliographic reference |
Nikodem, M.. DSA signature scheme immune to the fault cryptanalysis.Smart Card Research and Advanced Applications. 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008 (London, UK, 8-11 September 2008). In: Grimaud, G.; Standaert, F.-X.;, Smart Card Research and Advanced Applications. 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, Springer-verlag2008, p. 61-73 |
Permanent URL |
http://hdl.handle.net/2078.1/67658 |