Presentation | 2017-07-14 Recovering CRT-RSA Secret Keys Using the Information of the Operations Based on 2^m-ary Method. Kento Oonishi, Noboru Kunihiro, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | In side channel attacks, the secret keys are obtained from physical data in the implementation of the cryptosystem. For example, information of the CRT-RSA secret keys can be extracted from exponentiation in the decryption algorithm. However, if accuracy of the physical data is not high, the secret keys are not obtained easily. In this paper, we propose the way of recovering the CRT-RSA secret keys from the error keys extracted from exponentiation based on $2^{m}$-ary method. Moreover, we analyze our algorithm and verify the effectiveness of our algorithm by numerical experiments. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | CRT-RSA / Exponentiation / $2^{m}$-ary Method / Side Channel Attacks |
Paper # | ISEC2017-22,SITE2017-14,ICSS2017-21,EMM2017-25 |
Date of Issue | 2017-07-07 (ISEC, SITE, ICSS, EMM) |
Conference Information | |
Committee | SITE / EMM / ISEC / ICSS / IPSJ-CSEC / IPSJ-SPT |
---|---|
Conference Date | 2017/7/14(2days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | Hitoshi Okada(NII) / Keiichi Iwamura(TUC) / Kazuto Ogawa(NHK) / Yoshiaki Shiraishi(Kobe Univ.) |
Vice Chair | Tetsuya Morizumi(Kanagawa Univ.) / Masaru Ogawa(Kobe Gakuin Univ.) / Hirohisa Hioki(Kyoto Univ.) / Minoru Kuribayashi(Okayama Univ.) / Atsushi Fujioka(Kanagawa Univ.) / Shiho Moriai(NICT) / Takeshi Ueda(Mitsubishi Electric) / Hiroki Takakura(NII) |
Secretary | Tetsuya Morizumi(Gifu Shotoku Gakuen Univ.) / Masaru Ogawa(Tokyo Univ. of the Arts) / Hirohisa Hioki(Shizuoka Univ.) / Minoru Kuribayashi(Tokyo Metropolitan Univ.) / Atsushi Fujioka(Tohoku Univ.) / Shiho Moriai(Tokai Univ.) / Takeshi Ueda(Yokohama National Univ.) / Hiroki Takakura(NTT) |
Assistant | Akiyoshi Kabeya(Chiba Univ.) / Hisanori Kato(KDDI) / Kan Hyonho(NIT, Tokyo) / Harumi Murata(Tyukyo Univ.) / Keita Emura(NICT) / Yuichi Komano(TOSHIBA) / Yuuji Suga(IIJ) / Takahiro Kasama(NICT) / Akira Yamada(KDDI labs.) |
Paper Information | |
Registration To | Technical Committee on Social Implications of Technology and Information Ethics / Technical Committee on Enriched MultiMedia / Technical Committee on Information Security / Technical Committee on Information and Communication System Security / Special Interest Group on Computer Security / Special Interest Group on Security Psychology and Trust |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Recovering CRT-RSA Secret Keys Using the Information of the Operations Based on 2^m-ary Method. |
Sub Title (in English) | |
Keyword(1) | CRT-RSA |
Keyword(2) | Exponentiation |
Keyword(3) | $2^{m}$-ary Method |
Keyword(4) | Side Channel Attacks |
1st Author's Name | Kento Oonishi |
1st Author's Affiliation | The University of Tokyo(Univ. of Tokyo) |
2nd Author's Name | Noboru Kunihiro |
2nd Author's Affiliation | The University of Tokyo(Univ. of Tokyo) |
Date | 2017-07-14 |
Paper # | ISEC2017-22,SITE2017-14,ICSS2017-21,EMM2017-25 |
Volume (vol) | vol.117 |
Number (no) | ISEC-125,SITE-126,ICSS-127,EMM-128 |
Page | pp.pp.107-114(ISEC), pp.107-114(SITE), pp.107-114(ICSS), pp.107-114(EMM), |
#Pages | 8 |
Date of Issue | 2017-07-07 (ISEC, SITE, ICSS, EMM) |