Presentation 2013-07-19
Recovering RSA Secret Keys from Observed Analog Data (I)
Noboru KUNIHIRO, Atsushi TAKAYASU,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) We discuss how to recover RSA secret keys from noisy analog data obtained by physical attacks such as cold boot attack and side-channel attack. There are many works recovering original binary secret keys from noisy binary data. In obtaining the noisy binary keys, it is usual that the analog data are first observed and then the binary data are obtained by quantization process. In this paper, we propose three algorithms recovering the original secret keys from the noisy analog data. More precisely, consider the observed data follows the Gaussian distribution with mean μ and variance σ^2. Our algorithm works in polynomial time if σ/μ≦1.533.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) RSA / Key-recovery / Cold Boot Attack / Side-channel Attack / Quantization
Paper # ISEC2013-46,SITE2013-41,ICSS2013-51,EMM2013-48
Date of Issue

Conference Information
Committee SITE
Conference Date 2013/7/11(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Social Implications of Technology and Information Ethics (SITE)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Recovering RSA Secret Keys from Observed Analog Data (I)
Sub Title (in English)
Keyword(1) RSA
Keyword(2) Key-recovery
Keyword(3) Cold Boot Attack
Keyword(4) Side-channel Attack
Keyword(5) Quantization
1st Author's Name Noboru KUNIHIRO
1st Author's Affiliation The University of Tokyo()
2nd Author's Name Atsushi TAKAYASU
2nd Author's Affiliation The University of Tokyo
Date 2013-07-19
Paper # ISEC2013-46,SITE2013-41,ICSS2013-51,EMM2013-48
Volume (vol) vol.113
Number (no) 136
Page pp.pp.-
#Pages 5
Date of Issue