loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Author: Constantinos Patsakis

Affiliation: Trinity College, Ireland

Keyword(s): SAT Solvers, Partial Key Exposure, Integer Factorization, RSA, Public-key Cryptography.

Related Ontology Subjects/Areas/Topics: Applied Cryptography ; Cryptographic Techniques and Key Management ; Data Engineering ; Databases and Data Security ; Information and Systems Security

Abstract: The theoretical security that modern encryption algorithms are providing, leads researchers to new attack scenarios which are more implementation centric. By discovering hardware or software flaws that can recover some information about the decryption key, cryptanalysts try to exploit this knowledge. Therefore, many side channel attacks have appeared, illustrating that the concept of having secure code or even embedding all cryptographic functions in hardware modules, in many cases in not adequate. The aim of this work is to illustrate how partial information can be used to exploit the extracted information, leading to full reconstruction of the private key of RSA, for some implementations of the algorithm where the LSB has been selected to fit several constraints. More precisely, we study the case where the LSB half of the primes is identical or when there is a linear equation that mixes the LSB halves of the two primes.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.19.31.73

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Patsakis, C. (2013). Recovering RSA Private Keys on Implementations with Tampered LSBs. In Proceedings of the 10th International Conference on Security and Cryptography (ICETE 2013) - SECRYPT; ISBN 978-989-8565-73-0; ISSN 2184-3236, SciTePress, pages 453-460. DOI: 10.5220/0004534904530460

@conference{secrypt13,
author={Constantinos Patsakis.},
title={Recovering RSA Private Keys on Implementations with Tampered LSBs},
booktitle={Proceedings of the 10th International Conference on Security and Cryptography (ICETE 2013) - SECRYPT},
year={2013},
pages={453-460},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004534904530460},
isbn={978-989-8565-73-0},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the 10th International Conference on Security and Cryptography (ICETE 2013) - SECRYPT
TI - Recovering RSA Private Keys on Implementations with Tampered LSBs
SN - 978-989-8565-73-0
IS - 2184-3236
AU - Patsakis, C.
PY - 2013
SP - 453
EP - 460
DO - 10.5220/0004534904530460
PB - SciTePress