2006 | OriginalPaper | Buchkapitel
Power Attack on Small RSA Public Exponent
verfasst von : Pierre-Alain Fouque, Sébastien Kunz-Jacques, Gwenaëlle Martinet, Frédéric Muller, Frédéric Valette
Erschienen in: Cryptographic Hardware and Embedded Systems - CHES 2006
Verlag: Springer Berlin Heidelberg
Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.
Wählen Sie Textabschnitte aus um mit Künstlicher Intelligenz passenden Patente zu finden. powered by
Markieren Sie Textabschnitte, um KI-gestützt weitere passende Inhalte zu finden. powered by
In this paper, we present a new attack on RSA when the public exponent is short, for instance 3 or 2
16
+1, and when the classical exponent randomization is used. This attack works even if blinding is used on the messages.
From a Simple Power Analysis (SPA) we study the problem of recovering the RSA private key when non consecutive bits of it leak from the implementation. We also show that such information can be gained from sliding window implementations not protected against SPA.