Skip to Main content Skip to Navigation
Conference papers

Fault Attacks on RSA Public Keys: Left-To-Right Implementations are also Vulnerable

Abstract : After attacking the RSA by injecting fault and corresponding countermeasures, works appear now about the need for protecting RSA public elements against fault attacks. We provide here an extension of a recent attack based on the public modulus corruption. The difficulty to decompose the "Left-To-Right" exponentiation into partial multiplications is overcome by modifying the public modulus to a number with known factorization. This fault model is justified here by a complete study of faulty prime numbers with a fixed size. The good success rate of this attack combined with its practicability raises the question of using faults for changing algebraic properties of finite field based cryptosystems.
Document type :
Conference papers
Complete list of metadata

Cited literature [19 references]  Display  Hide  Download
Contributor : Jean-Guillaume Dumas <>
Submitted on : Monday, January 31, 2011 - 11:42:56 AM
Last modification on : Thursday, November 19, 2020 - 1:01:01 PM
Long-term archiving on: : Saturday, December 3, 2016 - 3:51:45 PM


Files produced by the author(s)




Alexandre Berzati, Cécile Canovas, Jean-Guillaume Dumas, Louis Goubin. Fault Attacks on RSA Public Keys: Left-To-Right Implementations are also Vulnerable. RSA Conference 2009 - Cryptographers' Track, Apr 2009, San Francisco, United States. pp.414--428, ⟨10.1007/978-3-642-00862-7_28⟩. ⟨hal-00348416v3⟩



Record views


Files downloads