• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Study on Secret Key Recovery from Noisy Versions

Research Project

Project/Area Number 25280001
Research Category

Grant-in-Aid for Scientific Research (B)

Allocation TypePartial Multi-year Fund
Section一般
Research Field Theory of informatics
Research InstitutionThe University of Tokyo

Principal Investigator

Kunihiro Noboru  東京大学, 新領域創成科学研究科, 准教授 (60345436)

Project Period (FY) 2013-04-01 – 2017-03-31
Project Status Completed (Fiscal Year 2016)
Budget Amount *help
¥7,670,000 (Direct Cost: ¥5,900,000、Indirect Cost: ¥1,770,000)
Fiscal Year 2015: ¥2,860,000 (Direct Cost: ¥2,200,000、Indirect Cost: ¥660,000)
Fiscal Year 2014: ¥2,340,000 (Direct Cost: ¥1,800,000、Indirect Cost: ¥540,000)
Fiscal Year 2013: ¥2,470,000 (Direct Cost: ¥1,900,000、Indirect Cost: ¥570,000)
Keywords暗号理論 / 安全性評価 / サイドチャネル攻撃 / 公開鍵暗号 / 安全評価 / 安全性解析
Outline of Final Research Achievements

In this research project, we proposed several algorithms to recover the whole secret key when secret key sequences with noise are obtained. We studied the situation where the erasure and error occurred to the correct secret key and proposed an algorithm to achieve the theoretical bound. Furthermore, we conducted a study on the situation that analog values can be obtained by physical observation. We proposed four algorithms according to the knowledge of the probability distribution followed by observed values. We then proposed an efficient algorithm without prior knowledge by combining with the EM algorithm. In both cases, we conducted numerical experiments and confirmed the effectiveness of the proposed algorithms.

Report

(5 results)
  • 2016 Annual Research Report   Final Research Report ( PDF )
  • 2015 Annual Research Report
  • 2014 Annual Research Report
  • 2013 Annual Research Report
  • Research Products

    (44 results)

All 2017 2016 2015 2014 2013

All Journal Article (24 results) (of which Int'l Joint Research: 3 results,  Peer Reviewed: 23 results,  Acknowledgement Compliant: 16 results) Presentation (20 results) (of which Int'l Joint Research: 1 results,  Invited: 4 results)

  • [Journal Article] General Bounds for Small Inverse Problems and Its Applications to Multi-Prime RSA2017

    • Author(s)
      Atsushi Takayasu and Noboru Kunihiro
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E100.A Issue: 1 Pages: 50-61

    • DOI

      10.1587/transfun.E100.A.50

    • NAID

      130005180864

    • ISSN
      0916-8508, 1745-1337
    • Related Report
      2016 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] A Tool Kit for Partial Key Exposure Attacks on RSA2017

    • Author(s)
      Atsushi Takayasu and Noboru Kunihiro
    • Journal Title

      Topics in Cryptology CT-RSA 2017

      Volume: 10159 Pages: 58-73

    • DOI

      10.1007/978-3-319-52153-4_4

    • ISBN
      9783319521527, 9783319521534
    • Related Report
      2016 Annual Research Report
    • Peer Reviewed / Int'l Joint Research / Acknowledgement Compliant
  • [Journal Article] Improved Key Recovery Algorithms from Noisy RSA Secret Keys with Analog Noise2017

    • Author(s)
      Noboru Kunihiro and Yuki Takahashi
    • Journal Title

      Proc. of CT-RSA2017

      Volume: LNCS10159 Pages: 328-343

    • DOI

      10.1007/978-3-319-52153-4_19

    • ISBN
      9783319521527, 9783319521534
    • Related Report
      2016 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Improved Differential Fault Analysis on Camellia-1282016

    • Author(s)
      Toru Akishita and Noboru Kunihiro
    • Journal Title

      Proc. of COSADE2016

      Volume: LNCS 9689 Pages: 130-143

    • DOI

      10.1007/978-3-319-43283-0_8

    • ISBN
      9783319432823, 9783319432830
    • Related Report
      2016 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Partial Key Exposure Attacks on RSA with Multiple Exponent Pairs2016

    • Author(s)
      Atsushi Takayasu and Noboru Kunihiro
    • Journal Title

      Information Security and Privacy

      Volume: 9723 Pages: 243-257

    • DOI

      10.1007/978-3-319-40367-0_15

    • ISBN
      9783319403663, 9783319403670
    • Related Report
      2016 Annual Research Report
    • Peer Reviewed / Int'l Joint Research / Acknowledgement Compliant
  • [Journal Article] Partial Key Exposure Attacks on CRT-RSA: General Improvement for the Exposed Least Significant Bits2016

    • Author(s)
      Atsushi Takayasu and Noboru Kunihiro
    • Journal Title

      Information Security

      Volume: 9866 Pages: 35-47

    • DOI

      10.1007/978-3-319-45871-7_3

    • ISBN
      9783319458700, 9783319458717
    • Related Report
      2016 Annual Research Report
    • Peer Reviewed / Int'l Joint Research / Acknowledgement Compliant
  • [Journal Article] Cold Boot Attack Methods for the Discrete Logarithm Problem2016

    • Author(s)
      Jason Ying and Noboru Kunihiro
    • Journal Title

      Proc. of CANDAR2016

      Volume: - Pages: 154-160

    • DOI

      10.1109/candar.2016.0037

    • Related Report
      2016 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Decryption of Frequent Password Hashes in Rainbow Tables2016

    • Author(s)
      Jason Ying and Noboru Kunihiro
    • Journal Title

      Proc. of CANDAR2016

      Volume: - Pages: 655-661

    • DOI

      10.1109/candar.2016.0117

    • Related Report
      2016 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Small Secret Exponent Attacks on RSA with Unbalanced Prime Factors2016

    • Author(s)
      Atsushi Takayasu and Noboru Kunihiro
    • Journal Title

      Proc. of ISITA2016

      Volume: - Pages: 236-240

    • Related Report
      2016 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] How to Generalize RSA Cryptanalyses2016

    • Author(s)
      Atsushi Takayasu and Noboru Kunihiro
    • Journal Title

      Proc. of PKC2016

      Volume: LNCS9615 Pages: 67-97

    • DOI

      10.1007/978-3-662-49387-8_4

    • ISBN
      9783662493861, 9783662493878
    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Partial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption Exponents2015

    • Author(s)
      Atsushi Takayasu and Noboru Kunihiro
    • Journal Title

      Proc. ACNS2015

      Volume: LNCS9092 Pages: 518-537

    • DOI

      10.1007/978-3-319-28166-7_25

    • ISBN
      9783319281650, 9783319281667
    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] An Improved Attack for Recovering Noisy RSA Secret Keys and its Countermeasure2015

    • Author(s)
      Noboru Kunihiro
    • Journal Title

      Proc. of ProvSec2015

      Volume: LNCS9451 Pages: 61-81

    • DOI

      10.1007/978-3-319-26059-4_4

    • ISBN
      9783319260587, 9783319260594
    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Maximum Likelihood-based Key Recovery Algorithm from Decayed Key Schedules2015

    • Author(s)
      Tomoyuki Tanigaki and Noboru Kunihiro
    • Journal Title

      Proc. of ICISC2015

      Volume: LNCS9558 Pages: 314-328

    • DOI

      10.1007/978-3-319-30840-1_20

    • ISBN
      9783319308395, 9783319308401
    • Related Report
      2015 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] サイドチャネル攻撃の数理2015

    • Author(s)
      國廣昇
    • Journal Title

      数学セミナー (特集 暗号と数学)

      Volume: 7月号 Pages: 34-39

    • Related Report
      2015 Annual Research Report
  • [Journal Article] Security Analysis on AUTH Protocol and Its Variant against the Man-in-the-Middle Attack2015

    • Author(s)
      K. Endo and N. Kunihiro
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E98.A Issue: 1 Pages: 153-161

    • DOI

      10.1587/transfun.E98.A.153

    • NAID

      130004770899

    • ISSN
      0916-8508, 1745-1337
    • Related Report
      2014 Annual Research Report
    • Peer Reviewed
  • [Journal Article] General Bounds for Small Inverse Problems and Its Applications to Multi-Prime RSA2015

    • Author(s)
      Atsushi Takayasu and Noboru Kunihiro
    • Journal Title

      Information Security and Cryptology - ICISC 2014 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers

      Volume: 8949 Pages: 3-17

    • DOI

      10.1007/978-3-319-15943-0_1

    • ISBN
      9783319159423, 9783319159430
    • Related Report
      2014 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors2014

    • Author(s)
      A. Takayasu and N. Kunihiro
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E97.A Issue: 6 Pages: 1259-1272

    • DOI

      10.1587/transfun.E97.A.1259

    • NAID

      130004770855

    • ISSN
      0916-8508, 1745-1337
    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors2014

    • Author(s)
      N. Kunihiro, N. Shinohara and T. Izu
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E97.A Issue: 6 Pages: 1273-1284

    • DOI

      10.1587/transfun.E97.A.1273

    • NAID

      130004770856

    • ISSN
      0916-8508, 1745-1337
    • Related Report
      2014 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A Unified Framework for Small Secret Exponent Attack on RSA2014

    • Author(s)
      N. Kunihiro, N. Shinohara and T. Izu
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E97.A Issue: 6 Pages: 1285-1295

    • DOI

      10.1587/transfun.E97.A.1285

    • NAID

      130004770857

    • ISSN
      0916-8508, 1745-1337
    • Related Report
      2014 Annual Research Report
    • Peer Reviewed
  • [Journal Article] RSA meets DPA: Recovering RSA Secret Keys from Noisy Analog Data2014

    • Author(s)
      N. Kunihiro and J. Honda
    • Journal Title

      Proc. of CHES2014

      Volume: LNCS 8731 Pages: 261-278

    • DOI

      10.1007/978-3-662-44709-3_15

    • ISBN
      9783642387081, 9783642387098
    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] On the Security Proof of an Authentication Protocol from Eurocrypt 20112014

    • Author(s)
      Kosei Endo and Noboru Kunihiro
    • Journal Title

      Proc. of IWSEC2014

      Volume: LNCS 8639 Pages: 187-203

    • DOI

      10.1007/978-3-319-09843-2_15

    • ISBN
      9783319098425, 9783319098432
    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Partial Key Exposure Attacks on RSA: Achieving the Boneh-Durfee Bound2014

    • Author(s)
      Atsushi Takayasu and Noboru Kunihiro
    • Journal Title

      Selected Areas in Cryptography -- SAC 2014 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers

      Volume: 8781 Pages: 345-362

    • DOI

      10.1007/978-3-319-13051-4_21

    • ISBN
      9783319130507, 9783319130514
    • Related Report
      2014 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Cryptanalysis of RSA with Multiple Small Secret Exponents2014

    • Author(s)
      Atsushi Takayasu and Noboru Kunihiro
    • Journal Title

      Information Security and Privacy 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings

      Volume: 8544 Pages: 176-191

    • DOI

      10.1007/978-3-319-08344-5_12

    • ISBN
      9783319083438, 9783319083445
    • Related Report
      2014 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors2013

    • Author(s)
      Atsushi Takayasu and Noboru Kunihiro
    • Journal Title

      Proc. of ACISP 2013

      Volume: 7959 Pages: 118-135

    • DOI

      10.1007/978-3-642-39059-3_9

    • NAID

      130004770855

    • ISBN
      9783642390586, 9783642390593
    • Related Report
      2013 Annual Research Report
    • Peer Reviewed
  • [Presentation] 通常同種写像を用いたDH鍵共有の安全性解析2017

    • Author(s)
      古川悟,高安敦,國廣昇
    • Organizer
      電子情報通信学会情報セキュリティ研究会
    • Place of Presentation
      東海大学高輪キャンパス(港区)
    • Year and Date
      2017-03-09
    • Related Report
      2016 Annual Research Report
  • [Presentation] サイドチャネル攻撃によるCRT-RSA秘密鍵の復元2017

    • Author(s)
      大西健斗,國廣昇
    • Organizer
      SCIS2017
    • Place of Presentation
      ロワジールホテル那覇(那覇市)
    • Year and Date
      2017-01-24
    • Related Report
      2016 Annual Research Report
  • [Presentation] アナログ情報からのRSA鍵復元アルゴリズムの理論解析2017

    • Author(s)
      國廣昇
    • Organizer
      SCIS2017
    • Place of Presentation
      ロワジールホテル那覇(那覇市)
    • Year and Date
      2017-01-24
    • Related Report
      2016 Annual Research Report
  • [Presentation] Recovering RSA Secret Keys from Noisy Keys2017

    • Author(s)
      Noboru Kunihiro
    • Organizer
      UTokyo-IIT Madras Workshop on Theoretical Computer Science
    • Place of Presentation
      IIT Madras (Chennai, India)
    • Related Report
      2016 Annual Research Report
    • Int'l Joint Research / Invited
  • [Presentation] 同種写像を用いたグループ鍵共有2016

    • Author(s)
      古川悟,國廣昇,高島克幸
    • Organizer
      SCIS2016
    • Place of Presentation
      ANAクラウンプラザホテル熊本ニュースカイ (熊本市)
    • Year and Date
      2016-01-19
    • Related Report
      2015 Annual Research Report
  • [Presentation] SIMONの鍵拡大アルゴリズムに対する代数的サイドチャネル攻撃2016

    • Author(s)
      谷垣友喜,國廣昇
    • Organizer
      SCIS2016
    • Place of Presentation
      ANAクラウンプラザホテル熊本ニュースカイ (熊本市)
    • Year and Date
      2016-01-19
    • Related Report
      2015 Annual Research Report
  • [Presentation] Factoring RSA Modulus with Random Known Bits2016

    • Author(s)
      Yao LU, Liqiang PENG, Noboru KUNIHIRO, Rui ZHANG
    • Organizer
      SCIS2016
    • Place of Presentation
      ANAクラウンプラザホテル熊本ニュースカイ (熊本市)
    • Year and Date
      2016-01-19
    • Related Report
      2015 Annual Research Report
  • [Presentation] 最小サンプルでLWE問題を解くためのBKWアルゴリズム,2016

    • Author(s)
      上中谷 健,國廣 昇,高安 敦
    • Organizer
      SCIS2016
    • Place of Presentation
      ANAクラウンプラザホテル熊本ニュースカイ (熊本市)
    • Year and Date
      2016-01-19
    • Related Report
      2015 Annual Research Report
  • [Presentation] 使用可能領域を有効活用したSieveアルゴリズムの高速化,2016

    • Author(s)
      宮崎結香,谷垣友喜,高安敦,國廣昇
    • Organizer
      SCIS2016
    • Place of Presentation
      ANAクラウンプラザホテル熊本ニュースカイ (熊本市)
    • Year and Date
      2016-01-19
    • Related Report
      2015 Annual Research Report
  • [Presentation] 近似GCD問題のパラメータ解析,2015

    • Author(s)
      高安敦,國廣昇
    • Organizer
      CSS2015
    • Place of Presentation
      長崎ブリックホール (長崎市)
    • Year and Date
      2015-10-21
    • Related Report
      2015 Annual Research Report
  • [Presentation] 低ノイズLPN問題におけるBKWアルゴリズムの解析2015

    • Author(s)
      上中谷健,國廣昇,高安敦
    • Organizer
      CSS2015
    • Place of Presentation
      長崎ブリックホール (長崎市)
    • Year and Date
      2015-10-21
    • Related Report
      2015 Annual Research Report
  • [Presentation] 格子に基づく暗号・安全性解析入門2015

    • Author(s)
      國廣昇
    • Organizer
      電子情報通信学会ソサイエティ大会
    • Place of Presentation
      東北大学 川内北キャンパス(仙台市)
    • Year and Date
      2015-09-10
    • Related Report
      2015 Annual Research Report
    • Invited
  • [Presentation] アナログ情報からのRSA秘密鍵復元とその改良2015

    • Author(s)
      國廣昇
    • Organizer
      暗号理論ワークショップ
    • Place of Presentation
      東京工業大学(東京都目黒区)
    • Year and Date
      2015-02-24
    • Related Report
      2014 Annual Research Report
    • Invited
  • [Presentation] 誤り付AES鍵スケジュール復元アルゴリズム2015

    • Author(s)
      谷垣友喜,國廣昇
    • Organizer
      SCIS2015
    • Place of Presentation
      リーガロイヤルホテル小倉(福岡県北九州市)
    • Year and Date
      2015-01-20 – 2015-01-23
    • Related Report
      2014 Annual Research Report
  • [Presentation] 整数計画問題によるbinary-LWE問題の求解アルゴリズム2015

    • Author(s)
      町野 義貴,青野 良範,高安 敦,國廣 昇
    • Organizer
      SCIS2015
    • Place of Presentation
      リーガロイヤルホテル小倉(福岡県北九州市)
    • Year and Date
      2015-01-20 – 2015-01-23
    • Related Report
      2014 Annual Research Report
  • [Presentation] アナログ情報からのRSA秘密鍵復元の改良2015

    • Author(s)
      高橋勇貴,國廣昇
    • Organizer
      SCIS2015
    • Place of Presentation
      リーガロイヤルホテル小倉(福岡県北九州市)
    • Year and Date
      2015-01-20 – 2015-01-23
    • Related Report
      2014 Annual Research Report
  • [Presentation] 複数の復号指数を持つRSA暗号の安全性解析2014

    • Author(s)
      高安敦,國廣昇
    • Organizer
      ISEC
    • Place of Presentation
      リーガロイヤルホテル小倉(福岡県北九州市)
    • Year and Date
      2014-07-03 – 2014-07-04
    • Related Report
      2014 Annual Research Report
  • [Presentation] アナログ情報からのRSA秘密鍵復元アルゴリズム(その2)2014

    • Author(s)
      國廣昇,本多淳也
    • Organizer
      SCIS2014
    • Place of Presentation
      鹿児島市・城山観光ホテル
    • Related Report
      2013 Annual Research Report
  • [Presentation] アナログ情報からのRSA秘密鍵復元アルゴリズム(その1)2013

    • Author(s)
      國廣昇,高安敦
    • Organizer
      電子情報通信学会ISEC研究会
    • Place of Presentation
      札幌市・札幌コンベンションセンター
    • Related Report
      2013 Annual Research Report
  • [Presentation] 計算能力の向上と暗号解読2013

    • Author(s)
      國廣昇
    • Organizer
      電子情報通信学会 2013年ソサイエティ大会
    • Place of Presentation
      福岡市・福岡工業大学
    • Related Report
      2013 Annual Research Report
    • Invited

URL: 

Published: 2013-05-21   Modified: 2019-07-29  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi