Development of DFA vulnerability evaluation system
Project/Area Number |
25330157
|
Research Category |
Grant-in-Aid for Scientific Research (C)
|
Allocation Type | Multi-year Fund |
Section | 一般 |
Research Field |
Information security
|
Research Institution | Tohoku Gakuin University |
Principal Investigator |
|
Co-Investigator(Kenkyū-buntansha) |
SHIKODA Arimitsu 東北学院大学, 工学部・電子工学科, 教授 (00215972)
YOSHIKAWA Hideki 東北学院大学, 工学部・電気情報工学科, 准教授 (60259885)
|
Project Period (FY) |
2013-04-01 – 2016-03-31
|
Project Status |
Completed (Fiscal Year 2015)
|
Budget Amount *help |
¥4,940,000 (Direct Cost: ¥3,800,000、Indirect Cost: ¥1,140,000)
Fiscal Year 2015: ¥910,000 (Direct Cost: ¥700,000、Indirect Cost: ¥210,000)
Fiscal Year 2014: ¥910,000 (Direct Cost: ¥700,000、Indirect Cost: ¥210,000)
Fiscal Year 2013: ¥3,120,000 (Direct Cost: ¥2,400,000、Indirect Cost: ¥720,000)
|
Keywords | 差分故障解析 / 暗号実装 / 暗号理論 / 差分誤動作解析 / サイドチャネル攻撃 / 命令バイパス |
Outline of Final Research Achievements |
In our work, we developed several attack technologies against block ciphers, RSA and Rabin cryptosystem implemented on smartcard or RFID tag. Our attack techniques are based on instruction skip differential fault analysis. We reveal its vulnerabilities, and propose effective countermeasures in some cases. Highlight of our study is development of a new fault attack, double counting attack (DCA), on the precomputation of 2t-ary modular exponentiation for a classical RSA digital signature. DCA can reconstruct an entire secret exponent using the position checker with 63 faulted signatures in a short time for a 1536-bit RSA implementation using the 26-ary method.
|
Report
(4 results)
Research Products
(11 results)