2015 Fiscal Year Final Research Report
Development of DFA vulnerability evaluation system
Project/Area Number |
25330157
|
Research Category |
Grant-in-Aid for Scientific Research (C)
|
Allocation Type | Multi-year Fund |
Section | 一般 |
Research Field |
Information security
|
Research Institution | Tohoku Gakuin University |
Principal Investigator |
|
Co-Investigator(Kenkyū-buntansha) |
SHIKODA Arimitsu 東北学院大学, 工学部・電子工学科, 教授 (00215972)
YOSHIKAWA Hideki 東北学院大学, 工学部・電気情報工学科, 准教授 (60259885)
|
Project Period (FY) |
2013-04-01 – 2016-03-31
|
Keywords | 差分故障解析 |
Outline of Final Research Achievements |
In our work, we developed several attack technologies against block ciphers, RSA and Rabin cryptosystem implemented on smartcard or RFID tag. Our attack techniques are based on instruction skip differential fault analysis. We reveal its vulnerabilities, and propose effective countermeasures in some cases. Highlight of our study is development of a new fault attack, double counting attack (DCA), on the precomputation of 2t-ary modular exponentiation for a classical RSA digital signature. DCA can reconstruct an entire secret exponent using the position checker with 63 faulted signatures in a short time for a 1536-bit RSA implementation using the 26-ary method.
|
Free Research Field |
暗号理論
|