dc.creator | Cabrera Aldaya, Alejandro | es |
dc.creator | Cuiman Márquez, Raudel | es |
dc.creator | Cabrera Sarmiento, Alejandro José | es |
dc.creator | Sánchez Solano, Santiago | es |
dc.date.accessioned | 2018-04-30T13:23:36Z | |
dc.date.available | 2018-04-30T13:23:36Z | |
dc.date.issued | 2016 | |
dc.identifier.citation | Cabrera Aldaya, A., Cuiman Márquez, R., Cabrera Sarmiento, A.J. y Sánchez Solano, S. (2016). Side-channel analysis of the modular inversion step in the RSA key generation algorithm. International Journal of Circuit Theory and Applications, 45 (2), 199-213. | |
dc.identifier.issn | 0098-9886 (impreso) | es |
dc.identifier.issn | 1097-007X (electrónico) | es |
dc.identifier.uri | https://hdl.handle.net/11441/73804 | |
dc.description.abstract | This paper studies the security of the RSA key generation algorithm with regard to side-channel analysis and presents a novel approach that targets the simple power analysis (SPA) vulnerabilities that may exist in an implementation of the binary extended Euclidean algorithm (BEEA). The SPA vulnerabilities described, together with the properties of the values processed by the BEEA in the context of RSA key generation, represent a serious threat for an implementation of this algorithm. It is shown that an adversary can disclose the private key employing only one power trace with a success rate of 100 % – an improvement on the 25% success rate achieved by the best side-channel analysis carried out on this algorithm. Two very different BEEA implementations are analyzed, showing how the algorithm’s SPA leakages could be exploited. Also, two countermeasures are discussed that could be used to reduce those SPA leakages and prevent the recovery of the RSA private key | es |
dc.description.sponsorship | Gobierno de España TEC2014-57971-R, RTC-2014-2932-8 | es |
dc.format | application/pdf | es |
dc.language.iso | eng | es |
dc.publisher | John Wiley & Sons | es |
dc.relation.ispartof | International Journal of Circuit Theory and Applications, 45 (2), 199-213. | |
dc.rights | Atribución-NoComercial-SinDerivadas 3.0 Estados Unidos de América | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | * |
dc.subject | Side-channel analysis | es |
dc.subject | SPA | es |
dc.subject | Binary Euclidean algorithm | es |
dc.subject | RSA key generation | es |
dc.title | Side-channel analysis of the modular inversion step in the RSA key generation algorithm | es |
dc.type | info:eu-repo/semantics/article | es |
dcterms.identifier | https://ror.org/03yxnpp24 | |
dc.type.version | info:eu-repo/semantics/submittedVersion | es |
dc.rights.accessRights | info:eu-repo/semantics/openAccess | es |
dc.relation.projectID | TEC2014-57971-R | es |
dc.relation.projectID | RTC-2014-2932-8 | es |
dc.relation.publisherversion | http://dx.doi.org/10.1002/cta.2283 | es |
dc.identifier.doi | 10.1002/cta.2283 | es |
idus.format.extent | 15 p. | es |
dc.journaltitle | International Journal of Circuit Theory and Applications | es |
dc.publication.volumen | 45 | es |
dc.publication.issue | 2 | es |
dc.publication.initialPage | 199 | es |
dc.publication.endPage | 213 | es |
dc.contributor.funder | Gobierno de España | |