2012
DOI: 10.1007/978-3-642-34961-4_24
|View full text |Cite
|
Sign up to set email alerts
|

A Coding-Theoretic Approach to Recovering Noisy RSA Keys

Abstract: Inspired by cold boot attacks, Heninger and Shacham (Crypto 2009) initiated the study of the problem of how to recover an RSA private key from a noisy version of that key. They gave an algorithm for the case where some bits of the private key are known with certainty. Their ideas were extended by Henecka, May and Meurer (Crypto 2010) to produce an algorithm that works when all the key bits are subject to error. In this paper, we bring a coding-theoretic viewpoint to bear on the problem of noisy RSA key recover… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
39
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 36 publications
(39 citation statements)
references
References 13 publications
0
39
0
Order By: Relevance
“…They also showed that the bound for the error probability is given by 0.084 if the associated secret key is (p, q). Paterson et al proposed an algorithm correcting error bits that occurs asymmetrically at Asiacrypt 2012 [10]. They adopted a coding theoretic approach for designing a new algorithm and analyzing its performance.…”
Section: Background and Motivationmentioning
confidence: 99%
See 4 more Smart Citations
“…They also showed that the bound for the error probability is given by 0.084 if the associated secret key is (p, q). Paterson et al proposed an algorithm correcting error bits that occurs asymmetrically at Asiacrypt 2012 [10]. They adopted a coding theoretic approach for designing a new algorithm and analyzing its performance.…”
Section: Background and Motivationmentioning
confidence: 99%
“…The previous works [4,5,8,10] considered an erasure and/or error setting, where each bit of the secret key is either erased or flipped. Thus, the noisy version of the secret key is composed of discrete symbols, that is, {0, 1} and the erasure symbol "?".…”
Section: Motivation: Key-recovery From Noisy Analog Datamentioning
confidence: 99%
See 3 more Smart Citations