2018
DOI: 10.1109/tdsc.2016.2602352
|View full text |Cite
|
Sign up to set email alerts
|

Crashing Modulus Attack on Modular Squaring for Rabin Cryptosystem

Abstract: The Rabin cryptosystem has been proposed protect the unique ID (UID) in radio-frequency identification tags. The Rabin cryptosystem is a type of lightweight public key system that is theoretetically quite secure; however it is vulnerable to several side-channel attacks. In this paper, a crashing modulus attack is presented as a new fault attack on modular squaring during Rabin encryption. This attack requires only one fault in the public key if its perturbed public key can be factored. Our simulation results i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 30 publications
0
4
0
Order By: Relevance
“…In all the versions of the Rabin cryptography algorithms stated in [11,14,15,19], the public key component ᶇ is shared publicly. Hence the hacker can crack the system very easily using the following two cryptanalysis methods:…”
Section: Cryptanalysismentioning
confidence: 99%
See 2 more Smart Citations
“…In all the versions of the Rabin cryptography algorithms stated in [11,14,15,19], the public key component ᶇ is shared publicly. Hence the hacker can crack the system very easily using the following two cryptanalysis methods:…”
Section: Cryptanalysismentioning
confidence: 99%
“…The work in [14] deals with deterministic aspects and identification problems of the Rabin cryptosystem during decryption. The paper [15] proposed a fault attack against the Rabin cryptosystem using a one-byte permutation on public key n. However, the above-discussed methods are either too complex or easy to crack. Some researchers turn to the modulus process to improve the Rabin cryptosystem.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…Masahiro Kaminaga, et al,. [9] discussed a fault attack technique on modular exponentiation during Rabin's encryption where a complicated situation arose in case of message reconstruction when message and public key were not relatively prime. They also provided a rigorous algorithm to handle message reconstruction.…”
Section: Decryption Step-3: Alice Solves the Quadratic Equation M 2 -mentioning
confidence: 99%