2021
DOI: 10.3390/info12110462
|View full text |Cite
|
Sign up to set email alerts
|

Profiling Attack against RSA Key Generation Based on a Euclidean Algorithm

Abstract: A profiling attack is a powerful variant among the noninvasive side channel attacks. In this work, we target RSA key generation relying on the binary version of the extended Euclidean algorithm for modular inverse and GCD computations. To date, this algorithm has only been exploited by simple power analysis; therefore, the countermeasures described in the literature are focused on mitigating only this kind of attack. We demonstrate that one of those countermeasures is not effective in preventing profiling atta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…p − 1 and q − 1; 2) 4|(p − 1)(q − 1), 2|(p − 1) and 2|(q − 1), the partial operational flow at the beginning of BEA (or BEEA) can be predicted in advance. Using all these characteristics, SPA, cache-timing attack (CTA), and machine learningbased profiling attack (MLPA) threaten the security of RSA key generation [4]- [6].…”
Section: Algorithm 4: Flt-ctmimentioning
confidence: 99%
“…p − 1 and q − 1; 2) 4|(p − 1)(q − 1), 2|(p − 1) and 2|(q − 1), the partial operational flow at the beginning of BEA (or BEEA) can be predicted in advance. Using all these characteristics, SPA, cache-timing attack (CTA), and machine learningbased profiling attack (MLPA) threaten the security of RSA key generation [4]- [6].…”
Section: Algorithm 4: Flt-ctmimentioning
confidence: 99%
“…Since the publishment of the RSA cryptosystem, the system has been analyzed by numerous researchers to find its vulnerability [2]. Past studies have shown that if the private keys or public keys of the RSA system are not chosen carefully, the cryptosystem is feasible to be broken by a third party in a reasonable amount of time [2][3][4]. However, once the flaw of the cryptosystem is known, improvement can be made and thus the system is more robust.…”
Section: Introductionmentioning
confidence: 99%