2014
DOI: 10.1007/978-3-662-44709-3_15
|View full text |Cite
|
Sign up to set email alerts
|

RSA Meets DPA: Recovering RSA Secret Keys from Noisy Analog Data

Abstract: Abstract. We discuss how to recover RSA secret keys from noisy analog data obtained through physical attacks such as cold boot and side channel attacks. Many studies have focused on recovering correct secret keys from noisy binary data. Obtaining noisy binary keys typically involves first observing the analog data and then obtaining the binary data through quantization process that discards much information pertaining to the correct keys. In this paper, we propose two algorithms for recovering correct secret k… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…For instance, RSA-based reconstruction procedures usually start with the least significant bits (LSB) [8,9,13,14,15,18,20], but it is also possible to begin with the most significant bits (MSB) [19]. It is typical to use an iterative process to guess a couple of bits of the key and assess the plausibility of the guess on the basis of both a model of the decay process and the available redundancy in the encoding.…”
Section: Multinomial Distributions and The Multinomial Testmentioning
confidence: 99%
See 3 more Smart Citations
“…For instance, RSA-based reconstruction procedures usually start with the least significant bits (LSB) [8,9,13,14,15,18,20], but it is also possible to begin with the most significant bits (MSB) [19]. It is typical to use an iterative process to guess a couple of bits of the key and assess the plausibility of the guess on the basis of both a model of the decay process and the available redundancy in the encoding.…”
Section: Multinomial Distributions and The Multinomial Testmentioning
confidence: 99%
“…At this juncture the algorithm will prepend all bit-strings of length − to all the strings in CandSet (cf. lines [13][14][15][16]. Each of these new strings x is then compared against the public key Q = aP , via the calculation xP .…”
Section: Algorithm 5 Generic Key-recovery Algorithm For Textbook and mentioning
confidence: 99%
See 2 more Smart Citations
“…Later, Kunihiro et al [12] discussed secret key recovery from noisy secret key sequences with both errors and erasures. Recently, Kunihiro and Honda [11] discussed how to recover RSA secret keys from noisy analog data.…”
Section: Introductionmentioning
confidence: 99%