Abstract
We present a theoretical model for breaking various cryptographic schemes by taking advantage of random hardware faults. We show how to attack certain implementations of RSA and Rabin signatures. We also show how various authentication protocols, such as Fiat-Shamir and Schnorr, can be broken using hardware faults.
Also at Princeton University. Supported in part by NSF CCR-9304718.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
M. Bellare, P. Rogaway, “The exact security of digital signatures-How to sign with RSA and Rabin”, in Proc. Eurocrypt 96, pp. 399–416.
E. Biham, A. Shamir, “A New Cryptanalytic Attack on DES: Differential Fault Analysis”, Manuscript.
M. Blum, H. Wasserman, “Program result checking”, proc. FOCS 94, pp. 382–392.
P. Kocher, “Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems”, Proc. of Cyrpto 96, pp. 104–113.
U. Feige, A. Fiat, A. Shamir, “Zero knowledge proofs of identity”, Proc. of STOC 87.
Federal Information Processing Standards, “Security requirements for cryptographic modules”, FIPS publication 140-1, http://www.nist.gov/itl/csl/fips/fip140-1.txt.
Y. Frankel, P. Gemmell, M. Yung, “Witness based cryptographic program checking and robust function sharing”, proc. STOC 96, pp. 499–508.
L. Guillou, J. Quisquater, “A practical zero knowledge protocol fitted to security microprocessor minimizing both transmission and memory”, in Proc. Eurocrypt 88, pp. 123–128
A.K. Lenstra, Memo on RSA signature generation in the presence of faults, manuscript, Sept. 28, 1996. Available from the author.
M. Rabin, “Digital signatures and public key functions as intractable as factorization”, MIT Laboratory for computer science, Technical report MIT/LCS/TR-212, Jan. 1979.
C. Schnorr, “Efficient signature generation by smart cards”, J. Cryptology, Vol. 4, (1991), pp. 161–174.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1997 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Boneh, D., DeMillo, R.A., Lipton, R.J. (1997). On the Importance of Checking Cryptographic Protocols for Faults. In: Fumy, W. (eds) Advances in Cryptology — EUROCRYPT ’97. EUROCRYPT 1997. Lecture Notes in Computer Science, vol 1233. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-69053-0_4
Download citation
DOI: https://doi.org/10.1007/3-540-69053-0_4
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-62975-7
Online ISBN: 978-3-540-69053-5
eBook Packages: Springer Book Archive