Data and computational fault detection mechanism for devices that perform modular exponentiation

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Fault attacks have become an efficient methodology for extracting secrets stored in embedded devices, and proper countermeasures against such attacks are nowadays considered necessary. This paper describes a simple method for foiling transient fault attacks on devices that perform modular exponentiation with a secret exponent. In the considered scenario, acknowledging an error only at the end of the computations leaks out secret information, and should be avoided. To tackle this difficulty, we propose a scheme that checks, independently, each step (i.e., multiplication/squaring) of the exponentiation algorithm, and aborts the procedure as soon as an error is detected, without completing the computation.

Original languageEnglish
Title of host publicationFault Diagnosis and Tolerance in Cryptography - Third International Workshop, FDTC 2006, Proceedings
PublisherSpringer Verlag
Pages80-87
Number of pages8
ISBN (Print)3540462503, 9783540462507
DOIs
StatePublished - 2006
EventThird International Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2006 - Yokohama, Japan
Duration: 10 Oct 200610 Oct 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4236 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceThird International Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2006
Country/TerritoryJapan
CityYokohama
Period10/10/0610/10/06

Keywords

  • Countermeasures
  • Embedded devices
  • Fault attacks
  • RSA
  • Safe errors
  • Smartcards

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Data and computational fault detection mechanism for devices that perform modular exponentiation'. Together they form a unique fingerprint.

Cite this