Is it wise to publish your public RSA keys?

Shay Gueron, Jean Pierre Seifert

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review


Only very recently, the study of introducing faults into the public-key elements of the RSA signature scheme was initiated. Following the seminal work of Seifert on fault inductions during the RSA signature verification, Brier, Chevallier-Mames, Ciet, and Clavier considered in a recent paper the signature counterpart and showed how to recover the private exponent - even with absolutely no knowledge of the faults behavior, Consequently, this paper reconsiders the RSA signature verification and proposes two embassaring simple new fault attacks against the RSA verification process. Despite their trivial nature, both of our methods bear heavy practical consequences. While the first new attack of our methods simply eliminates the "somehow cumbersome" and subtle mathematical two-phase attack analysis of Seifert's attack, the second methodology removes the so called "one-shot success" of Seifert's attack and paves the way for a permanent and universal "mass-market" RSA signature forgery. Motivated by the obvious security threats through tampering attacks during the RSA verification process we will also consider some heuristic but practical countermeasures.

Original languageEnglish
Title of host publicationFault Diagnosis and Tolerance in Cryptography - Third International Workshop, FDTC 2006, Proceedings
PublisherSpringer Verlag
Number of pages12
ISBN (Print)3540462503, 9783540462507
StatePublished - 2006
EventThird International Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2006 - Yokohama, Japan
Duration: 10 Oct 200610 Oct 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4236 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


ConferenceThird International Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2006


  • Authenticated computing
  • Fault attacks
  • Hardware attacks
  • RSA
  • Secure/trusted boot

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science


Dive into the research topics of 'Is it wise to publish your public RSA keys?'. Together they form a unique fingerprint.

Cite this