Attacks on protocols for server-aided RSA computation

  • Authors:
  • Birgit Pfitzmann;Michael Waidner

  • Affiliations:
  • Institut für Informalik, Universität Hildesheim, Hildesheim, FRG;Institut für Rechnerentwurf, Und Fehlertoleranz, Universität Karlsruhe, Karlsruhe 1, FRG

  • Venue:
  • EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
  • Year:
  • 1992

Quantified Score

Hi-index 0.00

Visualization

Abstract

On Crypto '88, Matsumoto, Kato, and Imai presented protocols to speed up secret computations with insecure auxiliary devices. The two most important protocols enable a smart card to compute the secret RSA operation faster with the help of a server that is not necessarily trusted by the card holder. It was stated that if RSA is secure, the protocols could only be broken by exhaustive scarch in certain spacts. Our main attacks show that much smaller search spaces suffice. These attacks are passive and therefore undetectable. It was already known that one of the protocols is vulnerable to active attacks. We show that this holds for the other protocol, too. More importantly, we show that our attack may still work if the smart card checks the correctness of the result; this was previously believed to be can easy measure excluding all active attacks. Finally, we discuss attach on related protocols.