Fault attacks on the montgomery powering ladder

  • Authors:
  • Jörn-Marc Schmidt;Marcel Medwed

  • Affiliations:
  • Graz University of Technology, Institute for Applied Information Processing and Communications, Graz, Austria;Graz University of Technology, Institute for Applied Information Processing and Communications, Graz, Austria and Université catholique de Louvain, Crypto Group, Belgium

  • Venue:
  • ICISC'10 Proceedings of the 13th international conference on Information security and cryptology
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Security-aware embedded devices which are likely to operate in hostile environments need protection against physical attacks. For the RSA public-key algorithm, protected versions of the Montgomery powering ladder have gained popularity as countermeasures for such attacks. In this paper, we present a general fault attack against RSA implementations which use the Montgomery powering ladder. In a first step, we discuss under which realistic fault assumptions our observation can be used to attack basic implementations. In a second step, we extend our attack to a scenario, where the message is blinded at the beginning of the exponentiation algorithm. To the best of our knowledge this is the first fault attack on a blinded Montgomery powering ladder.