Weaknesses in current RSA signature schemes

  • Authors:
  • Juliane Krämer;Dmitry Nedospasov;Jean-Pierre Seifert

  • Affiliations:
  • Security in Telecommunications, Technische Universität Berlin and Deutsche Telekom Innovation Laboratories, Germany;Security in Telecommunications, Technische Universität Berlin and Deutsche Telekom Innovation Laboratories, Germany;Security in Telecommunications, Technische Universität Berlin and Deutsche Telekom Innovation Laboratories, Germany

  • Venue:
  • ICISC'11 Proceedings of the 14th international conference on Information Security and Cryptology
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

This work presents several classes of messages that lead to data leakage during modular exponentiation. Such messages allow for the recovery of the entire secret exponent with a single power measurement. We show that padding schemes as defined by industry standards such as PKCS#1 and ANSI x9.31 are vulnerable to side-channel attacks since they meet the characteristics defined by our classes. Though PKCS#1 states that there are no known attacks against RSASSA-PKCS1-v1_5, the EMSA-PKCS1-v1_5 encoding in fact makes the scheme vulnerable to side-channel analysis. These attacks were validated against a real-world smartcard system, the Infineon SLE78, which ran our proof of concept implementation. Additionally, we introduce methods for the elegant recovery of the full RSA private key from blinded RSA CRT exponents.