Context Our Contribution Conclusion

icon

75

pages

icon

English

icon

Documents

Écrit par

Publié par

Lire un extrait
Lire un extrait

Obtenez un accès à la bibliothèque pour le consulter en ligne En savoir plus

Découvre YouScribe en t'inscrivant gratuitement

Je m'inscris

Découvre YouScribe en t'inscrivant gratuitement

Je m'inscris
icon

75

pages

icon

English

icon

Ebook

Lire un extrait
Lire un extrait

Obtenez un accès à la bibliothèque pour le consulter en ligne En savoir plus

Context Our Contribution Conclusion Fault Attacks Against EMV Signatures Jean-Sebastien Coron1 David Naccache2 Mehdi Tibouchi1,2 1Universite du Luxembourg 2Ecole normale superieure CT-RSA 2010

  • emv signature

  • ecole normale

  • universite de luxembourg

  • related work

  • against emv

  • signature

  • context rsa-crt

  • practical assessment


Voir Alternate Text

Publié par

Nombre de lectures

14

Langue

English

ContextOurContribution
Fault Attacks Against EMV Signatures
Jean-S´ebastienCoron1David Naccache2 Mehdi Tibouchi1,2
1
Universite´duLuxembourg
2´cErueielesup´erolenorma
CT-RSA 2010
Conclusion
oCtnxetOurCnortbituoin
Our Results in a Nutshell
Con
Simplifya former fault attack [CJKNP09] on ISO 9796-2 signatures, obtaining vastly improved efficiency. Simulatethis new fault attack on parameters of typical size, recovering secret keys with a small number of faulty signatures. Showhow the attack applies to EMV signature formats that where far beyond the reach of former cryptanalytic techniques.
lcusion
ContextuOrCnortibution
Our Results in a Nutshell
oCn
Simplifya former fault attack [CJKNP09] on ISO 9796-2 signatures, obtaining vastly improved efficiency. Simulatethis new fault attack on parameters of typical size, recovering secret keys with a small number of faulty signatures. Showhow the attack applies to EMV signature formats that where far beyond the reach of former cryptanalytic techniques.
clusion
oCtnxetuOrCnortbiution
Our Results in a Nutshell
oCn
Simplifya former fault attack [CJKNP09] on ISO 9796-2 signatures, obtaining vastly improved efficiency. Simulatethis new fault attack on parameters of typical size, recovering secret keys with a small number of faulty signatures. Showhow the attack applies to EMV signature formats that where far beyond the reach of former cryptanalytic techniques.
clusion
Context
Context RSA-CRT Related Work
Our Contribution Description of the New Practical Assessment Further Work
OurContribution
Outline
Attack
oCcnulisno
Context
Context RSA-CRT Related Work
Our Contribution Description of the New Practical Assessment Further Work
OurContribution
Outline
Attack
oCnclusion
oCtnxetuOrCnotribution
Signing with RSA-CRT
In RSA-based signature schemes, a signer with modulusN=pq and key pair (e,d) signs a messagemby computing: 1.σp=µ(m)dmodp 2.σq=µ(m)dmodq 3.σ= CRT(σp, σq) modN whereµthe encoding function of the scheme.is
Co
The Chinese Remainder Theorem offers a welcome 4-fold speed-up in (often costly) signature generation.
cnlusion
Voir Alternate Text
  • Univers Univers
  • Ebooks Ebooks
  • Livres audio Livres audio
  • Presse Presse
  • Podcasts Podcasts
  • BD BD
  • Documents Documents
Alternate Text