Correcting errors in private keys obtained from cold boot attacks
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, H.T. | - |
dc.contributor.author | Kim, H. | - |
dc.contributor.author | Baek, Y.-J. | - |
dc.contributor.author | Cheon, J.H. | - |
dc.date.accessioned | 2023-03-08T21:40:21Z | - |
dc.date.available | 2023-03-08T21:40:21Z | - |
dc.date.issued | 2012-12 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.issn | 1611-3349 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/cau/handle/2019.sw.cau/64930 | - |
dc.description.abstract | Based on the cold boot attack technique, this paper proposes a new algorithm to obtain the private key of the discrete logarithm (DL) based cryptosystems and the standard RSA from its erroneous value. The proposed algorithm achieves almost the square root complexity of search space size. More precisely, the private key of the DL based system with 160-bit key size can be recovered in 2 43.24 exponentiations while the complexity of the exhaustive search is 2 71.95 exponentiations if the error rate is given by 10%. In case of the standard RSA with 1024-bit key size, our algorithm can recover the private key with 2 49.08 exponentiations if the error rate is given by 1%. Compared with the efficiency of some algorithms [7,6] to recover the private key in RSA using Chinese Remainder Theorem, the recoverable error rate of our algorithm is quite small. However, our algorithm requires only partial information of the private key d while other algorithms require additional information such as partial information of factors of the RSA modulus N. The proposed algorithm can also be used for breaking countermeasure of differential power analysis attack. In the standard RSA, one uses the randomized exponent instead of the decryption exponent d with the random value r. When the size of a random value r is 26-bit, it can be shown that the randomized exponent can be recovered with 2 49.30 exponentiations if the error rate is 1%. Finally, we also consider the breaking countermeasure that splits the decryption exponent d into d 1 and d 2 of same size. | - |
dc.format.extent | 14 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.title | Correcting errors in private keys obtained from cold boot attacks | - |
dc.type | Article | - |
dc.identifier.doi | 10.1007/978-3-642-31912-9_6 | - |
dc.identifier.bibliographicCitation | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v.7259 LNCS, pp 74 - 87 | - |
dc.description.isOpenAccess | N | - |
dc.identifier.scopusid | 2-s2.0-84864723146 | - |
dc.citation.endPage | 87 | - |
dc.citation.startPage | 74 | - |
dc.citation.title | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | - |
dc.citation.volume | 7259 LNCS | - |
dc.type.docType | Conference Paper | - |
dc.publisher.location | 미국 | - |
dc.subject.keywordAuthor | Cold Boot Attack | - |
dc.subject.keywordAuthor | Discrete Logarithm | - |
dc.subject.keywordAuthor | RSA | - |
dc.subject.keywordAuthor | Side Channel Attack | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
84, Heukseok-ro, Dongjak-gu, Seoul, Republic of Korea (06974)02-820-6194
COPYRIGHT 2019 Chung-Ang University All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.