Context Our Contribution Conclusion
75 pages
English

Découvre YouScribe en t'inscrivant gratuitement

Je m'inscris

Context Our Contribution Conclusion

-

Découvre YouScribe en t'inscrivant gratuitement

Je m'inscris
Obtenez un accès à la bibliothèque pour le consulter en ligne
En savoir plus
75 pages
English
Obtenez un accès à la bibliothèque pour le consulter en ligne
En savoir plus

Description

Context Our Contribution Conclusion Fault Attacks Against EMV Signatures Jean-Sebastien Coron1 David Naccache2 Mehdi Tibouchi1,2 1Universite du Luxembourg 2Ecole normale superieure CT-RSA 2010

  • emv signature

  • ecole normale

  • universite de luxembourg

  • related work

  • against emv

  • signature

  • context rsa-crt

  • practical assessment


Sujets

Informations

Publié par
Nombre de lectures 14
Langue English

Extrait

ContextOurContribution
Fault Attacks Against EMV Signatures
Jean-S´ebastienCoron1David Naccache2 Mehdi Tibouchi1,2
1
Universite´duLuxembourg
2´cErueielesup´erolenorma
CT-RSA 2010
Conclusion
oCtnxetOurCnortbituoin
Our Results in a Nutshell
Con
Simplifya former fault attack [CJKNP09] on ISO 9796-2 signatures, obtaining vastly improved efficiency. Simulatethis new fault attack on parameters of typical size, recovering secret keys with a small number of faulty signatures. Showhow the attack applies to EMV signature formats that where far beyond the reach of former cryptanalytic techniques.
lcusion
ContextuOrCnortibution
Our Results in a Nutshell
oCn
Simplifya former fault attack [CJKNP09] on ISO 9796-2 signatures, obtaining vastly improved efficiency. Simulatethis new fault attack on parameters of typical size, recovering secret keys with a small number of faulty signatures. Showhow the attack applies to EMV signature formats that where far beyond the reach of former cryptanalytic techniques.
clusion
oCtnxetuOrCnortbiution
Our Results in a Nutshell
oCn
Simplifya former fault attack [CJKNP09] on ISO 9796-2 signatures, obtaining vastly improved efficiency. Simulatethis new fault attack on parameters of typical size, recovering secret keys with a small number of faulty signatures. Showhow the attack applies to EMV signature formats that where far beyond the reach of former cryptanalytic techniques.
clusion
Context
Context RSA-CRT Related Work
Our Contribution Description of the New Practical Assessment Further Work
OurContribution
Outline
Attack
oCcnulisno
Context
Context RSA-CRT Related Work
Our Contribution Description of the New Practical Assessment Further Work
OurContribution
Outline
Attack
oCnclusion
oCtnxetuOrCnotribution
Signing with RSA-CRT
In RSA-based signature schemes, a signer with modulusN=pq and key pair (e,d) signs a messagemby computing: 1.σp=µ(m)dmodp 2.σq=µ(m)dmodq 3.σ= CRT(σp, σq) modN whereµthe encoding function of the scheme.is
Co
The Chinese Remainder Theorem offers a welcome 4-fold speed-up in (often costly) signature generation.
cnlusion
  • Univers Univers
  • Ebooks Ebooks
  • Livres audio Livres audio
  • Presse Presse
  • Podcasts Podcasts
  • BD BD
  • Documents Documents