[Resource Topic] 2014/869: Exclusive Exponent Blinding May Not Suffice to Prevent Timing Attacks on RSA

Welcome to the resource topic for 2014/869

Title:
Exclusive Exponent Blinding May Not Suffice to Prevent Timing Attacks on RSA

Authors: Werner Schindler

Abstract:

The references [9,3,1] treat timing attacks on RSA with CRT and Montgomery’s multiplication algorithm in unprotected implementations. It has been widely believed that exponent blinding would prevent any timing attack on RSA. At cost of significantly more timing measurements this paper extends the before-mentioned attacks to RSA with CRT when Montgomery’s multiplication algorithm and exponent blinding are applied. Simulation experiments are conducted, which confirm the theoretical results. Effective countermeasures exist. In particular, the attack efficiency is higher than in the previous version [12] while large parts of both papers coincide.

ePrint: https://eprint.iacr.org/2014/869

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .