Secret information stored in a tamperfree device is revealed during the decryption or signature generation processes due to fault-based attack. In this paper, based on the coding approach, we propose a new fault-resistant system which enables any fault existing in modular multiplication and exponentiation computations to be detected with a very high probability. The proposed method can be used to implement all crypto-schemes whose basic operations are modular multiplications for resisting both memory and computational fault-based attacks with a very low computational overhead.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Chi-Sung LAIH, Fu-Kuan TU, Yung-Cheng LEE, "On the Implementation of Public Key Cryptosystems against Fault-Based Attacks" in IEICE TRANSACTIONS on Fundamentals,
vol. E82-A, no. 6, pp. 1082-1089, June 1999, doi: .
Abstract: Secret information stored in a tamperfree device is revealed during the decryption or signature generation processes due to fault-based attack. In this paper, based on the coding approach, we propose a new fault-resistant system which enables any fault existing in modular multiplication and exponentiation computations to be detected with a very high probability. The proposed method can be used to implement all crypto-schemes whose basic operations are modular multiplications for resisting both memory and computational fault-based attacks with a very low computational overhead.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/e82-a_6_1082/_p
Copy
@ARTICLE{e82-a_6_1082,
author={Chi-Sung LAIH, Fu-Kuan TU, Yung-Cheng LEE, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={On the Implementation of Public Key Cryptosystems against Fault-Based Attacks},
year={1999},
volume={E82-A},
number={6},
pages={1082-1089},
abstract={Secret information stored in a tamperfree device is revealed during the decryption or signature generation processes due to fault-based attack. In this paper, based on the coding approach, we propose a new fault-resistant system which enables any fault existing in modular multiplication and exponentiation computations to be detected with a very high probability. The proposed method can be used to implement all crypto-schemes whose basic operations are modular multiplications for resisting both memory and computational fault-based attacks with a very low computational overhead.},
keywords={},
doi={},
ISSN={},
month={June},}
Copy
TY - JOUR
TI - On the Implementation of Public Key Cryptosystems against Fault-Based Attacks
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 1082
EP - 1089
AU - Chi-Sung LAIH
AU - Fu-Kuan TU
AU - Yung-Cheng LEE
PY - 1999
DO -
JO - IEICE TRANSACTIONS on Fundamentals
SN -
VL - E82-A
IS - 6
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - June 1999
AB - Secret information stored in a tamperfree device is revealed during the decryption or signature generation processes due to fault-based attack. In this paper, based on the coding approach, we propose a new fault-resistant system which enables any fault existing in modular multiplication and exponentiation computations to be detected with a very high probability. The proposed method can be used to implement all crypto-schemes whose basic operations are modular multiplications for resisting both memory and computational fault-based attacks with a very low computational overhead.
ER -