TY - JOUR
T1 - How Secure is Exponent-blinded RSA–CRT with Sliding Window Exponentiation?
AU - Ueno, Rei
AU - Homma, Naofumi
N1 - Publisher Copyright:
© 2023, Ruhr-University of Bochum. All rights reserved.
PY - 2023/3/6
Y1 - 2023/3/6
N2 - This paper presents the first security evaluation of exponent-blinded RSA– CRT implementation with sliding window exponentiation against cache attacks. Our main contributions are threefold. (1) We demonstrate an improved cache attack using Flush+Reload on RSA–CRT to estimate the squaring–multiplication operational sequence. The proposed method can estimate a correct squaring–multiplication sequence from one Flush+Reload trace, while the existing Flush+Reload attacks always contain errors in the sequence estimation. This is mandatory for the subsequent steps in the proposed attack. (2) We present a new and first partial key exposure attack on exponent-blinded RSA–CRT with a random-bit leak. The proposed attack first estimates a random mask for blinding exponent using a modification of the Schindler–Wiemers continued fraction attack, and then recovers the secret key using an extension of the Heninger–Shacham branch-and-prune attack. We experimentally show that the proposed attack on RSA–CRT using a practical window size of 5 with 16-, 32-, and 64-bit masks is carried out with complexity of 225.6, 267.7, and 2161, respectively. (3) We then investigate the tradeoffs between mask bit length and implementation performance. The computational cost of exponent-blinded RSA–CRT using a sliding window with a 32-and 64-bit mask are 15% and 10% faster than that with a 128-bit mask, respectively, as we confirmed that 32-and 64-bit masks are sufficient to defeat the proposed attack. Our source code used in the experiment is publicly available.
AB - This paper presents the first security evaluation of exponent-blinded RSA– CRT implementation with sliding window exponentiation against cache attacks. Our main contributions are threefold. (1) We demonstrate an improved cache attack using Flush+Reload on RSA–CRT to estimate the squaring–multiplication operational sequence. The proposed method can estimate a correct squaring–multiplication sequence from one Flush+Reload trace, while the existing Flush+Reload attacks always contain errors in the sequence estimation. This is mandatory for the subsequent steps in the proposed attack. (2) We present a new and first partial key exposure attack on exponent-blinded RSA–CRT with a random-bit leak. The proposed attack first estimates a random mask for blinding exponent using a modification of the Schindler–Wiemers continued fraction attack, and then recovers the secret key using an extension of the Heninger–Shacham branch-and-prune attack. We experimentally show that the proposed attack on RSA–CRT using a practical window size of 5 with 16-, 32-, and 64-bit masks is carried out with complexity of 225.6, 267.7, and 2161, respectively. (3) We then investigate the tradeoffs between mask bit length and implementation performance. The computational cost of exponent-blinded RSA–CRT using a sliding window with a 32-and 64-bit mask are 15% and 10% faster than that with a 128-bit mask, respectively, as we confirmed that 32-and 64-bit masks are sufficient to defeat the proposed attack. Our source code used in the experiment is publicly available.
KW - Cache attack
KW - Exponent blinding
KW - Partial key exposure attack
KW - RSA–CRT
KW - Side-channel attack
KW - Simple power analysis
KW - Sliding window exponentiation
UR - http://www.scopus.com/inward/record.url?scp=85150043063&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85150043063&partnerID=8YFLogxK
U2 - 10.46586/tches.v2023.i2.241-269
DO - 10.46586/tches.v2023.i2.241-269
M3 - Article
AN - SCOPUS:85150043063
SN - 2569-2925
VL - 2023
SP - 241
EP - 269
JO - IACR Transactions on Cryptographic Hardware and Embedded Systems
JF - IACR Transactions on Cryptographic Hardware and Embedded Systems
IS - 2
ER -