Bug Attacks |
| |
Authors: | Eli Biham Yaniv Carmeli Adi Shamir |
| |
Affiliation: | 1.Computer Science Department,Technion - Israel Institute of Technology,Haifa?,Israel;2.Computer Science Department,The Weizmann Institute of Science,Rehovot?,Israel |
| |
Abstract: | In this paper we present a new kind of cryptanalytic attack which utilizes bugs in the hardware implementation of computer instructions. The best-known example of such a bug is the Intel division bug, which resulted in slightly inaccurate results for extremely rare inputs. Whereas in most applications such bugs can be viewed as a minor nuisance, we show that in the case of RSA (even when protected by OAEP), Pohlig–Hellman and ElGamal encryption such bugs can be a security disaster: decrypting ciphertexts on any computer which multiplies even one pair of numbers incorrectly can lead to full leakage of the secret key, sometimes with a single well-chosen ciphertext. As shown by recent revelation of top secret NSA documents by Edward Snowden, intentional hardware modifications is a method that was used by the USA to weaken the security of commercial equipment sent to targeted organizations. |
| |
Keywords: | |
本文献已被 SpringerLink 等数据库收录! |
|