Fault-Based Attack of RSA Authentication
Source: University of Michigan (Ross)
Security of a computer system is of utmost importance, since it acts as the repository of the information. For this purpose, hardware as well as software needs to be reliable. This paper studies the various aspects of computer security and undertakes a complete fault-attack on a system built on a microprocessor. The paper seeks to exhibit the susceptibility of computer systems and then to explain the ways to overcome such weaknesses. In this paper, an RSA signature algorithm has been subjected to a full blown theoretical attack. The attack has been made via injecting transient fault by controlling the voltage supply to the system. The paper has three pronged strategy. First is to depict and use a major error on the execution of the RSA signature algorithm on OpenSSL. Second, it has developed a systematic attack on the modular exponentiation algorithm for being used by RSA. It also reports on the physical aspect of the attack. It also has carried out an attack on original OpenSSL. The paper studies the public-key cryptography schemes and has found that with fairly long length, these keys are unbreakable. Then it makes a summary of its attack and public key authentication. It also takes into account the happening of hardware faults.