Postranní kanál a útok na privátní klí? RSA - týká se zejména nej?ast?ji používaného exponentu 65537
24.06.2004
Abstract: This paper analyzes a key recovery method for RSA signature generation or decryption implementations using the Chinese Remainder Theorem (CRT) speed up. The CRT-based RSA implementation is common in both low computing power devices and high speed cryptographic acceleration cards. .... An algorithm for recovering the private key, modulus and prime factorization candidates is presented with a proof of correctness. Runtime estimates and sample source code is given.