Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Arnaud Boscher is active.

Publication


Featured researches published by Arnaud Boscher.


workshop in information security theory and practice | 2007

CRT RSA algorithm protected against fault attacks

Arnaud Boscher; Robert Naciri; Emmanuel Prouff

Embedded devices performing RSA signatures are subject to Fault Attacks, particularly when the Chinese Remainder Theorem is used. In most cases, the modular exponentiation and the Garner recombination algorithms are targeted. To thwart Fault Attacks, we propose a new generic method of computing modular exponentiation and we prove its security in a realistic fault model. By construction, our proposal is also protected against Simple Power Analysis. Based on our new resistant exponentiation algorithm, we present two different ways of computing CRT RSA signatures in a secure way. We show that those methods do not increase execution time and can be easily implemented on low-resource devices.


workshop on fault diagnosis and tolerance in cryptography | 2009

Blinded Fault Resistant Exponentiation Revisited

Arnaud Boscher; Helena Handschuh; Elena Trichina

Cryptographic algorithm implementations are subject to specific attacks, called side channel attacks, focusing on the analysis of their power consumption or execution time or on the analysis of faulty computations. At FDTC06, Fumaroli and Vigilant presented a generic method to compute an exponentiation resistant against different side channel attacks. However, even if this algorithm does not reveal information on the secrets in case of a fault attack, it can not be used to safely implement a crypto-system involving an exponentiation. In this paper, we propose a new exponentiation method without this drawback and give a security proof of resistance to fault attacks. As an application, we propose an RSA algorithm implemented using the Chinese Remainder Theorem protected against side channel attacks. The exponentiation algorithm is also33% faster than the previous method.


workshop on fault diagnosis and tolerance in cryptography | 2008

Masking Does Not Protect Against Differential Fault Attacks

Arnaud Boscher; Helena Handschuh

Over the past ten years, cryptographic algorithms have been found to be vulnerable against side-channel attacks such as power analysis attacks, timing attacks, electromagnetic radiation attacks and fault attacks. These attacks capture leaking information from an implementation of the algorithm in software or in hardware and apply cryptanalytical and statistical tools to recover the secret keys. A very well-known countermeasure against these attacks is to randomize every execution of the algorithm and every intermediate piece of data with a so-called masking method. In this paper we demonstrate that traditional countermeasures such as masking methodsfor symmetric cryptosystems are completely inefficient against fault attacks. In other words, differential fault attacks still apply on masked data. As an example we show how to recover secret keys from two masked AES implementations using a basic differential fault attack.


smart card research and advanced application conference | 2006

Optimal use of montgomery multiplication on smart cards

Arnaud Boscher; Robert Naciri

Montgomery multiplication is used to speed up modular multiplications involved in public-key cryptosystems. However, it requires conversion of parameters into N-residue representation. These additional pre-computations can be costly for low resource devices like smart cards. In this paper, we propose a new, more efficient method, suitable for smart card implementations of most of public-key cryptosystems. Our approach essentially consists in modifying the representation of the key and the algorithm embedded in smart card in order to take advantage of the Montgomery multiplication properties.


Archive | 2007

Intelligent memory data management

Elena Trichina; Arnaud Boscher


Archive | 2007

Randomized RSA-based cryptographic exponentiation resistant to side channel and fault attacks

Arnaud Boscher; Elena Trichina; Helena Handschuh


Archive | 2008

INSTANT HARDWARE ERASE FOR CONTENT RESET AND PSEUDO-RANDOM NUMBER GENERATION

Helena Handschuh; Arnaud Boscher; Elena Trichina; Joel Le Bihan; Nicolas Prawitz; Frederic Cherpantier; Jimmy Lau


Archive | 2007

Secure modular exponentiation by randomization of exponent scanning

Elena Trichina; Helena Handschuh; Arnaud Boscher


Archive | 2006

Method for Processing Data Involving Modular Exponentiation and Related Device

Arnaud Boscher; Christophe Giraud; Robert Naciri


IACR Cryptology ePrint Archive | 2010

Fault Resistant RSA Signatures: Chinese Remaindering in Both Directions.

Arnaud Boscher; Helena Handschuh; Elena Trichina

Collaboration


Dive into the Arnaud Boscher's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Elena Trichina

University of South Australia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Elena Trichina

University of South Australia

View shared research outputs
Top Co-Authors

Avatar

Elena Trichina

University of South Australia

View shared research outputs
Researchain Logo
Decentralizing Knowledge