Loading…

Chinese Remaindering Based Cryptosystems in the Presence of Faults

We present some observations on public-key cryptosystems that use the Chinese remaindering algorithm. Our results imply that careless implementations of such systems could be vulnerable. Only one faulty signature, in some explained context, is enough to recover the secret key.

Saved in:
Bibliographic Details
Published in:Journal of cryptology 1999-09, Vol.12 (4), p.241-245
Main Authors: Joye, Marc, Lenstra, Arjen K, Jean-Jacques, Quisquater
Format: Article
Language:English
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:We present some observations on public-key cryptosystems that use the Chinese remaindering algorithm. Our results imply that careless implementations of such systems could be vulnerable. Only one faulty signature, in some explained context, is enough to recover the secret key.
ISSN:0933-2790
1432-1378
DOI:10.1007/s001459900055