谷歌浏览器插件
订阅小程序
在清言上使用

Attacks on Authentication and Signature Schemes Involving Corruption of Public Key (Modulus).

2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography(2008)

引用 8|浏览0
暂无评分
摘要
Brier et al (2006) showed how to attack RSA by induction of faults in public modulus n. We propose to use the same kind of technique to attack other asymmetric cryptographic schemes. The most interesting case in which we use a somewhat different approach is the attack on Elliptic Curves based signature protocol (namely ECDSA). Here we also take advantage of the short keys to offer a nontrivial practical attack that enables us to fully recover the private key. Different idea is used to attack Guillou-Quisquater authentication scheme (GQ). This demonstrates how the difference between schemes influences the details of the modulus corruption attacks. Special efforts were devoted to calculate the amount of corrupted data to perform the attack on each scheme. Various ways of protection against fault injection attacks on public key elements are discussed.
更多
查看译文
关键词
fault injection attacks,corruption of public key (modulus),attacks on signature and authentication schemes,smart cards,elliptic curve ctyptography
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要