Practical algorithm substitution attack on extractable signatures

نویسندگان

چکیده

An algorithm substitution attack (ASA) can undermine the security of cryptographic primitives by subverting original implementation. ASA succeeds when it extracts secrets without being detected. To launch an on signature schemes, existing studies often needed to collect signatures with successive indices extract signing key. However, collection requires uninterrupted surveillance communication channel and a low transmission loss rate in practice. This hinders practical implementation current ASAs, thus causing users misbelieve that threat incurred is only theoretical far from reality. In this study, we first classify group schemes called extractable achieve traditional (unforgeability) reductions ending key extraction, demonstrating there generic approach for class signatures. Further, present ASAs which two no further requirements are extraction widely used discrete log-based such as DSA, Schnorr, modified ElGamal schemes. Our presents realistic applications, also be implemented open unstable environments vehicular ad hoc networks. Finally, prove proposed undetectable against polynomial time detectors physical timing analysis.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Snarky Signatures: Minimal Signatures of Knowledge from Simulation-Extractable SNARKs

We construct a pairing-based simulation-extractable succinct non-interactive argument of knowledge (SE-SNARK) that consists of only 3 group elements and has highly efficient verification. By formally linking SE-SNARKs to signatures of knowledge, we then obtain a succinct signature of knowledge consisting of only 3 group elements. SE-SNARKs enable a prover to give a proof that they know a witnes...

متن کامل

A Key Substitution Attack on SFLASH

A practical key substitution attack on SFLASH is described: Given a valid (message, signature) pair (m,σ) for some public key v0, one can derive another public key v1 (along with matching secret data) such that (m,σ) is also valid for v1. The computational effort needed for finding such a ‘duplicate’ key is comparable to the effort needed for ordinary key generation.

متن کامل

Side-Channel Attack on Substitution Blocks

1 We describe a side-channel attack on a substitution block, which is usually implemented as a table lookup operation. In particular, we have investigated smartcard implementations. The attack is based on the identifying equal intermediate results from power measurements while the actual values of these intermediates remain unknown. A powerful attack on substitution blocks can be mounted if the...

متن کامل

The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption

Motivated by the security of the nonlinear filter generator, the concept of correlation was previously extended to the conditional correlation, that studied the linear correlation of the inputs conditioned on a given (short) output pattern of some specific nonlinear function. Based on the conditional correlations, conditional correlation attacks were shown to be successful and efficient against...

متن کامل

Attack On The Polyalphabetic Substitution Cipher Using A Parallel Genetic Algorithm

In this paper three optimization heuristics are presented which can be utilized in attacks on the transposition cipher. These heuristics are simulated annealing, genetic algorithm and tabu search. We will show that each of these heuristics provides effective automated techniques for the cryptanalysis of the ciphertext. The property which make this cipher vulnerable, is that it is not sophistica...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Designs, Codes and Cryptography

سال: 2022

ISSN: ['0925-1022', '1573-7586']

DOI: https://doi.org/10.1007/s10623-022-01019-1