Signature and Its Variants ?

نویسندگان

  • Yuliang Zheng
  • Tsutomu Matsumoto
چکیده

We suggest several methods that may allow one to completely break cryptosystems implemented in a portable hardware device such as a smart card. These cryptanalytic methods work by exploring the hardware in such a way that the pseudo-random number generator embedded in the device behaves predictably, even for a very short period of time. While these attacking methods will be discussed by standing in the position of an attacker, our genuine intention is to serve as an alarm for users, developers and researchers in information security., Bellcore announced that D. Boneh, R. DeMillo (both of Bellcore) and R. Lipton (of Princeton University) have found that RSA signature generation/decryption key that is stored in a \tamper-proof" device such as a smart card may be extracted by an attacker who is in possession of the device 4]. The media release explains that the attack works by subjecting the tamper-proof device to certain types of physical stresses that would cause it to generate faulty computations. Technical details on the attack were later published in 7]. Prior to this, on 23 October 1996, six researchers from the National University of Singapore demonstrated in detail how an attacker may extract a secret RSA key stored in a \tamper-proof" device, again by subjecting the device to physical stresses 3]. The above attacks have been considered speciically for smart card implementations of public key cryptosystems (including decryption, signature, authentica-tion and identiication). A few weeks after Bellcore's media release, however, Bi-ham and Shamir announced, with suucient technical details, that practically all smart card implementations of private key cryptosystems (such as DES, IDEA, FEAL, : : :) may be broken within the same attack model where an attacker may introduce hardware faults into a \tamper-proof" device 6]. In less than two weeks' time, Biham and Shamir pushed their cryptanalysis further to show that hardware faults may allow one to break a smart card implementation of a private key cryptosystem whose algorithmic details are not public (for instance,

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Signature submanifolds for some equivalence problems

This article concerned on the study of signature submanifolds for curves under Lie group actions SE(2), SA(2) and for surfaces under SE(3). Signature submanifold is a regular submanifold which its coordinate components are differential invariants of an associated manifold under Lie group action, and therefore signature submanifold is a key for solving equivalence problems.

متن کامل

Double voter perceptible blind signature based electronic voting protocol

Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this p...

متن کامل

Hidden Signature Schemes Based on the Discrete Logarithm Problem and Related Concepts Hidden Signature Schemes Based on the Discrete Logarithm Problem and Related Concepts

Limited distribution notes: This report has been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher its distribution outside the University of Technology Chemnitz-Zwickau prior to publication should be limited to peer communications and speciic requests. After outside publication, requests should be lled only by rep...

متن کامل

Natural scene text localization using edge color signature

Localizing text regions in images taken from natural scenes is one of the challenging problems dueto variations in font, size, color and orientation of text. In this paper, we introduce a new concept socalled Edge Color Signature for localizing text regions in an image. This method is able to localizeboth Farsi and English texts. In the proposed method rst a pyramid using diff...

متن کامل

Use of the Shearlet Transform and Transfer Learning in Offline Handwritten Signature Verification and Recognition

Despite the growing growth of technology, handwritten signature has been selected as the first option between biometrics by users. In this paper, a new methodology for offline handwritten signature verification and recognition based on the Shearlet transform and transfer learning is proposed. Since, a large percentage of handwritten signatures are composed of curves and the performance of a sig...

متن کامل

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007