Insecure primitive elements in an ElGamal signature protocol

نویسنده

  • Omar Khadir
چکیده

Consider the classical ElGamal digital signature scheme based on the modular relation α ≡ y r [p]. In this work, we prove that if we can compute a natural integer i such that α mod p is smooth and divides p − 1, then it is possible to sign any given document without knowing the secret key. Therefore we extend and reinforce Bleichenbacher’s attack presented at Eurocrypt’96.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Attack on a concast signature scheme

Al-Ibrahim, Ghodosi and Pieprzyk proposed several methods of batch signature verifiation suitable for concast communication. These schemes are all based on ElGamal-type signature schemes. We prove that their preferred scheme, which does not require interaction among the various signers, is insecure.

متن کامل

Efficient deniable authentication protocol based on generalized ElGamal signature scheme

An efficient and non-interactive deniable authentication protocol is presented to enable a receiver to identify the source of a given message, but not prove the identity of the sender to a third party. The proposed protocol is based on the generalized ElGamal signature scheme and is more efficient than the previous protocols. We show that if an adversary could forge signatures of this protocol,...

متن کامل

Schnorr Digital Signature in Signcryption Scheme

This article presents a new signcryption scheme which is based on the Schnorr digital signature algorithm. The new scheme represents my personal contribution to signcryption area. I have implemented the algorithm in a program and here are provided the steps of the algorithm, the results and some examples. The paper also contains the presentation of the original Signcryption scheme, based on ElG...

متن کامل

Combining Public Key Encryption with Schnorr Digital Signature

This article presents a new signcryption scheme which is based on the Schnorr digital signature algorithm. The new scheme represents my personal contribution to signcryption area. I have implemented the algorithm in a program and here are provided the steps of the algorithm, the results and some examples. The paper also contains the presentation of the original Signcryption scheme, based on ElG...

متن کامل

Capture Resilient ElGamal Signature Protocols

One of the fundamental problems of public key cryptography is protecting the private key. Private keys are too long to be remembered by the user, and storing them in the device which performs the private key operation is insecure as long as the device is subject to capture. In this paper, we propose server-assisted protocols for the ElGamal signature scheme which make the system capture resilie...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1509.01504  شماره 

صفحات  -

تاریخ انتشار 2015