Evaluation Report on the ECDSA signature scheme
نویسنده
چکیده
This document is an evaluation of the ECDSA signature scheme. Our work is based on the analysis of various documents [1, 32, 10, 11], which provide the specification of the scheme, as well as on various research papers related to the scheme. Among these research papers are the original work of Poincheval and Stern [33, 34] investigating the security of El Gamal-like signatures, and the series of papers related to the so-called generic model [29, 45, 27, 6]. Of particular interest to the present report is [6], which applies the generic model to argue towards the security of ECDSA. The present report is organized as follows: firstly, we briefly review the cryptographic primitive on which the signature scheme relies, namely the discrete logarithm problem on elliptic curves (ECDL), and analyze the various algorithms that are currently known to solve the problem. We specifically address the case of curves of special form, since some of the recommended examples proposed in the standard [11] are Koblitz curves. Next, we give formal definitions for signature schemes and recall the strongest security notion that is now mandatory for signature schemes: security against existential forgery under adaptive chosen-message attacks. We also provide a short history of the various signature schemes based on the discrete logarithm problem, and of the various strategies used to support their security: the random oracle model and the generic model. This allows us to prove the security of the generic version of ECDSA, against adaptive chosen-message attacks. We finally analyze the meaning of this proof, with respect to the actual ECDSA signature scheme. In particular, we discuss whether one can derive practical implications, notably in terms of key sizes. This is as requested by IPA.
منابع مشابه
Security of ECQV-Certified ECDSA Against Passive Adversaries
We show that the elliptic curve Qu-Vanstone implicit certificate scheme (ECQV), when composed with the Elliptic Curve Digital Signature Algorithm (ECDSA), is secure against passive adversaries under the combined assumption of the random oracle model and the generic group model. In contrast, we detail an attack on the composition of another implicit certificate scheme, proposed by Pintsov and Va...
متن کاملThe Security of DSA and ECDSA
DSA and ECDSA are well established standards for digital signature based on the discrete logarithm problem. In this paper we survey known properties, certification issues regarding the public parameters, and security proofs. ECDSA also includes a standard certification scheme for elliptic curve which is assumed to guarantee that the elliptic curve was randomly selected, preventing from any pote...
متن کاملThe new protocol blind digital signature based on the discrete logarithm problem on elliptic curve
In recent years it has been trying that with regard to the question of computational complexity of discrete logarithm more strength and less in the elliptic curve than other hard issues, applications such as elliptic curve cryptography, a blind digital signature method, other methods such as encryption replacement DLP. In this paper, a new blind digital signature scheme based on elliptic curve...
متن کاملFast Hash-Based Signatures on Constrained Devices
Digital signatures are one of the most important applications of microprocessor smart cards. The most widely used algorithms for digital signatures, RSA and ECDSA, depend on finite field engines. On 8-bit microprocessors these engines either require costly coprocessors, or the implementations become very large and very slow. Hence the need for better methods is highly visible. One alternative t...
متن کاملThe Security of DSA and ECDSA Bypassing the Standard Elliptic Curve Certification Scheme
DSA and ECDSA are well established standards for digital signature based on the discrete logarithm problem. In this paper we survey known properties, certification issues regarding the public parameters, and security proofs. ECDSA also includes a standard certification scheme for elliptic curve which is assumed to guarantee that the elliptic curve was randomly selected, preventing from any pote...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2001