Detailed Cost Estimation of CNTW Forgery Attack against EMV Signature Scheme
スポンサーリンク
概要
- 論文の詳細を見る
EMV signature is one of specifications for authenticating credit and debit card data, which is based on ISO/IEC 9796-2 signature scheme. At CRYPTO 2009, Coron, Naccache, Tibouchi, and Weinmann proposed a new forgery attack against the signature ISO/IEC 9796-2 (CNTW attack) [2]. They also briefly discussed the possibility when the attack is applied to the EMV signatures. They showed that the forging cost is $45,000 and concluded that the attack could not forge them for operational reason. However their results are derived from not fully analysis under only one condition. The condition they adopt is typical case. For security evaluation, fully analysis and an estimation in worst case are needed. This paper shows cost-estimation of CNTW attack against EMV signature in detail. We constitute an evaluate model and show cost-estimations under all conditions that Coron et al. do not estimate. As results, this paper contribute on two points. One is that our detailed estimation reduced the forgery cost from $45,000 to $35,200 with same condition as [2]. Another is to clarify a fact that EMV signature can be forged with less than $2,000 according to a condition. This fact shows that CNTW attack might be a realistic threat.
- 2011-11-01
著者
-
SAKEMI Yumi
Okayama University
-
Izu Tetsuya
Fujitsu Laboratories Ltd.
-
TAKENAKA MASAHIKO
FUJITSU LABORATORIES LTD
-
Takenaka Masahiko
Fujitsu Laboratories Ltd.
関連論文
- Extending Bleichenbachers Forgery Attack
- Scalar Multiplication Using Frobenius Expansion over Twisted Elliptic Curve for Ate Pairing Based Cryptography
- Integer Variable x-Based Cross Twisted Ate Pairing and Its Optimization for Barreto-Naehrig Curve
- Reduction Optimal Trinomials for Efficient Software Implementation of the ηT Pairing
- A Practical Countermeasure against Address-bit Differential Power Analysis (特集:プライバシを保護するコンピュータセキュリティ技術)
- Design Optimization of a High-Speed, Area-Efficient and Low-Power Montgomery Modular Multiplier for RSA Algorithm(Digital, Low-Power LSI and Low-Power IP)
- Theoretical Analysis of x^2 Attack on RC6 (Symmetric Cipher) (Cryptography and Information Security)
- A Note on the Lattice Factoring Method (Cryptography and Information Security)
- Small Secret CRT-Exponent Attacks on Takagi's RSA
- A Note on the Lattice Factoring Method
- Side Channel Cryptanalysis on XTR Public Key Cryptosystem(Discrete Mathematics and Its Applications)
- An Improvement of Twisted Ate Pairing Efficient for Multi-Pairing and Thread Computing
- Uniqueness Enhancement of PUF Responses Based on the Locations of Random Outputting RS Latches
- Detailed Cost Estimation of CNTW Forgery Attack against EMV Signature Scheme
- Experimental Analysis of Cheon's Algorithm against Pairing-friendly Curves
- Uniqueness Enhancement of PUF Responses Based on the Locations of Random Outputting RS Latches
- Extending Bleichenbacher's Forgery Attack