Extending Bleichenbachers Forgery Attack
スポンサーリンク
概要
- 論文の詳細を見る
In 2006, Bleichenbacher presented a new forgery attack against the signature scheme RSASSA-PKCS1-v1_5. The attack allows an adversary to forge a signature on almost arbitrary messages, if an implementation is not proper. Since the example was only limited to the case when the public exponent is 3 and the bit-length of the public composite is 3, 072, the potential threat is not known. This paper analyzes Bleichenbachers forgery attack and shows applicable composite sizes for given exponents. Moreover, we extend Bleichenbachers attack and show that when 1, 024-bit composite and the public exponent 3 are used, the extended attack succeeds the forgery with the probability 2-16.6.
著者
-
Izu Tetsuya
Fujitsu Laboratories Ltd.
-
TAKENAKA MASAHIKO
FUJITSU LABORATORIES LTD
-
SHIMOYAMA Takeshi
FUJITSU LABORATORIES Ltd
関連論文
- Extending Bleichenbachers Forgery Attack
- A Strict Evaluation on the Number of Conditions for SHA-1 Collision Search
- Reduction Optimal Trinomials for Efficient Software Implementation of the ηT Pairing
- A Combinatorics Proliferation Model with Threshold for Malware Countermeasure
- A Practical Countermeasure against Address-bit Differential Power Analysis (特集:プライバシを保護するコンピュータセキュリティ技術)
- Design Optimization of a High-Speed, Area-Efficient and Low-Power Montgomery Modular Multiplier for RSA Algorithm(Digital, Low-Power LSI and Low-Power IP)
- Theoretical Analysis of x^2 Attack on RC6 (Symmetric Cipher) (Cryptography and Information Security)
- A Note on the Lattice Factoring Method (Cryptography and Information Security)
- Small Secret CRT-Exponent Attacks on Takagi's RSA
- A Note on the Lattice Factoring Method
- An Efficient Interpolation Attack(Special Section on Cryptography and Information Security)
- Side Channel Cryptanalysis on XTR Public Key Cryptosystem(Discrete Mathematics and Its Applications)
- Uniqueness Enhancement of PUF Responses Based on the Locations of Random Outputting RS Latches
- Detailed Cost Estimation of CNTW Forgery Attack against EMV Signature Scheme
- Preimage Attacks on the Step-Reduced RIPEMD-128 and RIPEMD-160
- Experimental Analysis of Cheon's Algorithm against Pairing-friendly Curves
- Uniqueness Enhancement of PUF Responses Based on the Locations of Random Outputting RS Latches
- Key Length Estimation of Pairing-Based Cryptosystems Using ηT Pairing over GF(3n)
- Extending Bleichenbacher's Forgery Attack
- Preimage Attacks on the Step-Reduced RIPEMD-128 and RIPEMD-160