Essence and conditions of implementation of the attack based on related keys relatively electronic signatures IBS-1 and IBS-2 DSTU ISO/IEC 14888-3
Abstract
The paper deals with the state of protection electronic signatures based on the pairing of points of an elliptic curve against attacks based on the signing data with related keys. It is defined conditions and possibilities of the organization and implementation of these attacks. It is provided the recommendations on protection against these vulnerabilities, including in the post-quantum period.
Downloads
References
Koblitz N., Menezes A.J. A riddle wrapped in an enigma. URL: https://eprint.iacr.org/2015/1018.pdf.
Gorbenko I.D., Gorbenko Yu.I. Prykladna kryptologija. Teorija. Praktyka. Zastosuvannja: monografija. Harkiv: Fort, 2012. 870 p.
Gorbenko Yu.I., Ganzja R.S., Akol'zina O.S. Elektronni pidpysy na osnovi identyfikatoriv ta binarnogo vidobrazhennja. Prikladnaya radioelektronika. 2015. T. 14, № 4. pp. 284–290.
Gorbenko Yu.I., Jesina M.V., Kulibaba V.A. Sutnist' ta umovy zdijsnennja ataky na zv’jazanyh kljuchah vidnosno elektronnyh pidpysiv IBS-1 ta IBS-2 DSTU ISO/IEC 14888-3. Systemy obrobky informacii'. 2016. № 7(144). pp. 113–118.
DSTU ISO/IEC 14888-3:2014 Informacijni tehnologii'. Metody zahystu. Cyfrovi pidpysy z dopovnennjam. Chast.3. Mehanizmy, shho g'runtujut'sja na dyskretnomu logaryfmi (ISO/IEC 14888-3:2008, IDT). 2014. 113 p.