Essence and conditions of implementation of the attack based on related keys relatively electronic signatures IBS-1 and IBS-2 DSTU ISO/IEC 14888-3

  • Marina Yesina V. N. Karazin Kharkiv National University
  • Yuriy Gorbenko V. N. Karazin Kharkiv National University
  • Vladislav Kulibaba V. N. Karazin Kharkiv National University
Keywords: attack;, electronic signature;, elliptic curve;, related keys;, pairing;

Abstract

The paper deals with the state of protection electronic signatures based on the pairing of points of an elliptic curve against attacks based on the signing data with related keys. It is defined conditions and possibilities of the organization and implementation of these attacks. It is provided the recommendations on protection against these vulnerabilities, including in the post-quantum period.

Downloads

Download data is not yet available.

Author Biographies

Marina Yesina, V. N. Karazin Kharkiv National University

Ph.D., Senior Lecturer, Faculty of Computer Science

Yuriy Gorbenko, V. N. Karazin Kharkiv National University

Ph.D., leading researcher

Vladislav Kulibaba, V. N. Karazin Kharkiv National University

Postgraduate Student, Department of Information Systems Security and Technology

References

Koblitz N., Menezes A.J. A riddle wrapped in an enigma. URL: https://eprint.iacr.org/2015/1018.pdf.

Gorbenko I.D., Gorbenko Yu.I. Prykladna kryptologija. Teorija. Praktyka. Zastosuvannja: monografija. Harkiv: Fort, 2012. 870 p.

Gorbenko Yu.I., Ganzja R.S., Akol'zina O.S. Elektronni pidpysy na osnovi identyfikatoriv ta binarnogo vidobrazhennja. Prikladnaya radioelektronika. 2015. T. 14, № 4. pp. 284–290.

Gorbenko Yu.I., Jesina M.V., Kulibaba V.A. Sutnist' ta umovy zdijsnennja ataky na zv’jazanyh kljuchah vidnosno elektronnyh pidpysiv IBS-1 ta IBS-2 DSTU ISO/IEC 14888-3. Systemy obrobky informacii'. 2016. № 7(144). pp. 113–118.

DSTU ISO/IEC 14888-3:2014 Informacijni tehnologii'. Metody zahystu. Cyfrovi pidpysy z dopovnennjam. Chast.3. Mehanizmy, shho g'runtujut'sja na dyskretnomu logaryfmi (ISO/IEC 14888-3:2008, IDT). 2014. 113 p.

Published
2018-12-17
Cited
How to Cite
Yesina, M., Gorbenko, Y., & Kulibaba, V. (2018). Essence and conditions of implementation of the attack based on related keys relatively electronic signatures IBS-1 and IBS-2 DSTU ISO/IEC 14888-3. Computer Science and Cybersecurity, (3), 18-27. Retrieved from https://periodicals.karazin.ua/cscs/article/view/12148
Section
Статті