On Key-collisions in (EC)DSA Schemes
CRYPTO 2002 Rump Session
Tomáš Rosa tomas.rosa@i.cz, http://crypto.hyperlink.cz ICZ, a.s.
- Dept. of Computer Science, CTU
On Key -collisions in (EC)DSA Schemes (1) Let ( m , S ) be a - - PDF document
On Key -collisions in (EC)DSA Schemes CRYPTO 2002 Rump Session Tom Rosa tomas.rosa@i.cz, http://crypto.hyperlink.cz ICZ, a.s. Dept. of Computer Science, CTU in Prague CZECH REPUBLIC On Key -collisions in (EC)DSA Schemes (1) Let ( m
Tomáš Rosa, tomas.rosa@ i.cz
Let (m, S) be a message and its
Let us have two different public
VERPUB_A(m, S) = VERPUP_B(m, S) =
Then (PubA, PubB) is said to be a
The signature S is referred to as a
Tomáš Rosa, tomas.rosa@ i.cz
An ability to find a k-collision for
Leads to: “It has been somebody
There are also non-cooperatively
Leads to: “It has been me, who has
Tomáš Rosa, tomas.rosa@ i.cz
Non-cooperatively computable k-
The algorithm uses a partial inversion
It exploits the lack of restrictions on the
Due to common algebraic properties
Tomáš Rosa, tomas.rosa@ i.cz
Countermeasures
Main: Fix the FIPS 186-2, or make
Temporary: Include detailed public
Must be done carefully and with respect
Still vulnerable through a 2nd order k-