【24h】

Fortifying the Dali Attack on Digital Signature

机译:强化对数字签名的大理攻击

获取原文

摘要

In the recent literature a new vulnerability of digital signature has been addressed, based on a novel mechanism (denoted Dall attack) allowing ambiguous presentation of electronic documents. This mechanism operates by a non-trivial inclusion into a single polymorphic file of a pair of different contents, encoded through two different format types. In this paper we overcome the main limitation of the above attack, consisting in the necessity of having html among the two involved formats. Here, exploiting an unusual feature of the pdf standard, we are able to enhance the attack in such a way that the two filetypes, namely pdf and tiff, embedded into the polymorphic file are both extremely safe, allowing the attacker to produce a fake document that appears in a format widely accepted in the context of e-government activities both whenever it is signed and whenever it is fraudulently exploited. This significantly increases both the danger and the plausibility of the Dali attack.
机译:在最近的文献中,基于一种新颖的机制(称为Dall攻击),解决了数字签名的一个新漏洞,该机制允许对电子文档进行模棱两可的呈现。这种机制通过将包含两种不同格式类型的一对不同内容的非平凡包含到单个多态文件中来进行操作。在本文中,我们克服了上述攻击的主要局限性,即必须在两种涉及的格式之间使用html。在这里,利用pdf标准的一个不寻常的功能,我们能够以某种方式增强攻击,使得嵌入多态文件中的pdf和tiff这两种文件类型都非常安全,从而使攻击者能够生成伪造的文档。无论是在签名时还是在被欺诈利用时,都以电子政务活动中广泛接受的格式出现。这大大增加了大理袭击的危险性和合理性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号