【24h】

On the Insecurity of a Server-Aided RSA Protocol

机译:关于服务器辅助RSA协议的不安全感

获取原文

摘要

At Crypto '88, Matsumoto, Kato and Imai proposed a protocol, known as RSA-S1, in which a smart card computes an RSA signature, with the help of an untrusted powerful server. There exist two kinds of attacks against such protocols: passive attacks (where the server does not deviate from the protocol) and active attacks (where the server may return false values). Pfitzmann and Waidner presented at Eurocrypt '92 a passive meet-in-the-middle attack and a few active attacks on RSA-S1. They discussed two simple countermeasures to thwart such attacks: renewing the decomposition of the RSA private exponent, and checking the signature (in which case a small public exponent must be used). We present a new lattice-based provable passive attack on RSA-S1 which recovers the factorization of the RSA modulus when a very small public exponent is used, for many choices of the parameters. The first countermeasure does not prevent this attack because the attack is a one-round attack, that is, only a single execution of the protocol is required. Interestingly, Merkle and Werchner recently provided a security proof of RSA-S1 against one-round passive attacks in some generic model, even for parameters to which our attack provably applies. Thus, our result throws doubt on the real significance of security proofs in the generic model, at least for server-aided RSA protocols. We also present a simple analysis of a multi-round lattice-based passive attack proposed last year by Merkle.
机译:在Crypto '88,Matsumoto,Kato和Imai提出了一种称为RSA-S1的协议,其中智能卡在不受信任的强大服务器的帮助下计算RSA签名。对此协议存在两种攻击:被动攻击(服务器不偏离协议)和活动攻击(服务器可能返回假值的位置)。 Pfitzmann和Waidner在Eurocrypt'92上呈现了一个被动举行的中间攻击和对RSA-S1的一些积极攻击。他们讨论了两个简单的对策来挫败这种攻击:更新RSA私人指数的分解,并检查签名(在这种情况下,必须使用小公共指数)。我们为RSA-S1提供了一种基于晶格的可执行被动攻击,当使用非常小的公共指数时,RSA-S1的分解在使用非常小的公共指数时,对于参数的许多选择。第一个对策不会阻止这种攻击,因为攻击是一轮攻击,即只需要单一执行协议。有趣的是,Merkle和Werchner最近提供了RSA-S1的安全证明,用于一些通用模型中的一轮被动攻击,即使对于我们攻击可被证明的参数,也是如此。因此,我们的结果为通用模型中的安全证明的实际意义赋予了疑虑,至少对于服务器辅助RSA协议。我们还展示了对马尔克莱去年提出的多轮格子的被动攻击的简单分析。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号