首页> 外文会议>International conference on information security and cryptology >A Reject Timing Attackon an IND-CCA2 Public-Key Cryptosystem
【24h】

A Reject Timing Attackon an IND-CCA2 Public-Key Cryptosystem

机译:拒绝时序攻击函数AND-CCA2公钥密码系统

获取原文

摘要

EPOC-2 is a public-key cryptosystem that can be proved IND-CCA2 under the factoring assumption in the random oracle model. It was written into a standard specification P1363 of IEEE, and it has been a candidate of the public-key cryptosystem in several international standards (or portfolio) on cryptography, e.g. NESSIE, CRYPTREC, ISO, etc. In this paper we propose a chosen ciphertext attack against EPOC-2 from NESSIE by observing the timing of the reject signs from the decryption oracle. We construct an algorithm, which can factor the public modulus using the difference of the reject symbols. For random 384-bit primes, the modulus can be factored with probability at least 1/2 by invoking about 385 times to the decryption oracle.
机译:epoc-2是一个公共关键密码系统,可以在随机Oracle模型中的因子假设下被证明可以证明Ind-CCA2。它被编写为IEEE的标准规范P1363,它是在许多国际标准(或投资组合)的公钥密码系统的候选者,例如,在本文中,我们通过观察解密甲骨文的拒绝符号的时间,从Nessie提出了针对ePoc-2的选择密文攻击的选择密文攻击。我们构建一种算法,可以使用拒绝符号的差异来占据公共模数。对于随机的384位素数,模量可以通过调用约385次,以概率至少为1/2对解密oracle进行。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号