首页> 外文会议>European PKI Workshop >A New Variant for an Attack Against RSA Signature Verification Using Parameter Field
【24h】

A New Variant for an Attack Against RSA Signature Verification Using Parameter Field

机译:使用参数字段对RSA签名验证进行攻击的新变种

获取原文

摘要

We present a method to create a forged signature which will be verified to a syntactically well-formed ASN.1 datum, when certificate authorities use small RSA public exponents such as 3. Our attack is related to the technique which Daniel Bleichenbacher reported recently, but our forged signature is well-formed ASN.l datum, unlike Bleichenbacher's original attack: thus our new attack is still applicable to certain implementations even if these are immune to the Bleichenbacher's attack. We have also analyzed the parameters which enable our attack and Bleichenbacher's, and found that both attacks are possible with the combination of existing public keys of widely-trusted certificate authorities and existing real-world implementations. We have already reported the vulnerability to developers of both GNUTLS and Mozilla NSS to fix their implementations.
机译:我们提出了一种创建伪造签名的方法,该签名将被验证到一个句法良好的ASN.1数据库,当证书当局使用小型RSA公共指数,如3.我们的攻击与最近报告的Daniel Bleichenbacher的技术有关。我们的伪造签名是形成的ASN.L Datum,与Bleichenbacher的原始攻击不同:因此,我们的新攻击仍然适用于某些实现,即使这些对Bleichenbacher的攻击免疫。我们还分析了能够实现我们攻击和Bleichenbacher的参数,并发现这两种攻击都是可能的,这些攻击与现有的公共钥匙的广泛信任的证书颁发机构和现有的现实世界实现的结合。我们已经报告了对GNUTLS和Mozilla NSS的开发人员的脆弱性,以解决其实施。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号