首页> 外文期刊>Operating systems review >How to Break Fraud-Detectable Key Recovery
【24h】

How to Break Fraud-Detectable Key Recovery

机译:How to Break Fraud-Detectable Key Recovery

获取原文
获取原文并翻译 | 示例
           

摘要

Fraud detection for software key recovery schemes means that, without knowing the session key, a third party can verify whether the correct session key could be recovered. This concept and a construction by so-called binding data was introduced by Verheul et al. at Eurocrypt '97 to provide for dishonest users that make simple modifications to messages, e.g., delete the key recovery information, and manipulate the recipient's software such that it decrypts messages even if the key recovery information is incorrect. We show how to break their general construction within their model, in particular without using any other encryption system or any pre-established shared secrets. We conclude that the concept of binding data does not improve the security of software key recovery but illustrates once more its fundamental problem; it does not improve an authorized third party's ability to eavesdrop on serious criminals.

著录项

获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号