首页> 外文OA文献 >Attack Algorithm for a Keystore-Based Secret Key Generation Method
【2h】

Attack Algorithm for a Keystore-Based Secret Key Generation Method

机译:基于密钥库的秘密密钥生成方法的攻击算法

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

A new attack algorithm is proposed for a secure key generation and management method introduced by Yang and Wu. It was previously claimed that the key generation method of Yang and Wu using a keystore seed was information-theoretically secure and could solve the long-term key storage problem in cloud systems, thanks to the huge number of secure keys that the keystone seed can generate. Their key generation method, however, is considered to be broken if an attacker can recover the keystore seed. The proposed attack algorithm in this paper reconstructs the keystore seed of the Yang⁻Wu key generation method from a small number of collected keys. For example, when t = 5 and l = 2 7 , it was previously claimed that more than 2 53 secure keys could be generated, but the proposed attack algorithm can reconstruct the keystone seed based on only 84 collected keys. Hence, the Yang⁻Wu key generation method is not information-theoretically secure when the attacker can gather multiple keys and a critical amount of information about the keystone seed is leaked.
机译:新的攻击算法由杨和吴推出了安全密钥生成和管理方法。有人曾声称,使用一个密钥种子杨和吴的密钥生成方法是理论上信息安全,并可能在云计算系统解决了长期密钥存储问题,多亏了安全密钥的数量巨大的梯形种子可以产生。他们的密钥生成方法,但是,被认为是破损如果攻击者能够恢复密钥库种子。在本文提出的攻击算法重建来自少数收集密钥的密钥Yang⁻Wu生成方法的密钥库种子。例如,当t = 5和l = 2 7,它以前声称可以产生超过2个53安全密钥,但所提出的攻击算法可以基于仅84收集键重构梯形种子。因此,Yang⁻Wu密钥生成方法没有理论上信息安全当攻击者可以收集多个键以及约梯形种子被泄漏的信息的临界量。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号