書誌事項
- タイトル別名
-
- セキュリティ基盤技術
この論文をさがす
抄録
In 2006 Bleichenbacher presented a new forgery attack against the signature scheme RSASSA-PKCS1-v1_5. The attack allows an adversary to forge a signature on almost arbitrary messages if an implementation is not proper. Since the example was only limited to the case when the public exponent is 3 and the bit-length of the public composite is 3 072 the potential threat is not known. This paper analyzes Bleichenbacher's forgery attack and shows applicable composite sizes for given exponents. Moreover we extend Bleichenbacher's attack and show that when 1 024-bit composite and the public exponent 3 are used the extended attack succeeds the forgery with the probability 2-16.6.
In 2006, Bleichenbacher presented a new forgery attack against the signature scheme RSASSA-PKCS1-v1_5. The attack allows an adversary to forge a signature on almost arbitrary messages, if an implementation is not proper. Since the example was only limited to the case when the public exponent is 3 and the bit-length of the public composite is 3,072, the potential threat is not known. This paper analyzes Bleichenbacher's forgery attack and shows applicable composite sizes for given exponents. Moreover, we extend Bleichenbacher's attack and show that when 1,024-bit composite and the public exponent 3 are used, the extended attack succeeds the forgery with the probability 2-16.6.
収録刊行物
-
- 情報処理学会論文誌
-
情報処理学会論文誌 49 (9), 2943-2950, 2008-09-15
東京 : 情報処理学会
- Tweet
詳細情報 詳細情報について
-
- CRID
- 1050564287834655360
-
- NII論文ID
- 110007970185
-
- NII書誌ID
- AN00116647
-
- ISSN
- 18827764
- 18827837
- 03875806
-
- NDL書誌ID
- 024266419
-
- 本文言語コード
- en
-
- 資料種別
- journal article
-
- データソース種別
-
- IRDB
- NDL
- CiNii Articles