Detailed Cost Estimation of CNTW Forgery Attack against EMV Signature Scheme
نویسندگان
چکیده
منابع مشابه
Detailed Cost Estimation of CNTW Forgery Attack against EMV Signature Scheme
EMV signature is one of specifications for authenticating credit and debit card data, which is based on ISO/IEC 9796-2 signature scheme. At CRYPTO 2009, Coron, Naccache, Tibouchi, and Weinmann proposed a new forgery attack against the signature ISO/IEC 9796-2 (CNTW attack) [2]. They also briefly discussed the possibility when the attack is applied to the EMV signatures. They showed that the for...
متن کاملUniversal forgery attack on a strong designated verifier signature scheme
Based on the bilinear Diffie-Hellman assumption, in 2009, Kang et al. proposed an identity-based strong Designated Verifier Signature (DVS) scheme which only allows the intended verifier to verify the signature. Besides, the designated verifier is not capable of transferring the conviction to any third party. Their scheme was proved secure in the random oracle model. In this paper, however, we ...
متن کاملDifferential Forgery Attack Against LAC
LAC is one of the candidates to the CAESAR competition. In this paper we present a differential forgery attack on LAC. We study the collection of characteristics following a fixed truncated characteristic, in order to obtain a lower bound on the probability of a differential. We show that some differentials have a probability higher than 2−64, which allows a forgery attack on the full LAC. This...
متن کاملA Digital Signature Scheme Secure Against Adaptive Attack
Intentional or unintentional leakage of confidential data is undoubtedly one of the most severe security threats that organizations face in the digital era. Most of the advertisements are posted from any consumers that are displayed in social network profiles. If user clicks on the advertisements, it will redirect to another page. That page may be original or fake. If it is a fake advertisement...
متن کاملA Forgery Attack against PANDA-s
PANDA is an authenticated encryption scheme designed by Ye et al., and submitted to the CAESAR competition. The designers claim that PANDA-s, which is one of the designs of the PANDA-family, provides 128-bit security in the nonce misuse model. In this note, we describe our forgery attack against PANDA-s. Our attack works in the nonce misuse model. It exploits the fact that the message processin...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEICE Transactions on Information and Systems
سال: 2011
ISSN: 0916-8532,1745-1361
DOI: 10.1587/transinf.e94.d.2111