The Insecurity of Esign in Practical Implementations

نویسندگان

  • Pierre-Alain Fouque
  • Nick Howgrave-Graham
  • Gwenaëlle Martinet
  • Guillaume Poupard
چکیده

Provable security usually makes the assumption that a source of perfectly random and secret data is available. However, in practical applications, and especially when smart cards are used, random generators are often far from being perfect or may be monitored using probing or electromagnetic analysis. The consequence is the need of a careful evaluation of actual security when idealized random generators are implemented. In this paper, we show that Esign signature scheme, like many cryptosystems, is highly vulnerable to so called partially known nonces attacks. Using a 1152-bit modulus, the generation of an Esign signature requires to draw at random a 768-bit integer. We show that the exposure of only 8 bits out of those 768 bits, for 57 signatures, is enough to recover the whole secret signature key in a few minutes. It should be clear that we do not cryptanalyze a good implementation of Esign nor do we find a theoretical flaw. However, our results show that random data used to generate signatures must be very carefully produced and protected against any kind of exposure, even partial. As an independent result, we show that the factorization problem is equivalent to the existence of an oracle returning the most or least significant bits of S mod p, on input S randomly chosen in Zpq.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

ESIGN: An Efficient Digital Signature Implementation for Smard Cards

ESIGN is an efficient digital signature algorithm [OkS, Ok], whose computation speed is more than twenty times faster than that of the RSA scheme, while its key length and signature length are comparable to those of the M A scheme. This paper presents a software implementation of ESIGN on an 8bit micro-processor smart card. This realizes a computation time for signature generation of about 0.2 ...

متن کامل

How to Repair ESIGN

The ESIGN signature scheme was provided with an inadequate proof of security. We propose two techniques to repair the scheme, which we name ESIGN-D and ESIGN-R. Another improvement of ESIGN is encouraged, where the public key is hashed together with the message. This allows to have a security proof in the multi key setting. Additionally, the lower security of ESIGN compared to RSA-PSS leads to ...

متن کامل

The Socio-demographic Characteristics Associated with Food Insecurity among Vulnerable Households in a District of Tehran

Food insecurity, as a multi-faceted problem with far-reaching health and societal consequences, is prevalent among disadvantaged households. Household food insecurity has made the notion operationally useful in the design, implementation, and evaluation of programs and policies. This study was to investigate the socio-demographic associates contributing to severity of food insecurity among vuln...

متن کامل

Health Insecurity and Social Protection: Pathways, Gaps, and Their Implications on Health Outcomes and Poverty

Health insecurity has emerged as a major concern among health policy-makers particularly in low- and middle-income countries (LMICs). It includes the inability to secure adequate healthcare today and the risk of being unable to do so in the future as well as impoverishing healthcare expenditure. The increasing health insecurity among 150 million of the world’s poor has moved social protection i...

متن کامل

The Benefits and implementations of Diffusion tensor imaging and Neural Fiber Tractography in Brain Surgery

Background and Aim: The methods for detecting brain activation with fMRI, MRI provides a way to measure the anatomical connections which enable lightning-fast communication among neurons that specialize in different kinds of brain functions. Diffusion tensor imaging is able to measure the direction of bundles of the axonal fibers which are all aligned. Besides mapping white matter fiber tracts,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003