How to manipulate curve standards: a white paper for the black hat

نویسندگان

  • Daniel J. Bernstein
  • Tung Chou
  • Chitchanok Chuengsatiansup
  • Andreas Hülsing
  • Tanja Lange
  • Ruben Niederhagen
  • Christine van Vredendaal
چکیده

This paper analyzes the cost of breaking ECC under the following assumptions: (1) ECC is using a standardized elliptic curve that was actually chosen by an attacker; (2) the attacker is aware of a vulnerability in some curves that are not publicly known to be vulnerable. This cost includes the cost of exploiting the vulnerability, but also the initial cost of computing a curve suitable for sabotaging the standard. This initial cost depends upon the acceptability criteria used by the public to decide whether to allow a curve as a standard, and (in most cases) also upon the chance of a curve being vulnerable. This paper shows the importance of accurately modeling the actual acceptability criteria: i.e., figuring out what the public can be fooled into accepting. For example, this paper shows that plausible models of the “Brainpool acceptability criteria” allow the attacker to target a one-in-a-million vulnerability.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

How to Manipulate Curve Standards: A White Paper for the Black Hat http: //bada55.cr.yp.to

This paper analyzes the cost of breaking ECC under the following assumptions: (1) ECC is using a standardized elliptic curve that was actually chosen by an attacker; (2) the attacker is aware of a vulnerability in some curves that are not publicly known to be vulnerable. This cost includes the cost of exploiting the vulnerability, but also the initial cost of computing a curve suitable for sabo...

متن کامل

The Dependency of Colorimetric Characteristics of Black Fabrics to the Whiteness Attribute of Substrate

In this paper the effect of whiteness attribute of white substrates on blackness property of black coated fabrics is investigated. To this aim, four cotton fabrics with different whiteness and tint attributes are used as white substrates. To prepare a set of black samples, various concentrations of four color pigments, i.e., red, green, blue and yellow, were mixed with the black one and applied...

متن کامل

How many Times of Intramuscular Injection and Intravenous Catheter Insertion is Essential for Learning? Developing Standards according to the Learning Curves

Introduction: A main purpose of clinical training in nursing education is mastery of clinical skills, which are learnt through repetition. So there is a relation between frequency of skill performance and clinical competency. In this study we used learning curve to set standards for required performance times of two main nursing skills: intramuscular injection and intravenous catheter insertion...

متن کامل

Black Hat Visualization

People lie, mislead, and bullshit in a myriad of ways. Visualizations, as a form of communication, are no exception to these tendencies. Yet, the language we use to describe how people can use visualizations to mislead can be relatively sparse. For instance, one can be “lying with vis” or using “deceptive visualizations.” In this paper, we use the language of computer security to expand the spa...

متن کامل

The Impact of Emotion Displays in Embodied Agents on Emergence of Cooperation with People

Acknowledging the social functions of emotion in people, there has been growing interest in the interpersonal effect of emotion on cooperation in social dilemmas. This paper explores whether and how facial displays of emotion in embodied agents impact cooperation with human users. The paper describes an experiment where participants play the iterated prisoner’s dilemma against two different age...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2014  شماره 

صفحات  -

تاریخ انتشار 2014