Weak instances of composite order protocols
نویسندگان
چکیده
In pairing-based cryptography, the security of protocols using composite order groups relies on the di culty of factoring a composite number N . Boneh et al proposed the Cocks-Pinch method to construct ordinary pairing-friendly elliptic curves having a subgroup of composite order N . Displaying such a curve as a public parameter implies revealing a square root of the complex multiplication discriminant −D modulo N . We exploit this information leak and the structure of the endomorphism ring of the curve to factor the RSA modulus, by computing a square root λ of −D modulo one of its factors. Our attack is based on a generic discrete logarithm algorithm. We recommend that λ should be chosen as a high entropy input parameter when running the Cocks-Pinch algorithm, in order to ensure protection from our attack.
منابع مشابه
Effect of Three Light Curing Protocols and Load Cycling on Microleakage of Class V Composite Restorations
Objective: Different methods have been suggested to overcome the polymerization shrinkage of composite restorations. Changing the light curing protocol to improve polymerization by using new light curing units is among these methods. The new devices are more efficient, portable and durable and produce less heat. This study aimed to assess the marginal microleakage of class V composite restora...
متن کاملA short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کاملControlling the Destruction Order of Singleton Objects
Abstract The Singleton pattern [1] is a solution to (some of) the drawbacks of using global variables. Among its advantages is that the instance is always created prior to being referenced (this effectively solves the problem of initialization order when several interdependent instances are involved). This article examines some of the existing Singleton realizations in C++ and their drawbacks, ...
متن کاملOptimally Sound Sigma Protocols Under DCRA
Given a well-chosen additively homomorphic cryptosystem and a Σ protocol with a linear answer, Damg̊ard, Fazio, and Nicolosi proposed a non-interactive designated-verifier zero knowledge argument in the registered public key model that is sound under non-standard complexity-leveraging assumptions. In 2015, Chaidos and Groth showed how to achieve the weaker yet reasonable culpable soundness notio...
متن کاملFunctional and aesthetic guidelines for stress-reduced direct posterior composite restorations.
Amalgam has been used in the restoration of structurally compromised posterior teeth for many years. When placing large amalgam restorations, replacement of weak cusps with restorative material is recommended to prevent tooth fracture. This recommendation can be modified with new guidelines using modern adhesive techniques. Semidirect and indirect inlay/onlay composite restorations have progres...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2014 شماره
صفحات -
تاریخ انتشار 2014