有限域上超椭圆曲线离散对数问题的错误攻击(英文)

来源 :中国通信 | 被引量 : 0次 | 上传用户:kupanda09
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
In this paper, we present two explicit invalid-curve attacks on the genus 2 hyperelliptic curve over a finite field. First, we propose two explicit attack models by injecting a one-bit fault in a given divisor. Then, we discuss the construction of an invalid curve based on the faulted divisor. Our attacks are based on the fact that the Hyperelliptic Curve Scalar Multiplication (HECSM) algorithm does not utilize the curve parameters and We consider three hyperelliptic curves as the attack targets. For curve with security level 186 (in bits), our attack method can get the weakest invalid curve with security level 42 (in bits); there are 93 invalid curves with security level less than 50. We also estimate the theoretical probability of getting a weak hyperelliptic curve whose cardinality is a smooth integer. Finally, we show that the complexity of the fault attack is subexponential if the attacker can freely inject a fault in the input divisor. Cryptosystems based on the genus 2 hyperelliptic curves cannot work against our attack algorithm in practice. In this paper, we present two explicit invalid-curve attacks on the genus 2 hyperelliptic curve over a finite field. First, we propose two explicit attack models by injecting a one-bit fault in a given divisor. Then, we discuss the construction of an invalid curve based on the faulted divisor. Our attacks are based on the fact that the Hyperelliptic Curve Scalar Multiplication (HECSM) algorithm does not utilize the curve parameters and We consider three hyperelliptic curves as the attack targets. For curve with security level 186 ( in bits), our attack method can get the weakest invalid curve with security level 42 (in bits); there are 93 invalid curves with security level less than 50. We also estimate the theoretical probability of getting a weak hyperelliptic curve whose cardinality is a smooth integer. Finally, we show that the complexity of the fault attack is subexponential if the attacker can freely inject a fault in the input divisor. Cryptosystems based on the genus 2 hyperelli ptic curves can not work against our attack algorithm in practice.
其他文献
近年来随着科学技术进步,人类对自然资源的开采力度增大,使得石油煤炭金属矿产等自然资源越来越紧缺,所以相关部门更加重视到对节能技术的开发和政策引导.目前建筑工业中能源
患者,女,44岁,于2012年12月28日突发头痛、恶心、呕吐等症状,就诊于当地医院行头颅CT未见异常,予以镇痛对症治疗,29日开始症状进一步加重,出现失语、反应迟钝,认知障碍,伴肢
目的:观察心脏瓣膜置换术后患者基线信息和CYP2C9*3、VKORC1-1639A/G基因多态性与术后华法林初始抗凝效果的关系.方法:收集患者的遗传信息和人口统计学信息,同时记录测得的IN
期刊
阿立哌唑作为第三代非典型抗精神病药物,不仅能够改善精神分裂症患者的阴性症状,还能够改善其阳性症状,其不良反应主要为锥体外系反应(颈硬、静坐不能、震颤)、兴奋(焦虑、失
期刊
@@
期刊
期刊
目的:观察贝那普利对慢性充血性心力衰竭(CCHF)患者疗效及生活质量的影响.方法:120例CCHF患者随机分为对照组40例和观察组80例,对照组予常规治疗,观察组在对照组基础上加用贝
目的:探讨纳络酮在各种急性中毒患者抢救中的临床效果。方法:回顾性分析我院急诊科2009年10月~2012年10月收治的320例急性中毒患者的病例资料,其中急性乙醇中毒125例、急性一
目的:评价我院人血白蛋白(HSA)的临床应用情况,为临床合理应用HSA提供参考.方法:利用医院信息管理系统及电子病历系统,回顾性调查我院2012年7月~2013年6月应用HSA的住院患者处