Essence and conditions of implementation of the attack based on related keys relatively electronic signatures IBS-1 and IBS-2 DSTU ISO/IEC 14888-3

Abstract

The paper deals with the state of protection electronic signatures based on the pairing of points of an elliptic curve against attacks based on the signing data with related keys. It is defined conditions and possibilities of the organization and implementation of these attacks. It is provided the recommendations on protection against these vulnerabilities, including in the post-quantum period.

Authors and Affiliations

Marina Yesina, Yurii Gorbenko, Vladislav Kulibaba

Keywords

Related Articles

ДЕФІНІЦІЙНІ ПРОБЛЕМИ ТЕРМІНОЛОГІЇ У СФЕРІ КІБЕРБЕЗПЕКИ І КІБЕРОБОРОНИ ТА ШЛЯХИ ЇХ ВИРІШЕННЯ

На підставі аналізу термінології сфери кібербезпеки та кібероборони, національних інтересів України в кіберпросторі та з урахуванням досвіду провідних країн світу, у статті розглянуті концептуальні підходи щодо врегулюва...

THE CONCEPT OF DIAGNOSTIC DATA ERRORS OF COMPUTING SYSTEMS WITCH FUNCTIONING IN THE SYSTEM OF RESIDUE CLASSES

A method for diagnosing data of computer systems functioning in the system of residue classes (SRC) has been developed. This method is based on the use of orthogonal bases, which are formed from a complete base system. T...

KEY SCHEDULE OF BLOCK SYMMETRIC CIPHERS

We investigate combinatorial properties of the block symmetric ciphers key schedule in the assumption that the cyclic (round) keys are generated randomly, with equal probability and independently of each other. The model...

SYNTHESIS OF DERIVED SIGNAL SYSTEMS FOR APPLICATIONS IN MODERN INFORMATION AND COMMUNICATION SYSTEMS

The specified requirements for complex signal systems selection – data carriers for utilization in information and communication systems (ICT), with higher demand for noise immunity, noise resistance, secrecy and informa...

DATA SINGLE-ERROR CORRECTION METHOD OF A RESIDUE CLASS CODE

The method of correction of single errors in the residue class (RC) is considered in this article. The results of analysis of arithmetic code correcting possibilities showed high efficiency of the use of position-indepen...

Download PDF file
  • EP ID EP434331
  • DOI -
  • Views 116
  • Downloads 0

How To Cite

Marina Yesina, Yurii Gorbenko, Vladislav Kulibaba (2018). Essence and conditions of implementation of the attack based on related keys relatively electronic signatures IBS-1 and IBS-2 DSTU ISO/IEC 14888-3. КОМП’ЮТЕРНІ НАУКИ ТА КІБЕРБЕЗПЕКА, 3(11), 18-27. https://europub.co.uk/articles/-A-434331