[论文学习] Peter Novotney: Weak Curves In Elliptic Curve Cryptography 摘要 本文介绍了Pohlig-Hellman attack 和 Smart's attack,并讨论了推荐的 NIST 曲线是如何抵御这种攻击的。 1. Elliptic Curves 椭圆曲线的通用定义形式为 E(F)={x,y∈F2:y2+a1xy+a3y=x3+a
ECDSA algorithm is usually used in ICT system to ensure the authenticity of communication. But the weaknesses in various implementations of ECDSA may make its security deviate from theoretical guarantee. This paper proposes a new lattice-based weak curve fault attack on ECDSA. Since the ECDLP is ...
The SSH protocol is protected from LogJam attacks, when an attacker can switch a connection to a weaker cryptography. However, many SSH implementations, including OpenSSH, use prime numbers, for instance 1024-bit Oakley Group 2. However, there are several ways to resolve this issue. The ...