2. Attacks on Weak Curves E(Fp) 在没有较大的素子群时,受 Pohlig-Hellman attack 影响 #E(Fp) = p 时,受Smart's attack 影响 2.1 Pohlig-Hellman Attack Pohlig-Hellman attack 将 E(F_p) 上的ECDLP 问题简化为 素子群 \langle P_i\rangle 上的ECDLP问题。
ECDSA algorithm is usually used in ICT system to ensure the authenticity of communication. But the weaknesses in various implementations of ECDSA may make its security deviate from theoretical guarantee. This paper proposes a new lattice-based weak curve fault attack on ECDSA. Since the ECDLP is ...
doi:10.1007/978-93-86279-15-6_5C.S. RajanElliptic Curves Modular Forms & Cryptography
The SSH protocol is protected from LogJam attacks, when an attacker can switch a connection to a weaker cryptography. However, many SSH implementations, including OpenSSH, use prime numbers, for instance 1024-bit Oakley Group 2. However, there are several ways to resolve this issue. The f...