Piotr Borzecki, J. Kabarowski, Przemyslaw Kubiak, Mirosław Kutyłowski, Filip Zagórski
{"title":"Benaloh-Tuinstra协议的窃国学弱点","authors":"Piotr Borzecki, J. Kabarowski, Przemyslaw Kubiak, Mirosław Kutyłowski, Filip Zagórski","doi":"10.1109/ICSNC.2006.50","DOIUrl":null,"url":null,"abstract":"During designing of cryptographic protocols, their participants are usually identified with software or hardware they use. However, these supporting tools are not verified at the protocol level. Such carelessness opens the door to kleptographic (SETUP) attacks. In this paper we design such an attack on the classical Benaloh-Tuinstra election protocol. One of the technical tools developed in the paper is a new variant of a Diffie-Hellman SETUP attack, in which Kronecker Decomposition of the group is not known to the attacker. This is especially the case of Goldwasser-Micali cryptosystem.","PeriodicalId":217322,"journal":{"name":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Kleptographic Weaknesses in Benaloh-Tuinstra Protocol\",\"authors\":\"Piotr Borzecki, J. Kabarowski, Przemyslaw Kubiak, Mirosław Kutyłowski, Filip Zagórski\",\"doi\":\"10.1109/ICSNC.2006.50\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"During designing of cryptographic protocols, their participants are usually identified with software or hardware they use. However, these supporting tools are not verified at the protocol level. Such carelessness opens the door to kleptographic (SETUP) attacks. In this paper we design such an attack on the classical Benaloh-Tuinstra election protocol. One of the technical tools developed in the paper is a new variant of a Diffie-Hellman SETUP attack, in which Kronecker Decomposition of the group is not known to the attacker. This is especially the case of Goldwasser-Micali cryptosystem.\",\"PeriodicalId\":217322,\"journal\":{\"name\":\"2006 International Conference on Systems and Networks Communications (ICSNC'06)\",\"volume\":\"59 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2006-10-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2006 International Conference on Systems and Networks Communications (ICSNC'06)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSNC.2006.50\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 International Conference on Systems and Networks Communications (ICSNC'06)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSNC.2006.50","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Kleptographic Weaknesses in Benaloh-Tuinstra Protocol
During designing of cryptographic protocols, their participants are usually identified with software or hardware they use. However, these supporting tools are not verified at the protocol level. Such carelessness opens the door to kleptographic (SETUP) attacks. In this paper we design such an attack on the classical Benaloh-Tuinstra election protocol. One of the technical tools developed in the paper is a new variant of a Diffie-Hellman SETUP attack, in which Kronecker Decomposition of the group is not known to the attacker. This is especially the case of Goldwasser-Micali cryptosystem.