To search, Click below search items.

 

All Published Papers Search Service

Title

Elliptic Curve Kleptography

Author

Elsayed Mohamed, Hassan Elkamchouchi

Citation

Vol. 10  No. 6  pp. 183-185

Abstract

This paper presents an approach to mount secretly embedded trapdoor with universal protection (SETUP) attacks on the elliptic curve discrete logarithm problem. The new approach allows the attacker to obtain the secret key of a cryptographic device covertly. The attack demonstrates the manufacturer¡¯s ability to embed a hidden trapdoor in cryptographic black-box devices used for key exchange. A contaminated device behaves exactly like an honest one while actually leaking the user¡¯s secret key only to the attacker. The attacker can then use that secret key to decrypt all the subsequent communications.

Keywords

Elliptic Curve Cryptography, Kleptography, Subliminal Channel, SETUP

URL

http://paper.ijcsns.org/07_book/201006/20100623.pdf