To search, Click
below search items.
|
|

All
Published Papers Search Service
|
Title
|
Elliptic Curve Kleptography
|
Author
|
Elsayed Mohamed, Hassan Elkamchouchi
|
Citation |
Vol. 10 No. 6 pp. 183-185
|
Abstract
|
This paper presents an approach to mount secretly embedded trapdoor with universal protection (SETUP) attacks on the elliptic curve discrete logarithm problem. The new approach allows the attacker to obtain the secret key of a cryptographic device covertly. The attack demonstrates the manufacturer¡¯s ability to embed a hidden trapdoor in cryptographic black-box devices used for key exchange. A contaminated device behaves exactly like an honest one while actually leaking the user¡¯s secret key only to the attacker. The attacker can then use that secret key to decrypt all the subsequent communications.
|
Keywords
|
Elliptic Curve Cryptography, Kleptography, Subliminal Channel, SETUP
|
URL
|
http://paper.ijcsns.org/07_book/201006/20100623.pdf
|
|