The béguin-quisquater server-aided RSA protocol from crypto ’95 is not secure

33Citations
Citations of this article
39Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

A well-known cryptographic scenario is the following: a smart card wishes to compute an RSA signature with the help of an untrusted powerful server. Several protocols have been proposed to solve this problem, and many have been broken. There exist two kinds of attacks against such protocols: passive attacks (where the server follows the instructions) and active attacks (where the server may return false values). An open question in this _eld is the existence of e_cient protocols (without expensive precomputations) provably secure against both passive and active attacks. At Crypto '95, B_eguin and Quisquater tried to answer this question by proposing an e_cient protocol which was resistant against all known passive and active attacks. In this paper, we present a very e_ective lattice-based passive attack against this protocol. An implementation is able to recover the secret factorization of an RSA-512 or RSA-768 key in less than 5 minutes once the card has produced about 50 signatures. The core of our attack is the basic notion of an orthogonal lattice which we introduced at Crypto '97 as a cryptographic tool.

Cite

CITATION STYLE

APA

Nguyen, P., & Stern, J. (1998). The béguin-quisquater server-aided RSA protocol from crypto ’95 is not secure. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1514, pp. 372–379). Springer Verlag. https://doi.org/10.1007/3-540-49649-1_29

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free