This paper treats effectiveness of the generalized key substitutionattacks, and practical measures against them.The generalized key substitution attacks are proposed as a generalization ofthe key substitution attacks to examine the security of the signature schemesadopted in ISO/IEC (1st CD) 14888-3,which standardizes appendix-type signature schemes based on the discrete logarithm problem.This paper examines the message recovery signature schemes based on the discrete logarithm problem, adopted in ISO/IEC 9796-3:2006, and shows that all but one scheme are vulnerable to the generalized key substitution attacks.
@article{453, title = {Generalized key substitution attacks on message recovery signatures}, journal = {Tatra Mountains Mathematical Publications}, volume = {70}, year = {2018}, language = {EN}, url = {http://dml.mathdoc.fr/item/453} }
Fujioka, Atsushi. Generalized key substitution attacks on message recovery signatures. Tatra Mountains Mathematical Publications, Tome 70 (2018) . http://gdmltest.u-ga.fr/item/453/