some security comparisons of gost r 34.10-2012 and ecdsa … · 2017-12-25 · ecdsa and gost r...

30
Introduction Description of GOST R 34.10-2012 and ECDSA Comparison of GOST R34.10-2012 and ECDSA scheme via two flaws of ECDSA Constructing two variant of GOST R34.10-2012 in the way of ECDSA-II and ECDSA-III construction Conclusion Some Security Comparisons of GOST R 34.10-2012 and ECDSA Signature Schemes Trieu Quang Phong Nguyen Quoc Toan Institute of Cryptography Science and Technology Gover. Info. Security Committee, Viet Nam June 6, 2017 Trieu Quang Phong - Nguyen Quoc Toan The presentation

Upload: others

Post on 12-Jun-2020

7 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Some Security Comparisons of GOST R 34.10-2012 and ECDSA … · 2017-12-25 · ECDSA and GOST R 34.10-2012 are considered as the secure and popular signature schemes recently. These

IntroductionDescription of GOST R 34.10-2012 and ECDSA

Comparison of GOST R34.10-2012 and ECDSA scheme via two flaws of ECDSAConstructing two variant of GOST R34.10-2012 in the way of ECDSA-II and ECDSA-III construction

Conclusion

Some Security Comparisons of GOST R34.10-2012 and ECDSA Signature Schemes

Trieu Quang PhongNguyen Quoc Toan

Institute of Cryptography Science and TechnologyGover. Info. Security Committee, Viet Nam

June 6, 2017

Trieu Quang Phong - Nguyen Quoc Toan The presentation

Page 2: Some Security Comparisons of GOST R 34.10-2012 and ECDSA … · 2017-12-25 · ECDSA and GOST R 34.10-2012 are considered as the secure and popular signature schemes recently. These

IntroductionDescription of GOST R 34.10-2012 and ECDSA

Comparison of GOST R34.10-2012 and ECDSA scheme via two flaws of ECDSAConstructing two variant of GOST R34.10-2012 in the way of ECDSA-II and ECDSA-III construction

Conclusion

Content

1 Introduction

2 Description of GOST R 34.10-2012 and ECDSA

3 Comparison of GOST R34.10-2012 and ECDSA scheme via twoflaws of ECDSA

4 Constructing two variant of GOST R34.10-2012 in the way ofECDSA-II and ECDSA-III construction

5 Conclusion

Trieu Quang Phong - Nguyen Quoc Toan The presentation

Page 3: Some Security Comparisons of GOST R 34.10-2012 and ECDSA … · 2017-12-25 · ECDSA and GOST R 34.10-2012 are considered as the secure and popular signature schemes recently. These

IntroductionDescription of GOST R 34.10-2012 and ECDSA

Comparison of GOST R34.10-2012 and ECDSA scheme via two flaws of ECDSAConstructing two variant of GOST R34.10-2012 in the way of ECDSA-II and ECDSA-III construction

Conclusion

Part I:

Introduction

Trieu Quang Phong - Nguyen Quoc Toan The presentation

Page 4: Some Security Comparisons of GOST R 34.10-2012 and ECDSA … · 2017-12-25 · ECDSA and GOST R 34.10-2012 are considered as the secure and popular signature schemes recently. These

IntroductionDescription of GOST R 34.10-2012 and ECDSA

Comparison of GOST R34.10-2012 and ECDSA scheme via two flaws of ECDSAConstructing two variant of GOST R34.10-2012 in the way of ECDSA-II and ECDSA-III construction

Conclusion

Background

ECDSA and GOST R 34.10-2012 are considered as the secureand popular signature schemes recently. These schemes arethe elliptic curve versions of DSA and GOST R 34.10-94,respectively. However, there are not much research comparingthe efficiency and security of these schemes.

The common point between GOST R 34.10-2012 and ECDSAis that in these two schemes the value of the hash functiononly depends on the signed message. This implies that thereis no security proof for these two schemes in the randomoracle model.

Trieu Quang Phong - Nguyen Quoc Toan The presentation

Page 5: Some Security Comparisons of GOST R 34.10-2012 and ECDSA … · 2017-12-25 · ECDSA and GOST R 34.10-2012 are considered as the secure and popular signature schemes recently. These

IntroductionDescription of GOST R 34.10-2012 and ECDSA

Comparison of GOST R34.10-2012 and ECDSA scheme via two flaws of ECDSAConstructing two variant of GOST R34.10-2012 in the way of ECDSA-II and ECDSA-III construction

Conclusion

Related Works

In [3], E. Brickell, D. Pointcheval, S. Vaudenay, M. Yungprovided two variants of DSA, and then proved the securityfor these variants in the random oracle model using theforking lemma.

In [1], J. Malone-Lee and N.P. Smart described two variantsECDSA-II and ECDSA-III of ECDSA which are secure againstthe no-message attack in the random oracle model using theImproved Forking Lemma

In [2], J. Stern, D. Pointcheval, J. Malone-Lee and N.P.Smart provided two flaws of ECDSA, namely duplicatesignature and malleability.

Trieu Quang Phong - Nguyen Quoc Toan The presentation

Page 6: Some Security Comparisons of GOST R 34.10-2012 and ECDSA … · 2017-12-25 · ECDSA and GOST R 34.10-2012 are considered as the secure and popular signature schemes recently. These

IntroductionDescription of GOST R 34.10-2012 and ECDSA

Comparison of GOST R34.10-2012 and ECDSA scheme via two flaws of ECDSAConstructing two variant of GOST R34.10-2012 in the way of ECDSA-II and ECDSA-III construction

Conclusion

Our Works

We will provide two comparisons between GOST R 34.10-2012and ECDSA by:

Applying the method of J. Malone-Lee and N.P. Smart in [1]for GOST R 34.10-2012, and then obtain two variantsGOST-I and GOST-II.

Showing that GOST R 34.10-2012 is able to resist the twoflaws of ECDSA in [2].

Trieu Quang Phong - Nguyen Quoc Toan The presentation

Page 7: Some Security Comparisons of GOST R 34.10-2012 and ECDSA … · 2017-12-25 · ECDSA and GOST R 34.10-2012 are considered as the secure and popular signature schemes recently. These

IntroductionDescription of GOST R 34.10-2012 and ECDSA

Comparison of GOST R34.10-2012 and ECDSA scheme via two flaws of ECDSAConstructing two variant of GOST R34.10-2012 in the way of ECDSA-II and ECDSA-III construction

Conclusion

Part II:

Description of GOST R

34.10-2012 and ECDSA

Trieu Quang Phong - Nguyen Quoc Toan The presentation

Page 8: Some Security Comparisons of GOST R 34.10-2012 and ECDSA … · 2017-12-25 · ECDSA and GOST R 34.10-2012 are considered as the secure and popular signature schemes recently. These

IntroductionDescription of GOST R 34.10-2012 and ECDSA

Comparison of GOST R34.10-2012 and ECDSA scheme via two flaws of ECDSAConstructing two variant of GOST R34.10-2012 in the way of ECDSA-II and ECDSA-III construction

Conclusion

Notations

p Prime number, p > 3.Fp Finite prime field represented by a set of integers

{0, 1, ..., p − 1}.E (Fp) Elliptic curve defined on Fp.|E (Fp)| The number of Fp-rational points on E (Fp).O Zero point of the elliptic curve E (Fp).n A prime divisor of |E (Fp)|.c Cofactor, c =

|E(Fp)|n .

P Elliptic curve point of order n.H,HGOST Hash function.

Trieu Quang Phong - Nguyen Quoc Toan The presentation

Page 9: Some Security Comparisons of GOST R 34.10-2012 and ECDSA … · 2017-12-25 · ECDSA and GOST R 34.10-2012 are considered as the secure and popular signature schemes recently. These

IntroductionDescription of GOST R 34.10-2012 and ECDSA

Comparison of GOST R34.10-2012 and ECDSA scheme via two flaws of ECDSAConstructing two variant of GOST R34.10-2012 in the way of ECDSA-II and ECDSA-III construction

Conclusion

Notations

A Signer.A Attacker.∈R Generate a random integer.d Integer number, the signature (private) key of signer A.Q Elliptic curve point, the verification (public) key

of signer A.k Ephemeral secret value.M Signer’s message.(r , s) digital signature for the message M.xR , yR Coordinates of elliptic point R.log(x) Binary logarithm of x .

Trieu Quang Phong - Nguyen Quoc Toan The presentation

Page 10: Some Security Comparisons of GOST R 34.10-2012 and ECDSA … · 2017-12-25 · ECDSA and GOST R 34.10-2012 are considered as the secure and popular signature schemes recently. These

IntroductionDescription of GOST R 34.10-2012 and ECDSA

Comparison of GOST R34.10-2012 and ECDSA scheme via two flaws of ECDSAConstructing two variant of GOST R34.10-2012 in the way of ECDSA-II and ECDSA-III construction

Conclusion

Description of GOST R 34.10-2012

Signing Verification1. e = HGOST (M) 1. e = HGOST (M)2. k ∈R [1, n − 1] 2. u1 = se−1 mod n3. R = kP 3. u2 = −re−1 mod n4. r = xR mod n 4. R = u1P + u2Q5. s = ke + dr mod n 5. v = xR mod n6. Output (r , s) 6. Accept iff r = v

Trieu Quang Phong - Nguyen Quoc Toan The presentation

Page 11: Some Security Comparisons of GOST R 34.10-2012 and ECDSA … · 2017-12-25 · ECDSA and GOST R 34.10-2012 are considered as the secure and popular signature schemes recently. These

IntroductionDescription of GOST R 34.10-2012 and ECDSA

Comparison of GOST R34.10-2012 and ECDSA scheme via two flaws of ECDSAConstructing two variant of GOST R34.10-2012 in the way of ECDSA-II and ECDSA-III construction

Conclusion

Description of ECDSA

Signing Verification1. k ∈R [1, n − 1] 1. h = H(M)2. R = kP 2. u1 = hs−1 mod n3. r = xR mod n 3. u2 = rs−1 mod n4. h = H(M) 4. R = u1P + u2Q5. s = k−1(h + dr) mod n 5. v = xR mod n6. Output (r , s) 6. Accept iff r = v

Trieu Quang Phong - Nguyen Quoc Toan The presentation

Page 12: Some Security Comparisons of GOST R 34.10-2012 and ECDSA … · 2017-12-25 · ECDSA and GOST R 34.10-2012 are considered as the secure and popular signature schemes recently. These

IntroductionDescription of GOST R 34.10-2012 and ECDSA

Comparison of GOST R34.10-2012 and ECDSA scheme via two flaws of ECDSAConstructing two variant of GOST R34.10-2012 in the way of ECDSA-II and ECDSA-III construction

Conclusion

Part III:

Comparison of GOST

R34.10-2012 and ECDSA

scheme via two flaws of ECDSA

Trieu Quang Phong - Nguyen Quoc Toan The presentation

Page 13: Some Security Comparisons of GOST R 34.10-2012 and ECDSA … · 2017-12-25 · ECDSA and GOST R 34.10-2012 are considered as the secure and popular signature schemes recently. These

IntroductionDescription of GOST R 34.10-2012 and ECDSA

Comparison of GOST R34.10-2012 and ECDSA scheme via two flaws of ECDSAConstructing two variant of GOST R34.10-2012 in the way of ECDSA-II and ECDSA-III construction

Conclusion

Two flaws of ECDSA

The first flaw (Duplicate signature)

For any two distinct messages m1 and m2, we always can generatean ECDSA signature which is valid for both messages, if we havea possible control on the key generation.

For any m1 6= m2, compute h1 = H(m1) and h2 = H(m2).Generate k ∈R {1, .., n − 1}, compute r = xkP , and set

d = −((h1 + h2))/2r mod n and Q = dP. (1)

Finally, compute s = k−1(h1 + dr) mod n. Hence, (r , s) is a validECDSA signature on m1 with the public/ private key pair (Q, d).And, (r , s) is also a valid ECDSA signature on m2, since

R =h2sP +

r

sQ =

(h2 + rd)

k−1(h1 + dr)P = −kP. (2)

Trieu Quang Phong - Nguyen Quoc Toan The presentation

Page 14: Some Security Comparisons of GOST R 34.10-2012 and ECDSA … · 2017-12-25 · ECDSA and GOST R 34.10-2012 are considered as the secure and popular signature schemes recently. These

IntroductionDescription of GOST R 34.10-2012 and ECDSA

Comparison of GOST R34.10-2012 and ECDSA scheme via two flaws of ECDSAConstructing two variant of GOST R34.10-2012 in the way of ECDSA-II and ECDSA-III construction

Conclusion

Two flaws of ECDSA

The second flaw

From an ECDSA signature (r , s) of a message m, one can deriveanother valid ECDSA signature of m, namely (r ,−s).

If (r , s) is a valid ECDSA signature of m, then (r ,−s) is also avalid signature, since

r = xH(m)s

P+ rsQ

= x−(H(m)s

P+ rsQ)

= xH(m)−s

P+ r−s

Q. (3)

Trieu Quang Phong - Nguyen Quoc Toan The presentation

Page 15: Some Security Comparisons of GOST R 34.10-2012 and ECDSA … · 2017-12-25 · ECDSA and GOST R 34.10-2012 are considered as the secure and popular signature schemes recently. These

IntroductionDescription of GOST R 34.10-2012 and ECDSA

Comparison of GOST R34.10-2012 and ECDSA scheme via two flaws of ECDSAConstructing two variant of GOST R34.10-2012 in the way of ECDSA-II and ECDSA-III construction

Conclusion

GOST R 34.10-2012 resist two flaws of ECDSA

- The main cause of these flaws of ECDSA is the property: xR =x−R ,∀R ∈ E (Fp).- Another cause:

For first flaw, the following equation system:{s = k−1(H(m1) + dr) mod n

s = −k−1(H(m2) + dr) mod n.(4)

always has solution d = −H(m1)+H(m2)2r mod n.

For second flaw, if (r , s) is an ECDSA signature on m, andR = s−1H(m)P + s−1rQ, it is easy to compute the ellipticpoint −R from (r ,−s) and m.

Trieu Quang Phong - Nguyen Quoc Toan The presentation

Page 16: Some Security Comparisons of GOST R 34.10-2012 and ECDSA … · 2017-12-25 · ECDSA and GOST R 34.10-2012 are considered as the secure and popular signature schemes recently. These

IntroductionDescription of GOST R 34.10-2012 and ECDSA

Comparison of GOST R34.10-2012 and ECDSA scheme via two flaws of ECDSAConstructing two variant of GOST R34.10-2012 in the way of ECDSA-II and ECDSA-III construction

Conclusion

GOST R 34.10-2012 resist two flaws of ECDSA

If the values of the hash function are uniformly distributed, GOSTR 34.10-2012 is able to resist two flaws of ECDSA.

For first flaw, the following equation system:{s = kHGOST (m1) + dr mod n

s = −kHGOST (m2) + dr mod n.(5)

always has no solution with unknown d .

For second flaw, if (r , s) is a GOST R 34.10-2012 signatureon m, and R = s−1HGOST (m)P + s−1rQ, it is not easy tofind (r ′, s ′) such that −R is computed from (r ′, s ′) and m.

Trieu Quang Phong - Nguyen Quoc Toan The presentation

Page 17: Some Security Comparisons of GOST R 34.10-2012 and ECDSA … · 2017-12-25 · ECDSA and GOST R 34.10-2012 are considered as the secure and popular signature schemes recently. These

IntroductionDescription of GOST R 34.10-2012 and ECDSA

Comparison of GOST R34.10-2012 and ECDSA scheme via two flaws of ECDSAConstructing two variant of GOST R34.10-2012 in the way of ECDSA-II and ECDSA-III construction

Conclusion

Part IV:

Constructing two variant of

GOST R34.10-2012 in the way

of ECDSA-II and ECDSA-III

construction

Trieu Quang Phong - Nguyen Quoc Toan The presentation

Page 18: Some Security Comparisons of GOST R 34.10-2012 and ECDSA … · 2017-12-25 · ECDSA and GOST R 34.10-2012 are considered as the secure and popular signature schemes recently. These

IntroductionDescription of GOST R 34.10-2012 and ECDSA

Comparison of GOST R34.10-2012 and ECDSA scheme via two flaws of ECDSAConstructing two variant of GOST R34.10-2012 in the way of ECDSA-II and ECDSA-III construction

Conclusion

Elliptic Curve Trusted El Gamal Type Signature Scheme –ECTEGTSS

A signature scheme is an ECTEGTSS if it has the following prop-erties:

i. E (Fp) satisfies |E (Fp)| = c · n, where n prime and c small. Apoint P ∈ E (Fp) of order n and the underlying group 〈P〉.

ii. It uses two function G and H, with ranges G and Hrespectively. H is modelled as a random oracle and G is(multi)-collision-resistance or (multi)-collision-freeness.

iii. There are three functions:

F1(Zn,Zn,G,H)→ Zn; F2(Zn,G,H)→ Zn; F3 : (Zn,G,H)→ Zn

satistfying for all (k, d , r , h) ∈ (Zn,Zn,G,H),

F2(F1(k, d , r , h), r , h)+dF3(F1(k , d , r , h), r , h) = k mod n. (6)

Trieu Quang Phong - Nguyen Quoc Toan The presentation

Page 19: Some Security Comparisons of GOST R 34.10-2012 and ECDSA … · 2017-12-25 · ECDSA and GOST R 34.10-2012 are considered as the secure and popular signature schemes recently. These

IntroductionDescription of GOST R 34.10-2012 and ECDSA

Comparison of GOST R34.10-2012 and ECDSA scheme via two flaws of ECDSAConstructing two variant of GOST R34.10-2012 in the way of ECDSA-II and ECDSA-III construction

Conclusion

Elliptic Curve Trusted El Gamal Type Signature Scheme –ECTEGTSS

iv. private key d ,Q, public key Q = dP.

v. To sign a message m, the signer picks k ∈ Z ∗n , computesR = kP and r = G (R). Then gets h = H(m||r) andcomputes s = F1(k , x , r , h). The signature on m is (s, r , h).

vi. To verify the signature (s, r , h) on a message m the verifiercomputes eP = F2(s, r , h), eQ = F3(s, r , h) andW = ePP + eQQ. Then checks r = G (W ) and h = H(m||r).

vii. The functions F2 and F3 must satisfy the followingone-to-one condition: for given r , eP and eQ , there exists aunique pair (h, s) such that

eP = F2(s, r , h) and eQ = F3(s, r , h).

Trieu Quang Phong - Nguyen Quoc Toan The presentation

Page 20: Some Security Comparisons of GOST R 34.10-2012 and ECDSA … · 2017-12-25 · ECDSA and GOST R 34.10-2012 are considered as the secure and popular signature schemes recently. These

IntroductionDescription of GOST R 34.10-2012 and ECDSA

Comparison of GOST R34.10-2012 and ECDSA scheme via two flaws of ECDSAConstructing two variant of GOST R34.10-2012 in the way of ECDSA-II and ECDSA-III construction

Conclusion

The Improved Forking Lemma

The Improved Forking Lemma

Let us consider a probabilistic polynomial time Turing machine A,called the attacker, and a probabilistic polynomial time simulatorB. If A can find with probability ε > 4/p a verifiable tuple(M,R,S ,T ,U) with less than q queries to the hash function, for anew message M and for a U directly defined by H, then with aconstant probability 1/96, with (1 + 24q` log(2`))/ε replays of Aand B with different random oracles, A will output ` + 1 verifiabletuples (Mi ,Ri , Si ,Ti ,Ui )i=1,..,`+1 such that the Ui are pairwisedistinct, and all the Ri equal for TEGTSS-I schemes but all the(Mi ,Ti ) equal for TEGTSS-II schemes.

Note that, if a signature scheme is an ECTEGTSS is also, it isalso a TEGTSS-II.

Trieu Quang Phong - Nguyen Quoc Toan The presentation

Page 21: Some Security Comparisons of GOST R 34.10-2012 and ECDSA … · 2017-12-25 · ECDSA and GOST R 34.10-2012 are considered as the secure and popular signature schemes recently. These

IntroductionDescription of GOST R 34.10-2012 and ECDSA

Comparison of GOST R34.10-2012 and ECDSA scheme via two flaws of ECDSAConstructing two variant of GOST R34.10-2012 in the way of ECDSA-II and ECDSA-III construction

Conclusion

ECDSA-II

The first variant of ECDSA is called ECDSA-II, which replaceh = H(m) with h = H(m||r).

Signing Verification1. k ∈R [1, n − 1] 1. h = H(M||r)2. R = kP 2. u1 = hs−1 mod n3. r = xR mod n 3. u2 = rs−1 mod n4. h = H(M||r) 4. R = u1P + u2Q5. s = k−1(h + dr) mod n 5. v = xR mod n6. Output (r , s) 6. Accept iff r = v

ECDSA-II can not resist the two flaws of ECDSA.

In [1], ECDSA-II is proved secure against the no-messageattack in the random oracle model.

Trieu Quang Phong - Nguyen Quoc Toan The presentation

Page 22: Some Security Comparisons of GOST R 34.10-2012 and ECDSA … · 2017-12-25 · ECDSA and GOST R 34.10-2012 are considered as the secure and popular signature schemes recently. These

IntroductionDescription of GOST R 34.10-2012 and ECDSA

Comparison of GOST R34.10-2012 and ECDSA scheme via two flaws of ECDSAConstructing two variant of GOST R34.10-2012 in the way of ECDSA-II and ECDSA-III construction

Conclusion

ECDSA-III

ECDSA-III is identical to ECDSA-II, except that replace r = xR mod nwith r = xR + yR .

Signing Verification1. k ∈R [1, n − 1] 1. h = H(M||r)2. R = kP 2. u1 = hs−1 mod n3. r = xR + yR 3. u2 = rs−1 mod n4. h = H(M||r) 4. R = u1P + u2Q5. s = k−1(h + dr) mod n 5. v = xR + yR6. Output (r , s) 6. Accept iff r = v

ECDSA-III can resist the two flaws of ECDSA.

In [1], ECDSA-III is also proved secure against theno-message attack in the random oracle model.

Trieu Quang Phong - Nguyen Quoc Toan The presentation

Page 23: Some Security Comparisons of GOST R 34.10-2012 and ECDSA … · 2017-12-25 · ECDSA and GOST R 34.10-2012 are considered as the secure and popular signature schemes recently. These

IntroductionDescription of GOST R 34.10-2012 and ECDSA

Comparison of GOST R34.10-2012 and ECDSA scheme via two flaws of ECDSAConstructing two variant of GOST R34.10-2012 in the way of ECDSA-II and ECDSA-III construction

Conclusion

Two variants of GOST R34.10-2012

We consider two variants of GOST R 34.10-2012, called GOST-Iand GOST-II. We also assume that the parameters p and n forthese variants satisfy:

If 2254 < n < 2256 then p < 2256.

If 2508 < n < 2512 then p < 2512.

Trieu Quang Phong - Nguyen Quoc Toan The presentation

Page 24: Some Security Comparisons of GOST R 34.10-2012 and ECDSA … · 2017-12-25 · ECDSA and GOST R 34.10-2012 are considered as the secure and popular signature schemes recently. These

IntroductionDescription of GOST R 34.10-2012 and ECDSA

Comparison of GOST R34.10-2012 and ECDSA scheme via two flaws of ECDSAConstructing two variant of GOST R34.10-2012 in the way of ECDSA-II and ECDSA-III construction

Conclusion

GOST-I

In a similar way to gain ECDSA-II, we obtain GOST-I by replacingthe hash function evaluation e = HGOST (M) in GOST R 34.10-2012 by e = HGOST (M||r).

Signing Verification1. k ∈R [1, n − 1] 1. e = HGOST (M||r)2. R = kP 2. u1 = se−1 mod n3. r = xR mod n 3. u2 = −re−1 mod n4. e = HGOST (M||r) 4. R = u1P + u2Q5. s = kh + dr mod n 5. v = xR mod n6. Output (r , s) 6. Accept iff r = v

Trieu Quang Phong - Nguyen Quoc Toan The presentation

Page 25: Some Security Comparisons of GOST R 34.10-2012 and ECDSA … · 2017-12-25 · ECDSA and GOST R 34.10-2012 are considered as the secure and popular signature schemes recently. These

IntroductionDescription of GOST R 34.10-2012 and ECDSA

Comparison of GOST R34.10-2012 and ECDSA scheme via two flaws of ECDSAConstructing two variant of GOST R34.10-2012 in the way of ECDSA-II and ECDSA-III construction

Conclusion

The results on GOST-I

GOST-I is able to resist two flaws of ECDSA

The GOST-I signature scheme is an ECTEGTSS.

Suppose an adversary A against GOST-I exists which succeedswith probability ε > 4/p after q queries to the random oracle H,then one can solve the discrete logarithm problem in E (Fp) using

1 + 768q log 64

ε=

1 + 4608q

ε

replays of A with probability greater than 1/100.

Trieu Quang Phong - Nguyen Quoc Toan The presentation

Page 26: Some Security Comparisons of GOST R 34.10-2012 and ECDSA … · 2017-12-25 · ECDSA and GOST R 34.10-2012 are considered as the secure and popular signature schemes recently. These

IntroductionDescription of GOST R 34.10-2012 and ECDSA

Comparison of GOST R34.10-2012 and ECDSA scheme via two flaws of ECDSAConstructing two variant of GOST R34.10-2012 in the way of ECDSA-II and ECDSA-III construction

Conclusion

GOST-II

GOST-II is identical to GOST-I, except that replace r = xR mod nwith r = xR + yR .

Signing Verification1. k ∈R [1, n − 1] 1. e = HGOST (M||r)2. R = kP 2. u1 = se−1 mod n3. r = xR + yR mod n 3. u2 = −re−1 mod n4. e = HGOST (M||r) 4. R = u1P + u2Q5. s = kh + dr mod n 5. v = xR + yR mod n6. Output (r , s) 6. Accept iff r = v

Trieu Quang Phong - Nguyen Quoc Toan The presentation

Page 27: Some Security Comparisons of GOST R 34.10-2012 and ECDSA … · 2017-12-25 · ECDSA and GOST R 34.10-2012 are considered as the secure and popular signature schemes recently. These

IntroductionDescription of GOST R 34.10-2012 and ECDSA

Comparison of GOST R34.10-2012 and ECDSA scheme via two flaws of ECDSAConstructing two variant of GOST R34.10-2012 in the way of ECDSA-II and ECDSA-III construction

Conclusion

The results on GOST-II

GOST-II is able to resist two flaws of ECDSA

The GOST-II signature scheme is an ECTEGTSS.

Suppose an adversary A against GOST-II exists which succeedswith probability ε > 4/p after q queries to the random oracle H,then one can solve the discrete logarithm problem in E (Fp) using

1 + 72q log 6

ε

replays of A with probability greater than 1/100.

Trieu Quang Phong - Nguyen Quoc Toan The presentation

Page 28: Some Security Comparisons of GOST R 34.10-2012 and ECDSA … · 2017-12-25 · ECDSA and GOST R 34.10-2012 are considered as the secure and popular signature schemes recently. These

IntroductionDescription of GOST R 34.10-2012 and ECDSA

Comparison of GOST R34.10-2012 and ECDSA scheme via two flaws of ECDSAConstructing two variant of GOST R34.10-2012 in the way of ECDSA-II and ECDSA-III construction

Conclusion

Conclusion

Trieu Quang Phong - Nguyen Quoc Toan The presentation

Page 29: Some Security Comparisons of GOST R 34.10-2012 and ECDSA … · 2017-12-25 · ECDSA and GOST R 34.10-2012 are considered as the secure and popular signature schemes recently. These

IntroductionDescription of GOST R 34.10-2012 and ECDSA

Comparison of GOST R34.10-2012 and ECDSA scheme via two flaws of ECDSAConstructing two variant of GOST R34.10-2012 in the way of ECDSA-II and ECDSA-III construction

Conclusion

References

1. J. Malone-Lee and N. P. Smart, ”Modifications of ECDSA”,International Workshop on Selected Areas in CryptographySelected Areas in Cryptography, 2002, pages 1-12.

2. J. Stern, D. Pointcheval, J. Malone-Lee, Nigel P. Smart,”Flaws in Applying Proof Methodologies to SignatureSchemes”, Annual International Cryptology Conference,CRYPTO 2002: Advances in Cryptology CRYPTO 2002,pages 93-110.

3. E. Brickell, D. Pointcheval, S. Vaudenay, M. Yung, ”DesignValidations for Discrete Logarithm Based SignatureSchemes”, PKC 2000: Public Key Cryptography, pages276-292.

Trieu Quang Phong - Nguyen Quoc Toan The presentation

Page 30: Some Security Comparisons of GOST R 34.10-2012 and ECDSA … · 2017-12-25 · ECDSA and GOST R 34.10-2012 are considered as the secure and popular signature schemes recently. These

IntroductionDescription of GOST R 34.10-2012 and ECDSA

Comparison of GOST R34.10-2012 and ECDSA scheme via two flaws of ECDSAConstructing two variant of GOST R34.10-2012 in the way of ECDSA-II and ECDSA-III construction

Conclusion

Thanks for your listen!

Trieu Quang Phong - Nguyen Quoc Toan The presentation