-
- ITOH Kouichi
- Secure Computing Lab., FUJITSU LABORATORIES Ltd. Tokyo Institute of Technology
-
- IZU Tetsuya
- Secure Computing Lab., FUJITSU LABORATORIES Ltd.
-
- OGATA Wakaha
- Tokyo Institute of Technology
-
- SHIMOYAMA Takeshi
- Secure Computing Lab., FUJITSU LABORATORIES Ltd.
-
- TAKENAKA Masahiko
- Secure Computing Lab., FUJITSU LABORATORIES Ltd.
この論文をさがす
抄録
This paper studies two types of documents in which an adversary can forge a signature on a chosen document. One type is that a nonce is padded on an input document. The time-stamp protocol is a good example of this type. Another is a structured document (such as PS or PDF) whose contents are described in a body part and information (such as generated time and a generator) are in a meta part. In fact, this paper shows how to forge a time-stamp, a signature on a PDF and an X.509 certificate by the extended forgery attack and numerical examples. Forged signature by the original or the extended attacks is only accepted by the clients whose length check of zero-field is loosely implemented. As a result, we found that the latest versions of Adobe's Acrobat and Acrobat Reader accept the forged time-stamp and the forged signature on a PDF document. Target of this attack is RSASSA-PKCS1-v1_5, which does not have provable security. We also show the expanded attack might forge the signature of RSASSA-PSS, which has provable security, when the length check of zero-field is omitted or loosely implemented.
収録刊行物
-
- IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
-
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E92-A (1), 67-75, 2009
一般社団法人 電子情報通信学会
- Tweet
キーワード
詳細情報 詳細情報について
-
- CRID
- 1390001206310478336
-
- NII論文ID
- 10026854809
-
- NII書誌ID
- AA10826239
-
- ISSN
- 17451337
- 09168508
-
- 本文言語コード
- en
-
- データソース種別
-
- JaLC
- Crossref
- CiNii Articles
-
- 抄録ライセンスフラグ
- 使用不可