Views
5 years ago

x - Faculty of Computer Science - Technische Universität Dresden

x - Faculty of Computer Science - Technische Universität Dresden

Solution

Solution of problem 1 (2) Proposition If the permutation pairs are collision resistant, then the adaptive active attacker can’t sign any message with GMR. Proof A forged signature leads either to a collision in the tree of references (contradiction) or to an additional legal signature. So the attacker has inverted the collisionresistant permutation. With this ability he could generate collisions (contradiction). Example: R f 0 first differing bit position � Sig � � � � �R 1110 f 0 f 1 f 1 f 1 205

Note In the proof you dispose the “Oracle” (the attacked person) by showing that the attacker can generate „half“ the tree from the bottom or (exclusive) “half” the tree from the top with the same probability distribution as the attacked person. Lesson: randomly chosen references each used only once (compare one-time-pad) make adaptive active attacks ineffective � arrow explained (random number z') in figure signature system 206

Slides - Technische Universität Dresden
faculty of computer science - Fakultät Informatik - Technische ...
OCL By Example Lecture - Technische Universität Dresden
Statistics beyond Physics - Technische Universität Dresden
Graphs - Www-st.inf.tu-dresden.de - Technische Universität Dresden
Optimierung und Frustration: - Technische Universität Dresden
02 - Technische UniversitÃ¤t Dresden
SAP AG - Faculty of Computer Science
Talk - Technische UniversitÃ¤t Dresden
5. Adaptation - Faculty of Computer Science - Technische ...
3. Adaptation - Faculty of Computer Science - Technische ...
2. Mobile Internet - Faculty of Computer Science - Technische ...
3. Mobile Internet - Faculty of Computer Science - Technische ...
4. Context Awareness - Faculty of Computer Science - Technische ...
Wiki Event Navigation - Computer Networks - Technische Universität ...
Content Sharing - Technische UniversitÃ¤t Dresden
6. Context Awareness - Faculty of Computer Science - Technische ...
7. Location-based Se.. - Faculty of Computer Science - Technische ...
Computer Science and Engineering - Technische Universiteit ...
5. Location-based Se.. - Faculty of Computer Science - Technische ...
Folie 1 - Faculty of Computer Science
Folie 1 - Faculty of Computer Science
First Presentation - Faculty of Computer Science
Folie 1 - Faculty of Computer Science
X - Technische Universität Dresden
X - Technische Universität Dresden
diplomarbeit - Computer Networks - Technische Universität Dresden
Technische Universität Dresden - Computer Networks - Technische ...
M - Technische Universität Dresden
paper - Technische Universität Dresden