Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Existential forgery

Existential forgery is even possible with a key-only attack in all signature schemes built from trap-door one-way permutations as described in Section 2.4 The attacker chooses a value and calls it a signature, computes the permutation with the pubhc key, and calls the result a message. [Pg.24]

By the way, the situation with the ElGamal scheme is similar to that with RSA, although that scheme is not directly constructed from trap-door one-way permutations Existential forgery is possible with a key-only attack. However, no method for selective forgery with an active attack is known. [Pg.24]

A second step was to formalize security not only as the infeasibility of computing the inverse of a function. Instead, the definition must comprise an active attack and exclude existential forgery. [Pg.25]


See other pages where Existential forgery is mentioned: [Pg.23]    [Pg.23]    [Pg.24]    [Pg.24]    [Pg.24]    [Pg.26]    [Pg.27]    [Pg.64]    [Pg.23]    [Pg.23]    [Pg.24]    [Pg.24]    [Pg.24]    [Pg.26]    [Pg.27]    [Pg.64]   
See also in sourсe #XX -- [ Pg.23 ]




SEARCH



Existentialism

Forgeries

© 2024 chempedia.info