Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Problems, Countermeasures, and Emerging Security Notions

In Section 2.4, just as in the early literature, the notion of breaking had not been made precise. Implicitly, one assumed the following problem Given the public key and a message, find a corresponding signature. However, one noticed that some schemes that seem infeasible to break in this sense are vulnerable if one allows stronger attacks and weaker forms of success. [Pg.22]

the terminology that has later been developed for different types of attacks and success, e.g., in [G0MR88], is introduced. [Pg.22]

The most important types of attacks, in the order of increasing strength, are  [Pg.23]

In the most general type of active attack, the attacker can choose those messages at any time. This is called an adaptive chosen-message attack. For technical reasons, weaker forms were considered where the attacker must choose all the messages before the signer publishes her public key or at least before the signer issues the first signature. [Pg.23]

The most important types of success, in decreasing order, are  [Pg.23]


See other pages where Problems, Countermeasures, and Emerging Security Notions is mentioned: [Pg.22]    [Pg.23]    [Pg.25]   


SEARCH



Countermeasures

Emergence, problems

Notion

© 2024 chempedia.info