Title :
Kleptographic Weaknesses in Benaloh-Tuinstra Protocol
Author :
Piotr Borzecki;Jedrzej Kabarowski;Przemyslaw Kubiak;Miroslaw Kutylowski;Filip Zagorski
Author_Institution :
University of Wroclaw, Poland
Abstract :
During designing of cryptographic protocols, their participants are usually identified with software or hardware they use. However, these supporting tools are not verified at the protocol level. Such carelessness opens the door to kleptographic (SETUP) attacks. In this paper we design such an attack on the classical Benaloh-Tuinstra election protocol. One of the technical tools developed in the paper is a new variant of a Diffie-Hellman SETUP attack, in which Kronecker Decomposition of the group is not known to the attacker. This is especially the case of Goldwasser-Micali cryptosystem.
Keywords :
"Cryptographic protocols","Public key cryptography","Hardware","Protection","Mathematics","Computer science","Nominations and elections","Security","Manufacturing","Public key"
Conference_Titel :
Systems and Networks Communications, 2006. ICSNC ´06. International Conference on
Print_ISBN :
0-7695-2699-3
DOI :
10.1109/ICSNC.2006.50