Secure implementation of digital signature using semi-trusted computational core
Matematičeskie voprosy kriptografii, Tome 12 (2021), pp. 5-23.

Voir la notice de l'article provenant de la source Math-Net.Ru

We consider the problem of developing a protocol of interaction between software and hardware used by digital signature mechanisms and hardware tokens containing keys in case when such tokens may have backdoors of particular kind. We propose a relevant adversary model and develop a scheme of the protocol for which we prove required security properties.
@article{MVK_2021_12_a0,
     author = {E. K. Alekseev and L. R. Ahmetzyanova and A. A. Bozhko and S. V. Smyshlyaev},
     title = {Secure implementation of digital signature using semi-trusted computational core},
     journal = {Matemati\v{c}eskie voprosy kriptografii},
     pages = {5--23},
     publisher = {mathdoc},
     volume = {12},
     year = {2021},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/MVK_2021_12_a0/}
}
TY  - JOUR
AU  - E. K. Alekseev
AU  - L. R. Ahmetzyanova
AU  - A. A. Bozhko
AU  - S. V. Smyshlyaev
TI  - Secure implementation of digital signature using semi-trusted computational core
JO  - Matematičeskie voprosy kriptografii
PY  - 2021
SP  - 5
EP  - 23
VL  - 12
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/MVK_2021_12_a0/
LA  - ru
ID  - MVK_2021_12_a0
ER  - 
%0 Journal Article
%A E. K. Alekseev
%A L. R. Ahmetzyanova
%A A. A. Bozhko
%A S. V. Smyshlyaev
%T Secure implementation of digital signature using semi-trusted computational core
%J Matematičeskie voprosy kriptografii
%D 2021
%P 5-23
%V 12
%I mathdoc
%U http://geodesic.mathdoc.fr/item/MVK_2021_12_a0/
%G ru
%F MVK_2021_12_a0
E. K. Alekseev; L. R. Ahmetzyanova; A. A. Bozhko; S. V. Smyshlyaev. Secure implementation of digital signature using semi-trusted computational core. Matematičeskie voprosy kriptografii, Tome 12 (2021), pp. 5-23. http://geodesic.mathdoc.fr/item/MVK_2021_12_a0/

[1] GOST R 34.10-2012 «Informatsionnaya tekhnologiya. Kriptograficheskaya zaschita informatsii. Protsessy formirovaniya i proverki elektronnoi tsifrovoi podpisi», Standartinform, M., 2012

[2] Alekseev E. K., Akhmetzyanova L. R., Oshkin I. B., Smyshlyaev S. V., “Obzor uyazvimostei nekotorykh protokolov vyrabotki obschego klyucha s autentifikatsiei na osnove parolya i printsipy postroeniya protokola SESPAKE”, Matematicheskie voprosy kriptografii, 7:4 (2016), 7–28 | MR | Zbl

[3] Alekseev E. K., Smyshlyaev S. V., “O bezopasnosti protokola SESPAKE”, Prikladnaya diskretnaya matematika, 50 (2020), 5–41 | Zbl

[4] V. V. Yaschenko (red.), Vvedenie v kriptografiyu, Izd. 4-e, dop., MTsNMO, M., 2012, 348 pp.

[5] Boileau A., Ruxcon 2006, Presentation https://papers.put.as/papers/macosx/2006/ab_firewire_rux2k6-final.pdf

[6] Witherden F., Memory forensics over the IEEE 1394 interface, 2010 https://freddie.witherden.org/pages/ieee-1394-forensics.pdf

[7] Hermann U., Physical memory attacks via Firewire/DMA – part 1: Overview and mitigation, 2010 https://firewire14.rssing.com/chan-8600345/all_p1.html

[8] Lenstra A. K., Hughes J. P., Augier M., Bos J. W., Kleinjung T., Wachter C., Ron was wrong, What is right, Cryptology ePrint Archive, Report 2012/064, 2012

[9] Schnorr C. P., “Efficient identification and signatures for smart cards”, CRYPTO'89, Lect. Notes Comput. Sci., 1990, 239–252 | DOI | Zbl

[10] Savage J. E., Models of Computation: Exploring the Power of Computing, Addison-Wesley Longman Publ. Co., Boston, MA, 1997, 672 pp.