Impact of randomization in VKO mechanisms on overall security level
Prikladnaâ diskretnaâ matematika, no. 4 (2021), pp. 77-93
Voir la notice de l'article provenant de la source Math-Net.Ru
Multiplier randomization techniques with hashing of the results is one of widely used (especially for semi-trusted environment) countermeasures against attacks on key agreement protocols in practice. This approach is used, for instance, in VKO mechanisms, which are used as building blocks for Russian cipher suites for main cryptographic protocols (including IPsec, TLS, CMS), standardized in Russia. As an important example, shared keys are produced with this technique in TLS 1.2 cipher suites, which are widespread in cryptographic software for citizens of Russia. In this paper, we consider overall security of procedures of shared key computation in the practically significant cases of implementation errors in computations on twisted Edwards elliptic curves and non-constant time of scalar multiplication operations.
Keywords:
models and methods in information security, cryptographic protocols.
@article{PDM_2021_4_a2,
author = {E. K. Alekseev and V. D. Nikolaev and S. V. Smyshlyaev},
title = {Impact of randomization in {VKO} mechanisms on overall security level},
journal = {Prikladna\^a diskretna\^a matematika},
pages = {77--93},
publisher = {mathdoc},
number = {4},
year = {2021},
language = {ru},
url = {http://geodesic.mathdoc.fr/item/PDM_2021_4_a2/}
}
TY - JOUR AU - E. K. Alekseev AU - V. D. Nikolaev AU - S. V. Smyshlyaev TI - Impact of randomization in VKO mechanisms on overall security level JO - Prikladnaâ diskretnaâ matematika PY - 2021 SP - 77 EP - 93 IS - 4 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/PDM_2021_4_a2/ LA - ru ID - PDM_2021_4_a2 ER -
E. K. Alekseev; V. D. Nikolaev; S. V. Smyshlyaev. Impact of randomization in VKO mechanisms on overall security level. Prikladnaâ diskretnaâ matematika, no. 4 (2021), pp. 77-93. http://geodesic.mathdoc.fr/item/PDM_2021_4_a2/