Subversion in Practice: How to Efficiently Undermine Signatures

Algorithm substitution attack (ASA) on signatures can have severe consequences as the authentication services of numerous systems and applications rely on signature schemes. In this paper, we present a highly efficient ASA on the widely-used digital signature algorithm (DSA). Compared with the gener...

Full description

Bibliographic Details
Main Authors: Joonsang Baek, Willy Susilo, Jongkil Kim, Yang-Wai Chow
Format: Article
Language:English
Published: IEEE 2019-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8721046/