Questions tagged [multi-target]

A multi-target attack is one in which it is attacked many keys simultaneously, and the adversary is content with success for any of the keys. That might allow increased chance of success at a given effort, sometime linearly with the number of keys.

For example, for the block cipher DES, if it's known $P$ and $\operatorname{ENC}_{K_i}(P)=C_i$ for $k$ random keys $K_i$, there's a simple speedup by a factor of nearly $k$ (for $k$ up to some thousands at least), where an adversary encrypts $P$ under incremental keys and searches the resulting $C$ among the $C_i$ (the search can be arranged to cost essentially one memory access).

In a public key context, the adversary may have many public keys, and be trying to find one private key.

5 questions
13
votes
2 answers

What is a multi-target attack?

What exactly is a multi-target attack? How does the attack work on different cryptographic schemes (block ciphers, hash functions, elliptic curves)? How can it be avoided?
Conrado
  • 6,614
  • 1
  • 30
  • 45
7
votes
1 answer

Multi-target attacks on AES-CTR with a random nonce

128-bit block ciphers are vulnerable to multi-target attacks where the attacker seeks to attack a collection of keys instead of a single key. A simple example: Generate keys $k_1, k_2, ...,k_{2^{40}}$. Pick a 128-bit message block $m$ and provide…
Tim McLean
  • 2,914
  • 1
  • 16
  • 26
4
votes
0 answers

Multi-users RSA problem

Rivest and Kalisky's RSA problem considers various notions on security of the RSA One-Way Trapdoor Permutation. They do it only from the perspective of a single user. What's the state of the art in the multi-users RSA problem and its reduction to…
fgrieu
  • 149,326
  • 13
  • 324
  • 622
3
votes
1 answer

Multi-target attacks of ECC public keys

Imagine a situation where there are many high-value public keys around, using the same Elliptic Curve group, say $k$ in the millions public keys¹. Can an adversary reasonably find one of the matching private key at much lower cost that finding the…
fgrieu
  • 149,326
  • 13
  • 324
  • 622
0
votes
1 answer

A multi-target attack on 128-bit ECDSA private keys

I'm thinking about doing this as a project, but I'm not sure how I'm supposed to proceed. So I have an 128-bit ECDSA, which would provide about 128 bits of security (if we do not use special methods like the baby-step giant-step algorithm or…
Anonymous
  • 51
  • 2