CAPEC-485

Signature Spoofing by Key Recreation
Niski
Wysoki
Draft
2014-06-23
00h00 +00:00
2022-09-29
00h00 +00:00
Alert dla konkretnego CAPEC
Bądź na bieżąco z wszelkimi zmianami dotyczącymi konkretnego CAPEC.
Zarządzaj powiadomieniami

Opisy CAPEC

An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.

Informacje CAPEC

Wymagania wstępne

An authoritative signer is using a weak method of random number generation or weak signing software that causes key leakage or permits key inference.
An authoritative signer is using a signature algorithm with a direct weakness or with poorly chosen parameters that enable the key to be recovered using signatures from that signer.

Wymagane umiejętności

Cryptanalysis of signature generation algorithm
Reverse engineering and cryptanalysis of signature generation algorithm implementation and random number generation
Ability to create malformed data blobs and know how to present them directly or indirectly to a victim.

Łagodzenie

Ensure cryptographic elements have been sufficiently tested for weaknesses.

Powiązane słabości

CWE-ID Nazwa słabości

CWE-330

Use of Insufficiently Random Values
The product uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.

Odniesienia

REF-419

Attacking DSA Under a Repeated Bits Assumption
P.J. Leadbitter, D. Page, N.P. Smart.

REF-420

DSA-1571-1 openssl -- predictable random number generator
Debian Security.

Zgłoszenie

Nazwa Organizacja Data Data wydania
CAPEC Content Team The MITRE Corporation 2014-06-23 +00:00

Modyfikacje

Nazwa Organizacja Data Komentarz
CAPEC Content Team The MITRE Corporation 2021-06-24 +00:00 Updated Related_Weaknesses
CAPEC Content Team The MITRE Corporation 2022-09-29 +00:00 Updated Taxonomy_Mappings