In this paper, we exhibit algorithmic refinements allowing to attack the amended (currently valid) version of ISO/IEC 9796-2 for all modulus sizes. A practical forgery was computed in only two days using 19 servers on the Amazon EC2 grid for a total cost of roughly $800. The forgery was implemented for e=2 but attacking odd exponents will not take longer. The forgery was computed for the RSA-2048 challenge modulus, whose factorization is still unknown.
The new attack blends several theoretical tools. These do not change the asymptotic complexity of Coron et al. technique but significantly accelerate it for parameter values previously considered beyond reach.
While less efficient ($45,000), the acceleration also extends to EMV signatures. EMV is an ISO/IEC 9796-2-compliant format with extra redundancy. Luckily, this attack does not threaten any of the 730 million EMV payment cards in circulation for operational reasons.
Costs are per modulus: after a first forgery for a given modulus, obtaining more forgeries is virtually immediate.Category / Keywords: public-key cryptography / digital signatures, forgery, RSA, public-key cryptanalysis, ISO/IEC 9796-2 Publication Info: An extended abstract will appear at CRYPTO 2009. This is the full version. Date: received 10 May 2009 Contact author: jscoron at gmail com Available format(s): PDF | BibTeX Citation Version: 20090520:041300 (All versions of this report) Short URL: ia.cr/2009/203 Discussion forum: Show discussion | Start new discussion