Skip to main content

How to Forge a Time-Stamp Which Adobe’s Acrobat Accepts

  • Conference paper
Cryptography and Coding (Cryptography and Coding 2007)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4887))

Included in the following conference series:

Abstract

This paper shows how to forge a time-stamp which the latest version of Adobe’s Acrobat and Acrobat Reader accept improperly. The target signature algorithm is RSASSA-PKCS1-v1_5 with a 1024-bit public composite and the public key e = 3, and our construction is based on Bleichenbacher’s forgery attack presented in CRYPTO 2006. Since the original attack is not able to forge with these parameters, we used an extended attack described in this paper. Numerical examples of the forged signatures and times-stamp are also provided.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Adobe Systems Inc., Adobe Acrobat family, http://www.adobe.com/products/acrobat/

  2. AEC, TrustPort. http://www.trustport.cz/?content=tsa

  3. Amano, E-timing EVIDENCE Verifier for Acrobat (in Japanese), https://www.e-timing.ne.jp/download/evidence-verifier/formmail.html

  4. Adams, C., Chain, P., Pinkas, D., Zuccherato, R.: Internet X.509 Public Key Infrastructure: Time-Stamp Protocol (TSP), RFC 3161 (August 2001), http://www.ietf.org/rfc/rfc3161.txt

  5. Bleichenbacher, D.: Chosen Ciphertext Attacks against Protocols Based on RSA Encryption Standard PKCS#1. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 1–12. Springer, Heidelberg (1998)

    Google Scholar 

  6. Bleichenbacher, D.: Forging Some RSA Signatures with Pencil and Paper. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, Springer, Heidelberg (2006)

    Google Scholar 

  7. US-CERT, Multiple RSA Implementations Fail to Properly Handle Signatures, Vulnerability Note VU#845620 (September 5, 2006), http://www.kb.cert.org/vuls/id/845620

  8. Finney, H.: Bleichenbacher’s RSA Signature Forgery Based on Implementation Error. e-mail (August 27, 2006), http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html

  9. Izu, T., Takenaka, M., Shimoyama, T.: Analysis on Bleichenbacher’s Forgery Attack. In: WAIS 2007, pp. 1167–1174. IEEE Computer Society, Los Alamitos (2007)

    Google Scholar 

  10. NTT Communications, Certificates for the Internal Credit Application CA. (in Japanese) http://www.ntt.com/creditca/x509.pdf

  11. Oiwa, Y., Kobara, K., Watanabe, H.: A New Variant for an Attack Against RSA Signature Verification using Parameter Field. In: EUROPKI 2007 (June 2007)

    Google Scholar 

  12. PFU, PFU time-stamp service (in Japanese), http://www.pfu.fujitsu.com/tsa/

  13. RSA Laboratories, RSA PKCS #1 v2.1: RSA Cryptography Standard (June 14, 2002)

    Google Scholar 

  14. A digital file of [13] in WORD format, ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-1/pkcs-1v2-1.doc

  15. A digital file of [13]in PDF format, ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-1/pkcs-1v2-1.pdf

  16. RSA Laboratories, Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1, RFC 3447 (February 2003) http://www.ietf.org/rfc/rfc3447.txt

  17. Seiko Instruments Inc., a trial time-stamp service (in Japanese), http://www.sii.co.jp/ni/tss/trial/

  18. Seiko Instruments Inc., Chronotrust (in Japanese), http://www.sii.co.jp/ni/tss/index.html

  19. Tews, E.: Real World Exploit for Bleichenbacher’s Attack on SSL. e-mail submitted to the Cryptography Mailing List (September 14, 2006), http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Steven D. Galbraith

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Izu, T., Shimoyama, T., Takenaka, M. (2007). How to Forge a Time-Stamp Which Adobe’s Acrobat Accepts. In: Galbraith, S.D. (eds) Cryptography and Coding. Cryptography and Coding 2007. Lecture Notes in Computer Science, vol 4887. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77272-9_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-77272-9_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-77271-2

  • Online ISBN: 978-3-540-77272-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics