publication . Part of book or chapter of book . Other literature type . Conference object . Article . 2020

Subverting Decryption in AEAD

Marcel Armour; Bertram Poettering;
Open Access English
  • Published: 20 Jul 2020
  • Publisher: Zenodo
Abstract
This work introduces a new class of Algorithm Substitution Attack (ASA) on Symmetric Encryption Schemes. ASAs were introduced by Bellare, Paterson and Rogaway in light of revelations concerning mass surveillance. An ASA replaces an encryption scheme with a subverted version that aims to reveal information to an adversary engaged in mass surveillance, while remaining undetected by users. Previous work posited that a particular class of AEAD scheme (satisfying certain correctness and uniqueness properties) is resilient against subversion. Many if not all real-world constructions – such as GCM, CCM and OCB – are members of this class. Our results stand in oppositio...
Subjects
free text keywords: Algorithm Substitution Attacks, Privacy, Symmetric Encryption, Mass Surveillance, Subversion, GCM transcription factors, Computer security, computer.software_genre, computer, Symmetric-key algorithm, business.industry, business, Adversary, Implementation, Encryption, Uniqueness, Correctness, Computer science
Funded by
EC| FutureTPM
Project
FutureTPM
Future Proofing the Connected World: A Quantum-Resistant Trusted Platform Module
  • Funder: European Commission (EC)
  • Project Code: 779391
  • Funding stream: H2020 | RIA
Validated by funder
Download fromView all 5 versions
https://zenodo.org/record/3951...
Part of book or chapter of book
Provider: UnpayWall
Zenodo
Other literature type . 2020
Provider: Datacite
ZENODO
Conference object . 2020
Provider: ZENODO
Any information missing or wrong?Report an Issue