2021
DOI: 10.46586/tosc.v2021.i2.389-422
|View full text |Cite
|
Sign up to set email alerts
|

Algorithm Substitution Attacks: State Reset Detection and Asymmetric Modifications

Abstract: In this paper, we study algorithm substitution attacks (ASAs), where an algorithm in a cryptographic scheme is substituted for a subverted version. First, we formalize and study the use of state resets to detect ASAs, and show that many published stateful ASAs are detectable with simple practical methods relying on state resets. Second, we introduce two asymmetric ASAs on symmetric encryption, which are undetectable or unexploitable even by an adversary who knows the embedded subversion key. We also generalize… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…While previous attacks [BPR14,BJK15] targeted the encryption algorithm, Armour and Poettering proposed an attack [AP19b] by subverting the decryption algorithm. Hodges and Stebila explored the detectability of ASAs via state resetting [HS21]. Apart from these attacks on (authenticated) encryption schemes, ASAs have also been proposed on message authentication code [AP19a], signature schemes [AMV15, BSKC19,LCWW18], and key encapsulation mechanisms [CHY20].…”
Section: Subversion Attacksmentioning
confidence: 99%
“…While previous attacks [BPR14,BJK15] targeted the encryption algorithm, Armour and Poettering proposed an attack [AP19b] by subverting the decryption algorithm. Hodges and Stebila explored the detectability of ASAs via state resetting [HS21]. Apart from these attacks on (authenticated) encryption schemes, ASAs have also been proposed on message authentication code [AP19a], signature schemes [AMV15, BSKC19,LCWW18], and key encapsulation mechanisms [CHY20].…”
Section: Subversion Attacksmentioning
confidence: 99%
“…Bellare and Hoang [10] give PKE schemes that defend against the subversion of random number generators. The use of state reset to detect ASAs is studied by Hodges and Stebila [41]. Berndt and Liśkiewicz [17] reunite the fields of cryptography and steganography.…”
Section: Further Workmentioning
confidence: 99%