1997
DOI: 10.1007/3-540-69053-0_6
|View full text |Cite
|
Sign up to set email alerts
|

Kleptography: Using Cryptography Against Cryptography

Abstract: Abstract. The notion of a Secretly Embedded Trapdoor with Universal Protection (SETUP) has been recently introduced. In this paper we extend the study of stealing information securely and subliminally from black-box cryptosystems. The SETUP mechanisms presented here, in contrast with previous ones, leak secret key information without using an explicit subliminal channel. This extends this area of threats, which we call "kleptography".We introduce new definitions of SETUP attacks (strong, regular, and weak SETU… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
88
0
8

Year Published

2000
2000
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 165 publications
(96 citation statements)
references
References 9 publications
0
88
0
8
Order By: Relevance
“…Following Young and Yung [52], Goh, Boneh, Pinkas and Golle [21] consider the problem of adding a hidden key recovery to protocols. They suggest that when the server needs a random nonce, it can use in its place an encryption of the session key computed under the escrow key.…”
Section: Iv-replacement Attacksmentioning
confidence: 99%
See 2 more Smart Citations
“…Following Young and Yung [52], Goh, Boneh, Pinkas and Golle [21] consider the problem of adding a hidden key recovery to protocols. They suggest that when the server needs a random nonce, it can use in its place an encryption of the session key computed under the escrow key.…”
Section: Iv-replacement Attacksmentioning
confidence: 99%
“…One option is that it use many different keys K so that any particular compromise has limited consequences. Another possibility, following Young and Yung's descriptions of kleptography [53], is that the subverted encryption use asymmetric rather than symmetric encryption so that compromise of the system reveals only a public encryption key, B alone holding the corresponding decryption key. Here we sketch the model and definitions, replacing the master key K with a pair of master keys ( K, L).…”
Section: B Asymmetric Subversionmentioning
confidence: 99%
See 1 more Smart Citation
“…Unlike previous key recovery or escrow schemes that work at the level of encryption and signature algorithms [23,24], our designs use features of the protocol. We also consider practical issues such as ease of deployment and usage.…”
Section: Introductionmentioning
confidence: 99%
“…Pairs of public/private keys are generated using a setup (secretly embedded trapdoor with universal protection) mechanism [35,36] by trusted third parties or tamper-resistant devices. The notion of setup is related to that of subliminal channel due to Simmons [30] (see also [10]).…”
Section: Related Workmentioning
confidence: 99%