2019
DOI: 10.1007/978-3-030-35199-1_2
|View full text |Cite
|
Sign up to set email alerts
|

Subverting Decryption in AEAD

Abstract: This work introduces a new class of Algorithm Substitution Attack (ASA) on Symmetric Encryption Schemes. ASAs were introduced by Bellare, Paterson and Rogaway in light of revelations concerning mass surveillance. An ASA replaces an encryption scheme with a subverted version that aims to reveal information to an adversary engaged in mass surveillance, while remaining undetected by users. Previous work posited that a particular class of AEAD scheme (satisfying certain correctness and uniqueness properties) is re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
4

Relationship

2
7

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 27 publications
0
7
0
Order By: Relevance
“…Bellare et al improved over the attacks in [BPR14], proposing stateless attacks [BJK15] against all randomized schemes. While previous attacks [BPR14,BJK15] targeted the encryption algorithm, Armour and Poettering proposed an attack [AP19b] by subverting the decryption algorithm. Hodges and Stebila explored the detectability of ASAs via state resetting [HS21].…”
Section: Subversion Attacksmentioning
confidence: 99%
“…Bellare et al improved over the attacks in [BPR14], proposing stateless attacks [BJK15] against all randomized schemes. While previous attacks [BPR14,BJK15] targeted the encryption algorithm, Armour and Poettering proposed an attack [AP19b] by subverting the decryption algorithm. Hodges and Stebila explored the detectability of ASAs via state resetting [HS21].…”
Section: Subversion Attacksmentioning
confidence: 99%
“…We show that this class of ASA can be applied to symmetric settings (authenticated encryption, message authentication codes, and data encapsulation mechanisms), as well as asymmetric settings (public key encryption and key encapsulation mechanisms). Our work brings together previous work targeting AEAD schemes [5] and MAC schemes [4] in a common framework, expanded to incorporate public key encryption.…”
Section: Contributionsmentioning
confidence: 99%
“…For any cryptographic scheme, the most devastating attack goal for an attacker is key recovery (KR): Users generate keys using their key generation algorithm (k S , k R ) ← $ .gen i gen . 5 Generated secret keys are kept hidden, and the adversary aims at recovering these keys through the subversion. Note that in the symmetric case, k S = k R , whereas in the asymmetric case the receiver's key k R represents the private key.…”
Section: Subversion Leading To Key Recoverymentioning
confidence: 99%
“…In fact, his disclosures refueled the research over this area. Some literature [1]- [3], [15], [16] focused on studying the ASA problem on symmetric encryption schemes. Russell, Tang, Yung, and Zhou [17] generalized ASAs by permitting adversarial subversion of (randomized) key generation.…”
Section: B Related Workmentioning
confidence: 99%