首页 > 最新文献

Int. J. Appl. Cryptogr.最新文献

英文 中文
On message recognition protocols: recoverability and explicit confirmation 关于消息识别协议:可恢复性和显式确认
Pub Date : 1900-01-01 DOI: 10.1504/IJACT.2010.038305
I. Goldberg, Atefeh Mashatan, Douglas R Stinson
We look at message recognition protocols (MRPs) and prove that there is a one-to-one correspondence between stateless non-interactive MRPs and digital signature schemes. Next, we examine the Jane Doe protocol and note its inability to recover in case of a certain adversarial disruption. We propose a variant of this protocol which is equipped with a resynchronisation technique that allows users to resynchronise whenever they wish. Moreover, we propose another protocol which self-recovers in case of an intrusion. This protocol incorporates the resynchronisation technique within itself. Further, we enumerate all possible attacks against this protocol and show that none of the attacks can occur. Finally, we prove the security of the new protocol and its ability to self-recover once the disruption has stopped. Finally, we propose an MRP which provides explicit confirmation to the sender on whether or not the message was accepted by the receiver.
我们研究消息识别协议(mrp),并证明在无状态非交互mrp和数字签名方案之间存在一对一的对应关系。接下来,我们检查无名氏协议,并注意到它无法在某些对抗性破坏的情况下恢复。我们提出了该协议的一种变体,它配备了一种重新同步技术,允许用户随时随地重新同步。此外,我们还提出了另一种在入侵情况下自恢复的协议。该协议在其内部包含了重新同步技术。此外,我们列举了针对该协议的所有可能的攻击,并表明所有攻击都不会发生。最后,我们证明了新协议的安全性及其在中断停止后自我恢复的能力。最后,我们提出了一个MRP,它为发送方提供了关于消息是否被接收方接受的明确确认。
{"title":"On message recognition protocols: recoverability and explicit confirmation","authors":"I. Goldberg, Atefeh Mashatan, Douglas R Stinson","doi":"10.1504/IJACT.2010.038305","DOIUrl":"https://doi.org/10.1504/IJACT.2010.038305","url":null,"abstract":"We look at message recognition protocols (MRPs) and prove that there is a one-to-one correspondence between stateless non-interactive MRPs and digital signature schemes. Next, we examine the Jane Doe protocol and note its inability to recover in case of a certain adversarial disruption. We propose a variant of this protocol which is equipped with a resynchronisation technique that allows users to resynchronise whenever they wish. Moreover, we propose another protocol which self-recovers in case of an intrusion. This protocol incorporates the resynchronisation technique within itself. Further, we enumerate all possible attacks against this protocol and show that none of the attacks can occur. Finally, we prove the security of the new protocol and its ability to self-recover once the disruption has stopped. Finally, we propose an MRP which provides explicit confirmation to the sender on whether or not the message was accepted by the receiver.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121376729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Reduction-Based Proof for Authentication and Session Key Security in 3-Party Kerberos 基于约简的三方Kerberos认证和会话密钥安全性证明
Pub Date : 1900-01-01 DOI: 10.1504/ijact.2022.10052385
Jorg Schwenk, D. Stebila
Kerberos is one of the earliest network security protocols, providing authentication between clients and servers with the assistance of trusted servers. It remains widely used, notably as the default authentication protocol in Microsoft Active Directory (thus shipped with every major operating system), and is the ancestor of modern single sign-on protocols like OAuth and OpenID Connect. There have been many analyses of Kerberos in the symbolic (Dolev–Yao) model, which is more amenable to computer-aided verification tools than the computational model, but also idealizes messages and cryptographic primitives more. Reduction-based proofs in the computational model can provide assurance against a richer class of adversaries, and proofs with concrete probability analyses help in picking security parameters, but Kerberos has had no such analyses to date. We give a reduction-based security proof of Kerberos authentication and key establishment, focusing on the mandatory 3-party mode. We show that it is a secure authentication protocol under standard assumptions on its encryption scheme; our results can be lifted to apply to quantum adversaries as well. As has been the case for other real-world authenticated key exchange (AKE) protocols, the standard AKE security notion of session key indistinguishability cannot be proven for Kerberos since the session key is used in the protocol itself, breaking indistinguishability. We provide two positive results despite this: we show that the standardized but optional sub-session mode of Kerberos does yield secure session keys, and that the hash of the main session key is also a secure session key under Krawczyk’s generalization of the authenticated and confidential channel establishment (ACCE) model.
Kerberos是最早的网络安全协议之一,它在可信服务器的帮助下提供客户机和服务器之间的身份验证。它仍然被广泛使用,特别是作为Microsoft Active Directory中的默认身份验证协议(因此每个主要操作系统都配备了它),并且是现代单点登录协议(如OAuth和OpenID Connect)的祖先。在符号(Dolev-Yao)模型中对Kerberos进行了许多分析,该模型比计算模型更适合计算机辅助验证工具,但也更理想化消息和加密原语。计算模型中基于约简的证明可以提供针对更丰富的攻击类的保证,并且具有具体概率分析的证明有助于选择安全参数,但是Kerberos迄今为止还没有这样的分析。我们给出了基于约简的Kerberos身份验证和密钥建立的安全性证明,重点讨论了强制的三方模式。在对其加密方案的标准假设下,证明了它是一种安全的认证协议;我们的结果也可以应用于量子对手。与其他真实世界的身份验证密钥交换(AKE)协议的情况一样,Kerberos无法证明会话密钥不可区分的标准AKE安全概念,因为会话密钥在协议本身中使用,从而破坏了不可区分性。尽管如此,我们还是提供了两个积极的结果:我们证明了Kerberos的标准化但可选的子会话模式确实产生安全会话密钥,并且在Krawczyk对身份验证和保密通道建立(ACCE)模型的推广下,主会话密钥的哈希也是安全会话密钥。
{"title":"A Reduction-Based Proof for Authentication and Session Key Security in 3-Party Kerberos","authors":"Jorg Schwenk, D. Stebila","doi":"10.1504/ijact.2022.10052385","DOIUrl":"https://doi.org/10.1504/ijact.2022.10052385","url":null,"abstract":"Kerberos is one of the earliest network security protocols, providing authentication between clients and servers with the assistance of trusted servers. It remains widely used, notably as the default authentication protocol in Microsoft Active Directory (thus shipped with every major operating system), and is the ancestor of modern single sign-on protocols like OAuth and OpenID Connect. There have been many analyses of Kerberos in the symbolic (Dolev–Yao) model, which is more amenable to computer-aided verification tools than the computational model, but also idealizes messages and cryptographic primitives more. Reduction-based proofs in the computational model can provide assurance against a richer class of adversaries, and proofs with concrete probability analyses help in picking security parameters, but Kerberos has had no such analyses to date. We give a reduction-based security proof of Kerberos authentication and key establishment, focusing on the mandatory 3-party mode. We show that it is a secure authentication protocol under standard assumptions on its encryption scheme; our results can be lifted to apply to quantum adversaries as well. As has been the case for other real-world authenticated key exchange (AKE) protocols, the standard AKE security notion of session key indistinguishability cannot be proven for Kerberos since the session key is used in the protocol itself, breaking indistinguishability. We provide two positive results despite this: we show that the standardized but optional sub-session mode of Kerberos does yield secure session keys, and that the hash of the main session key is also a secure session key under Krawczyk’s generalization of the authenticated and confidential channel establishment (ACCE) model.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121391888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
End-to-end verifiable cumulative voting without tallying authorities 端到端可验证的累积投票,无需计票机构
Pub Date : 1900-01-01 DOI: 10.1504/ijact.2022.10056073
Samiran Bag, M. A. Azad, F. Hao
In this paper, we propose the first end-to-end (E2E) verifiable e-voting system for cumulative voting without requiring any tallying authorities. Cumulative voting is an electoral system, heavily used in corporate governance as practised in several US states, and in participatory budgeting as seen in many European cities where local residents decide how to spend a portion of the local government’s budget through voting. Traditionally, cumulative voting is done with pen and paper, but the manual counting process is time consuming and costly, especially when such voting events occur frequently. Many systems have changed to use electronic voting, but without considering the security aspects of this change. To our knowledge, none of the existing e-voting systems implemented for cumulative voting are end-to-end verifiable; if there is any bug or tempering at the tallying software, the tally would be inadvertently modified without any voter noticing this. Although there are existing voting systems (e.g., mix-net based) that could be adapted to support cumulative voting with E2E verifiability, they generally require a set of tallying authorities, which can lead to substantial complexity of finding and managing such authorities in practice. We address this issue by adopting novel cryptographic techniques to achieve E2E verifiability for cumulative voting, but without involving any tallying authorities. We formally define a model to prove the security of our system, and present the efficiency analysis to show that our proposed solution is feasible for practical use.
在本文中,我们提出了第一个端到端(E2E)可验证的累积投票电子投票系统,不需要任何计票机构。累积投票是一种选举制度,在美国几个州的公司治理和许多欧洲城市的参与式预算中被大量使用,在这些城市,当地居民通过投票决定如何使用地方政府的一部分预算。传统上,累积投票是用笔和纸完成的,但是手动计数过程既耗时又昂贵,特别是当此类投票事件频繁发生时。许多系统已经更改为使用电子投票,但没有考虑这种更改的安全方面。据我们所知,现有的用于累积投票的电子投票系统都不是端到端可验证的;如果点票软件有任何错误或篡改,点票就会在没有任何选民注意到的情况下被不经意地修改。虽然现有的投票系统(例如,基于mix-net的)可以适应支持具有端到端可验证性的累积投票,但它们通常需要一组计数权威,这可能导致在实践中查找和管理此类权威的相当复杂。我们通过采用新颖的加密技术来实现累积投票的端到端可验证性来解决这个问题,但不涉及任何计票机构。我们正式定义了一个模型来证明系统的安全性,并给出了效率分析来证明我们提出的方案是可行的。
{"title":"End-to-end verifiable cumulative voting without tallying authorities","authors":"Samiran Bag, M. A. Azad, F. Hao","doi":"10.1504/ijact.2022.10056073","DOIUrl":"https://doi.org/10.1504/ijact.2022.10056073","url":null,"abstract":"In this paper, we propose the first end-to-end (E2E) verifiable e-voting system for cumulative voting without requiring any tallying authorities. Cumulative voting is an electoral system, heavily used in corporate governance as practised in several US states, and in participatory budgeting as seen in many European cities where local residents decide how to spend a portion of the local government’s budget through voting. Traditionally, cumulative voting is done with pen and paper, but the manual counting process is time consuming and costly, especially when such voting events occur frequently. Many systems have changed to use electronic voting, but without considering the security aspects of this change. To our knowledge, none of the existing e-voting systems implemented for cumulative voting are end-to-end verifiable; if there is any bug or tempering at the tallying software, the tally would be inadvertently modified without any voter noticing this. Although there are existing voting systems (e.g., mix-net based) that could be adapted to support cumulative voting with E2E verifiability, they generally require a set of tallying authorities, which can lead to substantial complexity of finding and managing such authorities in practice. We address this issue by adopting novel cryptographic techniques to achieve E2E verifiability for cumulative voting, but without involving any tallying authorities. We formally define a model to prove the security of our system, and present the efficiency analysis to show that our proposed solution is feasible for practical use.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134219310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Session-StateReveal is stronger than eCKs EphemeralKeyReveal: using automatic analysis to attack the NAXOS protocol Session-StateReveal比eCKs的EphemeralKeyReveal更强:使用自动分析攻击NAXOS协议
Pub Date : 1900-01-01 DOI: 10.1504/IJACT.2010.038304
C. Cremers
In the paper, 'stronger security of authenticated key exchange' (LaMacchia et al., 2006, 2007), a new security model for authenticated key exchange protocols (eCK) is proposed. The new model is suggested to be at least as strong as previous models for key exchange protocols, such as the CK model (Canetti and Krawczyk, 2001; Krawczyk, 2005). The model includes a new notion of an EphemeralKeyReveal adversary query, which is claimed in e.g., LaMacchia et al. (2006), Okamoto (2007), and Ustaoglu (2008), to be at least as strong as the Session-StateReveal query. We investigate the relation between the two models by focusing on the difference in adversary queries. We formally model the NAXOS protocol and a variant of the eCK model, called eCK', in which the EphemeralKeyReveal query is replaced by the Session-StateReveal query. Using Scyther, a formal protocol analysis tool, we automatically find attacks on the protocol, showing that the protocol is insecure in the eCK' model. Our attacks prove that the Session-StateReveal query is stronger than the EphemeralKeyReveal query and that the eCK security model is incomparable to the CK model, disproving several claims made in the literature.
在“验证密钥交换的更强安全性”一文中(LaMacchia et al., 2006, 2007),提出了一种新的验证密钥交换协议(eCK)的安全模型。新模型被认为至少与以前的密钥交换协议模型一样强大,例如CK模型(Canetti和Krawczyk, 2001;2005年,杰哈卡胡奇)。该模型包含了一个EphemeralKeyReveal对手查询的新概念,例如LaMacchia等人(2006)、Okamoto(2007)和Ustaoglu(2008)声称,它至少与session - staterreveal查询一样强大。我们通过关注对手查询的差异来研究这两个模型之间的关系。我们正式建模了NAXOS协议和eCK模型的一个变体,称为eCK,其中EphemeralKeyReveal查询被Session-StateReveal查询所取代。使用正式的协议分析工具Scyther,我们自动发现对协议的攻击,表明协议在eCK模型中是不安全的。我们的攻击证明了Session-StateReveal查询比EphemeralKeyReveal查询更强大,eCK安全模型无法与CK模型相比,反驳了文献中的一些说法。
{"title":"Session-StateReveal is stronger than eCKs EphemeralKeyReveal: using automatic analysis to attack the NAXOS protocol","authors":"C. Cremers","doi":"10.1504/IJACT.2010.038304","DOIUrl":"https://doi.org/10.1504/IJACT.2010.038304","url":null,"abstract":"In the paper, 'stronger security of authenticated key exchange' (LaMacchia et al., 2006, 2007), a new security model for authenticated key exchange protocols (eCK) is proposed. The new model is suggested to be at least as strong as previous models for key exchange protocols, such as the CK model (Canetti and Krawczyk, 2001; Krawczyk, 2005). The model includes a new notion of an EphemeralKeyReveal adversary query, which is claimed in e.g., LaMacchia et al. (2006), Okamoto (2007), and Ustaoglu (2008), to be at least as strong as the Session-StateReveal query. We investigate the relation between the two models by focusing on the difference in adversary queries. We formally model the NAXOS protocol and a variant of the eCK model, called eCK', in which the EphemeralKeyReveal query is replaced by the Session-StateReveal query. Using Scyther, a formal protocol analysis tool, we automatically find attacks on the protocol, showing that the protocol is insecure in the eCK' model. Our attacks prove that the Session-StateReveal query is stronger than the EphemeralKeyReveal query and that the eCK security model is incomparable to the CK model, disproving several claims made in the literature.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133856779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optimality 无向同步网络中无条件可靠安全的消息传输:可能性、可行性和最优性
Pub Date : 1900-01-01 DOI: 10.1504/IJACT.2010.038309
A. Patra, Ashish Choudhury, C. Pandu Rangan, Kannan Srinathan
We study the interplay of network connectivity and the issues related to the 'possibility', 'feasibility' and 'optimality' for unconditionally reliable message transmission (URMT) and unconditionally secure message transmission (USMT) in an undirected synchronous network, under the influence of an adaptive mixed adversary having unbounded computing power, who can corrupt some of the nodes in the network in Byzantine, omission, fail-stop and passive fashion respectively. We consider two types of adversary, namely threshold and non-threshold. One of the important conclusions we arrive at from our study is that allowing a negligible error probability significantly helps in the 'possibility', 'feasibility' and 'optimality' of both reliable and secure message transmission protocols. To design our protocols, we propose several new techniques which are of independent interest.
我们研究了网络连接的相互作用以及在无向同步网络中无条件可靠消息传输(URMT)和无条件安全消息传输(USMT)的“可能性”,“可行性”和“最优性”相关问题,在具有无限计算能力的自适应混合对手的影响下,他们可以分别以拜占庭,遗漏,故障停止和被动方式破坏网络中的一些节点。我们考虑两种类型的对手,即阈值和非阈值。我们从研究中得出的一个重要结论是,允许可以忽略不计的错误概率大大有助于可靠和安全的消息传输协议的“可能性”,“可行性”和“最优性”。为了设计我们的协议,我们提出了几个独立感兴趣的新技术。
{"title":"Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optimality","authors":"A. Patra, Ashish Choudhury, C. Pandu Rangan, Kannan Srinathan","doi":"10.1504/IJACT.2010.038309","DOIUrl":"https://doi.org/10.1504/IJACT.2010.038309","url":null,"abstract":"We study the interplay of network connectivity and the issues related to the 'possibility', 'feasibility' and 'optimality' for unconditionally reliable message transmission (URMT) and unconditionally secure message transmission (USMT) in an undirected synchronous network, under the influence of an adaptive mixed adversary having unbounded computing power, who can corrupt some of the nodes in the network in Byzantine, omission, fail-stop and passive fashion respectively. We consider two types of adversary, namely threshold and non-threshold. One of the important conclusions we arrive at from our study is that allowing a negligible error probability significantly helps in the 'possibility', 'feasibility' and 'optimality' of both reliable and secure message transmission protocols. To design our protocols, we propose several new techniques which are of independent interest.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125175630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
On the separation between the FHMQV and HMQV protocols 关于FHMQV和HMQV协议的分离
Pub Date : 1900-01-01 DOI: 10.1504/IJACT.2017.10010330
Augustin P. Sarr, P. Elbaz-Vincent
The HMQV protocol is under consideration for IEEE P1363 standardisation. We provide a complementary analysis of the HMQV(-C) protocol. Namely, we point out a key compromise impersonation and a man-in-the-middle attack in the case of a static private key leakage, showing that the HMQV(-C) protocols cannot achieve their security goals. Next, we revisit the FHMQV building blocks, design and security arguments. We clarify the security and efficiency separation between HMQV and FHMQV, showing the advantages of FHMQV over HMQV.
HMQV协议正在考虑IEEE P1363标准化。我们提供了HMQV(c)协议的补充分析。也就是说,我们指出了在静态私钥泄漏的情况下的密钥泄露模拟和中间人攻击,表明HMQV(-C)协议无法实现其安全目标。接下来,我们将回顾FHMQV的构建模块、设计和安全论证。阐明了HMQV和FHMQV在安全性和效率上的分离,说明了FHMQV相对于HMQV的优势。
{"title":"On the separation between the FHMQV and HMQV protocols","authors":"Augustin P. Sarr, P. Elbaz-Vincent","doi":"10.1504/IJACT.2017.10010330","DOIUrl":"https://doi.org/10.1504/IJACT.2017.10010330","url":null,"abstract":"The HMQV protocol is under consideration for IEEE P1363 standardisation. We provide a complementary analysis of the HMQV(-C) protocol. Namely, we point out a key compromise impersonation and a man-in-the-middle attack in the case of a static private key leakage, showing that the HMQV(-C) protocols cannot achieve their security goals. Next, we revisit the FHMQV building blocks, design and security arguments. We clarify the security and efficiency separation between HMQV and FHMQV, showing the advantages of FHMQV over HMQV.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121421727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Theoretical and practical aspects of mutual information-based side channel analysis 基于互信息的侧信道分析的理论和实践方面
Pub Date : 1900-01-01 DOI: 10.1504/IJACT.2010.038306
E. Prouff, Matthieu Rivain
A large variety of side channel analyses performed on embedded devices involve the linear correlation coefficient as wrong-key distinguisher. This coefficient is actually a sound statistical tool to quantify linear dependencies between univariate variables. At CHES 2008, Gierlichs et al. proposed to use the mutual information measure as an alternative to the correlation coefficient since it detects any kind of statistical dependency. Substituting it for the correlation coefficient may indeed be considered as a natural extension of the existing attacks. Nevertheless, the first published applications have raised several open issues. In this paper, we conduct a theoretical analysis of MIA in the Gaussian leakage model to explore the reasons why and when it is a sound key recovery attack. Also, we generalise MIA to higher-orders (i.e., against masked implementations). Secondly, we address the main practical issue of MIA: the mutual information estimation which itself relies on the estimation of statistical distributions. We describe three classical estimation methods and we apply them in the context of MIA. Eventually, we present various attack simulations and practical attack experiments that allow us to check the efficiency of MIA in practice and to compare it to classical correlation-based attacks.
在嵌入式设备上进行的各种各样的侧信道分析都涉及到线性相关系数作为错键区分器。这个系数实际上是一个可靠的统计工具,可以量化单变量之间的线性依赖关系。在CHES 2008上,Gierlichs等人提议使用互信息度量作为相关系数的替代方法,因为它可以检测到任何类型的统计依赖性。用它来代替相关系数确实可以看作是现有攻击的自然延伸。然而,第一批公布的应用程序引发了几个悬而未决的问题。在本文中,我们对高斯泄漏模型下的MIA进行了理论分析,探讨了它是一种健全的密钥恢复攻击的原因和时间。此外,我们将MIA推广到更高阶(即,针对掩码实现)。其次,我们解决了MIA的主要实际问题:互信息估计,它本身依赖于统计分布的估计。我们描述了三种经典的估计方法,并将它们应用于MIA。最后,我们提出了各种攻击模拟和实际攻击实验,使我们能够在实践中检查MIA的效率,并将其与经典的基于相关的攻击进行比较。
{"title":"Theoretical and practical aspects of mutual information-based side channel analysis","authors":"E. Prouff, Matthieu Rivain","doi":"10.1504/IJACT.2010.038306","DOIUrl":"https://doi.org/10.1504/IJACT.2010.038306","url":null,"abstract":"A large variety of side channel analyses performed on embedded devices involve the linear correlation coefficient as wrong-key distinguisher. This coefficient is actually a sound statistical tool to quantify linear dependencies between univariate variables. At CHES 2008, Gierlichs et al. proposed to use the mutual information measure as an alternative to the correlation coefficient since it detects any kind of statistical dependency. Substituting it for the correlation coefficient may indeed be considered as a natural extension of the existing attacks. Nevertheless, the first published applications have raised several open issues. In this paper, we conduct a theoretical analysis of MIA in the Gaussian leakage model to explore the reasons why and when it is a sound key recovery attack. Also, we generalise MIA to higher-orders (i.e., against masked implementations). Secondly, we address the main practical issue of MIA: the mutual information estimation which itself relies on the estimation of statistical distributions. We describe three classical estimation methods and we apply them in the context of MIA. Eventually, we present various attack simulations and practical attack experiments that allow us to check the efficiency of MIA in practice and to compare it to classical correlation-based attacks.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125761431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 105
On reusing ephemeral keys in Diffie-Hellman key agreement protocols Diffie-Hellman密钥协议中临时密钥的重用
Pub Date : 1900-01-01 DOI: 10.1504/IJACT.2010.038308
A. Menezes, Berkant Ustaoglu
A party may choose to reuse ephemeral public keys in a Diffie-Hellman key agreement protocol in order to reduce its computational workload or to mitigate against denial-of-service attacks. In this note, we show that small-subgroup attacks can be successfully launched on some Diffie-Hellman protocols that reuse ephemeral keys if domain parameters are not appropriately selected or if public keys are not appropriately validated.
一方可以选择在Diffie-Hellman密钥协议中重用临时公钥,以减少其计算工作量或减轻拒绝服务攻击。在这篇文章中,我们展示了如果域参数没有正确选择或公钥没有正确验证,那么在一些重用临时密钥的Diffie-Hellman协议上可以成功发起小子组攻击。
{"title":"On reusing ephemeral keys in Diffie-Hellman key agreement protocols","authors":"A. Menezes, Berkant Ustaoglu","doi":"10.1504/IJACT.2010.038308","DOIUrl":"https://doi.org/10.1504/IJACT.2010.038308","url":null,"abstract":"A party may choose to reuse ephemeral public keys in a Diffie-Hellman key agreement protocol in order to reduce its computational workload or to mitigate against denial-of-service attacks. In this note, we show that small-subgroup attacks can be successfully launched on some Diffie-Hellman protocols that reuse ephemeral keys if domain parameters are not appropriately selected or if public keys are not appropriately validated.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"80 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131893047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
A novel architecture to make anonymous blind signature-based e-coins more efficient and applicable 一种新颖的体系结构,使基于匿名盲签名的电子货币更加高效和适用
Pub Date : 1900-01-01 DOI: 10.1504/ijact.2022.10056083
Zhuo Chen
{"title":"A novel architecture to make anonymous blind signature-based e-coins more efficient and applicable","authors":"Zhuo Chen","doi":"10.1504/ijact.2022.10056083","DOIUrl":"https://doi.org/10.1504/ijact.2022.10056083","url":null,"abstract":"","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125684878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Int. J. Appl. Cryptogr.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1