TU Darmstadt / ULB / TUbiblio

Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks

Fischlin, Marc and Mazaheri, Sogol (2018):
Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks.
In: 2018 IEEE 31st Computer Security Foundations Symposium (CSF), IEEE, In: 2018 IEEE 31st Computer Security Foundations Symposium (CSF), Oxford, UK, 9.-12.7. 2018, DOI: 10.1109/CSF.2018.00013, [Conference or Workshop Item]

Abstract

We put forward the notion of self-guarding cryptographic protocols as a countermeasure to algorithm substitution attacks. Such self-guarding protocols can prevent undesirable leakage by subverted algorithms if one has the guarantee that the system has been properly working in an initialization phase. Unlike detection-based solutions they thus proactively thwart attacks, and unlike reverse firewalls they do not assume an online external party. We present constructions of basic primitives for (public-key and private-key) encryption and for signatures. We also argue that the model captures attacks with malicious hardware tokens and show how to self-guard a PUF-based key exchange protocol.

Item Type: Conference or Workshop Item
Erschienen: 2018
Creators: Fischlin, Marc and Mazaheri, Sogol
Title: Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks
Language: English
Abstract:

We put forward the notion of self-guarding cryptographic protocols as a countermeasure to algorithm substitution attacks. Such self-guarding protocols can prevent undesirable leakage by subverted algorithms if one has the guarantee that the system has been properly working in an initialization phase. Unlike detection-based solutions they thus proactively thwart attacks, and unlike reverse firewalls they do not assume an online external party. We present constructions of basic primitives for (public-key and private-key) encryption and for signatures. We also argue that the model captures attacks with malicious hardware tokens and show how to self-guard a PUF-based key exchange protocol.

Title of Book: 2018 IEEE 31st Computer Security Foundations Symposium (CSF)
Publisher: IEEE
Uncontrolled Keywords: Solutions; S4
Divisions: 20 Department of Computer Science
20 Department of Computer Science > Cryptography and Complexity Theory
DFG-Collaborative Research Centres (incl. Transregio)
DFG-Collaborative Research Centres (incl. Transregio) > Collaborative Research Centres
Profile Areas
Profile Areas > Cybersecurity (CYSEC)
DFG-Collaborative Research Centres (incl. Transregio) > Collaborative Research Centres > CRC 1119: CROSSING – Cryptography-Based Security Solutions: Enabling Trust in New and Next Generation Computing Environments
Event Title: 2018 IEEE 31st Computer Security Foundations Symposium (CSF)
Event Location: Oxford, UK
Event Dates: 9.-12.7. 2018
Date Deposited: 11 Sep 2018 13:19
DOI: 10.1109/CSF.2018.00013
Related URLs:
Export:

Optionen (nur für Redakteure)

View Item View Item