Network Adversary Attacks against Secure Encryption Schemes

被引:0
|
作者
Gligor, Virgil D. [1 ]
Parno, Bryan [2 ]
Shin, Ji Sun [3 ]
机构
[1] Carnegie Mellon Univ, Dept Comp Engn, Pittsburgh, PA 15213 USA
[2] Microsoft Res, Redmond, WA 98052 USA
[3] Sejong Univ, Dept Comp & Informat Secur, Seoul 143749, South Korea
基金
新加坡国家研究基金会;
关键词
network adversary attacks; symmetric encryption schemes; key-protection properties; block ciphers;
D O I
10.1587/transcom.E98.B.267
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We show that, in practice, a network adversary can achieve decidedly non-negligible advantage in attacking provable key-protection properties; e.g., the "existential key recovery" security and "multi-key hiding" property of typical nonce-based symmetric encryption schemes whenever these schemes are implemented with standard block ciphers. We also show that if a probabilistic encryption scheme uses certain standard block ciphers (e.g., two-key 3DES), then enforcing the security bounds necessary to protect against network adversary attacks will render the scheme impractical for network applications that share group keys amongst many peers. The attacks presented here have three noteworthy implications. First, they help identify key-protection properties that separate the notion of indistinguishability from random bits (IND$) from the strictly weaker notion of indistinguishability of ciphertexts (IND); also, they help establish new relationships among these properties. Second, they show that nonce-based symmetric encryption schemes are typically weaker than probabilistic ones. Third, they illustrate the need to account for the Internet-level growth of adversary capabilities when establishing the useful lifetime of standard block-cipher parameters.
引用
收藏
页码:267 / 279
页数:13
相关论文
共 50 条
  • [1] Tightly Secure Encryption Schemes against Related-Key Attacks
    Han, Shuai
    Liu, Shengli
    Lyu, Lin
    Gu, Dawu
    [J]. COMPUTER JOURNAL, 2018, 61 (12): : 1825 - 1844
  • [2] Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
    Fehr, Serge
    Hofheinz, Dennis
    Kiltz, Eike
    Wee, Hoeteck
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010, 2010, 6110 : 381 - +
  • [3] Outsourcing scheme of ABE encryption secure against malicious adversary
    Ohtake, Go
    Safavi-Naini, Reihaneh
    Zhang, Liang Feng
    [J]. COMPUTERS & SECURITY, 2019, 86 : 437 - 452
  • [4] Outsourcing Scheme of ABE Encryption Secure against Malicious Adversary
    Ohtake, Go
    Safavi-Naini, Reihaneh
    Zhang, Liang Feng
    [J]. ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 71 - 82
  • [5] Encryption Schemes Secure Against Profiling Adversaries
    Diaz-Santiago, Sandra
    Chakraborty, Debrup
    [J]. E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2012, 2014, 455 : 172 - 191
  • [6] SENDER-EQUIVOCABLE ENCRYPTION SCHEMES SECURE AGAINST CHOSEN-CIPHERTEXT ATTACKS REVISITED
    Huang, Zhengan
    Liu, Shengli
    Qin, Baodong
    Chen, Kefei
    [J]. INTERNATIONAL JOURNAL OF APPLIED MATHEMATICS AND COMPUTER SCIENCE, 2015, 25 (02) : 415 - 430
  • [7] Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited
    Huang, Zhengan
    Liu, Shengli
    Qin, Baodong
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 : 369 - 385
  • [8] Attacks against Two Provably Secure Certificateless Signature Schemes
    Hu Guozheng
    Hong Fan
    [J]. 2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL II, 2009, : 246 - +
  • [9] Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness
    Roy, Partha Sarathi
    Dutta, Sabyasachi
    Morozov, Kirill
    Adhikari, Avishek
    Fukushima, Kazuhide
    Kiyomoto, Shinsaku
    Sakurai, Kouichi
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE (ISPEC 2018), 2018, 11125 : 578 - 594
  • [10] On Key Recovery Attacks Against Existing Somewhat Homomorphic Encryption Schemes
    Chenal, Massimo
    Tang, Qiang
    [J]. PROGRESS IN CRYPTOLOGY - LATINCRYPT 2014, 2015, 8895 : 239 - 258