In this paper, we study algorithm substitution attacks (ASAs), where an algorithm in a cryptographic scheme is substituted for a subverted version. First, we formalize and study the use of state resets to detect ASAs, and show that many published stateful ASAs are detectable with simple practical methods relying on state resets. Second, we introduce two asymmetric ASAs on symmetric encryption, which are undetectable or unexploitable even by an adversary who knows the embedded subversion key. We also generalize this result, allowing for any symmetric ASA (on any cryptographic scheme) satisfying certain properties to be transformed into an asymmetric ASA. Our work demonstrates the broad application of the techniques first introduced by Bellar...
Motivated by the currently widespread concern about mass surveillance of encrypted communications, ...
Algorithm substitution attack (ASA) on signatures can have severe consequences as the authentication...
We put forward the notion of self-guarding cryptographic protocols as a countermeasure to algorithm ...
In this paper, we study algorithm substitution attacks (ASAs), where an algorithm in a cryptographic...
The field of cryptography has made incredible progress in the last several decades. With the formali...
We present new algorithm-substitution attacks (ASAs) on symmetric encryption that improve over prior...
This work introduces Algorithm Substitution Attacks (ASAs) on message authentication schemes. In lig...
This work introduces Algorithm Substitution Attacks (ASAs) on message authentication schemes. In lig...
We present new algorithm-substitution attacks (ASAs) on symmetric encryption that im-prove over prio...
The security of digital communication relies on few cryptographic protocols that are used to protect...
This work introduces a new class of Algorithm Substitution Attack (ASA) on Symmetric Encryption Sche...
Abstract. Motivated by revelations concerning population-wide surveillance of encrypted communicatio...
At CRYPTO 2014 Bellare, Paterson, and Rogaway (BPR) presented a formal treatment of symmetric encryp...
In this work, we study and formalize security notions for algorithm substitution attacks (ASAs) on e...
Abstract. At CRYPTO 2014 Bellare, Paterson, and Rogaway (BPR) presented a formal treatment of symmet...
Motivated by the currently widespread concern about mass surveillance of encrypted communications, ...
Algorithm substitution attack (ASA) on signatures can have severe consequences as the authentication...
We put forward the notion of self-guarding cryptographic protocols as a countermeasure to algorithm ...
In this paper, we study algorithm substitution attacks (ASAs), where an algorithm in a cryptographic...
The field of cryptography has made incredible progress in the last several decades. With the formali...
We present new algorithm-substitution attacks (ASAs) on symmetric encryption that improve over prior...
This work introduces Algorithm Substitution Attacks (ASAs) on message authentication schemes. In lig...
This work introduces Algorithm Substitution Attacks (ASAs) on message authentication schemes. In lig...
We present new algorithm-substitution attacks (ASAs) on symmetric encryption that im-prove over prio...
The security of digital communication relies on few cryptographic protocols that are used to protect...
This work introduces a new class of Algorithm Substitution Attack (ASA) on Symmetric Encryption Sche...
Abstract. Motivated by revelations concerning population-wide surveillance of encrypted communicatio...
At CRYPTO 2014 Bellare, Paterson, and Rogaway (BPR) presented a formal treatment of symmetric encryp...
In this work, we study and formalize security notions for algorithm substitution attacks (ASAs) on e...
Abstract. At CRYPTO 2014 Bellare, Paterson, and Rogaway (BPR) presented a formal treatment of symmet...
Motivated by the currently widespread concern about mass surveillance of encrypted communications, ...
Algorithm substitution attack (ASA) on signatures can have severe consequences as the authentication...
We put forward the notion of self-guarding cryptographic protocols as a countermeasure to algorithm ...