In this paper, we study algorithm substitution attacks (ASAs), where an algorithm in a cryptographic scheme is substituted for a subverted version. First, we formalize and study the use of state resets to detect ASAs, and show that many published stateful ASAs are detectable with simple practical methods relying on state resets. Second, we introduce two asymmetric ASAs on symmetric encryption, which are undetectable or unexploitable even by an adversary who knows the embedded subversion key. We also generalize this result, allowing for any symmetric ASA (on any cryptographic scheme) satisfying certain properties to be transformed into an asymmetric ASA. Our work demonstrates the broad application of the techniques first introduced by Bellar...
An algorithm substitution attack (ASA) can undermine the security of cryptographic primitives by sub...
Abstract. At CRYPTO 2014 Bellare, Paterson, and Rogaway (BPR) presented a formal treatment of symmet...
An attack mutation algorithm takes a known instance of an attack and transforms it into many distinc...
In this paper, we study algorithm substitution attacks (ASAs), where an algorithm in a cryptographic...
The field of cryptography has made incredible progress in the last several decades. With the formali...
We present new algorithm-substitution attacks (ASAs) on symmetric encryption that im-prove over prio...
This work introduces Algorithm Substitution Attacks (ASAs) on message authentication schemes. In lig...
This work introduces Algorithm Substitution Attacks (ASAs) on message authentication schemes. In lig...
This work introduces a new class of Algorithm Substitution Attack (ASA) on Symmetric Encryption Sche...
Abstract. Motivated by revelations concerning population-wide surveillance of encrypted communicatio...
We present new algorithm-substitution attacks (ASAs) on symmetric encryption that improve over prior...
Algorithm substitution attack (ASA) on signatures can have severe consequences as the authentication...
An algorithm substitution attack (ASA) can undermine the security of cryptographic primitives by sub...
The security of digital communication relies on few cryptographic protocols that are used to protect...
In this work, we study and formalize security notions for algorithm substitution attacks (ASAs) on e...
An algorithm substitution attack (ASA) can undermine the security of cryptographic primitives by sub...
Abstract. At CRYPTO 2014 Bellare, Paterson, and Rogaway (BPR) presented a formal treatment of symmet...
An attack mutation algorithm takes a known instance of an attack and transforms it into many distinc...
In this paper, we study algorithm substitution attacks (ASAs), where an algorithm in a cryptographic...
The field of cryptography has made incredible progress in the last several decades. With the formali...
We present new algorithm-substitution attacks (ASAs) on symmetric encryption that im-prove over prio...
This work introduces Algorithm Substitution Attacks (ASAs) on message authentication schemes. In lig...
This work introduces Algorithm Substitution Attacks (ASAs) on message authentication schemes. In lig...
This work introduces a new class of Algorithm Substitution Attack (ASA) on Symmetric Encryption Sche...
Abstract. Motivated by revelations concerning population-wide surveillance of encrypted communicatio...
We present new algorithm-substitution attacks (ASAs) on symmetric encryption that improve over prior...
Algorithm substitution attack (ASA) on signatures can have severe consequences as the authentication...
An algorithm substitution attack (ASA) can undermine the security of cryptographic primitives by sub...
The security of digital communication relies on few cryptographic protocols that are used to protect...
In this work, we study and formalize security notions for algorithm substitution attacks (ASAs) on e...
An algorithm substitution attack (ASA) can undermine the security of cryptographic primitives by sub...
Abstract. At CRYPTO 2014 Bellare, Paterson, and Rogaway (BPR) presented a formal treatment of symmet...
An attack mutation algorithm takes a known instance of an attack and transforms it into many distinc...