Author:
Armour Marcel,Poettering Bertram
Abstract
This work introduces Algorithm Substitution Attacks (ASAs) on message authentication schemes. In light of revelations concerning mass surveillance, ASAs were initially introduced by Bellare, Paterson and Rogaway as a novel attack class against the confidentiality of encryption schemes. Such an attack replaces one or more of the regular scheme algorithms with a subverted version that aims to reveal information to an adversary (engaged in mass surveillance), while remaining undetected by users. While most prior work focused on subverting encryption systems, we study options to subvert symmetric message authentication protocols. In particular we provide powerful generic attacks that apply e.g. to HMAC or Carter–Wegman based schemes, inducing only a negligible implementation overhead. As subverted authentication can act as an enabler for subverted encryption (software updates can be manipulated to include replacements of encryption routines), we consider attacks of the new class highly impactful and dangerous.
Publisher
Universitatsbibliothek der Ruhr-Universitat Bochum
Subject
Applied Mathematics,Computational Mathematics,Computer Science Applications,Software
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Cryptographic Reverse Firewall for Digital Signature in Fog Computing;2023 6th International Conference on Software Engineering and Computer Science (CSECS);2023-12-22
2. Security Challenges in Multi-UAV Systems Communication Network;Unmanned Aerial Vehicles Applications: Challenges and Trends;2023
3. Substitution Attacks Against Sigma Protocols;Cyberspace Safety and Security;2022
4. Cryptographic reverse firewalls for interactive proof systems;Theoretical Computer Science;2021-02
5. Subverting Decryption in AEAD;Cryptography and Coding;2019