Cliptography

计算机科学 密码学 计算机安全 实施 密码原语 理论计算机科学 公钥密码术 密码协议 对抗制 加密 程序设计语言 人工智能
作者
Qiang Tang,Moti Yung
标识
DOI:10.1145/3133956.3136065
摘要

This tutorial will present a systematic overview of {\em kleptography}: stealing information subliminally from black-box cryptographic implementations; and {\em cliptography}: defending mechanisms that clip the power of kleptographic attacks via specification re-designs (without altering the underlying algorithms). Despite the laudatory history of development of modern cryptography, applying cryptographic tools to reliably provide security and privacy in practice is notoriously difficult. One fundamental practical challenge, guaranteeing security and privacy without explicit trust in the algorithms and implementations that underlie basic security infrastructure, remains. While the dangers of entertaining adversarial implementation of cryptographic primitives seem obvious, the ramifications of such attacks are surprisingly dire: it turns out that -- in wide generality -- adversarial implementations of cryptographic (both deterministic and randomized) algorithms may leak private information while producing output that is statistically indistinguishable from that of a faithful implementation. Such attacks were formally studied in Kleptography. Snowden revelations has shown us how security and privacy can be lost at a very large scale even when traditional cryptography seems to be used to protect Internet communication, when Kleptography was not taken into consideration. We will first explain how the above-mentioned Kleptographic attacks can be carried out in various settings. We will then introduce several simple but rigorous immunizing strategies that were inspired by folklore practical wisdoms to protect different algorithms from implementation subversion. Those strategies can be applied to ensure security of most of the fundamental cryptographic primitives such as PRG, digital signatures, public key encryptions against kleptographic attacks when they are implemented accordingly. Our new design principles may suggest new standardization methods that help reducing the threats of subverted implementation. We also hope our tutorial to stimulate a community-wise efforts to further tackle the fundamental challenge mentioned at the beginning.

科研通智能强力驱动
Strongly Powered by AbleSci AI
更新
PDF的下载单位、IP信息已删除 (2025-6-4)

科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
owoow发布了新的文献求助10
1秒前
2秒前
杨枝甘露完成签到 ,获得积分10
2秒前
黄婷萱完成签到,获得积分20
2秒前
Morssax完成签到,获得积分10
3秒前
3秒前
3秒前
12完成签到 ,获得积分10
3秒前
uiiii完成签到,获得积分10
4秒前
5秒前
舒舒发布了新的文献求助10
6秒前
6秒前
7秒前
哒哒哒宰发布了新的文献求助10
7秒前
无花果应助larry采纳,获得20
7秒前
7秒前
小付发布了新的文献求助10
8秒前
崔鑫发布了新的文献求助10
8秒前
无花果应助haoliangshi采纳,获得10
8秒前
小马甲应助科研通管家采纳,获得10
8秒前
所所应助科研通管家采纳,获得10
9秒前
科研通AI6应助科研通管家采纳,获得10
9秒前
烟花应助科研通管家采纳,获得10
9秒前
Hello应助科研通管家采纳,获得10
9秒前
脑洞疼应助科研通管家采纳,获得10
9秒前
9秒前
浮游应助科研通管家采纳,获得10
10秒前
10秒前
10秒前
CC酱完成签到,获得积分10
10秒前
鸭鸭应助科研通管家采纳,获得10
10秒前
Owen应助科研通管家采纳,获得10
10秒前
JamesPei应助科研通管家采纳,获得10
10秒前
共享精神应助科研通管家采纳,获得10
10秒前
SciGPT应助啦啦啦采纳,获得10
10秒前
ding应助小鲤鱼吃大菠萝采纳,获得10
11秒前
星辰大海应助科研通管家采纳,获得10
11秒前
11秒前
11秒前
11秒前
高分求助中
(应助此贴封号)【重要!!请各用户(尤其是新用户)详细阅读】【科研通的精品贴汇总】 10000
Iron toxicity and hematopoietic cell transplantation: do we understand why iron affects transplant outcome? 2000
List of 1,091 Public Pension Profiles by Region 1021
EEG in Childhood Epilepsy: Initial Presentation & Long-Term Follow-Up 500
Latent Class and Latent Transition Analysis: With Applications in the Social, Behavioral, and Health Sciences 500
On the application of advanced modeling tools to the SLB analysis in NuScale. Part I: TRACE/PARCS, TRACE/PANTHER and ATHLET/DYN3D 500
L-Arginine Encapsulated Mesoporous MCM-41 Nanoparticles: A Study on In Vitro Release as Well as Kinetics 500
热门求助领域 (近24小时)
化学 材料科学 医学 生物 工程类 有机化学 生物化学 物理 纳米技术 计算机科学 内科学 化学工程 复合材料 物理化学 基因 遗传学 催化作用 冶金 量子力学 光电子学
热门帖子
关注 科研通微信公众号,转发送积分 5473968
求助须知:如何正确求助?哪些是违规求助? 4575944
关于积分的说明 14355443
捐赠科研通 4503647
什么是DOI,文献DOI怎么找? 2467728
邀请新用户注册赠送积分活动 1455528
关于科研通互助平台的介绍 1429555