首页> 外文会议>Information Security and Privacy >Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts
【24h】

Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts

机译:对利用低熵明文的黑盒密码的后门攻击

获取原文

摘要

There has been much recent research in designing symmetric ciphers with backdoors that have either public designs or black-box designs. Current Digital Rights Management needs have resurrected the use of hidden ciphers (which were traditionally suggested by the government as black-box designs) in the form of obfuscated "white-box" algorithms. A recent backdoor proposal is the Monkey cipher which is intended to have a secret design and that can be implemented using any deterministic trapdoor one-way function. Monkey leaks information about its user's key to the designer. The primary drawback of Monkey is that it requires the designer (attacker) to obtain a sufficient number of ciphertexts all under the same symmetric key, such that each contains one known plaintext bit. In this paper a new design is proposed that eliminates the need for known plaintext entirely. Also, whereas Monkey reveals one plaintext bit of each ciphertext to the reverse-engineer (i.e., an entity that tries to learn the black-box device), our solution only leaks a bound on the message entropy to the reverse-engineer, while requiring that the designer obtain a sufficient number of ciphertexts that encrypt messages with a requisite level of redundancy. The information leakage method we use employs "data compression" as a basic tool for generating a hidden information channel. This highlights the need to only encrypt compressed strings when a block cipher with a secret design must be used.
机译:在设计带有公共设计或黑匣子设计的后门的对称密码方面,最近进行了很多研究。当前的数字版权管理需求已经以模糊的“白盒”算法的形式恢复了对隐藏密码(传统上由政府建议为黑盒设计)的使用。最近的后门提议是猴子密码,该密码旨在具有秘密设计,并且可以使用任何确定性陷门单向功能来实施。 Monkey将有关其用户密钥的信息泄漏给设计者。 Monkey的主要缺点在于,它要求设计者(攻击者)在相同的对称密钥下都获得足够数量的密文,从而每个密文都包含一个已知的明文位。在本文中,提出了一种新设计,该设计完全消除了对已知明文的需求。同样,虽然Monkey向逆向工程人员(即试图学习黑匣子设备的实体)揭示了每个密文的一个纯文本位,但我们的解决方案仅向逆向工程人员泄漏了消息熵的界限。设计人员获得足够数量的密文,以必需的冗余级别对消息进行加密。我们使用的信息泄漏方法采用“数据压缩”作为生成隐藏信息通道的基本工具。这突出了仅当必须使用具有秘密设计的分组密码时才需要加密压缩的字符串。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号