首页> 外文会议>International conference on the theory and application of cryptology and information security >Reverse-Engineering of the Cryptanalytic Attack Used in the Flame Super-Malware
【24h】

Reverse-Engineering of the Cryptanalytic Attack Used in the Flame Super-Malware

机译:火焰超级恶意软件中使用的密码分析攻击的逆向工程

获取原文

摘要

In May 2012, a highly advanced malware for espionage dubbed Flame was found targeting the Middle-East. As it turned out, it used a forged signature to infect Windows machines by MITM-ing Windows Update. Using counter-cryptanalysis, Stevens found that the forged signature was made possible by a chosen-prefix attack on MD5. He uncovered some details that prove that this attack differs from collision attacks in the public literature, yet many questions about techniques and complexity remained unanswered. In this paper, we demonstrate that significantly more information can be deduced from the example collision. Namely, that these details are actually sufficient to reconstruct the collision attack to a great extent using some weak logical assumptions. In particular, we contribute an analysis of the differential path family for each of the four near-collision blocks, the chaining value differences elimination procedure and a complexity analysis of the near-collision block attacks and the associated birthday search for various parameter choices. Furthermore, we were able to prove a lower-bound for the attack's complexity. This reverse-engineering of a non-academic cryptanalytic attack exploited in the real world seems to be without precedent. As it allegedly was developed by some nation-state(s), we discuss potential insights to their cryptanalytic knowledge and capabilities.
机译:2012年5月,针对中东的间谍软件被发现为一种名为Flame的高度先进的恶意软件。事实证明,它使用伪造的签名通过MITM-ing Windows Update感染Windows计算机。通过使用反密码分析,史蒂文斯发现伪造的签名是由于对MD5的选定前缀攻击而成为可能的。他发现了一些细节,证明了这种攻击与公共文献中的碰撞攻击不同,但是有关技术和复杂性的许多问题仍未得到解答。在本文中,我们证明了可以从示例碰撞中推断出明显更多的信息。即,使用一些弱逻辑假设,这些细节实际上足以在很大程度上重建碰撞攻击。特别是,我们对四个近碰撞块中的每一个的差分路径族进行了分析,链接值差异消除过程以及对近碰撞块攻击的复杂性分析以及为各种参数选择进行的关联生日搜索。此外,我们能够证明攻击的复杂性较低。这种在现实世界中利用的非学术性密码分析攻击的逆向工程似乎没有先例。由于它是由某些国家开发的,因此我们讨论了对其密码分析知识和功能的潜在见解。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号