首页> 外文会议>International Conference on the Theory and Application of Cryptology and Information Security >Reverse-Engineering of the Cryptanalytic Attack Used in the Flame Super-Malware
【24h】

Reverse-Engineering of the Cryptanalytic Attack Used in the Flame Super-Malware

机译:火焰超恶意软件中使用的密码攻击的逆向工程

获取原文

摘要

In May 2012, a highly advanced malware for espionage dubbed Flame was found targeting the Middle-East. As it turned out, it used a forged signature to infect Windows machines by MITM-ing Windows Update. Using counter-cryptanalysis, Stevens found that the forged signature was made possible by a chosen-prefix attack on MD5 [25]. He uncovered some details that prove that this attack differs from collision attacks in the public literature, yet many questions about techniques and complexity remained unanswered. In this paper, we demonstrate that significantly more information can be deduced from the example collision. Namely, that these details are actually sufficient to reconstruct the collision attack to a great extent using some weak logical assumptions. In particular, we contribute an analysis of the differential path family for each of the four near-collision blocks, the chaining value differences elimination procedure and a complexity analysis of the near-collision block attacks and the associated birthday search for various parameter choices. Furthermore, we were able to prove a lower-bound for the attack's complexity. This reverse-engineering of a non-academic cryptanalytic attack exploited in the real world seems to be without precedent. As it allegedly was developed by some nation-state(s) [11,12,19], we discuss potential insights to their cryptanalytic knowledge and capabilities.
机译:2012年5月,发现了一个高度先进的恶意软件,被认为是中东的刺激。事实证明,它使用伪造的签名来通过MITM-ING Windows更新来感染Windows机器。使用反核分析,史蒂文斯发现通过在MD5 [25]上的选定前缀攻击来实现锻造签名。他发现一些细节,证明这种攻击与公共文献中的碰撞攻击不同,但关于技术和复杂性的许多问题仍未得到答复。在本文中,我们证明可以从示例碰撞中推导出更多信息。即,这些细节实际上是足以使用一些弱逻辑假设在很大程度上重建碰撞攻击。特别地,我们为四个近碰撞块中的每一个进行差分路径家庭的分析,链接值差消除过程和近乎碰撞块攻击的复杂性分析以及相关的生日搜索各种参数选择。此外,我们能够证明攻击的复杂性的较低限制。在现实世界中剥削的非学术密码袭击的逆向工程似乎没有先例。据称是由一些国家制定的[11,12,19],我们讨论了对其密码知识和能力的潜在见解。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号