Diffusion
and a Key-Recovery Attack on a WM Scheme by Li and Yuan (Hans) Georg Schaathun
Department of Computing University of Surrey
22-23 September 2008
(Hans) Georg Schaathun Diffusion 22-23 September 2008 1 / 23
Diffusion and a Key-Recovery Attack on a WM Scheme by Li and Yuan - - PowerPoint PPT Presentation
Diffusion and a Key-Recovery Attack on a WM Scheme by Li and Yuan (Hans) Georg Schaathun Department of Computing University of Surrey 22-23 September 2008 (Hans) Georg Schaathun Diffusion 22-23 September 2008 1 / 23 Do not reuse the key
(Hans) Georg Schaathun Diffusion 22-23 September 2008 1 / 23
(Hans) Georg Schaathun Diffusion 22-23 September 2008 2 / 23
(Hans) Georg Schaathun Diffusion 22-23 September 2008 3 / 23
(Hans) Georg Schaathun Diffusion 22-23 September 2008 3 / 23
(Hans) Georg Schaathun Diffusion 22-23 September 2008 3 / 23
Authentication and Watermarking
(Hans) Georg Schaathun Diffusion 22-23 September 2008 4 / 23
Authentication and Watermarking
Message Recovered Host File
(Hans) Georg Schaathun Diffusion 22-23 September 2008 5 / 23
Authentication and Watermarking
Message Recovered Host File
(Hans) Georg Schaathun Diffusion 22-23 September 2008 5 / 23
Authentication and Watermarking
Message Recovered Host File
(Hans) Georg Schaathun Diffusion 22-23 September 2008 5 / 23
Authentication and Watermarking
Message Recovered Key Host File
(Hans) Georg Schaathun Diffusion 22-23 September 2008 5 / 23
Authentication and Watermarking
(Hans) Georg Schaathun Diffusion 22-23 September 2008 6 / 23
Authentication and Watermarking
(Hans) Georg Schaathun Diffusion 22-23 September 2008 6 / 23
Authentication and Watermarking
(Hans) Georg Schaathun Diffusion 22-23 September 2008 7 / 23
Authentication and Watermarking
(Hans) Georg Schaathun Diffusion 22-23 September 2008 7 / 23
Authentication and Watermarking
(Hans) Georg Schaathun Diffusion 22-23 September 2008 7 / 23
Authentication and Watermarking
(Hans) Georg Schaathun Diffusion 22-23 September 2008 8 / 23
Authentication and Watermarking
(Hans) Georg Schaathun Diffusion 22-23 September 2008 8 / 23
Authentication and Watermarking
(Hans) Georg Schaathun Diffusion 22-23 September 2008 8 / 23
Authentication and Watermarking
(Hans) Georg Schaathun Diffusion 22-23 September 2008 8 / 23
Authentication and Watermarking
(Hans) Georg Schaathun Diffusion 22-23 September 2008 9 / 23
Authentication and Watermarking
(Hans) Georg Schaathun Diffusion 22-23 September 2008 9 / 23
Authentication and Watermarking
(Hans) Georg Schaathun Diffusion 22-23 September 2008 9 / 23
Li-Yuan Authentication WM
(Hans) Georg Schaathun Diffusion 22-23 September 2008 10 / 23
Li-Yuan Authentication WM
(Hans) Georg Schaathun Diffusion 22-23 September 2008 11 / 23
Li-Yuan Authentication WM
(Hans) Georg Schaathun Diffusion 22-23 September 2008 11 / 23
Li-Yuan Authentication WM
(Hans) Georg Schaathun Diffusion 22-23 September 2008 11 / 23
Li-Yuan Authentication WM
(Hans) Georg Schaathun Diffusion 22-23 September 2008 11 / 23
Li-Yuan Authentication WM
(Hans) Georg Schaathun Diffusion 22-23 September 2008 11 / 23
Li-Yuan Authentication WM
1
2
(Hans) Georg Schaathun Diffusion 22-23 September 2008 12 / 23
Li-Yuan Authentication WM
1
2
(Hans) Georg Schaathun Diffusion 22-23 September 2008 12 / 23
Li-Yuan Authentication WM
1
2
(Hans) Georg Schaathun Diffusion 22-23 September 2008 12 / 23
Li-Yuan Authentication WM
(Hans) Georg Schaathun Diffusion 22-23 September 2008 13 / 23
How to break it
(Hans) Georg Schaathun Diffusion 22-23 September 2008 14 / 23
How to break it
(Hans) Georg Schaathun Diffusion 22-23 September 2008 15 / 23
How to break it
(Hans) Georg Schaathun Diffusion 22-23 September 2008 15 / 23
How to break it
(Hans) Georg Schaathun Diffusion 22-23 September 2008 15 / 23
How to break it
(Hans) Georg Schaathun Diffusion 22-23 September 2008 15 / 23
How to break it
(Hans) Georg Schaathun Diffusion 22-23 September 2008 16 / 23
How to break it
1
i (x, y) (i = 1, 2) from xi
2
1 and tentative key
1(x, y) mod 2 = ˆ
3
1 and w′ 2
1(x, y) = w′ 2(x, y) : reject ˆ
(Hans) Georg Schaathun Diffusion 22-23 September 2008 17 / 23
How to break it
(Hans) Georg Schaathun Diffusion 22-23 September 2008 18 / 23
How to fix it – maybe
(Hans) Georg Schaathun Diffusion 22-23 September 2008 19 / 23
How to fix it – maybe
(Hans) Georg Schaathun Diffusion 22-23 September 2008 20 / 23
How to fix it – maybe
(Hans) Georg Schaathun Diffusion 22-23 September 2008 20 / 23
How to fix it – maybe
(Hans) Georg Schaathun Diffusion 22-23 September 2008 20 / 23
How to fix it – maybe
(Hans) Georg Schaathun Diffusion 22-23 September 2008 21 / 23
Closure
(Hans) Georg Schaathun Diffusion 22-23 September 2008 22 / 23
Closure
(Hans) Georg Schaathun Diffusion 22-23 September 2008 23 / 23
Closure
(Hans) Georg Schaathun Diffusion 22-23 September 2008 23 / 23