security of symmetric encryption in the presence of
play

Security of Symmetric Encryption in the Presence of Ciphertext - PowerPoint PPT Presentation

Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation Alexandra Boldyreva, Jean Paul Degabriele , Kenny


  1. Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation Alexandra Boldyreva, Jean Paul Degabriele , Kenny Paterson, and Martijn Stam EUROCRYPT - 19th April 2012 Boldyreva, Degabriele , Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 1/18

  2. Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison Outline of this Talk Ciphertext Fragmentation and Related Problems 1 Formalizing Fragmentation 2 Security Notions 3 4 Constructions and Comparison Boldyreva, Degabriele , Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 2/18

  3. Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison Ciphertext Fragmentation Alice Bob Channel Under normal operation the channel delivers ciphertexts in a fragmented fashion, where: a) The fragmentation pattern is arbitrary. b) But the order of the fragments is preserved. Boldyreva, Degabriele , Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 3/18

  4. Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison Ciphertext Fragmentation Alice Bob Channel Under normal operation the channel delivers ciphertexts in a fragmented fashion, where: a) The fragmentation pattern is arbitrary. b) But the order of the fragments is preserved. Boldyreva, Degabriele , Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 3/18

  5. Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison Ciphertext Fragmentation Alice Bob Channel Under normal operation the channel delivers ciphertexts in a fragmented fashion, where: a) The fragmentation pattern is arbitrary. b) But the order of the fragments is preserved. Boldyreva, Degabriele , Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 3/18

  6. Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison Ciphertext Fragmentation Alice Bob Channel Under normal operation the channel delivers ciphertexts in a fragmented fashion, where: a) The fragmentation pattern is arbitrary. b) But the order of the fragments is preserved. Boldyreva, Degabriele , Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 3/18

  7. Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison Ciphertext Fragmentation Alice Bob Channel Under normal operation the channel delivers ciphertexts in a fragmented fashion, where: a) The fragmentation pattern is arbitrary. b) But the order of the fragments is preserved. Boldyreva, Degabriele , Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 3/18

  8. Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison Why Should We Care? This setting emerges in practice, where encryption schemes have to operate under such conditions. One such instance is that of secure network protocols . However this is NOT captured by the security models currently used in cryptographic theory! Ciphertext fragmentation has given rise to a class of attacks that proved to be fatal in certain cases. This has left a gap between cryptographic theory and practice. Boldyreva, Degabriele , Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 4/18

  9. Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison Ciphertext-Fragmentation Attacks SSH: A proof of security (IND-sfCCA) for SSH was given in [BKN 04] . Yet [APW 09] presented plaintext-recovery attacks against SSH. IPsec in MAC-then-encrypt (CBC): [Kra 01] proves that MAC-then-encrypt with CBC encryption is secure (secure channel [CK 01]). [MT 10] show that MAC-then-encode-then-encrypt (injective / CBC) is secure (secure channel [Mau 11]). [DP 10] present ciphertext-fragmentation attacks against such IPsec configurations. Boldyreva, Degabriele , Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 5/18

  10. Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison Ciphertext-Fragmentation Attacks SSH: A proof of security (IND-sfCCA) for SSH was given in [BKN 04] . Yet [APW 09] presented plaintext-recovery attacks against SSH. IPsec in MAC-then-encrypt (CBC): [Kra 01] proves that MAC-then-encrypt with CBC encryption is secure (secure channel [CK 01]). [MT 10] show that MAC-then-encode-then-encrypt (injective / CBC) is secure (secure channel [Mau 11]). [DP 10] present ciphertext-fragmentation attacks against such IPsec configurations. Boldyreva, Degabriele , Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 5/18

  11. Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison Ciphertext-Fragmentation Attacks SSH: A proof of security (IND-sfCCA) for SSH was given in [BKN 04] . Yet [APW 09] presented plaintext-recovery attacks against SSH. IPsec in MAC-then-encrypt (CBC): [Kra 01] proves that MAC-then-encrypt with CBC encryption is secure (secure channel [CK 01]). [MT 10] show that MAC-then-encode-then-encrypt (injective / CBC) is secure (secure channel [Mau 11]). [DP 10] present ciphertext-fragmentation attacks against such IPsec configurations. Boldyreva, Degabriele , Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 5/18

  12. Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison The SSH Attack (Main Idea) SSH encrypts messages in the following format: 4 bytes 4 bytes 1 byte > 4 bytes Sequence Packet Padding Payload Padding Number Length Length ENCRYPT MAC Ciphertext MAC tag Message Ciphertext Packet SSH commonly uses CBC mode for encryption. Boldyreva, Degabriele , Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 6/18

  13. Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison The SSH Attack (Main Idea) Intercepted Ciphertext Boldyreva, Degabriele , Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 7/18

  14. Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison The SSH Attack (Main Idea) Intercepted Ciphertext c ∗ i Boldyreva, Degabriele , Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 7/18

  15. Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison The SSH Attack (Main Idea) Intercepted Ciphertext c ∗ i Submit for Decryption c ∗ i Boldyreva, Degabriele , Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 7/18

  16. Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison The SSH Attack (Main Idea) Intercepted Ciphertext c ∗ i Submit for Decryption p ∗ i ? Boldyreva, Degabriele , Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 7/18

  17. Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison The SSH Attack (Main Idea) Intercepted Ciphertext c ∗ i Submit for Decryption p ∗ i ? Boldyreva, Degabriele , Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 7/18

  18. Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison The SSH Attack (Main Idea) Intercepted Ciphertext c ∗ i Submit for Decryption p ∗ i ? ⊥ MAC Boldyreva, Degabriele , Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 7/18

  19. Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison The SSH Attack (Main Idea) Intercepted Ciphertext c ∗ i Submit for Decryption p ∗ i ? L ⊥ MAC Boldyreva, Degabriele , Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 7/18

  20. Ciphertext Fragmentation and Related Problems Formalizing Fragmentation Security Notions Constructions and Comparison The SSH Attack (Main Idea) Intercepted Ciphertext c ∗ i Submit for Decryption p ∗ i L L ⊥ MAC Boldyreva, Degabriele , Paterson, and Stam | Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation 7/18

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend