the impact of security proofs two troublesome case
play

The impact of security proofs: two troublesome case studies D. J. - PowerPoint PPT Presentation

The impact of security proofs: two troublesome case studies D. J. Bernstein University of Illinois at Chicago & Technische Universiteit Eindhoven 2004: GCM is published with security proof. 2004: XCBv1 is published. The impact of


  1. The impact of security proofs: two troublesome case studies D. J. Bernstein University of Illinois at Chicago & Technische Universiteit Eindhoven 2004: GCM is published with security proof. 2004: XCBv1 is published.

  2. The impact of security proofs: two troublesome case studies D. J. Bernstein University of Illinois at Chicago & Technische Universiteit Eindhoven 2004: GCM is published with security proof. 2004: XCBv1 is published. 2007: NIST standardizes GCM. 2007: XCBv2 is published with security proof.

  3. The impact of security proofs: two troublesome case studies D. J. Bernstein University of Illinois at Chicago & Technische Universiteit Eindhoven 2004: GCM is published with security proof. 2004: XCBv1 is published. 2007: NIST standardizes GCM. 2007: XCBv2 is published with security proof. 2010: IEEE standardizes XCBv2.

  4. The impact of security proofs: 2014 Wikip two troublesome case studies is used in (MACsec) D. J. Bernstein 802.11ad University of Illinois at Chicago & ANSI (INCITS) Technische Universiteit Eindhoven Security P1619.1 standards, 2004: GCM is published AES-GCM with security proof. NSA Suite 2004: XCBv1 is published. ✿ ✿ ✿ 2007: NIST standardizes GCM. 2007: XCBv2 is published with security proof. 2010: IEEE standardizes XCBv2.

  5. The impact of security proofs: 2014 Wikipedia: “GCM two troublesome case studies is used in the IEEE (MACsec) Ethernet D. J. Bernstein 802.11ad (also kno University of Illinois at Chicago & ANSI (INCITS) Fib Technische Universiteit Eindhoven Security Protocols P1619.1 tape storage, standards, SSH and 2004: GCM is published AES-GCM is included with security proof. NSA Suite B Cryptography ✿ ✿ ✿ 2004: XCBv1 is published. 2007: NIST standardizes GCM. 2007: XCBv2 is published with security proof. 2010: IEEE standardizes XCBv2.

  6. The impact of security proofs: 2014 Wikipedia: “GCM mode two troublesome case studies is used in the IEEE 802.1AE (MACsec) Ethernet security, D. J. Bernstein 802.11ad (also known as WiGig), University of Illinois at Chicago & ANSI (INCITS) Fibre Channel Technische Universiteit Eindhoven Security Protocols (FC-SP), P1619.1 tape storage, IETF standards, SSH and TLS 1.2. 2004: GCM is published AES-GCM is included into the with security proof. NSA Suite B Cryptography. ✿ ✿ ✿ 2004: XCBv1 is published. 2007: NIST standardizes GCM. 2007: XCBv2 is published with security proof. 2010: IEEE standardizes XCBv2.

  7. The impact of security proofs: 2014 Wikipedia: “GCM mode two troublesome case studies is used in the IEEE 802.1AE (MACsec) Ethernet security, IEEE D. J. Bernstein 802.11ad (also known as WiGig), University of Illinois at Chicago & ANSI (INCITS) Fibre Channel Technische Universiteit Eindhoven Security Protocols (FC-SP), IEEE P1619.1 tape storage, IETF IPsec standards, SSH and TLS 1.2. 2004: GCM is published AES-GCM is included into the with security proof. NSA Suite B Cryptography. ✿ ✿ ✿ 2004: XCBv1 is published. 2007: NIST standardizes GCM. 2007: XCBv2 is published with security proof. 2010: IEEE standardizes XCBv2.

  8. The impact of security proofs: 2014 Wikipedia: “GCM mode two troublesome case studies is used in the IEEE 802.1AE (MACsec) Ethernet security, IEEE D. J. Bernstein 802.11ad (also known as WiGig), University of Illinois at Chicago & ANSI (INCITS) Fibre Channel Technische Universiteit Eindhoven Security Protocols (FC-SP), IEEE P1619.1 tape storage, IETF IPsec standards, SSH and TLS 1.2. 2004: GCM is published AES-GCM is included into the with security proof. NSA Suite B Cryptography. ✿ ✿ ✿ 2004: XCBv1 is published. GCM has been proven secure in 2007: NIST standardizes GCM. the concrete security model .” 2007: XCBv2 is published with security proof. 2010: IEEE standardizes XCBv2.

  9. The impact of security proofs: 2014 Wikipedia: “GCM mode two troublesome case studies is used in the IEEE 802.1AE (MACsec) Ethernet security, IEEE D. J. Bernstein 802.11ad (also known as WiGig), University of Illinois at Chicago & ANSI (INCITS) Fibre Channel Technische Universiteit Eindhoven Security Protocols (FC-SP), IEEE P1619.1 tape storage, IETF IPsec standards, SSH and TLS 1.2. 2004: GCM is published AES-GCM is included into the with security proof. NSA Suite B Cryptography. ✿ ✿ ✿ 2004: XCBv1 is published. GCM has been proven secure in 2007: NIST standardizes GCM. the concrete security model .” 2007: XCBv2 is published XCB also widely used? Maybe. with security proof. 2010: IEEE standardizes XCBv2.

  10. impact of security proofs: 2014 Wikipedia: “GCM mode 2012 Iwata–Oha troublesome case studies is used in the IEEE 802.1AE Original (MACsec) Ethernet security, IEEE New attack Bernstein 802.11ad (also known as WiGig), main part University of Illinois at Chicago & ANSI (INCITS) Fibre Channel New pro echnische Universiteit Eindhoven Security Protocols (FC-SP), IEEE P1619.1 tape storage, IETF IPsec standards, SSH and TLS 1.2. GCM is published AES-GCM is included into the security proof. NSA Suite B Cryptography. ✿ ✿ ✿ XCBv1 is published. GCM has been proven secure in NIST standardizes GCM. the concrete security model .” XCBv2 is published XCB also widely used? Maybe. security proof. IEEE standardizes XCBv2.

  11. security proofs: 2014 Wikipedia: “GCM mode 2012 Iwata–Ohashi–Minem case studies is used in the IEEE 802.1AE Original GCM proof (MACsec) Ethernet security, IEEE New attack “invalidates 802.11ad (also known as WiGig), main part of the p Illinois at Chicago & ANSI (INCITS) Fibre Channel New proof, lower Universiteit Eindhoven Security Protocols (FC-SP), IEEE P1619.1 tape storage, IETF IPsec standards, SSH and TLS 1.2. published AES-GCM is included into the of. NSA Suite B Cryptography. ✿ ✿ ✿ published. GCM has been proven secure in standardizes GCM. the concrete security model .” published XCB also widely used? Maybe. of. standardizes XCBv2.

  12. ofs: 2014 Wikipedia: “GCM mode 2012 Iwata–Ohashi–Minema studies is used in the IEEE 802.1AE Original GCM proof was wrong. (MACsec) Ethernet security, IEEE New attack “invalidates the 802.11ad (also known as WiGig), main part of the privacy proof Chicago & ANSI (INCITS) Fibre Channel New proof, lower security level Eindhoven Security Protocols (FC-SP), IEEE P1619.1 tape storage, IETF IPsec standards, SSH and TLS 1.2. AES-GCM is included into the NSA Suite B Cryptography. ✿ ✿ ✿ published. GCM has been proven secure in GCM. the concrete security model .” XCB also widely used? Maybe. CBv2.

  13. 2014 Wikipedia: “GCM mode 2012 Iwata–Ohashi–Minematsu: is used in the IEEE 802.1AE Original GCM proof was wrong. (MACsec) Ethernet security, IEEE New attack “invalidates the 802.11ad (also known as WiGig), main part of the privacy proof”. ANSI (INCITS) Fibre Channel New proof, lower security level . Security Protocols (FC-SP), IEEE P1619.1 tape storage, IETF IPsec standards, SSH and TLS 1.2. AES-GCM is included into the NSA Suite B Cryptography. ✿ ✿ ✿ GCM has been proven secure in the concrete security model .” XCB also widely used? Maybe.

  14. 2014 Wikipedia: “GCM mode 2012 Iwata–Ohashi–Minematsu: is used in the IEEE 802.1AE Original GCM proof was wrong. (MACsec) Ethernet security, IEEE New attack “invalidates the 802.11ad (also known as WiGig), main part of the privacy proof”. ANSI (INCITS) Fibre Channel New proof, lower security level . Security Protocols (FC-SP), IEEE 2013 Chakraborty–Hernandez- P1619.1 tape storage, IETF IPsec Jimenez–Sarkar: Original XCBv2 standards, SSH and TLS 1.2. proof was wrong. New proof for AES-GCM is included into the some message lengths, but the NSA Suite B Cryptography. ✿ ✿ ✿ “resulting bound that can be GCM has been proven secure in proved is much worse than what the concrete security model .” has been claimed by the authors.” XCB also widely used? Maybe.

  15. 2014 Wikipedia: “GCM mode 2012 Iwata–Ohashi–Minematsu: is used in the IEEE 802.1AE Original GCM proof was wrong. (MACsec) Ethernet security, IEEE New attack “invalidates the 802.11ad (also known as WiGig), main part of the privacy proof”. ANSI (INCITS) Fibre Channel New proof, lower security level . Security Protocols (FC-SP), IEEE 2013 Chakraborty–Hernandez- P1619.1 tape storage, IETF IPsec Jimenez–Sarkar: Original XCBv2 standards, SSH and TLS 1.2. proof was wrong. New proof for AES-GCM is included into the some message lengths, but the NSA Suite B Cryptography. ✿ ✿ ✿ “resulting bound that can be GCM has been proven secure in proved is much worse than what the concrete security model .” has been claimed by the authors.” XCB also widely used? Maybe. New efficient attack on XCBv2 for other message lengths.

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend