skip to main content
10.1145/3133956.3133993acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Generic Semantic Security against a Kleptographic Adversary

Authors Info & Claims
Published:30 October 2017Publication History

ABSTRACT

Notable recent security incidents have generated intense interest in adversaries which attempt to subvert---perhaps covertly---crypto\-graphic algorithms. In this paper we develop (IND-CPA) Semantically Secure encryption in this challenging setting. This fundamental encryption primitive has been previously studied in the "kleptographic setting," though existing results must relax the model by introducing trusted components or otherwise constraining the subversion power of the adversary: designing a Public Key System that is kletographically semantically secure (with minimal trust) has remained elusive to date. In this work, we finally achieve such systems, even when all relevant cryptographic algorithms are subject to adversarial (kleptographic) subversion. To this end we exploit novel inter-component randomized cryptographic checking techniques (with an offline checking component), combined with common and simple software engineering modular programming techniques (applied to the system's black box specification level). Moreover, our methodology yields a strong generic technique for the preservation of any semantically secure cryptosystem when incorporated into the strong kleptographic adversary setting.

Skip Supplemental Material Section

Supplemental Material

References

  1. Giuseppe Ateniese, Bernardo Magri, and Daniele Venturi. 2015. Subversion-Resilient Signature Schemes. In ACM CCS 15, bibfieldeditorIndrajit Ray, Ninghui Li, and Christopher Kruegel: (Eds.). ACM Press, 364--375. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Mihir Bellare and Viet Tung Hoang 2015. Resisting Randomness Subversion: Fast Deterministic and Hedged Public-Key Encryption in the Standard Model. In EUROCRYPT 2015, Part II (LNCS), bibfieldeditorElisabeth Oswald and Marc Fischlin (Eds.), Vol. Vol. 9057. Springer, Heidelberg, 627--656. https://doi.org/10.1007/978--3--662--46803--6_21Google ScholarGoogle ScholarCross RefCross Ref
  3. Mihir Bellare, Joseph Jaeger, and Daniel Kane. 2015. Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks ACM CCS 15, bibfieldeditorIndrajit Ray, Ninghui Li, and Christopher Kruegel: (Eds.). ACM Press, 1431--1440.Google ScholarGoogle Scholar
  4. Mihir Bellare, Kenneth G. Paterson, and Phillip Rogaway. 2014. Security of Symmetric Encryption against Mass Surveillance CRYPTO 2014, Part I (LNCS), bibfieldeditorJuan A. Garay and Rosario Gennaro (Eds.), Vol. Vol. 8616. Springer, Heidelberg, 1--19. https://doi.org/10.1007/978--3--662--44371--2_1Google ScholarGoogle Scholar
  5. Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, and Mingwu Zhang. 2016. Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions ASIACRYPT 2016, Part I (LNCS), bibfieldeditorJung Hee Cheon and Tsuyoshi Takagi (Eds.), Vol. Vol. 10031. Springer, Heidelberg, 844--876. https://doi.org/10.1007/978--3--662--53887--6_31Google ScholarGoogle Scholar
  6. Jean Paul Degabriele, Pooya Farshim, and Bertram Poettering. 2015. A More Cautious Approach to Security Against Mass Surveillance FSE 2015 (LNCS), bibfieldeditorGregor Leander (Ed.), Vol. Vol. 9054. Springer, Heidelberg, 579--598. https://doi.org/10.1007/978--3--662--48116--5_28Google ScholarGoogle Scholar
  7. Yvo Desmedt. 1988. Subliminal-Free Authentication and Signature (Extended Abstract) EUROCRYPT'88 (LNCS), bibfieldeditorC. G. Günther (Ed.), Vol. Vol. 330. Springer, Heidelberg, 23--33.Google ScholarGoogle Scholar
  8. Yvo Desmedt. 1990. Abuses in Cryptography and How to Fight Them. In CRYPTO'88 (LNCS), bibfieldeditorShafi Goldwasser (Ed.), Vol. Vol. 403. Springer, Heidelberg, 375--389. Google ScholarGoogle ScholarCross RefCross Ref
  9. Docker.Inc. 2013. Docker. (2013). shownotehttps://www.docker.com/.Google ScholarGoogle Scholar
  10. Yevgeniy Dodis, Chaya Ganesh, Alexander Golovnev, Ari Juels, and Thomas Ristenpart 2015. A Formal Treatment of Backdoored Pseudorandom Generators EUROCRYPT 2015, Part I (LNCS), bibfieldeditorElisabeth Oswald and Marc Fischlin (Eds.), Vol. Vol. 9056. Springer, Heidelberg, 101--126. https://doi.org/10.1007/978--3--662--46800--5_5Google ScholarGoogle Scholar
  11. Yevgeniy Dodis, Ilya Mironov, and Noah Stephens-Davidowitz. 2016. Message Transmission with Reverse Firewalls--Secure Communication on Corrupted Machines. In CRYPTO 2016, Part I (LNCS), bibfieldeditorMatthew Robshaw and Jonathan Katz (Eds.), Vol. Vol. 9814. Springer, Heidelberg, 341--372. https://doi.org/10.1007/978--3--662--53018--4_13Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Carl M. Ellison, Roger A. Golliver, Howard C. Herbert, Derrick C. Lin, Francis X. McKeen, Gilbert Neiger, Ken Reneris, James A. Sutton, Shreekant S. Thakkar, and Millind Mittal 2000. Controlling access to multiple isolated memories in an isolated execution environment Controlling access to multiple isolated memories in an isolated execution environment. (2000). shownotehttps://www.google.com/patents/US6678825.Google ScholarGoogle Scholar
  13. Nicholas J. Hopper, John Langford, and Luis von Ahn. 2002. Provably Secure Steganography. In CRYPTO 2002 (LNCS), bibfieldeditorMoti Yung (Ed.), Vol. Vol. 2442. Springer, Heidelberg, 77--92. Google ScholarGoogle ScholarCross RefCross Ref
  14. Immunix 1998. AppArmor. (1998).Google ScholarGoogle Scholar
  15. Matt Lepinski, Silvio Micali, and abhi shelat. 2005. Collusion-free protocols. In 37th ACM STOC, bibfieldeditorHarold N. Gabow and Ronald Fagin (Eds.). ACM Press, 543--552.Google ScholarGoogle Scholar
  16. Ramya Jayaram Masti, Devendra Rai, Claudio Marforio, and Srdjan Capkun 2014. Isolated Execution on Many-core Architectures. Cryptology ePrint Archive, Report 2014/136. (2014). shownotehttp://eprint.iacr.org/2014/136.Google ScholarGoogle Scholar
  17. Ilya Mironov and Noah Stephens-Davidowitz 2015. Cryptographic Reverse Firewalls. In EUROCRYPT 2015, Part II (LNCS), bibfieldeditorElisabeth Oswald and Marc Fischlin (Eds.), Vol. Vol. 9057. Springer, Heidelberg, 657--686. https://doi.org/10.1007/978--3--662--46803--6_22Google ScholarGoogle ScholarCross RefCross Ref
  18. Mendel Rosenblum. 2004. The Reincarnation of Virtual Machines The Reincarnation of Virtual Machines. ACM Queue, Vol. 2, 15 (2004), 34--40. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Ronitt A. Rubinfeld. 1991. A Mathematical Theory of Self-checking, Self-testing and Self-correcting Programs. bibinfothesistypePh.D. Dissertation. bibinfoschoolUniversity of California at Berkeley, Berkeley, CA, USA. shownoteUMI Order No. GAX91--26752.Google ScholarGoogle Scholar
  20. Alexander Russell, Qiang Tang, Moti Yung, and Hong-Sheng Zhou. 2016. Cliptography: Clipping the Power of Kleptographic Attacks ASIACRYPT 2016, Part II (LNCS), bibfieldeditorJung Hee Cheon and Tsuyoshi Takagi (Eds.), Vol. Vol. 10032. Springer, Heidelberg, 34--64. https://doi.org/10.1007/978--3--662--53890--6_2Google ScholarGoogle Scholar
  21. Gustavus J. Simmons. 1983. The Prisoners' Problem and the Subliminal Channel. CRYPTO'83, bibfieldeditorDavid Chaum (Ed.). Plenum Press, New York, USA, 51--67.Google ScholarGoogle Scholar
  22. Gustavus J. Simmons. 1986. A Secure Subliminal Channel (?). In CRYPTO'85 (LNCS), bibfieldeditorHugh C. Williams (Ed.), Vol. Vol. 218. Springer, Heidelberg, 33--41.Google ScholarGoogle Scholar
  23. NTT Data Corporation Tomoyo Linux. 2009. Tomoyo. (2009). shownotehttp://tomoyo.osdn.jp/.Google ScholarGoogle Scholar
  24. Amit Vasudevan, Jonathan M. McCune, James Newsome, Adrian Perrig, and Leendert van Doorn. 2012. CARMA: a hardware tamper-resistant isolated execution environment on commodity x86 platforms. In ASIACCS 12, bibfieldeditorHeung Youl Youm and Yoojae Won (Eds.). ACM Press, 48--49. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Wikipedia. 2016. Software Guard Extensions. (2016). shownotehttps://en.wikipedia.org/wiki/Software_Guard_Extensions.Google ScholarGoogle Scholar
  26. Adam Young and Moti Yung 1996. The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone? CRYPTO'96 (LNCS), bibfieldeditorNeal Koblitz (Ed.), Vol. Vol. 1109. Springer, Heidelberg, 89--103.Google ScholarGoogle Scholar
  27. Adam Young and Moti Yung 1997. Kleptography: Using Cryptography Against Cryptography EUROCRYPT'97 (LNCS), bibfieldeditorWalter Fumy (Ed.), Vol. Vol. 1233. Springer, Heidelberg, 62--74. endthebibliographyGoogle ScholarGoogle Scholar

Index Terms

  1. Generic Semantic Security against a Kleptographic Adversary

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security
      October 2017
      2682 pages
      ISBN:9781450349468
      DOI:10.1145/3133956

      Copyright © 2017 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 30 October 2017

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      CCS '17 Paper Acceptance Rate151of836submissions,18%Overall Acceptance Rate1,261of6,999submissions,18%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader