Cryptology ePrint Archive: Report 2017/984

Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks

Marc Fischlin and Sogol Mazaheri

Abstract: We put forward the notion of self-guarding cryptographic protocols as a countermeasure to algorithm substitution attacks. Such self-guarding protocols can prevent undesirable leakage by subverted algorithms if one has the guarantee that the system has been properly working in an initialization phase. Unlike detection-based solutions they thus proactively thwart attacks, and unlike reverse firewalls they do not assume an online external party. We present constructions of basic primitives for (public-key and private-key) encryption and for signatures. We also argue that the model captures attacks with malicious hardware tokens and show how to self-guard a PUF-based key exchange protocol.

Category / Keywords:

Original Publication (with minor differences): IEEE CSF 2018
DOI:
10.1109/CSF.2018.00013

Date: received 6 Oct 2017, last revised 20 Aug 2018

Contact author: sogol mazaheri at cryptoplexity de

Available format(s): PDF | BibTeX Citation

Version: 20180820:114954 (All versions of this report)

Short URL: ia.cr/2017/984


[ Cryptology ePrint archive ]