Paper 2018/989
Kleptography trapdoor free cryptographic protocols
Bohdan Kovalenko and Anton Kudin
Abstract
Context. Methods of known kleptography implementations are being investigated. The article focuses mostly on SETUP design of subliminal data leakage channels. Aim. Suggest approaches to develop SETUP resistant cryptosystems. Methods. The necessary conditions for SETUP implementation are building in entropy source (otherwise generated secret will be predictable). In this article, it's considered subscriber whose protocol implementation is suspected to be modified by Developer (the malicious actor who is able to influence on cryptosystem implementation) to create subliminal leakage channel. The possible countermeasure is to prohibit usage own random sources for subscribers, enforce generate random values from public counters. %them to use external Trusted Random Number Generation service. Results. The formal model for basic SETUP scheme has been suggested. Approach to develop SETUP resistant protocols has been described. Two basic SETUP-resistance protocols (nonce generation protocol and Diffie-Hellman key agreement protocol) have been proposed.
Metadata
- Available format(s)
- Publication info
- Preprint. MINOR revision.
- Keywords
- kleptographykleptographySETUPsubliminal channelsecret leakageDLP
- Contact author(s)
- animantbk @ gmail com
- History
- 2018-10-18: received
- Short URL
- https://ia.cr/2018/989
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2018/989, author = {Bohdan Kovalenko and Anton Kudin}, title = {Kleptography trapdoor free cryptographic protocols}, howpublished = {Cryptology {ePrint} Archive, Paper 2018/989}, year = {2018}, url = {https://eprint.iacr.org/2018/989} }