Paper 2018/989

Kleptography trapdoor free cryptographic protocols

Bohdan Kovalenko and Anton Kudin

Abstract

Context. Methods of known kleptography implementations are being investigated. The article focuses mostly on SETUP design of subliminal data leakage channels. Aim. Suggest approaches to develop SETUP resistant cryptosystems. Methods. The necessary conditions for SETUP implementation are building in entropy source (otherwise generated secret will be predictable). In this article, it's considered subscriber whose protocol implementation is suspected to be modified by Developer (the malicious actor who is able to influence on cryptosystem implementation) to create subliminal leakage channel. The possible countermeasure is to prohibit usage own random sources for subscribers, enforce generate random values from public counters. %them to use external Trusted Random Number Generation service. Results. The formal model for basic SETUP scheme has been suggested. Approach to develop SETUP resistant protocols has been described. Two basic SETUP-resistance protocols (nonce generation protocol and Diffie-Hellman key agreement protocol) have been proposed.

Metadata
Available format(s)
PDF
Publication info
Preprint. MINOR revision.
Keywords
kleptographykleptographySETUPsubliminal channelsecret leakageDLP
Contact author(s)
animantbk @ gmail com
History
2018-10-18: received
Short URL
https://ia.cr/2018/989
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2018/989,
      author = {Bohdan Kovalenko and Anton Kudin},
      title = {Kleptography trapdoor free cryptographic protocols},
      howpublished = {Cryptology {ePrint} Archive, Paper 2018/989},
      year = {2018},
      url = {https://eprint.iacr.org/2018/989}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.