Paper 2018/989

Kleptography trapdoor free cryptographic protocols

Bohdan Kovalenko and Anton Kudin


Context. Methods of known kleptography implementations are being investigated. The article focuses mostly on SETUP design of subliminal data leakage channels. Aim. Suggest approaches to develop SETUP resistant cryptosystems. Methods. The necessary conditions for SETUP implementation are building in entropy source (otherwise generated secret will be predictable). In this article, it's considered subscriber whose protocol implementation is suspected to be modified by Developer (the malicious actor who is able to influence on cryptosystem implementation) to create subliminal leakage channel. The possible countermeasure is to prohibit usage own random sources for subscribers, enforce generate random values from public counters. %them to use external Trusted Random Number Generation service. Results. The formal model for basic SETUP scheme has been suggested. Approach to develop SETUP resistant protocols has been described. Two basic SETUP-resistance protocols (nonce generation protocol and Diffie-Hellman key agreement protocol) have been proposed.

Available format(s)
Publication info
Preprint. MINOR revision.
kleptographykleptographySETUPsubliminal channelsecret leakageDLP
Contact author(s)
animantbk @ gmail com
2018-10-18: received
Short URL
Creative Commons Attribution


      author = {Bohdan Kovalenko and Anton Kudin},
      title = {Kleptography trapdoor free cryptographic protocols},
      howpublished = {Cryptology ePrint Archive, Paper 2018/989},
      year = {2018},
      note = {\url{}},
      url = {}
Note: In order to protect the privacy of readers, does not use cookies or embedded third party content.