Cryptology ePrint Archive: Report 2018/989

Kleptography trapdoor free cryptographic protocols

Bohdan Kovalenko and Anton Kudin

Abstract: Context. Methods of known kleptography implementations are being investigated. The article focuses mostly on SETUP design of subliminal data leakage channels.

Aim. Suggest approaches to develop SETUP resistant cryptosystems.

Methods. The necessary conditions for SETUP implementation are building in entropy source (otherwise generated secret will be predictable). In this article, it's considered subscriber whose protocol implementation is suspected to be modified by Developer (the malicious actor who is able to influence on cryptosystem implementation) to create subliminal leakage channel. The possible countermeasure is to prohibit usage own random sources for subscribers, enforce generate random values from public counters. %them to use external Trusted Random Number Generation service.

Results. The formal model for basic SETUP scheme has been suggested. Approach to develop SETUP resistant protocols has been described. Two basic SETUP-resistance protocols (nonce generation protocol and Diffie-Hellman key agreement protocol) have been proposed.

Category / Keywords: kleptography, kleptography, SETUP, subliminal channel, secret leakage, DLP

Date: received 13 Oct 2018, last revised 18 Oct 2018

Contact author: animantbk at gmail com

Available format(s): PDF | BibTeX Citation

Version: 20181018:134205 (All versions of this report)

Short URL: ia.cr/2018/989


[ Cryptology ePrint archive ]