Cryptology ePrint Archive: Report 2019/1112

Subliminal Hash Channels

George Teseleanu

Abstract: Due to their nature, subliminal channels are mostly regarded as being malicious, but due to recent legislation efforts users' perception might change. Such channels can be used to subvert digital signature protocols without degrading the security of the underlying primitive. Thus, it is natural to find countermeasures and devise subliminal-free signatures. In this paper we discuss state-of-the-art countermeasures and introduce a generic method to bypass them.

Category / Keywords: public-key cryptography / subliminal channels, kleptography, setup attacks, hash channels

Original Publication (with minor differences): A2C 2019

Date: received 29 Sep 2019, last revised 29 Sep 2019

Contact author: george teseleanu at yahoo com

Available format(s): PDF | BibTeX Citation

Version: 20191001:150802 (All versions of this report)

Short URL: ia.cr/2019/1112


[ Cryptology ePrint archive ]