Paper 2024/536
Public-Algorithm Substitution Attacks: Subverting Hashing and Verification
Abstract
Algorithm Substitution Attacks (ASAs) have traditionally targeted secretly-keyed algorithms (for example, symmetric encryption or signing) with the goal of undetectably exfiltrating the underlying key. We initiate work in a new direction, namely ASAs on algorithms that are public, meaning contain no secret-key material. Examples are hash functions, and verification algorithms of signature schemes or non-interactive arguments. In what we call a PA-SA (Public-Algorithm Substitution Attack), the big-brother adversary replaces the public algorithm
Metadata
- Available format(s)
-
PDF
- Category
- Applications
- Publication info
- A minor revision of an IACR publication in PKC 2025
- Keywords
- subversionalgorithm substitution attackshash functionssignaturesproof systemscertificates
- Contact author(s)
-
mbellare @ ucsd edu
riepel @ cispa de
lmshea @ ucsd edu - History
- 2025-03-15: last of 5 revisions
- 2024-04-06: received
- See all versions
- Short URL
- https://ia.cr/2024/536
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2024/536, author = {Mihir Bellare and Doreen Riepel and Laura Shea}, title = {Public-Algorithm Substitution Attacks: Subverting Hashing and Verification}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/536}, year = {2024}, url = {https://eprint.iacr.org/2024/536} }