IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
09 July 2021
Jan Richter-Brockmann, Aein Rezaei Shahmirzadi, Pascal Sasdrich, Amir Moradi, Tim Güneysu
ePrint ReportIn this work, we present a fault verification framework to validate the security of countermeasures against fault-injection attacks designed for ICs. The verification framework works on netlist-level, parses the given digital circuit into a model based on Binary Decision Diagrams, and performs symbolic fault injections. This verification approach constitutes a novel strategy to evaluate protected hardware designs against fault injections offering new opportunities as performing full analyses under a given fault models.
Eventually, we apply the proposed verification framework to real-world implementations of well-established countermeasures against fault-injection attacks. Here, we consider protected designs of the lightweight ciphers CRAFT and LED-64 as well as AES. Due to several optimization strategies, our tool is able to perform more than 90 million fault injections in a single-round CRAFT design and evaluate the security in under 50 min while the symbolic simulation approach considers all $2^128$ primary inputs.
Pedro Branco, Luís Fiolhais, Manuel Goulão, Paulo Martins, Paulo Mateus, Leonel Sousa
ePrint ReportDiego F. Aranha, Emil Madsen Bennedsen, Matteo Campanelli, Chaya Ganesh, Claudio Orlandi, Akira Takahashi
ePrint ReportWe first show a general technique to compile Algebraic Holographic Proofs (AHP) with special ``decomposition'' properties into an efficient CP-SNARK with universal and updatable SRS. We require that the polynomials in an AHP can be easily decomposed into components that refer to the committed part of the witness and the rest of the witness respectively.
We then show that some of the most efficient AHP constructions---Marlin, PLONK, and Sonic---satisfy our compilation requirements. To obtain succinct instantiations of our protocols we rely on recent advancements in compressed $\Sigma$-protocol theory (Attema and Cramer, Crypto '20). Our constructions retain the succinct proof size of the underlying AHP and only impose an additional proof size that grows logarithmically with the size of the committed component of the witness.
Claus Peter Schnorr
ePrint ReportHelger Lipmaa, Kateryna Pavlyk
ePrint ReportOrr Dunkelman, Maria Eichlseder, Daniel Kales, Nathan Keller, Gaëtan Leurent, Markus Schofnegger
ePrint ReportIn this paper we present a practical key recovery attack on FlexAEAD, using clusters of differentials for the internal permutation and the interplay between different parts of the mode. Our attack, which was fully verified in practice, allows recovering the secret subkeys of FlexAEAD-64 with a time complexity of less than $2^{31}$ encryptions (with an experimental success rate of $75\,\%$). This is the first practical key recovery attack on a candidate of the NIST standardization project.
Ulrich Haböck, Alberto Garoffolo, Daniele Di Benedetto
ePrint ReportPierre Briaud, Jean-Pierre Tillich, Javier Verbel
ePrint ReportJianghua Zhong, Yingyin Pan , Wenhui Kong, Dongdai Lin
ePrint ReportShuichi Katsumata
ePrint ReportIn this paper, we present a new simple semi-generic transform that compiles many existing lattice-based $\Sigma$-/public-coin HVZK interactive protocols into QROM secure NIZKs. Our transform builds on a new primitive called $\textit{extractable linear homomorphic commitment}$ protocol. The resulting NIZK has several appealing features: it is not only a proof of knowledge but also straight-line extractable; the proof overhead is smaller compared to the Unruh transform; it enjoys a relatively small reduction loss; and it requires minimal background on quantum computation. To illustrate the generality of our technique, we show how to transform the recent Bootle et al.'s 5-round protocol with an exact sound proof (Crypto'19) into a QROM secure NIZK by increasing the proof size by a factor of $2.6$. This compares favorably to the Unruh transform that requires a factor of more than $50$.
Chethan Kamath, Karen Klein, Krzysztof Pietrzak
ePrint ReportMarten van Dijk, Deniz Gurevin, Chenglu Jin, Omer Khan, Phuong Ha Nguyen
ePrint ReportRouzbeh Behnia, Yilei Chen, Daniel Masny
ePrint ReportLuca De Feo, Bertram Poettering, Alessandro Sorniotti
ePrint ReportKunal Dey, Sumit Kumar Debnath
ePrint ReportWenshuo Guo, Fang-Wei Fu
ePrint ReportNir Bitansky, Huijia Lin, Omri Shmueli
ePrint Report\begin{itemize} \item A $\log^\star(\lambda)$-round classical protocol based on quantum fully-homomorphic encryption and the quantum hardness of Learning with Errors. \item A polynomial-round classical protocol based on post-quantum oblivious transfer.
\item A polynomial-round quantum protocol based on post-quantum one-way functions. \end{itemize}
Previously, non-malleable commitments with quantum security were only known against a restricted class of adversaries known as synchronizing adversaries. At the heart of our results is a general technique that allows to modularly obtain non-malleable commitments from any extractable commitment protocol, obliviously of the underlying extraction strategy (black-box or non-black-box), round complexity, and whether communication is quantum or classical. The transformation preserves the quantum security of the underlying extractable commitments, and is new even in the classical setting.
Benjamin Wesolowski
ePrint ReportGuangzhou, China, 5 November - 8 November 2021
Event CalendarSubmission deadline: 20 July 2021
Notification: 25 August 2021
Hasso-Plattner-Institute (Potsdam/Berlin, Germany)
Job PostingThe Cybersecurity - Identity Management group at the Hasso-Plattner-Institute (HPI), University of Potsdam is looking for motivated PhD students in the area of cryptography and privacy.
Your future tasks- Development and analysis of provably secure cryptographic protocols for real-world problems. Topics of interest include (but are not limited to):
- Privacy-enhancing technologies
- Password-based cryptography
- Foundations and solutions for real-world cryptography
- Publish and present results at top-tier international conferences
- Participate in teaching activities (depends on position)
- Master’s degree in Computer Science, Mathematics, or a related area by the time of appointment
- Profound knowledge and interest in the areas of cryptography and IT security
- Fluency in English (written and spoken)
There are two types for the PhD positions: One position comes with a teaching obligation for which also sufficient German language skills are required. Review of applicants will start immediately until the position is filled. The starting date is flexible. The other is through the scholarship program of the HPI. Deadline for scholarship applications is August 15, and the positions usually start around October.
We look forward to your application including a CV, motivation letter and a list of attended Master courses and grades. Please submit your application documents (only as PDF) via email, and indicate the position you are interested in (teaching/scholarship).
Closing date for applications:
Contact: Anja Lehmann (anja . lehmann - at - hpi . de)
More information: https://hpi.de/lehmann/home.html