IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
30 May 2015
Yongge Wang
without bootstrapping. In this note, we show that these schemes are trivially insecure.
29 May 2015
Florianopolis - SC, Brazil, November 9 - November 12
Notification: 31 August 2015
From November 9 to November 12
Location: Florianopolis - SC, Brazil
More Information: http://sbseg2015.univali.br/en
Aurore Guillevic
compute discrete logarithms (DL) in large characteristic finite fields
$\\FF_{p^n}$, with $p$ large and $n \\geq 1$ small. This algorithm
comprises four steps: polynomial selection, relation collection,
linear algebra and finally, individual logarithm computation. The
first step outputs two numbers fields equipped with a map to
$\\FF_{p^n}$. After the relation collection and linear algebra
phases, the (virtual) logarithm of a subset of elements in each number
field is known. The fourth step computes a preimage in one number
field of the target element in $\\FF_{p^n}$. If one can write the
target preimage as a product of elements of known (virtual) logarithm,
then one can deduce the discrete logarithm of the target.
The traditional approach for the individual logarithm step can be
extremely slow, and it is too slow especially for
$n$ greater than 3. Its asymptotic complexity is $L_Q[1/3, c]$ with $c
\\geq 1.44$. We present a new preimage computation that provides a
dramatic improvement for individual logarithm computations for small
$n$, both in practice and in asymptotic running-time: we have
$L_Q[1/3, c]$ with $c = 1.14$ for $n=2,4$, $c = 1.26$ for $n=3,6$ and
$c = 1.34$ for $n=5$. Our method generalizes to any $n$; in particular
$c < 1.44$ for the two state-of-the-art variants of NFS for extension
fields.
Nir Bitansky, Shafi Goldwasser, Abhishek Jain, Omer Paneth, Vinod Vaikuntanathan, Brent Waters
can quickly generate a puzzle with a solution $s$ that remains hidden until a moderately large amount of time $t$ has elapsed. The solution $s$ should be hidden from any adversary that runs in time significantly less than $t$, including resourceful parallel adversaries with polynomially many processors.
While the notion of time-lock puzzles has been around for 22 years, there has only been a *single* candidate proposed. Fifteen years ago, Rivest, Shamir and Wagner suggested a beautiful candidate time-lock puzzle based on the assumption that exponentiation modulo an RSA integer is an ``inherently sequential\'\' computation.
We show that various flavors of {\\em randomized encodings} give rise to time-lock puzzles of varying strengths, whose security can be shown assuming *the existence* of non-parallelizing languages, which are languages that require circuits of depth at least $t$ to decide, in the worst-case. The existence of such languages is necessary for the existence of time-lock puzzles.
We instantiate the construction with different randomized
encodings from the literature, where increasingly better efficiency is obtained based on increasingly stronger cryptographic assumptions, ranging from one-way functions to indistinguishability obfuscation. We also observe that time-lock puzzles imply one-way functions, and thus the reliance on some cryptographic assumption is necessary.
Finally, generalizing the above, we construct other types of puzzles such as *proofs of work* from randomized encodings and a
suitable worst-case hardness assumption (that is necessary for such puzzles to exist).
Thomas Espitau, Pierre-Alain Fouque, Pierre Karpman
In this work, we exploit further the differential view of meet-in-the-middle techniques and generalize it to higher-order differentials. Despite being an important technique dating from the mid-90\'s, this is the first time higher-order differentials have been applied to meet-in-the-middle preimages. We show that doing so may lead to significant improvements to preimage attacks on hash functions with a simple linear message expansion. We extend the number of attacked rounds on SHA-1 to give a 62-round one-block preimage without padding, a 56-round one-block preimage with padding, and a
62-round two-block preimage with padding. We also apply our framework to the more recent SHA-3 finalist BLAKE and its newer variant BLAKE2, and give an attack for a 2.75-round preimage with padding, and a 7.5-round pseudo-preimage on the compression function.
Brice Minaud, Patrick Derbez, Pierre-Alain Fouque, Pierre Karpman
As our main contribution, we propose a new algebraic key-recovery attack able to break at once the secret-key scheme as well as the remaining public-key scheme, in time complexity 2^63 and 2^39 respectively (the security parameter is 128 bits in both cases).
Furthermore, we present a second attack of independent interest on the same public-key scheme, which heuristically reduces the problem of breaking the scheme to an LPN instance with tractable parameters. This allows key recovery in time complexity 2^56.
Finally, as a side result, we outline a very efficient heuristic attack on the white-box scheme, which breaks instances claiming 64 bits of security under one minute on a desktop computer.
Kuala Lumpur, Malaysia, December 1 - December 2
Notification: 1 August 2016
From December 1 to December 2
Location: Kuala Lumpur, Malaysia
More Information: https://foe.mmu.edu.my/mycrypt2016/
28 May 2015
Sami Saab, Andrew Leiserson, and Michael Tunstall
SICS Swedish ICT
The security Lab at SICS was established in 2009. Since then it has grown from 1 to 12 people. The research is directed toward secure systems design in close co-operation with above leading Swedish companies in the IT and telecommunications businesses as well as Swedish universities such as Royal Institute of Technology in Stockholm and Lund University. The group is active in the areas of embedded systems security, cloud security, access control and communications security. The security lab at SICS consists for the moment of 6 senior researchers (PhD), 3 PhD students and 3 junior researchers with MSc degrees in computer science.
Applicants interested in the positions should provide the following information in pdf format with the application:
- Application letter
- CV
- Transcript of grades
- Publications list
- 3-5 selected full text publications
Kuala Lumpur, Malaysia, December 1 - December 2
Notification: 1 August 2016
From December 1 to December 2
Location: Kuala Lumpur, Malaysia
More Information: https://foe.mmu.edu.my/mycrypt2016/
27 May 2015
Kuala Lumpur, Malaysia, December 1 - December 2
Notification: 1 August 2016
From December 1 to December 2
Location: Kuala Lumpur, Malaysia
More Information: https://foe.mmu.edu.my/mycrypt2016/
Razvan Barbulescu, Pierrick Gaudry, Thorsten Kleinjung
Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégo
Itai Dinur, Orr Dunkelman, Thorsten Kranz, Gregor Leander
In this paper, we present several attacks on general ASASA schemes that significantly outperform the analysis of Biryukov et al. As a result, we are able to break all the proposed concrete ASASA constructions with practical complexity. For example, we can decompose an ASASA structure that was supposed to provide $64$-bit security in roughly $2^{28}$ steps, and break the scheme that supposedly provides $128$-bit security in about $2^{41}$ time. Whenever possible, our findings are backed up with experimental verifications.
Santanu Sarkar, Prakash Dey, Avishek Adhikari, Subhamoy Maitra
such attacks have been mounted against several popular stream ciphers for example Grain v1, MICKEY 2.0
and Trivium, that are parts of the eStream hardware profile. The basic idea of the fault attacks consider
injection of faults and the most general set-up should consider faults at random location and random time.
Then one should identify the exact location and the exact timing of the fault (as well as multi bit faults) with the help of fault signatures.
In this paper we consider this most general set-up and solve the problem of fault attack under a general framework,
where probabilistic signatures are exploited. Our ideas subsume all the existing DFAs against the Grain family,
MICKEY 2.0 and Trivium. In the process we provide improved fault attacks for all the versions of Grain family and also
for MICKEY 2.0 (the attacks against Trivium are already quite optimal and thus there is not much scope to improve).
Our generalized method can also take care of the cases where certain parts of the keystream bits are missing
for authentication purpose. In particular, we show that the unsolved problem of identifying the faults
in random time for Grain 128a can be solved in this manner. Our techniques can easily be applied to mount fault
attack on any stream cipher of similar kind.
Daniel R. L. Brown
security of Schnorr signatures seems to have a flaw described in
this report.
Schnorr signatures require representation of an element in a
discrete logarithm group as a hashable bit string. This report
describes a defective bit string representation of elliptic curve
points. Schnorr signatures are insecure when used with this
defective representation. Nevertheless, the defective
representation meets all the conditions of the NSW theorem.
Of course, a natural representation of an elliptic curve group
element would not suffer from this major defect. So, the NSW
theorem can probably be fixed.
Gideon Samid
As impractical as Vernam \"One Time Pad\" cipher has been, it\'s security strategy: equivocation is fundamentally superior to the prevailing strategy: intractability. Intractability erodes, equivocation endures. Alas, Vernam was an overkill. Equivocation works even if only a few plaintext candidates are left as an irreducible set, which is what Equivoe-T offers.
The AI engine builds decoys off the plaintext such that each decoy has a counter-meaning, or at least an off-meaning per the guarded plaintext, while claiming at least threshold plausibility to \"pump\" entropy into the irreducible field of plaintext candidates.
Equivoe-T uses a complete transposition algorithm that guarantees the existence of a key that matches any two arbitrarily selected permutations of the n transposed elements. Therefore every decoy qualifies as a plaintext. The transposed elements may be words, letters, a mix, or otherwise. n can be selected to add intractability to the built-in equivocation since the key space grows fast (|Ktransposition| = n!).
Baris Ege, Thomas Eisenbarth, Lejla Batina
Near collision attacks are truly univariate. They have low requirements on the leakage functions, since they work well for leakages that are linear in the bits of the targeted intermediate state. They are applicable in the presence of masking countermeasures if there exist distinguishable leakages, as in the case of leakage squeezing.
Results are backed up by a broad range of simulations for unprotected and masked implementations, as well as an analysis of the measurement set provided by DPA Contest v4.
Kristian Gjøsteen, Anders Smedstuen Lund
This paper proposes a new instantiation of the underlying cryp- tosystem, improving our confidence in the security of the cryptosys- tem. The new instantiation is mostly similar to a previously defined instantiation, but allows parts of the security proof to be significantly improved.
Brice Minaud, Yannick Seurin