IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
26 August 2015
Geumsook Ryu, Kwangsu Lee, Seunghwan Park, Dong Hoon Lee
ePrint Report
Ralph Ankele, Stefan Koelbl, Christian Rechberger
ePrint ReportEven more devastating than those plaintext-recovery attacks from large amounts of keystream would be state- or key-recovery attacks from small amounts of known keystream. For RC4, there is unsubstantiated evidence that they may exist, the situation for Spritz is however not clear, as resistance against such attacks was not a design goal.
In this paper, we provide the first cryptanalytic results on Spritz and introduce three different state recovery algorithms. Our first algorithm recovers an internal state, requiring only a short segment of keystream, with an approximated complexity of $2^{1400}$, which is much faster than exhaustive search through all possible states, but is still far away from a practical attack. Furthermore, we introduce a second algorithm that uses a pattern in the keystream to reduce the number of guessed values in our state recovery algorithm. Our third algorithm uses a probabilistic approach by considering the permutation table as probability distribution.
All in all, rather than showing a weakness, our analysis supports the conjecture that compared to RC4, Spritz may also provide higher resistance against potentially devastating state-recovery attacks.
24 August 2015
Ding Wang, Ping Wang
ePrint ReportWe proceed to investigate the effectiveness of these 50 policies in resisting against the primary threat to password accounts (i.e. online guessing) by testing each policy against two types of weak passwords which represent two types of online guessing. Our results show that among the total 800 test instances, 541 ones are accepted: 218 ones come from trawling online guessing attempts and 323 ones come from targeted online guessing attempts. This implies that, currently, the policies enforced in leading sites largely fail to serve their purposes, especially vulnerable to targeted online guessing attacks.
Anja Becker, Thijs Laarhoven
ePrint ReportFor any lattice, hashes can be computed in polynomial time, which makes our CPSieve algorithm much more practical than the SphereSieve of Laarhoven and De Weger, while the better asymptotic complexities imply that this algorithm will outperform the GaussSieve of Micciancio and Voulgaris and the HashSieve of Laarhoven in moderate dimensions as well. We performed tests to show this improvement in practice.
For ideal lattices, by observing that the hash of a shifted vector is a shift of the hash value of the original vector and constructing rerandomization matrices which preserve this property, we obtain not only a linear decrease in the space complexity, but also a linear speedup of the overall algorithm. We demonstrate the practicability of our cross-polytope ideal lattice sieve IdealCPSieve by applying the algorithm to cyclotomic ideal lattices from the ideal SVP challenge and to lattices which appear in the cryptanalysis of NTRU.
Jens Groth
ePrint ReportWe also investigate the case of fully structure-preserving signatures where it is required that the secret signing key consists of group elements only. We show a variant of our signature scheme allowing the signer to pick part of the verification key at the time of signing is still secure. This gives us both randomizable and strongly existentially unforgeable fully structure-preserving signatures. In the fully structure preserving scheme the verification key is a single group element, signatures contain m+n+1 group elements and verification requires evaluating n+1 pairing product equations.
ID Quantique
Job PostingID Quantique is seeking to recruit one Marie Sklodowska-Curie Research Fellows in Cryptography to start in September 2015. Candidates should be eligible to the Marie Curie Individual Fellowship criteria.
Experience & Background
- Minimum 3 years of experience in a R&D departement and R&D activities.
- Minimum 3 years of experience in an international, multicultural business environment.
- Proven ability to communicate with stakeholders including senior management, technical experts and academic researchers.
Qualifications
- Advanced university degree in Applied Cryptography.
- Strong programming skills in C/C++.
- Fluent in English. French and/or German a strong assets.
Personal skills
- Strong analysis and synthesis capabilities.
- Sense of service and customer relations.
- Dynamic, with strong interpersonal and communication skills.
- Strong team player, yet able to take initiatives and autonomous.
- Capability to work on several tasks in parallel with multiple interfaces.
Benefits
- Exposure to international high-profile markets such as banking and governments
- Exposure to highly innovative technology
- Work in an agile and motivated team
Ruhr University Bochum
Job PostingOur research focuses on the design and analysis of symmetric primitives.
- Start: earliest possible
-Duration: 36 month
- Competitive salary (TV-L 13)
- Application: Send your documents to gregor (dot) leander (at) rub (dot) de
- Required documents: CV, certificates (Bachelor, Master/Diplom, Ph.D.), transcripts, motivation for applying (1 page), names of at least two people who can provide reference letters (email addresses are sufficient)
-Deadline: September 15
Founded in 2001, the Horst-Görtz Institute at Ruhr-University Bochum is a world-leading interdisciplinary research center dedicated to research and education covering all aspects of IT security, with an excellent record of research in cryptography. The Horst-Görtz Institute has 15 professors and over 80 PhD students. It hosts the only German Research Training Group for Doctoral students in Cryptology.
22 August 2015
Palo Alto, USA, January 6 - January 8
Event CalendarLocation: Palo Alto, USA
More Information: http://www.realworldcrypto.com/rwc2016
21 August 2015
Junqing Gong, Jie Chen, Xiaolei Dong, Zhenfu Cao, Shaohua Tang
ePrint Report- We revisit the notion of ENDSG and realize it using asymmetric prime-order bilinear groups based on Chen and Wee\'s prime-order instantiation of nested dual system groups [CRYPTO 2013]. This yields the first almost-tight IBE in the prime-order setting achieving weak adaptive security in the multi-instance, multi-ciphertext scenario under the $d$-linear assumption (in the asymmetric setting). We further extended the ENDSG to capture stronger security notions, including $B$-weak adaptive security and full adaptive security, and show that our prime-order instantiation is $B$-weak adaptive secure without any additional assumption and full adaptive secure under the $d$-linear assumption.
- We also try to provide better solution by fine-tuning ENDSG again and realizing it following the work of Chen, Gay, and Wee [EUROCRYPT 2015]. This leads to an almost-tight fully adaptively secure IBE in the same setting with better performance than our first IBE scheme but requires a non-standard assumption, $d$-linear assumption with auxiliary input. However we note that, the $2$-linear assumption with auxiliary input is implied by the external decisional linear assumption. Or we can realize the second instantiation using \\emph{symmetric} bilinear pairings in which case the security relies on standard decisional linear assumption.
Gérald Gavin
ePrint ReportTo highlight this, we present an additive homomorphic private-key cryptosystem and we prove its security. Finally, we propose two motivating perspectives of this work. We first propose an FHE based on the previous scheme by defining a simple multiplicative operator.
Secondly, we propose ways to remove the factoring assumption in order to get pure multivariate schemes.
Akshayaram Srinivasan, C. Pandu Rangan
ePrint ReportThe construction given by Hohenberger et al. could only support encryptions of messages from a polynomial space and the decryption algorithm would have to perform a polynomial number of pairing operations in the worst case. The construction given by Chandran et al. satisfies only a relaxed notion of correctness.
In this work, we propose a simple and efficient obfuscator for the re-encryption functionality which not only supports encryption of messages from an exponential space but also involves only a constant number of group operations. Besides, our construction satisfies the strongest notion of correctness given by Hada (Eurocrypt 2010). We also strengthen the black-box security model for encryption - re-encryption system proposed by Hohenberger et al. and prove the average-case virtual black box property of our obfuscator as well as the security of our encryption - re-encryption system (in the strengthened model) under the DDH assumption. All our proofs are in the standard model.
20 August 2015
Bochum, Germany, October 8
Event CalendarLocation: Bochum, Germany
More Information: http://cryptool.hgi.rub.de/index.html
Xi'an, China, May 31 - June 3
Event CalendarNotification: 1 February 2016
From May 31 to June 3
Location: Xi'an, China
More Information: http://meeting.xidian.edu.cn/conference/AsiaCCS2016/index.html
London, United Kingdom, June 19 - June 22
Event CalendarNotification: 25 March 2016
From June 19 to June 22
Location: London, United Kingdom
More Information: http://acns2016.sccs.surrey.ac.uk/
Bristol, United Kingdom, November 10 - November 11
Event CalendarLocation: Bristol, United Kingdom
More Information: https://www.cs.bris.ac.uk/~nigel/ECRYPT-MPC/
Amsterdam, Netherlands, March 28 - March 31
PKCLocation: Amsterdam, Netherlands
More Information: http://www.iacr.org/meetings/pkc/
Santa Barbara, USA, August 16 - August 19
CHESLocation: Santa Barbara, USA
More Information: http://www.iacr.org/meetings/ches/
Hong Kong, China, December 3 - December 7
AsiacryptLocation: Hong Kong, China
More Information: http://www.iacr.org/meetings/asiacrypt/
Paris, France, May 15 - May 18
EurocryptLocation: Paris, France
More Information: http://www.iacr.org/meetings/eurocrypt/
18 August 2015
Valery Korzhik, Guillermo Morales-Luna, Sergei Tikhonov, Victor Yakovlev
ePrint Report