IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
06 September 2015
Jeroen Delvaux, Dawu Gu, Ingrid Verbauwhede, Matthias Hiller, Meng-Day (Mandel) Yu
ePrint Report
GANESH YELLAPU
ePrint ReportShift Registers (LFSRs) against correlation, linear attacks is a highly
challenging task. In this paper, a new framework for keystream generators is proposed. It is comprised of a set of Linear Feedback Shift Registers (LFSRs), a Multiplicative Congruential Generator (MCG),
a vector linear function and, a Boolean function which outputs the
keystream. The framework is more generally discussed against
correlation attacks, linear attacks and distinguishing (linear) attacks. It is shown that such attacks which are applicable to LFSR based keystream generators are not possible on the proposed framework.
Khushboo Bussi, Dhananjoy Dey, P. R. Mishra, B.K. Dass
ePrint Report
Benjamin Fuller, Ariel Hamlin
ePrint ReportIn this work, we consider the memory leakage model, where the leakage class contains functions over the system\'s entire secret state. Standard classes include functions with bounded output length, functions that retain (pseudo)~entropy in the secret, and functions that leave the secret computationally unpredictable.
Standaert, Pereira, and Yu (Crypto, 2013) introduced a new class of leakage functions they call simulatable leakage. A leakage function is simulatable if a simulator can produce indistinguishable leakage without access to the true secret state. We extend their notion to general applications and consider two versions. For weak simulatability: the simulated leakage must be indistinguishable from the true leakage in the presence of public information. For strong simulatability, this requirement must also hold when the distinguisher has access to the true secret state. We show the following:
* Weakly simulatable functions retain computational unpredictability.
* Strongly simulatability functions retain pseudoentropy.
* There are bounded length functions that are not weakly simulatable.
* There are weakly simulatable functions that remove pseudoentropy.
* There are leakage functions that retain computational unpredictability are not weakly simulatable.
Olivier Blazy, Saqib A. Kakvi
ePrint Report
Dianyan Xiao, Jincheng Zhuang, Qi Cheng
ePrint Reportcan be solved much more efficiently than previously thought.
This algorithmic breakthrough is based
on heuristic polynomial time algorithms to
compute the factor base discrete logarithm.
In this paper, we concentrate on the Kummer extension
$ \\F_{q^{2(q-1)}}. $ We design a new heuristic algorithm with
an improved bit complexity $ \\tilde{O}(q^{1+ \\theta} ) $ (or algebraic complexity
$\\tilde{O}(q^{\\theta} )$) to compute the discrete logarithms of elements in
a factor base of cardinality $q^2$, where $ \\theta < 2.373 $ is
the matrix multiplication exponent.
We reduce the correctness of the algorithm to a conjecture
concerning the determinant of a simple $ (q+1)-$dimensional lattice,
rather than to elusive smoothness assumptions.
We verify the conjecture numerically for all $ q $\'s such that
$ \\log_2(q^{2(q-1)}) \\leq 5000 $, and provide theoretical
supporting evidences.
Carmit Hazay, Arpita Patra, Bogdan Warinschi
ePrint ReportFirst we study the relation between two existing security definitions, one based on simulation and the other based on indistinguishability, and show that the former is strictly stronger. We continue with feasibility results for both notions which we show can be achieved from (variants of) non-committing encryption schemes. In particular, we show that indistinguishability-based SO security can be achieved from a tweaked variant of non-committing encryption which, in turn, can be instantiated from a variety of basic, well-established, assumptions. We conclude our study by showing that SO security is however strictly weaker than all variants of non-committing encryption that we consider, leaving potentially more efficient constructions as an interesting open problem.
Chun Guo, Dongdai Lin
ePrint ReportMost of the published security proofs for IEM against relate-key and chosen-key attacks focus on the case where all the round-keys are derived from a single master key. Whereas results beyond this barrier are relevant to the cryptographic problem whether a secure blockcipher with key-size twice the block-size can be built by mixing two \\emph{relatively independent} keys into IEM and iterating sufficiently many rounds, and this strategy actually has been used in designing blockciphers for a long-time.
This work makes the first step towards breaking this barrier and considers IEM with Interleaved Double \\emph{independent} round-keys:
$$\\text{IDEM}_r((k_1,k_2),m)=k_i\\oplus (P_r(\\ldots k_1\\oplus P_2(k_2\\oplus P_1(k_1\\oplus m))\\ldots)),$$
where $i=2$ when $r$ is odd, and $i=1$ when $r$ is even. As results, this work proves that 15 rounds can achieve (full) indifferentiability from an ideal cipher with $O({q^{8}}/{2^n})$ security bound. This work also proves that 7 rounds is sufficient and necessary to achieve sequential-indifferentiability (a notion introduced at TCC 2012) with $O({q^{6}}/{2^n})$ security bound, so that $\\text{IDEM}_{7}$ is already correlation intractable and secure against any attack that exploits evasive relations between its input-output pairs.
Fordham University, NY
Job PostingHow to apply: Send a detailed CV, research statement, teaching statement, and a list of info of 3-5 references with e-mail addresses in a single pdf file to sajalbhatia (at) gmail.com. Include job-code “POSTDOC-Cybersecurity” in subject line. Review of applications will begin immediately and continue until the position is filled
The Department of Computer and Information Science is currently in the process of expanding its undergraduate and graduate programs in order to serve students entering the growing fields of computer science, information science, and interdisciplinary areas. The faculty of the Department of Computer and Information Science represent a wide range of academic backgrounds, research and professional interests. Serving undergraduate majors in computer science, information science, and interdisciplinary programs in Fordham College at Rose Hill (Bronx), Fordham College at Lincoln Center (Manhattan), and the School of Professional and Continuing Education (all 3 campuses), the department also offers an MS program in Computer Science in the Graduate School of Arts and Sciences and an MS in Cybersecurity in the School of Professional and Continuing Studies. An MS program in Data Analytics is in its final p
Chalmers University of Technology, Sweden
Job PostingThe PhD student will join Katerina Mitrokotsa’s group and will be funded by a project funded by the Swedish research council focusing on security and privacy issues in resource constrained devices.
The PhD student is expected to have a MSc degree or equivalent, and strong background in mathematics and/or theoretical computer science, with some background in cryptography.
Successful candidates will help to design and evaluate cryptographically reliable and privacy-preserving authentication protocols.
The position is fully funded for five years.
For any inquiries or to apply for the positions, submit a full research curriculum-vitae (cv), names of two references, and a research statement to Prof. Katerina Mitrokotsa (aikmitr (at) chalmers.se).
The call for expressions of interest will remain open until a suitable candidate is appointed.
Huawei Technologies, Paris
Job PostingThe ideal candidate(s) will have an advanced degree (MEng, MSc, or equivalent) in Mathematics or Computer Science and have an interest in applying their expertise to the development of disruptive security technologies. We are particularly interested in candidates that want to advance state-of-the-art research in accountability, authentication, encryption, privacy, and verifiability.
Huawei is a leading information and communications technology solutions provider, whose business spans telecommunication infrastructure, consumer electronics, and business IT solutions. We are seeking highly motivated and talented individuals to work on the theoretical underpinnings of challenging security problems in areas such as communications, the internet of things, cloud computing, and big data.
Potential applications are encouraged to contact Ben Smyth, Lead Security Researcher, (ben.smyth (at) huawei.com) or Elizabeth Quaglia, Senior Security Researcher, (elizabeth.quaglia (at) huawei.com) to discuss opportunities further.
Successful candidate(s) will receive a competitive salary and will be affiliated with one of our prestigious academic partners.
To apply, please send your CV and a covering letter explaining your expertise and research interests. You will also need to include two referees (at least one of them from academia).
Applications should be submitted by email to both hegaoning (at) huawei.com and sonia.rodriguez (at) huawei.com by 25 September 2015.
03 September 2015
Matvei Kotov, Alexander Ushakov
ePrint Reportproposed by Grigoriev and Shpilrain
which uses tropical matrix algebra as a platform.
Our analysis shows that the scheme is not secure.
02 September 2015
IBM Research - Zurich
Job PostingThe main task of the candidate will be to perform scientific research and proof-of-concept implementations in the area of Lattice-Based Cryptography. Building primitives and protocols based on the hardness of lattice problems is one of the most promising avenues for achieving quantum-resistance of public key cryptographic constructions. This research therefore has real potential for wide-ranging practical use.
The ideal candidate should already be a proficient programmer and have excellent familiarity with basic internet security protocols (TLS, IKE, etc.). It is also preferable that the applicant has experience (or strong interest) in scientific computing, as part of the research will involve coming up with and implementing specialized algorithms for linear algebra and number theory operations. Knowledge of lattice-based cryptography and of the “provable security” paradigm for constructing protocols is not required, but the candidate should be a motivated learner of these topics.
For administrative reasons, the applicant should be a citizen of one of the EU-25 nations (Romania, Bulgaria, Iceland, Liechtenstein, and Norway also OK) and be fluent in written and spoken English. Knowledge of German is not required.
IBM Research - Zurich offers a stimulating international research environment among experts in computer science, physics, and mathematics. The laboratory is located in Rüschlikon, Switzerland, at 10km from the city of Zurich and on the coast of Lake Zurich. A very competitive salary will be offered. <
Ran Cohen, Iftach Haitner, Eran Omri, Lior Rotem
ePrint Report* A symmetric $n$-party functionality can be securely computed facing $n/3\\le t
Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni
ePrint Reporthas seen an influx in the number of block ciphers and hash functions
being proposed. One of the metrics that define a good lightweight design is the energy consumed per unit operation of the algorithm. For block ciphers, this operation is the encryption of one plaintext. By studying the energy consumption model of a CMOS gate, we arrive at the conclusion that the total energy consumed during the encryption operation of an r-round unrolled architecture of any block cipher is a quadratic function in r. We then apply our model to 9 well known lightweight block ciphers, and thereby try to predict the optimal value of r at which an r-round unrolled architecture for a cipher is likely to be most energy efficient. We also try to relate our results to some physical design parameters like the signal delay across a round and algorithmic parameters like the number of rounds taken to achieve full diffusion of a difference in the plaintext/key.
Meltem Sonmez Turan, Rene Peralta
ePrint Report
Houda Ferradi, R\\\'emi G\\\'eraud, Diana Maimu\\c{t}, David Naccache, and Amaury de Wargny
ePrint Reporta simple procedure allowing to correct the bias of random sources.
This device outputs bits at irregular intervals. However, cryptographic hardware is usually synchronous.
This paper proposes a new building block called Pace Regulator, inserted between the randomness consumer and the von Neumann regulator to streamline the pace of random bits.
Zhen Liu, Duncan S. Wong
ePrint ReportIn this paper, we propose the first CP-ABE scheme which simultaneously achieves (1) fully collusion-resistant blackbox traceability in the standard model, (2) full security in the standard model, and (3) on prime order groups. When compared with the latest fully collusion-resistant blackbox traceable CP-ABE schemes, this new scheme achieves the same efficiency level, enjoying the sub-linear overhead of $O(\\sqrt{N})$, where $N$ is the number of users in the system. This new scheme is highly expressive and can take any monotonic access structures as ciphertext policies.
Benoît Cogliati, Yannick Seurin
ePrint Report
01 September 2015
Singapore, Singapore, September 30 - October 3
Event CalendarLocation: Singapore, Singapore
More Information: http://www1.spms.ntu.edu.sg/~ask/2015/