IACR News
If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.
Here you can see all recent updates to the IACR webpage. These updates are also available:
09 November 2018
Eshan Chattopadhyay, Xin Li
We continue the line of investigation on explicit constructions of non-malleable codes in the information theoretic setting, and give explicit constructions for several new classes of tampering functions. These classes strictly generalize several previously studied classes of tampering functions, and in particular extend the well studied split-state model which is a "compartmentalized" model in the sense that the codeword is partitioned a prior into disjoint intervals for tampering. Specifically, we give explicit non-malleable codes for the following classes of tampering functions.
(1) Interleaved split-state tampering: Here the codeword is partitioned in an unknown way by an adversary, and then tampered with by a split-state tampering function.
(2) Linear function composed with split-state tampering: In this model, the codeword is first tampered with by a split-state adversary, and then the whole tampered codeword is further tampered with by a linear function. In fact our results are stronger, and we can handle linear function composed with interleaved split-state tampering.
(3) Bounded communication split-state tampering: In this model, the two split-state tampering adversaries are allowed to participate in a communication protocol with a bounded communication budget. Our results are the first explicit constructions of non-malleable codes in any of these tampering models. We derive all these results from explicit constructions of seedless non-malleable extractors, which we believe are of independent interest. Using our techniques, we also give an improved seedless extractor for an unknown interleaving of two independent sources.
Dana Dachman-Soled, Huijing Gong, Mukul Kulkarni, Aria Shahverdi
- Introduce the search and decision Leaky-RLWE assumptions (Leaky-SRLWE, Leaky-DRLWE), to formalize the hardness of search/decision RLWE under leakage of some fraction of coordinates of the NTT transform of the RLWE secret and/or error.
- Present and implement an efficient key exposure attack that, given certain $1/4$-fraction of the coordinates of the NTT transform of the RLWE secret, along with RLWE instances, recovers the full RLWE secret for standard parameter settings.
- Present a search-to-decision reduction for Leaky-RLWE for certain types of key exposure.
- Analyze the security of NewHope key exchange under partial key exposure of $1/8$-fraction of the secrets and error.
We show that, assuming that Leaky-DRLWE is hard for these parameters, the shared key $v$ (which is then hashed using a random oracle) is computationally indistinguishable from a random variable with average min-entropy $238$, conditioned on transcript and leakage, whereas without leakage the min-entropy is $256$.
Xavier Bonnetain, María Naya-Plasencia, André Schrottenloher
In this paper we propose many other types of quantum slide attacks. First, we are able to quantize classical advanced slide attacks on Feistel networks. With modular additions inside branch or key-addition operations, these attacks reach up to two round self-similarity. With only XOR operations, they reach up to four rounds self-similarity, with a cost at most quadratic in the block size.
Moreover, some of these variants combined with whitening keys (FX construction) can be successfully attacked. We show how these results relate to general quantization principles of classical techniques including sliding with a twist, complementation slide and mirror slidex.
Furthermore, we show that some quantum slide attacks can be composed with other quantum attacks to perform efficient key-recoveries even when the round founction is a strong function classically.
Finally, we analyze the case of quantum slide attacks exploiting cycle-finding, that were thought to enjoy an exponential speed up in a paper by Bar-On et al. in 2015, where these attacks were introduced. We show that the speed-up is smaller than expected and less impressive than the above variants, but nevertheless provide improved complexities on the previous known quantum attacks in the superposition model for some self-similar SPN and Feistel constructions.
Akinori Hosoyamada, Takashi Yamakawa
Russell W. F. Lai, Giulio Malavolta, Dominique Schröder
Nithyashankari Gummidipoondi Jayasankaran, Adriana Sanabria Borbon, Edgar Sanchez-Sinencio, Jiang Hu, Jeyavijayan Rajendran
Mashael AlSabah, Gabriele Oligeri, Ryan Riley
In this work, we analyze a meta-data rich data leak from a Middle Eastern bank with a demographically-diverse user base. We provide an analysis of passwords created by groups of people of different cultural backgrounds, some of which are under-represented in existing data leaks, e.g., Arab, Filipino, Indian, and Pakistani.
The contributions provided by this work are many-fold. First, our results contribute to the existing body of knowledge regarding how users include personal information in their passwords. Second, we illustrate the differences that exist in how users from different cultural/linguistic backgrounds create passwords. Finally, we study the (empirical and theoretical) guessability of the dataset based on two attacker models, and show that a state of the art password strength estimator inflates the strength of passwords created by users from non-English speaking backgrounds. We improve its estimations by training it with contextually relevant information.
Manuel Zander, Tom Waite, Dominik Harz
Behnam Zahednejad, Majid Bayat, Ashok Kumar Das
07 November 2018
Darmstadt, Germany, 18 May 2019
Submission deadline: 10 February 2019
Notification: 3 March 2019
06 November 2018
Alejandro Cabrera Aldaya, Billy Bob Brumley, Sohaib ul Hassan, Cesar Pereida Garc\'ia, Nicola Tuveri
Promise Software Inc.
We are a high-energy, innovation-focused team of engineers and technologists passionate about leveraging advanced cryptographic primitives. Promise’s environment is highly collaborative, and the ideal candidate will have an eye for detail and be a team player who enjoys working with others to find cutting-edge solutions to tricky problems. Come join us!
What we are looking for in the Senior Cryptography Engineer?
This role is ideal for cryptography scientists who have deep research experience and familiarity with evolving and established post quantum cryptographic protocols and their implementation.
Preferred areas of research interest would be post-quantum cryptography. Candidates are required to have a Ph.D. in Computer Science, ECE or a related area, by the time of appointment and an outstanding research record. Solid background in cryptography, network security, distributed systems, protocols and algorithms, is highly desirable.
What you will be responsible doing?
1. Design and architect post quantum cryptography protocols in distributed p2p systems
2. Work with core internal team and external open source community
3. Collaborate with engineering and product teammates to produce protocol specification that help serve Promise customer objectives
4. Collaborate and support other teams in developing crypto economic consensus protocol
5. Identify and recommend technologies to solve technical challenges such as proof sizes
6. Interest in working in startup environments with a brisk pace and constantly changing challenges
Salary and Benefits:
Please get more information and apply here: https://aquila-1.workable.com/jobs/860808
Closing date for applications:
Contact: Head of Recruiting
jobs (at) promiseprotocols.com
More information: https://aquila-1.workable.com/jobs/860808
University of Luxembourg
The APSIA team, led by Prof. Peter Y. A. Ryan, is part of the SnT and is a dynamic and growing research group, over 20 strong, performing cutting edge research in information assurance, cryptography, and privacy. The group specializes in the mathematical modelling of security mechanisms and systems, especially crypto protocols (classical and quantum), and socio-technical systems. The group is particularly strong in verifiable voting systems.
For further information you may check: www.securityandtrust.lu and https://wwwen.uni.lu/snt/research/apsia.
Ref: R-STR-5004-00-B
Fixed Term Contract 2 years (CDD), full-time 40 hrs/week
Number of positions: 1
Start date: Late 2018/early 2019 upon agreement.
Your Role
The successful candidate will contribute to the research goals of the APSIA group. The APSIA Group specializes in the design and analysis of secure systems:
Cryptographic Protocols
Quantum Cryptographic Protocols
Cryptographic Algorithms and Primitives
Verifiable Voting Schemes
Socio-Technical Analysis of Security
Privacy Enhancing Technologies
but applications are also welcome in
post-quantum crypto
FinTech
Distributed Ledger Technologies
The tasks associated with the role include:
Contributing to the group’s research directions.
Disseminating results through scientific publications
Coordinating research projects and delivering outputs
Help preparing new research proposals
Providing guidance to PhD and MSc students
Opportunities to do some teaching will be available.
Closing date for applications: 30 November 2018
Contact: Peter Y A Ryan, peter.ryan (at) uni.lu
More information: http://emea3.mrted.ly/1ztz4
ING Bank
The Blockchain program is also responsible for identifying and piloting the most promising use cases. To do so, we constantly scope the environment for relevant opportunities, actively engage with and educate the organization about the technology’s potential as well as researching trends within the industry. This allows us to have a comprehensive approach in our delivery of business value.
We are looking for an eager collaborator to support the management of the program. Your main tasks that you will be performing are:
•Produce software solutions based on Distributed Ledger technology;
•Research actively latest development in the cryptography and DLT space;
•Implementing improvements to existing DL technologies;
•Assess and deep dive on various ledger technologies.
Relevant stakeholders: you will be working with the DLT team, and reporting to the Chapter lead.
Your personal profile:
•Master’s degree in Computer Science.
•Curious by nature, willing to experiment.
•Ability to think from a business perspective when considering alternatives.
•Excellent team player.
•Intrinsic motivation for blockchain (i.e. some prior knowledge).
•Fast learner
•Knowledge of Kotlin / Solidity / Go is a plus
Must be proficient in at least one of the skills below (and motivation and basic-knowledge in the other).
You will be fully part of an enthusiastic multi-disciplinary team that has a willingness to help you grow and learn as much as possible throughout your position.
Closing date for applications: 30 March 2019
Contact: Stanley Waccary
Business manager Innovation
Stanley.Waccary (at) ing.com
More information: https://www.ing.jobs/Nederland/Vacatures/Vacature/DLT-Development-Engineer-Cryptography-1.htm?org=searchresult
Cambridge Quantum Computing Limited
Key Requirements
A degree in Mathematics or other quantitative disciplines such as Physics or Computer Science with a strong mathematical component.
A Passion for approaching complex problems with the goal to design and deliver novel practical solutions.
Experience writingelegant, functional and well tested code in languagessuch as python, matlab, C/C++ etc.
The ability to understand technical and advanced material and translate this into code.
DesirableRequirements
Interest in the Blockchain and its protocols, Several Existing Cryptocurrencies, FinTech, mining, “proof of work” concept etc.
Some elementary knowledge of quantum computing (what is it, why in theory it can compromise cyber security in several aspects of our day to day life)
All candidates must be eligible to live and work in the UK.
The successful candidate will be compensated with a competitive salary and will join the company’s attractive share option and bonus scheme.
Closing date for applications: 1 December 2018
DarkMatter - Abu Dhabi
As a Senior Cryptography Engineer - Cloud Engineer, you will:
- Design, implement and deploy cryptographic algorithms tailored for a cloud environment.
- Conduct research and development in differential privacy, secret sharing, multi-party secure computation and fully homomorphic encryption.
- Perform security assessments of crypto-primitives, cryptosystems and cloud security solutions at the theoretical and implementation level.
- Work closely with the other teams in the organization to design and deploy safe cloud-based solutions .
- Be involved in the integration of developed cryptosystems within DarkMatter products.
- Enjoy all the cultural, educational and travel opportunities Abu Dhabi offers
To bring your dream to life, you’ll need:
- PhD degree in Cryptography, Applied Cryptography, Information Theory and Mathematics or Computer Science.
- Extensive experience developing in various programming languages.
- A desire to innovate in the UAE
Closing date for applications: 17 February 2019
Contact: Mehdi Messaoudi
Sourcing Specialist - Recruitment
More information: https://careers.darkmatter.ae/jobs/senior-cryptography-engineer-cloud-engineer-abu-dhabi-united-arab-emirates
Technische Universität Darmstadt, Germany
The ENCRYPTO group is member of the Center for Research in Security and Privacy (CRISP) and the profile area Cybersecurity at TU Darmstadt (CYSEC). We develop methods and tools for protecting privacy in applications. See https://encrypto.de for details.
The candidate will do cutting-edge research on techniques for protecting privacy in applications such as cryptographic protocols that scale to real-world problem sizes, including secure multi-party computation and private information retrieval.
The candidate is expected to have a completed Master (or equivalent) degree with excellent grades in IT security, computer science, electrical engineering, mathematics, or a closely related field. Solid knowledge in IT security, applied cryptography, efficient algorithms, circuit design, and excellent programming skills are required. Additional knowledge in cryptographic protocols, parallel computing, compiler construction, programming languages, and software engineering is a plus.
Review of applications starts immediately until the position is filled.
Please consult the webpage given below for more details and how to apply.
Closing date for applications:
Contact: Prof. Thomas Schneider
More information: https://encrypto.de/jobs/CRISP2