International Association for Cryptologic Research

International Association
for Cryptologic Research

IACR News

If you have a news item you wish to distribute, they should be sent to the communications secretary. See also the events database for conference announcements.

Here you can see all recent updates to the IACR webpage. These updates are also available:

email icon
via email
RSS symbol icon
via RSS feed

23 August 2021

Ben Nassi, Yaron Pirutin, Tomer Cohen Galor, Yuval Elovici, Boris Zadov
ePrint Report ePrint Report
Two main classes of optical TEMPEST attacks against the confidentiality of information processed/delivered by devices have been demonstrated in the past two decades; the first class includes methods for recovering content from monitors, and the second class includes methods for recovering keystrokes from physical and virtual keyboards. In this paper, we identify a new class of optical TEMPEST attacks: recovering sound by analyzing optical emanations from a device’s power indicator LED. We analyze the response of the power indicator LED of various devices to sound and show that there is an optical correlation between the sound that is played by connected speakers and the intensity of their power indicator LED due to the facts that: (1) the power indicator LED of various devices is connected directly to the power line, (2) the intensity of a device’s power indicator LED is correlative to the power consumption, and (3) many devices lack a dedicated means of countering this phenomenon. Based on our findings, we present the Glowworm attack, an optical TEMPEST attack that can be used by eavesdroppers to recover sound by analyzing optical measurements obtained via an electro-optical sensor directed at the power indicator LED of various devices (e.g., speakers, USB hub splitters, and microcontrollers). We propose an optical-audio transformation (OAT) to recover sound in which we isolate the speech from optical measurements obtained by directing an electro-optical sensor at a device’s power indicator LED Finally, we test the performance of the Glowworm attack in various experimental setups and show that an eavesdropper can apply the attack to recover speech from speakers’ power LED indicator with good intelligibility from a distance of 15 meters and with fair intelligibility from 35 meters.
Expand

20 August 2021

University of Stuttgart, Institute of Information Security
Job Posting Job Posting
The Institute of Information Security and the Perceptual User Interfaces Group at University of Stuttgart, Germany invite applications for a PhD position on "Privacy-Preserving Attentive User Interfaces" at the intersection of Security/Privacy/Cryptography, Machine Learning, and Human-Computer Interaction.

Apply if you belong to the top 5% of students in your peer group, are highly motivated and capable of addressing and solving scientifically challenging problems, and if you are interested in doing research in an internationally oriented, interdisciplinary, and highly successful team. We value strong analytical skills. Knowledge of cryptography, in particular, privacy enhancing technologies such as Multi Party Computation and Differential Privacy, is an asset. Knowledge of German is not required.

The University of Stuttgart is an equal opportunity employer. Applications from women are strongly encouraged. Severely challenged persons will be given preference in the case of equal qualifications.

To apply, please send email with subject "PhD position: Privacy-Preserving Attentive User Interfaces" and a single PDF file containing the following documents to ralf.kuesters@sec.uni-stuttgart.de:

  • Cover letter (explaining your scientific background and your motivation to apply)
  • Curriculum Vitae
  • List of publications (if any)
  • Copies of transcripts and certificates (Bachelor and Master)
  • Names and contact addresses of at least two references
The deadline for applications is

September 12th, 2021.

Late applications will be considered until the position is filled.

See https://sec.uni-stuttgart.de/ for more information about the Institute of Information Security (Prof. Küsters) and http://www.perceptualui.org/ for the Perceptual User Interfaces Group (Prof. Bulling).

Closing date for applications:

Contact: Prof. Dr. Ralf Küsters

ralf.kuesters@sec.uni-stuttgart.de

More information: https://sec.uni-stuttgart.de/

Expand
IST Austria, Vienna
Job Posting Job Posting
Join https://ist.ac.at/en/research/kokoris-group/ and work on decentralized systems. This position is in support of the Marie Skłodowska-Curie fellowship and is intended to support candidates in order to either strengthen their academic profile or pivot their career towards entrepreneurship or social impact. More info at https://ist.ac.at/en/education/postdocs/ist-bridge/ Deadlines: 05/11/21 – 05/05/22 – 05/11/22 – 05/05/23 – 05/11/23 Competitive salary and full social coverage.

Closing date for applications:

Contact: Lefteris Kokoris-Kogias

More information: https://twitter.com/LefKok/status/1427299702530363405

Expand
Microsoft Research India, Bangalore
Job Posting Job Posting
Microsoft Research India is looking for an experienced Research Software Development Engineer to work on building and deploying next generation systems. The engineer should have expertise in computer systems with a passion for deploying solutions at scale.  You will be working closely with a team of researchers and engineers to design and deploy new innovative solutions that significantly improve the state of the art. Responsibilities: We are looking for an engineer with proven skills to deliver on the ambitious goals of the team. Qualifications Required Skills & Qualifications: •Strong technical skills involving design and coding •Strong programming skills in C/C++/C# or a similar language •Effective communication and collaboration •5+ years of industry experience in software development Desired Skills & Qualifications: •BS or MS in Computer Science •Familiarity with privacy-preserving technologies, such as multi-party computation, homomorphic encryption, or differential privacy is a plus Microsoft is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable laws, regulations and ordinances. Benefits/perks listed below may vary depending on the nature of your employment with Microsoft and the country where you work.

Closing date for applications:

Contact: https://careers.microsoft.com/us/en/job/1129518/Research-SDE

More information: https://careers.microsoft.com/us/en/job/1129518/Research-SDE

Expand
Indian Institute of Science (IISc)
Job Posting Job Posting
The position for a research assistant is open in Cryptography and Information Security (CrIS) Lab at IISc. CrIS lab is associated to the Department of Computer Science and Automation (CSA). The research focus of the lab include secure multiparty computation, fault-tolerant distributed computing, and privacy preserving machine learning, but is not limited to them.

This position is open for post-graduate (MSc/MS/MTech/Dual degree/Integrated Mtech) students interested in getting more research experience. Applicants who have credited a cryptography course in their home institute and/or who have worked on a related topic for their master's thesis are preferred.

You can apply through and find further details regarding opportunities at CrIS here -
https://www.csa.iisc.ac.in/~cris/opportunities.html

Closing date for applications:

Contact: Arpita Patra

More information: https://www.csa.iisc.ac.in/~cris/about.html

Expand
Indian Institute of Science (IISc)
Job Posting Job Posting
There are two postdoctoral positions open in Cryptography and Information Security (CrIS) Lab at IISc. CrIS lab is associated to the Department of Computer Science and Automation (CSA). The research focus of the lab include secure multiparty computation, fault-tolerant distributed computing, and privacy preserving machine learning, but is not limited to them.

The applicant is expected to have completed a PhD degree (recently) in Cryptography or a related subject with strong publication records. A background in theoretical aspects of secure multiparty computation and/or experience in coding for practical aspects of secure computation is expected. Postdoctoral fellows are expected to actively interact with PhD students and contribute to the lab's projects. The tenure of the position is for one year and can be extended further.

You can apply through and find further details regarding opportunities at CrIS here -
https://www.csa.iisc.ac.in/~cris/opportunities.html

Closing date for applications:

Contact: Arpita Patra

More information: https://www.csa.iisc.ac.in/~cris/about.html

Expand

16 August 2021

InfoSec Global
Job Posting Job Posting
InfoSec Global is a company that works on creating Cryptographic Lifecycle Management. This includes Crypto Analytics Tools, adaptation our Crypto Agility Platform, preparing for and migrating to Post-Quantum Cryptography, implementing Cryptographic Libraries. We work on innovative cryptography and crypto management tools, bringing them to life and moving it from static to dynamic. For more information, please visit our website infosecglobal.com We are looking to hire a Cryptographic Engineer to our core cryptographic team, whose work will be focused around our innovative product AgileSec platform and cryptographic development in general. As a Cryptographic Engineer in our team, your responsibilities will include: • Working on cryptographic SDKs • Working on cryptographic library implementation • Deriving and encoding cryptographic policies • Crypto Automation • Implementing cryptographic algorithms Required Qualifications: • Bachelor’s or Master’s degree • Experience working with Git • Experience working with SDKs • Knowledge of C and other programming languages • Extensive software development experience Preferred Qualifications: • Knowledge and experience working with cryptographic engines • Knowledge and experience working with TLS stack • Ability to write clear technical documentation This is a full-time role at the Toronto (HQ) office. Currently, the work would be performed remotely for the time being. The employee will be eligible for health benefits after the probation period. Also, the employee should have a Canadian PR or Citizenship status.

Closing date for applications:

Contact: Vladimir Soukharev

More information: https://www.infosecglobal.com/

Expand
University of Wuppertal, Germany
Job Posting Job Posting
We are looking for a Ph.D. student or postdoc in cryptography, for research projects on public key encryption with enhanced functionality and secure outsourced storage.

For more information about our research group, see https://itsc.uni-wuppertal.de/en/

Prerequisites for a Ph.D. candidate:
  • M.Sc. or similar degree in computer science
  • Strong background in cryptography and theoretical computer science
Prerequisites for a postdoc position: Ph.D. in public key cryptography or a closely related area

The official job announcement can be found at https://stellenausschreibungen.uni-wuppertal.de/ (unfortunately in German only). This announcement is in German only. However, German language skills are not required, the working language in the group is English.

If you have questions, please contact Tibor Jager by e-mail.

Closing date for applications:

Contact: Tibor Jager, see group web page for e-mail address.

More information: https://itsc.uni-wuppertal.de/en/

Expand
Lior Goldberg, Shahar Papini, Michael Riabzev
ePrint Report ePrint Report
Proof systems allow one party to prove to another party that a certain statement is true. Most existing practical proof systems require that the statement will be represented in terms of polynomial equations over a finite field. This makes the process of representing a statement that one wishes to prove or verify rather complicated, as this process requires a new set of equations for each statement. Various approaches to deal with this problem have been proposed. We present Cairo, a practically-efficient Turing-complete STARK-friendly CPU architecture. We describe a single set of polynomial equations for the statement that the execution of a program on this architecture is valid. Given a statement one wishes to prove, Cairo allows writing a program that describes that statement, instead of writing a set of polynomial equations.
Expand
Yingyin Pan, Jianghua Zhong, Dongdai Lin
ePrint Report ePrint Report
Nonlinear feedback shift registers (NFSRs) are used in many stream ciphers as their main building blocks. In particular, Galois NFSRs with terminal bits are used in the typical stream ciphers Grain and Trivium. One security criterion for the design of stream ciphers is to assure their used NFSRs are nonsingular. The nonsingularity is well solved for Fibonacci NFSRs, whereas it is not for Galois NFSRs. In addition, some types of Galois NFSRs equivalent to Fibonacci ones have been found. However, there exist new types of such Galois NFSRs remains unknown. The paper first considers the nonsingularity of Galois NFSRs. Some necessary/sufficient conditions are presented. The paper then concentrates on the equivalence between Galois NFSRs and Fibonacci ones. Some necessary conditions for Galois NFSRs equivalent to Fibonacci ones are provided. The Galois NFSRs with terminal bits equivalent to a given Fibonacci one are enumerated. Moreover, two classes of nonsingular Galois NFSRs with terminal bits are found to be the new types of Galois NFSRs equivalent to Fibonacci ones.
Expand
Pavel Atnashev, George Woltman
ePrint Report ePrint Report
This paper introduces fast algorithms for performing group operations on Edwards curves using FFT-based multiplication. Previously known algorithms can use such multiplication too, but better results can be achieved if particular properties of FFT-based arithmetic are accounted for. The introduced algorithms perform operations in extended Edwards coordinates and in Montgomery single coordinate.
Expand
Hadrien Barral, Éric Brier, Rémi Géraud-Stewart, Arthur Léonard, David Naccache, Quentin Vermande, Samuel Vivien
ePrint Report ePrint Report
We report the discovery of new results relating $L$-functions, which typically encode interesting information about mathematical objects, obtained in a \emph{semi-automated} fashion using an algebraic sieving technique.

Algebraic sieving initially comes from cryptanalysis, where it is used to solve factorization, discrete logarithms, or to produce signature forgeries in cryptosystems such as RSA. We repurpose the technique here to provide candidate identities, which can be tested and ultimately formally proven.

A limitation of our technique is the need for human intervention in the post-processing phase, to determine the most general form of conjectured identities, and to provide a proof for them. Nevertheless we report 29 identities that hitherto never appeared in the literature, 9 of which we could completely prove, the remainder being numerically valid over all tested values.

This work complements other instances in the literature where this type of automated symbolic computation has served as a productive step toward theorem proving; it can be extremely helpful in figuring out what it is that one should attempt to prove.
Expand
Sabyasachi Dey, Chandan Dey, Santanu Sarkar, Willi Meier
ePrint Report ePrint Report
ChaCha has been one of the prominent ARX designs of the last few years because of its use in several systems. The cryptanalysis of ChaCha involves a differential attack which exploits the idea of Probabilistic Neutral Bits (PNBs). For a long period, the single-bit distinguisher in this differential attack was found up to 3 rounds. At Crypto $2020$, Beierle et. al. introduced for the first time single bit distinguishers for $3.5$ rounds, which contributed significantly in regaining the flow of research work in this direction. This discovery became the primary factor behind the huge improvement in the key recovery attack complexity in that work. This was followed by another work at Eurocrypt 2021, where a single bit distinguisher of $3.5$-th round helped to produce a 7-round distinguisher of ChaCha and a further improvement in key recovery.

In the first part of this paper, we provide the theoretical framework for the distinguisher given by Beierle et. al. We mathematically derive the observed differential correlation for the particular position where the output difference is observed at $3.5$ rounds. Also, Beierle et. al. mentioned the issue of the availability of proper IVs to produce such distinguishers, and pointed out that not all keys have such IVs available. Here we provide a theoretical insight of this issue.

Next we revisit the work of Coutinho et. al. (Eurocrypt 2021). Using Differential-Linear attacks against ChaCha, they claimed distinguisher and key recovery with complexities $2^{218}$ and $2^{228.51}$ respectively. We show that the differential correlation for $3.5$ rounds is much smaller than the claim of Coutinho et. al. This makes the attack complexities much higher than their claim.
Expand
Hyunji Kim, Gyeongju Song, Kyoungbae Jang, Hwajeong Seo
ePrint Report ePrint Report
Recently, artificial intelligence-based cryptanalysis techniques have been researched. In this paper, we find the key of the Caesar cipher, which is a classical cipher, by using a quantum machine learning algorithm that learns by parameterized quantum circuit instead of a classical neural network. In the case of 4-bit plaintext and key, results could not be obtained due to the limitations of the cloud environment. But in the case of 2-bit plaintext and key, an accuracy of 1.0 was achieved, and in the case of 3-bit plaintext and key, an accuracy of 0.84 was achieved. In addition, as a result of cryptanalysis for a 2-bit dataset on IBM's real quantum processor, a classification accuracy of 0.93 was achieved. In the future, we will research a qubit reduction method for cryptanalysis of longer-length plaintext and key, and a technique for maintaining accuracy in real quantum hardware.
Expand
Chun-I Fan, Cheng-Han Shie, Yi-Fan Tseng, Hui-Chun Huang
ePrint Report ePrint Report
As Internet of Things (IoT) thriving over the whole world, more and more IoT devices and IoT-based protocols have been designed and proposed in order to meet people's needs. Among those protocols, message queueing telemetry transport (MQTT) is one of the most emerging and promising protocol, which provides many-to-many message transmission based on the ``publish/subscribe'' mechanism. It has been widely used in industries such as the energy industry, chemical engineering, self-driving, etc. While transporting important messages, MQTT specification recommends the use of TLS protocol. However, computation cost of TLS is too heavy. Since topics in a broker are stored with a hierarchical structure, In this manuscript, we propose a novel data protection protocol for MQTT from hierarchical ID-based encryption. Our protocol adopts the intrinsic hierarchical structures of MQTT, and achieves constant-size keys, i.e. independent of the depth in hierarchical structures.
Expand
Chun-I Fan, Si-Jing Wu, Yi-Fan Tseng
ePrint Report ePrint Report
With the rapid advancement of cloud computing, users upload their files to the cloud server so that any user can access it remotely. To assure the data security, the data owner, typically, encrypts the data before outsourcing them to the cloud server. In addition, an encryption mechanism needs to enable the consumers to perform efficient searches of such encrypted data in the cloud storages through keywords, i.e. searchable encryption. However, most of searchable encryption is improper due to several limitations, such as the requirement of an on-line fully trusted third party, poor efficiency, high-overhead in user revocation, support of a single keyword search, etc. To mitigate such limitations, an attribute-based encryption scheme with fine-grained multi-keyword search is proposed. The new scheme supports the user revocation. In addition, the length of the ciphertext as well as the secret key do not grow linearly under the influence of the size of attribute set. The performance of the proposed scheme is better as compared to other related schemes. Hence, one can easily adopt the proposed scheme for the real life applications due to its flexibility in terms of its features, security and efficiency.
Expand
François Garillot, Yashvanth Kondi, Payman Mohassel, Valeria Nikolaenko
ePrint Report ePrint Report
Schnorr's signature scheme permits an elegant threshold signing protocol due to its linear signing equation. However each new signature consumes fresh randomness, which can be a major attack vector in practice. Sources of randomness in deployments are frequently either unreliable, or require state continuity, i.e. reliable fresh state resilient to rollbacks. State continuity is a notoriously difficult guarantee to achieve in practice, due to system crashes caused by software errors, malicious actors, or power supply interruptions (Parno et al., S&P '11). This is a non-issue for Schnorr variants such as EdDSA, which is specified to derive nonces deterministically as a function of the message and the secret key. However, it is challenging to translate these benefits to the threshold setting, specifically to construct a threshold Schnorr scheme where signing neither requires parties to consume fresh randomness nor update long-term secret state.

In this work, we construct a dishonest majority threshold Schnorr protocol that enables such stateless deterministic nonce derivation using standardized block ciphers. Our core technical ingredients are new tools for the zero-knowledge from garbled circuits (ZKGC) paradigm to aid in verifying correct nonce derivation: - A mechanism based on UC Commitments that allows a prover to commit once to a witness, and prove an unbounded number of statements online with only cheap symmetric key operations. - A garbling gadget to translate intermediate garbled circuit wire labels to arithmetic encodings.

Our scheme prioritizes computation cost, with each proof requiring only a small constant number of exponentiations.
Expand
Alessandra Scafuro, Bihan Zhang
ePrint Report ePrint Report
A ring signature allows a party to sign messages anonymously on behalf of a group, which is called ring. Traceable ring signatures are a variant of ring signatures that limits the anonymity guarantees, enforcing that a member can sign anonymously at most one message per tag. Namely, if a party signs two different messages for the same tag, it will be de-anomymized. This property is very useful in decentralized platforms to allow members to anonymously endorse statements in a controlled manner. In this work we introduce one-time traceable ring signatures, where a member can sign anonymously only one message. This natural variant suffices in many applications for which traceable ring signatures are useful, and enables us to design a scheme that only requires a few hash evaluations and outperforms existing (non one-time) schemes.

Our one-time traceable ring signature scheme presents many advantages: it is fast, with a signing time of less than 1 second for a ring of $2^{10}$ signers (and much less for smaller rings); it is {\em post-quantum resistant}, as it only requires hash evaluations; it is extremely simple, as it requires only a black-box access to a generic hash function (modeled as a random oracle) and no other cryptographic operation is involved. From a theoretical standpoint our scheme is also the first anonymous signature scheme based on a black-box access to a symmetric-key primitive. All existing anonymous signatures are either based on specific hardness assumptions (e.g., LWE, SIS, etc.) or use the underlying symmetric-key primitive in a non-black-box way, i.e., they leverage the circuit representation of the primitive.
Expand
Thinh H. Pham, Ben Marshall, Alexander Fell, Siew-Kei Lam, Daniel Page
ePrint Report ePrint Report
Side-channel analysis (SCA) attacks pose a major threat to embedded systems due to their ease of accessibility. Realising SCA resilient cryptographic algorithms on embedded systems under tight intrinsic constraints, such as low area cost, limited computational ability, etc., is extremely challenging and often not possible. We propose a seamless and effective approach to realise a generic countermeasure against SCA attacks. XDIVINSA, an extended diversifying instruction agent, is introduced to realise the countermeasure at the microarchitecture level based on the combining concept of diversified instruction set extension (ISE) and hardware diversification. XDIVINSA is developed as a lightweight co-processor that is tightly coupled with a RISC-V processor. The proposed method can be applied to various algorithms without the need for software developers to undertake substantial design efforts hardening their implementations against SCA. XDIVINSA has been implemented on the SASEBO G-III board which hosts a Kintex-7 XC7K160T FPGA device for SCA mitigation evaluation. Experimental results based on non-specific t-statistic tests show that our solution can achieve leakage mitigation on the power side channel of different cryptographic kernels, i.e., Speck, ChaCha20, AES, and RSA with an acceptable performance overhead compared to existing countermeasures.
Expand
Oleksandra Lapiha
ePrint Report ePrint Report
In this report we analyse and compare the complexity of solving the Bounded Distance Decoding problem in two families for discrete logarithm lattices. Our algorithm uses the internal structure of the lattice to decode an error close to Minkowski’s bound efficiently. This procedure can be used as a decryption algorithm of an encryption scheme, where the internal structure of the lattice serves as a secret key. In addition, one of these lattices was used in [1] to construct a family of one way functions. We present cryptanalysis of the mentioned scheme and we prove that the stated size of the keys is insufficient for a required security level.
Expand
◄ Previous Next ►