IACR News
Here you can see all recent updates to the IACR webpage. These updates are also available:
04 September 2024
Shuichi Hirahara, Zhenjian Lu, Igor C. Oliveira
ePrint Report- $\mathsf{OWF}$ can be based on the worst-case assumption that $\mathsf{BPEXP}$ is not contained infinitely often in $\mathsf{P}/\mathsf{poly}$ if the failure of symmetry of information for $\mathsf{pKt}$ in the $\textit{worst-case}$ implies its failure on $\textit{average}$. - $\mathsf{OWF}$ exist if and only if the average-case easiness of approximating $\mathsf{pKt}$ with $\textit{two-sided}$ error implies its (mild) average-case easiness with $\textit{one-sided}$ error.
Previously, in a celebrated result, Liu and Pass (CRYPTO 2021 and CACM 2023) proved that one can base (infinitely-often) $\mathsf{OWF}$ on the assumption that $\mathsf{EXP} \nsubseteq \mathsf{BPP}$ if and only if there is a reduction from computing $\mathsf{Kt}$ on average with $\textit{zero}$ error to computing $\mathsf{Kt}$ on average with $\textit{two-sided}$ error. In contrast, our second result shows that closing the gap between two-sided error and one-sided error average-case algorithms for approximating $\mathsf{pKt}$ is both necessary and sufficient to $\textit{unconditionally}$ establish the existence of $\mathsf{OWF}$.
Camille Nuoskala, Hossein Abdinasibfar, Antonis Michalas
ePrint ReportTobias Frauenschläger, Jürgen Mottok
ePrint ReportEden Aldema Tshuva, Elette Boyle, Ran Cohen, Tal Moran, Rotem Oshman
ePrint ReportSebastian Faller, Tobias Handirk, Julia Hesse, Máté Horváth, Anja Lehmann
ePrint ReportRené Rodríguez Aldama, Enes Pasalic, Fengrong Zhang, Yongzhuang Wei
ePrint ReportArghya Bhattacharjee, Ritam Bhaumik, Chandranan Dhar
ePrint ReportShivam Bhasin, Harishma Boyapally, Dirmanto Jap
ePrint ReportThomas Roche
ePrint ReportFIDO hardware tokens are strong authentication factors to sign in to applications (any web service supporting FIDO); they often embed a secure element and the FIDO protocol uses Elliptic Curve Digital Signature Algorithm (ECDSA for short) as its core cryptographic primitive. YubiKey 5 Series are certainly the most widespread FIDO hardware tokens, their secure element is an Infineon SLE78.
This document shows how – finding a JavaCard open platform (the Feitian A22) based on a similar Infineon SLE78 – we understood the Infineon ECDSA implementation, found a side-channel vulnerability and designed a practical side-channel attack. The attack is then demonstrated on a YubiKey 5Ci. Finally, we show that the vulnerability extends to the more recent Infineon Optiga Trust M and Infineon Optiga TPM security microcontrollers.
Our work unearths a side-channel vulnerability in the cryptographic library of Infineon Technologies, one of the biggest secure element manufacturers. This vulnerability – that went unnoticed for 14 years and about 80 highest-level Common Criteria certification evaluations – is due to a non constant-time modular inversion.
The attack requires physical access to the secure element (few local electromagnetic side-channel acquisitions, i.e. few minutes, are enough) in order to extract the ECDSA secret key. In the case of the FIDO protocol, this allows to create a clone of the FIDO device.
All YubiKey 5 Series (with firmware version below 5.7) are impacted by the attack and in fact all Infineon security microcontrollers (including TPMs) that run the Infineon cryptographic library (as far as we know, any existing version) are vulnerable to the attack. These security microcontrollers are present in a vast variety of secure systems – often relying on ECDSA – like electronic passports and crypto-currency hardware wallets but also smart cars or homes. However, we did not check (yet) that the EUCLEAK attack applies to any of these products.
Hyewon Sung, Sieun Seo, Taekyung Kim, Chohong Min
ePrint ReportMichael Klooß, Michael Reichle, Benedikt Wagner
ePrint ReportIn this work, we propose a new blind signature construction in the random oracle model that significantly improves upon the CTZ scheme. Compared to CTZ, our scheme reduces communication complexity by a factor of more than 10 and decreases the signature size by a factor of more than 45, achieving a compact signature size of only 224 Bytes. The security of our scheme is based on the DDH assumption over pairing-free cyclic groups, and we show how to generalize it to the partially blind setting.
Ehsan Ebrahimi
ePrint ReportKamil Kluczniak, Leonard Schild
ePrint ReportAravind Vishnu S S, M Sethumadhavan, Lakshmy K V
ePrint ReportShuhei Nakamura, Yusuke Tani, Hiroki Furue
ePrint ReportPaco Azevedo Oliveira, Andersson Calle Viera, Benoît Cogliati, Louis Goubin
ePrint ReportZhicong Huang, Wen-jie Lu, Yuchen Wang, Cheng Hong, Tao Wei, WenGuang Chen
ePrint ReportOur work addresses existing gaps by refining and correcting several issues identified in prior research, leading to the first practically efficient realization of RMFE. We introduce an array of protocol enhancements, including RMFE-based quintuples and (extended) double-authenticated bits, aimed at improving the efficiency of maliciously secure boolean and mixed circuits. The culmination of these efforts is embodied in Coral, a comprehensive framework developed atop the MP-SPDZ library. Through rigorous evaluation across multiple benchmarks, Coral demonstrates a remarkable efficiency gain, outperforming the foremost theoretical approach by Escudero et al. (which incorporates our RMFE foundation albeit lacks our protocol enhancements) by a factor of 16-30×, and surpassing the leading practical implementation for Frederiksen et al. (ASIACRYPT 2015) by 4-7×.
Cyberjaya, Malaysia, 24 September - 26 September 2024
Event CalendarMonash University, Faculty of Information Technology; Clayton Campus
Job PostingEmployment Type: Full-time
Duration: Continuing appointments
Remuneration:
$114,951 - $136,505 pa Level B (plus 17% employer superannuation)
$140,812 - $162,366 pa Level C (plus 17% employer superannuation)
Join the Future of IT at Monash University!
The Faculty of Information Technology at Monash University in Melbourne, Australia, is seeking dynamic and innovative individuals for multiple Level B Lecturer and Level C Senior Lecturer positions across three departments:
To find out more about career opportunities within the Faculty of IT visit our website.
Closing date for applications:
Contact:
Professor Dinh Phung, Head of Department, Data Science and AI, Dinh.Phung@monash.edu
Professor Monica Whitty, Head of Department, Software Systems and Cybersecurity, Monica.Whitty@monash.edu
Professor Helen Purchase, Head of Human Centred Computing, Helen.Purchase@monash.edu
More information: https://careers.pageuppeople.com/513/cw/en/job/667442/faculty-of-information-technology-academic-opportunities
Rochester Institute of Technology, Department of Cybersecurity, Rochester, New York, USA
Job PostingThe Department of Cybersecurity in the Golisano College of Computing and Information Sciences at RIT invites applications for a full-time tenure-track assistant professor position in the field of cybersecurity, beginning August 2025, with special interest in candidates whose research intersects with artificial intelligence, or which makes use of AI techniques.
Read more about the Department of Cybersecurity and the ESL Global Cybersecurity Institute at RIT here: https://csec.rit.edu/ and https://www.rit.edu/cybersecurity/
Please find more details regarding the position by following the Apply link below.
Required Minimum Qualifications
- Ph.D. in a computing or related discipline by date of appointment.
- Recent scholarly dissemination record that demonstrates exceptional potential in cybersecurity research; e.g. venues like IEEE Security & Privacy, USENIX Security, CCS, NDSS, etc.
- Demonstrated evidence of experience or potential to establish an independent, externally funded research program.
- Commitment and potential to teach effectively at the undergraduate and graduate levels, and the ability to mentor master/doctoral students.
- An interest in working in a collaborative, collegial department and among colleagues in the department, college, and institution.
- Ability to contribute in meaningful ways to the college's continuing commitment to cultural diversity, pluralism, and individual differences.
- Ability to communicate effectively in English.
Apply: Use Keyword Search 9160BR here: https://careers.rit.edu/faculty
Priority Deadline: Dec. 4
Closing date for applications:
Contact: Prof. Bill Brumley (bbbics AT rit DOT edu)
More information: https://careers.rit.edu/faculty