Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Books and Book parts
  4. Clever Arbiters Versus Malicious Adversaries
 
book part or chapter

Clever Arbiters Versus Malicious Adversaries

Vaudenay, Serge  
Ryan, Peter Y. A.
•
Naccache, David
Show more
2016
The New Codebreakers

When moving from known-input security to chosen-input security, some generic attacks sometimes become possible and must be discarded by a specific set of rules in the threat model. Similarly, common practices consist of fixing security systems, once an exploit is discovered, by adding a specific rule to thwart it. To study feasibility, we investigate a new security notion: security against undetectable attacks. I.e., attacks which cannot be ruled out by any specific rule based on the observable behavior of the adversary. In this model, chosen-input attacks must specify inputs which are indistinguishable from the ones in known-input attacks. Otherwise, they could be ruled out, in theory. Although non-falsifiable, this notion provides interesting results: for any primitives based on symmetric encryption, message authentication code (MAC), or pseudorandom function (PRF), known-input security is equivalent to this restricted chosen-input security in Minicrypt. Otherwise, any separation implies the construction of a public-key cryptosystem (PKC): for a known-input-secure primitive, any undetectable chosen-input attack transforms the primitive into a PKC. In this paper, we develop the notion of security based on open rules. We show the above results. We revisit the notion of related-key security of block ciphers to illustrate these results. Interestingly, when the relation among the keys is specified as a black box, no chosen-relation security is feasible. By translating this result to non-black box relations, either no known-input security is feasible, or we can recognize any obfuscated relation by a fixed set of rules, or we can build a PKC. Any of these three results is quite interesting in itself.

  • Files
  • Details
  • Metrics
Type
book part or chapter
DOI
10.1007/978-3-662-49301-4_31
Author(s)
Vaudenay, Serge  
Editors
Ryan, Peter Y. A.
•
Naccache, David
•
Quisquater, Jean-Jacques
Date Issued

2016

Publisher

Springer Berlin Heidelberg

Publisher place

Berlin, Heidelberg

Published in
The New Codebreakers
Start page

497

End page

517

Series title/Series vol.

Lecture Notes in Computer Science

Written at

EPFL

EPFL units
LASEC  
Available on Infoscience
October 18, 2016
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/130484
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés