作者
Julia Len, Paul Grubbs, Thomas Ristenpart
发表日期
2021
研讨会论文
30th USENIX security symposium (USENIX Security 21)
页码范围
195-212
简介
In this paper we introduce partitioning oracles, a new class of decryption error oracles which, conceptually, take a ciphertext as input and output whether the decryption key belongs to some known subset of keys. Partitioning oracles can arise when encryption schemes are not committing with respect to their keys. We detail adaptive chosen ciphertext attacks that exploit partitioning oracles to efficiently recover passwords and de-anonymize anonymous communications. The attacks utilize efficient key multi-collision algorithms—a cryptanalytic goal that we define—against widely used authenticated encryption with associated data (AEAD) schemes, including AES-GCM, XSalsa20/Poly1305, and ChaCha20/Poly1305.
引用总数
学术搜索中的文章
J Len, P Grubbs, T Ristenpart - 30th USENIX security symposium (USENIX Security 21 …, 2021