Security of symmetric encryption against mass surveillance

M Bellare, KG Paterson, P Rogaway - … , Santa Barbara, CA, USA, August 17 …, 2014 - Springer
Motivated by revelations concerning population-wide surveillance of encrypted
communications, we formalize and investigate the resistance of symmetric encryption …

NIZKs with an untrusted CRS: security in the face of parameter subversion

M Bellare, G Fuchsbauer, A Scafuro - … on the Theory and Application of …, 2016 - Springer
Motivated by the subversion of “trusted” public parameters in mass-surveillance activities,
this paper studies the security of NIZKs in the presence of a maliciously chosen common …

A systematic analysis of the Juniper Dual EC incident

S Checkoway, J Maskiewicz, C Garman… - Proceedings of the …, 2016 - dl.acm.org
In December 2015, Juniper Networks announced multiple security vulnerabilities stemming
from unauthorized code in ScreenOS, the operating system for their NetScreen VPN routers …

Cliptography: Clipping the power of kleptographic attacks

A Russell, Q Tang, M Yung, HS Zhou - … on the Theory and Application of …, 2016 - Springer
Kleptography, introduced 20 years ago by Young and Yung [Crypto'96], considers the (in)
security of malicious implementations (or instantiations) of standard cryptographic primitives …

Mass-surveillance without the state: Strongly undetectable algorithm-substitution attacks

M Bellare, J Jaeger, D Kane - Proceedings of the 22nd ACM SIGSAC …, 2015 - dl.acm.org
We present new algorithm-substitution attacks (ASAs) on symmetric encryption that improve
over prior ones in two ways. First, while prior attacks only broke a sub-class of randomized …

Subversion-resilient signature schemes

G Ateniese, B Magri, D Venturi - Proceedings of the 22nd ACM SIGSAC …, 2015 - dl.acm.org
We provide a formal treatment of security of digital signatures against subversion attacks
(SAs). Our model of subversion generalizes previous work in several directions, and is …

Message transmission with reverse firewalls—secure communication on corrupted machines

Y Dodis, I Mironov, N Stephens-Davidowitz - Annual international …, 2016 - Springer
Suppose Alice wishes to send a message to Bob privately over an untrusted channel.
Cryptographers have developed a whole suite of tools to accomplish this task, with a wide …

Verified correctness and security of mbedTLS HMAC-DRBG

KQ Ye, M Green, N Sanguansin, L Beringer… - Proceedings of the …, 2017 - dl.acm.org
We have formalized the functional specification of HMAC-DRBG (NIST 800-90A), and we
have proved its cryptographic security-that its output is pseudorandom--using a hybrid game …

Generic semantic security against a kleptographic adversary

A Russell, Q Tang, M Yung, HS Zhou - Proceedings of the 2017 ACM …, 2017 - dl.acm.org
Notable recent security incidents have generated intense interest in adversaries which
attempt to subvert---perhaps covertly---crypto\-graphic algorithms. In this paper we develop …

A more cautious approach to security against mass surveillance

JP Degabriele, P Farshim, B Poettering - Fast Software Encryption: 22nd …, 2015 - Springer
Abstract At CRYPTO 2014 Bellare, Paterson, and Rogaway (BPR) presented a formal
treatment of symmetric encryption in the light of algorithm substitution attacks (ASAs), which …