Главная
Study mode:
on
1
Intro
2
Modern Symmetric Cryptography
3
Authenticated Encryption
4
(Non-) Committing AEAD
5
What we know about non-committing AEAD Definitional landscape
6
Brute-force Dictionary Attack
7
Partitioning Oracle Attacks: Setting Setting interface has secret pwchosen from D
8
Key multi-collision attacks Targeted multi-key collision resistance TMKCRI
9
Computing Key Multi-Collisions for AES-GCM then
10
An Overview of GHASH A Carter Wegman MAC which computes over Galois field GF213
11
Shadowsocks: threat model
12
Password Recovery for Shadowsocks
13
Shadowsocks Attack: experimental evaluation
14
OPAQUE: building partitioning oracles
15
OPAQUE: early implementations
16
OPAQUE An asymmetric Pasword Authenticated Key Exchange (PAKE)
17
Vulnerabilities from non-committing AEAD (so far)
Description:
Explore a comprehensive analysis of partitioning oracle attacks in cryptography through this conference talk from the Workshop on Attacks in Cryptography at Crypto 2021. Delve into modern symmetric cryptography, authenticated encryption, and non-committing AEAD. Examine the definitional landscape and brute-force dictionary attacks before focusing on partitioning oracle attacks in various settings. Investigate key multi-collision attacks, targeted multi-key collision resistance, and their application to AES-GCM. Learn about the GHASH algorithm and its role in Carter-Wegman MACs. Analyze real-world examples, including password recovery in Shadowsocks and vulnerabilities in OPAQUE implementations. Gain insights into asymmetric Password Authenticated Key Exchange (PAKE) and the broader implications of non-committing AEAD vulnerabilities in cryptographic systems.

Partitioning Oracle Attacks

TheIACR
Add to list