2013-08-01
Counter-cryptanalysis
Publication
Publication
We introduce \emph{counter-cryptanalysis} as a new paradigm for strengthening weak cryptographic primitives against cryptanalytic attacks. Redesigning a weak primitive to more strongly resist cryptanalytic techniques will unavoidably break backwards compatibility. Instead, counter-cryptanalysis exploits unavoidable anomalies introduced by cryptanalytic attacks to detect and block cryptanalytic attacks while maintaining full backwards compatibility. Counter-cryptanalysis in principle enables the continued secure use of weak cryptographic primitives. Furthermore, we present the first example of counter-cryptanalysis, namely the efficient detection whether any given single message has been constructed -- together with an \emph{unknown} sibling message -- using a cryptanalytic collision attack on MD5 or SHA-1.% to result in the same hash.%MD5 or SHA-1 hash. An immediate application is in digital signature verification software to ensure that an (older) MD5 or SHA-1 based digital signature is not a forgery using a collision attack. This would certainly be desirable for two reasons. Firstly, it might still be possible to generate malicious forgeries using collision attacks as too many parties still sign using MD5 (or SHA-1) based signature schemes. Secondly, any such forgeries are currently accepted nearly everywhere due to the ubiquitous support of MD5 and SHA-1 based signature schemes. Despite the academic push to use more secure hash functions over the last decade, these two real-world arguments (arguably) will remain valid for many more years. Only due to counter-cryptanalysis were we able to discover that Flame, a highly advanced malware for cyberwarfare uncovered in May 2012, employed an as of yet unknown variant of our chosen-prefix collision attack on MD5 \cite{DBLP:conf/eurocrypt/StevensLW07,DBLP:conf/crypto/StevensSALMOW09}. In this paper we disect the revealed cryptanalytic details and work towards the reconstruction of the algorithms underlying Flame's new variant attack. Finally, we make a preliminary comparision between Flame's attack and our chosen-prefix collision attack.
Additional Metadata | |
---|---|
Springer | |
R. Canetti , J.A. Garay | |
doi.org/10.1007/978-3-642-40041-4_8 | |
Lecture Notes in Computer Science | |
Cryptanalysis of Widely-used Hash Function Standards and Beyond , Cryptanalysis of Widely-used Hash Function Standards and Beyond | |
Annual International Cryptology Conference | |
Organisation | Cryptology |
Stevens, M. (2013). Counter-cryptanalysis. In R. Canetti & J. A. Garay (Eds.), Proceedings of Annual International Cryptology Conference 2013 (CRYPTO 33) (pp. 129–146). Springer. doi:10.1007/978-3-642-40041-4_8 |
Additional Files | |
---|---|
22243B.pdf Author Manuscript , 603kb | |
Publisher Version |
See Also |
---|
software
|