[go: up one dir, main page]

Bruseghini et al., 2022 - Google Patents

Victory by KO: Attacking OpenPGP using key overwriting

Bruseghini et al., 2022

View PDF
Document ID
17412810065875244128
Author
Bruseghini L
Huigens D
Paterson K
Publication year
Publication venue
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security

External Links

Snippet

We present a set of attacks on the OpenPGP specification and implementations of it which result in full recovery of users' private keys. The attacks exploit the lack of cryptographic binding between the different fields inside an encrypted private key packet, which include …
Continue reading at www.research-collection.ethz.ch (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00

Similar Documents

Publication Publication Date Title
US12355864B1 (en) Trust framework against systematic cryptographic breach
EP3721603B1 (en) System and method for creating decentralized identifiers
US10652015B2 (en) Confidential communication management
Barker et al. Nist special publication 800-57 part 1, revision 4
Barker et al. NIST special publication 800-57
JP4501349B2 (en) System module execution device
US7568114B1 (en) Secure transaction processor
CN109361668A (en) A method of reliable data transmission
US6986041B2 (en) System and method for remote code integrity in distributed systems
Bruseghini et al. Victory by KO: Attacking OpenPGP using key overwriting
US9160538B2 (en) Detection method for fraudulent mail, detection program therefor, and detection device therefor
Dauterman et al. {SafetyPin}: Encrypted backups with {Human-Memorable} secrets
KR20210036700A (en) Blockchain system for supporting change of plain text data included in transaction
Chase et al. Acsesor: A new framework for auditable custodial secret storage and recovery
Feng et al. A fair multi-party non-repudiation scheme for storage clouds
US8090954B2 (en) Prevention of unauthorized forwarding and authentication of signatures
Levillain Implementation flaws in TLS stacks: lessons learned and study of TLS 1.3 benefits
Albrecht et al. Share with care: Breaking E2EE in Nextcloud
Fischlin et al. Verifiable verification in cryptographic protocols
Dauterman et al. Accountable authentication with privacy protection: The Larch system for universal login
GB2395304A (en) A digital locking system for physical and digital items using a location based indication for unlocking
Li et al. End-to-End Encrypted Git Services
Ganesan et al. Quantum-Resilient Security Controls
Abbdal et al. Secure third party auditor for ensuring data integrity in cloud storage
WO2025163752A1 (en) Information processing device, terminal, communication system, communication method, and program