Contact Info
Combinatorics & Optimization
University of Waterloo
Waterloo, Ontario
Canada N2L 3G1
Phone: 519-888-4567, ext 33038
PDF files require Adobe Acrobat Reader.
Title: Undermining key exchange
Speaker: | Douglas Stebila |
Affiliation: | University of Waterloo |
Room: | MC 5501 |
Abstract:
There are many ways to undermine systems that rely on cryptography. An attacker could of course try to find flaws in the hardware and software implementing the system, or find mathematical weaknesses in the cryptographic algorithms. But a more subtle attacker may try to *introduce* flaws: inserting backdoors into cryptographic standards, or replacing software or hardware implementations surreptitiously, which are called "algorithm substitution attacks". One goal of algorithm subsitution attacks is "kleptography": leaking a secret key from an implementation to an external adversary. This talk will investigate algorithm substition attacks on key exchange protocols, which play a central role in establishing secure communication channels. We will explore how some traditional security goals of key exchange--such as forward secrecy--inherently conflict with the ability to detect algorithm substitution attacks.
This talk is based on work in progress with Mihir Bellare, Kenny Paterson, and Joanne Woodage.
Combinatorics & Optimization
University of Waterloo
Waterloo, Ontario
Canada N2L 3G1
Phone: 519-888-4567, ext 33038
PDF files require Adobe Acrobat Reader.
The University of Waterloo acknowledges that much of our work takes place on the traditional territory of the Neutral, Anishinaabeg and Haudenosaunee peoples. Our main campus is situated on the Haldimand Tract, the land granted to the Six Nations that includes six miles on each side of the Grand River. Our active work toward reconciliation takes place across our campuses through research, learning, teaching, and community building, and is co-ordinated within the Office of Indigenous Relations.