Kleptography Cryptography with Backdoors Milou Antheunisse
Introduction
Black-box cryptosystem. Capstone project by US government (1993). Adam Young and Moti Yung. SETUP attack. Kleptography. Introduction
SETUP. SETUP attacks. SETUP in RSA key generation II (PAP: Pretty awful privacy). Conclusions. Outline
SETUP The SETUP mechanism enables the attacker to exfiltrate users’ private information from the public output of the system, without the users noticing.
SETUP S ecretly E mbedded T rapdoor with U niversal P rotection
SETUP
SETUP attacks SETUP in RSA: – SETUP in RSA key generation I. – SETUP in RSA key generation II (PAP). SETUP in ElGamal: – SETUP in ElGamal key generation I. – SETUP in ElGamal key generation II. – SETUP in ElGamal signature scheme. SETUP in Diffie-Hellman: – SETUP in Diffie-Hellman key exchange.
SETUP in RSA key generation II (PAP)
Key generation
SETUP in RSA key generation II (PAP)
Conclusions Use Open Source for security!