Download presentation
Presentation is loading. Please wait.
1
J. Håstad J. Jakobsson A. Juels M. Yung Funkspiel Schemes: An Alternative to Conventional Tamper Resistance Royal Inst. of Technology, Stockholm RSA Laboratories Certco
2
Captured by Germans, along with radio and three message/ciphertext pairs Lauwers worked as radio operator for SOE, British underground during WW II Germans sought to mount “Funkspiel”, i.e., pass false messages to SOE Lauwers SOE made use of a kind of MAC
3
Subverting the Funkspiel u Germans demanded to know “MAC” u Lauwers had been instructed to introduce an error into 16th letter of every message as “MAC” u Lauwers made clever observation about his three messages: …………....stop….. Message 1: Message 2: …………....stop….. Message 3: ………….……..….. o o u e u Claimed that “MAC” involved corruption of ‘o’ in stop 16th letter
4
Subverting the Funkspiel u Germans were deceived u Allies were deceived
5
Modern cryptographer’s view Alice Bob Eve (Enemy)
6
Funkspiel scheme Alice Bob Eve
7
Step 1: Alice sends messages to Bob Alice Bob Eve message 1, MAC (message 1 ) message 2, MAC (message 2 ) message 3, MAC (message 3 )
8
Step 2: Alice changes key (maybe) Alice
9
Step 3: Eve steals Alice’s key Alice
10
Step 4: Eve impersonates Alice Bob Eve “I love you”, MAC (“I love you”)
11
Step 5: Bob determines whether Alice changed key MAC (“I love you”) She loves me? She loves me not?
12
What do we want? u Eve can’t tell whether Alice changed key –Even though Eve has seen MAC(message 1 ), MAC(message 2 ),... u Bob can tell whether Alice changed key
13
Related work u Forward-secure signature schemes –Attacker knows that key evolves u Distress PIN –No security against eavesdropper u Deniable encryption
14
A funkspiel scheme MAC key 0: MAC key 1: 01101010001110 01111100011 Problems: We need one bit for every MAC; Eve can cheat with small probability ???
15
Another funkspiel scheme (simplified) Problem: What if Eve sees Bob’s keying material? She can forge a MAC hh ??? ??
16
Asymmetric funkspiel scheme PK A SK A PK B SK B E PK_B (Sig SK_A [message]) PK A SK A ???
17
Asymmetric funkspiel scheme u Semantically secure encryption (e.g., El Gamal) ensures that Eve can’t test signature against SK u Key swap for Alice under El Gamal is efficient, e.g., she can randomize last 100 bits u If Eve sees Bob’s keys, she still can’t forge MAC u Scheme is less efficient than symmetric ones
18
Real-world funkspiel u Alice changes key when she senses Eve is attempting to break in (no coin flipping) u Bob tries to determine whether Alice sent “distress signal”, i.e., changed key
19
What this good for? u Tamper resistant hardware –Currently uses “zeroization” –Funkspiel schemes permit detection and tracing –Funkspiel schemes can give false sense of security or success to attacker –E.g., cash card
20
What this good for? u A honeypot with more sting Honeypot
21
Open issues u Power consumption –Many devices have only external power –What about DPA attacks? u How about, e.g., firewalls?
22
Questions? She loves me? She loves me not?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.