Download presentation
Presentation is loading. Please wait.
Published byClifford Cooper Modified over 8 years ago
1
Kleptography Cryptography with Backdoors Milou Antheunisse
2
Introduction
4
Black-box cryptosystem. Capstone project by US government (1993). Adam Young and Moti Yung. SETUP attack. Kleptography. Introduction
5
SETUP. SETUP attacks. SETUP in RSA key generation II (PAP: Pretty awful privacy). Conclusions. Outline
6
SETUP The SETUP mechanism enables the attacker to exfiltrate users’ private information from the public output of the system, without the users noticing.
7
SETUP S ecretly E mbedded T rapdoor with U niversal P rotection
8
SETUP
11
SETUP attacks SETUP in RSA: – SETUP in RSA key generation I. – SETUP in RSA key generation II (PAP). SETUP in ElGamal: – SETUP in ElGamal key generation I. – SETUP in ElGamal key generation II. – SETUP in ElGamal signature scheme. SETUP in Diffie-Hellman: – SETUP in Diffie-Hellman key exchange.
12
SETUP in RSA key generation II (PAP)
14
Key generation
15
SETUP in RSA key generation II (PAP)
23
Conclusions Use Open Source for security!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.