Presentation is loading. Please wait.

Presentation is loading. Please wait.

Kleptography Cryptography with Backdoors Milou Antheunisse.

Similar presentations


Presentation on theme: "Kleptography Cryptography with Backdoors Milou Antheunisse."— Presentation transcript:

1 Kleptography Cryptography with Backdoors Milou Antheunisse

2 Introduction

3

4 Black-box cryptosystem. Capstone project by US government (1993). Adam Young and Moti Yung. SETUP attack. Kleptography. Introduction

5 SETUP. SETUP attacks. SETUP in RSA key generation II (PAP: Pretty awful privacy). Conclusions. Outline

6 SETUP The SETUP mechanism enables the attacker to exfiltrate users’ private information from the public output of the system, without the users noticing.

7 SETUP S ecretly E mbedded T rapdoor with U niversal P rotection

8 SETUP

9

10

11 SETUP attacks SETUP in RSA: – SETUP in RSA key generation I. – SETUP in RSA key generation II (PAP). SETUP in ElGamal: – SETUP in ElGamal key generation I. – SETUP in ElGamal key generation II. – SETUP in ElGamal signature scheme. SETUP in Diffie-Hellman: – SETUP in Diffie-Hellman key exchange.

12 SETUP in RSA key generation II (PAP)

13

14 Key generation

15 SETUP in RSA key generation II (PAP)

16

17

18

19

20

21

22

23 Conclusions Use Open Source for security!


Download ppt "Kleptography Cryptography with Backdoors Milou Antheunisse."

Similar presentations


Ads by Google