站内直航

您现在的位置:首页 > 学术活动
学术报告: Clipping the Power of Kleptographic Attacks
 

目:Clipping the Power of Kleptographic Attacks

(Joint work with Alex Russell, Moti Yung and Hong-Sheng Zhou)

人:Qiang Tang PH.D.

报告时间:2015825  星期二  上午10:00            

报告地点:中国科学院信息工程研究所3号楼(B2座)3224

报告摘要:

Kleptography, originally introduced by Young and Yung [Crypto ’96], studies how to steal information securely and subliminally from cryptosystems. The basic framework considers the (in)security of malicious implementations of a standard cryptographic primitive by embedding a“backdoor” into the system. Remarkably, crippling subliminal theft is possible even if the subvertedcryptosystem produces output indistinguishable from a secure “reference implementation.” After a long hiatus, interest in such issues was rekindled by the dramatic revelations of Edward Snowden, demonstrating that such deliberate attacks have been deployed and presumably used for massive surveillance. Notably, Bellare, Paterson, and Rogaway [Crypto ’14] initiated a formal study of attacks on symmetric key encryption algorithms.

Motivated by the original examples of subverting key generation algorithms in the kleptography papers from Young and Yung [Crypto ’96, Eurocrypt ’97], we initiate the study of cryptography in the setting where ALL algorithms are subject to kleptographic attacks—we call this cliptography.  In this talk, I will present some of our recent progress along this line.

报告人简介:

Qiang Tang graduated from SKLOIS in 2009, and recently got his Ph.D from the University of Connecticut, under the supervision of Aggelos Kiayias and Alexander Russell. He will be joining Cornell as a post-doctoral researcher this fall. He is awarded the Taylor Booth Graduate Scholarship and several pre-doctoral fellowships from UCONN. During his Ph.D, he worked as a research intern at NTT research lab, Tokyo with Tatsuaki Okamoto, and the University of Wisconsin, Madison with Thomas Ristenpart, and he was also a visiting researcher at the University of Athens, Greece. His research interests lie in the combination of accountability (e.g., digital rights management), post-Snowden cryptography, and crypto-currency.

 
版权所有 © 中国科学院信息工程研究所信息安全国家重点实验室 备案序号:京ICP备12047326-1号
电话:010-82546611 传真:010-82546564
地址:北京市海淀区闵庄路甲89号 100093