Kleptography

Kleptography

Kleptography is the study of stealing information securely and subliminally. Kleptography is a natural extension of the theory of subliminal channels. [ [http://www.cryptovirology.com/cryptovfiles/cryptovirologyfaqver1.html Cryptovirology FAQ ] ]

Kleptography was introduced by Adam Young and Moti Yung in the Proceedings of Advances in Cryptology---Crypto '96. A kleptographic attack is a forward-engineering attack that is built into acryptosystem or cryptographic protocol. The attack constitutes an "asymmetric backdoor"that is built into a smartcard, dynamically linked library, computer program, etc.The attacker that plants the backdoor has the exclusive ability to use the backdoor. In otherwords, even if the full specification of the backdoor is published, only the attacker can use it.Furthermore, the outputs of the infected cryptosystem are computationally indistinguishablefrom the outputs of the corresponding uninfected cryptosystem. So, in black-boximplementations (e.g., smartcards) the attack may go entirely unnoticed. The asymmetryensures that a well-funded reverse-engineer can at most detect the asymmetric backdoor butnot use it.

In contrast, a traditional, more common backdoor is called a "symmetric backdoor". Anyone that finds the symmetric backdoor can in turn use it.

Kleptographic attacks have been designed for RSA key generation, the Diffie-Hellmankey exchange, the Digital Signature Algorithm, and other cryptographic algorithms andprotocols.Fact|date=May 2008 The attacker is able to compromise said cryptographic algorithms and protocolsby inspecting the information (if available) that the backdoor information is encodedin (e.g., the public key, the digital signature, the key exchange messages, etc.) and then exploiting the logic of the asymmetric backdoor using his or her secret key (usually a private key).

Kleptography is a subfield of Cryptovirology since an asymmetricbackdoor is a form of cryptotrojan. Related fields include Cryptologyand Steganology. Kleptography extends the theory of subliminal channels that was pioneered by Gus Simmons [Si84,Si85,Si93] .

Footnotes

References

[Si84] G. J. Simmons, "The Prisoners' Problem and the Subliminal Channel," InProceedings of Crypto '83, D. Chaum (Ed.), pages 51-67, Plenum Press, 1984.

[Si85] G. J. Simmons, "The Subliminal Channel and Digital Signatures," InProceedings of Eurocrypt '84, T. Beth, N. Cot, I. Ingemarsson (Eds.),pages 364-378, Springer-Verlag, 1985.

[Si93] G. J. Simmons, "Subliminal Communication is Easy Using the DSA," Inproceedings of Eurocrypt '93, T. Helleseth (Ed.), pages 218-232,Springer-Verlag, 1993.

[YY96] A. Young, M. Yung, "The Dark Side of Black-Box Cryptography, or:Should we trust Capstone?" In proceedings of Crypto '96, Neal Koblitz(Ed.), Springer-Verlag, pages 89-103, 1996.


Wikimedia Foundation. 2010.

Игры ⚽ Поможем сделать НИР

Look at other dictionaries:

  • Backdoor (computing) — A backdoor in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may …   Wikipedia

  • Cryptovirology — is a field that studies how to use cryptography to design powerful malicious software. The field was born with the observation that public key cryptography can be used to break the symmetry between what an antivirus analyst sees regarding a virus …   Wikipedia

  • Kleptographie — beschäftigt sich mit dem sicheren und verdeckten Diebstahl von (geschützten) Informationen. Kleptographie ist ein Teilgebiet der Kryptographie und der Kryptovirologie. Außerdem ist sie eine Erweiterung der Theorie der verdeckten Kanäle, die von… …   Deutsch Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”