Presentation | 2001/12/10 Security Analysis of "Provably" Secure Cryptosystems under Strong Adaptive Chosen-Ciphertext Attack Seungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, Yuliang Zheng, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | This paper presents a new type of powerful cryptanalytic attacks on public-key cryptosystems, extending the more commonly studied adaptive chosen-ciphertext attacks. In the new attacks, an adversary is not only allowed to submit to a decryption oracle(valid or invalid) ciphertexts of her choice, but also to emit a "dump query" prior to the completion of a decryption operation. The dump query returns intermediate results that have not been erased in the course of the decryption operation, whereby allowing the adversary to gain vital advantages in breaking the cryptosystem. We believe that the new attack model approximates more closely existing security systems. We examine its power by demonstrating that most existing public-key cryptosystems, including OAEP-RSA, are vulnerable to our extended attacks. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Encryption / provable security / chosen-ciphertext security / ciphertext validity / OAEP-RSA / ElGamal encryption |
Paper # | ISEC2001-89 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 2001/12/10(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Security Analysis of "Provably" Secure Cryptosystems under Strong Adaptive Chosen-Ciphertext Attack |
Sub Title (in English) | |
Keyword(1) | Encryption |
Keyword(2) | provable security |
Keyword(3) | chosen-ciphertext security |
Keyword(4) | ciphertext validity |
Keyword(5) | OAEP-RSA |
Keyword(6) | ElGamal encryption |
1st Author's Name | Seungjoo Kim |
1st Author's Affiliation | KISA(Korea Information Security Agency)() |
2nd Author's Name | Jung Hee Cheon |
2nd Author's Affiliation | ICU(Information and Communications Univ.) |
3rd Author's Name | Marc Joye |
3rd Author's Affiliation | Gemplus Card International |
4th Author's Name | Seongan Lim |
4th Author's Affiliation | KISA(Korea Information Security Agency) |
5th Author's Name | Masahiro Mambo |
5th Author's Affiliation | Tohoku University |
6th Author's Name | Dongho Won |
6th Author's Affiliation | Sungkyunkwan University |
7th Author's Name | Yuliang Zheng |
7th Author's Affiliation | UNC Charlotte |
Date | 2001/12/10 |
Paper # | ISEC2001-89 |
Volume (vol) | vol.101 |
Number (no) | 507 |
Page | pp.pp.- |
#Pages | 8 |
Date of Issue |