Presentation 2001/12/10
Security Analysis of "Provably" Secure Cryptosystems under Strong Adaptive Chosen-Ciphertext Attack
Seungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, Yuliang Zheng,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) This paper presents a new type of powerful cryptanalytic attacks on public-key cryptosystems, extending the more commonly studied adaptive chosen-ciphertext attacks. In the new attacks, an adversary is not only allowed to submit to a decryption oracle(valid or invalid) ciphertexts of her choice, but also to emit a "dump query" prior to the completion of a decryption operation. The dump query returns intermediate results that have not been erased in the course of the decryption operation, whereby allowing the adversary to gain vital advantages in breaking the cryptosystem. We believe that the new attack model approximates more closely existing security systems. We examine its power by demonstrating that most existing public-key cryptosystems, including OAEP-RSA, are vulnerable to our extended attacks.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Encryption / provable security / chosen-ciphertext security / ciphertext validity / OAEP-RSA / ElGamal encryption
Paper # ISEC2001-89
Date of Issue

Conference Information
Committee ISEC
Conference Date 2001/12/10(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Security Analysis of "Provably" Secure Cryptosystems under Strong Adaptive Chosen-Ciphertext Attack
Sub Title (in English)
Keyword(1) Encryption
Keyword(2) provable security
Keyword(3) chosen-ciphertext security
Keyword(4) ciphertext validity
Keyword(5) OAEP-RSA
Keyword(6) ElGamal encryption
1st Author's Name Seungjoo Kim
1st Author's Affiliation KISA(Korea Information Security Agency)()
2nd Author's Name Jung Hee Cheon
2nd Author's Affiliation ICU(Information and Communications Univ.)
3rd Author's Name Marc Joye
3rd Author's Affiliation Gemplus Card International
4th Author's Name Seongan Lim
4th Author's Affiliation KISA(Korea Information Security Agency)
5th Author's Name Masahiro Mambo
5th Author's Affiliation Tohoku University
6th Author's Name Dongho Won
6th Author's Affiliation Sungkyunkwan University
7th Author's Name Yuliang Zheng
7th Author's Affiliation UNC Charlotte
Date 2001/12/10
Paper # ISEC2001-89
Volume (vol) vol.101
Number (no) 507
Page pp.pp.-
#Pages 8
Date of Issue