The Dark Side of “Black-Box” Cryptography or: Should We Trust Capstone?
From MaRDI portal
Publication:3452343
DOI10.1007/3-540-68697-5_8zbMath1329.94082OpenAlexW1499713421WikidataQ56813135 ScholiaQ56813135MaRDI QIDQ3452343
Adam L. Young, Mordechai M. Yung
Publication date: 11 November 2015
Published in: Advances in Cryptology — CRYPTO ’96 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-68697-5_8
softwareRSAcryptanalytic attacksDSArandomnesspseudorandomnesspublic keykey escrowsubliminal channelshardwareKerberosprivate keyapplied systemsauto-escrowing keysCapstonedesign and manufacturing of cryptographic devices and softwareELGamal
Related Items (30)
Practical algorithm substitution attack on extractable signatures ⋮ UC-secure cryptographic reverse firewall-guarding corrupted systems with the minimum trusted module ⋮ Subversion-resilient enhanced privacy ID ⋮ Homomorphic lower digits removal and improved FHE bootstrapping ⋮ Kleptographic (algorithmic) backdoors in the RSA key generator ⋮ Non-interactive provably secure attestations for arbitrary RSA prime generation algorithms ⋮ Universally composable subversion-resilient cryptography ⋮ Anamorphic encryption: private communication against a dictator ⋮ On the impossibility of cryptography with tamperable randomness ⋮ Cliptography: Clipping the Power of Kleptographic Attacks ⋮ NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion ⋮ Implications of the arithmetic ratio of prime numbers for RSA security ⋮ How to backdoor (classic) McEliece and how to guard against backdoors ⋮ Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions ⋮ Anamorphic signatures: secrecy from a dictator who only permits authentication! ⋮ Reverse firewalls for adaptively secure MPC without setup ⋮ Crooked indifferentiability of enveloped XOR revisited ⋮ Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption ⋮ On the universal steganography of optimal rate ⋮ Subliminal Hash Channels ⋮ Immunization against complete subversion without random oracles ⋮ Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs ⋮ Subversion-resilient signatures: definitions, constructions and applications ⋮ A Kilobit Hidden SNFS Discrete Logarithm Computation ⋮ Unnamed Item ⋮ Cryptography as an Attack Technology: Proving the RSA/Factoring Kleptographic Attack ⋮ RSA Moduli with a Predetermined Portion: Techniques and Applications ⋮ Subversion-resilient public key encryption with practical watchdogs ⋮ Security of Auditing Protocols Against Subversion Attacks ⋮ The MALICIOUS framework: embedding backdoors into tweakable block ciphers
Uses Software
Cites Work
This page was built for publication: The Dark Side of “Black-Box” Cryptography or: Should We Trust Capstone?