Strong adaptive chosen-ciphertext attacks with memory dump (or: The importance of the order of decryption and validation)

Seung-Joo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, Yuliang Zheng

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

This paper presents a new type of powerful cryptanalytic attacks on public-key cryptosystems, extending the more commonly studied adaptive chosen-ciphertext attacks. In the new attacks, an adversary is not only allowed to submit to a decryption oracle (valid or invalid) ciphertexts of her choice, but also to emit a “dump query” prior to the completion of a decryption operation. The dump query returns intermediate results that have not been erased in the course of the decryption operation, whereby allowing the adversary to gain vital advantages in breaking the cryptosystem. We believe that the new attack model approximates more closely existing security systems. We examine its power by demonstrating that most existing public-key cryptosystems, including OAEP-RSA, are vulnerable to our extended attacks.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
PublisherSpringer Verlag
Pages114-127
Number of pages14
Volume2260
ISBN (Print)3540430261, 9783540430261
Publication statusPublished - 2001
Externally publishedYes
Event8th IMA International Conference on Cryptography and Coding, 2001 - Cirencester, United Kingdom
Duration: 2001 Dec 172001 Dec 19

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2260
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other8th IMA International Conference on Cryptography and Coding, 2001
CountryUnited Kingdom
CityCirencester
Period01/12/1701/12/19

Keywords

  • Chosen-ciphertext security
  • Ciphertext validity
  • ElGamal encryption
  • Encryption
  • OAEP-RSA
  • Provable security

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

Fingerprint Dive into the research topics of 'Strong adaptive chosen-ciphertext attacks with memory dump (or: The importance of the order of decryption and validation)'. Together they form a unique fingerprint.

  • Cite this

    Kim, S-J., Cheon, J. H., Joye, M., Lim, S., Mambo, M., Won, D., & Zheng, Y. (2001). Strong adaptive chosen-ciphertext attacks with memory dump (or: The importance of the order of decryption and validation). In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2260, pp. 114-127). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 2260). Springer Verlag.