cryptographic reverse firewalls · • kleptography and cryptovirology - young and yung 1996 •...

250
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls Cryptographic Reverse Firewalls Yevgeniy Dodis (NYU) Ilya Mironov (Google) Noah Stephens-Davidowitz (NYU)

Upload: others

Post on 15-Jul-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Cryptographic Reverse Firewalls

Yevgeniy Dodis (NYU) Ilya Mironov (Google)

Noah Stephens-Davidowitz (NYU)

Page 2: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Act I: Cryptography

in Crisis

Page 3: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Classical Crypto

Page 4: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Classical Crypto

Page 5: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Classical Crypto

Page 6: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Classical Crypto

Page 7: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Classical Crypto

Page 8: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Classical Crypto

Page 9: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Classical Crypto

Page 10: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Classical Crypto

Page 11: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Classical Crypto

Page 12: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Classical Crypto

Page 13: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Classical Crypto

Page 14: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Classical Crypto

Page 15: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Classical Crypto

Page 16: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Classical Crypto

Page 17: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Classical Crypto

Page 18: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Classical Crypto

Alice’s Trusty Computer!

Page 19: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Should Alice Trust Her Computer?

Page 20: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Should Alice Trust Her Computer?

Page 21: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Should Alice Trust Her Computer?

Page 22: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Should Alice Trust Her Computer?

(xkcd.com)

Page 23: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Widespread Deliberate Corruption of Hardware and Software

Page 24: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

“The%SIGINT%Enabling%Project%[$250M/year%program]%

acBvely%engages%the%US%and%foreign%IT%industries%to%

covertly%influence%and/or%overtly%leverage%their%

commercial%products’%designs.%These%design%changes%

make%the%systems%in%quesBon%exploitable%…%with%

foreknowledge%of%the%modificaBon.%To%the%consumer%

and%other%adversaries,%however,%the%systems’%security%

remain%intact.”%

%%Excerpt%from%the%N.S.A.’s%2013%budget%request%

%%The%New%York%Times,%September%5,%2013%

%

Widespread Deliberate Corruption of Hardware and Software

Page 25: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Cryptographers have agreed not to accept this

The membership of the IACR repudiates mass surveillance and the undermining of cryptographic solutions and standards. Population-wide surveillance threatens democracy and human dignity. We call for expediting research and deployment of effective techniques to protect personal privacy against governmental and corporate overreach.

IACR Copenhagen ResolutionEurocrypt 2014, Copenhagen

Page 26: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Widespread, (Apparently) Accidental Bugs in Cryptographic Software

Page 27: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Widespread, (Apparently) Accidental Bugs in Cryptographic Software

Page 28: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Widespread, (Apparently) Accidental Bugs in Cryptographic Software

Page 29: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Widespread, (Apparently) Accidental Bugs in Cryptographic Software

Page 30: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Widespread, (Apparently) Accidental Bugs in Cryptographic Software

Page 31: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Widespread, (Apparently) Accidental Bugs in Cryptographic Software

Page 32: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Widespread, (Apparently) Accidental Bugs in Cryptographic Software

Page 33: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Widespread, (Apparently) Accidental Bugs in Cryptographic Software

Page 34: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Crypto in the Real World?

Page 35: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Crypto in the Real World?

Page 36: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Crypto in the Real World?

Page 37: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Crypto in the Real World?

Page 38: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Crypto in the Real World?

iHEARTdogs&CAT$

Page 39: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Crypto in the Real World?

iHEARTdogs&CAT$

4117-8289-1856

Page 40: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Crypto in the Real World?

iHEARTdogs&CAT$

4117-8289-1856

Page 41: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Can we possibly do crypto on a compromised machine?

Page 42: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Prior Work

Page 43: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Prior Work• Subliminal channels

Page 44: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Prior Work• Subliminal channels

- Simmons 1984, …

Page 45: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Prior Work• Subliminal channels

- Simmons 1984, …• Divertible protocols

Page 46: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Prior Work• Subliminal channels

- Simmons 1984, …• Divertible protocols

- Blaze, Bleumer, Strauss 1998

Page 47: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Prior Work• Subliminal channels

- Simmons 1984, …• Divertible protocols

- Blaze, Bleumer, Strauss 1998• Limited security against limited forms of corruption

Page 48: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Prior Work• Subliminal channels

- Simmons 1984, …• Divertible protocols

- Blaze, Bleumer, Strauss 1998• Limited security against limited forms of corruption• Only synchronous protocols

Page 49: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Prior Work• Subliminal channels

- Simmons 1984, …• Divertible protocols

- Blaze, Bleumer, Strauss 1998• Limited security against limited forms of corruption• Only synchronous protocols

• Kleptography and cryptovirology

Page 50: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Prior Work• Subliminal channels

- Simmons 1984, …• Divertible protocols

- Blaze, Bleumer, Strauss 1998• Limited security against limited forms of corruption• Only synchronous protocols

• Kleptography and cryptovirology- Young and Yung 1996

Page 51: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Prior Work• Subliminal channels

- Simmons 1984, …• Divertible protocols

- Blaze, Bleumer, Strauss 1998• Limited security against limited forms of corruption• Only synchronous protocols

• Kleptography and cryptovirology- Young and Yung 1996

• Algorithm Substitution Attacks

Page 52: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Prior Work• Subliminal channels

- Simmons 1984, …• Divertible protocols

- Blaze, Bleumer, Strauss 1998• Limited security against limited forms of corruption• Only synchronous protocols

• Kleptography and cryptovirology- Young and Yung 1996

• Algorithm Substitution Attacks- Bellare, Paterson, Rogaway 2014

Page 53: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Prior Work• Subliminal channels

- Simmons 1984, …• Divertible protocols

- Blaze, Bleumer, Strauss 1998• Limited security against limited forms of corruption• Only synchronous protocols

• Kleptography and cryptovirology- Young and Yung 1996

• Algorithm Substitution Attacks- Bellare, Paterson, Rogaway 2014

• Symmetric-key encryption

Page 54: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Prior Work• Subliminal channels

- Simmons 1984, …• Divertible protocols

- Blaze, Bleumer, Strauss 1998• Limited security against limited forms of corruption• Only synchronous protocols

• Kleptography and cryptovirology- Young and Yung 1996

• Algorithm Substitution Attacks- Bellare, Paterson, Rogaway 2014

• Symmetric-key encryption• Limited forms of corruption

Page 55: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Prior Work• Subliminal channels

- Simmons 1984, …• Divertible protocols

- Blaze, Bleumer, Strauss 1998• Limited security against limited forms of corruption• Only synchronous protocols

• Kleptography and cryptovirology- Young and Yung 1996

• Algorithm Substitution Attacks- Bellare, Paterson, Rogaway 2014

• Symmetric-key encryption• Limited forms of corruption

- Bellare and Hoang 2015

Page 56: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Prior Work• Subliminal channels

- Simmons 1984, …• Divertible protocols

- Blaze, Bleumer, Strauss 1998• Limited security against limited forms of corruption• Only synchronous protocols

• Kleptography and cryptovirology- Young and Yung 1996

• Algorithm Substitution Attacks- Bellare, Paterson, Rogaway 2014

• Symmetric-key encryption• Limited forms of corruption

- Bellare and Hoang 2015• Deterministic PKE

Page 57: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Prior Work• Subliminal channels

- Simmons 1984, …• Divertible protocols

- Blaze, Bleumer, Strauss 1998• Limited security against limited forms of corruption• Only synchronous protocols

• Kleptography and cryptovirology- Young and Yung 1996

• Algorithm Substitution Attacks- Bellare, Paterson, Rogaway 2014

• Symmetric-key encryption• Limited forms of corruption

- Bellare and Hoang 2015• Deterministic PKE• Limited forms of corruption

Page 58: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Prior Work• Subliminal channels

- Simmons 1984, …• Divertible protocols

- Blaze, Bleumer, Strauss 1998• Limited security against limited forms of corruption• Only synchronous protocols

• Kleptography and cryptovirology- Young and Yung 1996

• Algorithm Substitution Attacks- Bellare, Paterson, Rogaway 2014

• Symmetric-key encryption• Limited forms of corruption

- Bellare and Hoang 2015• Deterministic PKE• Limited forms of corruption

• Backdoored PRGs

Page 59: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Prior Work• Subliminal channels

- Simmons 1984, …• Divertible protocols

- Blaze, Bleumer, Strauss 1998• Limited security against limited forms of corruption• Only synchronous protocols

• Kleptography and cryptovirology- Young and Yung 1996

• Algorithm Substitution Attacks- Bellare, Paterson, Rogaway 2014

• Symmetric-key encryption• Limited forms of corruption

- Bellare and Hoang 2015• Deterministic PKE• Limited forms of corruption

• Backdoored PRGs- Dodis, Ganesh, Golovnev, Juels, and Ristenpart 2015

Page 60: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Prior Work• Subliminal channels

- Simmons 1984, …• Divertible protocols

- Blaze, Bleumer, Strauss 1998• Limited security against limited forms of corruption• Only synchronous protocols

• Kleptography and cryptovirology- Young and Yung 1996

• Algorithm Substitution Attacks- Bellare, Paterson, Rogaway 2014

• Symmetric-key encryption• Limited forms of corruption

- Bellare and Hoang 2015• Deterministic PKE• Limited forms of corruption

• Backdoored PRGs- Dodis, Ganesh, Golovnev, Juels, and Ristenpart 2015

Impossibility results in strongest models

Page 61: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Prior Work• Subliminal channels

- Simmons 1984, …• Divertible protocols

- Blaze, Bleumer, Strauss 1998• Limited security against limited forms of corruption• Only synchronous protocols

• Kleptography and cryptovirology- Young and Yung 1996

• Algorithm Substitution Attacks- Bellare, Paterson, Rogaway 2014

• Symmetric-key encryption• Limited forms of corruption

- Bellare and Hoang 2015• Deterministic PKE• Limited forms of corruption

• Backdoored PRGs- Dodis, Ganesh, Golovnev, Juels, and Ristenpart 2015

Impossibility results in strongest models

We generalize these models and show a way around the impossibility results.

Page 62: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Act II….

Page 63: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Reverse Firewalls!

Page 64: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Reverse Firewalls!• Firewall sits between Alice’s computer and the outside world

Page 65: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Reverse Firewalls!• Firewall sits between Alice’s computer and the outside world

Page 66: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Reverse Firewalls!• Firewall sits between Alice’s computer and the outside world

Page 67: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Reverse Firewalls!• Firewall sits between Alice’s computer and the outside world

Page 68: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Reverse Firewalls!• Firewall sits between Alice’s computer and the outside world• Modifies the messages that Alice sends and receives.

Page 69: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Reverse Firewalls!• Firewall sits between Alice’s computer and the outside world• Modifies the messages that Alice sends and receives.

Page 70: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Reverse Firewalls!• Firewall sits between Alice’s computer and the outside world• Modifies the messages that Alice sends and receives.

Page 71: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Reverse Firewalls!• Firewall sits between Alice’s computer and the outside world• Modifies the messages that Alice sends and receives.

Page 72: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Reverse Firewalls!• Firewall sits between Alice’s computer and the outside world• Modifies the messages that Alice sends and receives.

Page 73: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Reverse Firewalls!• Firewall sits between Alice’s computer and the outside world• Modifies the messages that Alice sends and receives.

Page 74: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Reverse Firewalls!• Firewall sits between Alice’s computer and the outside world• Modifies the messages that Alice sends and receives.• Transparent to legitimate traffic.

Page 75: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Reverse Firewalls!• Firewall sits between Alice’s computer and the outside world• Modifies the messages that Alice sends and receives.• Transparent to legitimate traffic.

- Certainly doesn’t break functionality.

Page 76: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Reverse Firewalls!• Firewall sits between Alice’s computer and the outside world• Modifies the messages that Alice sends and receives.• Transparent to legitimate traffic.

- Certainly doesn’t break functionality.• Shares no secrets with Alice.

Page 77: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Reverse Firewalls!• Firewall sits between Alice’s computer and the outside world• Modifies the messages that Alice sends and receives.• Transparent to legitimate traffic.

- Certainly doesn’t break functionality.• Shares no secrets with Alice.

- We don’t trust the firewall.

Page 78: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Reverse Firewalls!• Firewall sits between Alice’s computer and the outside world• Modifies the messages that Alice sends and receives.• Transparent to legitimate traffic.

- Certainly doesn’t break functionality.• Shares no secrets with Alice.

- We don’t trust the firewall.• “Improves security!”

Page 79: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Reverse Firewall Functionality

Page 80: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Reverse Firewall Functionality

Underlying classical protocol has some functionality.

Page 81: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Reverse Firewall Functionality

Underlying classical protocol has some functionality.

Page 82: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Reverse Firewall Functionality

Underlying classical protocol has some functionality.

Page 83: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Reverse Firewall Functionality

Underlying classical protocol has some functionality.

Protocol with firewall has same functionality.

Page 84: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Reverse Firewall Functionality

Underlying classical protocol has some functionality.

Protocol with firewall has same functionality.

Page 85: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Reverse Firewall Functionality

Underlying classical protocol has some functionality.

Protocol with firewall has same functionality.

Page 86: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Reverse Firewall Security

Page 87: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Reverse Firewall SecurityUnderlying protocol satisfies some security notion.

Page 88: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Reverse Firewall SecurityUnderlying protocol satisfies some security notion.

Page 89: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Reverse Firewall Security

Protocol with firewall satisfies the same security notion for any efficient corrupt implementation of Alice.

Underlying protocol satisfies some security notion.

Page 90: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Reverse Firewall Security

Protocol with firewall satisfies the same security notion for any efficient corrupt implementation of Alice.

Underlying protocol satisfies some security notion.

Page 91: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Reverse Firewall Security

Protocol with firewall satisfies the same security notion for any efficient corrupt implementation of Alice.

Underlying protocol satisfies some security notion.

Page 92: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Reverse Firewall Security

Protocol with firewall satisfies the same security notion for any efficient corrupt implementation of Alice.

Underlying protocol satisfies some security notion.

Note: We require that the protocol is functional and secure without the reverse firewall when Alice’s

implementation is not corrupted.

Page 93: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Functionality Maintaining Corruption

Page 94: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Functionality Maintaining Corruption

A corrupted implementation of Alice is functionality maintaining if the protocol is still functional when Alice is replaced by .

Page 95: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Functionality Maintaining Corruption

A corrupted implementation of Alice is functionality maintaining if the protocol is still functional when Alice is replaced by .

Page 96: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Functionality Maintaining Corruption

A corrupted implementation of Alice is functionality maintaining if the protocol is still functional when Alice is replaced by .

Page 97: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Functionality Maintaining Corruption

A corrupted implementation of Alice is functionality maintaining if the protocol is still functional when Alice is replaced by .

(This is much more general than honest-but-curious adversaries, undetectable corruption, steganographic attacks, etc.)

Page 98: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Functionality Maintaining Corruption

A corrupted implementation of Alice is functionality maintaining if the protocol is still functional when Alice is replaced by .

(This is much more general than honest-but-curious adversaries, undetectable corruption, steganographic attacks, etc.)

Page 99: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Simple Example: Semantically Secure PKE

Page 100: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Simple Example: Semantically Secure PKE

Let (Enc, Dec, Rerand) be a rerandomizable PKE scheme such that Dec(Rerand(Enc(m))) = m and Rerand(C) Enc(0)

for any C.

Page 101: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Simple Example: Semantically Secure PKE

Let (Enc, Dec, Rerand) be a rerandomizable PKE scheme such that Dec(Rerand(Enc(m))) = m and Rerand(C) Enc(0)

for any C.

Underlying protocol:

Page 102: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Simple Example: Semantically Secure PKE

Let (Enc, Dec, Rerand) be a rerandomizable PKE scheme such that Dec(Rerand(Enc(m))) = m and Rerand(C) Enc(0)

for any C.

Underlying protocol:

Page 103: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Simple Example: Semantically Secure PKE

Let (Enc, Dec, Rerand) be a rerandomizable PKE scheme such that Dec(Rerand(Enc(m))) = m and Rerand(C) Enc(0)

for any C.

Underlying protocol:

Firewall:

Page 104: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Simple Example: Semantically Secure PKE

Let (Enc, Dec, Rerand) be a rerandomizable PKE scheme such that Dec(Rerand(Enc(m))) = m and Rerand(C) Enc(0)

for any C.

Underlying protocol:

Firewall:

Page 105: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Simple Example: Semantically Secure PKE

Let (Enc, Dec, Rerand) be a rerandomizable PKE scheme such that Dec(Rerand(Enc(m))) = m and Rerand(C) Enc(0)

for any C.

Underlying protocol:

Firewall:

Functionality:

Page 106: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Simple Example: Semantically Secure PKE

Let (Enc, Dec, Rerand) be a rerandomizable PKE scheme such that Dec(Rerand(Enc(m))) = m and Rerand(C) Enc(0)

for any C.

Underlying protocol:

Firewall:

Functionality:• Is the protocol functional without the firewall?

Page 107: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Simple Example: Semantically Secure PKE

Let (Enc, Dec, Rerand) be a rerandomizable PKE scheme such that Dec(Rerand(Enc(m))) = m and Rerand(C) Enc(0)

for any C.

Underlying protocol:

Firewall:

Functionality:• Is the protocol functional without the firewall?

Page 108: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Simple Example: Semantically Secure PKE

Let (Enc, Dec, Rerand) be a rerandomizable PKE scheme such that Dec(Rerand(Enc(m))) = m and Rerand(C) Enc(0)

for any C.

Underlying protocol:

Firewall:

Functionality:• Is the protocol functional without the firewall?• Is the protocol functional with the firewall?

Page 109: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Simple Example: Semantically Secure PKE

Let (Enc, Dec, Rerand) be a rerandomizable PKE scheme such that Dec(Rerand(Enc(m))) = m and Rerand(C) Enc(0)

for any C.

Underlying protocol:

Firewall:

Functionality:• Is the protocol functional without the firewall?• Is the protocol functional with the firewall?

Page 110: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Simple Example: Semantically Secure PKE

Let (Enc, Dec, Rerand) be a rerandomizable PKE scheme such that Dec(Rerand(Enc(m))) = m and Rerand(C) Enc(0)

for any C.

Underlying protocol:

Firewall:

Functionality:• Is the protocol functional without the firewall?• Is the protocol functional with the firewall?

Security:

Page 111: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Simple Example: Semantically Secure PKE

Let (Enc, Dec, Rerand) be a rerandomizable PKE scheme such that Dec(Rerand(Enc(m))) = m and Rerand(C) Enc(0)

for any C.

Underlying protocol:

Firewall:

Functionality:• Is the protocol functional without the firewall?• Is the protocol functional with the firewall?

Security:• Is the protocol semantically secure without firewall?

Page 112: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Simple Example: Semantically Secure PKE

Let (Enc, Dec, Rerand) be a rerandomizable PKE scheme such that Dec(Rerand(Enc(m))) = m and Rerand(C) Enc(0)

for any C.

Underlying protocol:

Firewall:

Functionality:• Is the protocol functional without the firewall?• Is the protocol functional with the firewall?

Security:• Is the protocol semantically secure without firewall?

Page 113: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Simple Example: Semantically Secure PKE

Let (Enc, Dec, Rerand) be a rerandomizable PKE scheme such that Dec(Rerand(Enc(m))) = m and Rerand(C) Enc(0)

for any C.

Underlying protocol:

Firewall:

Functionality:• Is the protocol functional without the firewall?• Is the protocol functional with the firewall?

Security:• Is the protocol semantically secure without firewall?• Is the protocol with the firewall semantically secure

regardless of how behaves?

Page 114: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Simple Example: Semantically Secure PKE

Let (Enc, Dec, Rerand) be a rerandomizable PKE scheme such that Dec(Rerand(Enc(m))) = m and Rerand(C) Enc(0)

for any C.

Underlying protocol:

Firewall:

Functionality:• Is the protocol functional without the firewall?• Is the protocol functional with the firewall?

Security:• Is the protocol semantically secure without firewall?• Is the protocol with the firewall semantically secure

regardless of how behaves?

Page 115: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

What if the firewall is corrupt?

Page 116: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

What if the firewall is corrupt?1) Honest Alice. Corrupt firewall.

Page 117: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

What if the firewall is corrupt?1) Honest Alice. Corrupt firewall.

Page 118: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

What if the firewall is corrupt?1) Honest Alice. Corrupt firewall.

(Security of the underlying protocol.)

Page 119: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

What if the firewall is corrupt?1) Honest Alice. Corrupt firewall.

(Security of the underlying protocol.)

2) Corrupt Alice. Honest firewall.

Page 120: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

What if the firewall is corrupt?1) Honest Alice. Corrupt firewall.

(Security of the underlying protocol.)

2) Corrupt Alice. Honest firewall.

Page 121: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

What if the firewall is corrupt?1) Honest Alice. Corrupt firewall.

(Security of the underlying protocol.)

2) Corrupt Alice. Honest firewall.

(Security of firewall.)

Page 122: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

What if the firewall is corrupt?1) Honest Alice. Corrupt firewall.

(Security of the underlying protocol.)

2) Corrupt Alice. Honest firewall.

(Security of firewall.)

3) Corrupt Alice. Corrupt firewall.

Page 123: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

What if the firewall is corrupt?1) Honest Alice. Corrupt firewall.

(Security of the underlying protocol.)

2) Corrupt Alice. Honest firewall.

(Security of firewall.)

3) Corrupt Alice. Corrupt firewall.

Page 124: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

What if the firewall is corrupt?1) Honest Alice. Corrupt firewall.

(Security of the underlying protocol.)

2) Corrupt Alice. Honest firewall.

(Security of firewall.)

3) Corrupt Alice. Corrupt firewall.

(The whole world is corrupt….)

Page 125: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

What can we instantiate in this crazy model?

Page 126: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Primitives with Reverse Firewalls

Page 127: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Primitives with Reverse Firewalls

• [Mironov, S ‘15]

Page 128: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Primitives with Reverse Firewalls

• [Mironov, S ‘15]- Oblivious transfer

Page 129: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Primitives with Reverse Firewalls

• [Mironov, S ‘15]- Oblivious transfer- Secure function evaluation

Page 130: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Primitives with Reverse Firewalls

• [Mironov, S ‘15]- Oblivious transfer- Secure function evaluation- “Exfiltration resistance” for arbitrary protocols

Page 131: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Primitives with Reverse Firewalls

• [Mironov, S ‘15]- Oblivious transfer- Secure function evaluation- “Exfiltration resistance” for arbitrary protocols

• [Dodis, Mironov, S ‘15]

Page 132: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Primitives with Reverse Firewalls

• [Mironov, S ‘15]- Oblivious transfer- Secure function evaluation- “Exfiltration resistance” for arbitrary protocols

• [Dodis, Mironov, S ‘15]- Message transmission in many different contexts

Page 133: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Primitives with Reverse Firewalls

• [Mironov, S ‘15]- Oblivious transfer- Secure function evaluation- “Exfiltration resistance” for arbitrary protocols

• [Dodis, Mironov, S ‘15]- Message transmission in many different contexts- Efficient CCA-secure scheme

Page 134: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Primitives with Reverse Firewalls

• [Mironov, S ‘15]- Oblivious transfer- Secure function evaluation- “Exfiltration resistance” for arbitrary protocols

• [Dodis, Mironov, S ‘15]- Message transmission in many different contexts- Efficient CCA-secure scheme

• [Ateniese, Magri, Venturi ‘15]

Page 135: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Primitives with Reverse Firewalls

• [Mironov, S ‘15]- Oblivious transfer- Secure function evaluation- “Exfiltration resistance” for arbitrary protocols

• [Dodis, Mironov, S ‘15]- Message transmission in many different contexts- Efficient CCA-secure scheme

• [Ateniese, Magri, Venturi ‘15]- Signatures

Page 136: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Act III: Message-Transmission

Protocols

Page 137: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Message-Transmission Protocols

Page 138: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Message-Transmission Protocols

Page 139: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Message-Transmission Protocols

Page 140: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Message-Transmission Protocols

Page 141: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Message-Transmission Protocols

MTP

Page 142: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Message-Transmission Protocols

MTP

Page 143: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Message-Transmission Protocols

MTP

CPA Security: An eavesdropper “cannot learn anything about the plaintext m.”

Page 144: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Message-Transmission Protocols

MTP

CPA Security: An eavesdropper “cannot learn anything about the plaintext m.”CCA Security: An active adversary with access to a decryption oracle “cannot learn anything about the plaintext m.”

Page 145: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Message-Transmission Protocols

MTP

CPA Security: An eavesdropper “cannot learn anything about the plaintext m.”CCA Security: An active adversary with access to a decryption oracle “cannot learn anything about the plaintext m.”Forward Secrecy: Security holds even if “the adversary gets access to Alice and Bob’s secret keys later.”

Page 146: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Classical Message-Transmission Protocols

Page 147: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Classical Message-Transmission Protocols

Key Infrastructure Efficient? CCA

Secure?Forward Secret?

Page 148: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Classical Message-Transmission Protocols

Key Infrastructure Efficient? CCA

Secure?Forward Secret?

Symmetric-key encryption

Shared Secret Key Yes Yes No

Page 149: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Classical Message-Transmission Protocols

Key Infrastructure Efficient? CCA

Secure?Forward Secret?

Symmetric-key encryption

Shared Secret Key Yes Yes No

Public-key encryption

Public-key Infrastructure No Yes No

Page 150: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Classical Message-Transmission Protocols

Key Infrastructure Efficient? CCA

Secure?Forward Secret?

Symmetric-key encryption

Shared Secret Key Yes Yes No

Public-key encryption

Public-key Infrastructure No Yes No

Bob sends .Alice encrypts

under . .None No No Yes

Page 151: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Classical Message-Transmission Protocols

Key Infrastructure Efficient? CCA

Secure?Forward Secret?

Symmetric-key encryption

Shared Secret Key Yes Yes No

Public-key encryption

Public-key Infrastructure No Yes No

Bob sends .Alice encrypts

under . .None No No Yes

KA + SKE None Yes No Yes

Page 152: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Classical Message-Transmission Protocols

Key Infrastructure Efficient? CCA

Secure?Forward Secret?

Symmetric-key encryption

Shared Secret Key Yes Yes No

Public-key encryption

Public-key Infrastructure No Yes No

Bob sends .Alice encrypts

under . .None No No Yes

KA + SKE None Yes No Yes

AKA + SKE Public-key Infrastructure Yes Yes Yes

Page 153: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Classical Message-Transmission Protocols

Key Infrastructure Efficient? CCA

Secure?Forward Secret?

Symmetric-key encryption

Shared Secret Key Yes Yes No

Public-key encryption

Public-key Infrastructure No Yes No

Bob sends .Alice encrypts

under . .None No No Yes

KA + SKE None Yes No Yes

AKA + SKE Public-key Infrastructure Yes Yes Yes

All of these results hold with reverse firewalls as well!

Page 154: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Composition Theorem (Informal)

KA w/ Firewall +

SKE w/ Firewall =

MTP w/ Firewall

Page 155: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Act IV: Key Agreement

Page 156: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Key Agreement

Page 157: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Key Agreement

Page 158: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Key Agreement

Page 159: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Key Agreement

Page 160: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Key Agreement

Page 161: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Key Agreement

Page 162: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Key Agreement

Page 163: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Key Agreement

Page 164: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Key Agreement

Page 165: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Key Agreement

Page 166: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Key Agreement

Page 167: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Key Agreement

Page 168: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Key Agreement

Page 169: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Key Agreement

Page 170: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Authenticated Key Agreement

Page 171: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Authenticated Key Agreement

Page 172: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Authenticated Key Agreement

Page 173: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Authenticated Key Agreement

Page 174: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Authenticated Key Agreement

Page 175: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Authenticated Key Agreement

Page 176: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Authenticated Key Agreement

Page 177: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Authenticated Key Agreement

Page 178: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Authenticated Key Agreement

Page 179: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Authenticated Key Agreement

Page 180: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Authenticated Key Agreement

Page 181: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Authenticated Key Agreement

Page 182: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Authenticated Key Agreement

Page 183: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

First Attempt

Page 184: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

First Attempt

Page 185: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

First Attempt

Page 186: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

First Attempt

Page 187: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

First Attempt

Page 188: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

First Attempt

Page 189: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

First Attempt

Page 190: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

First Attempt

Page 191: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

First Attempt

Page 192: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

First Attempt

Page 193: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

First Attempt

Page 194: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

First Attempt

Page 195: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

First Attempt

Page 196: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

First Attempt

Page 197: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

First Attempt

Page 198: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

First Attempt

Page 199: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

First Attempt

Page 200: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

First Attempt

Page 201: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

First Attempt

Page 202: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

First Attempt

Page 203: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

First Attempt

Page 204: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

First Attempt

Page 205: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

First Attempt

We’ve agreed to a key without Bob!

Page 206: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Smarter Solution

Page 207: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Smarter Solution

Page 208: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Smarter Solution

Page 209: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Smarter Solution

Page 210: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Smarter Solution

Page 211: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Smarter Solution

Page 212: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Smarter Solution

Page 213: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Smarter Solution

Page 214: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Smarter Solution

Page 215: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Smarter Solution

Page 216: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Smarter Solution

Page 217: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Smarter Solution

Page 218: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Smarter Solution

Page 219: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Smarter Solution

Page 220: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Smarter Solution

Page 221: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Smarter Solution

Page 222: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Smarter Solution

Page 223: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Smarter Solution

Page 224: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Smarter Solution

Note: Efficiency compares well with real-world protocols, such as TLS!

Page 225: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Additional Issues

Page 226: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Additional Issues• Can a corrupt implementation use the signature

to communicate with the adversary ?

Page 227: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Additional Issues• Can a corrupt implementation use the signature

to communicate with the adversary ?- (Use unique or rerandomizable signatures as in

[AMV15].)

Page 228: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Additional Issues• Can a corrupt implementation use the signature

to communicate with the adversary ?- (Use unique or rerandomizable signatures as in

[AMV15].)• Can Bob have a firewall too?

Page 229: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Additional Issues• Can a corrupt implementation use the signature

to communicate with the adversary ?- (Use unique or rerandomizable signatures as in

[AMV15].)• Can Bob have a firewall too?

- Yes!

Page 230: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Additional Issues• Can a corrupt implementation use the signature

to communicate with the adversary ?- (Use unique or rerandomizable signatures as in

[AMV15].)• Can Bob have a firewall too?

- Yes!- (All results in [MS15] and [DMS15] have firewalls

for both parties.)

Page 231: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Additional Issues• Can a corrupt implementation use the signature

to communicate with the adversary ?- (Use unique or rerandomizable signatures as in

[AMV15].)• Can Bob have a firewall too?

- Yes!- (All results in [MS15] and [DMS15] have firewalls

for both parties.)• Can Alice or Bob leak secrets through the protocols.

Page 232: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Additional Issues• Can a corrupt implementation use the signature

to communicate with the adversary ?- (Use unique or rerandomizable signatures as in

[AMV15].)• Can Bob have a firewall too?

- Yes!- (All results in [MS15] and [DMS15] have firewalls

for both parties.)• Can Alice or Bob leak secrets through the protocols.

• No!

Page 233: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Additional Issues• Can a corrupt implementation use the signature

to communicate with the adversary ?- (Use unique or rerandomizable signatures as in

[AMV15].)• Can Bob have a firewall too?

- Yes!- (All results in [MS15] and [DMS15] have firewalls

for both parties.)• Can Alice or Bob leak secrets through the protocols.

• No!• (We formalize this in the papers.)

Page 234: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Summary

Page 235: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Summary• Lots of recent news suggests that we can no longer

trust our computers when security is paramount.

Page 236: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Summary• Lots of recent news suggests that we can no longer

trust our computers when security is paramount.• Reverse firewalls provide a framework to guarantee

security of arbitrary cryptographic primitives even on a compromised machine.

Page 237: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Summary• Lots of recent news suggests that we can no longer

trust our computers when security is paramount.• Reverse firewalls provide a framework to guarantee

security of arbitrary cryptographic primitives even on a compromised machine.

• Very strong cryptographic primitives can be instantiated in this model.

Page 238: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Summary• Lots of recent news suggests that we can no longer

trust our computers when security is paramount.• Reverse firewalls provide a framework to guarantee

security of arbitrary cryptographic primitives even on a compromised machine.

• Very strong cryptographic primitives can be instantiated in this model.

• The (arguably) most important cryptographic primitive, MTP, can be instantiated efficiently in this model.

Page 239: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

A Lot of Work to Be Done!

Page 240: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

A Lot of Work to Be Done!The space of all known cryptographic primitives

Page 241: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

A Lot of Work to Be Done!The space of all known cryptographic primitives

Studied in this context

Page 242: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

A Lot of Work to Be Done!The space of all known cryptographic primitives

Studied in this contextNot studied

Page 243: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

A Lot of Work to Be Done!The space of all known cryptographic primitives

OT, SFE [MS15]

Studied in this contextNot studied

Page 244: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

A Lot of Work to Be Done!The space of all known cryptographic primitives

OT, SFE [MS15]

Studied in this contextNot studied

Message transmission [DMS15]

Page 245: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

A Lot of Work to Be Done!The space of all known cryptographic primitives

OT, SFE [MS15]

Studied in this contextNot studied

Message transmission [DMS15]

Signatures [AMV15]

Page 246: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

A Lot of Work to Be Done!The space of all known cryptographic primitives

OT, SFE [MS15]

MPC

Studied in this contextNot studied

Message transmission [DMS15]

Signatures [AMV15]

Page 247: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

A Lot of Work to Be Done!The space of all known cryptographic primitives

OT, SFE [MS15]

MPC

Studied in this contextNot studied

PIR

Message transmission [DMS15]

Signatures [AMV15]

Page 248: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

A Lot of Work to Be Done!The space of all known cryptographic primitives

OT, SFE [MS15]

MPC

Studied in this contextNot studied

PIR

Message transmission [DMS15]

Signatures [AMV15]

Differential privacy

Page 249: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

A Lot of Work to Be Done!The space of all known cryptographic primitives

OT, SFE [MS15]

MPCYour favorite primitive!

Studied in this contextNot studied

PIR

Message transmission [DMS15]

Signatures [AMV15]

Differential privacy

Page 250: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key

Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls

Thanks!