Substitution Attacks against Message Authentication
221 views • Nov 5, 2020
Chapters
View all
View all
Substitution Attacks aga Message Authentication
Substitution Attacks aga Message Authentication
0:00
Algorithm Substitution Attack An ASA replaces a cryptographic scheme with a subverted version that aims to reveal information to an adversary engaged in mass surveillance, while remaining undetected by users.
Algorithm Substitution Attack An ASA replaces a cryptographic scheme with a subverted version that aims to reveal information to an adversary engaged in mass surveillance, while remaining undetected by users.
5:15
Authentication Alice and Bob want to ensure the authenticity of their communication Alice can use a message authentication code to generate a tag t for a message m being sent. Bob can check the validity of the tag using the shared key
Authentication Alice and Bob want to ensure the authenticity of their communication Alice can use a message authentication code to generate a tag t for a message m being sent. Bob can check the validity of the tag using the shared key
11:56
The verification algorithm is subverted so that it accepts a fraction of invalid tags - The adversary intercepts a valid message tag pair. If the tag
The verification algorithm is subverted so that it accepts a fraction of invalid tags - The adversary intercepts a valid message tag pair. If the tag
21:04
Transcript
Follow along using the transcript.
Show transcript
IACR
9.74K subscribers
Videos
About