Strong adaptive chosen-ciphertext attacks with memory dump (or: The importance of the order of decryption and validation)

Seungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, Yuliang Zheng

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This paper presents a new type of powerful cryptanalytic attacks on public-key cryptosystems, extending the more commonly studied adaptive chosen-ciphertext attacks. In the new attacks, an adversary is not only allowed to submit to a decryption oracle (valid or invalid) ciphertexts of her choice, but also to emit a “dump query” prior to the completion of a decryption operation. The dump query returns intermediate results that have not been erased in the course of the decryption operation, whereby allowing the adversary to gain vital advantages in breaking the cryptosystem. We believe that the new attack model approximates more closely existing security systems. We examine its power by demonstrating that most existing public-key cryptosystems, including OAEP-RSA, are vulnerable to our extended attacks.

Original languageEnglish
Title of host publicationCryptography and Coding - 8th IMA International Conference, Proceedings
EditorsBahram Honary, Bahram Honary
PublisherSpringer Verlag
Pages114-127
Number of pages14
ISBN (Print)3540430261, 9783540430261
DOIs
Publication statusPublished - 2001
Externally publishedYes
Event8th IMA International Conference on Cryptography and Coding, 2001 - Cirencester, United Kingdom
Duration: 2001 Dec 172001 Dec 19

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2260
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other8th IMA International Conference on Cryptography and Coding, 2001
Country/TerritoryUnited Kingdom
CityCirencester
Period01/12/1701/12/19

Keywords

  • Chosen-ciphertext security
  • Ciphertext validity
  • ElGamal encryption
  • Encryption
  • OAEP-RSA
  • Provable security

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Strong adaptive chosen-ciphertext attacks with memory dump (or: The importance of the order of decryption and validation)'. Together they form a unique fingerprint.

Cite this