How to Subvert Backdoored Encryption: Security Against Adversaries that Decrypt All Ciphertexts

02/21/2018
by   Thibaut Horel, et al.
0

We study secure and undetectable communication in a world where governments can read all encrypted communications of citizens. We consider a world where the only permitted communication method is via a government-mandated encryption scheme, using government-mandated keys. Citizens caught trying to communicate otherwise (e.g., by encrypting strings which do not appear to be natural language plaintexts) will be arrested. The one guarantee we suppose is that the government-mandated encryption scheme is semantically secure against outsiders: a perhaps advantageous feature to secure communication against foreign entities. But what good is semantic security against an adversary that has the power to decrypt? Even in this pessimistic scenario, we show citizens can communicate securely and undetectably. Informally, there is a protocol between Alice and Bob where they exchange ciphertexts that look innocuous even to someone who knows the secret keys and thus sees the corresponding plaintexts. And yet, in the end, Alice will have transmitted her secret message to Bob. Our security definition requires indistinguishability between unmodified use of the mandated encryption scheme, and conversations using the mandated encryption scheme in a modified way for subliminal communication. Our topics may be thought to fall broadly within the realm of steganography: the science of hiding secret communication in innocent-looking messages, or cover objects. However, we deal with the non-standard setting of adversarial cover object distributions (i.e., a stronger-than-usual adversary). We leverage that our cover objects are ciphertexts of a secure encryption scheme to bypass impossibility results which we show for broader classes of steganographic schemes. We give several constructions of subliminal communication schemes based on any key exchange protocol with random messages (e.g., Diffie-Hellman).

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/22/2023

Public Key Encryption with Secure Key Leasing

We introduce the notion of public key encryption with secure key leasing...
research
10/22/2018

Cryptographic analysis of the Modified Matrix Modular Cryptosystem

We show that the Modified Matrix Modular Cryptosystem proposed by S.K. R...
research
02/03/2021

Information-theoretic Key Encapsulation and its Application to Secure Communication

A hybrid encryption scheme is a public key encryption system that consis...
research
01/17/2019

Information Theoretic Security for Broadcasting of Two Encrypted Sources under Side-Channel Attacks

We consider the secure communication problem for broadcasting of two enc...
research
05/12/2023

Unconditionally Secure Access Control Encryption

Access control encryption (ACE) enforces, through a sanitizer as the med...
research
07/16/2018

Determining the Optimal Random-padding Size for Rabin Cryptosystems

Rabin encryption and a secure ownership transfer protocol based on the d...
research
10/09/2020

On the Security of Group Communication Schemes

Secure group communications are a mechanism facilitating protected trans...

Please sign up or login with your details

Forgot password? Click here to reset