International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Substitution Attacks against Message Authentication

Authors:
Marcel Armour , Royal Holloway, University of London, London, United Kingdom
Bertram Poettering , IBM Research Labs Zurich, Rüschlikon, Switzerland
Download:
DOI: 10.13154/tosc.v2019.i3.152-168
URL: https://tosc.iacr.org/index.php/ToSC/article/view/8361
Search ePrint
Search Google
Abstract: This work introduces Algorithm Substitution Attacks (ASAs) on message authentication schemes. In light of revelations concerning mass surveillance, ASAs were initially introduced by Bellare, Paterson and Rogaway as a novel attack class against the confidentiality of encryption schemes. Such an attack replaces one or more of the regular scheme algorithms with a subverted version that aims to reveal information to an adversary (engaged in mass surveillance), while remaining undetected by users. While most prior work focused on subverting encryption systems, we study options to subvert symmetric message authentication protocols. In particular we provide powerful generic attacks that apply e.g. to HMAC or Carter–Wegman based schemes, inducing only a negligible implementation overhead. As subverted authentication can act as an enabler for subverted encryption (software updates can be manipulated to include replacements of encryption routines), we consider attacks of the new class highly impactful and dangerous.
Video from TOSC 2019
BibTeX
@article{tosc-2019-29947,
  title={Substitution Attacks against Message Authentication},
  journal={IACR Transactions on Symmetric Cryptology},
  publisher={Ruhr-Universität Bochum},
  volume={2019, Issue 3},
  pages={152-168},
  url={https://tosc.iacr.org/index.php/ToSC/article/view/8361},
  doi={10.13154/tosc.v2019.i3.152-168},
  author={Marcel Armour and Bertram Poettering},
  year=2019
}