IACR News item: 23 February 2015
Bruce Schneier, Matthew Fredrikson, Tadayoshi Kohno, Thomas Ristenpart
ePrint Report
Revelations over the past couple of years highlight the importance of understanding malicious and surreptitious weakening of cryptographic systems. We provide an overview of this domain, using a number of historical examples to drive development of a weaknesses taxonomy. This allows comparing different approaches to sabotage. We categorize a broader set of potential avenues for weakening systems using this taxonomy, and discuss what future research is needed to provide sabotage-resilient cryptography.
Additional news items may be found on the IACR news page.