International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) You can also receive updates via:

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

15:32 [Job][New] Ph.D. student and Post-Doc, University of Luxembourg

  The Laboratory of Algorithms, Cryptology and Security (LACS) at the University of Luxembourg is looking for one post-doc and one Ph.D. student to work on a new project on Fully Homomorphic Encryption (FHE). The goal is to improve existing FHE schemes, and possibly design and implement new ones.

The post-doc candidate should have a Ph.D. in cryptography. Experience with FHE is a plus but not a necessity. The Ph.D. candidate should have a master in computer science or in mathematics. Both positions are for three years.

To apply please follow the link below.

Ph.D. student:


15:32 [Job][New] Postdoc, Saarland University, Germany

  Starting 2015 the Information Security & Cryptography Group at Saarland

University, Germany, has several open positions for postdocs and we are

looking forward to your application.

Our major current research focus is on the recently awarded ERC Synergy

Grant imPACT, which aims at providing foundations for privacy,

accountability, compliance and trust in the Internet of the Future,

including cutting-edge methods and tools for assessing and enhancing

customer privacy.

You have the chance to work at one of Europe\'s top sites for IT security

and privacy research, in the beautiful region between Germany, France

and Luxembourg with a high quality of life. Postdocs are paid employees

of Saarland University. Salary and employment conditions are attractive.

We encourage the application of outstanding PhDs in computer science or

IT security, who would like to work with us in the field of next

generation privacy techniques. The positions start from February 1, 2015

or later and are funded for two years, with a possible extension by one

year. We solicit applications by January 15, 2015, but we will consider

applications until the positions are filled. Applications should include a

curriculum vitae, a brief description of research interests, three

selected own publications, and, if available, letters of recommendation.

Applications and informal inquiries should be sent to Michael Backes at

the following email address: application-erc (at)

Further information:

Center for IT Security, Privacy and Accountability -

Information Security & Cryptography Group -

ERC Synergy Grant imPACT -

04:17 [Pub][ePrint] Undermining Isolation through Covert Channels in the Fiasco.OC Microkernel, by Michael Peter and Jan Nordholz and Matthias Petschick and Janis Danisevskis and Julian Vetter and Jean-Pierre Seifert

  In the new age of cyberwars, system designers have

come to recognize the merits of building critical systems on top

of small kernels for their ability to provide strong isolation at

system level. This is due to the fact that enforceable isolation is

the prerequisite for any reasonable security policy. Towards this

goal we examine some internals of Fiasco.OC, a microkernel of

the prominent L4 family. Despite its recent success in certain highsecurity

projects for governmental use, we prove that Fiasco.OC

is not suited to ensure strict isolation between components meant

to be separated.

Unfortunately, in addition to the construction of system-wide

denial of service attacks, our identified weaknesses of Fiasco.OC

also allow covert channels across security perimeters with high

bandwidth. We verified our results in a strong affirmative way

through many practical experiments. Indeed, for all potential use

cases of Fiasco.OC we implemented a full-fledged system on its

respective archetypical hardware: Desktop server/workstation on

AMD64 x86 CPU, Tablet on Intel Atom CPU, Smartphone on

ARM Cortex A9 CPU. The measured peak channel capacities

ranging from 13500 bits/s (Cortex-A9 device) to 30500 bits/s

(desktop system) lay bare the feeble meaningfulness of Fiasco.

OC\'s isolation guarantee. This proves that Fiasco.OC cannot

be used as a separation kernel within high-security areas.

04:17 [Pub][ePrint] Statistical weakness in Spritz against VMPC-R: in search for the RC4 replacement, by Bartosz Zoltak

  We found a statistical weakness in the Spritz algorithm designed by Ronald L. Rivest and Jacob C. N. Schuldt. For N=8: Prob(output(x)=output(x+2)) = 1/N + 0.000498. The bias becomes statistically significant (for N=8) after observing about 2^21.9 outputs. Analogous bias occurs for N=16. We propose an algorithm (VMPC-R) which for N=8 produced 2^46.8 (31 million times more) outputs which remained undistinguishable from random in the same battery of tests. Supported by a series of additional statistical tests and security analyses we present VMPC-R as an algorithm we hope can be considered a worthwhile replacement for RC4.

04:17 [Pub][ePrint] Related-Key Differential Attack on Round Reduced RECTANGLE-80, by Jinyong Shan and Lei Hu and Ling Song and Siwei Sun and Xiaoshuang Ma

  RECTANGLE is a newly proposed lightweight block cipher which allows fast implementations for multiple platforms by using bit-slice techniques. It is an iterative 25-round SPN block cipher with a 64-bit block size and a 80-bit or 128-bit key size. Until now, the results on analyzing the cipher are not too much, which includes an attack on the 18-round reduced version proposed by the designers themselves. In this paper, we find all 15-round differential characteristics with 26--30 active S-boxes for given input, output and round subkey differences, which have a total probability $2^{-60.5}$. Based on these differential characteristics, we extend the corresponding distinguisher to 2 rounds backward and forward respectively, and propose an attack on the 19-round reduced RECTANGLE-80 with data complexity of $2^{62}$ plaintexts, time complexity of about $2^{67.42}$ encryptions and memory complexity of $2^{72}$. TThese data and time complexities are much lower than that of the designers for the 18-round reduced RECTANGLE-80.

02:29 [PhD][New] Hassan Jameel Asghar: Design and Analysis of Human Identification Protocols

  Name: Hassan Jameel Asghar
Topic: Design and Analysis of Human Identification Protocols
Category: cryptographic protocols

Description: Human identification protocols are authentication protocols that enable a human using an insecure terminal to authenticate to a remote server. The goal of such protocols is to ensure secure authentication in the presence of an adversary who can not only view the user’s inputs, and the internal computations and display of the terminal, but also eavesdrop on the communication link between the terminal and the server. An active\r\nadversary can in addition actively interfere with this communication link. However, protocols secure against active adversaries fall well short of usability. As a result, the focus of recent research has been on security against passive adversaries. Traditional authentication methods such as password-based authentication are not secure under this model, since the adversary can impersonate the user by learning the user’s password after observing a single authentication session.\r\n\r\nSince the introduction of the problem by Matsumoto and Imai in 1991, there have been sporadic attempts at constructing secure human identification protocols. However, to date there is no accepted solution, mainly because such protocols require mental computations from humans, and therefore the tradeoff between security and usability is huge. State-of-the-art protocols take between one to three minutes for authentication, but guarantee stronger security than traditional authentication methods. While this authentication time is not acceptable for most practical purposes, many interesting new mathematical problems and ideas have resulted in search for usable protocols.\r\n\r\nThis thesis aims to further the research in human identification protocols by focusing on the mathematical and analytical aspects of such protocols. We generalize some aspects of these protocols by analyzing their general structure. We give detailed security analysis of two protocols from literature, showing that without a thorough security analysis, these protocols are vulnerable to simple[...]

02:29 [PhD][New] Karine Heydemann

  Name: Karine Heydemann

02:29 [PhD][Update] Nicolas Moro: Security of assembly programs against fault attacks on embedded processors

  Name: Nicolas Moro
Topic: Security of assembly programs against fault attacks on embedded processors

Description: This thesis focuses on the security of embedded programs against fault injection attacks. Due to the spreadings of embedded systems in our common life, development of countermeasures is important. First, a fault model based on practical experiments with a pulsed electromagnetic fault injection technique has been built. The experimental results show that the injected faults were due to the corruption of the bus transfers between the Flash memory and the processor’s pipeline. Such faults enable to perform instruction replacements, instruction skips or to corrupt some data transfers from the Flash memory. Although replacing an instruction with another very specific one is very difficult to control, skipping an instruction seems much easier to perform in practice and has been observed very frequently. Furthermore many simple attacks can carried out with an instruction skip. A countermeasure that prevents such instruction skip attacks has been designed and formally verified with model-checking tool. The countermeasure replaces each instruction by a sequence of instructions. However, this countermeasure does not protect the data loads from the Flash memory. To do this, it can be combined with another assembly-level countermeasure that performs a fault detection. A first experimental test of these two countermeasures has been achieved, both on isolated instructions and complex codes from a FreeRTOS implementation. The proposed countermeasure appears to be a good complement for this detection countermeasure and allows to correct some of its flaws.[...]

16:17 [Pub][ePrint] Improved Differential Analysis of Block Cipher PRIDE, by Qianqian Yang and Lei Hu and Siwei Sun and Kexin Qiao and Ling Song and Jinyong Shan and Xiaoshuang Ma

  In CRYPTO 2014 Albrecht \\emph{et al.} brought in a 20-round iterative lightweight block

cipher PRIDE which is based on a good linear layer for achieving a

tradeoff between security and efficiency. A recent

analysis is presented by Zhao \\emph{et al.}. Inspired by their work, we use an

automatic search method to find out 56 iterative differential characteristics of PRIDE, containing 24

1-round iterative characteristics, based on three of them we construct a 15-round differential and perform a differential attack on the 19-round PRIDE, with data,

time and memory

complexity of $2^{62}$, $2^{63}$ and $2^{71}$ respectively.

16:17 [Pub][ePrint] The Chaining Lemma and its application, by Ivan Damgaard and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi

  We present a new information theoretic result which we call the Chaining Lemma. It considers a so-called \"chain\" of random variables, defined by a source distribution X0 with high min-entropy and a number (say, t in total) of arbitrary functions (T1,....Tt) which are applied in succession to that source to generate the chain X0-->X1-->.....-->Xt such that Xi=Ti(X[i-1]). Intuitively, the Chaining Lemma guarantees that, if the chain is not too long, then either (i) the entire chain is \"highly random\", in that every variable has high min-entropy; or (ii) it is possible to find a point j ( 1

16:17 [Pub][ePrint] A Fast Phase-Based Enumeration Algorithm for SVP Challenge through y-Sparse Representations of Short Lattice Vectors, by Dan Ding, Guizhen Zhu, Yang Yu, Zhongxiang Zheng

  In this paper, we propose a new phase-based enumeration algorithm based on two interesting and useful observations for y-sparse representations of short lattice vectors in lattices from SVP challenge benchmarks. Experimental results show that the phase-based algorithm greatly outperforms other famous enumeration algorithms in running time and achieves higher dimensions, like the Kannan-Helfrich enumeration algorithm. Therefore, the phase-based algorithm is a practically excellent solver for the shortest vector problem (SVP).