International Association for Cryptologic Research

IACR News Central

Get an update on changes of the IACR web-page here. For questions, contact newsletter (at) iacr.org. You can also receive updates via:

To receive your credentials via mail again, please click here.

You can also access the full news archive.

Further sources to find out about changes are CryptoDB, ePrint RSS, ePrint Web, Event calender (iCal).

2015-06-28
21:17 [Pub][ePrint] Fully Secure Functional Encryption for Inner Products, from Standard Assumptions, by Benoit Libert and Damien Stehle

  Functional encryption is a modern public-key paradigm where a master private key can be used to derive sub-keys $SK_F$ associated with certain functions $F$ in such a way that the decryption operation reveals $F(M)$, if $M$ is the encrypted message, and nothing else. Recently, Abdalla {\\it et al.} gave simple and efficient realizations of the primitive for the computation of linear functions on encrypted data: given an encryption of a vector $\\vec{y} \\in \\Z_q^\\ell$, a private key $SK_{\\vec{x}}$ for the vector $\\vec{x} \\in \\Z_q^\\ell$ allows computing $\\langle \\vec{x} ,\\vec{y} \\rangle$. Their technique surprisingly allows for instantiations under standard assumptions, like the hardness of the Decision Diffie-Hellman ($\\DDH$) and Learning-with-Errors ($\\LWE$) problems. Their constructions, however, are only proved secure against {\\it selective} adversaries, which have to declare the challenge messages $M_0$ and $M_1$ at the outset of the game. In this paper, we provide constructions that provably achieve security against more realistic {\\it adaptive} attacks (where the messages $M_0$ and $M_1$ may be chosen in the challenge phase, based on the previously collected information) for the same inner product functionality. Our constructions are obtained from hash proof systems endowed with homomorphic properties over the key space. They are as efficient as those of Abdalla {\\it et al.} and rely on the same assumptions. As a result of independent interest, we prove the security of our $\\LWE$-based system via a new result on the hardness of the extended $\\LWE$ problem, where the distinguisher receives hints about the noise distribution.



21:17 [Pub][ePrint] Experimental Study of DIGIPASS GO3 and the Security of Authentication, by Igor Semaev

  Based on the analysis of $6$-digit one-time passwords(OTP) generated by DIGIPASS GO3 we were able to reconstruct the synchronisation system of the token, the OTP generating algorithm and the verification protocol in details essential for an attack. The OTPs are more predictable than expected. A forgery attack is described. We argue the attack success probability is $8^{-5}$. That is much higher than $10^{-6}$ which may be expected if all the digits are independent and uniformly distributed. Under natural assumptions even in a relatively small bank or company with $10^4$ customers the number of compromised accounts during a year may be more than $100$.



21:17 [Pub][ePrint] McBits: fast constant-time code-based cryptography, by Daniel J. Bernstein and Tung Chou and Peter Schwabe

  This paper presents extremely fast algorithms for code-based

public-key cryptography, including full protection against timing attacks. For example, at a 2^128 security level, this paper achieves a reciprocal decryption throughput of just 60493 cycles (plus cipher cost etc.) on a single Ivy Bridge core. These algorithms rely on an additive FFT for fast root computation, a transposed additive FFT for fast syndrome computation, and a sorting network to avoid cache-timing attacks.



21:17 [Pub][ePrint] A Unified Security Analysis of Two-phase Key Exchange Protocols in TPM 2.0, by Shijun Zhao and Qianying Zhang

  The Trusted Platform Module (TPM) version 2.0 provides an authenticated key exchange functionality by a single key exchange primitive, which can be called to implement three key exchange protocols (denoted as two-phase key exchange protocols in TPM 2.0): the Full Unified Model, the MQV, and the SM2 key exchange protocols. However, some vulnerabilities have been found in all of these protocols. Fortunately, it seems that protections provided by the TPM can deal with vulnerabilities of these protocols. This paper investigates whether the TPM key exchange primitive provides a secure key exchange functionality under protections of the TPM. We first perform an informal analysis of the TPM key exchange primitive which helps us to model in a precise way. Then we formally analyze the TPM key exchange primitive in a security model for AKE, based on which all the protocols adopted by TPM 2.0 can be analyzed in a unified way. Our analysis indicates under what conditions the TPM 2.0 can provide a provable secure key exchange functionality. In the end, we give suggestions on how to leverage the TPM key exchange primitive properly, and suggestions on how to improve the security of current TPM key exchange primitive to enable its wide use in practice.





2015-06-27
23:21 [Event][New] ACNS'16: 14th International Conference on Applied Cryptography and Network Security

  Submission: 27 January 2016
Notification: 25 March 2016
From June 19 to June 22
Location: London, UK
More Information: http://acns2016.sccs.surrey.ac.uk/




2015-06-26
16:08 [Job][New] Two PhD Positions in Cryptography, University of Bristol

  We are looking for PhD applicants in the areas of practical Multi-Party Computation and in Multi-Linear Maps and associated techniques. The positions include a tax free stipend as well as payment of your tuition fees. The projects are with partners in the USA and so travel to the USA will be a major component of the projects.

Please contact Nigel Smart, as soon as possible, to informally discuss the positions.



2015-06-25
16:27 [Job][New] Ph.D. scholarship, University of Bergen

  There is a vacancy for a PhD position at Department of Informatics (www.uib.no/en/ii) in cryptography. The position is for a fixed-term period of 4 years and within the Simula@UiB group, a joint collaboration in cyber security between UiB and Simula Research Laboratory. Salary at pay grade 50 upon appointment; currently NOK 430,500 gross p.a. Further promotions are made according to length of service in the position.



2015-06-24
22:47 [Job][New] Postdoc, Cryptographic Algorithms Group, CISPA, Saarland University, Germany

  The Cryptographic Algorithms Group is offering a 2-year post-doc position. We are part of the Center for IT-Security and Privacy (short: CISPA). The CISPA was founded in October 2011 as a competence center for IT security at Saarland University. It is a joint endeavor of Saarland University (UdS) and its on-site partner institutions: the Max Planck Institute for Informatics (MPI-INF), the Max Planck Institute for Software Systems (MPI-SWS), and the German Research Center for Artificial Intelligence (DFKI).

Requirements: A PhD in cryptography and related areas, excellence in research proven for example by publications in IACR conferences and workshops or venues like IEEE S&P, ACM CCS, NDSS, USENIX Security,…

Applicants interested in the positions should provide the following information in pdf format with the application:

- Research Statement

- CV

- List of publications, mark your top 2

- 2 reference letters

Expected starting date is Nov, 1st.

Cryptographic Algorithms Group: www.ca.cs.uni-saarland.de

CISPA: http://cispa.saarland

22:47 [Job][New] Sr. SW Engineer – Security/Applied Cryptography Expert , Aspera - an IBM Company

  Aspera, an IBM Company is profitable, and headquartered in Emeryville, California with satellite offices in the United Kingdom, France and Singapore. Over 3,000 customers across all industries that need to move large volumes of data in industries such as enterprise IT, games and software development, government, legal & eDiscovery, life sciences, media & entertainment and oil & gas rely on Aspera software to move extreme data sets at high-speed over global distances.

• Focus on defining and building out security programs and quality programs

• Develop an analysis framework for vulnerabilities

• Code or help code the security framework components

• Develop patches and new security features to help mitigate security flaws

• Coordinate activities during the deployment of security-relevant features

• Perform security code audits and design reviews

• Architecture, design and coding of Aspera’s end-to-end security framework

• Threat and vulnerability analysis

• Code analysis, scanning

• Pen-test

• Ability to deliver results quickly and efficiently with iterative approache

Requirements:

• Strong software development background - C and C++, systems programming, web application frameworks, JavaScript

• Expert knowledge of applied cryptography and software security

• Ultra familiarity with common software security threats, CWE

• Expert knowledge of applied cryptography and software security

• Proven record - contribution or ownership of security framework design and implementation for large scale software systems

• Authentication and distributed authorization frameworks (SAML, OpenID, OAuth(2))

• Code analysis and scanning tools and processes

• Secure communication protocols, data protection, secure interaction with authentication and authorizations systems, and cloud services (particularly cloud storage)

• To



2015-06-22
03:55 [News] Open Letter to the Hon'ble President of India

 

Open Letter to the Hon'ble President of India

The International Association of Cryptologic Research (IACR) is dismayed by reports of Professor Bimal Roy being dismissed in all but name as Director of the Indian Statistical Institute in Kolkata. Professor Roy has been a driving force in advancing the important field of cryptology in India, elevating its visibility to international level. Cryptology is a prime application of statistical and probabilistic methods.

The IACR confirms that Professor Roy deserves great recognition for his service to India and to the field of cryptology. He devoted his career to strengthening India's standing in this timely, fast advancing field. Removing him from this position one month before the appointment expires is an act that has put India in a shameful and awkward position in front of the international community of cryptology research and of mathematics in general.

The International Association of Cryptologic Research
June 21, 2015