How to encrypt with a malicious random number generator
Title | How to encrypt with a malicious random number generator |
Publication Type | Journal Articles |
Year of Publication | 2008 |
Authors | Kamara S, Katz J |
Journal | Fast Software Encryption |
Pagination | 303 - 315 |
Date Published | 2008/// |
Abstract | Chosen-plaintext attacks on private-key encryption schemes are currently modeled by giving an adversary access to an oracle that encrypts a given message m using random coins that are generated uniformly at random and independently of anything else. This leaves open the possibility of attacks in case the random coins are poorly generated (e.g., using a faulty random number generator), or are under partial adversarial control (e.g., when encryption is done by lightweight devices that may be captured and tampered with).We introduce new notions of security modeling such attacks, propose two concrete schemes meeting our definitions, and show generic transformations for achieving security in this context. |
DOI | 10.1007/978-3-540-71039-4_19 |