ANSSI

Displaying 1-5 of 5 results

  • White Papers // Oct 2013

    SCARE of Secret Ciphers with SPN Structures

    Side-Channel Analysis (SCA) is commonly used to recover secret keys involved in the implementation of publicly known cryptographic algorithms. On the other hand, Side-Channel Analysis for Reverse Engineering (SCARE) considers an adversary who aims at recovering the secret design of some cryptographic algorithm from its implementation. Most of previously published...

    Provided By ANSSI

  • White Papers // May 2013

    New Constructions and Applications of Trapdoor DDH Groups

    Trapdoor Decisional Diffie-Hellman (TDDH) groups, introduced by the researchers (ANTS 2006), are groups where the DDH problem is hard, unless one is in possession of a secret trapdoor which enables solving it efficiently. Despite their intuitively appealing properties, they have found up to now very few cryptographic applications. Moreover, among...

    Provided By ANSSI

  • White Papers // Nov 2012

    A Robust and Plaintext-Aware Variant of Signed ElGamal Encryption

    Adding a Schnorr signature to ElGamal encryption is a popular proposal aiming at thwarting chosen-ciphertext attacks by rendering the scheme plaintext-aware. However, there is no known security proof for the resulting scheme, at least not in a weaker model than the one obtained by combining the Random Oracle Model (ROM)...

    Provided By ANSSI

  • White Papers // Jul 2012

    A Unified Indifferentiability Proof for Permutation- or Block Cipher-Based Hash Functions

    In the recent years, several hash constructions have been introduced that aim at achieving enhanced security margins by strengthening the Merkle-Damgard mode. However, their security analysis have been conducted independently and using a variety of proof methodologies. This paper unifies these results by proposing a unique indifferentiability proof that considers...

    Provided By ANSSI

  • White Papers // Dec 2010

    A Forgery Attack on the Candidate LTE Integrity Algorithm 128-EIA3

    In this note the authors show that the message authentication code 128-EIA3 considered for adoption as a third integrity algorithm in the emerging mobile standard LTE is vulnerable to a simple existential forgery attack. This attack allows, given any message and the associated MAC value under an unknown integrity key...

    Provided By ANSSI

  • White Papers // Nov 2012

    A Robust and Plaintext-Aware Variant of Signed ElGamal Encryption

    Adding a Schnorr signature to ElGamal encryption is a popular proposal aiming at thwarting chosen-ciphertext attacks by rendering the scheme plaintext-aware. However, there is no known security proof for the resulting scheme, at least not in a weaker model than the one obtained by combining the Random Oracle Model (ROM)...

    Provided By ANSSI

  • White Papers // Jul 2012

    A Unified Indifferentiability Proof for Permutation- or Block Cipher-Based Hash Functions

    In the recent years, several hash constructions have been introduced that aim at achieving enhanced security margins by strengthening the Merkle-Damgard mode. However, their security analysis have been conducted independently and using a variety of proof methodologies. This paper unifies these results by proposing a unique indifferentiability proof that considers...

    Provided By ANSSI

  • White Papers // Dec 2010

    A Forgery Attack on the Candidate LTE Integrity Algorithm 128-EIA3

    In this note the authors show that the message authentication code 128-EIA3 considered for adoption as a third integrity algorithm in the emerging mobile standard LTE is vulnerable to a simple existential forgery attack. This attack allows, given any message and the associated MAC value under an unknown integrity key...

    Provided By ANSSI

  • White Papers // May 2013

    New Constructions and Applications of Trapdoor DDH Groups

    Trapdoor Decisional Diffie-Hellman (TDDH) groups, introduced by the researchers (ANTS 2006), are groups where the DDH problem is hard, unless one is in possession of a secret trapdoor which enables solving it efficiently. Despite their intuitively appealing properties, they have found up to now very few cryptographic applications. Moreover, among...

    Provided By ANSSI

  • White Papers // Oct 2013

    SCARE of Secret Ciphers with SPN Structures

    Side-Channel Analysis (SCA) is commonly used to recover secret keys involved in the implementation of publicly known cryptographic algorithms. On the other hand, Side-Channel Analysis for Reverse Engineering (SCARE) considers an adversary who aims at recovering the secret design of some cryptographic algorithm from its implementation. Most of previously published...

    Provided By ANSSI