Security Investigate

Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine

Download now Free registration required

Executive Summary

Typical security models used for proving security of deployed cryptographic primitives do not allow adversaries to rewind or reset honest parties to an earlier state. Thus, it is common to see cryptographic protocols rely on the assumption that fresh random numbers can be continually generated. In this paper, the authors argue that because of the growing popularity of virtual machines and, specifically, their state snapshot and revert features, the security of cryptographic protocols proven under these assumptions is called into question. They focus on public-key encryption security in a setting where resetting is possible and random numbers might be reused.

  • Format: PDF
  • Size: 209.9 KB