Practical Attacks on a Cryptosystem Proposed in Patent WO/2009/066313 View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2012

AUTHORS

Gautham Sekar , Bart Preneel

ABSTRACT

A new cryptosystem is proposed in the international patent WO/2009/066313 by Artus. The symmetric-key primitive in the cryptosystem resembles a stream cipher. The system differs markedly from cryptosystems used today in that the secret key is changed with the plaintext. The patent does not discuss key management (generation, transmission) in sufficient detail. Some of the proposed methods for transmission of keys are highly insecure and an algorithm for key generation is missing. In this paper, we find that related-key attacks of negligibly low complexity (data/time) can result when certain (flawed) key generation algorithms are used. We also present a negligibly-low-complexity attack in a non-related-key setting. We hope that the results caution potential users of the cryptosystem. More... »

PAGES

1-12

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-642-27890-7_1

DOI

http://dx.doi.org/10.1007/978-3-642-27890-7_1

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1045781528


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0802", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Computation Theory and Mathematics", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Temasek Laboratories, National University of Singapore, 5A, Engineering Drive 1, 117411, Singapore, Singapore", 
          "id": "http://www.grid.ac/institutes/grid.4280.e", 
          "name": [
            "Temasek Laboratories, National University of Singapore, 5A, Engineering Drive 1, 117411, Singapore, Singapore"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Sekar", 
        "givenName": "Gautham", 
        "id": "sg:person.011362012455.96", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011362012455.96"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Interdisciplinary Institute for BroadBand Technology\u00a0(IBBT), Belgium", 
          "id": "http://www.grid.ac/institutes/grid.56912.39", 
          "name": [
            "Department of Electrical Engineering ESAT/SCD-COSIC, Katholieke Universiteit Leuven, Kasteelpark Arenberg 10, B-3001, Heverlee, Belgium", 
            "Interdisciplinary Institute for BroadBand Technology\u00a0(IBBT), Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Preneel", 
        "givenName": "Bart", 
        "id": "sg:person.011115044357.39", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011115044357.39"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2012", 
    "datePublishedReg": "2012-01-01", 
    "description": "A new cryptosystem is proposed in the international patent WO/2009/066313 by Artus. The symmetric-key primitive in the cryptosystem resembles a stream cipher. The system differs markedly from cryptosystems used today in that the secret key is changed with the plaintext. The patent does not discuss key management (generation, transmission) in sufficient detail. Some of the proposed methods for transmission of keys are highly insecure and an algorithm for key generation is missing. In this paper, we find that related-key attacks of negligibly low complexity (data/time) can result when certain (flawed) key generation algorithms are used. We also present a negligibly-low-complexity attack in a non-related-key setting. We hope that the results caution potential users of the cryptosystem.", 
    "editor": [
      {
        "familyName": "Jung", 
        "givenName": "Souhwan", 
        "type": "Person"
      }, 
      {
        "familyName": "Yung", 
        "givenName": "Moti", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-642-27890-7_1", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-642-27889-1", 
        "978-3-642-27890-7"
      ], 
      "name": "Information Security Applications", 
      "type": "Book"
    }, 
    "keywords": [
      "transmission of keys", 
      "key generation algorithm", 
      "symmetric-key primitives", 
      "low-complexity attack", 
      "related-key attacks", 
      "key management", 
      "key generation", 
      "secret key", 
      "practical attacks", 
      "new cryptosystem", 
      "cryptosystem", 
      "generation algorithm", 
      "stream cipher", 
      "potential users", 
      "low complexity", 
      "key setting", 
      "attacks", 
      "algorithm", 
      "plaintext", 
      "primitives", 
      "key", 
      "users", 
      "cipher", 
      "sufficient detail", 
      "complexity", 
      "system", 
      "today", 
      "transmission", 
      "management", 
      "method", 
      "generation", 
      "detail", 
      "results", 
      "setting", 
      "patents", 
      "artus", 
      "paper"
    ], 
    "name": "Practical Attacks on a Cryptosystem Proposed in Patent WO/2009/066313", 
    "pagination": "1-12", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1045781528"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-642-27890-7_1"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-642-27890-7_1", 
      "https://app.dimensions.ai/details/publication/pub.1045781528"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-09-02T16:13", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220902/entities/gbq_results/chapter/chapter_282.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-642-27890-7_1"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-27890-7_1'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-27890-7_1'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-27890-7_1'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-27890-7_1'


 

This table displays all metadata directly associated to this object as RDF triples.

112 TRIPLES      22 PREDICATES      62 URIs      55 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-642-27890-7_1 schema:about anzsrc-for:08
2 anzsrc-for:0802
3 schema:author N8190d8d0fc6148beb41bc916ac901297
4 schema:datePublished 2012
5 schema:datePublishedReg 2012-01-01
6 schema:description A new cryptosystem is proposed in the international patent WO/2009/066313 by Artus. The symmetric-key primitive in the cryptosystem resembles a stream cipher. The system differs markedly from cryptosystems used today in that the secret key is changed with the plaintext. The patent does not discuss key management (generation, transmission) in sufficient detail. Some of the proposed methods for transmission of keys are highly insecure and an algorithm for key generation is missing. In this paper, we find that related-key attacks of negligibly low complexity (data/time) can result when certain (flawed) key generation algorithms are used. We also present a negligibly-low-complexity attack in a non-related-key setting. We hope that the results caution potential users of the cryptosystem.
7 schema:editor Naa198a616b9e423dbf225eed9c101a9b
8 schema:genre chapter
9 schema:isAccessibleForFree true
10 schema:isPartOf Nff97977f3dee4f1ab63c4353b9098ec5
11 schema:keywords algorithm
12 artus
13 attacks
14 cipher
15 complexity
16 cryptosystem
17 detail
18 generation
19 generation algorithm
20 key
21 key generation
22 key generation algorithm
23 key management
24 key setting
25 low complexity
26 low-complexity attack
27 management
28 method
29 new cryptosystem
30 paper
31 patents
32 plaintext
33 potential users
34 practical attacks
35 primitives
36 related-key attacks
37 results
38 secret key
39 setting
40 stream cipher
41 sufficient detail
42 symmetric-key primitives
43 system
44 today
45 transmission
46 transmission of keys
47 users
48 schema:name Practical Attacks on a Cryptosystem Proposed in Patent WO/2009/066313
49 schema:pagination 1-12
50 schema:productId N1e8955373cdc425185066c354c1d0d90
51 N6ab3c44f600a4eae86a56da0e0535e19
52 schema:publisher N5ea357fb317346ec95006a1276895754
53 schema:sameAs https://app.dimensions.ai/details/publication/pub.1045781528
54 https://doi.org/10.1007/978-3-642-27890-7_1
55 schema:sdDatePublished 2022-09-02T16:13
56 schema:sdLicense https://scigraph.springernature.com/explorer/license/
57 schema:sdPublisher Ne00031419f854fac8ebf4487a3d8e5e1
58 schema:url https://doi.org/10.1007/978-3-642-27890-7_1
59 sgo:license sg:explorer/license/
60 sgo:sdDataset chapters
61 rdf:type schema:Chapter
62 N0c8865f45a1e414ab15032160e16a195 schema:familyName Yung
63 schema:givenName Moti
64 rdf:type schema:Person
65 N1e8955373cdc425185066c354c1d0d90 schema:name doi
66 schema:value 10.1007/978-3-642-27890-7_1
67 rdf:type schema:PropertyValue
68 N5ea357fb317346ec95006a1276895754 schema:name Springer Nature
69 rdf:type schema:Organisation
70 N61a1b5d2e9d440728d286c3f692422e6 rdf:first N0c8865f45a1e414ab15032160e16a195
71 rdf:rest rdf:nil
72 N6ab3c44f600a4eae86a56da0e0535e19 schema:name dimensions_id
73 schema:value pub.1045781528
74 rdf:type schema:PropertyValue
75 N8190d8d0fc6148beb41bc916ac901297 rdf:first sg:person.011362012455.96
76 rdf:rest Nf8e466f6b6844568ac1ed067e15d93e8
77 N8552ff8998a84e3ea348d56d629e1cdd schema:familyName Jung
78 schema:givenName Souhwan
79 rdf:type schema:Person
80 Naa198a616b9e423dbf225eed9c101a9b rdf:first N8552ff8998a84e3ea348d56d629e1cdd
81 rdf:rest N61a1b5d2e9d440728d286c3f692422e6
82 Ne00031419f854fac8ebf4487a3d8e5e1 schema:name Springer Nature - SN SciGraph project
83 rdf:type schema:Organization
84 Nf8e466f6b6844568ac1ed067e15d93e8 rdf:first sg:person.011115044357.39
85 rdf:rest rdf:nil
86 Nff97977f3dee4f1ab63c4353b9098ec5 schema:isbn 978-3-642-27889-1
87 978-3-642-27890-7
88 schema:name Information Security Applications
89 rdf:type schema:Book
90 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
91 schema:name Information and Computing Sciences
92 rdf:type schema:DefinedTerm
93 anzsrc-for:0802 schema:inDefinedTermSet anzsrc-for:
94 schema:name Computation Theory and Mathematics
95 rdf:type schema:DefinedTerm
96 sg:person.011115044357.39 schema:affiliation grid-institutes:grid.56912.39
97 schema:familyName Preneel
98 schema:givenName Bart
99 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011115044357.39
100 rdf:type schema:Person
101 sg:person.011362012455.96 schema:affiliation grid-institutes:grid.4280.e
102 schema:familyName Sekar
103 schema:givenName Gautham
104 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011362012455.96
105 rdf:type schema:Person
106 grid-institutes:grid.4280.e schema:alternateName Temasek Laboratories, National University of Singapore, 5A, Engineering Drive 1, 117411, Singapore, Singapore
107 schema:name Temasek Laboratories, National University of Singapore, 5A, Engineering Drive 1, 117411, Singapore, Singapore
108 rdf:type schema:Organization
109 grid-institutes:grid.56912.39 schema:alternateName Interdisciplinary Institute for BroadBand Technology (IBBT), Belgium
110 schema:name Department of Electrical Engineering ESAT/SCD-COSIC, Katholieke Universiteit Leuven, Kasteelpark Arenberg 10, B-3001, Heverlee, Belgium
111 Interdisciplinary Institute for BroadBand Technology (IBBT), Belgium
112 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...