Filters








59 Hits in 3.3 sec

Deriving ChaCha20 key streams from targeted memory analysis

Peter McLaren, William J. Buchanan, Gordon Russell, Zhiyuan Tan
2019 Journal of Information Security and Applications  
Although many symmetric key stream ciphers are fairly resistant to side-channel attacks, cryptographic artefacts may exist in memory.  ...  The user of a virtual machine would not be alerted to the capturing of the encryption key, as the method runs from an extraction of the running memory.  ...  This paper focuses on stream ciphers. Stream ciphers generate a random key stream from an evolving state [18] .  ... 
doi:10.1016/j.jisa.2019.102372 fatcat:4jxghyy35vgr5cfqavpnpxbh34

Hardening Amazon Web Service OTA Update Process

Stefan Ilić, Mario Münzer
2019 Zenodo  
In this paper we present our improvements of the Amazon over-the-air (OTA) update process specifically targeting existing IoT devices.  ...  As a workaround we decided to use stream ciphers, specifically ChaCha20. ChaCha20 is a modification of the Salsa20 stream cipher, which was also developed by Daniel J.  ...  The mbedTLS library also supports ChaCha20 stream cipher since version 2.12. ChaCha20 module needs to be enabled in mbedTLS configuration by defining MBEDTLS CHACHA20 C.  ... 
doi:10.5281/zenodo.3607950 fatcat:tfrfydrlrfejpnx5ldyk7wo4oi

MAVSec: Securing the MAVLink Protocol for Ardupilot/PX4 Unmanned Aerial Systems [article]

Azza Allouch, Omar Cheikhrouhou, Anis Koubaa, Mohamed Khalgui, Tarek Abbes
2019 arXiv   pre-print
AES-CBC, AES-CTR, RC4, and ChaCha20) in terms of memory usage and CPU consumption.  ...  Integrating ChaCha20 into MAVLink can guarantee its messages confidentiality, without affecting its performance, while occupying less memory and CPU consumption, thus, preserving memory and saving the  ...  ChaCha20 is a stream cipher developed by D. J.  ... 
arXiv:1905.00265v2 fatcat:isiaymjczrdjxmo2nex6nr3rlq

MAVSec: Securing the MAVLink Protocol for Ardupilot/PX4 Unmanned Aerial Systems

Azza Allouch, Omar Cheikhrouhou, Anis Koubaa, Mohamed Khalgui, Tarek Abbes
2019 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)  
AES-CBC, AES-CTR, RC4 and ChaCha20) interms of memory usage and CPU consumption.  ...  AES-CBC, AES-CTR, RC4 and ChaCha20) in terms of memory usage and CPU consumption.  ...  ChaCha20 is a stream cipher developed by D. J.  ... 
doi:10.1109/iwcmc.2019.8766667 dblp:conf/iwcmc/AllouchCKKA19 fatcat:lwgmifrpprfvdekw4fjbrqc4bq

libInterMAC: Beyond Confidentiality and Integrity in Practice

Martin R. Albrecht, Torben Brandt Hansen, Kenneth G. Paterson
2019 IACR Transactions on Symmetric Cryptology  
We give a performance analysis of libInterMAC.  ...  Our analysis shows that, for some network set-ups, using InterMAC-based schemes in OpenSSH only moderately affects performance whilst providing stronger security guarantees compared to existing schemes  ...  Data Limit Analysis ChaCha20 must not be used to encrypt more than 2 38 bytes under the same key-nonce pair (k, nonce) because the block counter in the ChaCha20 block function is 4 bytes long and ChaCha20  ... 
doi:10.13154/tosc.v2019.i1.46-83 dblp:journals/tosc/AlbrechtHP19 fatcat:6bvbxlrrczgyppfgvzeoalhmue

libInterMAC: Beyond Confidentiality and Integrity in Practice

Martin R. Albrecht, Torben Brandt Hansen, Kenneth G. Paterson
2019 IACR Transactions on Symmetric Cryptology  
We give a performance analysis of libInterMAC.  ...  Our analysis shows that, for some network set-ups, using InterMAC-based schemes in OpenSSH only moderately affects performance whilst providing stronger security guarantees compared to existing schemes  ...  Data Limit Analysis ChaCha20 must not be used to encrypt more than 2 38 bytes under the same key-nonce pair (k, nonce) because the block counter in the ChaCha20 block function is 4 bytes long and ChaCha20  ... 
doi:10.46586/tosc.v2019.i1.46-83 fatcat:hnuylki46nacbetdn2lrxdqk2i

Verified low-level programming embedded in F*

Jonathan Protzenko, Cédric Fournet, Nikhil Swamy, Jean-Karim Zinzindohoué, Aseem Rastogi, Tahina Ramananandro, Peng Wang, Santiago Zanella-Béguelin, Antoine Delignat-Lavaud, Cătălin Hriţcu, Karthikeyan Bhargavan
2017 Proceedings of the ACM on Programming Languages  
Departing from ML, Low * does not involve any garbage collection or implicit heap allocation; instead, it has a structured memory model à la CompCert, and it provides the control required for writing efficient  ...  By virtue of typing, any Low * program is memory safe.  ...  A First Example: the ChaCha20 Stream Cipher Aside from the erased specifications at lines 7-10, the C code is in one-to-one correspondence with its Low * counterpart.  ... 
doi:10.1145/3110261 dblp:journals/pacmpl/ProtzenkoZRRWBD17 fatcat:dceptbyugnanfoffqlggi425wq

Implementing and Proving the TLS 1.3 Record Layer

Antoine Delignat-Lavaud, Cedric Fournet, Markulf Kohlweiss, Jonathan Protzenko, Aseem Rastogi, Nikhil Swamy, Santiago Zanella-Beguelin, Karthikeyan Bhargavan, Jianyang Pan, Jean Karim Zinzindohoue
2017 2017 IEEE Symposium on Security and Privacy (SP)  
) Multiplexed Streams Sequence of streams keyed by Handshake ChaCha20 AES Poly1305 GHASH Handshake/Alert Application fragments: d 0 , d 1 , d 2 keys: k 0 , k 1 ,...  ...  Similarly, we build a library for pseudo-random functions (PRF), and provide functionally-correct, memory-safe implementations for AES and ChaCha20 ( §4).  ...  Acknowledgements This research received funding from the European Research Council (ERC) under the European Union's Horizon 2020 research and innovation programme (grant agreement no. 683032 -CIRCUS)  ... 
doi:10.1109/sp.2017.58 dblp:conf/sp/Delignat-Lavaud17 fatcat:ounxfig44bas5dzpo6hqzukism

The Last Mile: High-Assurance and High-Speed Cryptographic Implementations

Jose Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Benjamin Gregoire, Adrien Koutsos, Vincent Laporte, Tiago Oliveira, Pierre-Yves Strub
2020 2020 IEEE Symposium on Security and Privacy (SP)  
We illustrate our approach using ChaCha20-Poly1305, one of the two ciphersuites recommended in TLS 1.3, and deliver formally verified vectorized implementations which outperform the fastest non-verified  ...  Taken together, these infrastructures empower programmers to develop efficient and verified implementations by "game hopping", starting from reference implementations that are proved functionally correct  ...  It defines an algorithm that expands a 256-bit key into 2 96 key streams (each stream is associated with a 96-bit nonce) each consisting of 2 32 blocks (each 64-byte block is associated with a counter  ... 
doi:10.1109/sp40000.2020.00028 dblp:conf/sp/AlmeidaBBGKL0S20 fatcat:opsfghx3brfkbmzra2wlq55cae

Security and Performance in IoT: A Balancing Act

Luke Kane, Jiaming James Chen, Rebecca Thomas, Vicky Liu, Matthew McKague
2020 IEEE Access  
The first function generates a key stream bit from the state. The second function generates the overall feedback bit. The final function updates the state.  ...  from the set key operation wherever possible.  ...  KANE received the BInfoTech(CompSc) Hons. degree from the Queensland University of Technology (QUT), Brisbane, Queensland, Australia in 2019.  ... 
doi:10.1109/access.2020.3007536 fatcat:gsb32ai4j5h3xajxwz733kvc3e

The Last Mile: High-Assurance and High-Speed Cryptographic Implementations [article]

José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Benjamin Grégoire, Adrien Koutsos, Vincent Laporte, Tiago Oliveira, Pierre-Yves Strub
2019 arXiv   pre-print
We illustrate ur approach using ChaCha20-Poly1305, one of the mandatory ciphersuites in TLS 1.3, and deliver formally verified vectorized implementations which outperform the fastest non-verified code.  ...  Taken together, these infrastructures empower programmers to develop efficient and verified implementations by "game hopping", starting from reference implementations that are proved functionally correct  ...  It defines an algorithm that expands a 256-bit key into 2 96 key streams (each stream is associated with a 96-bit nonce) each consisting of 2 32 blocks (each 64-byte block is associated with a counter  ... 
arXiv:1904.04606v1 fatcat:6faifycmbrcfjaaudfj2wo3pp4

HACL*

Jean-Karim Zinzindohoué, Karthikeyan Bhargavan, Jonathan Protzenko, Benjamin Beurdouche
2017 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS '17  
The F * source code is verified for side-channel mitigations, memory safety, and functional correctness with respect to succinct high-level specifications derived from the standard specification for each  ...  HACL * is a new verified cryptographic library that implements popular modern cryptographic primitives such as the ChaCha20 and Salsa20 encryption algorithms, Poly1305 and HMAC authentication, SHA-256  ...  Verified Vectorized ChaCha20 The ChaCha20 stream cipher was designed by D. Bernstein [14] and standardized as an IETF RFC [1] .  ... 
doi:10.1145/3133956.3134043 dblp:conf/ccs/ZinzindohoueBPB17 fatcat:wjkvswbkhnbshosolqpgbwrify

EverCrypt: A Fast, Verified, Cross-Platform Cryptographic Provider

Jonathan Protzenko, Bryan Parno, Aymeric Fromherz, Chris Hawblitzel, Marina Polubelova, Karthikeyan Bhargavan, Benjamin Beurdouche, Joonwon Choi, Antoine Delignat-Lavaud, Cedric Fournet, Natalia Kulatova, Tahina Ramananandro (+4 others)
2020 2020 IEEE Symposium on Security and Privacy (SP)  
N00014-18-1-2892, and a grant from the Alfred P. Sloan Foundation. Work at Inria was funded by ERC grant agreement number 683032 -CIRCUS.  ...  OpenSSL (targeted) 64kB Chacha20 Poly1305 XII.  ...  We write an implementation of QUIC key derivation that is proved memory safe and correct with respect to this specification.  ... 
doi:10.1109/sp40000.2020.00114 dblp:conf/sp/ProtzenkoPFHPBB20 fatcat:zbxp4jsbrrdfldn3kiqpceimhu

Dronecrypt - An Efficient Cryptographic Framework for Small Aerial Drones

Muslum Ozgur Ozmen, Attila A. Yavuz
2018 MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM)  
(iii) We implemented standard counterparts and our proposed techniques on an actual small aerial drone (Crazyflie 2.0), and provided an in-depth energy analysis.  ...  (i) We create (to the best of our knowledge) the first optimized public key infrastructure (PKI) based framework for small aerial drones, which provides energy efficient techniques by harnessing special  ...  Then, she generates encryption and MAC keys from this shared secret with a pre-determined key derivation function.  ... 
doi:10.1109/milcom.2018.8599784 dblp:conf/milcom/OzmenY18 fatcat:naoylei57fexnncsn5ofqbku54

Rethinking the Weakness of Stream Ciphers and Its Application to Encrypted Malware Detection

William Stone, Daeyoung Kim, Victor Youdom Kemmoe, Mingon Kang, Junggab Son
2020 IEEE Access  
secure-tunneled communications by targeted memory extraction.  ...  message and key both be derived from the same set of literary characters [1] .  ... 
doi:10.1109/access.2020.3030559 fatcat:igrunm33wbdaxdkir7hlinwi7a
« Previous Showing results 1 — 15 out of 59 results