Protecting Encrypted Cookies from Compression Side-Channel Attacks
نویسندگان
چکیده
Compression is desirable for network applications as it saves bandwidth; however, when data is compressed before being encrypted, the amount of compression leaks information about the amount of redundancy in the plaintext. This side channel has led to successful CRIME and BREACH attacks on web traffic protected by the Transport Layer Security (TLS) protocol. The general guidance in light of these attacks has been to disable compression, preserving confidentiality but sacrificing bandwidth. In this paper, we examine two techniques—heuristic separation of secrets and fixed-dictionary compression—for enabling compression while protecting high-value secrets, such as cookies, from attack. We model the security offered by these techniques and report on the amount of compressibility that they can achieve. This is the full version of a paper published in the Proceedings of the 19th International Conference on Financial Cryptography and Data Security (FC 2015) in San Juan, Puerto Rico, USA, January 26–30, 2015, organized by the International Financial Cryptography Association in cooperation with IACR.
منابع مشابه
The Weakness Of Winrar Encrypted Archives To Compression Side-channel Attacks
Arthur-Durett, Kristine MS, Purdue University, December 2014. The weakness of WinRAR encrypted archives to compression side-channel attacks. Major Professor: Eugene Spafford. This paper explores the security of WinRAR encrypted archives. Previous works concerning potential attacks against encrypted archives are studied and evaluated for practical implementation. These attacks include passive ac...
متن کاملTHE WEAKNESS OF WINRAR ENCRYPTED ARCHIVES TO COMPRESSION SIDE - CHANNEL ATTACKS A Dissertation
Arthur-Durett, Kristine MS, Purdue University, December 2014. The weakness of WinRAR encrypted archives to compression side-channel attacks. Major Professor: Eugene Spafford. This paper explores the security of WinRAR encrypted archives. Previous works concerning potential attacks against encrypted archives are studied and evaluated for practical implementation. These attacks include passive ac...
متن کاملDefend encryption systems against side- channel attacks
From its ancient origin as a tool for protecting sensitive wartime or espionage-related messages, cryptography has become a foundational building-block for securing the systems, protocols, and infrastructure that underpin our modern interconnected world. But the physical mechanisms used in performing encryption and decryption can leak information, making it possible to bypass this security. Pro...
متن کاملMontgomery Residue Representation Fault-Tolerant Computation in GF(2k)
In this paper, we are concerned with protecting elliptic curve computation in a tamper proof device by protecting finite field computation against active side channel attacks, i.e., fault attacks. We propose residue representation of the field elements for fault tolerant Montgomery residue representation multiplication algorithm, by providing fault models for fault attacks, and countermeasures ...
متن کاملEfficient and Format-Compliant Video Encryption Algorithm in Compressed Domain for H.264/AVC
In this paper, an efficient video encryption scheme is proposed for protecting H.264 bitstream. The issues on the compressed domain video encryption have been pointed out and fully addressed. In the proposed scheme, only the most significant bits for video reconstruction in H.264 bitstream are extracted and encrypted, to optimize the trade-off between security level and computational complexity...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014