Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software

Yevgeniy Dodis, Weiliang Luo, Shouhuai Xu, Moti Yung

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Software-based attacks (e.g., malware) pose a big threat to cryptographic software because they can compromise the associated cryptographic keys in their entirety. In this paper, we investigate key-insulated symmetric key cryptography, which can mitigate the damage caused by repeated attacks against cryptographic software. To illustrate the feasibility of key-insulated symmetric key cryptography, we also report a proof-of-concept implementation in the Kernel-based Virtual Machine (KVM) environment.

Original languageEnglish (US)
Title of host publicationASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security
Pages57-58
Number of pages2
DOIs
StatePublished - Dec 1 2012
Event7th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2012 - Seoul, Korea, Republic of
Duration: May 2 2012May 4 2012

Publication series

NameASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security

Other

Other7th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2012
CountryKorea, Republic of
CitySeoul
Period5/2/125/4/12

    Fingerprint

Keywords

  • Cloud computing
  • Key management
  • Key-insulation

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Safety, Risk, Reliability and Quality

Cite this

Dodis, Y., Luo, W., Xu, S., & Yung, M. (2012). Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software. In ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security (pp. 57-58). (ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security). https://doi.org/10.1145/2414456.2414489