Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software

Yevgeniy Dodis, Weiliang Luo, Shouhuai Xu, Moti Yung

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Software-based attacks (e.g., malware) pose a big threat to cryptographic software because they can compromise the associated cryptographic keys in their entirety. In this paper, we investigate key-insulated symmetric key cryptography, which can mitigate the damage caused by repeated attacks against cryptographic software. To illustrate the feasibility of key-insulated symmetric key cryptography, we also report a proof-of-concept implementation in the Kernel-based Virtual Machine (KVM) environment.

Original languageEnglish (US)
Title of host publicationASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security
Pages57-58
Number of pages2
DOIs
StatePublished - 2012
Event7th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2012 - Seoul, Korea, Republic of
Duration: May 2 2012May 4 2012

Other

Other7th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2012
CountryKorea, Republic of
CitySeoul
Period5/2/125/4/12

Fingerprint

Cryptography
Malware
Virtual machine

Keywords

  • Cloud computing
  • Key management
  • Key-insulation

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Safety, Risk, Reliability and Quality

Cite this

Dodis, Y., Luo, W., Xu, S., & Yung, M. (2012). Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software. In ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security (pp. 57-58) https://doi.org/10.1145/2414456.2414489

Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software. / Dodis, Yevgeniy; Luo, Weiliang; Xu, Shouhuai; Yung, Moti.

ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security. 2012. p. 57-58.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Dodis, Y, Luo, W, Xu, S & Yung, M 2012, Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software. in ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security. pp. 57-58, 7th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2012, Seoul, Korea, Republic of, 5/2/12. https://doi.org/10.1145/2414456.2414489
Dodis Y, Luo W, Xu S, Yung M. Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software. In ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security. 2012. p. 57-58 https://doi.org/10.1145/2414456.2414489
Dodis, Yevgeniy ; Luo, Weiliang ; Xu, Shouhuai ; Yung, Moti. / Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software. ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security. 2012. pp. 57-58
@inproceedings{531056b9228c4ef985a97b48ae93f5bd,
title = "Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software",
abstract = "Software-based attacks (e.g., malware) pose a big threat to cryptographic software because they can compromise the associated cryptographic keys in their entirety. In this paper, we investigate key-insulated symmetric key cryptography, which can mitigate the damage caused by repeated attacks against cryptographic software. To illustrate the feasibility of key-insulated symmetric key cryptography, we also report a proof-of-concept implementation in the Kernel-based Virtual Machine (KVM) environment.",
keywords = "Cloud computing, Key management, Key-insulation",
author = "Yevgeniy Dodis and Weiliang Luo and Shouhuai Xu and Moti Yung",
year = "2012",
doi = "10.1145/2414456.2414489",
language = "English (US)",
isbn = "9781450313032",
pages = "57--58",
booktitle = "ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security",

}

TY - GEN

T1 - Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software

AU - Dodis, Yevgeniy

AU - Luo, Weiliang

AU - Xu, Shouhuai

AU - Yung, Moti

PY - 2012

Y1 - 2012

N2 - Software-based attacks (e.g., malware) pose a big threat to cryptographic software because they can compromise the associated cryptographic keys in their entirety. In this paper, we investigate key-insulated symmetric key cryptography, which can mitigate the damage caused by repeated attacks against cryptographic software. To illustrate the feasibility of key-insulated symmetric key cryptography, we also report a proof-of-concept implementation in the Kernel-based Virtual Machine (KVM) environment.

AB - Software-based attacks (e.g., malware) pose a big threat to cryptographic software because they can compromise the associated cryptographic keys in their entirety. In this paper, we investigate key-insulated symmetric key cryptography, which can mitigate the damage caused by repeated attacks against cryptographic software. To illustrate the feasibility of key-insulated symmetric key cryptography, we also report a proof-of-concept implementation in the Kernel-based Virtual Machine (KVM) environment.

KW - Cloud computing

KW - Key management

KW - Key-insulation

UR - http://www.scopus.com/inward/record.url?scp=84871956673&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84871956673&partnerID=8YFLogxK

U2 - 10.1145/2414456.2414489

DO - 10.1145/2414456.2414489

M3 - Conference contribution

AN - SCOPUS:84871956673

SN - 9781450313032

SP - 57

EP - 58

BT - ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security

ER -