cryptographic reverse firewalls · • kleptography and cryptovirology - young and yung 1996 •...
TRANSCRIPT
![Page 1: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/1.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Cryptographic Reverse Firewalls
Yevgeniy Dodis (NYU) Ilya Mironov (Google)
Noah Stephens-Davidowitz (NYU)
![Page 2: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/2.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Act I: Cryptography
in Crisis
![Page 3: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/3.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Classical Crypto
![Page 4: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/4.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Classical Crypto
![Page 5: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/5.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Classical Crypto
![Page 6: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/6.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Classical Crypto
![Page 7: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/7.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Classical Crypto
![Page 8: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/8.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Classical Crypto
![Page 9: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/9.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Classical Crypto
![Page 10: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/10.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Classical Crypto
![Page 11: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/11.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Classical Crypto
![Page 12: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/12.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Classical Crypto
![Page 13: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/13.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Classical Crypto
![Page 14: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/14.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Classical Crypto
![Page 15: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/15.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Classical Crypto
![Page 16: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/16.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Classical Crypto
![Page 17: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/17.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Classical Crypto
![Page 18: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/18.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Classical Crypto
Alice’s Trusty Computer!
![Page 19: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/19.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Should Alice Trust Her Computer?
![Page 20: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/20.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Should Alice Trust Her Computer?
![Page 21: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/21.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Should Alice Trust Her Computer?
![Page 22: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/22.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Should Alice Trust Her Computer?
(xkcd.com)
![Page 23: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/23.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Widespread Deliberate Corruption of Hardware and Software
![Page 24: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/24.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
“The%SIGINT%Enabling%Project%[$250M/year%program]%
acBvely%engages%the%US%and%foreign%IT%industries%to%
covertly%influence%and/or%overtly%leverage%their%
commercial%products’%designs.%These%design%changes%
make%the%systems%in%quesBon%exploitable%…%with%
foreknowledge%of%the%modificaBon.%To%the%consumer%
and%other%adversaries,%however,%the%systems’%security%
remain%intact.”%
%%Excerpt%from%the%N.S.A.’s%2013%budget%request%
%%The%New%York%Times,%September%5,%2013%
%
Widespread Deliberate Corruption of Hardware and Software
![Page 25: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/25.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Cryptographers have agreed not to accept this
The membership of the IACR repudiates mass surveillance and the undermining of cryptographic solutions and standards. Population-wide surveillance threatens democracy and human dignity. We call for expediting research and deployment of effective techniques to protect personal privacy against governmental and corporate overreach.
IACR Copenhagen ResolutionEurocrypt 2014, Copenhagen
![Page 26: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/26.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Widespread, (Apparently) Accidental Bugs in Cryptographic Software
![Page 27: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/27.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Widespread, (Apparently) Accidental Bugs in Cryptographic Software
![Page 28: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/28.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Widespread, (Apparently) Accidental Bugs in Cryptographic Software
![Page 29: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/29.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Widespread, (Apparently) Accidental Bugs in Cryptographic Software
![Page 30: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/30.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Widespread, (Apparently) Accidental Bugs in Cryptographic Software
![Page 31: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/31.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Widespread, (Apparently) Accidental Bugs in Cryptographic Software
![Page 32: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/32.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Widespread, (Apparently) Accidental Bugs in Cryptographic Software
![Page 33: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/33.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Widespread, (Apparently) Accidental Bugs in Cryptographic Software
![Page 34: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/34.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Crypto in the Real World?
![Page 35: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/35.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Crypto in the Real World?
![Page 36: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/36.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Crypto in the Real World?
![Page 37: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/37.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Crypto in the Real World?
![Page 38: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/38.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Crypto in the Real World?
iHEARTdogs&CAT$
![Page 39: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/39.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Crypto in the Real World?
iHEARTdogs&CAT$
4117-8289-1856
![Page 40: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/40.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Crypto in the Real World?
iHEARTdogs&CAT$
4117-8289-1856
![Page 41: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/41.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Can we possibly do crypto on a compromised machine?
![Page 42: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/42.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Prior Work
![Page 43: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/43.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Prior Work• Subliminal channels
![Page 44: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/44.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Prior Work• Subliminal channels
- Simmons 1984, …
![Page 45: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/45.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Prior Work• Subliminal channels
- Simmons 1984, …• Divertible protocols
![Page 46: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/46.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Prior Work• Subliminal channels
- Simmons 1984, …• Divertible protocols
- Blaze, Bleumer, Strauss 1998
![Page 47: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/47.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Prior Work• Subliminal channels
- Simmons 1984, …• Divertible protocols
- Blaze, Bleumer, Strauss 1998• Limited security against limited forms of corruption
![Page 48: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/48.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Prior Work• Subliminal channels
- Simmons 1984, …• Divertible protocols
- Blaze, Bleumer, Strauss 1998• Limited security against limited forms of corruption• Only synchronous protocols
![Page 49: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/49.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Prior Work• Subliminal channels
- Simmons 1984, …• Divertible protocols
- Blaze, Bleumer, Strauss 1998• Limited security against limited forms of corruption• Only synchronous protocols
• Kleptography and cryptovirology
![Page 50: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/50.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Prior Work• Subliminal channels
- Simmons 1984, …• Divertible protocols
- Blaze, Bleumer, Strauss 1998• Limited security against limited forms of corruption• Only synchronous protocols
• Kleptography and cryptovirology- Young and Yung 1996
![Page 51: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/51.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Prior Work• Subliminal channels
- Simmons 1984, …• Divertible protocols
- Blaze, Bleumer, Strauss 1998• Limited security against limited forms of corruption• Only synchronous protocols
• Kleptography and cryptovirology- Young and Yung 1996
• Algorithm Substitution Attacks
![Page 52: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/52.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Prior Work• Subliminal channels
- Simmons 1984, …• Divertible protocols
- Blaze, Bleumer, Strauss 1998• Limited security against limited forms of corruption• Only synchronous protocols
• Kleptography and cryptovirology- Young and Yung 1996
• Algorithm Substitution Attacks- Bellare, Paterson, Rogaway 2014
![Page 53: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/53.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Prior Work• Subliminal channels
- Simmons 1984, …• Divertible protocols
- Blaze, Bleumer, Strauss 1998• Limited security against limited forms of corruption• Only synchronous protocols
• Kleptography and cryptovirology- Young and Yung 1996
• Algorithm Substitution Attacks- Bellare, Paterson, Rogaway 2014
• Symmetric-key encryption
![Page 54: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/54.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Prior Work• Subliminal channels
- Simmons 1984, …• Divertible protocols
- Blaze, Bleumer, Strauss 1998• Limited security against limited forms of corruption• Only synchronous protocols
• Kleptography and cryptovirology- Young and Yung 1996
• Algorithm Substitution Attacks- Bellare, Paterson, Rogaway 2014
• Symmetric-key encryption• Limited forms of corruption
![Page 55: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/55.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Prior Work• Subliminal channels
- Simmons 1984, …• Divertible protocols
- Blaze, Bleumer, Strauss 1998• Limited security against limited forms of corruption• Only synchronous protocols
• Kleptography and cryptovirology- Young and Yung 1996
• Algorithm Substitution Attacks- Bellare, Paterson, Rogaway 2014
• Symmetric-key encryption• Limited forms of corruption
- Bellare and Hoang 2015
![Page 56: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/56.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Prior Work• Subliminal channels
- Simmons 1984, …• Divertible protocols
- Blaze, Bleumer, Strauss 1998• Limited security against limited forms of corruption• Only synchronous protocols
• Kleptography and cryptovirology- Young and Yung 1996
• Algorithm Substitution Attacks- Bellare, Paterson, Rogaway 2014
• Symmetric-key encryption• Limited forms of corruption
- Bellare and Hoang 2015• Deterministic PKE
![Page 57: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/57.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Prior Work• Subliminal channels
- Simmons 1984, …• Divertible protocols
- Blaze, Bleumer, Strauss 1998• Limited security against limited forms of corruption• Only synchronous protocols
• Kleptography and cryptovirology- Young and Yung 1996
• Algorithm Substitution Attacks- Bellare, Paterson, Rogaway 2014
• Symmetric-key encryption• Limited forms of corruption
- Bellare and Hoang 2015• Deterministic PKE• Limited forms of corruption
![Page 58: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/58.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Prior Work• Subliminal channels
- Simmons 1984, …• Divertible protocols
- Blaze, Bleumer, Strauss 1998• Limited security against limited forms of corruption• Only synchronous protocols
• Kleptography and cryptovirology- Young and Yung 1996
• Algorithm Substitution Attacks- Bellare, Paterson, Rogaway 2014
• Symmetric-key encryption• Limited forms of corruption
- Bellare and Hoang 2015• Deterministic PKE• Limited forms of corruption
• Backdoored PRGs
![Page 59: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/59.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Prior Work• Subliminal channels
- Simmons 1984, …• Divertible protocols
- Blaze, Bleumer, Strauss 1998• Limited security against limited forms of corruption• Only synchronous protocols
• Kleptography and cryptovirology- Young and Yung 1996
• Algorithm Substitution Attacks- Bellare, Paterson, Rogaway 2014
• Symmetric-key encryption• Limited forms of corruption
- Bellare and Hoang 2015• Deterministic PKE• Limited forms of corruption
• Backdoored PRGs- Dodis, Ganesh, Golovnev, Juels, and Ristenpart 2015
![Page 60: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/60.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Prior Work• Subliminal channels
- Simmons 1984, …• Divertible protocols
- Blaze, Bleumer, Strauss 1998• Limited security against limited forms of corruption• Only synchronous protocols
• Kleptography and cryptovirology- Young and Yung 1996
• Algorithm Substitution Attacks- Bellare, Paterson, Rogaway 2014
• Symmetric-key encryption• Limited forms of corruption
- Bellare and Hoang 2015• Deterministic PKE• Limited forms of corruption
• Backdoored PRGs- Dodis, Ganesh, Golovnev, Juels, and Ristenpart 2015
Impossibility results in strongest models
![Page 61: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/61.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Prior Work• Subliminal channels
- Simmons 1984, …• Divertible protocols
- Blaze, Bleumer, Strauss 1998• Limited security against limited forms of corruption• Only synchronous protocols
• Kleptography and cryptovirology- Young and Yung 1996
• Algorithm Substitution Attacks- Bellare, Paterson, Rogaway 2014
• Symmetric-key encryption• Limited forms of corruption
- Bellare and Hoang 2015• Deterministic PKE• Limited forms of corruption
• Backdoored PRGs- Dodis, Ganesh, Golovnev, Juels, and Ristenpart 2015
Impossibility results in strongest models
We generalize these models and show a way around the impossibility results.
![Page 62: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/62.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Act II….
![Page 63: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/63.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Reverse Firewalls!
![Page 64: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/64.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Reverse Firewalls!• Firewall sits between Alice’s computer and the outside world
![Page 65: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/65.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Reverse Firewalls!• Firewall sits between Alice’s computer and the outside world
![Page 66: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/66.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Reverse Firewalls!• Firewall sits between Alice’s computer and the outside world
![Page 67: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/67.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Reverse Firewalls!• Firewall sits between Alice’s computer and the outside world
![Page 68: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/68.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Reverse Firewalls!• Firewall sits between Alice’s computer and the outside world• Modifies the messages that Alice sends and receives.
![Page 69: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/69.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Reverse Firewalls!• Firewall sits between Alice’s computer and the outside world• Modifies the messages that Alice sends and receives.
![Page 70: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/70.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Reverse Firewalls!• Firewall sits between Alice’s computer and the outside world• Modifies the messages that Alice sends and receives.
![Page 71: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/71.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Reverse Firewalls!• Firewall sits between Alice’s computer and the outside world• Modifies the messages that Alice sends and receives.
![Page 72: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/72.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Reverse Firewalls!• Firewall sits between Alice’s computer and the outside world• Modifies the messages that Alice sends and receives.
![Page 73: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/73.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Reverse Firewalls!• Firewall sits between Alice’s computer and the outside world• Modifies the messages that Alice sends and receives.
![Page 74: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/74.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Reverse Firewalls!• Firewall sits between Alice’s computer and the outside world• Modifies the messages that Alice sends and receives.• Transparent to legitimate traffic.
![Page 75: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/75.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Reverse Firewalls!• Firewall sits between Alice’s computer and the outside world• Modifies the messages that Alice sends and receives.• Transparent to legitimate traffic.
- Certainly doesn’t break functionality.
![Page 76: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/76.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Reverse Firewalls!• Firewall sits between Alice’s computer and the outside world• Modifies the messages that Alice sends and receives.• Transparent to legitimate traffic.
- Certainly doesn’t break functionality.• Shares no secrets with Alice.
![Page 77: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/77.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Reverse Firewalls!• Firewall sits between Alice’s computer and the outside world• Modifies the messages that Alice sends and receives.• Transparent to legitimate traffic.
- Certainly doesn’t break functionality.• Shares no secrets with Alice.
- We don’t trust the firewall.
![Page 78: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/78.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Reverse Firewalls!• Firewall sits between Alice’s computer and the outside world• Modifies the messages that Alice sends and receives.• Transparent to legitimate traffic.
- Certainly doesn’t break functionality.• Shares no secrets with Alice.
- We don’t trust the firewall.• “Improves security!”
![Page 79: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/79.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Reverse Firewall Functionality
![Page 80: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/80.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Reverse Firewall Functionality
Underlying classical protocol has some functionality.
![Page 81: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/81.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Reverse Firewall Functionality
Underlying classical protocol has some functionality.
![Page 82: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/82.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Reverse Firewall Functionality
Underlying classical protocol has some functionality.
![Page 83: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/83.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Reverse Firewall Functionality
Underlying classical protocol has some functionality.
Protocol with firewall has same functionality.
![Page 84: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/84.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Reverse Firewall Functionality
Underlying classical protocol has some functionality.
Protocol with firewall has same functionality.
![Page 85: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/85.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Reverse Firewall Functionality
Underlying classical protocol has some functionality.
Protocol with firewall has same functionality.
![Page 86: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/86.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Reverse Firewall Security
![Page 87: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/87.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Reverse Firewall SecurityUnderlying protocol satisfies some security notion.
![Page 88: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/88.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Reverse Firewall SecurityUnderlying protocol satisfies some security notion.
![Page 89: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/89.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Reverse Firewall Security
Protocol with firewall satisfies the same security notion for any efficient corrupt implementation of Alice.
Underlying protocol satisfies some security notion.
![Page 90: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/90.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Reverse Firewall Security
Protocol with firewall satisfies the same security notion for any efficient corrupt implementation of Alice.
Underlying protocol satisfies some security notion.
![Page 91: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/91.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Reverse Firewall Security
Protocol with firewall satisfies the same security notion for any efficient corrupt implementation of Alice.
Underlying protocol satisfies some security notion.
![Page 92: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/92.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Reverse Firewall Security
Protocol with firewall satisfies the same security notion for any efficient corrupt implementation of Alice.
Underlying protocol satisfies some security notion.
Note: We require that the protocol is functional and secure without the reverse firewall when Alice’s
implementation is not corrupted.
![Page 93: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/93.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Functionality Maintaining Corruption
![Page 94: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/94.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Functionality Maintaining Corruption
A corrupted implementation of Alice is functionality maintaining if the protocol is still functional when Alice is replaced by .
![Page 95: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/95.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Functionality Maintaining Corruption
A corrupted implementation of Alice is functionality maintaining if the protocol is still functional when Alice is replaced by .
![Page 96: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/96.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Functionality Maintaining Corruption
A corrupted implementation of Alice is functionality maintaining if the protocol is still functional when Alice is replaced by .
![Page 97: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/97.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Functionality Maintaining Corruption
A corrupted implementation of Alice is functionality maintaining if the protocol is still functional when Alice is replaced by .
(This is much more general than honest-but-curious adversaries, undetectable corruption, steganographic attacks, etc.)
![Page 98: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/98.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Functionality Maintaining Corruption
A corrupted implementation of Alice is functionality maintaining if the protocol is still functional when Alice is replaced by .
(This is much more general than honest-but-curious adversaries, undetectable corruption, steganographic attacks, etc.)
![Page 99: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/99.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Simple Example: Semantically Secure PKE
![Page 100: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/100.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Simple Example: Semantically Secure PKE
Let (Enc, Dec, Rerand) be a rerandomizable PKE scheme such that Dec(Rerand(Enc(m))) = m and Rerand(C) Enc(0)
for any C.
![Page 101: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/101.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Simple Example: Semantically Secure PKE
Let (Enc, Dec, Rerand) be a rerandomizable PKE scheme such that Dec(Rerand(Enc(m))) = m and Rerand(C) Enc(0)
for any C.
Underlying protocol:
![Page 102: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/102.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Simple Example: Semantically Secure PKE
Let (Enc, Dec, Rerand) be a rerandomizable PKE scheme such that Dec(Rerand(Enc(m))) = m and Rerand(C) Enc(0)
for any C.
Underlying protocol:
![Page 103: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/103.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Simple Example: Semantically Secure PKE
Let (Enc, Dec, Rerand) be a rerandomizable PKE scheme such that Dec(Rerand(Enc(m))) = m and Rerand(C) Enc(0)
for any C.
Underlying protocol:
Firewall:
![Page 104: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/104.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Simple Example: Semantically Secure PKE
Let (Enc, Dec, Rerand) be a rerandomizable PKE scheme such that Dec(Rerand(Enc(m))) = m and Rerand(C) Enc(0)
for any C.
Underlying protocol:
Firewall:
![Page 105: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/105.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Simple Example: Semantically Secure PKE
Let (Enc, Dec, Rerand) be a rerandomizable PKE scheme such that Dec(Rerand(Enc(m))) = m and Rerand(C) Enc(0)
for any C.
Underlying protocol:
Firewall:
Functionality:
![Page 106: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/106.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Simple Example: Semantically Secure PKE
Let (Enc, Dec, Rerand) be a rerandomizable PKE scheme such that Dec(Rerand(Enc(m))) = m and Rerand(C) Enc(0)
for any C.
Underlying protocol:
Firewall:
Functionality:• Is the protocol functional without the firewall?
![Page 107: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/107.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Simple Example: Semantically Secure PKE
Let (Enc, Dec, Rerand) be a rerandomizable PKE scheme such that Dec(Rerand(Enc(m))) = m and Rerand(C) Enc(0)
for any C.
Underlying protocol:
Firewall:
Functionality:• Is the protocol functional without the firewall?
![Page 108: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/108.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Simple Example: Semantically Secure PKE
Let (Enc, Dec, Rerand) be a rerandomizable PKE scheme such that Dec(Rerand(Enc(m))) = m and Rerand(C) Enc(0)
for any C.
Underlying protocol:
Firewall:
Functionality:• Is the protocol functional without the firewall?• Is the protocol functional with the firewall?
![Page 109: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/109.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Simple Example: Semantically Secure PKE
Let (Enc, Dec, Rerand) be a rerandomizable PKE scheme such that Dec(Rerand(Enc(m))) = m and Rerand(C) Enc(0)
for any C.
Underlying protocol:
Firewall:
Functionality:• Is the protocol functional without the firewall?• Is the protocol functional with the firewall?
![Page 110: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/110.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Simple Example: Semantically Secure PKE
Let (Enc, Dec, Rerand) be a rerandomizable PKE scheme such that Dec(Rerand(Enc(m))) = m and Rerand(C) Enc(0)
for any C.
Underlying protocol:
Firewall:
Functionality:• Is the protocol functional without the firewall?• Is the protocol functional with the firewall?
Security:
![Page 111: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/111.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Simple Example: Semantically Secure PKE
Let (Enc, Dec, Rerand) be a rerandomizable PKE scheme such that Dec(Rerand(Enc(m))) = m and Rerand(C) Enc(0)
for any C.
Underlying protocol:
Firewall:
Functionality:• Is the protocol functional without the firewall?• Is the protocol functional with the firewall?
Security:• Is the protocol semantically secure without firewall?
![Page 112: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/112.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Simple Example: Semantically Secure PKE
Let (Enc, Dec, Rerand) be a rerandomizable PKE scheme such that Dec(Rerand(Enc(m))) = m and Rerand(C) Enc(0)
for any C.
Underlying protocol:
Firewall:
Functionality:• Is the protocol functional without the firewall?• Is the protocol functional with the firewall?
Security:• Is the protocol semantically secure without firewall?
![Page 113: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/113.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Simple Example: Semantically Secure PKE
Let (Enc, Dec, Rerand) be a rerandomizable PKE scheme such that Dec(Rerand(Enc(m))) = m and Rerand(C) Enc(0)
for any C.
Underlying protocol:
Firewall:
Functionality:• Is the protocol functional without the firewall?• Is the protocol functional with the firewall?
Security:• Is the protocol semantically secure without firewall?• Is the protocol with the firewall semantically secure
regardless of how behaves?
![Page 114: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/114.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Simple Example: Semantically Secure PKE
Let (Enc, Dec, Rerand) be a rerandomizable PKE scheme such that Dec(Rerand(Enc(m))) = m and Rerand(C) Enc(0)
for any C.
Underlying protocol:
Firewall:
Functionality:• Is the protocol functional without the firewall?• Is the protocol functional with the firewall?
Security:• Is the protocol semantically secure without firewall?• Is the protocol with the firewall semantically secure
regardless of how behaves?
![Page 115: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/115.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
What if the firewall is corrupt?
![Page 116: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/116.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
What if the firewall is corrupt?1) Honest Alice. Corrupt firewall.
![Page 117: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/117.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
What if the firewall is corrupt?1) Honest Alice. Corrupt firewall.
![Page 118: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/118.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
What if the firewall is corrupt?1) Honest Alice. Corrupt firewall.
(Security of the underlying protocol.)
![Page 119: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/119.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
What if the firewall is corrupt?1) Honest Alice. Corrupt firewall.
(Security of the underlying protocol.)
2) Corrupt Alice. Honest firewall.
![Page 120: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/120.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
What if the firewall is corrupt?1) Honest Alice. Corrupt firewall.
(Security of the underlying protocol.)
2) Corrupt Alice. Honest firewall.
![Page 121: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/121.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
What if the firewall is corrupt?1) Honest Alice. Corrupt firewall.
(Security of the underlying protocol.)
2) Corrupt Alice. Honest firewall.
(Security of firewall.)
![Page 122: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/122.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
What if the firewall is corrupt?1) Honest Alice. Corrupt firewall.
(Security of the underlying protocol.)
2) Corrupt Alice. Honest firewall.
(Security of firewall.)
3) Corrupt Alice. Corrupt firewall.
![Page 123: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/123.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
What if the firewall is corrupt?1) Honest Alice. Corrupt firewall.
(Security of the underlying protocol.)
2) Corrupt Alice. Honest firewall.
(Security of firewall.)
3) Corrupt Alice. Corrupt firewall.
![Page 124: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/124.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
What if the firewall is corrupt?1) Honest Alice. Corrupt firewall.
(Security of the underlying protocol.)
2) Corrupt Alice. Honest firewall.
(Security of firewall.)
3) Corrupt Alice. Corrupt firewall.
(The whole world is corrupt….)
![Page 125: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/125.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
What can we instantiate in this crazy model?
![Page 126: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/126.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Primitives with Reverse Firewalls
![Page 127: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/127.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Primitives with Reverse Firewalls
• [Mironov, S ‘15]
![Page 128: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/128.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Primitives with Reverse Firewalls
• [Mironov, S ‘15]- Oblivious transfer
![Page 129: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/129.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Primitives with Reverse Firewalls
• [Mironov, S ‘15]- Oblivious transfer- Secure function evaluation
![Page 130: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/130.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Primitives with Reverse Firewalls
• [Mironov, S ‘15]- Oblivious transfer- Secure function evaluation- “Exfiltration resistance” for arbitrary protocols
![Page 131: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/131.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Primitives with Reverse Firewalls
• [Mironov, S ‘15]- Oblivious transfer- Secure function evaluation- “Exfiltration resistance” for arbitrary protocols
• [Dodis, Mironov, S ‘15]
![Page 132: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/132.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Primitives with Reverse Firewalls
• [Mironov, S ‘15]- Oblivious transfer- Secure function evaluation- “Exfiltration resistance” for arbitrary protocols
• [Dodis, Mironov, S ‘15]- Message transmission in many different contexts
![Page 133: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/133.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Primitives with Reverse Firewalls
• [Mironov, S ‘15]- Oblivious transfer- Secure function evaluation- “Exfiltration resistance” for arbitrary protocols
• [Dodis, Mironov, S ‘15]- Message transmission in many different contexts- Efficient CCA-secure scheme
![Page 134: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/134.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Primitives with Reverse Firewalls
• [Mironov, S ‘15]- Oblivious transfer- Secure function evaluation- “Exfiltration resistance” for arbitrary protocols
• [Dodis, Mironov, S ‘15]- Message transmission in many different contexts- Efficient CCA-secure scheme
• [Ateniese, Magri, Venturi ‘15]
![Page 135: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/135.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Primitives with Reverse Firewalls
• [Mironov, S ‘15]- Oblivious transfer- Secure function evaluation- “Exfiltration resistance” for arbitrary protocols
• [Dodis, Mironov, S ‘15]- Message transmission in many different contexts- Efficient CCA-secure scheme
• [Ateniese, Magri, Venturi ‘15]- Signatures
![Page 136: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/136.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Act III: Message-Transmission
Protocols
![Page 137: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/137.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Message-Transmission Protocols
![Page 138: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/138.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Message-Transmission Protocols
![Page 139: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/139.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Message-Transmission Protocols
![Page 140: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/140.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Message-Transmission Protocols
![Page 141: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/141.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Message-Transmission Protocols
MTP
![Page 142: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/142.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Message-Transmission Protocols
MTP
![Page 143: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/143.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Message-Transmission Protocols
MTP
CPA Security: An eavesdropper “cannot learn anything about the plaintext m.”
![Page 144: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/144.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Message-Transmission Protocols
MTP
CPA Security: An eavesdropper “cannot learn anything about the plaintext m.”CCA Security: An active adversary with access to a decryption oracle “cannot learn anything about the plaintext m.”
![Page 145: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/145.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Message-Transmission Protocols
MTP
CPA Security: An eavesdropper “cannot learn anything about the plaintext m.”CCA Security: An active adversary with access to a decryption oracle “cannot learn anything about the plaintext m.”Forward Secrecy: Security holds even if “the adversary gets access to Alice and Bob’s secret keys later.”
![Page 146: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/146.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Classical Message-Transmission Protocols
![Page 147: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/147.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Classical Message-Transmission Protocols
Key Infrastructure Efficient? CCA
Secure?Forward Secret?
![Page 148: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/148.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Classical Message-Transmission Protocols
Key Infrastructure Efficient? CCA
Secure?Forward Secret?
Symmetric-key encryption
Shared Secret Key Yes Yes No
![Page 149: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/149.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Classical Message-Transmission Protocols
Key Infrastructure Efficient? CCA
Secure?Forward Secret?
Symmetric-key encryption
Shared Secret Key Yes Yes No
Public-key encryption
Public-key Infrastructure No Yes No
![Page 150: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/150.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Classical Message-Transmission Protocols
Key Infrastructure Efficient? CCA
Secure?Forward Secret?
Symmetric-key encryption
Shared Secret Key Yes Yes No
Public-key encryption
Public-key Infrastructure No Yes No
Bob sends .Alice encrypts
under . .None No No Yes
![Page 151: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/151.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Classical Message-Transmission Protocols
Key Infrastructure Efficient? CCA
Secure?Forward Secret?
Symmetric-key encryption
Shared Secret Key Yes Yes No
Public-key encryption
Public-key Infrastructure No Yes No
Bob sends .Alice encrypts
under . .None No No Yes
KA + SKE None Yes No Yes
![Page 152: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/152.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Classical Message-Transmission Protocols
Key Infrastructure Efficient? CCA
Secure?Forward Secret?
Symmetric-key encryption
Shared Secret Key Yes Yes No
Public-key encryption
Public-key Infrastructure No Yes No
Bob sends .Alice encrypts
under . .None No No Yes
KA + SKE None Yes No Yes
AKA + SKE Public-key Infrastructure Yes Yes Yes
![Page 153: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/153.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Classical Message-Transmission Protocols
Key Infrastructure Efficient? CCA
Secure?Forward Secret?
Symmetric-key encryption
Shared Secret Key Yes Yes No
Public-key encryption
Public-key Infrastructure No Yes No
Bob sends .Alice encrypts
under . .None No No Yes
KA + SKE None Yes No Yes
AKA + SKE Public-key Infrastructure Yes Yes Yes
All of these results hold with reverse firewalls as well!
![Page 154: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/154.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Composition Theorem (Informal)
KA w/ Firewall +
SKE w/ Firewall =
MTP w/ Firewall
![Page 155: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/155.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Act IV: Key Agreement
![Page 156: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/156.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Key Agreement
![Page 157: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/157.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Key Agreement
![Page 158: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/158.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Key Agreement
![Page 159: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/159.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Key Agreement
![Page 160: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/160.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Key Agreement
![Page 161: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/161.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Key Agreement
![Page 162: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/162.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Key Agreement
![Page 163: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/163.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Key Agreement
![Page 164: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/164.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Key Agreement
![Page 165: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/165.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Key Agreement
![Page 166: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/166.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Key Agreement
![Page 167: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/167.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Key Agreement
![Page 168: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/168.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Key Agreement
![Page 169: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/169.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Key Agreement
![Page 170: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/170.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Authenticated Key Agreement
![Page 171: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/171.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Authenticated Key Agreement
![Page 172: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/172.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Authenticated Key Agreement
![Page 173: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/173.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Authenticated Key Agreement
![Page 174: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/174.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Authenticated Key Agreement
![Page 175: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/175.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Authenticated Key Agreement
![Page 176: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/176.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Authenticated Key Agreement
![Page 177: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/177.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Authenticated Key Agreement
![Page 178: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/178.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Authenticated Key Agreement
![Page 179: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/179.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Authenticated Key Agreement
![Page 180: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/180.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Authenticated Key Agreement
![Page 181: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/181.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Authenticated Key Agreement
![Page 182: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/182.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Authenticated Key Agreement
![Page 183: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/183.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
First Attempt
![Page 184: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/184.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
First Attempt
![Page 185: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/185.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
First Attempt
![Page 186: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/186.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
First Attempt
![Page 187: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/187.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
First Attempt
![Page 188: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/188.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
First Attempt
![Page 189: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/189.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
First Attempt
![Page 190: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/190.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
First Attempt
![Page 191: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/191.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
First Attempt
![Page 192: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/192.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
First Attempt
![Page 193: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/193.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
First Attempt
![Page 194: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/194.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
First Attempt
![Page 195: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/195.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
First Attempt
![Page 196: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/196.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
First Attempt
![Page 197: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/197.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
First Attempt
![Page 198: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/198.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
First Attempt
![Page 199: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/199.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
First Attempt
![Page 200: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/200.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
First Attempt
![Page 201: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/201.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
First Attempt
![Page 202: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/202.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
First Attempt
![Page 203: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/203.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
First Attempt
![Page 204: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/204.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
First Attempt
![Page 205: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/205.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
First Attempt
We’ve agreed to a key without Bob!
![Page 206: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/206.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Smarter Solution
![Page 207: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/207.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Smarter Solution
![Page 208: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/208.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Smarter Solution
![Page 209: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/209.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Smarter Solution
![Page 210: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/210.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Smarter Solution
![Page 211: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/211.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Smarter Solution
![Page 212: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/212.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Smarter Solution
![Page 213: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/213.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Smarter Solution
![Page 214: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/214.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Smarter Solution
![Page 215: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/215.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Smarter Solution
![Page 216: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/216.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Smarter Solution
![Page 217: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/217.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Smarter Solution
![Page 218: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/218.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Smarter Solution
![Page 219: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/219.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Smarter Solution
![Page 220: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/220.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Smarter Solution
![Page 221: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/221.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Smarter Solution
![Page 222: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/222.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Smarter Solution
![Page 223: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/223.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Smarter Solution
![Page 224: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/224.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Smarter Solution
Note: Efficiency compares well with real-world protocols, such as TLS!
![Page 225: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/225.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Additional Issues
![Page 226: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/226.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Additional Issues• Can a corrupt implementation use the signature
to communicate with the adversary ?
![Page 227: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/227.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Additional Issues• Can a corrupt implementation use the signature
to communicate with the adversary ?- (Use unique or rerandomizable signatures as in
[AMV15].)
![Page 228: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/228.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Additional Issues• Can a corrupt implementation use the signature
to communicate with the adversary ?- (Use unique or rerandomizable signatures as in
[AMV15].)• Can Bob have a firewall too?
![Page 229: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/229.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Additional Issues• Can a corrupt implementation use the signature
to communicate with the adversary ?- (Use unique or rerandomizable signatures as in
[AMV15].)• Can Bob have a firewall too?
- Yes!
![Page 230: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/230.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Additional Issues• Can a corrupt implementation use the signature
to communicate with the adversary ?- (Use unique or rerandomizable signatures as in
[AMV15].)• Can Bob have a firewall too?
- Yes!- (All results in [MS15] and [DMS15] have firewalls
for both parties.)
![Page 231: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/231.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Additional Issues• Can a corrupt implementation use the signature
to communicate with the adversary ?- (Use unique or rerandomizable signatures as in
[AMV15].)• Can Bob have a firewall too?
- Yes!- (All results in [MS15] and [DMS15] have firewalls
for both parties.)• Can Alice or Bob leak secrets through the protocols.
![Page 232: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/232.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Additional Issues• Can a corrupt implementation use the signature
to communicate with the adversary ?- (Use unique or rerandomizable signatures as in
[AMV15].)• Can Bob have a firewall too?
- Yes!- (All results in [MS15] and [DMS15] have firewalls
for both parties.)• Can Alice or Bob leak secrets through the protocols.
• No!
![Page 233: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/233.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Additional Issues• Can a corrupt implementation use the signature
to communicate with the adversary ?- (Use unique or rerandomizable signatures as in
[AMV15].)• Can Bob have a firewall too?
- Yes!- (All results in [MS15] and [DMS15] have firewalls
for both parties.)• Can Alice or Bob leak secrets through the protocols.
• No!• (We formalize this in the papers.)
![Page 234: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/234.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Summary
![Page 235: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/235.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Summary• Lots of recent news suggests that we can no longer
trust our computers when security is paramount.
![Page 236: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/236.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Summary• Lots of recent news suggests that we can no longer
trust our computers when security is paramount.• Reverse firewalls provide a framework to guarantee
security of arbitrary cryptographic primitives even on a compromised machine.
![Page 237: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/237.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Summary• Lots of recent news suggests that we can no longer
trust our computers when security is paramount.• Reverse firewalls provide a framework to guarantee
security of arbitrary cryptographic primitives even on a compromised machine.
• Very strong cryptographic primitives can be instantiated in this model.
![Page 238: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/238.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Summary• Lots of recent news suggests that we can no longer
trust our computers when security is paramount.• Reverse firewalls provide a framework to guarantee
security of arbitrary cryptographic primitives even on a compromised machine.
• Very strong cryptographic primitives can be instantiated in this model.
• The (arguably) most important cryptographic primitive, MTP, can be instantiated efficiently in this model.
![Page 239: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/239.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
A Lot of Work to Be Done!
![Page 240: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/240.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
A Lot of Work to Be Done!The space of all known cryptographic primitives
![Page 241: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/241.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
A Lot of Work to Be Done!The space of all known cryptographic primitives
Studied in this context
![Page 242: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/242.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
A Lot of Work to Be Done!The space of all known cryptographic primitives
Studied in this contextNot studied
![Page 243: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/243.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
A Lot of Work to Be Done!The space of all known cryptographic primitives
OT, SFE [MS15]
Studied in this contextNot studied
![Page 244: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/244.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
A Lot of Work to Be Done!The space of all known cryptographic primitives
OT, SFE [MS15]
Studied in this contextNot studied
Message transmission [DMS15]
![Page 245: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/245.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
A Lot of Work to Be Done!The space of all known cryptographic primitives
OT, SFE [MS15]
Studied in this contextNot studied
Message transmission [DMS15]
Signatures [AMV15]
![Page 246: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/246.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
A Lot of Work to Be Done!The space of all known cryptographic primitives
OT, SFE [MS15]
MPC
Studied in this contextNot studied
Message transmission [DMS15]
Signatures [AMV15]
![Page 247: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/247.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
A Lot of Work to Be Done!The space of all known cryptographic primitives
OT, SFE [MS15]
MPC
Studied in this contextNot studied
PIR
Message transmission [DMS15]
Signatures [AMV15]
![Page 248: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/248.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
A Lot of Work to Be Done!The space of all known cryptographic primitives
OT, SFE [MS15]
MPC
Studied in this contextNot studied
PIR
Message transmission [DMS15]
Signatures [AMV15]
Differential privacy
![Page 249: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/249.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
A Lot of Work to Be Done!The space of all known cryptographic primitives
OT, SFE [MS15]
MPCYour favorite primitive!
Studied in this contextNot studied
PIR
Message transmission [DMS15]
Signatures [AMV15]
Differential privacy
![Page 250: Cryptographic Reverse Firewalls · • Kleptography and cryptovirology - Young and Yung 1996 • Algorithm Substitution Attacks - Bellare, Paterson, Rogaway 2014 • Symmetric-key](https://reader033.vdocument.in/reader033/viewer/2022050111/5f48baa7d9814d2e693a7235/html5/thumbnails/250.jpg)
Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz Cryptographic Reverse Firewalls
Thanks!