Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
public:papers:memics2016 [2016-09-02 15:06] mukroppublic:papers:memics2016 [2023-08-12 21:05] (current) xukrop
Line 7: Line 7:
 **Abstract:** //Cryptoprimitives rely on thorough theoretical background, but often lack basic usability features making them prone to unintentional misuse by developers. We argue that this is true even for the state-of-the-art designs. Analyzing 52 candidates of the current CAESAR competition has shown none of them have avalanche effect in authentication tag strong enough to work properly when partially misconfigured. Although not directly decreasing their security profile, this hints at their security usability being less than perfect.// **Abstract:** //Cryptoprimitives rely on thorough theoretical background, but often lack basic usability features making them prone to unintentional misuse by developers. We argue that this is true even for the state-of-the-art designs. Analyzing 52 candidates of the current CAESAR competition has shown none of them have avalanche effect in authentication tag strong enough to work properly when partially misconfigured. Although not directly decreasing their security profile, this hints at their security usability being less than perfect.//
  
-  * Conference page: [[https://www.usenix.org/conference/usenixsecurity16/|Usenix Security 2016]] +  * Conference page: [[http://www.memics.cz/2016/|MEMICS 2016]] 
-  * Download author pre-print of the paper: {{:public:papers:UsenixSec16_1MRSAKeys.pdf|pdf}}  +  * Author pre-print of the paper: {{:public:research:eacirc:papers:2016_memics2.pdf|pre-print pdf}} 
-  * Download extended version of paper: {{:public:papers:UsenixSec16_1MRSAKeys_TRFIMU_201603.pdf|FIMU-RS-2016-03}} (technical report, FI MUNI)  +  * Conference presentation: {{:public:papers:2016_memics_slides.pdf|presentation slides}} 
-  * Download presentation: {{:public:papers:1mrsa_usenix2016_20160812_final.pdf|pdf}} +  * Raw experiment data: [[https://zenodo.org/record/8241962|data on Zenodo]]
-  * Download [[:public:papers:usenix2016#datasets_and_tools |datasets, tools and used scripts]]+
  
-**Bibtex (regular paper):** + 
-   @inproceedings{1mrsa_usenix2016+**Bibtex (regular paper)** 
-     author = {Petr Svenda \and Matus Nemec \and Peter Sekan \and Rudolf Kvasnovsky \and David Formanek \and David Komarek \and Vashek Matyas}, +   @InProceedings{2016-memics-ukrop
-     title = {The Million-Key Question – Investigating the Origins of RSA Public Keys}, +     author = {Martin Ukrop and Petr Svenda},
-     booktitle = {The 25th USENIX Security Symposium (UsenixSec'2016)},+
      year = {2016},      year = {2016},
-     pages = {893--910}, +     title = {Avalanche Effect in Improperly Initialized CAESAR Candidates}, 
-     isbn = {978-1-931971-32-4}, +     editor = {Bouda, Jan and Holík, Lukáš and Kofroň, Jan and Strejček, Jan and Rambousek, Adam}, 
-     publisher = {USENIX+     booktitle = {Proceedings 11th Doctoral Workshop on Mathematical and Engineering Methods in Computer Science, Telč, Czech Republic, 21st-23rd October 2016}, 
-   }+     eventtitle = {MEMICS}, 
 +     eventdate = {October 23--25, 2016}, 
 +     series = {Electronic Proceedings in Theoretical Computer Science}, 
 +     publisher = {Open Publishing Association}, 
 +     volume = {233}, 
 +     pages = {72-81}, 
 +     doi = {10.4204/EPTCS.233.7
 +  }