ASAP: Algorithm Substitution Attacks on Cryptographic Protocols

Sebastian Berndt, Jan Wichelmann, Claudius Pott, Tim-Henrik Traving, Thomas Eisenbarth

Abstract

The security of digital communication relies on few cryptographic protocols that are used to protect internet traffic, from web sessions to instant messaging. These protocols and the cryptographic primitives they rely on have been extensively studied and are considered secure. Yet, sophisticated attackers are often able to bypass rather than break security mechanisms. Kleptography or algorithm substitution attacks (ASA) describe techniques to place backdoors right into cryptographic primitives. While highly relevant as a building block, we show that the real danger of ASAs is their use in cryptographic protocols. In fact, we show that highly desirable security properties of these protocols - forward secrecy and post-compromise security - imply the applicability of ASAs. We then analyze the application of ASAs in three widely used protocols: TLS, WireGuard, and Signal. We show that these protocols can be easily subverted by carefully placing ASAs. Our analysis shows that careful design of ASAs makes detection unlikely while leaking long-term secrets within a few messages in the case of TLS and WireGuard, allowing impersonation attacks. In contrast,Signal's double-ratchet protocol shows higher immunity to ASAs, as the leakage requires much more messages.
OriginalspracheEnglisch
Seiten712-726
Seitenumfang14
PublikationsstatusVeröffentlicht - 2022
VeranstaltungAsia Conference on Computer and Communications - Nagasaki, Japan
Dauer: 30.05.202203.06.2022

Tagung, Konferenz, Kongress

Tagung, Konferenz, KongressAsia Conference on Computer and Communications
KurztitelASIACCS
Land/GebietJapan
Zeitraum30.05.2203.06.22

Zitieren