Question: ( Android Keystore Attack ) Let E : { 0 , 1 } k times { 0 , 1 } n - > {
Android Keystore Attack
Let E : k times n n be a good blockcipher. Let CBCEEncKM denote the encryption of a message M under the CBC mode of blockcipher E under key K and define CBCEDecKC for decryption similarly. For simplicity, assume that here we only deal with fullblock messages. Let H : n be a hash function.
A recent implementation in Android Keystore uses the following authenticated encryption scheme: to encrypt a message M under the key K we output CBCEEncKHM M For decryption, given the key K and ciphertext C we first run CBCEDecKC and parse the result as T M where T n We then output M if T HM and output otherwise. In some sense, its similar to the EncryptwithRedundancy paradigm that we studied and broke in class. However, the main difference here is that the redundancy HM is put at the beginning of the message, instead of at the end.
Show that the Android encryption scheme is insecure by giving an authenticity attack.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
