all InfoSec news
Comments on certain past cryptographic flaws affecting fully encrypted censorship circumvention protocols
Sept. 13, 2023, 6:12 a.m. |
IACR News www.iacr.org
ePrint Report: Comments on certain past cryptographic flaws affecting fully encrypted censorship circumvention protocols
David Fifield
This article presents three retrospective case studies of cryptography-related flaws in censorship circumvention protocols: a decryption oracle in Shadowsocks “stream cipher” methods, non-uniform Elligator public key representatives in obfs4, and a replay-based active distinguishing attack exploiting malleability in VMess. These three protocols come from the family of “fully encrypted” circumvention protocols: their traffic in both directions is indistinguishable from a uniformly random stream of …
article case case studies censorship censorship circumvention cipher comments cryptographic cryptography decryption encrypted eprint report flaws key non oracle protocols public public key replay report shadowsocks stream stream cipher studies
More from www.iacr.org / IACR News
Information-theoretic security with asymmetries
2 days, 13 hours ago |
www.iacr.org
Cryptanalytic Audit of the XHash Sponge Function and its Components
2 days, 13 hours ago |
www.iacr.org
Implementation and Performance Analysis of Homomorphic Signature Schemes
2 days, 13 hours ago |
www.iacr.org
Ipotane: Achieving the Best of All Worlds in Asynchronous BFT
2 days, 13 hours ago |
www.iacr.org
Jobs in InfoSec / Cybersecurity
Social Engineer For Reverse Engineering Exploit Study
@ Independent study | Remote
Security Engineer II- Full stack Java with React
@ JPMorgan Chase & Co. | Hyderabad, Telangana, India
Cybersecurity SecOps
@ GFT Technologies | Mexico City, MX, 11850
Senior Information Security Advisor
@ Sun Life | Sun Life Toronto One York
Contract Special Security Officer (CSSO) - Top Secret Clearance
@ SpaceX | Hawthorne, CA
Early Career Cyber Security Operations Center (SOC) Analyst
@ State Street | Quincy, Massachusetts