Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software

Yevgeniy Dodis, Weiliang Luo, Shouhuai Xu, Moti Yung

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Software-based attacks (e.g., malware) pose a big threat to cryptographic software because they can compromise the associated cryptographic keys in their entirety. In this paper, we investigate key-insulated symmetric key cryptography, which can mitigate the damage caused by repeated attacks against cryptographic software. To illustrate the feasibility of key-insulated symmetric key cryptography, we also report a proof-of-concept implementation in the Kernel-based Virtual Machine (KVM) environment.

Original languageEnglish (US)
Title of host publicationASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security
Pages57-58
Number of pages2
DOIs
StatePublished - 2012
Event7th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2012 - Seoul, Korea, Republic of
Duration: May 2 2012May 4 2012

Publication series

NameASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security

Other

Other7th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2012
Country/TerritoryKorea, Republic of
CitySeoul
Period5/2/125/4/12

Keywords

  • Cloud computing
  • Key management
  • Key-insulation

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software'. Together they form a unique fingerprint.

Cite this