Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Aanchal Malhotra is active.

Publication


Featured researches published by Aanchal Malhotra.


financial cryptography | 2017

The Security of NTP’s Datagram Protocol

Aanchal Malhotra; Matthew Van Gundy; Mayank Varia; Haydn Kennedy; Jonathan Gardner; Sharon Goldberg

For decades, the Network Time Protocol (NTP) has been used to synchronize computer clocks over untrusted network paths. This work takes a new look at the security of NTP’s datagram protocol. We argue that NTP’s datagram protocol in RFC5905 is both underspecified and flawed. The NTP specifications do not sufficiently respect (1) the conflicting security requirements of different NTP modes, and (2) the mechanism NTP uses to prevent off-path attacks. A further problem is that (3) NTP’s control-query interface reveals sensitive information that can be exploited in off-path attacks. We exploit these problems in several attacks that remote attackers can use to maliciously alter a target’s time. We use network scans to find millions of IPs that are vulnerable to our attacks. Finally, we move beyond identifying attacks by developing a cryptographic model and using it to prove the security of a new backwards-compatible client/server protocol for NTP.


international conference on security and cryptography | 2015

Practical IBE secure under CBDH - encrypting without pairing

S. Sree Vivek; S. Sharmila Deva Selvi; Aanchal Malhotra; C. Pandu Rangan

Since the discovery of identity based cryptography, a number of identity based encryption schemes were reported in the literature. Although a few schemes were proposed after its introduction, the first efficient identity based encryption scheme was proposed by Dan Boneh and Matthew K. Franklin in 2001. This encryption scheme uses Weil pairing on elliptic curves during both encryption and decryption process. In this paper, we propose a new identity based encryption scheme and prove its security in the random oracle model. There are two highlighting features in our scheme. First, it does not employ bilinear pairing computation during the encryption process. Second, our scheme does not require full domain hashing, which makes our scheme more practical and efficiently implementable. Moreover, we prove the security of our scheme by reducing it to the well known Computational Bilinear Diffie-Hellman problem. We first prove the security of our scheme in weaker security notion i.e. we prove our scheme to be IND-CPA secure. Then using Fujisaki Okamoto transformation, we convert our scheme to IND-CCA secure version.


network and distributed system security symposium | 2016

Attacking the Network Time Protocol.

Aanchal Malhotra; Isaac E. Cohen; Erik Brakke; Sharon Goldberg


acm special interest group on data communication | 2016

Attacking NTP's Authenticated Broadcast Mode

Aanchal Malhotra; Sharon Goldberg


acm special interest group on data communication | 2015

RPKI vs ROVER: comparing the risks of BGP security solutions

Aanchal Malhotra; Sharon Goldberg


ieee computer security foundations symposium | 2017

A Universally Composable Treatment of Network Time

Ran Canetti; Kyle Hogan; Aanchal Malhotra; Mayank Varia


IACR Cryptology ePrint Archive | 2017

A Universally Composable Treatment of Network Time.

Ran Canetti; Kyle Hogan; Aanchal Malhotra; Mayank Varia


Archive | 2016

Message Authentication Codes for the Network Time Protocol

Aanchal Malhotra; Sharon Goldberg


IACR Cryptology ePrint Archive | 2016

The Security of NTP's Datagram Protocol.

Aanchal Malhotra; Matthew Van Gundy; Mayank Varia; Haydn Kennedy; Jonathan Gardner; Sharon Goldberg


IACR Cryptology ePrint Archive | 2016

Attacking NTP's Authenticated Broadcast Mode.

Aanchal Malhotra; Sharon Goldberg

Collaboration


Dive into the Aanchal Malhotra's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Mayank Varia

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

C. Pandu Rangan

Indian Institute of Technology Madras

View shared research outputs
Top Co-Authors

Avatar

S. Sharmila Deva Selvi

Indian Institute of Technology Madras

View shared research outputs
Researchain Logo
Decentralizing Knowledge