Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Chris Hall is active.

Publication


Featured researches published by Chris Hall.


Journal of Computer Security | 2000

Side channel cryptanalysis of product ciphers

John Kelsey; Bruce Schneier; David A. Wagner; Chris Hall

Building on the work of Kocher (1996), Jaffe and Yun (1998), we discuss the notion of side-channel cryptanalysisc cryptanalysis using implementation data. We discuss the notion of side-channel attacks and the vulnerabilities they introduce, demonstrate side-channel attacks against three product ciphers - timing attack against IDEA, processor-flag attack against RC5, and Hamming weight attack against DES - and then generalize our research to other cryptosystems.


fast software encryption | 1998

Cryptanalytic Attacks on Pseudorandom Number Generators

John Kelsey; Bruce Schneier; David A. Wagner; Chris Hall

In this paper we discuss PRNGs: the mechanisms used by real-world secure systems to generate cryptographic keys, initialization vectors, random nonces, and other values assumed to be random. We argue that PRNGs are their own unique type of cryptographic primitive, and should be analyzed as such. We propose a model for PRNGs, discuss possible attacks against this model, and demonstrate the applicability of the model (and our attacks) to four real-world PRNGs. We close with a discussion of lessons learned about PRNG design and use, and a few open questions.


european symposium on research in computer security | 1998

Side Channel Cryptanalysis of Product Ciphers

John Kelsey; Bruce Schneier; David A. Wagner; Chris Hall

Building on the work of Kocher [Koc96], we introduce the notion of side-channel cryptanalysis: cryptanalysis using implementation data. We discuss the notion of side-channel attacks and the vulnerabilities they introduce, demonstrate side-channel attacks against three product ciphers—timing attack against IDEA, processor-flag attack against RC5, and Hamming weight attack against DES—and then generalize our research to other cryptosystems.


ISW '97 Proceedings of the First International Workshop on Information Security | 1997

Secure Applications of Low-Entropy Keys

John Kelsey; Bruce Schneier; Chris Hall; David A. Wagner

We introduce the notion of key stretching, a mechanism to convert short s-bit keys into longer keys, such that the complexity required to brute-force search a s + t-bit keyspace is the same as the time required to brute-force search a s-bit key stretched by t bits.


international conference on information and communication security | 1999

Reaction Attacks against several Public-Key Cryptosystems

Chris Hall; Ian Goldberg; Bruce Schneider

We present attacks against the McEliece Public-Key Cryptosystem, the Atjai-Dwork Public-Key Cryptosystem, and variants of those systems. Most of these systems base their security on the apparent intractibility of one or more problems. The attacks we present do not violate the intractibility of the underlying problems, but instead obtain information about the private key or plaintext by watching the reaction of someone decrypting a given ciphertext with the private key. In the case of the McEliece system we must repeat the attack for each ciphertext we wish to decrypt, whereas for the Ajtai-Dwork system we are able to recover the private key.


annual computer security applications conference | 1997

Remote electronic gambling

Chris Hall; Bruce Schneier

We examine the problem of putting a casino on the Internet. We discuss fairly generating random bits and permutations for use in casino games, protecting against player/player and player/dealer collusions, and ensuring a secure audit trail that both the player and dealer can use to ensure the payment of debts. We conclude with a series of open problems.


annual computer security applications conference | 1996

An authenticated camera

John Kelsey; Bruce Schneier; Chris Hall

We develop protocols for an authenticated camera that allows people to verify that a given digital image was taken by a specific camera at a specific time and specific place. These protocols require interaction between the camera and base station both before and after a series of images are taken.


selected areas in cryptography | 1998

On the Twofish Key Schedule

Bruce Schneier; John Kelsey; Doug Whiting; David A. Wagner; Chris Hall

Twofish is a new block cipher with a 128 bit block, and a key length of 128, 192, or 256 bits, which has been submitted as an AES candidate. In this paper, we briefly review the structure of Twofish, and then discuss the key schedule of Twofish, and its resistance to attack. We close with some open questions on the security of Twofishs key schedule.


annual computer security applications conference | 1997

An improved e-mail security protocol

Bruce Schneier; Chris Hall

Current e-mail security systems base their security on the secrecy of the long-term private key. If this private key is ever compromised, an attacker can decrypt any messages-past, present or future-encrypted with the corresponding public key. The system described in this paper uses short-term private-key/public-key key pairs to reduce the magnitude of this vulnerability.


Archive | 1999

The Twofish encryption algorithm: a 128-bit block cipher

Bruce Schneier; John Kelsey; Doug Whiting; David A. Wagner; Chris Hall; Niels Ferguson

Collaboration


Dive into the Chris Hall's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

John Kelsey

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Niels Ferguson

University of California

View shared research outputs
Top Co-Authors

Avatar

Randy Milbert

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge