Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hassan Qahur Al Mahri is active.

Publication


Featured researches published by Hassan Qahur Al Mahri.


Proceedings of the Australasian Computer Science Week Multiconference on | 2018

Fault attacks on Tiaoxin-346

Iftekhar Salam; Hassan Qahur Al Mahri; Leonie Simpson; Harry Bartlett; Ed Dawson; Kenneth Koon-Ho Wong

This paper describes two different fault injection attacks on the authenticated encryption stream cipher Tiaoxin-346, a third round candidate in the CAESAR cryptographic competition. The first type of fault injection uses a bit-flipping fault model to conduct a forgery attack. The number of faulty bits required for this forgery attack is twice the number of bit modifications made in the input message. The second type of fault injection uses a random fault model in a differential fault attack to recover the secret key of the cipher. A successful attack can be performed with 36 random multi-byte faults and a computational complexity of 236. This second attack improves on the previous key recovery attack of Dey et. al., as the random fault model we use is more practical than the bit flipping model used in their attack.Ed Dawson


Journal of Mathematical Cryptology | 2018

A fundamental flaw in the ++AE authenticated encryption mode

Hassan Qahur Al Mahri; Leonie Simpson; Harry Bartlett; Ed Dawson; Kenneth Koon-Ho Wong

Abstract In this article, we analyse a block cipher mode of operation for authenticated encryption known as ++AE (plus-plus-AE). We show that this mode has a fundamental flaw: the scheme does not verify the most significant bit of any block in the plaintext message. This flaw can be exploited by choosing a plaintext message and then constructing multiple forged messages in which the most significant bit of certain blocks is flipped. All of these plaintext messages will generate the same authentication tag. This forgery attack is deterministic and guaranteed to pass the ++AE integrity check. The success of the attack is independent of the underlying block cipher, key or public message number. We outline the mathematical proofs for the flaw in the ++AE algorithm. We conclude that ++AE is insecure as an authenticated encryption mode of operation.


Concurrency and Computation: Practice and Experience | 2018

Fault analysis of AEZ: Fault analysis of AEZ

Hassan Qahur Al Mahri; Leonie Simpson; Harry Bartlett; Ed Dawson; Kenneth Koon-Ho Wong

AEZ is a block cipher mode based on AES which uses three 128‐bit keys. The algorithm has been updated several times during the three rounds of the CAESAR cryptographic competition. Cryptanalytic results presented on AEZ to date do not breach its security. This paper describes a fault injection analysis on AEZ. We focus on analysing AEZ v4.2 but also investigate the applicability of these analyses to the recent version AEZ v5. This paper shows that all three 128‐bit keys in AEZ v4.2 can be uniquely retrieved using only three random‐valued single byte fault injections. A similar approach using four fault injections can uniquely recover all three keys of AEZ v5. The feasibility of this fault injection methodology has been proven against AES in previous works.


trust security and privacy in computing and communications | 2017

A Fault-based Attack on AEZ v4.2

Hassan Qahur Al Mahri; Leonie Simpson; Harry Bartlett; Ed Dawson; Kenneth Koon-Ho Wong

This paper investigates differential fault attacks against AEZ v4.2 authenticated encryption scheme. AEZ uses three different 128-bit keys (I, J, L) and can potentially work without a nonce or with a repeated nonce. Under these conditions, this paper identifies the best place to apply differential fault attacks. We exploit the structure of AEZ to minimise the total number of faults required for key recovery. We propose an approach that can reduce the number of fault injections required to retrieve all three AEZ keys, I, J and L, from six to four such that these keys are uniquely determined. As a second step, we further reduce the fault injections to three without reducing the success rate of the key recovery attack. This improvement to differential fault attacks on AEZ makes these attacks more practical. The attacks in this paper are verified experimentally using a generic implementation of AEZ v4.2 developed in C.


australasian conference on information security and privacy | 2017

Fault attacks on XEX mode with application to certain authenticated encryption modes

Hassan Qahur Al Mahri; Leonie Simpson; Harry Bartlett; Ed Dawson; Kenneth Koon-Ho Wong

The XOR-Encrypt-XOR (XEX) block cipher mode was introduced by Rogaway in 2004. XEX mode uses nonce-based secret masks (L) that are distinct for each message. The existence of secret masks in XEX mode prevents the application of conventional fault attack techniques, such as differential fault analysis. This work investigates other types of fault attacks against XEX mode that either eliminate the effect of the secret masks or retrieve their values. Either of these outcomes enables existing fault attack techniques to then be applied to recover the secret key. To estimate the success rate and feasibility, we ran simulations for ciphertext-only fault attacks against 128-bit AES in XEX mode. The paper discusses also the relevance of the proposed fault attacks to certain authenticated encryption modes based on XEX, such as OCB2, OTR, COPA, SHELL and ElmD. Finally, we suggest effective countermeasures to provide resistance to these fault attacks.


Proceedings of the Australasian Computer Science Week Multiconference on | 2016

Forgery attacks on ++AE authenticated encryption mode

Hassan Qahur Al Mahri; Leonie Simpson; Harry Bartlett; Ed Dawson; Kenneth Koon-Ho Wong

In this paper, we analyse a block cipher mode of operation submitted in 2014 to the cryptographic competition for authenticated encryption (CAESAR). This mode is designed by Recacha and called ++AE (plus-plus-ae). We propose a chosen plaintext forgery attack on ++AE that requires only a single chosen message query to allow an attacker to construct multiple forged messages. Our attack is deterministic and guaranteed to pass ++AE integrity check. We demonstrate the forgery attack using 128-bit AES as the underlying block cipher. Hence, ++AE is insecure as an authenticated encryption mode of operation.


International Conference on Applications and Techniques in Information Security | 2016

Tweaking Generic OTR to Avoid Forgery Attacks

Hassan Qahur Al Mahri; Leonie Simpson; Harry Bartlett; Ed Dawson; Kenneth Koon-Ho Wong

This paper considers the security of the Offset Two-Round (OTR) authenticated encryption mode [9] with respect to forgery attacks. The current version of OTR gives a security proof for specific choices of the block size (n) and the primitive polynomial used to construct the finite field \(\mathbb {F}_{2^n}\). Although the OTR construction is generic, the security proof is not. For every choice of finite field the distinctness of masking coefficients must be verified to ensure security. In this paper, we show that some primitive polynomials result in collisions among the masking coefficients used in the current instantiation, from which forgeries can be constructed. We propose a new way to instantiate OTR so that the masking coefficients are distinct in every finite field \(\mathbb {F}_{2^n}\), thus generalising OTR without reducing the security of OTR.


IACR Cryptology ePrint Archive | 2018

Tweaking Generic OTR to Avoid Forgery Attacks.

Hassan Qahur Al Mahri; Leonie Simpson; Harry Bartlett; Ed Dawson; Kenneth Koon-Ho Wong


School of Electrical Engineering & Computer Science; Science & Engineering Faculty | 2017

A fault-based attack on AEZ v4.2

Hassan Qahur Al Mahri; Leonie Simpson; Harry Bartlett; Ed Dawson; Kenneth Koon-Ho Wong


IACR Cryptology ePrint Archive | 2017

Fault Attacks on XEX Mode with Application to certain Authenticated Encryption Modes.

Hassan Qahur Al Mahri; Leonie Simpson; Harry Bartlett; Ed Dawson; Kenneth Koon-Ho Wong

Collaboration


Dive into the Hassan Qahur Al Mahri's collaboration.

Top Co-Authors

Avatar

Ed Dawson

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Harry Bartlett

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Kenneth Koon-Ho Wong

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Leonie Simpson

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Iftekhar Salam

Queensland University of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge