Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jean Paul Degabriele is active.

Publication


Featured researches published by Jean Paul Degabriele.


theory and application of cryptographic techniques | 2012

Security of symmetric encryption in the presence of ciphertext fragmentation

Alexandra Boldyreva; Jean Paul Degabriele; Kenneth G. Paterson; Martijn Stam

In recent years, a number of standardized symmetric encryption schemes have fallen foul of attacks exploiting the fact that in some real world scenarios ciphertexts can be delivered in a fragmented fashion. We initiate the first general and formal study of the security of symmetric encryption against such attacks. We extend the SSH-specific work of Paterson and Watson (Eurocrypt 2010) to develop security models for the fragmented setting. We also develop security models to formalize the additional desirable properties of ciphertext boundary hiding and robustness against Denial-of-Service (DoS) attacks for schemes in this setting. We illustrate the utility of each of our models via efficient constructions for schemes using only standard cryptographic components, including constructions that simultaneously achieve confidentiality, ciphertext boundary hiding and DoS robustness.


computer and communications security | 2010

On the (in)security of IPsec in MAC-then-encrypt configurations

Jean Paul Degabriele; Kenneth G. Paterson

IPsec allows a huge amount of flexibility in the ways in which its component cryptographic mechanisms can be combined to build a secure communications service. This may be good for supporting different security requirements but is potentially bad for security. We demonstrate the reality of this by describing efficient, plaintext-recovering attacks against all configurations of IPsec in which integrity protection is applied {\em prior} to encryption -- so-called MAC-then-encrypt configurations. We report on the implementation of our attacks against a specific IPsec implementation, and reflect on the implications of our attacks for real-world IPsec deployments as well as for theoretical cryptography.


ieee symposium on security and privacy | 2007

Attacking the IPsec Standards in Encryption-only Configurations

Jean Paul Degabriele; Kenneth G. Paterson

We describe new attacks which break any RFC- compliant implementation of IPsec making use of encryption-only ESP in tunnel mode. The new attacks are both efficient and realistic: they are ciphertext-only and need only the capability to eavesdrop on ESP-encrypted traffic and to inject traffic into the network. We report on our experiences in applying the attacks to a variety of implementations of IPsec.


the cryptographers track at the rsa conference | 2012

On the joint security of encryption and signature in EMV

Jean Paul Degabriele; Anja Lehmann; Kenneth G. Paterson; Nigel P. Smart; Mario Strefler

We provide an analysis of current and future algorithms for signature and encryption in the EMV standards in the case where a single key-pair is used for both signature and encryption. We give a theoretical attack for EMVs current RSA-based algorithms, showing how access to a partial decryption oracle can be used to forge a signature on a freely chosen message. We show how the attack might be integrated into EMVs CDA protocol flow, enabling an attacker with a wedge device to complete an offline transaction without knowing the cardholders PIN. Finally, the elliptic curve signature and encryption algorithms that are likely to be adopted in a forthcoming version of the EMV standards are analyzed in the single key-pair setting, and shown to be secure.


fast software encryption | 2013

On Symmetric Encryption with Distinguishable Decryption Failures

Alexandra Boldyreva; Jean Paul Degabriele; Kenneth G. Paterson; Martijn Stam

We propose to relax the assumption that decryption failures are indistinguishable in security models for symmetric encryption. Our main purpose is to build models that better reflect the reality of cryptographic implementations, and to surface the security issues that arise from doing so. We systematically explore the consequences of this relaxation, with some surprising consequences for our understanding of this basic cryptographic primitive. Our results should be useful to practitioners who wish to build accurate models of their implementations and then analyse them. They should also be of value to more theoretical cryptographers proposing new encryption schemes, who, in an ideal world, would be compelled by this work to consider the possibility that their schemes might leak more than simple decryption failures.


ieee symposium on security and privacy | 2011

Provable Security in the Real World

Jean Paul Degabriele; Kenneth G. Paterson; Gaven J. Watson

Provable security plays an important role in the design and analysis of systems using cryptography. However, protocols can be vulnerable to attacks outside the scope of the existing formal analyses.


fast software encryption | 2015

A More Cautious Approach to Security Against Mass Surveillance

Jean Paul Degabriele; Pooya Farshim; Bertram Poettering

At CRYPTO 2014 Bellare, Paterson, and Rogaway (BPR) presented a formal treatment of symmetric encryption in the light of algorithm substitution attacks (ASAs), which may be employed by ‘big brother’ entities for the scope of mass surveillance. Roughly speaking, in ASAs big brother may bias ciphertexts to establish a covert channel to leak vital cryptographic information. In this work, we identify a seemingly benign assumption implicit in BPR’s treatment and argue that it artificially (and severely) limits big brother’s capabilities. We then demonstrate the critical role that this assumption plays by showing that even a slight weakening of it renders the security notion completely unsatisfiable by any, possibly deterministic and/or stateful, symmetric encryption scheme. We propose a refined security model to address this shortcoming, and use it to restore the positive result of BPR, but caution that this defense does not stop most other forms of covert-channel attacks.


theory and application of cryptographic techniques | 2018

Untagging Tor: A Formal Treatment of Onion Encryption

Jean Paul Degabriele; Martijn Stam

Tor is a primary tool for maintaining anonymity online. It provides a low-latency, circuit-based, bidirectional secure channel between two parties through a network of onion routers, with the aim of obscuring exactly who is talking to whom, even to adversaries controlling part of the network. Tor relies heavily on cryptographic techniques, yet its onion encryption scheme is susceptible to tagging attacks (Fu and Ling 2009), which allow an active adversary controlling the first and last node of a circuit to deanonymize with near-certainty. This contrasts with less active traffic correlation attacks, where the same adversary can at best deanonymize with high probability. The Tor project has been actively looking to defend against tagging attacks and its most concrete alternative is proposal 261, which specifies a new onion encryption scheme based on a variable-input-length tweakable cipher.


International Journal of Information Security | 2016

Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol

Jean Paul Degabriele; Victoria Fehr; Marc Fischlin; Tommaso Gagliardoni; Felix Günther; Giorgia Azzurra Marson; Arno Mittelbach; Kenneth G. Paterson

The Protocol for Lightweight Authentication of Identity (PLAID) aims at secure and private authentication between a smart card and a terminal. Originally developed by a unit of the Australian Department of Human Services for physical and logical access control, PLAID has now been standardized as an Australian standard AS-5185-2010 and is currently in the fast-track standardization process for ISO/IEC 25185-1. We present a cryptographic evaluation of PLAID. As well as reporting a number of undesirable cryptographic features of the protocol, we show that the privacy properties of PLAID are significantly weaker than claimed: using a variety of techniques, we can fingerprint and then later identify cards. These techniques involve a novel application of standard statistical and data analysis techniques in cryptography. We discuss potential countermeasures to our attacks and comment on our experiences with the standardization process of PLAID.


Springer US | 2014

Fast Sofware Encryption - FSE 2013

Alexandra Boldyreva; Jean Paul Degabriele; Kenneth G. Paterson; Martijn Stam

In this paper, we propose related-key differential distinguishers based on the complementation property of Feistel ciphers. We show that with relaxed requirements on the complementation, i.e. the property does not have to hold for all keys and the complementation does not have to be on all bits, one can obtain a variety of distinguishers. We formulate criteria sufficient for attacks based on the complementation property. To stress the importance of our findings we provide analysis of the full-round primitives: – For the hash mode of Camellia-128 without FL, FL−1 layers, differential multicollisions with 2 time. – For GOST, practical recovery of the full key with 31 related keys and 2 time/data.

Collaboration


Dive into the Jean Paul Degabriele's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Marc Fischlin

Technische Universität Darmstadt

View shared research outputs
Top Co-Authors

Avatar

Alexandra Boldyreva

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Arno Mittelbach

Technische Universität Darmstadt

View shared research outputs
Top Co-Authors

Avatar

Felix Günther

Technische Universität Darmstadt

View shared research outputs
Top Co-Authors

Avatar

Giorgia Azzurra Marson

Technische Universität Darmstadt

View shared research outputs
Top Co-Authors

Avatar

Tommaso Gagliardoni

Technische Universität Darmstadt

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Victoria Fehr

Technische Universität Darmstadt

View shared research outputs
Researchain Logo
Decentralizing Knowledge