Steganography and collusion in cryptographic protocols
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2006.
Main Author: | |
---|---|
Other Authors: | |
Format: | Thesis |
Language: | eng |
Published: |
Massachusetts Institute of Technology
2007
|
Subjects: | |
Online Access: | http://hdl.handle.net/1721.1/38309 |
_version_ | 1826214735023964160 |
---|---|
author | Lepinski, Matthew (Matthew Baker), 1978- |
author2 | Silvio Micali. |
author_facet | Silvio Micali. Lepinski, Matthew (Matthew Baker), 1978- |
author_sort | Lepinski, Matthew (Matthew Baker), 1978- |
collection | MIT |
description | Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2006. |
first_indexed | 2024-09-23T16:10:18Z |
format | Thesis |
id | mit-1721.1/38309 |
institution | Massachusetts Institute of Technology |
language | eng |
last_indexed | 2024-09-23T16:10:18Z |
publishDate | 2007 |
publisher | Massachusetts Institute of Technology |
record_format | dspace |
spelling | mit-1721.1/383092019-04-10T12:50:18Z Steganography and collusion in cryptographic protocols Lepinski, Matthew (Matthew Baker), 1978- Silvio Micali. Massachusetts Institute of Technology. Dept. of Electrical Engineering and Computer Science. Massachusetts Institute of Technology. Dept. of Electrical Engineering and Computer Science. Electrical Engineering and Computer Science. Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2006. Includes bibliographical references (leaves 61-62). Steganography, the hiding of covert messages inside innocuous communication, is an active area of cryptographic research. Recent research has shown that provably undetectable steganography is possible in a wide variety of settings. We believe that the existence of such undetectable steganography will have far reaching implications. In this thesis, we investigate the impact of steganography on the design of cryptographic protocols. In particular, we show that that all existing cryptographic protocols allow malicious players to collude and coordinate their actions by steganographicly hiding covert messages inside legitimate protocol traffic. Such collusion is devastating in many settings, and thus we argue that it's elimination is an important direction for cryptographic research. Defeating such steganographic collusion requires not only new cryptographic protocols, but also a new notion of protocol security. Traditional notions of protocol security attempt to minimize the injuries to privacy and correctness inflicted by malicious participants who collude during run-time. They do not, however, prevent malicious parties from colluding and coordinating their actions in the first place! We therefore put forward the notion of a collusion-free protocol which guarantees that no set of players can use the protocol to maliciously coordinate their actions. (cont.) As should be expected, such a strong notion of security is very difficult to achieve. We show that achieving collusion-free security is impossible in a model with only broadcast communication and that even with physically private communication (e.g. physical envelopes) there are still many ideal functionalities that have no collusion-free protocols. Fortunately, under natural assumptions collusion-free protocols exist for an interesting class of ideal functionalities. Assuming the existence of trapdoor permutations, we construct collusion-free protocols, in a model with both broadcast messages and physical envelopes, for every finite ideal functionality in which all actions are public. by Matthew Lepinski Ph.D. 2007-08-03T18:28:36Z 2007-08-03T18:28:36Z 2006 2006 Thesis http://hdl.handle.net/1721.1/38309 153963597 eng M.I.T. theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. See provided URL for inquiries about permission. http://dspace.mit.edu/handle/1721.1/7582 62 leaves application/pdf Massachusetts Institute of Technology |
spellingShingle | Electrical Engineering and Computer Science. Lepinski, Matthew (Matthew Baker), 1978- Steganography and collusion in cryptographic protocols |
title | Steganography and collusion in cryptographic protocols |
title_full | Steganography and collusion in cryptographic protocols |
title_fullStr | Steganography and collusion in cryptographic protocols |
title_full_unstemmed | Steganography and collusion in cryptographic protocols |
title_short | Steganography and collusion in cryptographic protocols |
title_sort | steganography and collusion in cryptographic protocols |
topic | Electrical Engineering and Computer Science. |
url | http://hdl.handle.net/1721.1/38309 |
work_keys_str_mv | AT lepinskimatthewmatthewbaker1978 steganographyandcollusionincryptographicprotocols |