blog
August 21, 2008
Today, CRYPTO2008 has finished. I've only attended a few talks, but they all were very interesting. In particular, I've seen:
On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme. A group from Ruhr University Bochum used differential power analysis (a form of side channel) to break the KeeLoq algorithm, which is used, for example, in garage and car door opening devices. They also had a demo, which, unfortunately, didn't work, possibly for the interference of the microphone. In any case, the receiver was beeping like hell all the time :-)
R. Rivest, The MD6 hash function. Ron Rivest gave an overview of his and his team proposal for the upcoming NIST hash function competition. To me, more than the technical aspects (tree hash, large input to the compression function, provably resistant to common differential techniques), it was interesting to see some of the reasoning behind the process of designing a hash function.
A. Shamir, How to Solve it: New Techniques in Algebraic Cryptanalysis. Adi Shamir presented a new attack that applies when bits of the output of a stream cipher can be expressed as a polynomial of the key and input with sufficiently low degree (~16). I didn't follow all the details, but it sounded very cool (and the crowd seemed to agree). This will be remembered either as "the cube attack" or as "the paper that was rejected at AsiaCrypto".
The Rump Session was, as usual, a lot of fun, with many laugh-out-loud
presentations. DJ Bernstein kept everybody surprisingly on time, with the
help, when necessary, of a big, intimidating, and noisy air gun! I left after
the KeeLoq group went on stage singing and dancing on exotic tunes to present
their COPACOBANA project...
Check out the slides for the session
here.
To leave a comment, complete the form below. Mandatory fields are marked *.