TY - GEN
T1 - A progress report on subliminal-free channels
AU - Burmester, Mike
AU - Desraedt, Yvo G.
AU - Itoh, Toshiya
AU - Sakurai, Kouichi
AU - Shizuya, Hiroki
AU - Yung, Moti
N1 - Publisher Copyright:
© Springer-Verlag Berlin Heidelberg 1996.
PY - 1996
Y1 - 1996
N2 - Subliminal channels are closely related to covert channelsand are used to hide secret information. They abuse the communications resource. Subliminal channels can be introduced in many cryptographicsystems, and exploit the inherent randomness of the systems. For example, secret information can be hidden in the randomness of the authenticators of an authentication system. Similarly secret information can be hidden in the randomness (of the prover or verifier) of both zeroknowledge proof systems and signature systems. To establish a subliminal channel the cryptosystem is abused, that is, used in a different way and for a different purpose than intended by its designer. A particularly obnoxious type of subliminal channel may be activated by abortive halting. For state-of-the-art security, it may be desirable to detect, and if possible prevent, subliminal channels. In this paper we address the problem of whether it is possible to develop (and if so, how) appropriate techniquesfor detecting or preventing the use of such channels. Several such techniques have already been proposed in the literature, and are suitable for many systems. We review these. We also consider recent developments, in particular with regards to the formal security requirements and their impact on research.
AB - Subliminal channels are closely related to covert channelsand are used to hide secret information. They abuse the communications resource. Subliminal channels can be introduced in many cryptographicsystems, and exploit the inherent randomness of the systems. For example, secret information can be hidden in the randomness of the authenticators of an authentication system. Similarly secret information can be hidden in the randomness (of the prover or verifier) of both zeroknowledge proof systems and signature systems. To establish a subliminal channel the cryptosystem is abused, that is, used in a different way and for a different purpose than intended by its designer. A particularly obnoxious type of subliminal channel may be activated by abortive halting. For state-of-the-art security, it may be desirable to detect, and if possible prevent, subliminal channels. In this paper we address the problem of whether it is possible to develop (and if so, how) appropriate techniquesfor detecting or preventing the use of such channels. Several such techniques have already been proposed in the literature, and are suitable for many systems. We review these. We also consider recent developments, in particular with regards to the formal security requirements and their impact on research.
UR - http://www.scopus.com/inward/record.url?scp=84955564237&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84955564237&partnerID=8YFLogxK
U2 - 10.1007/3-540-61996-8_39
DO - 10.1007/3-540-61996-8_39
M3 - Conference contribution
AN - SCOPUS:84955564237
SN - 9783540619963
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 157
EP - 168
BT - Information Hiding - 1st International Workshop, Proceedings
A2 - Anderson, Ross
PB - Springer Verlag
T2 - 1st International Workshop on Information Hiding, 1996
Y2 - 30 May 1996 through 1 June 1996
ER -