Ing. Josef Kokeš, Ph.D.

Publikace

Automatic Detection and Decryption of AES Using Dynamic Analysis

Autoři
Kokeš, J.; Matějka, J.; Lórencz, R.
Rok
2022
Publikováno
SN Computer Science. 2022, 2022 ISSN 2662-995X.
Typ
Článek
Anotace
In this paper we propose a set of algorithms that can automatically detect the use of AES and automatically recover both the encryption key and the plaintext, assuming that we can control the code flow of the encrypting program, e.g., when an application is performing encryption without the user’s permission. The first algorithm makes use of the fact that we can monitor accesses to the AES S-Box and deduce the desired data from these accesses; the approach is suitable to software-based AES implementations, both naïve and optimized. To demonstrate the feasibility of this approach we designed a tool which implements the algorithm for Microsoft Windows running on the Intel x86 architecture. The tool has been successfully tested against a set of applications using different cryptographic libraries and common user applications. We also discuss the options of recovering the same data when hardware-assisted AES implementations on Intel-compatible architectures are used.

Automatic Detection and Decryption of AES by Monitoring S-box Access

Autoři
Kokeš, J.; Matějka, J.; Lórencz, R.
Rok
2021
Publikováno
Proceedings of the 7th International Conference on Information Systems Security and Privacy. Madeira: SciTePress, 2021. p. 172-180. ISSN 2184-4356. ISBN 978-989-758-491-6.
Typ
Stať ve sborníku
Anotace
In this paper we propose an algorithm that can automatically detect the use of AES and automatically recover both the encryption key and the plaintext. It makes use of the fact that we can monitor accesses to the AES S-Box and deduce the desired data from these accesses; the approach is suitable to software-based AES implementations, both naíve and optimized. To demonstrate the feasibility of this approach we designed a tool which implements the algorithm for Microsoft Windows running on the Intel x86 architecture. The tool has been successfully tested against a set of applications using different cryptographic libraries and common user applications.

Linear Cryptanalysis of Baby Rijndael

Rok
2015
Publikováno
The Fourth International Conference on e-Technologies and Networks for Development (ICeND2015). Lodz: Lodz University of Technology, 2015. pp. 28-33. ISBN 978-1-4799-8450-3.
Typ
Stať ve sborníku
Anotace
We present results of linear cryptanalysis of Baby Rijndael, a reduced-size model of Rijndael. The results were obtained using exhaustive search of all approximations and all keys and show some curious properties of both linear cryptanalysis and Baby Rijndael, particularly the existence of different classes of linear approximations with significantly different success rates of recovery of the cipher’s key.

Praktické aspekty lineární kryptoanalýzy blokových šifer

Autoři
Rok
2015
Publikováno
Sborník příspěvků PAD 2015. Zlín: Universita Tomáše Bati ve Zlíně, 2015. pp. 25-30. ISBN 978-80-7454-522-1.
Typ
Stať ve sborníku
Anotace
Při analýze šifry Baby Rijndael jsme narazili na něekolik zvláštností v chování techniky lineární kryptoanalýzy. Zaměřili jsme se na důkladný průzkum těchto vlastností a odhalili dosud nepopsané závislosti mezi výběrem lineárních aproximací a úspěšností odhalení šifrovacího klíče.Ukazujeme, že mezi jednotlivými lineárními aproximacemi panují značné kvalitativní rozdíly, přestože pravděpodobnostní odchylka jednotlivých aproximací je stejná. Podobné rozdíly nalezneme také při aplikaci těchto aproximací na odhalení různých bitů klíče.

Block Ciphers' Resistance to Linear and Differential Cryptanalysis

Autoři
Rok
2014
Publikováno
Sborníik příspěvků PAD 2014. Liberec: TUL, Fakulta mechatroniky a mezioborových inženýrských studií, 2014. pp. 38-43. ISBN 978-80-7494-027-9.
Typ
Stať ve sborníku
Anotace
We discuss the current results of cryptanalysis of the AES, and propose an alternative technique for overcoming the computational problems related to them, which is building a reduced-size model of the cipher and applying the cryptanalysis to that, while gradually increasing the size to get an estimate for the level of scaling of particular cryptographic attacks. Our current results suggest that this is a promising idea, with a potential for further understanding of the conditional security of the cipher. We also present several research directions using this technique, and our dissertation goals.