CryptoDB
Thomas Shrimpton
Publications
Year
Venue
Title
2024
RWC
Compact Frequency Estimators in Adversarial Environments
Abstract
Count-Min Sketch (CMS) and HeavyKeeper (HK) are two realizations of a compact frequency estimator (CFE). These probabilistic data structures maintain a compact summary of high-volume streaming data and provide approximate estimates of the number of times an element occurred. CFEs are commonly used in streaming settings to identify elements with the largest frequencies (i.e., top-K elements, heavy hitters, elephant flows). Finding extreme elements is important for network planning, network monitoring, recommendation systems, etc. Traditionally, probabilistic guarantees on the accuracy of frequency estimates are proved under the implicit assumption that stream elements do not depend upon the internal randomness of the structure. This assumption is often not well-matched with reality; malicious actors could be incentivized to manipulate the data stream.
In this talk, we reveal vulnerabilities in CMS and HK to adaptive attacks, by presenting attacks that cause significant estimation errors. For instance, elements never seen in the stream can be manipulated to resemble heavy hitters in CMS. This could, for example, cause network flow monitoring systems relying on CFEs to identify non-existent or benign flows as possible threats. Conversely, HK can make legitimate heavy hitters disappear.
We analyze our attacks analytically and experimentally, obtaining a tight agreement between the two. These negative results seem unavoidable for (at least) sketch-based CFEs with parameters that are reasonable in practice. On the positive side, we build a new CFE (Count-Keeper) that can be seen as a composition of the CMS and HK structures. Count-Keeper estimates are typically more accurate (by at least a factor of two) than CMS for “honest” streams. Further, our attacks against CMS and HK are less effective (and more resource intensive) when used against Count-Keeper. Lastly, Count-Keeper has a native ability to flag estimates that are suspicious, which neither CMS or HK (or any other CFE, to our knowledge) admits.
2020
CRYPTO
Quantifying the Security Cost of Migrating Protocols to Practice
📺
Abstract
We give a framework for relating the quantitative, concrete security of a "reference'' protocol (say, one appearing in an academic paper) to that of some derived, "real'' protocol (say, appearing in a cryptographic standard). It is based on the indifferentiability framework of Maurer, Renner, and Holenstein (MRH), whose application has been exclusively focused upon non-interactive cryptographic primitives, e.g., hash functions and Feistel networks. Our extension of MRH is supported by a clearly defined execution model, and two composition lemmata, all formalized in a modern pseudocode language. Together, these allow for precise statements about game-based security properties of cryptographic objects (interactive or not) at various levels of abstraction, As a real-world application, we design and prove tight security bounds for a potential TLS 1.3 extension that integrates the SPAKE2 password-authenticated key-exchange into the existing handshake. (This is a problem of current interest to the IETF.)
2019
CRYPTO
Security in the Presence of Key Reuse: Context-Separable Interfaces and Their Applications
📺
Abstract
Key separation is often difficult to enforce in practice. While key reuse can be catastrophic for security, we know of a number of cryptographic schemes for which it is provably safe. But existing formal models, such as the notions of joint security (Haber-Pinkas, CCS ’01) and agility (Acar et al., EUROCRYPT ’10), do not address the full range of key-reuse attacks—in particular, those that break the abstraction of the scheme, or exploit protocol interactions at a higher level of abstraction. This work attends to these vectors by focusing on two key elements: the game that codifies the scheme under attack, as well as its intended adversarial model; and the underlying interface that exposes secret key operations for use by the game. Our main security experiment considers the implications of using an interface (in practice, the API of a software library or a hardware platform such as TPM) to realize the scheme specified by the game when the interface is shared with other unspecified, insecure, or even malicious applications. After building up a definitional framework, we apply it to the analysis of two real-world schemes: the EdDSA signature algorithm and the Noise protocol framework. Both provide some degree of context separability, a design pattern for interfaces and their applications that aids in the deployment of secure protocols.
Service
- Eurocrypt 2025 Program committee
- Crypto 2022 Program chair
- RWC 2022 Program committee
- RWC 2021 Contributed talks chair
- RWC 2021 Program chair
- Crypto 2020 Program committee
- RWC 2020 Scholarship secretary
- Crypto 2019 Program committee
- RWC 2019 Program committee
- RWC 2018 Program committee
- FSE 2017 Program committee
- RWC 2017 Program committee
- Eurocrypt 2016 Program committee
- FSE 2016 Program committee
- RWC 2016 Program committee
- FSE 2015 Program committee
- RWC 2015 Program committee
- Crypto 2014 Program committee
- RWC 2014 Organizer
- Asiacrypt 2013 Program committee
- RWC 2013 Organizer
- Crypto 2012 Program committee
- Crypto 2011 General chair
- Eurocrypt 2011 Program committee
- PKC 2011 Program committee
- Asiacrypt 2010 Program committee
- IACR Board: Crypto general chair 2010 - 2011
- Eurocrypt 2009 Program committee
- Crypto 2008 Program committee
- IACR Board: Secretary 2008 - 2010
Coauthors
- Elena Andreeva (1)
- John Black (4)
- Alexandra Boldyreva (1)
- Martin Cochran (2)
- Yevgeniy Dodis (1)
- Mia Filić (1)
- Marc Fischlin (1)
- Markus Jakobsson (2)
- Will Landecker (1)
- Anja Lehmann (1)
- Philip D. MacKenzie (2)
- Sam A. Markelon (1)
- Chanathip Namprempre (1)
- Gregory Neven (1)
- Onur Özen (1)
- Kenneth G. Paterson (1)
- Christopher Patton (3)
- Bart Preneel (1)
- Thomas Ristenpart (5)
- Phillip Rogaway (5)
- Hovav Shacham (1)
- Thomas Shrimpton (26)
- Martijn Stam (4)
- R. Seth Terashima (4)
- Stefano Tessaro (1)
- Bogdan Warinschi (1)