International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Thomas Shrimpton

Publications

Year
Venue
Title
2024
RWC
Compact Frequency Estimators in Adversarial Environments
Sam A. Markelon Mia Filić Thomas Shrimpton
Count-Min Sketch (CMS) and HeavyKeeper (HK) are two realizations of a compact frequency estimator (CFE). These probabilistic data structures maintain a compact summary of high-volume streaming data and provide approximate estimates of the number of times an element occurred. CFEs are commonly used in streaming settings to identify elements with the largest frequencies (i.e., top-K elements, heavy hitters, elephant flows). Finding extreme elements is important for network planning, network monitoring, recommendation systems, etc. Traditionally, probabilistic guarantees on the accuracy of frequency estimates are proved under the implicit assumption that stream elements do not depend upon the internal randomness of the structure. This assumption is often not well-matched with reality; malicious actors could be incentivized to manipulate the data stream. In this talk, we reveal vulnerabilities in CMS and HK to adaptive attacks, by presenting attacks that cause significant estimation errors. For instance, elements never seen in the stream can be manipulated to resemble heavy hitters in CMS. This could, for example, cause network flow monitoring systems relying on CFEs to identify non-existent or benign flows as possible threats. Conversely, HK can make legitimate heavy hitters disappear. We analyze our attacks analytically and experimentally, obtaining a tight agreement between the two. These negative results seem unavoidable for (at least) sketch-based CFEs with parameters that are reasonable in practice. On the positive side, we build a new CFE (Count-Keeper) that can be seen as a composition of the CMS and HK structures. Count-Keeper estimates are typically more accurate (by at least a factor of two) than CMS for “honest” streams. Further, our attacks against CMS and HK are less effective (and more resource intensive) when used against Count-Keeper. Lastly, Count-Keeper has a native ability to flag estimates that are suspicious, which neither CMS or HK (or any other CFE, to our knowledge) admits.
2020
CRYPTO
Quantifying the Security Cost of Migrating Protocols to Practice 📺
Christopher Patton Thomas Shrimpton
We give a framework for relating the quantitative, concrete security of a "reference'' protocol (say, one appearing in an academic paper) to that of some derived, "real'' protocol (say, appearing in a cryptographic standard). It is based on the indifferentiability framework of Maurer, Renner, and Holenstein (MRH), whose application has been exclusively focused upon non-interactive cryptographic primitives, e.g., hash functions and Feistel networks. Our extension of MRH is supported by a clearly defined execution model, and two composition lemmata, all formalized in a modern pseudocode language. Together, these allow for precise statements about game-based security properties of cryptographic objects (interactive or not) at various levels of abstraction, As a real-world application, we design and prove tight security bounds for a potential TLS 1.3 extension that integrates the SPAKE2 password-authenticated key-exchange into the existing handshake. (This is a problem of current interest to the IETF.)
2019
CRYPTO
Security in the Presence of Key Reuse: Context-Separable Interfaces and Their Applications 📺
Christopher Patton Thomas Shrimpton
Key separation is often difficult to enforce in practice. While key reuse can be catastrophic for security, we know of a number of cryptographic schemes for which it is provably safe. But existing formal models, such as the notions of joint security (Haber-Pinkas, CCS ’01) and agility (Acar et al., EUROCRYPT ’10), do not address the full range of key-reuse attacks—in particular, those that break the abstraction of the scheme, or exploit protocol interactions at a higher level of abstraction. This work attends to these vectors by focusing on two key elements: the game that codifies the scheme under attack, as well as its intended adversarial model; and the underlying interface that exposes secret key operations for use by the game. Our main security experiment considers the implications of using an interface (in practice, the API of a software library or a hardware platform such as TPM) to realize the scheme specified by the game when the interface is shared with other unspecified, insecure, or even malicious applications. After building up a definitional framework, we apply it to the analysis of two real-world schemes: the EdDSA signature algorithm and the Noise protocol framework. Both provide some degree of context separability, a design pattern for interfaces and their applications that aids in the deployment of secure protocols.
2017
CRYPTO
2016
CRYPTO
2016
ASIACRYPT
2015
EUROCRYPT
2014
EUROCRYPT
2013
ASIACRYPT
2012
CRYPTO
2011
EUROCRYPT
2011
ASIACRYPT
2010
JOFC
2010
ASIACRYPT
2010
FSE
2010
FSE
2009
JOFC
2009
EUROCRYPT
2007
ASIACRYPT
2007
ASIACRYPT
2006
EUROCRYPT
2006
JOFC
2005
EUROCRYPT
2004
FSE
2002
CRYPTO
2002
CRYPTO

Service

Eurocrypt 2025 Program committee
Crypto 2022 Program chair
RWC 2022 Program committee
RWC 2021 Contributed talks chair
RWC 2021 Program chair
Crypto 2020 Program committee
RWC 2020 Scholarship secretary
Crypto 2019 Program committee
RWC 2019 Program committee
RWC 2018 Program committee
FSE 2017 Program committee
RWC 2017 Program committee
Eurocrypt 2016 Program committee
FSE 2016 Program committee
RWC 2016 Program committee
FSE 2015 Program committee
RWC 2015 Program committee
Crypto 2014 Program committee
RWC 2014 Organizer
Asiacrypt 2013 Program committee
RWC 2013 Organizer
Crypto 2012 Program committee
Crypto 2011 General chair
Eurocrypt 2011 Program committee
PKC 2011 Program committee
Asiacrypt 2010 Program committee
IACR Board: Crypto general chair 2010 - 2011
Eurocrypt 2009 Program committee
Crypto 2008 Program committee
IACR Board: Secretary 2008 - 2010