Search Mailing List Archives


Limit search to: Subject & Body Subject Author
Sort by: Reverse Sort
Limit to: All This Week Last Week This Month Last Month
Select Date Range     through    

[liberationtech] Android KeyStore Vulnerability: which tools are affected?

Nathan of Guardian nathan at guardianproject.info
Tue Jul 19 05:55:33 PDT 2016


None of the Guardian Project apps or libraries rely on KeyStore. We use
our own CacheWord library for key management.

On Tue, Jul 19, 2016, at 07:29 AM, carlo von lynX wrote:
> Which of the popular libtech tools are affected by this paper?
> 
> ///++---- 8< ----
> 
> https://eprint.iacr.org/2016/677/20160706:055348
> 
> 
> Breaking Into the KeyStore: A Practical Forgery Attack Against Android
> KeyStore
> 
> Mohamed Sabt and Jacques Traoré
> 
> Abstract: We analyze the security of Android KeyStore, a system service
> whose purpose is to shield users credentials and cryptographic keys. The
> KeyStore protects the integrity and the confidentiality of keys by using
> a particular encryption scheme. Our main results are twofold. First, we
> formally prove that the used encryption scheme does not provide
> integrity, which means that an attacker is able to undetectably modify
> the stored keys. Second, we exploit this flaw to define a forgery attack
> breaching the security guaranteed by the KeyStore. In particular, our
> attack allows a malicious application to make mobile apps to unwittingly
> perform secure protocols using weak keys. The threat is concrete: the
> attacker goes undetected while compromising the security of users. Our
> findings highlight an important fact: intuition often goes wrong when
> security is concerned. Unfortunately, system designers still tend to
> choose cryptographic schemes not for their proved security but for their
> apparent simplicity. We show, once again, that this is not a good choice,
> since it usually results in severe consequences for the whole underlying
> system.
> 
> Category / Keywords: secret-key cryptography / Android KeyStore,
> authenticated encryption, integrity
> 
> Original Publication (with minor differences): ESORICS 2016
> 
> Date: received 5 Jul 2016
> 
> Contact author: sabt mohamed at gmail com
> 
> Available format(s): PDF | BibTeX Citation
> 
> Version: 20160706:055348 (All versions of this report)
> 
> Short URL: ia.cr/2016/677
> 
> 
> -- 
>   E-mail is public! Talk to me in private using encryption:
>          http://loupsycedyglgamf.onion/LynX/
>           irc://loupsycedyglgamf.onion:67/lynX
>          https://psyced.org:34443/LynX/
> -- 
> Liberationtech is public & archives are searchable on Google. Violations
> of list guidelines will get you moderated:
> https://mailman.stanford.edu/mailman/listinfo/liberationtech.
> Unsubscribe, change to digest, or change password by emailing moderator
> at companys at stanford.edu.


-- 
  Nathan of Guardian
  nathan at guardianproject.info



More information about the liberationtech mailing list