Keynotes

Last updated on May 15, 2024
 

Cryptographic Applications of the ANS Compression

 

 

 

 

 

 

 

 

Speaker: Josef Pieprzyk

Affiliations: Institute of Computer Science,

Polish Academy of Sciences,

Warsaw, Poland

and Data61, CSIRO,

Sydney, Australia

Date: Monday, 16.09.2024

 

Abstract: The talk explores possible applications of ANS in Cryptography. It presents the ANS algorithms and their properties that can be useful for security sensitive applications. The ANS with randomised states can be seen as the basic cryptographic tool that can be used to convert uniformly random sequences into an arbitrary probability distribution calibrated by appropriate selection of symbol spreads. The talk presents two generic joint compression and encryption (also called compcrypt). The first uses the sponge structure and the second follows the CBC mode. Security of the compcrypt algorithm is discussed. The main take away is that both the linear and differential analysis become less effective due to fact that the adversary needs to guess lengths of ANS encoding.

 

Short Biography: Dr Josef Pieprzyk is a Senior Principal Research Scientist at Data61, CSIRO, Sydney, Australia and a Professor at Institute of Computer Science, Polish Academy of Sciences, Warsaw, Poland. His main research interest focus is Cryptology and Information Security and includes design and analysis of cryptographic algorithms (such as encryption, hashing and digital signatures), secure multiparty computations, cryptographic protocols, copyright protection, e-commerce, web security and cybercrime prevention. Dr Pieprzyk published 5 books, edited 11 books (conference proceedings), 6 book chapters, and more than 300 papers in refereed journals and refereed international conferences.


Stegomalware: basics, development trends

and detection opportunities

 

 

 

 

 

 

 

 

 

Speaker: Wojciech Mazurczyk
Affiliation: Warsaw University of Technology,

Warsaw, Poland

https://dblp.org/pid/91/874.html

http://mazurczyk.com/
Date: Tuesday, 17.09.2024

 

Abstract: Information hiding techniques are currently increasingly utilized by threat actors to elude countermeasures and prevent reversing the attack chain. Such methods are gaining popularity among attackers as they want to cloak their malicious actions from defensive systems and stay undetected for as long as possible. Currently, cybercriminals apply data hiding schemes, for example, to make their communication with the compromised machine stealthily, secretly download additional malicious components/tools, or exfiltrate confidential data. Unfortunately, detection and mitigation of threats taking advantage of information hiding pose many new challenges for digital forensics analysts, academics, law enforcement agencies, and security professionals.

During this keynote talk, the main types of data hiding techniques used by real-life malware (a.k.a. stegomalware) will be presented, and potential future development trends will be highlighted. Moreover, the main challenges that the current countermeasures face will be outlined, and the recent and novel approaches to thwart such threats will be discussed.

Keynotes

Last updated on May 15, 2024
 

Cryptographic Applications of the ANS Compression

 

Speaker: Josef Pieprzyk

Affiliations: Institute

of Computer Science,

Polish Academy of Sciences,

Warsaw, Poland

and Data61, CSIRO,

Sydney, Australia

Date: Monday, 16.09.2024

 

 

 

Abstract: The talk explores possible applications of ANS in Cryptography. It presents the ANS algorithms and their properties that can be useful for security sensitive applications. The ANS with randomised states can be seen as the basic cryptographic tool that can be used to convert uniformly random sequences into an arbitrary probability distribution calibrated by appropriate selection of symbol spreads. The talk presents two generic joint compression and encryption (also called compcrypt). The first uses the sponge structure and the second follows the CBC mode. Security of the compcrypt algorithm is discussed. The main take away is that both the linear and differential analysis become less effective due to fact that the adversary needs to guess lengths of ANS encoding.

 

Short Biography: Dr Josef Pieprzyk is a Senior Principal Research Scientist at Data61, CSIRO, Sydney, Australia and a Professor at Institute of Computer Science, Polish Academy of Sciences, Warsaw, Poland. His main research interest focus is Cryptology and Information Security and includes design and analysis of cryptographic algorithms (such as encryption, hashing and digital signatures), secure multiparty computations, cryptographic protocols, copyright protection, e-commerce, web security and cybercrime prevention. Dr Pieprzyk published 5 books, edited 11 books (conference proceedings), 6 book chapters, and more than 300 papers in refereed journals and refereed international conferences.


Stegomalware: basics, development trends

and detection opportunities

 

Speaker: Wojciech Mazurczyk
Affiliation: Warsaw University

of Technology, Warsaw, Poland

https://dblp.org/pid/91/874.html

http://mazurczyk.com/
Date: Tuesday, 17.09.2024

 

Abstract: Information hiding techniques are currently increasingly utilized by threat actors to elude countermeasures and prevent reversing the attack chain. Such methods are gaining popularity among attackers as they want to cloak their malicious actions from defensive systems and stay undetected for as long as possible. Currently, cybercriminals apply data hiding schemes, for example, to make their communication with the compromised machine stealthily, secretly download additional malicious components/tools, or exfiltrate confidential data. Unfortunately, detection and mitigation of threats taking advantage of information hiding pose many new challenges for digital forensics analysts, academics, law enforcement agencies, and security professionals.

During this keynote talk, the main types of data hiding techniques used by real-life malware (a.k.a. stegomalware) will be presented, and potential future development trends will be highlighted. Moreover, the main challenges that the current countermeasures face will be outlined, and the recent and novel approaches to thwart such threats will be discussed.

Keynotes

Last updated on May 15, 2024
 

Cryptographic Applications of the ANS Compression

 

Speaker: Josef Pieprzyk

Affiliations: Institute of Computer Science,

Polish Academy of Sciences,

Warsaw, Poland

and Data61, CSIRO,

Sydney, Australia

Date: Monday, 16.09.2024

 

 

Abstract: The talk explores possible applications of ANS in Cryptography. It presents the ANS algorithms and their properties that can be useful for security sensitive applications. The ANS with randomised states can be seen as the basic cryptographic tool that can be used to convert uniformly random sequences into an arbitrary probability distribution calibrated by appropriate selection of symbol spreads. The talk presents two generic joint compression and encryption (also called compcrypt). The first uses the sponge structure and the second follows the CBC mode. Security of the compcrypt algorithm is discussed. The main take away is that both the linear and differential analysis become less effective due to fact that the adversary needs to guess lengths of ANS encoding.

 

Short Biography: Dr Josef Pieprzyk is a Senior Principal Research Scientist at Data61, CSIRO, Sydney, Australia and a Professor at Institute of Computer Science, Polish Academy of Sciences, Warsaw, Poland. His main research interest focus is Cryptology and Information Security and includes design and analysis of cryptographic algorithms (such as encryption, hashing and digital signatures), secure multiparty computations, cryptographic protocols, copyright protection, e-commerce, web security and cybercrime prevention. Dr Pieprzyk published 5 books, edited 11 books (conference proceedings), 6 book chapters, and more than 300 papers in refereed journals and refereed international conferences.


Stegomalware: basics, development trends

and detection opportunities

 

Speaker: Wojciech Mazurczyk
Affiliation: Warsaw University of Technology,

Warsaw, Poland

https://dblp.org/pid/91/874.html

http://mazurczyk.com/
Date: Tuesday, 17.09.2024

 

Abstract: Information hiding techniques are currently increasingly utilized by threat actors to elude countermeasures and prevent reversing the attack chain. Such methods are gaining popularity among attackers as they want to cloak their malicious actions from defensive systems and stay undetected for as long as possible. Currently, cybercriminals apply data hiding schemes, for example, to make their communication with the compromised machine stealthily, secretly download additional malicious components/tools, or exfiltrate confidential data. Unfortunately, detection and mitigation of threats taking advantage of information hiding pose many new challenges for digital forensics analysts, academics, law enforcement agencies, and security professionals.

During this keynote talk, the main types of data hiding techniques used by real-life malware (a.k.a. stegomalware) will be presented, and potential future development trends will be highlighted. Moreover, the main challenges that the current countermeasures face will be outlined, and the recent and novel approaches to thwart such threats will be discussed.

Keynotes

Last updated on June 18, 2024
 

Cryptographic Applications of the ANS Compression

 

Speaker: Josef Pieprzyk
Affiliations: Institute of Computer Science,

Polish Academy of Sciences,

Warsaw, Poland

and Data61, CSIRO,

Sydney, Australia

Date: Monday, 16.09.2024

 

Abstract: The talk explores possible applications of ANS in Cryptography. It presents the ANS algorithms and their properties that can be useful for security sensitive applications. The ANS with randomised states can be seen as the basic cryptographic tool that can be used to convert uniformly random sequences into an arbitrary probability distribution calibrated by appropriate selection of symbol spreads. The talk presents two generic joint compression and encryption (also called compcrypt). The first uses the sponge structure and the second follows the CBC mode. Security of the compcrypt algorithm is discussed. The main take away is that both the linear and differential analysis become less effective due to fact that the adversary needs to guess lengths of ANS encoding.

 

Short Biography: Dr Josef Pieprzyk is a Senior Principal Research Scientist at Data61, CSIRO, Sydney, Australia and a Professor at Institute of Computer Science, Polish Academy of Sciences, Warsaw, Poland. His main research interest focus is Cryptology and Information Security and includes design and analysis of cryptographic algorithms (such as encryption, hashing and digital signatures), secure multiparty computations, cryptographic protocols, copyright protection, e-commerce, web security and cybercrime prevention. Dr Pieprzyk published 5 books, edited 11 books (conference proceedings), 6 book chapters, and more than 300 papers in refereed journals and refereed international conferences.


Stegomalware: basics, development trends

and detection opportunities

 

Speaker: Wojciech Mazurczyk
Affiliation: Warsaw University of Technology,

Warsaw, Poland

https://dblp.org/pid/91/874.html

http://mazurczyk.com/
Date: Tuesday, 17.09.2024

 

Abstract: Information hiding techniques are currently increasingly utilized by threat actors to elude countermeasures and prevent reversing the attack chain. Such methods are gaining popularity among attackers as they want to cloak their malicious actions from defensive systems and stay undetected for as long as possible. Currently, cybercriminals apply data hiding schemes, for example, to make their communication with the compromised machine stealthily, secretly download additional malicious components/tools, or exfiltrate confidential data. Unfortunately, detection and mitigation of threats taking advantage of information hiding pose many new challenges for digital forensics analysts, academics, law enforcement agencies, and security professionals.

During this keynote talk, the main types of data hiding techniques used by real-life malware (a.k.a. stegomalware) will be presented, and potential future development trends will be highlighted. Moreover, the main challenges that the current countermeasures face will be outlined, and the recent and novel approaches to thwart such threats will be discussed.

General Chairs: michal.choras@pbs.edu.pl (general inquiries)

PC Chairs: esorics2024@telecom-sudparis.eu (submission issues)

Workshops: marek.pawlicki@pbs.edu.pl (workshop-related issues)