2022

Key Rapping at Asiacrypt 2022

Matilda Backendal is presenting her work on Puncturable Key Wrapping at Asiacrypt. Her video abstract features the Applied Cryptography group engaged in "key rapping" - check it out! external pagehttps://youtu.be/yh45UpVQjYA?t=199. Credits for the video to Kien, our rapper!

5.12.2022

Kenny awarded the Golden Owl

We are proud to announce that the Golden Owl 2022 for the Department of Computer Science was awarded to our Professor Kenny Paterson. The Owl is awarded by VSETH, ETH's student association, for outstanding teaching.

Our group is honoured by the students' feedback, and we take the occasion to renew our commitment to excellence in teaching.

21.11.2022

Kien Tuong Truong joins the Applied Cryptography Group as a doctoral student on 15 November 2022. Kien completed his Master's in Cyber Security at ETH and, after a thesis in our lab on the security of Swiss messaging applications, he will work on the analysis of other real-world cryptographic protocols. His interests concern attacks and cryptographic vulnerabilities "in the wild".

15.11.2022

Enlarged view: ACM CCS22 Distinguished Paper Award

Applied Crypto Group wins Distinguished Paper Award at ACM CCS 2022

The paper “Victory by KO: Attacking OpenPGP Using Key Overwriting" by Lara Bruseghini (ETH Zurich & Proton AG), Daniel Huigens (Proton AG) and Kenny Paterson (ETH Zurich) won a distinguished paper award at ACM CCS 2022 this week. The annual conference is one of the top four security conferences and was held in Los Angeles this year, where Lara accepted the award on behalf of the team. The paper has already had a substantial impact on the use of OpenPGP in practice: multiple libraries have updated their code and the OpenPGP standard under development at the IETF now includes the countermeasures recommended in the paper. In addition, the “key overwriting” or “KO” attack vector is proving to be very useful in the group’s follow-up work on cloud storage systems. To read more about the paper, please visit external pagehttps://www.kopenpgp.com/

11.11.2022

Security Standardisation Research Conference 2023

The external pageSecurity Standardisation Research Conference 2023 is co-organized by our group member Felix Günther and Julia Hesse (IBM Research Zurich). It will take place 22-23 April 2023 in Lyon, France, co-located with the external pageEurocrypt conference. SSR 2023 invites research, SoK, and vision papers on all aspects of security standardisation research; submission deadline is 5 January 2023, for full details see the external pageCall for Papers.

7.11.2022

Mia Filić and Anu Unnikrishnan at Stanford Security Seminar

Mia and Anu will present their work on Probabilistic Data Structures in adversarial settings at the Stanford Security Seminar this Friday.

The presentation is available over Zoom: external pagehttps://cs.stanford.edu/events/security-seminar-adversarial-correctness-and-privacy-probabilistic-data-structures-mia-filic

4.11.2022

Massimiliano Taverna joins the Applied Cryptography Group as a scientific assistant on 7 November 2022. After a Master’s in Cyber Security at ETH and a thesis in our lab about practical attacks on blockchains, he will extend his thesis research during his two-month stay in our group. His interests concern Web3, with the goal of enhancing its security, as well as multiple areas of applied cryptography.

31.10.2022

Shannon Veitch joins the Applied Cryptography Group as a doctoral student on 1 November 2022. Shannon did her Master’s in Computer Science at the University of Waterloo in the CrySP Lab. Her work focused on secret sharing schemes and secure multi-party computation. She is interested in applying cryptography to the design and development of privacy enhancing technologies.

25.10.2022

Last week, the paper “An Efficient Query Recovery Attack Against a Graph Encryption Scheme” was awarded the Best Student Paper Award at ESORICS 2022. The paper is joint work with Francesca Falzon, a former visitor of the Applied Crypto group and current PhD student at the University of Chicago, and Kenny Paterson. The paper presents the first leakage abuse attack against a scheme that supports private shortest path queries on graphs, and it achieves this by extending a classical algorithm for the tree isomorphism problem. Read more at https://www.research-collection.ethz.ch/handle/20.500.11850/564478.

10.10.2022

Congratulations Felix!

On 1 September 2022, Felix Günther was promoted to Oberassistent. We wish him every success in his role as a senior researcher and look forward to continuing working with him.

1.9.2022

Fernando Virdia joins Intel Research

Fernando has reached the end of his postdoctoral studies in the group, but will continue to do awesome post-quantum cryptography research for Intel!
As we well know, a straight line is not the shortest path between a postdoc and tenure -- we all look forward to welcoming Fernando back in academia soon.

22.8.2022
 

PDS in Adversarial Environments @CCS

Four of our members, Mia Filić, Kenneth G. Paterson, Anu Unnikrishnan, and Fernando Virdia, have been exploring probabilistic data structures, such as Bloom and Cuckoo filters. The paper summary of their findings titled “Probabilistic Data Structures in Adversarial Environments” has been accepted to external pageACM CCS 2022.

28.7.2022

Patrick Towa joins Aztec Network

We are proud to announce that Patrick has completed his postdoctoral studies at the Applied Cryptography group, and will continue his journey as a Cryptography Researcher at Aztec Network - a leading technology company in zero-knowledge SNARKs development and privacy for the Ethereum blockchain. Patrick focused his recent work on efficient anonymous communication, and post-quantum key exchanges.

To his fellows, Patrick leaves the following words: “Trees that are slow to grow bear the best fruit.” Patrick, we will miss you!

22.7.2022

Flagbot, ETH's capture-the-flag academic team, qualifies for DEF CON CTF 2022.

ETH students and alumni played together with EPFL's CTF team under the umbrella team "Organizers". After a very successful season, during which Organizers was consistently on the leaderboard of various top CTFs and managed to defend the #1 place on ctftime.org's global scoreboard, the DEF CON Qualifiers was still a harsh battle to fight, with endless reverse engineering challenges and binary exploitation combined with cryptography. Organizers nevertheless managed to secure a place for the prestigious DEF CON Finals, and is among the 16 teams invited to play in person in Las Vegas in August, for the second year in a row.

27.6.2022

The paper “MEGA – Malleable Encryption Goes Awry” by Matilda Backendal, Miro Haller and Kenny Paterson from the Applied Crypto Group was accepted to the IEEE Symposium on Security & Privacy 2023. MEGA is a cloud-based storage system with 250 million users worldwide, storing more than 1000 Petabytes of data. The team uncovered five significant cryptographic vulnerabilities in the MEGA system. These were disclosed to MEGA in March 2022 and some of them were patched in June. The work received media attention from Ars Technica, Hacker News, The Register, and more. Further details, including the paper itself, can be found at: external pagehttps://mega-awry.io.

27.6.2022

Our paper external page"Rethinking Searchable Symmetric Encryption" authored by Zichen Gui, Sikhar Patranbis and Kenny Paterson from the Applied Crypto Group has been accepted to external pageIEEE S&P 2023!

In the paper, we set out to show that a major change of direction is needed in searchable symmetric encryption (SSE) research. We point out that the literature, by and large, has only considered an adversarial model against a subcomponent of an overall SSE system, namely the "encrypted index". And most of the constructions focused on building "encrypted indices".

However, a "full" SSE system also includes document retrieval and that component is not protected by most of the SSE schemes in the literature. In the paper, we show how leakage from document retrieval can be exploited if no additional protection is used on top of an "encrypted index". We also show that the cost of protecting document retrieval is very high using "off-the-shelf" techniques like ORAM or PIR.

This has led us to believe that we need to "rethink SSE" -- by designing SSE schemes that take system-wide leakage into account from the start.

25.6.2022

We look forward to the visit of Joy Shi. She is a Bachelor student at Caltech, and the recipient of a Student Summer Research Fellowship (ETH SSRF). She joins our group during July and August 2022.

20.6.2022

We are excited to have Mihir Bellare visiting our group from June to August 2022. Mihir is a professor at UC San Diego, fellow of the ACM and IACR, and recipient of the Levchin Prize for Real-World Cryptography. His research emphasises provable security for primitives of applied interest.

17.6.2022

We look forward to the visit of Lenka Mareková. She will join our group during the months of July and August 2022. Lenka is a PhD student at Royal Holloway, University of London. In her work she is focusing on analysing the security of messaging protocols using formal models as well as by studying how they are implemented in practice.

7.6.2022

The paper “Four Attacks and a Proof for Telegram” by Kenny Paterson, former Applied Crypto group member Igors Stepanovs and collaborators Martin Albrecht and Lenka Mareková from Royal Holloway, University of London was awarded with a distinguished paper award at the prestigious IEEE Symposium on Security & Privacy 2022. Taking a "deep dive" on the Telegram secure messaging protocol, it describes a number of practical and theoretical attacks on Telegram's MT Proto protocol, as well as provides a security proof for a repaired version of Telegram. Read more at external pagehttps://mtpsym.github.io/

24.5.2022

Tianxin Tang joins the Applied Cryptography group as a postdoctoral researcher on 22 March 2022. She obtained her Ph.D. from Georgia Institute of Technology under the guidance of Dr. Alexandra Boldyreva. Her thesis focused on mitigating the leakage of searchable encryption and adding support for versatile functionality. She is interested in exploring various aspects of accessing and computing on encrypted data.

7.3.2022

Zichen Gui joins the Applied Cryptography group as a postdoctoral researcher on 1 April 2022. He obtained his Ph.D. from the University of Bristol under the supervision of Bogdan Warinschi and Oliver Johnson. He is interested in the trade-off between security and efficiency for encrypted database systems. His work focuses on analysing existing schemes, building better security models and devising more advanced schemes.

1.3.2022

Three papers by researchers from our group have recently been accepted to top-tier conferences:
 

  • The paper "Breaking Bridgefy, again — Adopting libsignal is not enough" was accepted to the external pageUSENIX Security Symposium 2022. It reports new attacks on the Bridgefy messaging app and emerged from Raphael Eikenberg's Master thesis; it's co-authored by Martin Albrecht from Royal Holloway, University of London and Kenny Paterson.
  • The paper "On the Concrete Security of TLS 1.3 PSK Mode" by former visiting student Hannah Davis (UC San Diego), Denis Diemert and Tibor Jager (University of Wuppertal) and Felix Günther was accepted to external pageEUROCRYPT 2022. It closes gaps in prior security proofs for the widespread TLS 1.3 protocol and provides new and tight security bounds.
  • The paper "Anonymous, Robust Post-Quantum Public-Key Encryption" by Paul Grubbs (University of Michigan), Varun Maram, and Kenny Paterson was also accepted to external pageEUROCRYPT 2022. It conducts a systematic study of anonymity and robustness for post-quantum encryption and provides insights on the finalist schemes in NIST's standardization process (external pagepreprint available).

2.2.2022

Google Logo

Matteo Scarlata is back in the group after completing his internship at Google. Matteo worked for three months in the team managing Google's Certificate Authority.

3.1.2022

JavaScript has been disabled in your browser