Cryptographic Support for Secure Logs on Untrusted Machines

In many real-world applications, sensitive information must be kept in log files on an untrusted machine. In the event that an attacker captures this machine, we would like to guarantee that he will gain little or no information from the log files and to limit his ability to corrupt the log files. We describe a computationally cheap method for making all log entries generated prior to the logging machine's compromise impossible for the attacker to read, and also impossible to undetectably modify or destroy.

[1]  Clifford Stoll,et al.  The Cuckoo's Egg , 1989 .

[2]  James H. Burrows,et al.  Secure Hash Standard , 1995 .

[3]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[4]  Bruce Schneier,et al.  Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.

[5]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.

[6]  Bruce Schneier,et al.  Automatic Event-Stream Notarization Using Digital Signatures , 1996, Security Protocols Workshop.

[7]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[8]  Michael K. Reiter,et al.  Distributing trust with the Rampart toolkit , 1996, CACM.

[9]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[10]  Xuejia Lai,et al.  Markov Ciphers and Differential Cryptanalysis , 1991, EUROCRYPT.

[11]  Ross J. Anderson,et al.  Robustness Principles for Public Key Protocols , 1995, CRYPTO.

[12]  Ralph Howard,et al.  Data encryption standard , 1987 .

[13]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[14]  Bruce Schneier,et al.  An authenticated camera , 1996, Proceedings 12th Annual Computer Security Applications Conference.

[15]  Bart Preneel,et al.  RIPEMD-160: A Strengthened Version of RIPEMD , 1996, FSE.

[16]  Bruce Schneier,et al.  Protocol Interactions and the Chosen Protocol Attack , 1997, Security Protocols Workshop.

[17]  Hugo Krawczyk,et al.  Keying Hash Functions for Message Authentication , 1996, CRYPTO.