Closed defuse closed 8 years ago
Those reviews are actually way more positive than I remember!
I think as a matter of strategy we just shouldn't claim to be the first of any type of attack. It's too easy for us to miss concurrent work or something published on some random blog, and get rejected for that reason, even though our attacks are good. Let's just motivate it something like this:
"There's a lot of focus on crypto attacks, here's some work that attacks non-crypto stuff. The simplest kind of attack is an input distinguisher (all other kinds of attacks, e.g. crypto key leakage and the shopping cart one) imply the existence of input-distinguishing attacks. We found some input distinguishing attacks so that suggests more might be possible."
Better rationale:
The TrueCrypt one is actually not ad-hoc as it can be seen as distinguishing between classes of inputs, which implies being able to distinguish between two specific inputs.
Any F+R attack can be constructed by repeating different kinds of input-class-distinguishing attacks. Take the attack and encode its output (the leaked information) into N bits, then define N pairs of input classes where the i-th pair is ("inputs with i-th bit 0", "inputs with i-th bit 1"). So there is (mathematically, who knows about practically) always a progression from input class distinguishing attacks to the attack you're actually going for. This is uninteresting except that (1) If the progression exists in practice not just in math land, then it leads to easily turning distinguishing attacks into full leakage attacks and (2) A defense that promises to break such progressions (e.g. by making which input class is being measured unknown) will break the full leakage attacks even though it won't break the individual distinguishers, which could be good enough.
I opened tickets for each of the individual comments.