Fact-checked by Grok 2 weeks ago
References
-
[1]
Modern Cryptographic Attacks: A Guide for the Perplexeda term coined in 1990 by Security Researcher Marcus J. Ranum, who described an attack where “[..] a rubber hose is ...
-
[2]
rubber-hose cryptanalysis - catb. OrgShorthand for any method of coercion: the originator of the term drily noted that it “can take a surprisingly short time and is quite computationally ...Missing: origin | Show results with:origin
-
[3]
Rubber-Hose Cryptanalysis - Schneier on SecurityOct 27, 2008 · Cryptographers have long joked about rubber-hose cryptanalysis: basically, beating the keys out of someone. Seems that this might have actually happened in ...
-
[4]
Designing Crypto Primitives Secure Against Rubber Hose AttacksThese attacks, known as rubber hose cryptanalysis, are often the easiest way to defeat cryptography. We present a defense against coercion attacks using the ...Missing: definition | Show results with:definition
-
[5]
Commentary: Cory Doctorow: Rubber-Hose CryptanalysisJul 7, 2025 · Cryptographers call all of these methods “rubber-hose cryptanalysis” (“cryptanalysis” is the act of probing an encryption system for weaknesses) ...
-
[6]
[PDF] APPLIED CRYPTOGRAPHY, SECOND EDITION... Rubber-hose cryptanalysis. The cryptanalyst threatens, blackmails, or tortures someone until they give him the key. Bribery is sometimes referred to as a ...
-
[7]
[PDF] Designing Crypto Primitives Secure Against Rubber Hose AttacksThese attacks, known as rubber hose cryptanalysis, are often the easiest way to defeat cryptography. We present a defense against coercion attacks using the ...
-
[8]
Torture Redux: The Revival of Physical Coercion during ...Feb 8, 2010 · Muhammad estimates that he remained suspended for 10 to 15 minutes while officers hit him with what felt like a rubber hose and kicked him. “I ...
-
[9]
Malaysia: Government must investigate police torture claimsJan 22, 2009 · Mr Prabakar says the police beat him with a rubber hose, splashed boiling water on his body, and asked him to stand on a chair, with a cloth ...
-
[10]
"They Want a Confession": Torture and Ill-Treatment in Ethiopia's ...Oct 17, 2013 · Torture and ill-treatment is used both to extract information and ... On the first day when I entered I gave them my email and password.
-
[11]
"Making Their Own Rules": Police Beatings, Rape, and Torture of ...Aug 30, 2005 · They were also whipping me with a long rubber hose. . . . They whipped me on the back of my body and the front. Afterwards, I was bleeding and ...
-
[12]
If the Dead Could Speak: Mass Deaths and Torture in Syria's ...Dec 16, 2015 · Suffocation: Detainees describe guards put their boots on the detainee's neck and strangling the detainee with a rubber hose;; Falaqa: beating ...<|separator|>
-
[13]
Is rubberhose cryptanalysis a sidechannel - formally?Mar 6, 2016 · Rubberhose cryptanalysis could be seen as a side-channel, yes, but you couldn't say that you are attacking a specific cryptosystem (e.g., AES) ...
-
[14]
[PDF] Cryptology - Lomont.org• Black bag. • steal keys via burglary, keyloggers, social engineering ... • Rubber hose – torture to get the key. • Physical insertion of devices. • USB ...<|separator|>
-
[15]
[PDF] Methods of cryptanalysis• Replay attack. External attacks: • Black-bag cryptanalysis. Rubber-hose cryptanalysis. Attack model. Attack models or attack types specify how much ...Missing: comparison | Show results with:comparison
-
[16]
[PDF] Encryption Workarounds - Georgetown Lawattack is “rubber-hose cryptanalysis,” which emphasizes the physical nature of this coercion.56. This concept is humorously depicted in the popular webcomic ...
-
[17]
Rubberhose cryptographically deniable transparent disk encryption system### Summary of Rubberhose Filesystem
-
[18]
[PDF] Honeywords: Making Password-Cracking DetectableMar 28, 2013 · ABSTRACT. We propose a simple method for improving the security of hashed passwords: the maintenance of additional “honey-.
-
[19]
[PDF] Secure Multi-party Computation & Financial CryptographyDec 21, 2016 · It is an open research agenda how to mitigate the risk of rubber hose attack through aforesaid threat analytics of the mobile commerce mechanism ...Missing: cryptanalysis | Show results with:cryptanalysis
-
[20]
The Best Defense Against Rubber-Hose CryptanalysisMar 27, 2022 · The best defense against rubber-hose cryptanalysis is a political process that answers to voters, not donors.Missing: definition | Show results with:definition
-
[21]
Convention against Torture and Other Cruel, Inhuman or Degrading ...1. Each State Party shall ensure that all acts of torture are offences under its criminal law. The same shall apply to an attempt to commit torture and to an ...
-
[22]
EFF to Support Apple in Encryption BattleFeb 16, 2016 · We have been fighting to protect encryption, and stop backdoors, for over 20 years. That's why EFF plans to file an amicus brief in support of ...Missing: Tor | Show results with:Tor
-
[23]
Day of Action: Stop the Changes to Rule 41 | The Tor ProjectJun 21, 2016 · ... 2016),. o encryption backdoors (repeatedly shot down, but FBI keeps trying),. o expansion of NSL powers (secret subpoenas for anything, no ...
-
[24]
Fifth Amendment Prohibits Compelled Decryption, New EFF Brief ...Oct 30, 2013 · When it comes to compelled decryption, the Fifth Amendment clearly applies because the government would be learning new facts beyond simply the ...
-
[25]
Global Encryption CoalitionWe promote and defend encryption in key countries and multilateral fora where it is under threat. We also support efforts by companies to offer encrypted ...
-
[26]
(PDF) Regulation of Investigatory Powers Act 2000 (1) - ResearchGate... disclose it. This. places the burden of proof on defendants to show that they no longer hold a key that they. may previously have held. The presumption of ...
-
[27]
World map of encryption laws and policies - Global Partners DigitalSection 58 of Law No. 2010/013 of 21 December 2010 Regulating ... However, there is no requirement that such persons disclose encryption keys or passwords.
-
[28]
Fifth Amendment | Wex | US Law | LII / Legal Information InstituteThe Fifth Amendment of the US Constitution "No person shall be held to answer for a capital, or otherwise infamous crime, unless on a presentment or indictment ...
-
[29]
Compelled Decryption Primer - NACDLThis primer outlines the state of the law on compelled decryption and offers a guide for defense lawyers on this important emerging issue.
-
[30]
[PDF] EDPB-EDPS Joint Opinion 04/2022 on the Proposal for a ...Jul 28, 2022 · The Proposal would impose qualified obligations on providers of hosting services, interpersonal communication services and other services ...
-
[31]
The Encryption Debate - CEPAAug 7, 2025 · Countries around the world are imposing new regulations to limit encryption. CEPA's new Encryption Debate map tracks the state of these rules.
-
[32]
Kenya election official tortured, murdered before vote, officials sayJul 31, 2017 · A senior Kenyan election official was found murdered on Monday, three days after he went missing, poll officials said, as opposition leaders ...
-
[33]
Kenyan election official was tortured, strangled to death: autopsyAug 3, 2017 · An autopsy conducted on the body of the slain Independent Electoral and Boundaries Commission (IEBC) ICT Manager Chris Msando revealed Wednesday that he was ...
-
[34]
The murder that shook the Kenyan elections - Al JazeeraAug 1, 2017 · Why was electoral commission official Chris Msando tortured and killed just days before the Kenyan elections?
-
[35]
Kenyan elections jarred by torture murder of election official - New ...Msando was one of a handful of officials who had the electoral commission's computer system passwords and knew the exact location of the servers to run the ...
-
[36]
Detectives retrace Chris Msando's final steps | Daily NationJun 28, 2020 · Mr Christopher Msando's widow and a waiter are among those questioned by detectives, seeking to piece together his last moments and find his killers.
-
[37]
[PDF] Encryption Workarounds - UC Berkeley LawThe phrase cryptographers use for this attack is. “rubber-hose cryptanalysis.”36 In this essay, we restrict ourselves to legal compulsion techniques. Of ...
-
[38]
Identifying Dread Pirate Roberts - Schneier on SecuritySep 17, 2014 · There is a mises.org acct with the name Ross Ulbricht and his pic that matches google+ and linkedin. ... rubber hose / thermorectal and other ...
-
[39]
Faced with encrypted devices, cops choose warranted smash and ...Dec 6, 2016 · Ross Ulbricht, the former operator of the Silk Road dark net market ... “Rubber hose cryptanalysis” is a three-decade old sardonic ...
-
[40]
US: Senate Report Slams CIA Torture, Lies - Human Rights WatchDec 10, 2014 · (Washington, DC) – The US Senate Intelligence Committee's report summary on the Central Intelligence Agency (CIA) detention and ...
-
[41]
Statement by the President Report of the Senate Select Committee ...Dec 9, 2014 · The report documents a troubling program involving enhanced interrogation techniques on terrorism suspects in secret facilities outside the ...
-
[42]
Biometric data becomes new weapon in Hong Kong protests - PBSJul 27, 2019 · ... phone and so they tried to actually force his face in front of his phone to use the phone's facial recognition function to get it to unlock.
-
[43]
Hong Kong police seized more than 3,700 mobile phones from ...Jan 8, 2020 · Hong Kong police seized more than 3,700 mobile phones from protesters in space of five months and had devices broken into to read contents, ...
-
[44]
Hong Kong: Arbitrary arrests, brutal beatings and torture in police ...Sep 19, 2019 · This has included arbitrary arrests and retaliatory violence against arrested persons in custody, some of which has amounted to torture.” More ...Missing: passwords | Show results with:passwords
-
[45]
Hong Kong Police 'Tortured' and Beat Protesters, Amnesty SaysSep 19, 2019 · Hong Kong police beat pro-democracy protesters in custody and committed acts that amount to “torture” during recent demonstrations, ...Missing: passwords | Show results with:passwords
-
[46]
In Hong Kong Protests, Faces Become WeaponsJul 26, 2019 · It all failed: Mr. Cheung had disabled his phone's facial-recognition login with a quick button mash as soon as they grabbed him. As Hong Kong ...
- [47]
-
[48]
Known Physical Bitcoin Attacks - GitHubPolice kidnap a businessman, torture him, and force his wife to send them 7 bitcoin. ... Ternopil, Ukraine, Man kidnapped and tortured for $800k. Unknown ...
-
[49]
Security - xkcdA webcomic of romance, sarcasm, math, and language. Special 10th anniversary edition of WHAT IF?—revised and annotated with brand-new illustrations and answers ...Missing: honeywords | Show results with:honeywords
-
[50]
DEFCON Quantum Village 2: Electric Boogaloo - Dhole MomentsAug 20, 2023 · This year, while I was walking around the Crypto + Privacy Village at DEFCON ... On one paw, you have the risk of rubber-hose attacks. Just ...
-
[51]
[PDF] APPLIED CRYPTOGRAPHY, SECOND EDITION - Internet ArchiveThe literature of cryptography has a curious history. Secrecy, of course, has always played a central role, but until the First World War, important.
-
[52]
[PDF] Hacking PGP - Black HatApr 2, 2005 · – You don't have to give a Black Hat talk on it. – It is good to ... • Don't forget rubber hose cryptanalysis. Page 43. 4/2/05. Real World ...
-
[53]
Technical Sessions - USENIXMany schemes, however, cannot resist coercion attacks where the user is forcibly asked by an attacker to reveal the key. These attacks, known as rubber hose ...
-
[54]
[PDF] NSTAC PQC Scoping Paper - CISAAug 23, 2024 · with the PQC transition, such as protection of stored data, backward compatibility, cost and complexity, and human factors? Page 3. 3.
-
[55]
Use Cases for Duress Authentication - ACM Digital LibraryOct 17, 2025 · Neuroscience meets cryptography: crypto primitives secure against rubber hose attacks. ... Duress detection for authentication attacks ...
-
[56]
[PDF] Coercion-Resistant Electronic Elections - Cryptology ePrint ArchiveWe define a scheme to be coercion-resistant if it is infeasible for the adversary to determine whether a coerced voter complies with the demands. A first ...