Filters








255 Hits in 12.0 sec

The persistence of memory: Forensic identification and extraction of cryptographic keys

Carsten Maartmann-Moe, Steffen E. Thorkildsen, André Årnes
2009 Digital Investigation. The International Journal of Digital Forensics and Incident Response  
We propose novel methods for cryptographic key identification and present a new proof of concept tool named Interrogate that searches through volatile memory and recovers cryptographic keys used by the  ...  By using the tool in a virtual digital crime scene, we simulate and examine the different states of systems where well known and popular cryptosystems are installed.  ...  Furthermore, we thank the Norwegian Criminal Investigation Service for providing facilities and resources for the project, and Associate Professor Katrin Franke for helpful advice during the writing of  ... 
doi:10.1016/j.diin.2009.06.002 fatcat:2toxzkkcbbauni2gkk7qpfzfdy

Survey of Promising Technologies for Quantum Drones and Networks

Adarsh Kumar, Surbhi Bhatia, Keshav Kaushik, Manjula Gandhi, Gayathri Devi, Diego Pacheco, Arwa Mashat
2021 IEEE Access  
This technique helps in transmitting the entangled particles to the different receivers located at different locations by using a group of drones.  ...  Thus, this cryptosystem is suitable for generic computers, but a smaller key size is expected to successfully implement over small devices having a scarcity of resources.  ... 
doi:10.1109/access.2021.3109816 fatcat:gkyevfoqrfertef7j7gjzcstii

Cryptographic Algorithms [chapter]

2015 Applied Cryptography, Second Edition  
On the other hand, for symmetric ciphers, the relations that have to be satisfied between sub-round key bits in the key schedule always correspond to a set of nonlinear Boolean equations.  ...  In addition to investigating different practical obfuscation techniques that are suitable for the cipher structure, we also compare the performance of these different techniques.  ...  keys of DES, AES and RSA.  ... 
doi:10.1002/9781119183471.part3 fatcat:rvk3izmftvebbkajuc7xzha6fe

Survey on cyberspace security

HuanGuo Zhang, WenBao Han, XueJia Lai, DongDai Lin, JianFeng Ma, JianHua Li
2015 Science China Information Sciences  
In this era, people live and work in cyberspace. Cyberspace is the collection of all information systems; it is the information environment for human survival.  ...  This paper gives a comprehensive introduction to research and development in this field, with a description of existing problems and some currently active research topics in the areas of cyberspace itself  ...  We would like to thank the following for their help in writing this article: FU JianMin, ZHANG LiQiang, YUAN Wei, XI Ning, LU Di, WU Jun.  ... 
doi:10.1007/s11432-015-5433-4 fatcat:b2tv6gvovngxhlz7iukug2ehiy

Data Encryption Standard (DES) [chapter]

Alex Biryukov, Christophe De Cannière, William E. Winkler, Charu C. Aggarwal, Markus Kuhn, Luc Bouganim, Yanli Guo, Bart Preneel, Gerrit Bleumer, Tor Helleseth, Ran Canetti, Mayank Varia (+35 others)
2011 Encyclopedia of Cryptography and Security  
A careful study of the cycle structure of DES for weak and semi-weak keys has been given by Moore and Simmons [30] .  ...  The speed of this proposal is as for single DES, but it has a slower key-schedule. r Slow key-schedule (Quisquater et al. [32] or Knudsen [10] ).  ...  Security analysis for a generalization of DSS is given in [1] . To discuss signature length we fix concrete security parameters.  ... 
doi:10.1007/978-1-4419-5906-5_568 fatcat:wly6ca3tv5e2pc2woejsoaoubm

A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes

Rodrigo Roman, Cristina Alcaraz, Javier Lopez
2007 Journal on spesial topics in mobile networks and applications  
Using a real-life metaphor, a sensor node can be abstracted as the "sensing cells" of a living system and the base station as the "brain" of such system, the ultimate destination of all signals generated  ...  Our objective in this paper is to survey how the existing research-based and commercial-based sensor nodes are suitable for this purpose, analyzing how the hardware can influence the provision of the primitives  ...  The first author has been funded by the Ministry of Education and Science of Spain under the "Programa Nacional de Formacion de Profesorado Universitario".  ... 
doi:10.1007/s11036-007-0024-2 fatcat:zaqwex2ds5frfa4pjw7klclpvu

Privacy and authentication: An introduction to cryptography

W. Diffie, M.E. Hellman
1979 Proceedings of the IEEE  
o f the a p p t i a t i o n of uyptography to the security of timeduring systems and computer networks.  ...  Akmct-This paper plesenfs a tutorial introduction to contempomy ayptography.  ...  There is a close analogy here with a general purpose digital computer and a program.  ... 
doi:10.1109/proc.1979.11256 fatcat:dctzswht4jdcpprjsdvstzotmi

Enhancing the Security of Spin Framework by Combining Min AES with Geoencryption

Usman Abdullahi Adam, Mitul Patel
2020 International journal of computer science and mobile computing  
like farming and agriculture, patient monitoring in health care, residential applications like energy management, for safety and efficiency in vehicular networks to outer space explorations.  ...  Wireless sensor networks are contemporary technologies that are used for various purposes in different fields including military and security monitoring, home security, industrial processes/activities  ...  In Mini-AES, the 16-bit secret key is passed through a key-schedule to produce one 16-bit round key, K0 to be used prior to the first round, and a 16-bit round key, Ki for use in each round of Mini-AES  ... 
doi:10.47760/ijcsmc.2020.v09i10.007 fatcat:nfu2jarilfdzba5mt62jyvjkoq

A Comprehensive Survey on ID-Based Cryptography for Wireless Sensor Networks

Constantin Grumăzescu, Victor-Valeriu Patriciu
2018 Journal of Military Technology  
In this paper we are presenting a thorough analysis on identity based cryptographic primitives, techniques, implementation variants and issues.  ...  While lightweight cryptographic algorithms are still under close supervision by NIST, identity based cryptography (IBC) holds its ground as a viable security approach for WSN based applications.  ...  Distributed Key Generator Another interesting feature presented in [2] as a viable variant, fully addressed in papers like [8] [9] [10] , is the existence of a Distributed Key Generator using threshold  ... 
doi:10.32754/jmt.2018.1.10 fatcat:k22rsoaovrbltlkwbirjzvx7ri

Post-Quantum Cryptography [chapter]

Qijun Gu, Pascal Paillier, Tanja Lange, Edlyn Teske, Darrel Hankerson, Alfred Menezes, David Zhang, Feng Yue, Wangmeng Zuo, Jean-Jacques Quisquater, Gildas Avoine, Gerald Brose (+73 others)
2011 Encyclopedia of Cryptography and Security  
laws and regulations and therefore free for general use.  ...  The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective  ...  We also thank Richard Lindner, Vadim Lyubashevsky, and Chris Peikert for comments on an earlier version.  ... 
doi:10.1007/978-1-4419-5906-5_386 fatcat:ucdkilta7zc3voq7nqctmjkcr4

Fault-Tolerant Non-interference [chapter]

Filippo Del Tedesco, Alejandro Russo, David Sands
2014 Lecture Notes in Computer Science  
We develop a software-based technique to achieve this faulttolerant non-interference property.  ...  A precise characterization of the class of programs for which the method guarantees transparency is provided.  ...  Acknowledgment Many thanks to Johan Karlsson, Ioannis Sourdis, Georgi Gaydadjiev, Arshad Jhumka and the anonymous referees for useful comments and observations.  ... 
doi:10.1007/978-3-319-04897-0_5 fatcat:ntd3mb6i25go5pb6hgrxk7vaji

Applied cryptography: Protocols, algorithms, and source code in C

1994 Computer Law and Security Review  
FF (a, b, c, d, M 12 , 7, 0x6b901122) FF (d, a, b, c, M 13 Those constants, t i , were chosen as follows: In step i, t i is the integer part of 2 32 *abs(sin(i)), where i is in radians.  ...  After all of this, a, b, c, and d are added to A, B, C, D, respectively, and the algorithm continues with the next block of data. The final output is the concatenation of A, B, C, and D.  ...  DES is a symmetric algorithm: The same algorithm and key are used for both encryption and decryption (except for minor differences in the key schedule). The key length is 56 bits.  ... 
doi:10.1016/0267-3649(94)90017-5 fatcat:y5tchirflfdwno7dm4dv6ljx2a

Security in embedded systems

Srivaths Ravi, Anand Raghunathan, Paul Kocher, Sunil Hattangady
2004 ACM Transactions on Embedded Computing Systems  
Security has been the subject of intensive research in the context of general-purpose computing and communications systems.  ...  Security processing, which refers to the computations that must be performed in a system for the purpose of security, can easily overwhelm the computational capabilities of processors in both low-and high-end  ...  For example, it has been shown in Messerges et al. [2002] that the brute-force search space for a SW DES implementation on an 8-bit processor with 7 bytes of key data can be reduced to 2 40 keys from  ... 
doi:10.1145/1015047.1015049 fatcat:2x62l5pmdnawhnisbbfdvvgkly

Survey on power analysis attacks and its impact on intelligent sensor networks

Shanthi Rekha Shanmugham, Saravanan Paramasivam
2018 IET Wireless Sensor Systems  
The sensors also known as edge nodes form the lower-most tier in the internet of things architecture. These devices rely on cryptographic technique to ensure 'root of trust' for the users.  ...  The implementation attacks namely side-channel attacks (SCAs) pose a dangerous threat for the cryptographic implementation in the edge nodes since the attacks are undetectable by nature.  ...  This work was also supported by Special Manpower Development Programme for Chips to System Design (SMDP-C2SD) project sponsored by the Department of Electronics and Information Technology (DeitY), Government  ... 
doi:10.1049/iet-wss.2018.5157 fatcat:yz3uqnnfxndm7ji4exh3crhruu

HyperDegrade: From GHz to MHz Effective CPU Frequencies [article]

Alejandro Cabrera Aldaya, Billy Bob Brumley
2021 arXiv   pre-print
In addition to the new technique, we investigate the root causes of performance degradation using cache eviction, discovering a previously unknown slowdown origin.  ...  Using HyperDegrade, we developed an end-to-end attack that shows how a Raccoon-like attack can succeed with real data, filling a missing gap from previous research.  ...  In general, our off-the-shelf applied lattice techniques in Section 6.3, while serving their purpose for proof-of-concept, are likely not optimal.  ... 
arXiv:2101.01077v2 fatcat:bbp5r4rogzdwtenccozu5ma7le
« Previous Showing results 1 — 15 out of 255 results