Filters








48 Hits in 2.1 sec

Attack on Broadcast RC4 Revisited [chapter]

Subhamoy Maitra, Goutam Paul, Sourav Sen Gupta
2011 Lecture Notes in Computer Science  
Additionally, the attack on broadcast RC4 to recover the second byte of the plaintext can be extended to recover the bytes 3 to 255 of the plaintext given Ω(N 3 ) many ciphertexts.  ...  To get rid of these problems, one may throw away some initial bytes of RC4 PRGA as suggested in [3, 7] .  ...  Attacking the RC4 Broadcast Scheme Let us now revisit the famous attack of Mantin and Shamir [5] on broadcast RC4.  ... 
doi:10.1007/978-3-642-21702-9_12 fatcat:zyqf62hjpfdpdcb37zjvub6foa

Dependence in IV-Related Bytes of RC4 Key Enhances Vulnerabilities in WPA [chapter]

Sourav Sen Gupta, Subhamoy Maitra, Willi Meier, Goutam Paul, Santanu Sarkar
2015 Lecture Notes in Computer Science  
Further, we revisit the correlation of initial keystream bytes in WPA to the first three bytes of the RC4 key.  ...  We notice that the correlations of the keystream bytes with publicly known IV values of WPA potentially strengthen the practical plaintext recovery attack on the protocol.  ...  In [6, 23] , the long term biases of RC4 were exploited to mount broadcast attack on later bytes.  ... 
doi:10.1007/978-3-662-46706-0_18 fatcat:xbashw4gkbeedbsxmyvmgddnmm

Expanding Weak-key Space of RC4

Atsushi Nagao, Toshihiro Ohigashi, Takanori Isobe, Masakatu Morii
2014 Journal of Information Processing  
Given any keystream, our weak-key attack can recover a 128-bit secret key with efficiency of 2 115.11 . Our attack is the best-known single-key key recovery attack on RC4 with respect to efficiency.  ...  Although RC4 in particular implementations and settings such as the WEP implementation and the broadcast setting, was already broken, RC4 itself is not completely broken yet.  ...  They estimated the number of required ciphertexts for the attack as N 3 . In 2013, Isobe et al. proposed the full plaintext attack on RC4 in the broadcast setting.  ... 
doi:10.2197/ipsjjip.22.357 fatcat:4gjli3on3jas3mbcfgousj36qa

(Non-)Random Sequences from (Non-)Random Permutations—Analysis of RC4 Stream Cipher

Sourav Sen Gupta, Subhamoy Maitra, Goutam Paul, Santanu Sarkar
2012 Journal of Cryptology  
Further, the existence of positive biases towards zero for all the initial bytes 3 to 255 is proved and exploited towards a generalized broadcast attack on RC4.  ...  [37] SVV biases in key and state variables [32] Keylength biases [30] Broadcast revisited [17] WPA distinguisher [33] SVV WEP & WPA attacks [33] Key collisions [5] SVV WEP & WPA attacks (revised) [31]  ...  Attacking the RC4 broadcast scheme We revisit the famous attack of Mantin and Shamir [19] on broadcast RC4, where the same plaintext is encrypted using multiple secret keys, and then the ciphertexts  ... 
doi:10.1007/s00145-012-9138-1 fatcat:jc6baa44djbi7ojqsmtxpypr3q

Analysis of RC4 and Proposal of Additional Layers for Better Security Margin [chapter]

Subhamoy Maitra, Goutam Paul
2008 Lecture Notes in Computer Science  
Based on our analysis and the results available in literature regarding the existing weaknesses of RC4, few additional layers over the RC4 KSA and RC4 Pseudo-Random Generation Algorithm (PRGA) are proposed  ...  Analysis of the modified cipher (we call it RC4 + ) shows that this new strategy avoids existing weaknesses of RC4.  ...  Based on this, they showed a distinguishing attack and a ciphertext-only attack in broadcast mode. We avoid this kind of situation in our design.  ... 
doi:10.1007/978-3-540-89754-5_3 fatcat:6qzzycz66zhajdib3ffzxdxj4a

Page 9498 of Mathematical Reviews Vol. , Issue 2004k [page]

2004 Mathematical Reviews  
Wagner], A generalized birthday problem (extended abstract) (288-303); Ilya Mironov, (Not so) random shuffles of RC4 (304-319).  ...  Robshaw, Essen- tial algebraic structure within the AES (1-16); Antoine Joux, Gwenaélle Martineti and Frédéric Valette, Blockwise-adaptive at- tackers revisiting the (in)security of some provably secure  ... 

Computation-Efficient Multicast Key Distribution

Lihao Xu, Cheng Huang
2008 IEEE Transactions on Parallel and Distributed Systems  
ACKNOWLEDGMENTS Some preliminary results of this work were presented at the 2003 IEEE International Symposium on Information Theory, Yokohama, Japan, 29 June-4 July, 2003.  ...  These departures are not constrained to happen at the same time, but in practice, they might tend to be close, for example, at the end of one movie broadcast, etc.  ...  Static secret sharing via broadcast channel was studied in [32] and [20] . However, this threshold-based scheme can only distribute a session key to a designated group of members for one-time use.  ... 
doi:10.1109/tpds.2007.70759 fatcat:dphlxcwi7bgdfc7vwnw33epahq

Security and cooperation in wireless networks: thwarting malicious and selfish behavior in the age of ubiquitous computing

2008 ChoiceReviews  
The strategy we have adopted is to focus on the principles and to keep examples as generic as possible.  ...  By now, the number of wireless phones has superseded that of wired ones. Wireless LANs are routinely used by millions of nomadic users.  ...  Manshaei for his contributions to the clarification of Bianchi's model and for some of the questions of Chapter 9; and Jun Luo, Jacques Panchard, and Marcin Poturalski who provided detailed feedback on  ... 
doi:10.5860/choice.46-1524 fatcat:3bkyxjix2vcabcn3f45pqd4vn4

Data obfuscation with network coding

A. Hessler, T. Kakumaru, H. Perrey, D. Westhoff
2012 Computer Communications  
In this work we investigate how to conceal such an encoded data stream on its way to numerous receivers with a minimum investment.  ...  Impact of recognizable data This section revisits the implicit pre-assumptions we made in the security analysis of Section 6 with respect to the attacker A and the attacker B and which we believe is worth  ...  RC4 or a block-cipher e.g. AES based encryption of E(x, c).  ... 
doi:10.1016/j.comcom.2010.11.004 fatcat:6und3otjcbbjdc6uh6ons6wr7a

Wireless Sensor Network Security

An Liu, Mihui Kim, Leonardo B. Oliveira, Hailun Tan
2013 International Journal of Distributed Sensor Networks  
An adversary can perform variety of active and passive attacks on the key management traffic due to broadcast nature of the communication. • Resource limitation on sensor nodes.  ...  A DoS attack on WSN may take several forms: node collaboration, in which a set of nodes act maliciously and prevent broadcast messages from reaching certain section(s) of the sensor network; jamming attack  ...  On the other hand, they present a considerable complexity, which results in a  ... 
doi:10.1155/2013/362385 fatcat:2ph46uukonbtbdkc5q6t4mvgcq

Overview on Selective Encryption of Image and Video: Challenges and Perspectives

A. Massoudi, F. Lefebvre, C. De Vleeschouwer, B. Macq, J.-J. Quisquater
2008 EURASIP Journal on Information Security  
This tutorial is intended to give an overview on selective encryption algorithms. The theoretical background of selective encryption, potential applications, challenges, and perspectives is presented.  ...  attack on the key space easier than optimal brute force attack on the plaintext space.  ...  In [40] , the algorithm proposed by Wu and Deng [39] is revisited.  ... 
doi:10.1155/2008/179290 fatcat:edxyot6bf5dshmhltumubf7fru

Multi-key Analysis of Tweakable Even-Mansour with Applications to Minalpher and OPP

Zhiyuan Guo, Wenling Wu, Renzhang Liu, Liting Zhang
2017 IACR Transactions on Symmetric Cryptology  
Based on giant component theorem in random graph theory, we propose a collision-based multi-key attack on TEM-1 in the known-plaintext setting.  ...  We describe knownplaintext attacks on Minalpher and OPP without nonce misuse, which enable us to recover almost all O(2n/3) independent masks by making O(2n/3) queries per key and costing O(22n/3) memory  ...  We are also grateful to Si Gao for providing useful suggestions on the related experiments.  ... 
doi:10.13154/tosc.v2016.i2.288-306 dblp:journals/tosc/GuoWLZ16 fatcat:besakbj35bgbpm2mfqfocmmwda

Multi-key Analysis of Tweakable Even-Mansour with Applications to Minalpher and OPP

Zhiyuan Guo, Wenling Wu, Renzhang Liu, Liting Zhang
2017 IACR Transactions on Symmetric Cryptology  
Based on giant component theorem in random graph theory, we propose a collision-based multi-key attack on TEM-1 in the known-plaintext setting.  ...  We describe knownplaintext attacks on Minalpher and OPP without nonce misuse, which enable us to recover almost all O(2n/3) independent masks by making O(2n/3) queries per key and costing O(22n/3) memory  ...  We are also grateful to Si Gao for providing useful suggestions on the related experiments.  ... 
doi:10.46586/tosc.v2016.i2.288-306 fatcat:2dg5ktpl3vavzmvl6vcpxkq23q

SoK: SSL and HTTPS: Revisiting Past Challenges and Evaluating Certificate Trust Model Enhancements

J. Clark, P. C. van Oorschot
2013 2013 IEEE Symposium on Security and Privacy  
Over the years, many attacks on HTTPS and the certificate trust model it uses have been hypothesized, executed, and/or evolved.  ...  Internet users today depend daily on HTTPS for secure communication with sites they intend to visit.  ...  We thank those who provided detailed comments on the paper, including the anonymous referees, Carlisle Adams, Joseph Bonneau, Cormac Herley, Adam Langley, Tim Moses, Trevor Perrin, and Sid Stamm.  ... 
doi:10.1109/sp.2013.41 dblp:conf/sp/ClarkO13 fatcat:xtazjddqd5d4bad5eqdkl5hvnq

A Survey on the Encryption of Convergecast Traffic with In-Network Processing

S. Peter, D. Westhoff, C. Castelluccia
2010 IEEE Transactions on Dependable and Secure Computing  
Other than hop-by-hop based encryption approaches, aggregator nodes can perform in-network processing on encrypted data.  ...  Second, since we are aiming at security solutions over a highly unreliable medium, one cannot ignore the impact of packet loss on the wireless broadcast medium.  ...  Passive attacks can be performed relatively easy. Given the characteristics of the broadcast medium those attacks are not detectable, which make them highly dangerous.  ... 
doi:10.1109/tdsc.2008.23 fatcat:5lak5hk6drhh7airjsbamce4cm
« Previous Showing results 1 — 15 out of 48 results