2,407 Hits in 2.3 sec

Cryptographic Reverse Firewalls [chapter]

Ilya Mironov, Noah Stephens-Davidowitz
2015 Lecture Notes in Computer Science  
To that end, we introduce the notion of a cryptographic reverse firewall (RF).  ...  Our security definition for reverse firewalls depends on the security notion(s) of the underlying protocol.  ...  Cryptographic reverse firewalls Definition 3 (Cryptographic reverse firewall).  ... 
doi:10.1007/978-3-662-46803-6_22 fatcat:x2r4uysi7fb4ldpnlucmoke2ay

Cryptographic Reverse Firewalls for Interactive Proof Systems

Chaya Ganesh, Bernardo Magri, Daniele Venturi, Emanuela Merelli, Anuj Dawar, Artur Czumaj
2020 International Colloquium on Automata, Languages and Programming  
At EUROCRYPT 2015, Mironov and Stephens-Davidowitz introduced cryptographic reverse firewalls (RFs) as an attractive approach to tackling such questions.  ...  = 1 V 1 ( I C A L P 2 0 2 0 55:10 Cryptographic Reverse Firewalls for Interactive Proof Systems Theorem 5.  ...  We refer the reader to §5.1 for more details. 55:4 Cryptographic Reverse Firewalls for Interactive Proof Systems practical.  ... 
doi:10.4230/lipics.icalp.2020.55 dblp:conf/icalp/GaneshM020 fatcat:jngjosguf5bo7cgk7vilt2mobi

Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions [chapter]

Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, Mingwu Zhang
2016 Lecture Notes in Computer Science  
In Eurocrypt 2015, Mironov and Stephens-Davidowitz proposed a novel concept named cryptographic reverse firewall (CRF) which can resist exfiltration of secret information from an arbitrarily compromised  ...  -We show how to generically construct CRFs via malleable SPHFs in a modular way for some widely used cryptographic protocols.  ...  Cryptographic Reverse Firewall.  ... 
doi:10.1007/978-3-662-53887-6_31 fatcat:ou4rcftx55d5hlmlezspe2csha

Secure Firewall Traversal in Mobile IP Network [chapter]

Jung-Min Park, Min-Jung Jin, Kijoon Chae
2003 Lecture Notes in Computer Science  
In many cases mobile users is connected through a wireless link and is protected by corporation's firewall in virtual private network.  ...  In this paper, we propose the security mechanism of combining Mobile IP and IPSec tunnels, which can provide secure traversal of firewall in a home network.  ...  One is the Mobile IP tunnel between HA and firewall, the other is the reverse tunnel between firewall and MN.  ... 
doi:10.1007/3-540-44864-0_56 fatcat:ttqr4ynkljbi5nz54552gf4iqq

Performance Evaluation of Ciphers Using CRYPTOOL 2.0

Kulwinder Kaur
Field of Firewall Robert N.  ...  to migrate rules among distributed firewalls.  ... 
doi:10.24297/ijct.v3i1a.2727 fatcat:foazbsnnrjb5xdhrvhemsqwwai

A Review of Medical Image Watermarking Requirements for Teleradiology

Hussain Nyeem, Wageeh Boles, Colin Boyd
2012 Journal of digital imaging  
Firewall and VPN: Among various network security measures, Firewalls and VPN are common.  ...  For example, virtual private network (VPN), firewall, etc. as well as encryption, cryptographic hash function or their derivatives such as digital signature (DS), machine authentication code (MAC), manipulation  ... 
doi:10.1007/s10278-012-9527-x pmid:22975883 pmcid:PMC3597963 fatcat:2xdtusge3fblnh7prcerqxt5le

Cryptography and the internet [chapter]

Steven M. Bellovin
1998 Lecture Notes in Computer Science  
The major issue has been one of cryptographic engineering: turning academic papers into a secure, implementable specification.  ...  In other cases, such as a corporate firewall, the delegation is in fact in the reverse order.  ...  IPSEC often conflicts with firewalls. A firewall cannot examine, and hence pass or reject, an encrypted packet. Should end-to-end encryption he permitted through firewalls?  ... 
doi:10.1007/bfb0055719 fatcat:k5rwymx5m5hr7enxxa77jkzll4

Multi-processor architectural support for protecting virtual machine privacy in untrusted cloud environment

Yuanfeng Wen, JongHyuk Lee, Ziyi Liu, Qingji Zheng, Weidong Shi, Shouhuai Xu, Taeweon Suh
2013 Proceedings of the ACM International Conference on Computing Frontiers - CF '13  
Cryptographic keys.  ...  The memory access firewall table specifies VM's physical address space, memory regions that require the access control, sharing permissions, and cryptographic protections.  ... 
doi:10.1145/2482767.2482799 dblp:conf/cf/WenLLZSXS13 fatcat:xg6lndxekjh4xdfen6ebkamcka


Olexander Zadereyko, Olena Trofymenko, Nataliia Loginova
2019 Informatyka Automatyka Pomiary w Gospodarce i Ochronie Środowiska  
; OS encryption using cryptographic software.  ...  Firewall configuration is performed in the blocking mode of all outgoing connections with servers. 5) Encryption of the system partition of the OS is performed using specialized cryptographic software  ... 
doi:10.5604/01.3001.0013.0905 fatcat:eysjzmfy55ccjkez45g5mga2yu

Network Security using Firewall and Cryptographic Authentication

Rajesh Kumar, I. M. Talwar
2012 International Journal of Computer Applications  
A mechanism, QUICKKNOCK, improving upon the potentialities of technologies such as port knocking and SPA (Single Packet Authorization), using Firewall and Cryptography, has been proposed.  ...  Decoding is done by reversing the operations in this protocol.  ...  A cipher is a pair of algorithms which create the encryption and the reversing is decryption.  ... 
doi:10.5120/9438-3834 fatcat:gcnvkv2oz5blnjckcuut3o7cc4

The laws of security [chapter]

Ryan Russel
2003 Stealing the Network: How to Own the Box  
I Firewalls cannot protect you 100 percent from attack. I Any intrusion detection system (IDS) can be evaded. I Secret cryptographic algorithms are not secure.  ...  It either knows the algorithm to reverse the encoding, which is the same for every copy of that program, or it knows the secret key to decrypt the password, which must be stored on your computer.  ... 
doi:10.1016/b978-193183687-6.50014-5 fatcat:2vewfwdbobbofn2mk7axwfuwlm

Detection and Control of Malicious activity and Digital Forensic in BYOD

2019 International journal of recent technology and engineering  
First approach was reverse adoption of encryption technique used to protect corporate network from BYOD environment.  ...  Segregated the corporate network from BYOD traffic using a reverse adoption of encryption mechanism.  ...  Encryption/cryptographic method of network security is an option in a recent research in 2019 explored end to end encryption is secured model [10] .  ... 
doi:10.35940/ijrte.d8151.118419 fatcat:5djryse4ajdztmz5afr2zd6hqm

End-Host Authentication and Authorization for Middleboxes Based on a Cryptographic Namespace

T. Heer, R. Hummen, M. Komu, S. Gotz, K. Wehrle
2009 2009 IEEE International Conference on Communications  
Today, middleboxes such as firewalls and network address translators have advanced beyond simple packet forwarding and address mapping.  ...  Using a cryptographic namespace for end-hosts simplifies these tasks since it gives them an explicit and verifiable identity.  ...  When sending packets, the end-host discloses the elements of the chain in reverse order of their creation, attaching a fresh element to each packet.  ... 
doi:10.1109/icc.2009.5198984 dblp:conf/icc/HeerHKGW09 fatcat:lhg73omeyjhy3gggs7k5khfzey

A Cryptographic System Based upon the Principles of Gene Expression

Harry Shaw
2017 Cryptography  
These codes then serve as the basis for a cryptographic model based on the processes of gene expression.  ...  This results in a set of cryptographic protocols that is capable of securing data at rest, data in motion and providing an evolvable form of security between two or more parties.  ...  Materials and Methods Basis of the Cryptographic System Relying on Principles of Gene Expression 1. There exists a scheme to reversibly convert plaintext to DNA nucleotide codes.  ... 
doi:10.3390/cryptography1030021 fatcat:cyk2lrpxxzfhpoplraldsqpsi4

A QUIC(K) Way Through Your Firewall? [article]

Konrad Yuri Gbur, Florian Tschorsch
2021 arXiv   pre-print
This paper shows that QUIC indeed exposes traditional stateful firewalls to UDP hole punching bypass attacks.  ...  However, the decision to encrypt transport layer functionality may limit the capabilities of firewalls to protect networks.  ...  The firewall could also keep track of the cryptographic handshake as well as checking its validity. However, this would go beyond tracking only the stream abstraction.  ... 
arXiv:2107.05939v1 fatcat:lv4hibz7nvh3njgz76xhaedcxy
« Previous Showing results 1 — 15 out of 2,407 results