8,404 Hits in 3.0 sec

Cryptography Secure against Related-Key Attacks and Tampering [chapter]

Mihir Bellare, David Cash, Rachel Miller
2011 Lecture Notes in Computer Science  
We show how to leverage the RKA (Related-Key Attack) security of blockciphers to provide RKA security for a suite of high-level primitives.  ...  A technical challenge was to achieve RKA security even for the practical classes of related-key deriving (RKD) functions underlying fault injection attacks that fail to satisfy the "claw-freeness" assumption  ...  We thank Susan Thomson, Martijn Stam, Pooya Farshim and the Asiacrypt 2011 reviewers for their comments and corrections. Mihir Bellare was supported in part by NSF grants CCF-0915675 and CNS-0904380.  ... 
doi:10.1007/978-3-642-25385-0_26 fatcat:4tvpxkkn6ncphm6pxsssywwyja

Research in Security Architecture for Internet of Ships

Xiao-Bo WU, Zhi-Chao SUN, Zhao-Hui WU, Xu-Na MIAO
2017 DEStech Transactions on Computer Science and Engineering  
In this paper, by security analyzing of data transmission mode and comparing of existing security mechanisms for wireless network, security architecture for IoS is proposed.  ...  Due to the heterogeneous and dynamic network characteristics, Internet of Ships (IoS) is confronted with various information security challenges.  ...  These modules are tamper-resistant because the stored data cannot be read and modified by ordinary users. 2) Security system based on cryptography as a proactive security mechanism can be divided into  ... 
doi:10.12783/dtcse/aice-ncs2016/5720 fatcat:3ftkwgbckvf5xjntniaaszx6ne

Security pitfalls in cryptographic design

Bruce Schneier
1998 Information Management & Computer Security  
M agazine articles like to describe cryptography products in terms of algorithms and key length.  ...  Burglars don't try every possible key (a bruteforce attack); most aren't even clever enough to pick the lock (a cryptographic attack against the algorithm).  ...  He pioneered research on secure random number generators, differential related-key cryptanalysis on block ciphers, and the chosen-protocol attack against cryptographic protocols.  ... 
doi:10.1108/09685229810225038 fatcat:onyjjqoy3bfqldfgf3e6bru54u

Cryptographic design vulnerabilities

B. Schneier
1998 Computer  
Public and private keys Public key cryptography involves two keys-a private key and a public key-that are mathematically related so that a message encrypted with one can be decrypted only with the other  ...  ATTACKS AGAINST HARDWARE Some systems, particularly commerce systems, rely on "secure perimeter" tamper-resistant hardware such as smart cards, electronic wallets, and dongles.  ... 
doi:10.1109/2.708447 fatcat:gumayzqfczbfjp5l5nibkdobza

Revisiting Software Protection [chapter]

Paul C. van Oorschot
2003 Lecture Notes in Computer Science  
We provide a selective survey on software protection, including approaches to software tamper resistance, obfuscation, software diversity, and white-box cryptography.  ...  We review the early literature in the area plus recent activities related to trusted platforms, and discuss challenges and future directions.  ...  cryptography (for protecting secret keys in untrusted host environments); software tamper resistance (for protection against program integrity threats); and software diversity (for protection against  ... 
doi:10.1007/10958513_1 fatcat:5hjupbqp5bgvxdrt2tlkeprr6i

Implementation Methodology of ECC to Overcome Side Channel Attacks

M Maheswari, R A. Karthika, Anuska Chatterjee
2018 International Journal of Engineering & Technology  
Elliptic Curve Cryptography (ECC) is a form of public-key cryptography. This implies that there is the involvement of a private key and a public key for the purpose of cryptography.  ...  The keys used are much smaller than the non-ECC cryptographic algorithms. 256 bit and 384 bit ECC are used by NSA for storage of classified intel as ECC is considered to be a part of suit B cryptography  ...  ECC needs smaller keys against non-ECC cryptography (based on plain Galois fields) to provide relative security. [1] [2] Elliptic curves has a wide variety of application such as key harmony and a vital  ... 
doi:10.14419/ijet.v7i3.27.17989 fatcat:v5efgkv2kvezdcgps6bkgxzmta

White-Box Cryptography [chapter]

Gerrit Bleumer, Alex Biryukov, Collin Jackson, Alban Gabillon, V. N. Venkatakrishnan, Amit Klein, Dario V Forte, Dario V Forte, Ernesto Damiani, Frdrique Biennier, William Stallings, Paulo S. L. M. Barreto (+8 others)
2011 Encyclopedia of Cryptography and Security  
Related and complementary techniques for protecting software implementations but with different security goals include code obfuscation and software tamperresistance.  ...  White-box cryptography techniques are aimed at protecting software implementations of cryptographic algorithms against key recovery.  ...  Preneel and B. Wyseur for sending a copy of [7] . I am also grateful to O. Billet, E. Diehl, and C. Salmon-Legagneur for comments.  ... 
doi:10.1007/978-1-4419-5906-5_627 fatcat:hcg3cqhaq5bf7awq32gc3ur7ja


Kshitija Ajabrao Chaple
WSN is one of the dominant and emerging technology that shows great promise for various application in military, ecological and health related areas.WSN is highly vulnerable to attacks and inclusion of  ...  In this article we provide a survey of security in WSN.We provide an outline with constraints and security requirement and attacks with their counter measures in WSN.  ...  Defensive Measures key establishment defending against OS attack secure broadcasting and multicasting defending against attack on routing protocol detecting node replication attack  ... 
doi:10.24297/ijct.v4i2c1.4175 fatcat:pz4ktjonvvb35gfrlfnxel6soq

Data Provenance Verification for Secure Hosts using Advance Cryptography Algorithm

Anirudha Vikhe, Prema Desai
2014 International Journal of Computer Applications  
The packets are encrypted with advanced cryptography algorithm at transport layer and send to verify module along with communication key.  ...  General Terms Data integrity, security, networking Keywords Data provenance, keystroke integrity, message authentication, malware attacks, advanced cryptography, universal hashing, trust platform computing  ...  System proposes the use of advanced method against forgery by storing cryptographic keys in TPM, which acts as sealed storage and identifies malicious attacks.  ... 
doi:10.5120/15398-3939 fatcat:wcv7uzme7va2rfxfg65qhwt6nu

An efficient authentication and key establishment scheme for heterogeneous sensor networks

Sarmad Ullah Khan, Rafiullah Khan
2011 2011 7th International Conference on Emerging Technologies  
and physical tampering attacks.  ...  Here we provide different security measures to the H-Nodes and to the L-Nodes to deal with node capturing attacks and physical tampering attacks.  ... 
doi:10.1109/icet.2011.6048451 fatcat:5slgmdcq65d5borlt7fpc6wgxa

Page 461 of IEEE Transactions on Computers Vol. 52, Issue 4 [page]

2003 IEEE Transactions on Computers  
In this paper, related protocols are also considered and are carefully examined to point out possible weaknesses index Terms—Chinese Remainder Theorem (CRT), cryptography, denial of service attack, factorization  ...  These attacks are of general nature and remain valid for a large variety of cryptosystems, e.g., the LUC public key cryptosystem [18] and elliptic curve cryptography (ECC) [19] In this paper, we focus  ... 

The future of security in Wireless Multimedia Sensor Networks

Manel Guerrero-Zapata, Ruken Zilan, José M. Barceló-Ordinas, Kemal Bicakci, Bulent Tavli
2009 Telecommunications Systems  
This is a position paper on our views on security aspects of Wireless Multimedia Sensor Networks (Secure WMSNs). It is meant to serve as a brief survey.  ...  We believe that this paper will spur new discussions and research ideas among the researchers from both the industry and the academic world.  ...  Related work on security in WSSN In the context of WSSN, security means to protect sensor data against unauthorized access and modification and to ensure the availability of network communication and services  ... 
doi:10.1007/s11235-009-9235-0 fatcat:rcwslfkznvhcdcxe5ngn4upvfy

A Thorough Investigation on Software Protection Techniques against Various Attacks

Sasirekha N
2012 Bonfring International Journal of Software Engineering and Soft Computing  
Thus, thorough threat analysis and new software protection schemes, needed to protect software from analysis and tampering attacks becomes very necessary.  ...  Considerable attempts have been made to enhance the security of the computer systems because of various available software piracy and virus attacks.  ...  Moreover, secret keys, confidential data or security related code are not planned to be examined, extracted, stolen or corrupted.  ... 
doi:10.9756/bijsesc.10030 fatcat:u273xyqjxjeyvisfsajcanpfoe

An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting

E. Bertino, Ning Shang, S.S. Wagstaff
2008 IEEE Transactions on Dependable and Secure Computing  
Both schemes are insecure against collusion attacks. In this paper, we propose a new key assignment scheme for access control which is both efficient and secure.  ...  Elliptic curve cryptography is deployed in this scheme. We also provide analysis of the scheme with respect to security and efficiency issues.  ...  The authors thank the Center for Education and Research in Information Assurance and Security at Purdue University for support.  ... 
doi:10.1109/tdsc.2007.70241 fatcat:nrouo4mh3zgwfhj2e5q6rh6k6y

Towards the issues in architectural support for protection of software execution

Weidong Shi, Hsien-Hsin S. Lee, Chenghuai Lu, Mrinmoy Ghosh
2005 SIGARCH Computer Architecture News  
2) Is per-process single cryptography key enough to provide the flexibility, inter-operability, and compatibility required by today's complex software system?  ...  Finally, the paper defines the difference between off-line and on-line attacks and presents a very low overhead security enhancement technique that can improve protection on software integrity over on-line  ...  To enhance security, a tamper prevention logic device, called tamper prevention timer (TPT) can be used to fight against online attacks on integrity code.  ... 
doi:10.1145/1055626.1055629 fatcat:2zvxp4kwnfd2zdv6nwntjs3q6i
« Previous Showing results 1 — 15 out of 8,404 results