Filters








64 Hits in 1.9 sec

Identifying Research Challenges in Post Quantum Cryptography Migration and Cryptographic Agility [article]

David Ott, Christopher Peikert, other workshop participants
2019 arXiv   pre-print
An April 2016 report by the National Institute of Standards and Technology (NIST), notably, calls out the need for new standards to replace cryptosystems based on integer factorization and discrete logarithm  ...  effort, applied cryptographers with expertise in creating cryptographic solutions and implementing cryptography in real-world settings, and industry practitioners with expertise in deploying cryptographic  ...  This makes it an important threat to Internet security as we know it today.  ... 
arXiv:1909.07353v1 fatcat:myqmftbsifh43g3ql7ejj4kpoi

Quantum Computing and the Financial System: Spooky Action at a Distance?

Tahsin Saadi Sedik, Michael Gorbanyov, Majid Malaika, Jose Deodoro
2021 IMF Working Papers  
Current security standards recommend the usage of AES algorithm with 256 bits keys for symmetric encryption.  ...  They are generally deemed secure and unbreakable with today's most advanced hardware and cryptanalysis techniques using conventional computers.  ... 
doi:10.5089/9781513572727.001 fatcat:2qqpcedixff55ikhuyomiwl3f4

The Reality of Algorithm Agility

Moritz Müller, Willem Toorop, Taejoong Chung, Jelte Jansen, Roland van Rijswijk-Deij
2020 Proceedings of the ACM Internet Measurement Conference  
Advances in both cryptography and cryptanalysis make it necessary to deploy new algorithms in DNSSEC, as well as deprecate those with weakened security.  ...  The DNS Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System (DNS), the naming system of the Internet.  ...  This process is started by a working group member submitting a proposal for standardization, in the form of an Internet Draft with an initial specification of how to use the new algorithm.  ... 
doi:10.1145/3419394.3423638 dblp:conf/imc/MullerTCJR20 fatcat:jifjomcf4bbxpeoqqljpeuodee

Post Quantum Secure Command and Control of Mobile Agents : Inserting quantum-resistant encryption schemes in the Secure Robot Operating System [article]

Richa Varma, Chris Melville, Claudio Pinello, Tuhin Sahai
2020 arXiv   pre-print
Given the active development of new quantum resistant encryption techniques, we report the first integration of post-quantum secure encryption schemes with the robot operating system (ROS) and C&C of mobile  ...  The development of quantum computing devices poses a unique threat to secure communications due to the vulnerability of asymmetric ciphers to Shor's algorithm.  ...  IPSec is a set of open standards that ensure secure communication over Internet Protocol (IP) networks. It operates at the network layer, meaning its effectiveness is not tied to an application.  ... 
arXiv:2009.07937v1 fatcat:3ymhwtfa4fbqlkdmueu4m4ljwq

Modified Transposition Using TDEA Encryption for FishCoral-PRSA Management System

Benedicto B. Balilo Jr., Ronnel R. Dioneda Sr., YungCheol Byun
2020 International Journal of Computing Sciences Research  
Purpose – The purpose of this study is to developed an encryption technique with a modified transposition technique using TDEA for FishCoral-PRSA Management Information System.  ...  Results – Businesses and organizations are providing security mechanisms to prevent security breaches or attacks to the system which could result in data loss and disruption of service with cost to the  ...  Participatory Resource and Socio-economic Assessment (PRSA) was funded by the Bureau of Fisheries and Aquatic Resources (BFAR) of the Department of Agriculture under the FishCoral Project in partnership with  ... 
doaj:3b8a8448bfab42cd8d081d3bd2893c70 fatcat:nhfttzg6ozamlh7m5wk6wpauli

Securing Digital Ledger Technologies-Enabled IoT Devices: Taxonomy, Challenges, and Solutions

Anastasios N. Bikos, Sathish A. P. Kumar
2022 IEEE Access  
With the faster maturity and stability of digitization, connectivity and edge technologies, the number of the Internet of Things (IoT) devices and sensors is flourishing fast in important junctions such  ...  However, in this extremely connected world, the security implications for IoT devices are getting worse with the constant rise in malicious cyberattacks.  ...  A deprecated IoT system will frequently lack support from an updated patch version of the DLT, other security concerns arise from the non-updated condition, so reliability and trust for DLT-IoT is at stake  ... 
doi:10.1109/access.2022.3169141 fatcat:dw663ddj2vbivnjouav6x4qfb4

Neural Network Based Message Concealment Scheme

Dr. Amol Dhakne, Prasann Shimpi, Sanket Halake, Shivam Dharmshetti, Shashank Singh
2022 International Journal for Research in Applied Science and Engineering Technology  
Abstract: Neural Cryptography is a new thread that integrates cryptography and neural networks for cryptanalysis and encryption applications.  ...  Good cryptography is secure because it employs extremely long keys and encryption techniques that are resistant to various types of attack.  ...  emergent field that aims to combine cryptography with Neural Networks for applications in cryptanalysis and encryption.  ... 
doi:10.22214/ijraset.2022.42522 fatcat:73poryu6zbbvddglyadn5vfqly

Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications

Mohammad Kamrul Hasan, Muhammad Shafiq, Shayla Islam, Bishwajeet Pandey, Yousef A. Baker El-Ebiary, Nazmus Shaker Nafi, R. Ciro Rodriguez, Doris Esenarro Vargas, Atif Khan
2021 Complexity  
However, it is essential to note that this convenience comes with a price that involves security vulnerabilities as IoT networks are prone to be interfered with by hackers who can access the sensor/communication  ...  As the world keeps advancing, the need for automated interconnected devices has started to gain significance; to cater to the condition, a new concept Internet of Things (IoT) has been introduced that  ...  because DEA is an underlying cryptographic algorithm. us, similar resistance to cryptanalysis of DES can be claimed for 3DES.  ... 
doi:10.1155/2021/5540296 fatcat:jou4awqmuvhuhop5g7avwfadwa

Making the Case for Elliptic Curves in DNSSEC

Roland van Rijswijk-Deij, Anna Sperotto, Aiko Pras
2015 Computer communication review  
The Domain Name System Security Extensions (DNSSEC) add authenticity and integrity to the DNS, improving its security. Unfortunately, DNSSEC is not without problems.  ...  This means DNS-SEC is more susceptible to packet fragmentation and makes DNSSEC an attractive vector to abuse in amplificationbased denial-of-service attacks.  ...  INTRODUCTION The Domain Name System (DNS) performs a critical function on the Internet, translating human readable names into IP addresses. The DNS was never designed with security in mind, though.  ... 
doi:10.1145/2831347.2831350 fatcat:uzjxdbnnxzby3j4p3hwjk2bwqu

Quo Vadis Qubit?

Dimitrios Schinianakis, Enrique Martin-Lopez
2018 Bell Labs technical journal  
Since 2008, in parallel with his PhD studies, he has been employed in Nokia, first as a Product Line Manager and then as Senior Security Researcher, focusing on IoT and 5G security strategies.  ...  and resistance against cryptanalysis carried out by quantum computers.  ...  At the beginning, LBC was associated with cryptanalysis failures, but persistent work paid off.  ... 
doi:10.15325/bltj.2018.2860381 fatcat:d7v4c3oawrdezdhu4s2lznuaru

SHA-1 is a Shambles: First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust

Gaëtan Leurent, Thomas Peyrin
2020 USENIX Security Symposium  
We exemplify our cryptanalysis by creating a pair of PGP/GnuPG keys with different identities, but colliding SHA-1 certificates.  ...  In this paper, we report the first practical implementation of this attack, and its impact on real-world security with a PGP/GnuPG impersonation attack.  ...  Acknowledgements The authors would like to thank Vesselin Velichkov for his help with regards to an initial analysis of neutral bits applicability on SHA-1 and Werner Koch for his comments on the applicability  ... 
dblp:conf/uss/LeurentP20 fatcat:ygb236nep5c3xcdvwtxrfxadia

Quick Tutorial on TPM 2.0 [chapter]

Will Arthur, David Challener, Kenneth Goldman
2015 A Practical Guide to TPM 2.0  
A hardware-based standardized security solution became imperative.  ...  by current cryptanalysis).  ... 
doi:10.1007/978-1-4302-6584-9_3 fatcat:jeoceqnknzch5hoz6rishrtkyi

Security and Privacy Challenges and Potential Solutions for DLT based IoT Systems

Santeri Paavolainen, Pekka Nikander
2018 2018 Global Internet of Things Summit (GIoTS)  
Some use cases may be outright impossible to implement securely, or in a privacy-retaining manner.  ...  The use of distributed ledger technologies introduces new security and privacy challenges. These challenges are dependent on properties of the ledgers, such as transaction latency and throughput.  ...  The goal is an extensible system that that has a lower cost structure than a standard blockchain design.  ... 
doi:10.1109/giots.2018.8534527 dblp:conf/giots/PaavolainenN18 fatcat:qs4w2sy3prgxhcnepfq5derbzy

Practical (Post-Quantum) Key Combiners from One-Wayness and Applications to TLS [article]

Nimrod Aviram, Benjamin Dowling, Ilan Komargodski, Kenneth G. Paterson, Eyal Ronen, Eylon Yogev
2022 IACR Cryptology ePrint Archive  
From an analytical standpoint, current security proofs model such key combiners as dual-PRFs -a function which is a PRF when keyed by either of its two inputs -guaranteeing pseudo-randomness if one of  ...  the keys is compromised or even maliciously chosen by an adversary.  ...  Assume that g is an injective (t, )-one way function, that F is a (t, )-computational-extractor with respect to g, that PRF is a standard (t, )-PRF, and that H is -regular.  ... 
dblp:journals/iacr/AviramDKPRY22 fatcat:6vtfrp6aa5bhdfgbm55byaxoam

Ethereum: State of Knowledge and Research Perspectives [chapter]

Sergei Tikhomirov
2018 Lecture Notes in Computer Science  
Ethereum Classic [Eth17c] is an alternative blockchain originating from a controversial Ethereum update.  ...  The stated is stored in a blockchain secured by a proof-of-work consensus mechanism similar to that in Bitcoin.  ...  Tokens are usually implemented with respect to the API defined in the ERC20 standard [Vog17] .  ... 
doi:10.1007/978-3-319-75650-9_14 fatcat:hypwhlvpzndmbllfqxytk4bj4y
« Previous Showing results 1 — 15 out of 64 results