5,081 Hits in 4.6 sec

Efficient Negative Databases from Cryptographic Hash Functions [chapter]

George Danezis, Claudia Diaz, Sebastian Faust, Emilia Käsper, Carmela Troncoso, Bart Preneel
Lecture Notes in Computer Science  
cryptographic hash functions or the hardness of the Discrete-Logarithm problem.  ...  A negative database is a privacy-preserving storage system that allows to efficiently test if an entry is present, but makes it hard to enumerate all encoded entries.  ...  Negative Databases from Cryptographic Hash Functions Cryptographic hash functions such as SHA-256 [14, 16] and RIPEMD-160 [7, 14] are widely used cryptographic primitives.  ... 
doi:10.1007/978-3-540-75496-1_28 fatcat:tybcaxzoivatzal7xaaimvgc5y

Strong Authentication using Encrypted Negative Password

Passwords are usually in the kind of hashed passwords.  ...  Because Passwords could also be leaked from weak systems. passwords that are given by a human is easy to identified and cracked.  ...  For a convenient and the safe arcanum the author proposed a hash password employing hash function based on a cryptographic method is more efficient to use the method directly from a hashed password to  ... 
doi:10.35940/ijitee.f4123.049620 fatcat:uzibq66d6bfrpipd6m7vz2fb4e

Privacy-Enhanced Robust Image Hashing with Bloom Filters

Uwe Breidenbach, Martin Steinebach, Huajian Liu
2021 Journal of Cyber Security and Mobility  
We choose a cryptographic hash function to one-way encrypt and store elements. The privacy of the inserted elements is thus protected.  ...  Robust image hashes are used to detect known illegal images, even after image processing.  ...  Acknowledgment This publication derived from the master thesis of the main author [34] , supervised by the additional authors. This work is partially taken from it, e.g.  ... 
doi:10.13052/jcsm2245-1439.1014 fatcat:hr326brs6zaa3dqgtduamkmrdm

Security Aspects of Piecewise Hashing in Computer Forensics

Harald Baier, Frank Breitinger
2011 2011 Sixth International Conference on IT Security Incident Management and IT Forensics  
As of today, in a pre-step process hash values of files are generated and stored in a database; typically a cryptographic hash function like MD5 or SHA-1 is used.  ...  Later the investigator computes hash values of files, which he finds on a storage medium, and performs look ups in his database.  ...  Anti-Blacklisting Anti-blacklisting means that we are able to efficiently generate false negatives from Kornblum's point of view. To explain this let a known-to-be-bad file F 1 be given.  ... 
doi:10.1109/imf.2011.16 dblp:conf/imf/BaierB11 fatcat:my7mmoofrzcrxhrbb62tuwk4ae

Privacy and Robust Hashes

Martin Steinebach, Sebastian Lutz, Huajian Liu
2020 Journal of Cyber Security and Mobility  
The advantage of a cryptographic hash function is in turn that its values do not allow any conclusions about the structure of an image.  ...  Cryptographic hash functions, on the other hand, create a unique bit-sensitive value. With these, no similarity measurement is possible, since only with exact agreement a picture is found.  ...  Cryptographic Hash We need a cryptographic hash function that hashes the preceding robust hashes.  ... 
doi:10.13052/jcsm2245-1439.914 fatcat:wq5xpbfvnrbqbdweazh6whyhgm

Hashing Techniques

Lianhua Chi, Xingquan Zhu
2017 ACM Computing Surveys  
Hashing techniques have also evolved from simple randomization approaches to advanced adaptive methods considering locality, structure, label information, and data security, for effective hashing.  ...  With the rapid development of information storage and networking technologies, quintillion bytes of data are generated every day from social networks, business transactions, sensors, and many other domains  ...  So cryptographically insecure hashing is often much more efficient than cryptographically secure hashing.  ... 
doi:10.1145/3047307 fatcat:u5asusjs7vdq7f3a6wgnesnodq

On the database lookup problem of approximate matching

Frank Breitinger, Harald Baier, Douglas White
2014 Digital Investigation. The International Journal of Digital Forensics and Incident Response  
Besides identifying exact duplicates, which is mostly solved using cryptographic hash functions, it is also helpful to detect similar data by applying approximate matching.  ...  In contrast, cryptographic hash values are stored within binary trees or hash tables and hence the lookup complexity of a single digest is O(log 2 (x)) or O(1), respectively.  ...  Efficiency in general Let S D denote the hashes of files from a device and let S B denote database set (i.e., the blacklist).  ... 
doi:10.1016/j.diin.2014.03.001 fatcat:gzuqav35xvavzgkngohtrlbut4

Open Sesame: The Password Hashing Competition and Argon2 [article]

Jos Wetzels
2016 arXiv   pre-print
In this document we present an overview of the background to and goals of the Password Hashing Competition (PHC) as well as the design of its winner, Argon2, and its security requirements and properties  ...  The initial measure aimed at limiting the impact of database breaches was the usage of cryptographic hash functions for password storage [7] where passwords aren't stored as plaintext but as a hash digest  ...  Cryptographic Security Collision resistance: In the initial stage inputs are processed by the hash function ℋ defined as the BLAKE2b function which is considered cryptographically secure.  ... 
arXiv:1602.03097v2 fatcat:cvsjzq4wifbp7kkcktsuiisy7a

Accountable certificate management using undeniable attestations

Ahto Buldas, Peeter Laud, Helger Lipmaa
2000 Proceedings of the 7th ACM conference on Computer and communications security - CCS '00  
Our main contribution is a model for accountable certificate management, where clients receive attestations confirming inclusion/removal of their certificates from the database of valid certificates.  ...  Moreover, authenticated search trees can be used in many security-critical applications instead of the (sorted) hash trees to reduce trust in the authorities, without decrease in efficiency.  ...  hash function is used.  ... 
doi:10.1145/352600.352604 dblp:conf/ccs/BuldasLL00 fatcat:nfa3npax6ngh3mtn7ihvohgoc4

Performance Issues About Context-Triggered Piecewise Hashing [chapter]

Frank Breitinger, Harald Baier
2012 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
As of today, in a pre-step process hash values of files are generated and stored in a database; typically a cryptographic hash function like MD5 or SHA-1 is used.  ...  Due to security properties of cryptographic hash functions, they can not be used to identify similar files.  ...  So his changes influence the efficiency in a negative way. Furthermore, Roussev used the cryptographic hash function MD5 for processing each chunk instead of the FNV-Hash.  ... 
doi:10.1007/978-3-642-35515-8_12 fatcat:zktbzo4tmvd3zjngrsgfsag6zi

Similarity hash based scoring of portable executable files for efficient malware detection in IoT

Anitta Patience Namanya, Irfan U. Awan, Jules Pagna Disso, Muhammad Younas
2019 Future generations computer systems  
This paper explores four hash types currently used in malware analysis for portable executable (PE) files.  ...  Although each hashing technique produces interesting results, when applied independently, they have high false detection rates.  ...  sum HFlag_set (H) The flag setting function for hash type, H PopHdb Populating Malicious files Hash Database Function HbDR Hash Based Comparison Detection Rates Function ic Hash of type, I, e.g  ... 
doi:10.1016/j.future.2019.04.044 fatcat:mnnxoxrnazfw3hosea3xjvciaq

Secure Login System using MD5 and AES Attribute Based Encryption Algorithm

In our system, first, the got plain secret key from a customer is worked out a cryptographic hash work. At that point; the hashed secret word is changed over into a negative secret word.  ...  The cryptographic hash work and symmetric encryption make it hard to split passwords from ENPs.We are going to use message digest i.e MD5 and AES algorithm for this purpose.  ...  By using cryptographic function that hashes the plain format of password and symmetric encryption we will try to make the system more secure and efficient. V.  ... 
doi:10.35940/ijitee.h6509.069820 fatcat:rpnxv7bppzchrehxrntxxcwqxi

BlockChain for Improved Platoon Security

2018 International Journal of Information Systems and Computer Sciences  
We have identified key protocols for a distributed cryptographic authentication among vehicles in transit within a platoon.  ...  Every block of the blockchain will contain cryptographic hash function for the former block as well as cryptographic hash function for the current data to be sent.  ...  The component labeled sorting and classification function will match the PK with the one PC already holds in its database of platoon formation.  ... 
doi:10.30534/ijiscs/2018/01722018 fatcat:o6iu22y6rna6bk53jpirdoe33a

Web Application Vulnerability Detection Using Hybrid String Matching Algorithm

B J. Santhosh Kumar, Kankanala Pujitha
2018 International Journal of Engineering & Technology  
The web application incorporates a rundown of cryptographic hashes of legitimate (trusted) client side contents. In the event that there is a cryptographic hash for the content in the white list.  ...  injecting the mischievous XSS assault vectors in such infusion focuses and check for these assaults in the helpless web application( Shashank Gupta 2015).The proposed application improve the false negative  ...  The web application includes a list of cryptographic hashes of valid (trusted) client side scripts.  ... 
doi:10.14419/ijet.v7i3.6.14950 fatcat:lclvekqoeze3zj2sn67sxbuyde

Designing an Algorithm to Preserve Privacy for Medical Record Linkage With Error-Prone Data

Doyel Pal, Tingting Chen, Sheng Zhong, Praveen Khethavath
2014 JMIR Medical Informatics  
In the Data Matching Module, for error-free data, our solution offered two different choices for cryptographic schemes.  ...  The experimental results showed that it is reliable and efficient. The design of our software is open so that the existing textual matching methods can be easily integrated into the system.  ...  Multimedia Appendix 1 Snapshot of selecting a function in our system. Multimedia Appendix 2 Snapshot of selecting a collaborator.  ... 
doi:10.2196/medinform.3090 pmid:25600786 pmcid:PMC4288117 fatcat:3gv3dpbhyvamxfghawipx4bwje
« Previous Showing results 1 — 15 out of 5,081 results