753 Hits in 7.5 sec

Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation

Steven Galbraith, Jake Massimo, Kenneth G. Paterson, Dongdai Lin, Kazue Sako
We consider the problem of constructing Diffie-Hellman (DH) parameters which pass standard approaches to parameter validation but for which the Discrete Logarithm Problem (DLP) is relatively easy to solve  ...  Our work shows the importance of performing proper (EC)DH parameter validation in cryptographic implementations and/or the wisdom of relying on standardised parameter sets of known provenance.  ...  We thank Matilda Backendal for comments on the paper and Richard G.E. Pinch for providing the data on Carmichael numbers used in Table 1.  ... 
doi:10.3929/ethz-b-000349422 fatcat:qsnjefehdjbfrcsqy7lw7hugvu

Finding Safety in Numbers with Secure Allegation Escrows [article]

Venkat Arun, Aniket Kate, Deepak Garg, Peter Druschel, Bobby Bhattacharjee
2019 arXiv   pre-print
(even in collusion with any number of other allegers).  ...  allegers only after de-anonymity thresholds (in terms of number of co-allegers), pre-specified by the allegers, are reached.  ...  feedback on the paper.  ... 
arXiv:1810.10123v2 fatcat:gqvwkhbbifecbncyebolmcpn6i

On the Security of IO-Link Wireless Communication in the Safety Domain [article]

Thomas R.Doebbert, Florian Fischer, Dominik Merli, Gerd Scholl
2022 arXiv   pre-print
A possible architecture for an IOLW safety layer has already been presented recently [1].  ...  Also, interference of security measures and functional safety principles within the communication are investigated, which do not necessarily complement one another but may also have contradictory requirements  ...  Heynicke of Helmut-Schmidt-University for their continuous support and rich discussions.  ... 
arXiv:2207.12938v3 fatcat:kvmotpgharcl5l23htlqiaxiuy

Secure and Guarantee QoS in a Video Sequence: A New Approach Based on TLS Protocol to Secure Data and RTP to Ensure Real-Time Exchanges

Hamza Touil, Nabil El Akkad, Khalid Satori
2021 International Journal of Safety and Security Engineering  
The so-called TLS (Transport Layer Security) handshake is often used for this task without obviating that many fundamental parameters of TLS connections are transmitted explicitly.  ...  On the other hand, QoS is considered the central part of the communication used to judge the deliverable quality through several parameters (latency, jitter ...).  ...  It uses Diffie-Hellman with hash algorithms and allows detection of man-in-the-middle (MiTM) attacks.  ... 
doi:10.18280/ijsse.110107 fatcat:cnmfov6vsvfohgbhayx4xad6ji


2019 Indonesian Journal of Electrical Engineering and Computer Science  
The feature of ECC is used to reduce the key size and the effectiveness of generating hexagonal numbers is used for minimizing the energy consumption in a resource constrained WSN environment.  ...  numbers.  ...  The intended scheme is a combination of Return Routability with Diffie-Hellman Key exchange and ECC with some more modification as it is meant for WSN [11] .  ... 
doi:10.11591/ijeecs.v15.i1.pp443-450 fatcat:6mgpgdb235dinm6uouwad45wki

Optimal Channel Security Against Fine-Grained State Compromise: The Safety of Messaging [chapter]

Joseph Jaeger, Igors Stepanovs
2018 Lecture Notes in Computer Science  
Beyond its use in the Signal messaging app, this protocol has been adopted by a number of other secure messaging apps.  ...  The systemization of knowledge paper on secure messaging [43] by Unger, Dechand, Bonneau, Fahl, Perl, Goldberg, and Smith evaluates and systematizes a number of secure messaging systems.  ...  Acknowledgments We thank Mihir Bellare for extensive discussion on preliminary versions of this paper. We thank the CRYPTO 2018 reviewers for their comments.  ... 
doi:10.1007/978-3-319-96884-1_2 fatcat:a4rmoi5htndqtc4zt5e2fzocri

A Joint Safety and Security Analysis of message protection for CAN bus protocol

Luca Dariz, Gianpiero Costantino, Massimiliano Ruggeri, Fabio Martinelli
2018 Advances in Science, Technology and Engineering Systems  
One of the prominent challenges of the automotive-transportation system is represented by the integration of security and safety properties within protocols, applications and connectivity mechanisms.  ...  This paper analyses an example of security and safety design, by combining integrity with encryption considering the constraints of a typical CAN protocol and real-time traffic.  ...  Acknowledgement This work has been partially supported by the GAUSS (MIUR, PRIN 2015) and by the H2020 EU funded NeCS (GA 675320).  ... 
doi:10.25046/aj030147 fatcat:gcchswlserbwxa2wwv2wpcw2bm

The price of safety in an active network

D. Scott Alexander, Paul B. Menage, Angelos D. Keromytis, William A. Arbaugh, Kostas G. Anagnostakis, Jonathan M. Smith
2001 Journal of Communications and Networks  
Namespace protection and type safety were achieved with a module loader for active networks, ALIEN, which carefully delineated boundaries for privilege and dynamic updates.  ...  The point at which programmability is exposed, e.g., through the loading and execution of code in network elements, must therefore be carefully crafted to ensure security.  ...  ACKNOWLEDGEMENTS We would like to thank Bill Marcus for his help in writing some of the original ANEP code, and Mike Hicks for the discussions and tools he provided us for performance analysis.  ... 
doi:10.1109/jcn.2001.6596875 fatcat:qv4mmtlsvzahzgt3ucxrkrkfwu

SE-GPSR: Secured and Enhanced Greedy Perimeter Stateless Routing Protocol for Vehicular Ad hoc Networks

Meriem Houmer, Mariya Ouaissa, Mariyam Ouaissa, Moulay Lahcen Hasnaoui
2020 International Journal of Interactive Mobile Technologies  
(ii) To deal with security issues, we have proposed a solution that combines between an improved Diffie-Hellman algorithm for reliable key exchange and the hash function based Message Authentication Code  ...  In Intelligent Transport Systems (ITS), Vehicular Ad-hoc Networks (VANET) play an essential role in improving road safety and traffic efficiency.  ...  Take for example for G the multiplicative group (Z/pZ) where p is a large prime number [13] . Figure 4 shows the Diffie Hellman key exchange process. Fig. 4.  ... 
doi:10.3991/ijim.v14i13.14537 fatcat:zsa42kx4l5gy7ncoihgvp73l6e

Elliptic Curve Diffie-Hellman (ECDH) Analogy for Secured Wireless Sensor Networks

Stephen Aikins-Bekoe, James Ben
2020 International Journal of Computer Applications  
The algorithm for Elliptic Curve Diffie Hellman key exchange is studied and analyzed using PyCryptodome package and the Elliptic Curve Integrated Encryption Scheme.  ...  Due to such circumstances, it is important to recognise the need for a holistic and robust security to ensure WSNs are well established and protected.  ...  Hence the method of Diffie-Hellman does not need a prior contact between both parties.  ... 
doi:10.5120/ijca2020920015 fatcat:3h4jh6p2bvcwblpi4ko6c6fcge

Efficient VANET safety message delivery and authenticity with privacy preservation

Taha M. Mohamed, Islam Z. Ahmed, Rowayda A. Sadek
2021 PeerJ Computer Science  
For cryptography algorithms, we combined symmetric and asymmetric key algorithms. The symmetric key was generated and exchanged without using the DiffieHellman (DH) protocol.  ...  The computational overhead for sending and receiving the non-safety message phase was reduced by 41.2% compared to other existed protocols.  ...  ADDITIONAL INFORMATION AND DECLARATIONS Funding The authors received no funding for this work. Competing Interests The authors declare that they have no competing interests.  ... 
doi:10.7717/peerj-cs.519 pmid:34013038 pmcid:PMC8114805 fatcat:hsdyoze37nhqbn2mxicqiq3dfy

Recent Development in Smart Grid Authentication Approaches: A Systematic Literature Review

Malik Qasaimeh, Raad S. Al-Qassas, Shadi Aljawarneh
2019 Cybernetics and Information Technologies  
This can serve as useful guidance for the development and deployment of authentication techniques for SG systems and helps practitioners select authentication approaches applicable to system needs.  ...  This paper also highlights the main requirements and challenges for developing authentication approaches for the SG system.  ...  In PS17 the proposed approach was based on Diffie-Hellman, using AES and RSA to meet its objectives.  ... 
doi:10.2478/cait-2019-0002 fatcat:hzuljrbaozhwdirfbk3db2l2re

An Efficient, Secure and Trusted Channel Protocol for Avionics Wireless Networks [article]

Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, Pierre-Francois Bonnefoi, Damien Sauveron, Serge Chaumette
2016 arXiv   pre-print
Avionics networks rely on a set of stringent reliability and safety requirements. In existing deployments, these networks are based on a wired technology, which supports these requirements.  ...  In this paper, we propose a secure and trusted channel protocol that satisfies the stated security and operational requirements for an AWN protocol. There are three main objectives for this protocol.  ...  In addition to the trusted boot, for robust and reliable security we need to look into secure execution on AWN nodes -especially investigating the inclusion of ARM TrustZone and Intel SGX technologies.  ... 
arXiv:1608.04116v2 fatcat:zl6tici2tvfxzpq3tlb2bcwldi

Revocation Protocol for Group Signatures in VANETs: A Secure Construction

2020 KSII Transactions on Internet and Information Systems  
In this paper, we address the problem by constructing a revocation protocol particularly for group signatures in VANETs.  ...  In order to protect VANETs against misbehaviours, one of the vital security requirements is to revoke the misbehaved vehicles from the network.  ...  We adopt proof technique similar to that used in [11] since the construction of protocol is based on similar computational assumptions i.e. the Diffie-Hellman Knowledge (DHK) assumption.  ... 
doi:10.3837/tiis.2020.01.017 fatcat:crq35edsanhsvlxmsbqumihq5e

Post-Quantum Secure Remote Password Protocol from RLWE Problem [chapter]

Xinwei Gao, Jintai Ding, Jiqiang Liu, Lin Li
2018 Lecture Notes in Computer Science  
However, Diffie-Hellman and other unauthenticate key exchange protocols are vulnerable to Man-In-The-Middle (MITM) attack, where an adversary in the middle between communicating parties can intercept and  ...  With the ground-breaking Diffie-Hellman key exchange proposed in 1976 [14] , public key cryptography came into reality and it has been widely deployed in real world applications.  ...  Acknowledgement We would like to thank anonymous reviewers for valuable feedbacks.  ... 
doi:10.1007/978-3-319-75160-3_8 fatcat:aboktgxcmvghrmxaespm4wnpbe
« Previous Showing results 1 — 15 out of 753 results