22 Hits in 4.6 sec

Dependence in IV-Related Bytes of RC4 Key Enhances Vulnerabilities in WPA [chapter]

Sourav Sen Gupta, Subhamoy Maitra, Willi Meier, Goutam Paul, Santanu Sarkar
2015 Lecture Notes in Computer Science  
We notice that the correlations of the keystream bytes with publicly known IV values of WPA potentially strengthen the practical plaintext recovery attack on the protocol.  ...  Our result on the nature of the first keystream byte provides a significantly improved distinguisher for RC4 used in WPA than what had been presented by Sepehrdad et al. (2011-12).  ...  recovery attack on WPA.  ... 
doi:10.1007/978-3-662-46706-0_18 fatcat:xbashw4gkbeedbsxmyvmgddnmm

Cryptanalysis of the Full Spritz Stream Cipher [chapter]

Subhadeep Banik, Takanori Isobe
2016 Lecture Notes in Computer Science  
In the second part of the paper, we look at a state recovery attack on Spritz, in a special situation when the cipher enters a class of weak states.  ...  These biases are also useful in the event of plaintext recovery in a broadcast attack.  ...  Finally, in 2013, practical plaintext recovery attacks on RC4 in SSL/TLS were proposed by AlFardan et al. [1] and Isobe et al. [10] .  ... 
doi:10.1007/978-3-662-52993-5_4 fatcat:ovvrjj232nfgrkuahuhnvhea7u

Analysis of RC4 and Proposal of Additional Layers for Better Security Margin [chapter]

Subhamoy Maitra, Goutam Paul
2008 Lecture Notes in Computer Science  
Based on our analysis and the results available in literature regarding the existing weaknesses of RC4, few additional layers over the RC4 KSA and RC4 Pseudo-Random Generation Algorithm (PRGA) are proposed  ...  Analysis of the modified cipher (we call it RC4 + ) shows that this new strategy avoids existing weaknesses of RC4.  ...  In addition to the permutation recovery attacks [12, 35, 21] , there exist several other works [7, 5, 24, 15-18, 28, 29] on the weaknesses of the RC4 PRGA.  ... 
doi:10.1007/978-3-540-89754-5_3 fatcat:6qzzycz66zhajdib3ffzxdxj4a

Analysis Methods for (Alleged) RC4 [chapter]

Lars R. Knudsen, Willi Meier, Bart Preneel, Vincent Rijmen, Sven Verdoolaege
1998 Lecture Notes in Computer Science  
The complexity of one of the attacks is estimated to be less than the time of searching through the square root of all possible initial states.  ...  The security of the alleged RC4 stream cipher and some variants is investigated.  ...  The cryptanalytic algorithms in this paper exploit the combinatorial nature of RC4 and allow to find the initial table, i.e., the state at time t = 0.  ... 
doi:10.1007/3-540-49649-1_26 fatcat:yufuodhsozgxtfiarwjlowa3ii

Recent Developments in the Design of Conventional Cryptographic Algorithms [chapter]

Bart Preneel, Vincent Rijmen, Antoon Bosselaers
1998 Lecture Notes in Computer Science  
The goal of the paper is to provided a technical perspective on the wide variety of primitives that exist today.  ...  The software performance of about twenty primitives is compared based on highly optimized implementations for the Pentium.  ...  A.3 Block ciphers The following abbreviations are used: A key recovery attack on four rounds is described in [64] .  ... 
doi:10.1007/3-540-49248-8_4 fatcat:ifsnr5zxk5fo3gwbex32pgpnhm

Security of Symmetric Encryption against Mass Surveillance [chapter]

Mihir Bellare, Kenneth G. Paterson, Phillip Rogaway
2014 Lecture Notes in Computer Science  
The lesson that emerges is the danger of choice: randomized, stateless schemes are subject to attack while deterministic, stateful ones are not.  ...  The focus is on algorithm-substitution attacks (ASAs), where a subverted encryption algorithm replaces the real one.  ...  The RC4 stream cipher is also an option in all versions of SSL/TLS. Here, the algorithm is stateful, with the RC4 internal state being carried over from one message to the next on a TLS connection.  ... 
doi:10.1007/978-3-662-44371-2_1 fatcat:k7wqqsx3mffyvkooo7ttgoairy

Chosen IV cryptanalysis on reduced round ChaCha and Salsa

Subhamoy Maitra
2016 Discrete Applied Mathematics  
We systematically show how a single difference propagates after one round and how the differences can be reduced with proper choices of IVs.  ...  In this paper, first we revisit the work of Aumasson et al to provide a clearer insight of the existing attack (2 248 complexity for ChaCha7, i.e., 7 rounds) and showing certain improvements (complexity  ...  -Apply some input difference at the initial state and then investigate for biases at some output.  ... 
doi:10.1016/j.dam.2016.02.020 fatcat:jn2as23g3zcjrj4wmzumted5lu

Performance Improvement Techniques for Customized Data Warehouse

Md. Al Mamun
2013 IOSR Journal of Computer Engineering  
The result of simple classification technique (using random tree classifier) is compared with the result of rough set attribute reduction performed based on Rule induction and decision tree.  ...  This paper brings out a conclusion that the missing data simply ignored yields best decision than filling some data in the place of missing attribute value.  ...  Acknowledgments This work was presented in part at the IEEE International Conference on Communications (ICC), 2009.  ... 
doi:10.9790/0661-0930105 fatcat:ds3t4hys75fdpnsne4mu77i67y

Cybersecurity Challenges Associated with the Internet of Things in a Post-Quantum World

Ohood Althobaiti, Mischa Dohler
2020 IEEE Access  
Our results prove the existence of multiple vulnerabilities in the current IoT architecture and implementations.  ...  ACKNOWLEDGEMENT This study is part of this research project "Quantum-Resistant Cryptography for the Internet of Things based on Location-Based Lattices" at King's College London.  ...  Because of the tremendous combinatorial speed of the quantum computers, which act in a superposition state where the state can be zero and one simultaneously (quantum bit), combinatorial problems are solved  ... 
doi:10.1109/access.2020.3019345 fatcat:5h7ac7zngvazndjyhemkco6hhi

Sensor network security: a survey

Xiangqian Chen, Kia Makki, Kang Yen, Niki Pissinou
2009 IEEE Communications Surveys and Tutorials  
In this paper, we identify the threats and vulnerabilities to WSNs and summarize the defense methods based on the networking protocol layer analysis first.  ...  These issues are divided into seven categories: cryptography, key management, attack detections and preventions, secure routing, secure location security, secure data fusion, and other security issues.  ...  Based on the comparing result, the system makes a decision whether the given node is attacked or not.  ... 
doi:10.1109/surv.2009.090205 fatcat:qcm4ieoqwrdl7ezxffdsdfyk3e

MRD Hashing [chapter]

Rei Safavi-Naini, Shahram Bakhtiari, Chris Charnes
1998 Lecture Notes in Computer Science  
We place an electronic version of this journal in the public domain one year after publication.  ...  Conference proceedings from which only one or two papers have been abstracted are cited inline in the review.  ...  In this paper, some optimal security bounds are proven, together with some special results for quadrics. 9 Book Reviews PRIVACY ON THE LINE' Whit eld Di e, Susan Landau MIT Press, 1998; ISBN 0-262  ... 
doi:10.1007/3-540-69710-1_10 fatcat:mezaspbmk5c4nhu227gayoeejq

Data Storing in Multitenant Clouds using Split and Merge Method

Aswini. S, Prasanna. S
2018 International Journal of Trend in Scientific Research and Development  
Each ant build their own individual result set and it is later on built into a complete solution. The ant continuously updates a single result set rather than updating their own result set.  ...  A load balancing algorithm which is dynamic in nature does not consider the previous state or behavior of the system, that is, it depends on the present behavior of the system.  ... 
doi:10.31142/ijtsrd9609 fatcat:bsh6q62q6fd5recwaro47tgfxm

Security issues in cloud environments: a survey

Diogo A. B. Fernandes, Liliana F. B. Soares, João V. Gomes, Mário M. Freire, Pedro R. M. Inácio
2013 International Journal of Information Security  
It addresses several key topics, namely vulnerabilities, threats and attacks, proposing a taxonomy for their classification.  ...  It also contains a thorough review of the main concepts concerning the security state of cloud environments and discusses several open research topics.  ...  An example of an attack on Axis web services was presented, which resulted in an out-of-memory exception.  ... 
doi:10.1007/s10207-013-0208-7 fatcat:55o67epb6zfspchxuzvuduzr4a

Wireless Sensor Network Security

An Liu, Mihui Kim, Leonardo B. Oliveira, Hailun Tan
2013 International Journal of Distributed Sensor Networks  
In the following, we first give some background on physical attacks on sensor node hardware. Then we report on the effort needed to attack some current sensor nodes.  ...  Very similar approaches based on combinatorial design theory are proposed in [33] .  ...  On the other hand, they present a considerable complexity, which results in a  ... 
doi:10.1155/2013/362385 fatcat:2ph46uukonbtbdkc5q6t4mvgcq

Sensor Networks for High-Confidence Cyber-Physical Systems

Feng Xia, Tridib Mukherjee, Yan Zhang, Ye-Qiong Song
2011 International Journal of Distributed Sensor Networks  
In the paper "Link prediction and route selection based on channel state detection in UASNs," J.  ...  They then give an overview on some interesting mechanisms used in existing adaptive and real-time protocols in compliance with IEEE 802.15.4.  ...  Acknowledgments The work described in this paper is based on results of the WSAN4CIP Project (, which receives research funding from the European Community's 7th Framework Programme  ... 
doi:10.1155/2011/245734 fatcat:lswungc2orda5pcqvpyqu7vrna
« Previous Showing results 1 — 15 out of 22 results