Attacks and Defenses for Single-Stage Residue Number System PRNGs
نویسندگان
چکیده
This paper explores the security of a single-stage residue number system (RNS) pseudorandom generator (PRNG), which has previously been shown to provide extremely high-quality outputs when evaluated through available RNG statistical test suites or in using Shannon and Kolmogorov entropy metrics. In contrast, rather than blindly performing analyses on RNS PRNG, this provides both white box black that facilitate reverse engineering underlying generation algorithm obtain residues, equivalently key, algorithm. We develop demonstrate conditional analysis permits extraction key given priori knowledge state transitions as well PRNG parameters (but not key) problems where multiplicative characteristic is too large transitions. then discuss multiple defenses perturbations for fool original attack algorithm, including deliberate noise injection code hopping. present modification accounts noise, but rapidly increases search space complexity. Lastly, we memory requirements time required attacker defender maintain these defenses.
منابع مشابه
Clickjacking: Attacks and Defenses
Clickjacking attacks are an emerging threat on the web. In this paper, we design new clickjacking attack variants using existing techniques and demonstrate that existing clickjacking defenses are insufficient. Our attacks show that clickjacking can cause severe damages, including compromising a user’s private webcam, email or other private data, and web surfing anonymity. We observe the root ca...
متن کاملPassword Managers: Attacks and Defenses
We study the security of popular password managers and their policies on automatically filling in Web passwords. We examine browser built-in password managers, mobile password managers, and 3rd party managers. We observe significant differences in autofill policies among password managers. Several autofill policies can lead to disastrous consequences where a remote network attacker can extract ...
متن کاملClassifying RFID attacks and defenses
RFID (Radio Frequency Identification) systems are one of the most pervasive computing technologies with technical potential and profitable opportunities in a diverse area of applications. Among their advantages is included their low cost and their broad applicability. However, they also present a number of inherent vulnerabilities. This paper develops a structural methodology for risks that RFI...
متن کاملSmart-Phone Attacks and Defenses
Internet has been permeating into every corner of the world and every aspect of our lives, empowering us with anywhere, anytime remote access and control over information, personal communications (e.g., through smart-phones), and our environment (e.g., through the use of sensors, actuators, and RFIDs). While enabling interoperation with the Internet brings tremendous opportunities in service cr...
متن کاملCertified Defenses for Data Poisoning Attacks
Machine learning systems trained on user-provided data are susceptible to data poisoning attacks, whereby malicious users inject false training data with the aim of corrupting the learned model. While recent work has proposed a number of attacks and defenses, little is understood about the worst-case loss of a defense in the face of a determined attacker. We address this by constructing approxi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Iot
سال: 2021
ISSN: ['2624-831X']
DOI: https://doi.org/10.3390/iot2030020