Cryptography: Salvaging Exploitations against Data Integrity
نویسندگان
چکیده
منابع مشابه
Kleptography: Using Cryptography Against Cryptography
The notion of a Secretly Embedded Trapdoor with Universal Protection (SETUP) has been recently introduced. In this paper we extend the study of stealing information securely and subliminally from black-box cryptosystems. The SETUP mechanisms presented here, in contrast with previous ones, leak secret key information without using an explicit subliminal channel. This extends this area of threats...
متن کاملCryptography Against Continual Memory Leakage
Recall from last lecture that we have several ways to model leakage. One model is “only computation leaks” by Micali and Reyzin [11], which assumes a form of secure memory that does not leak as long as no computation is done on the data. Another one is “memory leakage” by Akavia, Goldwasser, and Vaikuntanathan [1], which assumes that everything can leak information. From an orthogonal dimension...
متن کاملSalvaging Information Engineering Techniques in the Data Warehouse Environment
The art of Information Engineering (IE) continuously evolves and, by today's standards, is considered an integral function in most any organization. Strategic planning teams weave methodologies, which are integrated to process information, the goal being to sort, store, and retrieve useful data. The following article will describe three techniques that can utilize existing information engineeri...
متن کاملA Trend Analysis of Exploitations
We have conducted an empirical study of a number of computer security exploits and determined that the rates at which incidents involving the exploit are reported to the CERT can be modeled using a common mathematical framework. Data associated with three significant exploits involving vulnerabilities in phf, imap, and bind can all be modeled using the formula C = I + S pM where C is the cumula...
متن کاملCryptography in Data Compression
This paper describes cryptographic methods for concealing information during data compression processes. These include novel approaches of adding pseudo random shuffles into the processes of dictionary coding (Lampel-Ziv compression), arithmetic coding, and Huffman coding. An immediate application of using these methods to provide multimedia security is proposed.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: American Journal of Networks and Communications
سال: 2013
ISSN: 2326-893X
DOI: 10.11648/j.ajnc.20130202.14