Methods to Encrypt and Authenticate Digital Files in Distributed Networks and Zero-Trust Environments

نویسندگان

چکیده

The methods proposed in this paper are leveraging Challenge–Response–Pair (CRP) mechanisms that directly using each digital file as a source of randomness. Two use cases considered: the protection and verification authenticity information distributed storage nodes files kept terminal devices operating contested zero-trust environments comprised weak signals presence obfuscating electromagnetic noise. With nonces, message digests hashed can be unique unclonable; they act Physical Unclonable Functions (PUF)s challenge–response mechanisms. During enrollment, randomly selected “challenges” result output data known “responses” which enable generation distribution cryptographic keys. cycles, CRP repeated for proof deciphering. One main contributions is development accommodating injection noises to mitigate several vectors attacks, disturbing side channel analysis devices. method distribute error-free keys noisy networks with light computing elements without relying on heavy Error Correcting Codes (ECC), fuzzy extractors, or helpers.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

HowTo Authenticate and Encrypt

Recently, various side-channel attacks on widely used encryption methods have been discovered. Extensive research is currently undertaken to develop new types of combined encryption and authentication mechanisms. Developers of security systems ask whether to implement methods recommended by international standards or to choose one of the new proposals. We explain the nature of the attacks and h...

متن کامل

ECAKP: Encrypt Collect Authenticate Kill Play

We are taught from a young age that plagiarism (copying other's work) is wrong. However, the problem of Illegal copies of multimedia data is exacerbated by the widespread availability of circumvention devices, which enable people to make infringing copies of multimedia data. Recently, Joint Video Compression and Encryption (JVCE) has gained increased attention to reduce the computational comple...

متن کامل

Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications

The products of graphic design applications leave behind traces of digital information which can be used during a digital forensic investigation in cases where counterfeit documents have been created. This paper analyzes the digital forensics involved in the creation of counterfeit documents. This is achieved by first recognizing the digital forensic artifacts left behind from the use of graphi...

متن کامل

DisTriB: Distributed Trust Management Model Based on Gossip Learning and Bayesian Networks in Collaborative Computing Systems

The interactions among peers in Peer-to-Peer systems as a distributed collaborative system are based on asynchronous and unreliable communications. Trust is an essential and facilitating component in these interactions specially in such uncertain environments. Various attacks are possible due to large-scale nature and openness of these systems that affects the trust. Peers has not enough inform...

متن کامل

DisTriB: Distributed Trust Management Model Based on Gossip Learning and Bayesian Networks in Collaborative Computing Systems

The interactions among peers in Peer-to-Peer systems as a distributed collaborative system are based on asynchronous and unreliable communications. Trust is an essential and facilitating component in these interactions specially in such uncertain environments. Various attacks are possible due to large-scale nature and openness of these systems that affects the trust. Peers has not enough inform...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Axioms

سال: 2023

ISSN: ['2075-1680']

DOI: https://doi.org/10.3390/axioms12060531