Methods to Encrypt and Authenticate Digital Files in Distributed Networks and Zero-Trust Environments
نویسندگان
چکیده
The methods proposed in this paper are leveraging Challenge–Response–Pair (CRP) mechanisms that directly using each digital file as a source of randomness. Two use cases considered: the protection and verification authenticity information distributed storage nodes files kept terminal devices operating contested zero-trust environments comprised weak signals presence obfuscating electromagnetic noise. With nonces, message digests hashed can be unique unclonable; they act Physical Unclonable Functions (PUF)s challenge–response mechanisms. During enrollment, randomly selected “challenges” result output data known “responses” which enable generation distribution cryptographic keys. cycles, CRP repeated for proof deciphering. One main contributions is development accommodating injection noises to mitigate several vectors attacks, disturbing side channel analysis devices. method distribute error-free keys noisy networks with light computing elements without relying on heavy Error Correcting Codes (ECC), fuzzy extractors, or helpers.
منابع مشابه
HowTo Authenticate and Encrypt
Recently, various side-channel attacks on widely used encryption methods have been discovered. Extensive research is currently undertaken to develop new types of combined encryption and authentication mechanisms. Developers of security systems ask whether to implement methods recommended by international standards or to choose one of the new proposals. We explain the nature of the attacks and h...
متن کاملECAKP: Encrypt Collect Authenticate Kill Play
We are taught from a young age that plagiarism (copying other's work) is wrong. However, the problem of Illegal copies of multimedia data is exacerbated by the widespread availability of circumvention devices, which enable people to make infringing copies of multimedia data. Recently, Joint Video Compression and Encryption (JVCE) has gained increased attention to reduce the computational comple...
متن کاملAnalyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications
The products of graphic design applications leave behind traces of digital information which can be used during a digital forensic investigation in cases where counterfeit documents have been created. This paper analyzes the digital forensics involved in the creation of counterfeit documents. This is achieved by first recognizing the digital forensic artifacts left behind from the use of graphi...
متن کاملDisTriB: Distributed Trust Management Model Based on Gossip Learning and Bayesian Networks in Collaborative Computing Systems
The interactions among peers in Peer-to-Peer systems as a distributed collaborative system are based on asynchronous and unreliable communications. Trust is an essential and facilitating component in these interactions specially in such uncertain environments. Various attacks are possible due to large-scale nature and openness of these systems that affects the trust. Peers has not enough inform...
متن کاملDisTriB: Distributed Trust Management Model Based on Gossip Learning and Bayesian Networks in Collaborative Computing Systems
The interactions among peers in Peer-to-Peer systems as a distributed collaborative system are based on asynchronous and unreliable communications. Trust is an essential and facilitating component in these interactions specially in such uncertain environments. Various attacks are possible due to large-scale nature and openness of these systems that affects the trust. Peers has not enough inform...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Axioms
سال: 2023
ISSN: ['2075-1680']
DOI: https://doi.org/10.3390/axioms12060531