Comment on the Public Key Substitution Attacks
نویسندگان
چکیده
In this paper we present a comment on some previous works about the Public Key Substitution Attacks (PKSA in brief). Though there exist some security flaws for the schemes being attacked, we point out that these attacks on them are either trivial or avoidable after a little modification.
منابع مشابه
Key - Substitutable Signature and its Application to Certified Signature
The key substitution property is introduced by Blake-Wilson and Menezes [1] and formalized by Menezes and Smart [8] as attacks. The key substitution property is as follow: another person other than true signer can produce another public (and secret) key such that a message and signature pair created by the signer is valid under the public key. The research of the key substitution attacks [8, 6,...
متن کاملSelf-Guarding Cryptographic Protocols against Algorithm Substitution Attacks
We put forward the notion of self-guarding cryptographic protocols as a countermeasure to algorithm substitution attacks. Such self-guarding protocols can prevent undesirable leakage by subverted algorithms if one has the guarantee that the system has been properly working in an initialization phase. Unlike detection-based solutions they thus proactively thwart attacks, and unlike reverse firew...
متن کاملAdvancing Public Health on the Changing Global Trade and Investment Agenda; Comment on “The Trans-Pacific Partnership: Is It Everything We Feared for Health?”
Concerns regarding the Trans-Pacific Partnership (TPP) have raised awareness about the negative public health impacts of trade and investment agreements. In the past decade, we have learned much about the implications of trade agreements for public health: reduced equity in access to health services; increased flows of unhealthy commodities; limits on access to medicines; and constrained policy...
متن کاملA New Framework for Scalable Secure Block Cipher Generation using Color Substitution and Permutation on Characters, Numbers, Images and Diagrams
The aim of our research is to develop a new framework for secure block cipher generation using color substitution and permutations on alphanumeric letters, symbols, images, diagrams or any kind of text. To transfer the keys from source to destination we have used RSA public key algorithm and for encryption / decryption of the information, we have used our invented „play color substitution‟ algo...
متن کاملInequities in the Freedom to Lead a Flourishing and Healthy Life: Time for a Progressive Social Protections Framework; Comment on “Inequities in the Freedom to Lead a Flourishing and Healthy Life: Issues for Healthy Public Policy”
Evidence now shows that the key drivers of poor health are social factors, such as education, employment, housing and urban environments. Variations in these social factors—or the conditions in which we live our lives—have lead to a growth in health inequalities within and between countries. One of the key challenges facing those concerned with health equity is how to effect change across the b...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- I. J. Network Security
دوره 1 شماره
صفحات -
تاریخ انتشار 2005