One-Way Cryptography

نویسندگان

  • Sandy Clark
  • Travis Goodspeed
  • Perry Metzger
  • Zachary Wasserman
  • Kevin Xu
  • Matt Blaze
چکیده

In a forthcoming paper[2], we examine the security of the APCO Project 25 (“P25”)[3] two-way digital voice radio system. P25 is a suite of digital protocols and standards designed for use in narrowband shortrange (VHF and UHF) land-mobile wireless two-way communications systems. The system is used by law enforcement, national security, public safety, and other government users in the United States and several other countries. Because two-way radio traffic is easily intercepted, P25 includes a number of security features, including encryption of voice and data under a variety of cipher algorithms and keying schemes. It is regarded as being sufficiently secure to carry highly sensitive traffic, including confidential law enforcement criminal surveillance operations and to support classified national security investigations, and is extensively used for these purpose by the various U.S. federal agencies that conduct such activities. A full review of the P25 protocols and security model is well beyond our scope (see our forthcoming paper). However, several protocol features will be relevant to us here:

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms

Advances in information and communication technologies lead to use of some new devices such as smart phones. The new devices provide more advantages for the adversaries hence with respect to them, one can define with-box cryptography. In this new model of cryptography, designers try to hide the key using as a kind of implementation. The Differential Computation Analysis (DCA) is a side channel ...

متن کامل

FUZZY OBSERVER DESIGN WITH n-SHIFT MULTIPLE KEY FOR CRYPTOGRAPHY BASED ON 3D HYPERCHAOTIC OSCILLATOR

A fuzzy observer based scheme for synchronizing two hyperchaoticoscillators via a scalar transmitted signal for cryptographic application isproposed. The Takagi-Sugeno fuzzy model exactly represents chaotic systems.Based on the general fuzzy model, the fuzzy observer of a chaotic system isdesigned on the basis of the n-shift multiple state based key encryption algorithm.The scalar transmitted s...

متن کامل

One Way Functions –Conjecture, Status, Applications and Future Research Scope

The conjecture that one way function exists is an open problem, the resolution of which holds the key for the solution of many unsolved problems in mathematics and cryptography. This paper presents the introduction of one way functions from complexity & modern cryptography theory viewpoint and their significance in cryptographic applications and research. This paper presents the features and li...

متن کامل

ID-based cryptography using symmetric primitives

A general method for deriving an identity-based public key cryptosystem from a one-way function is described. We construct both ID-based signature schemes and ID-based encryption schemes. We use a general technique which is applied to multi-signature versions of the one-time signature scheme of Lamport and to a public key encryption scheme based on a symmetric block cipher which we present. We ...

متن کامل

A Risk Minimisation Framework for Electronic Commerce

Various kinds of digital commerce depend on digital signatures, which are based on public-key cryptography and one-way hash functions. However, one-way hash functions have properties, which can be exploited to subvert security service. A framework in this paper gives a way to minimise such risks with paying attention to proper structuring (and consequently coding) of electronic documents and th...

متن کامل

On the Pixel Expansion of Hypergraph Access Structures in Visual Cryptography Schemes

In a visual cryptography scheme, a secret image is encoded into n shares, in the form of transparencies. The shares are then distributed to n participants. Qualified subsets of participants can recover the secret image by superimposing their transparencies, but non-qualified subsets of participants have no information about the secret image. Pixel expansion, which represents the number of subpi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011