Changes in Guesswork over Time in Multi-processor Attacks
نویسندگان
چکیده
More and more effort is being spent on security improvements in today’s computer networking environments. However, due to the nature of computer security, there is still a lack of good quantitative assessment methods. Inventing and developing new ways of measuring security are therefore needed in order to more exactly describe, assess, and improve the security of computer environments. One existing quantitative security measure is guesswork. Guesswork gives the average number of guesses in a brute force attack to succeed in breaking an encrypted message. In the current definition of guesswork, it is assumed that the attacker uses a single processor when breaking an encrypted message. An intelligent and motivated attacker will however likely use several processors that run in parallel. This paper formally investigates how guesswork changes over time in multi-processor attacks. The result is applied to three probability distributions, the English alphabet, the geometric and the truncated geometric, in order to illustrate some behaviors.
منابع مشابه
Proposed Feature Selection for Dynamic Thermal Management in Multicore Systems
Increasing the number of cores in order to the demand of more computing power has led to increasing the processor temperature of a multi-core system. One of the main approaches for reducing temperature is the dynamic thermal management techniques. These methods divided into two classes, reactive and proactive. Proactive methods manage the processor temperature, by forecasting the temperature be...
متن کاملFile-based Race Condition Attacks on Multiprocessors Are Practical Threat
TOCTTOU (Time-of-Check-to-Time-of-Use) attacks exploit race conditions in file systems. Although TOCTTOU attacks have been known for 30 years, they have been considered “low risk” due to their typically low probability of success, which depends on fortuitous interleaving between the attacker and victim processes. For example, recent discovery of TOCTTOU vulnerability in vi showed a success rate...
متن کاملAn approach to Improve Particle Swarm Optimization Algorithm Using CUDA
The time consumption in solving computationally heavy problems has always been a concern for computer programmers. Due to simplicity of its implementation, the PSO (Particle Swarm Optimization) is a suitable meta-heuristic algorithm for solving computationally heavy problems. However, despite the simplicity, the algorithm is inefficient for solving real computationally heavy problems but the pr...
متن کاملAn Effective Hybrid Genetic Algorithm for Hybrid Flow Shops with Sequence Dependent Setup Times and Processor Blocking
Hybrid flow-shop or flexible flow shop problems have remained subject of intensive research over several years. Hybrid flow-shop problems overcome one of the limitations of the classical flow-shop model by allowing parallel processors at each stage of task processing. In many papers the assumptions are generally made that there is unlimited storage available between stages and the setup times a...
متن کاملSensitivity Analysis in the QUALIFLEX and VIKOR Methods
The sensitivity analysis for multi-attribute decision making (MADM) problems is important for two reasons: First, the decision matrix as the source of the results of a decision problem is inaccurate because it sorts the alternatives in each criterion inaccurately. Second, the decision maker may change his opinions in a time period because of changes in the importance of the criteria and in the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012