نتایج جستجو برای: malicious but passive key generation center attack

تعداد نتایج: 3071153  

Journal: :Information Technology and Management 2015
Andreas Ekelhart Elmar Kiesling Bernhard Grill Christine Strauss Christian Stummer

When designing secure information systems, a profound understanding of the threats that they are exposed to is indispensable. Today’s most severe risks come from malicious threat agents exploiting a variety of attack vectors to achieve their goals, rather than from random opportunistic threats such as malware. Most security analyses, however, focus on fixing technical weaknesses, but do not acc...

2011
Nazmus Sakib Fauzia Yasmeen Samiur Rahman Matiur Rahaman Matiur Rahaman Mian

Essential feature of New Generation Networks (NGN) is the availability of many new services offered by several different players. Different applications and services have their own authentication method and use different credentials, more reliable, flexible and easy-to-use methods are needed. In this paper we concern about different security vulnerabilities found in existing system and gives po...

Background & Objects: Health activities are known as one of the most important support areas for crisis management in all crises, especially military crisis, so the use of preventive measures in this type of activities in A time of peace has become vital. Passive defense as another branch of crisis management in the country, with the type of threat of war and competitive attack, which increases...

Journal: :journal of communication engineering 0
mohammad ehdaie parsa sharif research center nikolaos alexiou kth panos papadimitratos kth

sybil attacks pose a serious threat for wireless sensor networks (wsn) security. they can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. in a sybil attack,the attacker masquerades as multiple sensor identities, that are actually controlled by one or a few existing attacker nodes. sybil identities are fabricated out of stolen keys, obt...

2015
G. M. Rajasekar Mr. T. Parameswaran

1G.M. Rajasekar , 2Mr.T.Parameswaran 1&2 Dept. of CSE, Anna University Regional Centre, Coimbatore, India. 1. [email protected] 2. [email protected] Abstract— MANET plays a major role in next generation wireless networking technology. Information exchange in a mobile network without any infrastructure support, such networks are called Adhoc networks. This plays a major platform and used in ...

2007
Christophe Clavier Jean-Sébastien Coron

A side-channel analysis of a cryptographic algorithm generally concentrates on the encryption or decryption phases, rarely on the key generation phase. In this paper, we show that, when not properly implemented, the fast prime generation algorithm proposed by Joye and Paillier at CHES 2006 is susceptible to side-channel analysis; its main application is the generation of RSA key-pairs for embed...

2004
Ajmal S. Mian Raja Iqbal

A VPN establishes a secure network using the insecure media of the Internet. However, before a VPN can be established keys must be exchanged between the communicating peers. In this paper, we present the implementation details of the Arcanum key exchange protocol along with its experimental analysis. We simulated a number of active and passive attacks in order to test the robustness and efficie...

2009
Thomas Finke Max Gebhardt Werner Schindler

We introduce and analyze a side-channel attack on a straightforward implementation of the RSA key generation step. The attack exploits power information that allows to determine the number of the trial divisions for each prime candidate. Practical experiments are conducted, and countermeasures are proposed. For realistic parameters the success probability of our attack is in the order of 10–15 %.

2010
Fabien Herbaut Pierre-Yvan Liardet Nicolas Meloni Yannick Teglia Pascal Véron

Efficiency and security are the two main objectives of every elliptic curve scalar multiplication implementations. Many schemes have been proposed in order to speed up or secure its computation, usually thanks to efficient scalar representation [30,10,24], faster point operation formulae [8,25,13] or new curve shapes [2]. As an alternative to those general methods, authors have suggested to use...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید