نتایج جستجو برای: man in the middle attack
تعداد نتایج: 21229460 فیلتر نتایج به سال:
Information has always been very valuable. Computers are entrusted to maintain and process massive amounts of information. This makes them valuable targets to attackers. One of the most devastating forms of attack is when an attacker gains access to the information without the victim even being aware of it. This paper explores some of the means by which this surreptitious access to information ...
The Kupyna hash function was selected as the new Ukrainian standard DSTU 7564:2014 in 2015. It is designed to replace the old Independent States (CIS) standard GOST 34.311-95. The Kupyna hash function is an AES-based primitive, which uses Merkle-Damg̊ard compression function based on Even-Mansour design. In this paper, we show the first cryptanalytic attacks on the round-reduced Kupyna hash func...
In a network system, numbers of systems are interconnected to each other, Inter connected systems examples are cloud computing servers, web servers, database servers etc. Now these networks are under risk of network attackers. In this project we introduce a new implementation for efficient accurate network traffic characterization by separating the geometrical correlation between network traffi...
The meet-in-the-middle (MITM) attack has prove to be efficient in analyzing the AES block cipher. Its efficiency has been increasing with the introduction of various techniques such as differential enumeration, key-dependent sieve, super-box etc. The recent MITM attack given by Li and Jin has successfully mounted to 10-round AES-256. Crypton is an AES-like block cipher. In this paper, we apply ...
A VPN establishes a secure network using the insecure media of the Internet. However, before a VPN can be established keys must be exchanged between the communicating peers. In this paper, we present the implementation details of the Arcanum key exchange protocol along with its experimental analysis. We simulated a number of active and passive attacks in order to test the robustness and efficie...
this research concentrates on the lithostratigraphy, biostratigraphy, microfacies and sedimentary environment of the asmari and gachsaran formations at southwest firuzabad. the thickness of the studied section in all 608.95 meters that 220.8 meters belong to the asmari formation and 387.95 meters belong to the gachsaran formation (champe and mol members). in the study area, the asmari formation...
the present paper offers a postcolonial reading of two of the best novels by v. s. naipaul – half a life and the mimic men – in five chapters. the focus of this research is on different notions of postcolonial criticism and their application on the two novels as discussed from homi bhabha’s and frantz fanons points of view. having introduced the life and literary career of v. s. naipaul in th...
The Next Steps In Signalling (NSIS) protocol suite represents an extensible framework for enabling various signalling applications over IP-based networks. The framework consists of two layers that need different types of security protection; the lower layer mainly deals with the discovery of adjacent peers and establishment of channel security to protect the delivery of signalling messages betw...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید