نتایج جستجو برای: passive key generation center attack

تعداد نتایج: 1271168  

2004
Jai-Boo Oh Eun-Jun Yoon Kee-Young Yoo

In this paper, we describe a new ID-based authenticated key agreement protocol that makes use of bilinear pairings. We then discuss the security properties of our scheme, including known-key security, perfect forward secrecy and no key control. It is also able to withstand both passive and active attacks. An important advantage of our scheme is that it preserves the perfect forward secrecy even...

2012
Sonia Mihaela Bogos Serge Vaudenay

In this article we present a lattice attack done on a NTRU-like scheme introduced by Verkhovsky in [1]. We show how, based on the relation between the public and private key, we can construct an attack which allows any passive adversary to decrypt the encrypted messages. We explain, step by step, how an attacker can construct an equivalent private key and guess what the original plaintext was. ...

2013
Wei Yuan Liang Hu Hongtu Li Jianfeng Chu

Recently Harn and Lin proposed a novel authenticated group key transfer protocol that a mutually trusted key generation center (KGC) can broadcast group key information to all group members at once and only authorized group members can recover the group key. This paper presents that Harn and Lin’s protocol can not withstand man-in-the-middle attack and describes the reasons and detailed process...

2002
Adam Stubblefield John Ioannidis Aviel D. Rubin

We implemented an attack against WEP, the link-layer security protocol for 802.11 networks. The attack was described in a recent paper by Fluhrer, Mantin, and Shamir. With our implementation, and permission of the network administrator, we were able to recover the 128 bit secret key used in a production network, with a passive attack. The WEP standard uses RC4 IVs improperly, and the attack exp...

Journal: :IACR Cryptology ePrint Archive 2013
Bo Yang Zhao Yang Zibi Xiao Shougui Li

Certificateless public key cryptography is an attractive paradigm since it eliminates the use of certificates in traditional public key cryptography and alleviates the inherent key escrow problem in identity-based cryptography. Recently, Xiong et al. proposed a certificateless signature scheme and proved that their scheme is existentially unforgeable against adaptive chosen message attack under...

Journal: :Information 2021

A profiling attack is a powerful variant among the noninvasive side channel attacks. In this work, we target RSA key generation relying on binary version of extended Euclidean algorithm for modular inverse and GCD computations. To date, has only been exploited by simple power analysis; therefore, countermeasures described in literature are focused mitigating kind attack. We demonstrate that one...

Journal: :IACR Cryptology ePrint Archive 2015
Pouyan Sepehrdad Petr Susil Serge Vaudenay Martin Vuagnoux

In this paper, we construct several tools for building and manipulating pools of biases in the analysis of RC4. We report extremely fast and optimized active and passive attacks against IEEE 802.11 wireless communication protocol WEP and a key recovery and a distinguishing attack against WPA. This was achieved through a huge amount of theoretical and experimental analysis (capturing WiFi packet...

2005
Ivan Damgård Kasper Dupont

We propose techniques that allow construction of robust threshold RSA signature schemes that can work without a trusted dealer using known key generation protocols and is as efficient as the best previous schemes. We do not need special conditions on the RSA modulus, extra complexity or set-up assumptions or random oracles. An “optimistic” variant of the scheme is even more efficient in case no...

2013

We propose a new unidirectional proxy re-encryption scheme based on lattices. Our construction is collusion-safe and does not require any trusted authority for the re-encryption key generation. We extend a recent trapdoor definition for a lattice of Micciancio and Peikert. Our proxy re-encryption scheme is provably CCA-1 secure in the selective model under the standard assumption.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید