نتایج جستجو برای: secret disclosure attack

تعداد نتایج: 121525  

2003
George Danezis

An improvement over the previously known disclosure attack is presented that allows, using statistical methods, to effectively deanonymize users of a mix system. Furthermore the statistical disclosure attack is computationally efficient, and the conditions for it to be possible and accurate are much better understood. The new attack can be generalized easily to a variety of anonymity systems be...

Journal: :IACR Cryptology ePrint Archive 2015
Romain Gay Iordanis Kerenidis Hoeteck Wee

We initiate a systematic treatment of the communication complexity of conditional disclosure of secrets (CDS), where two parties want to disclose a secret to a third party if and only if their respective inputs satisfy some predicate. We present a general upper bound and the first nontrivial lower bounds for conditional disclosure of secrets. Moreover, we achieve tight lower bounds for many int...

2005
Itsik Mantin

In this paper we revisit a known but ignored weakness of the RC4 keystream generator, where secret state info leaks to the generated keystream, and show that this leakage, also known as Jenkins’ correlation or the RC4 glimpse, can be used to attack RC4 in several modes. Our main result is a practical key recovery attack on RC4 when an IV modifier is concatenated to the beginning of a secret roo...

2003
MoonSang Kwon Yookun Cho

Normally computer users use a passphrase or a password to encrypt secret values in computer systems. In this case, to prevent the brute–force attack, the password should be long enough and difficult to guess. But, such kind of passwords are also difficult for the human beings to remember. In this paper, we propose a method for protecting secret keys. A secret key means secret value like the pas...

2017
Megan L. Johnson

This paper explores the ethical obligations of a therapist as it relates to the disclosure of an infidelity secret within the therapeutic setting. The ethical obligations of a therapist involving confidentiality and equal advocacy complicate the decision surrounding disclosure of infidelity secrets to the offended partner. The literature investigates the consequences to the pair bond relationsh...

2000
Glenn Durfee Phong Q. Nguyen

At Asiacrypt ’99, Sun, Yang and Laih proposed three RSA variants with short secret exponent that resisted all known attacks, including the recent Boneh-Durfee attack from Eurocrypt ’99 that improved Wiener’s attack on RSA with short secret exponent. The resistance comes from the use of unbalanced primes p and q. In this paper, we extend the Boneh-Durfee attack to break two out of the three prop...

Journal: :CoRR 2015
Béatrice Bérard Olga Kouchnarenko John Mullins Mathieu Sassolas

Given a probabilistic transition system (PTS) A partially observed by an attacker, and an ω-regular predicate φ over the traces of A, measuring the disclosure of the secret φ in A means computing the probability that an attacker who observes a run of A can ascertain that its trace belongs to φ. In the context of refinement, we consider specifications given as Interval-valued Discrete Time Marko...

2011
Jason Lin Chun-Wei Yang Chia-Wei Tsai Tzonelih Hwang

Recently, Li et al. [Phys. Rev. A, 82(2), 022303] presented two semi-quantum secret sharing (SQSS) protocols using GHZ-like states. The proposed schemes are rather practical because only the secret dealer requires to equip with advanced quantum devices such as quantum memory, whereas the other agents can merely perform classical operations to complete the secret sharing. However, this study poi...

2012
Bae-Ling Chen Wen-Chung Kuo Lih-Chyau Wuu

Sood, Sarje, and Singh recently proposed a secure dynamic identity-based (ID-based) authentication protocol for multi-server architectures utilizing smart cards, wherein they reveal security weaknesses of Hsiang and Shih’s dynamic identity-based remote user authentication scheme. Sood et al. claim their proposed scheme can provide protection from various attacks such as replay, malicious user, ...

2013
Guillaume Barbu Alberto Battistello Guillaume Dabosville Christophe Giraud Guénaël Renault Soline Renner Rina Zeitoun

This article introduces a new Combined Attack on a CRTRSA implementation resistant against Side-Channel Analysis and Fault Injection attacks. Such implementations prevent the attacker from obtaining the signature when a fault has been induced during the computation. Indeed, such a value would allow the attacker to recover the RSA private key by computing the gcd of the public modulus and the fa...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید