نتایج جستجو برای: passive key generation center attack

تعداد نتایج: 1271168  

2017
Shaanan Cohney Matthew D. Green Nadia Heninger

The ANSI X9.17/X9.31 random number generator is a pseudorandom number generator design based on a block cipher and updated using the current time. First standardized in 1985, variants of this PRNG design were incorporated into numerous cryptographic standards over the next three decades. It remained on the list of FIPS 140-1 and 140-2 approved random number generation algorithms until January 2...

Background & Objects: Health activities are known as one of the most important support areas for crisis management in all crises, especially military crisis, so the use of preventive measures in this type of activities in A time of peace has become vital. Passive defense as another branch of crisis management in the country, with the type of threat of war and competitive attack, which increases...

2013
Laszlo B. Kish Derek Abbott Claes G. Granqvist

2 Introduction 2 1.1 Is the security of quantum encryption indeed robust? 3 1.2 The KLJN secure key exchange system 4 1.1.1 The idealized KLJN scheme and its security 4 1.1.2 The security of the KLJN scheme is based on the Second Law of Thermodynamics 6 1.1.3 On active (invasive) attacks and attacks utilizing non-idealities 8 1.1.4 Foundations of the information theoretic security in practical ...

Journal: :Critical Care 2001
J David Roccaforte

This report describes selected aspects of the response by Bellevue Hospital Center to the World Trade Center attack of 11 September 2001. The hospital is 2.5 miles (4 km) from the site of the attack. These first-hand observations and this analysis may aid in future preparations. Key issues described relate to communication, organization, injuries treated, staffing, and logistics.

Journal: :IACR Cryptology ePrint Archive 2004
Guohong Xie

Noel McCullagh and Paulo S. L. M. Barreto[1] proposed a two-party identity-based key agreement protocol in 2004,which can be used in either escrowed or escrowless mode. They also described conditions under which users of different Key Generation Centres can agree on a shared secret key. In this paper, we show that these two protocols are insecure against the key compromis impersonate attack,and...

2014
Kwang-Sup Kim

The pseudo-passive is peculiar in that (i) the DP that appears to be the complement of a preposition undergoes passivization, and (ii) it is semantically characterized by the fact that it describes a resultant state or a characteristic of the Theme. The first peculiarity can be explained if the DP is not the complement of P but the complement of the V-P complex. However, the problem with this a...

Mahmoud Ahmadian Mohammad Ehdaie, Mohammad Reza Aref Nikos Alexiou Panos Papadimitratos,

Random Key Distribution (RKD) schemes have been widely accepted to enable low-cost secure communications in Wireless Sensor Networks (WSNs). However, efficiency of secure link establishment comes with the risk of compromised communications between benign nodes by adversaries who physically capture sensor nodes. The challenge is to enhance resilience of WSN against node capture, while maintainin...

Journal: :IACR Cryptology ePrint Archive 2011
Teruo Saito

KASUMI is a block cipher used in the confidentiality and integrity algorithms of the 3GPP (3rd Generation Partnership Project) mobile communications. In 2010, a related-key attack on full KASUMI was reported. The attack was very powerful and worked in practical complexity. However the attack was not a direct threat to full KASUMI because of the impractical assumptions related to the attack. The...

Journal: :IACR Cryptology ePrint Archive 2013
Junghyun Nam Kim-Kwang Raymond Choo Juryon Paik Dongho Won

This note reports major previously unpublished security vulnerabilities in the password-only authenticated three-party key exchange protocol due to Lee and Hwang (Information Sciences, 180, 1702–1714, 2010): (1) the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2) the protocol cannot protect clients’ passwords against an ...

Journal: :Intelligent Automation & Soft Computing 2012
Feng Xu Yuqi Zhu Hongxu Ma Bin Cai

Aiming at specific security threats in ad hoc network, this paper presents a bilinear pairings-based threshold identity authentication scheme without the trusted center. In this work, the security of certificate has been significantly enhanced by using improved GDH signature and interactive secret-sharing, that is, any attacker cannot forge a valid certificate for the untrusted nodes. The propo...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید