Analisis Serangan Pihak Ketiga pada Protokol Kesepakatan Kunci Diffie-Hellman
Penemuan protokol kesepakatan kunci Diffie-Hellman merupakan salah satu tonggak penting perkembangan kriptografi dengan menggunakan algoritma kunci publik.
Banu Wirawan Yohanes
doaj +1 more source
Efficient Key Exchange Using Identity-Based Encryption in Multipath TCP Environment
Across the globe, wireless devices with Internet facilities such as smartphones and tablets have become essential assets for communication and entertainment alike for everyday life for millions of people, which increases the network traffic and the ...
Ali Saeed Almuflih +5 more
doaj +1 more source
Achieving resist against DHCP man-in-the-middle attack scheme based on key agreement
In order to deal with the issue of the man-in-the-middle attack in the process of using dynamic host configuration protocol, a lightweight scheme was proposed.A new key agreement algorithm was developed based on public key cryptography to generate ...
Zhiqiang YAO, Zhirong ZHU, Guohua YE
doaj +2 more sources
Dynamic Secrets and Secret Keys Based Scheme for Securing Last Mile Smart Grid Wireless Communication [PDF]
An integrated and optimized smart grid cannot be achieved without a secure communication network. Due to the large-scale nature of the power system, the variety of technologies used, and limitations of communication bandwidth, supervisory applications ...
Grijalva, S., Saxena, N.
core +1 more source
In this study, the effectiveness of encrypted control systems in detecting attacks is experimentally demonstrated using a networked control system testbed that allows for man-in-the-middle (MITM) attacks.
Akane Kosugi +2 more
doaj +1 more source
DoubleCheck: Multi-path verification against man-in-the-middle attacks [PDF]
Self signed certificates for SSL and self generated hosts keys for SSH are popular zero cost, simple alternatives to public key infrastructure (PKI). They provide security against man in the middle attacks, as long as the the client connecting to those services knows the certificates or host keys a priori. A simple solution used in practice is to trust
Alicherry, Mansoor +1 more
openaire +2 more sources
Understanding Man-in-the-middle-attack through Survey of Literature
These days cyberattack is a serious criminal offense and it is a hotly debated issue moreover. A man-in-the-middle-attack (MITM) is a kind of cyberattack where an unapproved outsider enters into an online correspondence between two users, remains escaped
A. Mallik +3 more
doaj +1 more source
Multi-Photon Quantum Key Distribution Based on Double-Lock Encryption
This paper presents a multi-stage, multi-photon quantum key distribution protocol based on the double-lock cryptography. It exploits the asymmetry in the detection strategies between the legitimate users and the eavesdropper. The security analysis of the
Gottesman +6 more
core +1 more source
MPTCP robustness against large-scale man-in-the-middle attacks [PDF]
Abstract Multipath communications at the Internet scale have been a myth for a long time, with no actual protocol being deployed at large scale. Recently, the Multipath Transmission Control Protocol (MPTCP) extension was standardized and is undergoing rapid adoption in many different use-cases, from mobile to fixed access networks, from data-centers ...
Phung, Chi-Dung +3 more
openaire +2 more sources
Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid [PDF]
The BlackEnergy malware targeting critical infrastructures has a long history. It evolved over time from a simple DDoS platform to a quite sophisticated plug-in based malware. The plug-in architecture has a persistent malware core with easily installable
Khan, Rafiullah +4 more
core +1 more source

