Results 1 to 10 of about 8,344 (213)

EECDH to prevent MITM attack in cloud computing

open access: yesDigital Communications and Networks, 2019
Cloud computing has reached the peak of Gartner hype cycle, and now the focus of the whole telecom industry is the ability to scale data storage with minimal investment. But data privacy and communication issues will occur with the increment of the cloud
Shajina Anand, Varalakshmi Perumal
doaj   +2 more sources

Dataset of SCADA traffic captures from a medical waste incinerator with injected cyberattacksMendeley Data [PDF]

open access: yesData in Brief
This paper presents network traffic captures from a Supervisory Control and Data Acquisition (SCADA) system installed in a medical waste incinerator. The dataset comprises 14 daily packet capture files (day01.pcap to day14.pcap), collected over a two ...
Basheer Al-Duwairi   +3 more
doaj   +2 more sources

Linear Cancellations in the MitM Attacks on Sponge Functions

open access: yesIACR Transactions on Symmetric Cryptology
At EUROCRYPT 2023, Qin et al. proposed the MitM attack framework on sponge functions by separating the message bits into two sets of neutral bits.
Lingyue Qin   +5 more
doaj   +2 more sources

Ensuring the security of web applications operating on the basis of the SSL/TLS protocol [PDF]

open access: yesE3S Web of Conferences, 2023
SSL/TLS (Secure Socket Layer/Transport Layer Security)-enabled web applications are designed to provide authentication based on a public key certificate, as well as generating a secure session key and traffic privacy based on a symmetric key.
Razumov Pavel   +5 more
doaj   +1 more source

Improved MITM Cryptanalysis on Streebog

open access: yesIACR Transactions on Symmetric Cryptology, 2022
At ASIACRYPT 2012, Sasaki et al. introduced the guess-and-determine approach to extend the meet-in-the-middle (MITM) preimage attack. At CRYPTO 2021, Dong et al.
Jialiang Hua   +5 more
doaj   +1 more source

Classical and Quantum Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing

open access: yesIACR Transactions on Symmetric Cryptology, 2023
At EUROCRYPT 2006, Kelsey and Kohno proposed the so-called chosen target forced-prefix (CTFP) preimage attack, where for any challenge prefix P, the attacker can generate a suffix S such that H(P∥S) = y for some hash value y published in advance by the ...
Zhiyu Zhang   +3 more
doaj   +1 more source

New Low-Memory Algebraic Attacks on LowMC in the Picnic Setting

open access: yesIACR Transactions on Symmetric Cryptology, 2022
The security of the post-quantum signature scheme Picnic is highly related to the difficulty of recovering the secret key of LowMC from a single plaintext-ciphertext pair.
Fukang Liu   +3 more
doaj   +3 more sources

Meet‐in‐the‐middle attacks on round‐reduced CRAFT based on automatic search

open access: yesIET Information Security, 2023
CRAFT is a lightweight block cipher designed by Beierle et al. to effectively resist differential fault attacks at fast software encryption 2019. In this article, Demirci‐Selçuk meet‐in‐the‐middle (DS‐MITM) attacks on round‐reduced CRAFT based on ...
Zhangjun Ma, Manman Li, Shaozhen Chen
doaj   +1 more source

Man-in-the-Middle Attack Detection and Localization Based on Cross-Layer Location Consistency

open access: yesIEEE Access, 2020
As a promising communication paradigm in the 5G era, IEEE 802.11ad 60GHz mmWave communication has many desirable properties, including high bandwidth, narrow beam, high transmission quality, and low mutual-interference.
Yaoqi Yang   +5 more
doaj   +1 more source

MARINE: Man-in-the-middle attack resistant trust model IN connEcted vehicles [PDF]

open access: yes, 2020
Vehicular Ad-hoc NETwork (VANET), a novel technology holds a paramount importance within the transportation domain due to its abilities to increase traffic efficiency and safety.
Adnane, Asma   +4 more
core   +3 more sources

Home - About - Disclaimer - Privacy