EECDH to prevent MITM attack in cloud computing
Cloud computing has reached the peak of Gartner hype cycle, and now the focus of the whole telecom industry is the ability to scale data storage with minimal investment. But data privacy and communication issues will occur with the increment of the cloud
Shajina Anand, Varalakshmi Perumal
doaj +2 more sources
Dataset of SCADA traffic captures from a medical waste incinerator with injected cyberattacksMendeley Data [PDF]
This paper presents network traffic captures from a Supervisory Control and Data Acquisition (SCADA) system installed in a medical waste incinerator. The dataset comprises 14 daily packet capture files (day01.pcap to day14.pcap), collected over a two ...
Basheer Al-Duwairi +3 more
doaj +2 more sources
Linear Cancellations in the MitM Attacks on Sponge Functions
At EUROCRYPT 2023, Qin et al. proposed the MitM attack framework on sponge functions by separating the message bits into two sets of neutral bits.
Lingyue Qin +5 more
doaj +2 more sources
Ensuring the security of web applications operating on the basis of the SSL/TLS protocol [PDF]
SSL/TLS (Secure Socket Layer/Transport Layer Security)-enabled web applications are designed to provide authentication based on a public key certificate, as well as generating a secure session key and traffic privacy based on a symmetric key.
Razumov Pavel +5 more
doaj +1 more source
Improved MITM Cryptanalysis on Streebog
At ASIACRYPT 2012, Sasaki et al. introduced the guess-and-determine approach to extend the meet-in-the-middle (MITM) preimage attack. At CRYPTO 2021, Dong et al.
Jialiang Hua +5 more
doaj +1 more source
Classical and Quantum Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing
At EUROCRYPT 2006, Kelsey and Kohno proposed the so-called chosen target forced-prefix (CTFP) preimage attack, where for any challenge prefix P, the attacker can generate a suffix S such that H(P∥S) = y for some hash value y published in advance by the ...
Zhiyu Zhang +3 more
doaj +1 more source
New Low-Memory Algebraic Attacks on LowMC in the Picnic Setting
The security of the post-quantum signature scheme Picnic is highly related to the difficulty of recovering the secret key of LowMC from a single plaintext-ciphertext pair.
Fukang Liu +3 more
doaj +3 more sources
Meet‐in‐the‐middle attacks on round‐reduced CRAFT based on automatic search
CRAFT is a lightweight block cipher designed by Beierle et al. to effectively resist differential fault attacks at fast software encryption 2019. In this article, Demirci‐Selçuk meet‐in‐the‐middle (DS‐MITM) attacks on round‐reduced CRAFT based on ...
Zhangjun Ma, Manman Li, Shaozhen Chen
doaj +1 more source
Man-in-the-Middle Attack Detection and Localization Based on Cross-Layer Location Consistency
As a promising communication paradigm in the 5G era, IEEE 802.11ad 60GHz mmWave communication has many desirable properties, including high bandwidth, narrow beam, high transmission quality, and low mutual-interference.
Yaoqi Yang +5 more
doaj +1 more source
MARINE: Man-in-the-middle attack resistant trust model IN connEcted vehicles [PDF]
Vehicular Ad-hoc NETwork (VANET), a novel technology holds a paramount importance within the transportation domain due to its abilities to increase traffic efficiency and safety.
Adnane, Asma +4 more
core +3 more sources

