Results 21 to 30 of about 8,344 (213)

Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK

open access: yesIET Information Security, 2023
Randomized butterfly architecture of fast Fourier transform for key cipher (RBFK) is the lightweight block cipher for Internet of things devices in an edge computing environment.
Sugio Nobuyuki
doaj   +1 more source

Man‐in‐the‐middle attacks and defence in a power system cyber‐physical testbed

open access: yesIET Cyber-Physical Systems, 2021
Man‐in‐The‐Middle (MiTM) attacks present numerous threats to a smart grid. In a MiTM attack, an intruder embeds itself within a conversation between two devices to either eavesdrop or impersonate one of the devices, making it appear to be a normal ...
Patrick Wlazlo   +6 more
doaj   +1 more source

Understanding Man-in-the-middle-attack through Survey of Literature

open access: yesIndonesian Journal of Computing, Engineering and Design, 2019
These days cyberattack is a serious criminal offense and it is a hotly debated issue moreover. A man-in-the-middle-attack (MITM) is a kind of cyberattack where an unapproved outsider enters into an online correspondence between two users, remains escaped
A. Mallik   +3 more
doaj   +1 more source

Automatic Search of Meet-in-the-Middle Differential Fault Analysis on AES-like Ciphers

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
Fault analysis is a powerful technique to retrieve secret keys by exploiting side-channel information. Differential fault analysis (DFA) is one of the most powerful threats utilizing differential information between correct and faulty ciphertexts and ...
Qingyuan Yu   +6 more
doaj   +1 more source

On the security of SSL/TLS-enabled applications

open access: yesApplied Computing and Informatics, 2014
SSL/TLS (Secure Socket Layer/Transport Layer Security)-enabled web applications aim to provide public key certificate based authentication, secure session key establishment, and symmetric key based traffic confidentiality.
Manik Lal Das, Navkar Samdaria
doaj   +1 more source

Sieve-in-the-Middle: Improved MITM Attacks [PDF]

open access: yes, 2013
This paper presents a new generic technique, named sieve-in-the-middle, which improves meet-in-the-middle attacks in the sense that it provides an attack on a higher number of rounds. Instead of selecting the key candidates by searching for a collision in an intermediate state which can be computed forwards and backwards, we look for the existence of ...
Canteaut, Anne   +2 more
openaire   +1 more source

Home Automation through Smart Lighting, Smart Security and other Appliances [PDF]

open access: yesITM Web of Conferences, 2021
The smart home automation system is designed to conveniently manage and monitor household appliances and lighting fixtures remotely, to save time and to use resources effectively. It is a control system for allowing access to home automation devices. The
Rajarajeswari S   +3 more
doaj   +1 more source

Internet security for mobile computing [PDF]

open access: yes, 2017
Mobile devices are now the most dominant computer platform. Every time a mobile web application accesses the internet, the end user’s data is susceptible to malicious attacks.
Davis, Vincent Anthony
core   +1 more source

Simplified MITM Modeling for Permutations: New (Quantum) Attacks

open access: yes, 2022
Meet-in-the-middle (MITM) is a general paradigm where internal states are computed along two independent paths ('forwards' and 'backwards') that are then matched. Over time, MITM attacks improved using more refined techniques and exploiting additional freedoms and structure, which makes it more involved to find and optimize such attacks.
Schrottenloher, André, Stevens, Marc
openaire   +1 more source

Defeating MITM Attacks on Cryptocurrency Exchange Accounts with Individual User Keys [PDF]

open access: yesInternational Journal of Network Security & Its Applications, 2021
Presented herein is a User-SpecificKey Scheme based on Elliptic Curve Cryptography that defeats man-inthe-middle attacks on cryptocurrency exchange accounts. In this scheme, a separate public and private key pair is assigned to every account and the public key is shifted either forward or backward on the elliptic curve by a difference of the account ...
openaire   +1 more source

Home - About - Disclaimer - Privacy