Results 21 to 30 of about 8,344 (213)
Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK
Randomized butterfly architecture of fast Fourier transform for key cipher (RBFK) is the lightweight block cipher for Internet of things devices in an edge computing environment.
Sugio Nobuyuki
doaj +1 more source
Man‐in‐the‐middle attacks and defence in a power system cyber‐physical testbed
Man‐in‐The‐Middle (MiTM) attacks present numerous threats to a smart grid. In a MiTM attack, an intruder embeds itself within a conversation between two devices to either eavesdrop or impersonate one of the devices, making it appear to be a normal ...
Patrick Wlazlo +6 more
doaj +1 more source
Understanding Man-in-the-middle-attack through Survey of Literature
These days cyberattack is a serious criminal offense and it is a hotly debated issue moreover. A man-in-the-middle-attack (MITM) is a kind of cyberattack where an unapproved outsider enters into an online correspondence between two users, remains escaped
A. Mallik +3 more
doaj +1 more source
Automatic Search of Meet-in-the-Middle Differential Fault Analysis on AES-like Ciphers
Fault analysis is a powerful technique to retrieve secret keys by exploiting side-channel information. Differential fault analysis (DFA) is one of the most powerful threats utilizing differential information between correct and faulty ciphertexts and ...
Qingyuan Yu +6 more
doaj +1 more source
On the security of SSL/TLS-enabled applications
SSL/TLS (Secure Socket Layer/Transport Layer Security)-enabled web applications aim to provide public key certificate based authentication, secure session key establishment, and symmetric key based traffic confidentiality.
Manik Lal Das, Navkar Samdaria
doaj +1 more source
Sieve-in-the-Middle: Improved MITM Attacks [PDF]
This paper presents a new generic technique, named sieve-in-the-middle, which improves meet-in-the-middle attacks in the sense that it provides an attack on a higher number of rounds. Instead of selecting the key candidates by searching for a collision in an intermediate state which can be computed forwards and backwards, we look for the existence of ...
Canteaut, Anne +2 more
openaire +1 more source
Home Automation through Smart Lighting, Smart Security and other Appliances [PDF]
The smart home automation system is designed to conveniently manage and monitor household appliances and lighting fixtures remotely, to save time and to use resources effectively. It is a control system for allowing access to home automation devices. The
Rajarajeswari S +3 more
doaj +1 more source
Internet security for mobile computing [PDF]
Mobile devices are now the most dominant computer platform. Every time a mobile web application accesses the internet, the end user’s data is susceptible to malicious attacks.
Davis, Vincent Anthony
core +1 more source
Simplified MITM Modeling for Permutations: New (Quantum) Attacks
Meet-in-the-middle (MITM) is a general paradigm where internal states are computed along two independent paths ('forwards' and 'backwards') that are then matched. Over time, MITM attacks improved using more refined techniques and exploiting additional freedoms and structure, which makes it more involved to find and optimize such attacks.
Schrottenloher, André, Stevens, Marc
openaire +1 more source
Defeating MITM Attacks on Cryptocurrency Exchange Accounts with Individual User Keys [PDF]
Presented herein is a User-SpecificKey Scheme based on Elliptic Curve Cryptography that defeats man-inthe-middle attacks on cryptocurrency exchange accounts. In this scheme, a separate public and private key pair is assigned to every account and the public key is shifted either forward or backward on the elliptic curve by a difference of the account ...
openaire +1 more source

