Simplified Modeling of MITM Attacks for Block Ciphers: New (Quantum) Attacks
The meet-in-the-middle (MITM) technique has led to many key-recovery attacks on block ciphers and preimage attacks on hash functions. Nowadays, cryptographers use automatic tools that reduce the search of MITM attacks to an optimization problem.
André Schrottenloher, Marc Stevens
doaj +3 more sources
Linear Cancellations in the MitM Attacks on Sponge Functions
At EUROCRYPT 2023, Qin et al. proposed the MitM attack framework on sponge functions by separating the message bits into two sets of neutral bits.
Lingyue Qin +5 more
doaj +2 more sources
Harnessing advanced hybrid deep learning model for real-time detection and prevention of man-in-the-middle cyber attacks [PDF]
The growing number of connected devices in smart home environments has amplified security risks, particularly from Man-in-the-Middle (MitM) attacks. These attacks allow cybercriminals to intercept and manipulate communication streams between devices ...
V. Kandasamy, A. Ameelia Roseline
doaj +2 more sources
An incentive-aware federated bargaining approach for client selection in decentralized federated learning for IoT smart homes [PDF]
Federated Learning (FL) has emerged as a promising solution for privacy-preserving model training across distributed IoT devices. Despite its advantages, FL faces challenges such as inefficient client selection, data heterogeneity, security ...
Jai Vinita L
doaj +2 more sources
EECDH to prevent MITM attack in cloud computing
Cloud computing has reached the peak of Gartner hype cycle, and now the focus of the whole telecom industry is the ability to scale data storage with minimal investment. But data privacy and communication issues will occur with the increment of the cloud
Shajina Anand, Varalakshmi Perumal
doaj +2 more sources
New Low-Memory Algebraic Attacks on LowMC in the Picnic Setting
The security of the post-quantum signature scheme Picnic is highly related to the difficulty of recovering the secret key of LowMC from a single plaintext-ciphertext pair.
Fukang Liu +3 more
doaj +3 more sources
Improvement of nuclear facilities DNP3 protocol data transmission security using super encryption BRC4 in SCADA systems [PDF]
Background Data transmissions using the DNP3 protocol over the internet in SCADA systems are vulnerable to interruption, interception, fabrication, and modification through man-in-the-middle (MITM) attacks.
Eko Hadiyono Riyadi +2 more
doaj +2 more sources
Improved MITM Cryptanalysis on Streebog
At ASIACRYPT 2012, Sasaki et al. introduced the guess-and-determine approach to extend the meet-in-the-middle (MITM) preimage attack. At CRYPTO 2021, Dong et al.
Jialiang Hua +5 more
doaj +1 more source
Man‐in‐the‐middle attacks and defence in a power system cyber‐physical testbed
Man‐in‐The‐Middle (MiTM) attacks present numerous threats to a smart grid. In a MiTM attack, an intruder embeds itself within a conversation between two devices to either eavesdrop or impersonate one of the devices, making it appear to be a normal ...
Patrick Wlazlo +6 more
doaj +1 more source
New attacks against reduced Rijndael‐160
The first 9‐round meet‐in‐the‐middle (MITM) attack and improved 8‐round impossible differential (ID) attacks on Rijndael‐160 are studied here. For the first 9‐round MITM attack, a new effective attack path is explored by using the generalised δ‐set and ...
Xiaoli Dong, Yongzhuang Wei
doaj +1 more source

