Results 1 to 10 of about 1,025 (182)

Simplified Modeling of MITM Attacks for Block Ciphers: New (Quantum) Attacks

open access: yesIACR Transactions on Symmetric Cryptology, 2023
The meet-in-the-middle (MITM) technique has led to many key-recovery attacks on block ciphers and preimage attacks on hash functions. Nowadays, cryptographers use automatic tools that reduce the search of MITM attacks to an optimization problem.
André Schrottenloher, Marc Stevens
doaj   +3 more sources

Linear Cancellations in the MitM Attacks on Sponge Functions

open access: yesIACR Transactions on Symmetric Cryptology
At EUROCRYPT 2023, Qin et al. proposed the MitM attack framework on sponge functions by separating the message bits into two sets of neutral bits.
Lingyue Qin   +5 more
doaj   +2 more sources

Harnessing advanced hybrid deep learning model for real-time detection and prevention of man-in-the-middle cyber attacks [PDF]

open access: yesScientific Reports
The growing number of connected devices in smart home environments has amplified security risks, particularly from Man-in-the-Middle (MitM) attacks. These attacks allow cybercriminals to intercept and manipulate communication streams between devices ...
V. Kandasamy, A. Ameelia Roseline
doaj   +2 more sources

An incentive-aware federated bargaining approach for client selection in decentralized federated learning for IoT smart homes [PDF]

open access: yesScientific Reports
Federated Learning (FL) has emerged as a promising solution for privacy-preserving model training across distributed IoT devices. Despite its advantages, FL faces challenges such as inefficient client selection, data heterogeneity, security ...
Jai Vinita L
doaj   +2 more sources

EECDH to prevent MITM attack in cloud computing

open access: yesDigital Communications and Networks, 2019
Cloud computing has reached the peak of Gartner hype cycle, and now the focus of the whole telecom industry is the ability to scale data storage with minimal investment. But data privacy and communication issues will occur with the increment of the cloud
Shajina Anand, Varalakshmi Perumal
doaj   +2 more sources

New Low-Memory Algebraic Attacks on LowMC in the Picnic Setting

open access: yesIACR Transactions on Symmetric Cryptology, 2022
The security of the post-quantum signature scheme Picnic is highly related to the difficulty of recovering the secret key of LowMC from a single plaintext-ciphertext pair.
Fukang Liu   +3 more
doaj   +3 more sources

Improvement of nuclear facilities DNP3 protocol data transmission security using super encryption BRC4 in SCADA systems [PDF]

open access: yesPeerJ Computer Science, 2021
Background Data transmissions using the DNP3 protocol over the internet in SCADA systems are vulnerable to interruption, interception, fabrication, and modification through man-in-the-middle (MITM) attacks.
Eko Hadiyono Riyadi   +2 more
doaj   +2 more sources

Improved MITM Cryptanalysis on Streebog

open access: yesIACR Transactions on Symmetric Cryptology, 2022
At ASIACRYPT 2012, Sasaki et al. introduced the guess-and-determine approach to extend the meet-in-the-middle (MITM) preimage attack. At CRYPTO 2021, Dong et al.
Jialiang Hua   +5 more
doaj   +1 more source

Man‐in‐the‐middle attacks and defence in a power system cyber‐physical testbed

open access: yesIET Cyber-Physical Systems, 2021
Man‐in‐The‐Middle (MiTM) attacks present numerous threats to a smart grid. In a MiTM attack, an intruder embeds itself within a conversation between two devices to either eavesdrop or impersonate one of the devices, making it appear to be a normal ...
Patrick Wlazlo   +6 more
doaj   +1 more source

New attacks against reduced Rijndael‐160

open access: yesIET Information Security, 2022
The first 9‐round meet‐in‐the‐middle (MITM) attack and improved 8‐round impossible differential (ID) attacks on Rijndael‐160 are studied here. For the first 9‐round MITM attack, a new effective attack path is explored by using the generalised δ‐set and ...
Xiaoli Dong, Yongzhuang Wei
doaj   +1 more source

Home - About - Disclaimer - Privacy