Results 11 to 20 of about 1,025 (182)
Meet‐in‐the‐middle attacks on round‐reduced CRAFT based on automatic search
CRAFT is a lightweight block cipher designed by Beierle et al. to effectively resist differential fault attacks at fast software encryption 2019. In this article, Demirci‐Selçuk meet‐in‐the‐middle (DS‐MITM) attacks on round‐reduced CRAFT based on ...
Zhangjun Ma, Manman Li, Shaozhen Chen
doaj +1 more source
Classical and Quantum Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing
At EUROCRYPT 2006, Kelsey and Kohno proposed the so-called chosen target forced-prefix (CTFP) preimage attack, where for any challenge prefix P, the attacker can generate a suffix S such that H(P∥S) = y for some hash value y published in advance by the ...
Zhiyu Zhang +3 more
doaj +1 more source
Techno-Economic Aspect of the Man-in-the-Middle Attacks
This paper analyzes some aspects of the man-in-the-middle (MITM) attacks. After a short introduction, which outlines the essence of this attack, there are presented used scientific methods and hypotheses.
Zoran Cekerevac +3 more
doaj +1 more source
Generalized Meet in the Middle Cryptanalysis of Block Ciphers With an Automated Search Algorithm
Meet in the middle (MITM) attack is one of the most important and applicable methods for cryptanalysis of block ciphers. In this paper, a more generalized method for MITM attack is considered.
Siavash Ahmadi, Mohammad Reza Aref
doaj +1 more source
Recently, the process control network (PCN) of oil and gas installation has been subjected to amorphous cyber-attacks. Examples include the denial-of-service (DoS), distributed denial-of-service (DDoS), and man-in-the-middle (MitM) attacks, and this may ...
Ugochukwu Onyekachi Obonna +6 more
doaj +1 more source
Sieve-in-the-Middle: Improved MITM Attacks [PDF]
This paper presents a new generic technique, named sieve-in-the-middle, which improves meet-in-the-middle attacks in the sense that it provides an attack on a higher number of rounds. Instead of selecting the key candidates by searching for a collision in an intermediate state which can be computed forwards and backwards, we look for the existence of ...
Canteaut, Anne +2 more
openaire +1 more source
Simplified MITM Modeling for Permutations: New (Quantum) Attacks
Meet-in-the-middle (MITM) is a general paradigm where internal states are computed along two independent paths ('forwards' and 'backwards') that are then matched. Over time, MITM attacks improved using more refined techniques and exploiting additional freedoms and structure, which makes it more involved to find and optimize such attacks.
Schrottenloher, André, Stevens, Marc
openaire +1 more source
Most Intrusion Detection System(IDS) used in Supervisory Control and Data Acquisition (SCADA) systems now are focused on the cyber field but ignored the process states in physical field of the plants.
Junlei Qian +5 more
doaj +1 more source
SGX-UAM: A Secure Unified Access Management Scheme With One Time Passwords via Intel SGX
With the convergence of fixed and mobile networks, heterogeneous networks are becoming ubiquitous. Internet giants are seeing the plight of identity authentication. To address this issue, unified access management (UAM) was conceived. This paper provides
Liangshun Wu, H. J. Cai, Han Li
doaj +1 more source
Defeating MITM Attacks on Cryptocurrency Exchange Accounts with Individual User Keys [PDF]
Presented herein is a User-SpecificKey Scheme based on Elliptic Curve Cryptography that defeats man-inthe-middle attacks on cryptocurrency exchange accounts. In this scheme, a separate public and private key pair is assigned to every account and the public key is shifted either forward or backward on the elliptic curve by a difference of the account ...
openaire +1 more source

