Results 11 to 20 of about 1,025 (182)

Meet‐in‐the‐middle attacks on round‐reduced CRAFT based on automatic search

open access: yesIET Information Security, 2023
CRAFT is a lightweight block cipher designed by Beierle et al. to effectively resist differential fault attacks at fast software encryption 2019. In this article, Demirci‐Selçuk meet‐in‐the‐middle (DS‐MITM) attacks on round‐reduced CRAFT based on ...
Zhangjun Ma, Manman Li, Shaozhen Chen
doaj   +1 more source

Classical and Quantum Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing

open access: yesIACR Transactions on Symmetric Cryptology, 2023
At EUROCRYPT 2006, Kelsey and Kohno proposed the so-called chosen target forced-prefix (CTFP) preimage attack, where for any challenge prefix P, the attacker can generate a suffix S such that H(P∥S) = y for some hash value y published in advance by the ...
Zhiyu Zhang   +3 more
doaj   +1 more source

Techno-Economic Aspect of the Man-in-the-Middle Attacks

open access: yesCommunications, 2017
This paper analyzes some aspects of the man-in-the-middle (MITM) attacks. After a short introduction, which outlines the essence of this attack, there are presented used scientific methods and hypotheses.
Zoran Cekerevac   +3 more
doaj   +1 more source

Generalized Meet in the Middle Cryptanalysis of Block Ciphers With an Automated Search Algorithm

open access: yesIEEE Access, 2020
Meet in the middle (MITM) attack is one of the most important and applicable methods for cryptanalysis of block ciphers. In this paper, a more generalized method for MITM attack is considered.
Siavash Ahmadi, Mohammad Reza Aref
doaj   +1 more source

Detection of Man-in-the-Middle (MitM) Cyber-Attacks in Oil and Gas Process Control Networks Using Machine Learning Algorithms

open access: yesFuture Internet, 2023
Recently, the process control network (PCN) of oil and gas installation has been subjected to amorphous cyber-attacks. Examples include the denial-of-service (DoS), distributed denial-of-service (DDoS), and man-in-the-middle (MitM) attacks, and this may ...
Ugochukwu Onyekachi Obonna   +6 more
doaj   +1 more source

Sieve-in-the-Middle: Improved MITM Attacks [PDF]

open access: yes, 2013
This paper presents a new generic technique, named sieve-in-the-middle, which improves meet-in-the-middle attacks in the sense that it provides an attack on a higher number of rounds. Instead of selecting the key candidates by searching for a collision in an intermediate state which can be computed forwards and backwards, we look for the existence of ...
Canteaut, Anne   +2 more
openaire   +1 more source

Simplified MITM Modeling for Permutations: New (Quantum) Attacks

open access: yes, 2022
Meet-in-the-middle (MITM) is a general paradigm where internal states are computed along two independent paths ('forwards' and 'backwards') that are then matched. Over time, MITM attacks improved using more refined techniques and exploiting additional freedoms and structure, which makes it more involved to find and optimize such attacks.
Schrottenloher, André, Stevens, Marc
openaire   +1 more source

Cyber-Physical Integrated Intrusion Detection Scheme in SCADA System of Process Manufacturing Industry

open access: yesIEEE Access, 2020
Most Intrusion Detection System(IDS) used in Supervisory Control and Data Acquisition (SCADA) systems now are focused on the cyber field but ignored the process states in physical field of the plants.
Junlei Qian   +5 more
doaj   +1 more source

SGX-UAM: A Secure Unified Access Management Scheme With One Time Passwords via Intel SGX

open access: yesIEEE Access, 2021
With the convergence of fixed and mobile networks, heterogeneous networks are becoming ubiquitous. Internet giants are seeing the plight of identity authentication. To address this issue, unified access management (UAM) was conceived. This paper provides
Liangshun Wu, H. J. Cai, Han Li
doaj   +1 more source

Defeating MITM Attacks on Cryptocurrency Exchange Accounts with Individual User Keys [PDF]

open access: yesInternational Journal of Network Security & Its Applications, 2021
Presented herein is a User-SpecificKey Scheme based on Elliptic Curve Cryptography that defeats man-inthe-middle attacks on cryptocurrency exchange accounts. In this scheme, a separate public and private key pair is assigned to every account and the public key is shifted either forward or backward on the elliptic curve by a difference of the account ...
openaire   +1 more source

Home - About - Disclaimer - Privacy