搜索结果: 1-15 共查到“军队指挥学 weaknesses”相关记录28条 . 查询时间(0.051 秒)
Password-based key derivation functions are of particular interest in cryptography because they (a) input a password/passphrase (which usually is short and lacks enough entropy) and derive a cryptogra...
Weaknesses in Hadamard Based Symmetric Key Encryption Schemes
secret-key cryptography Symmetric Key Encryption Schemes
2016/2/24
In this paper security aspects of the existing symmetric key encryption schemes based
on Hadamard matrices are examined. Hadamard matrices itself have symmetries like one
circulant core or two circu...
Logical Reasoning to Detect Weaknesses About SHA-1 and MD4/5
Logical cryptanalysis MD5 SHA-1 Satisfiability
2016/1/23
In recent years, studies about the SATisfiability Problem (short for SAT) were more and more numerous because of its conceptual simplicity and ability to express a large set of various problems. Wit...
Weaknesses of Password Authentication Scheme Based on Geometric Hashing
cryptographic protocols authentication schemes
2016/1/23
We show that a recently proposed password authentication scheme based on geometric hashing has several security weaknesses, and that the use of this scheme should be avoided in practice.
Statistical weaknesses in 20 RC4-like algorithms and (probably) the simplest algorithm free from these weaknesses - VMPC-R
PRNG CSPRNG RC4
2016/1/23
We find statistical weaknesses in 20 RC4-like algorithms including the original RC4, RC4A, PC-RC4 and others. This is achieved using a simple statistical test. We found only one algorithm which was ...
The BRUTUS automatic cryptanalytic framework: Testing CAESAR authenticated encryption candidates for weaknesses
Authenticated Encryption CAESAR BRUTUS
2016/1/6
This report summarizes our results from security analysis covering all 57 competitions for authenticated encryption: security, applicability, and robustness (CAESAR) first-round candidates and over 21...
Key recovery attacks on Grain family using BSW sampling and certain weaknesses of the filtering function
Stream cipher Grain cipher State recovery attack
2016/1/5
A novel internal state recovery attack on the whole Grain family of ciphers is
proposed in this work. It basically uses the ideas of BSW sampling along with employing
a weak placement of the tap pos...
Security Weaknesses of an "Anonymous Attribute Based Encryption" appeared in ASIACCS'13
Attribute Based Encryption Anonymity Anonymous Encryption
2016/1/5
Attribute-based Encryption (ABE) has found enormous application in fine-grained access control of shared data, particularly in public cloud. In 2013, Zhang et al proposed a scheme called match-then-d...
Structural Weaknesses in the Open Smart Grid Protocol
protocol analysis authentication protocol OSGP
2016/1/4
The Open Smart Grid Protocol (OSGP) is currently deployed in various countries in
large-scale Smart Metering projects. The protocol was developed by the OSGP Alliance
and published as a standard by ...
Weaknesses in a Recently Proposed RFID Authentication Protocol
RFID Authentication Security, Privacy
2014/3/5
Many RFID authentication protocols have been proposed to provide desired security and privacy level for RFID systems. Almost all of these protocols are based symmetric cryptography because of the limi...
Lessons Learned From Previous SSL/TLS Attacks - A Brief Chronology Of Attacks And Weaknesses
SSL TLS Handshake Protocol Record Layer Public Key Infrastructures
2013/2/21
Since its introduction in 1994 the Secure Socket Layer (SSL) protocol (later renamed to Transport Layer Security (TLS)) evolved to the de facto standard for securing the transport layer. SSL/TLS can b...
Weaknesses of SIP Authentication Scheme for Converged VoIP Networks
Voice over Internet Protocol Session Initial Protocol elliptic curve authentication
2010/9/9
The Session Initiation Protocol (SIP) is commonly used to establish Voice over IP (VoIP) calls. Mostly recently, Yoon et al. proposed an efficient SIP authentication scheme in a converged VoIP network...
Weaknesses of a dynamic ID-based remote user authentication scheme
cryptographic protocols Authentication Security Cryptanalysis Smart card Attacks
2010/7/13
The security of a password authentication scheme using smart cards proposed by Khan et al. is analyzed. Four kinds of attacks are presented in different scenarios. The analyses show that the scheme is...
Security Weaknesses in Two Certificateless Signcryption Schemes
Security Weaknesses Two Certificateless Signcryption Schemes
2010/3/16
Recently, a certificateless signcryption scheme in the standard model was proposed
by Liu et al. in [1]. Another certificateless signcryption scheme in the standard model was
proposed by Xie et al. ...
Weaknesses and improvement of three-party authenticated key exchange protocol using elliptic curve cryptography
unknown key-share attack impersonation attack three-party
2009/11/18
Quite recently, Yang et al. presented an efficient three-party authenticated key ex-
change protocol based upon elliptic curve cryptography for mobile-commerce envi-
ronments. In this paper, we demo...