Block-hash of blockchain framework against man-in-the-middle attacks
نویسندگان
چکیده
Payload authentication is vulnerable to Man-in-the-middle (MITM) attack. Blockchain technology offers methods such as peer peer, block hash, and proof-of-work secure the payload of process. The implementation uses hash on blockchain testing using White-box-testing security tests distributed system practitioners who are competent in MITM attacks. analyisis results before implementing show that still plain text, so data confidentiality has not minimize passive voice. After system, white-box Wireshark gives result sent been well encrypted safe enough. percentage test gets 95% which shows securing from attacks relatively high. Although it succeeded attacks, a vulnerability other cyber needs improvisation.
منابع مشابه
the tragedy of modern man in arthur millers world
what miller wants is a theatre of heightened consciousness. he speaks of two passions in a man, the passion to "feel" and the passion "know". he belives that we can have more of the latter. he says: drama is akin to the other inventions of man in that it ought to help us know more and not merely to spend our feelings. the writing of the crucible shows us that he is trying to give more heightene...
15 صفحه اولSSL Man-in-the-Middle Attacks
TCP/IP protocols have long been subject to man-in-the-middle (MITM) attacks, but the advent of SSL/TLS was supposed to mitigate that risk for web transactions by providing endpoint authentication and encryption. The advent of Dug Song's 'webmitm' in late 2000 demonstrated the feasibility of mounting an MITM attack on the protocol, but a properlyconfigured client SSL implementation would warn th...
متن کاملAttacks on Double Block Length Hash Functions
Attacks on double block length hash functions using a block cipher are considered in this paper. We present a general free-start attack, in which the attacker is free to choose the initial value, and a real attack on a large class of hash functions. Recent results on the complexities of attacks on double block hash functions are summarized.
متن کاملFeasibility of the interlock protocol against man-in-the-middle attacks on quantum cryptography
Since the introduction of conjugate coding by Wiesner in the 70’s of the last century , quantum cryptography 2,3,4,5,6,7 has developed into an increasingly active area of applied research and technology, as well as a powerful tool to exploit the quantum. From the first realization at IBM’s Yorktown Heights laboratory 5 to its implementation across Lake Geneva 6 and various other spots around th...
متن کاملIdentification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle Attacks
We give a series of three identification schemes. All of them are basically 2-round interactive proofs of ability to complete DiffieHellman tuples. Despite their simple protocols, the second and the third schemes are proven secure against concurrent man-in-the-middle attacks based on tight reduction to the Gap Computational Diffie-Hellman Assumption without the random oracle. In addition, they ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Register: jurnal ilmiah teknologi sistem informasi
سال: 2021
ISSN: ['2502-3357', '2503-0477']
DOI: https://doi.org/10.26594/register.v8i1.2190