Block-hash of blockchain framework against man-in-the-middle attacks

نویسندگان

چکیده

Payload authentication is vulnerable to Man-in-the-middle (MITM) attack. Blockchain technology offers methods such as peer peer, block hash, and proof-of-work secure the payload of process. The implementation uses hash on blockchain testing using White-box-testing security tests distributed system practitioners who are competent in MITM attacks. analyisis results before implementing show that still plain text, so data confidentiality has not minimize passive voice. After system, white-box Wireshark gives result sent been well encrypted safe enough. percentage test gets 95% which shows securing from attacks relatively high. Although it succeeded attacks, a vulnerability other cyber needs improvisation.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

the tragedy of modern man in arthur millers world

what miller wants is a theatre of heightened consciousness. he speaks of two passions in a man, the passion to "feel" and the passion "know". he belives that we can have more of the latter. he says: drama is akin to the other inventions of man in that it ought to help us know more and not merely to spend our feelings. the writing of the crucible shows us that he is trying to give more heightene...

15 صفحه اول

SSL Man-in-the-Middle Attacks

TCP/IP protocols have long been subject to man-in-the-middle (MITM) attacks, but the advent of SSL/TLS was supposed to mitigate that risk for web transactions by providing endpoint authentication and encryption. The advent of Dug Song's 'webmitm' in late 2000 demonstrated the feasibility of mounting an MITM attack on the protocol, but a properlyconfigured client SSL implementation would warn th...

متن کامل

Attacks on Double Block Length Hash Functions

Attacks on double block length hash functions using a block cipher are considered in this paper. We present a general free-start attack, in which the attacker is free to choose the initial value, and a real attack on a large class of hash functions. Recent results on the complexities of attacks on double block hash functions are summarized.

متن کامل

Feasibility of the interlock protocol against man-in-the-middle attacks on quantum cryptography

Since the introduction of conjugate coding by Wiesner in the 70’s of the last century , quantum cryptography 2,3,4,5,6,7 has developed into an increasingly active area of applied research and technology, as well as a powerful tool to exploit the quantum. From the first realization at IBM’s Yorktown Heights laboratory 5 to its implementation across Lake Geneva 6 and various other spots around th...

متن کامل

Identification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle Attacks

We give a series of three identification schemes. All of them are basically 2-round interactive proofs of ability to complete DiffieHellman tuples. Despite their simple protocols, the second and the third schemes are proven secure against concurrent man-in-the-middle attacks based on tight reduction to the Gap Computational Diffie-Hellman Assumption without the random oracle. In addition, they ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Register: jurnal ilmiah teknologi sistem informasi

سال: 2021

ISSN: ['2502-3357', '2503-0477']

DOI: https://doi.org/10.26594/register.v8i1.2190