Imperfect forward secrecy

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Introducing Perfect Forward Secrecy for AN.ON

In this paper we discuss AN.ON’s need to provide perfect forward secrecy and show by an estimation of the channel build up time that the straight forward solution is not a practical solution. In the remaining paper we propose an improvement which enables AN.ON to provide perfect forward secrecy with respect to their current attacker model. Finally, we show that the delay, caused by our improvem...

متن کامل

Interference Alignment with Imperfect Channel Knowledge and Secrecy Constraints

Please note that all the discussion referring to Theorem 5.4.1 has been revised accordingly. The corrected version of Chapter 5 has been published as follows: [WXSP15a] Zhao Wang, Ming Xiao, Mikael Skoglund, and H. Vincent Poor, “Secure degrees of freedom of wireless X networks using artificial noise alignment,” IEEE Trans. Commun., to appear. Online access: http://arxiv.org/abs/1410.5009. • 83...

متن کامل

A WTLS Handshake Protocol with User Anonymity and Forward Secrecy

Forward secrecy and user anonymity are provided in the WTLS for the wireless Internet communications. Forward secrecy can be built by using Diffie-Hellman key agreement with random numbers in the Hello messages, and user anonymity by employing the signcryption scheme to the ClientKeyExchange and CertificateVerify procedure. In addition to these features, the modified WTLS handshake protocol has...

متن کامل

Providing perfect forward secrecy for location-aware wireless sensor networks

Sensor nodes are resource-constrained, such as low battery life, computation, bandwidth and memory, so traditional public key schemes are impractical in wireless sensor networks. In the previous schemes, symmetric cryptography is the most common method used in sensor nodes. How to distribute keys into every sensor node is an important issue in many applications for hierarchical sensor networks....

متن کامل

Forward Secrecy and Its Application to Future Mobile Communications Security

Perfect forward secrecy, one of the possible security features provided by key establishment protocols, concerns dependency of a session key upon long-term secret keys (symmetric or asymmetric). The feature promises that even if a long-term private key is disclosed to any adversary, the session keys established in the protocol runs using the long-term key would not be compromised. The importanc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Communications of the ACM

سال: 2018

ISSN: 0001-0782,1557-7317

DOI: 10.1145/3292035