Insecure "Provable Secure Network Coding"
نویسنده
چکیده
Network coding allows the routers to mix the received information before forwarding them to the next nodes. Though this information mixing has been proven to maximize network throughput, it also introduces security challenges such as pollution attacks. A malicious node could insert a malicious packet into the system and this corrupted packet will propagate more quickly than in traditional copy-and-forward networks. Several authors have studied secure network coding from both information theoretic and probabilistic viewpoints. In this paper, we show that there are serious flaws in several of these schemes (the security “proofs” for these schemes were presented in these publications).
منابع مشابه
Insecure "Provably Secure Network Coding" and Homomorphic Authentication Schemes for Network Coding
Network coding allows the routers to mix the received information before forwarding them to the next nodes. Though this information mixing has been proven to maximize network throughput, it also introduces security challenges such as pollution attacks. A malicious node could insert a malicious packet into the system and this corrupted packet will propagate more quickly than in traditional copy-...
متن کاملNetwork Coding an Secure and Efficient Process for Content Distribution
Content distribution in network sometimes may be vulnerable henceforth unauthorized users can inject “bogus” data to corrupt the content during its distribution process in order to deplete the network resource. The direct application of network coding may be insecure. Content verification is the important and practical issue when maintaining integrity of the content. While random linear network...
متن کاملOn the Security of an Mutual Verifiable Provable Data Auditing in Public Cloud Storage
Provable Data Possession (PDP) enables cloud users to verify the integrity of their outsourced data without retrieving the entire file from cloud servers. At present, to execute data checking, many PDP schemes is delegated to some proxy to implement remote data possession checking task. Because the proxy may store some state information in cloud storage servers, it makes that many PDP scheme ar...
متن کاملA New Approach for Algebraically Homomorphic Encryption
The existence of an efficient and provably secure algebraically homomorphic scheme (AHS), i.e., one that supports both addition and multiplication operations, is a long stated open problem. All proposals so far are either insecure or not provable secure, inefficient, or allow only for one multiplication (and arbitrary additions). As only very limited progress has been made on the existing appro...
متن کاملSecure and Efficient SIP Authentication Scheme for Converged VoIP Networks
The Session Initiation Protocol (SIP) is commonly used to establish Voice over IP (VoIP) calls. Mostly recently, Yoon et al. proposed a new secure and efficient SIP authentication scheme in a converged VoIP network based on ECC. In this paper, we first demonstrate that the recently proposed SIP authentication scheme is insecure against off-line password guessing attacks. Thereafter, we propose ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2009 شماره
صفحات -
تاریخ انتشار 2009