Network Architectures and Services NET 2012 - 04 - 1 Proceedings of the Seminars
نویسندگان
چکیده
Stream ciphers are still widely used to efficiently encrypt large amounts of data. Contrary to asymmetric encryption, stream ciphers are easy to implement in hardware and offer a high encryption speed. Using information theory, it is possible to proof that an arbitrary level of security can be achieved. However small flaws in the implementation of stream ciphers can lead to severe weaknesses. These can cause even unconditionally secure stream ciphers, like the one-time pad (Vernam system), to become totally insecure. This can be demonstrated in a cryptanalysis of the Microsoft Office encryption up to the 2003 version. Office employs a flawed implementation of the widely used RC4 algorithm, exposing a severe vulnerability, which can be exploited to recover the plaintext from the encrypted documents.
منابع مشابه
Network Architectures and Services NET 2013 - 02 - 1 Proceedings of the Seminars Future Internet ( FI ) and Innovative Internet Technologies and Mobile
This paper is about the measurement of Internet outages with a focus on the Border Gateway Protocol, as one of the most common routing protocols. First some background information about the protocol and its tasks are described, followed by a concrete example of last year’s events in Egypt. Thereafter a self-made analysis regarding the earthquake in New Zealand in 2011 is presented. Finally a co...
متن کاملReliability and Performance Evaluation of Fault-aware Routing Methods for Network-on-Chip Architectures (RESEARCH NOTE)
Nowadays, faults and failures are increasing especially in complex systems such as Network-on-Chip (NoC) based Systems-on-a-Chip due to the increasing susceptibility and decreasing feature sizes. On the other hand, fault-tolerant routing algorithms have an evident effect on tolerating permanent faults and improving the reliability of a Network-on-Chip based system. This paper presents reliabili...
متن کاملNetwork Architectures and Services Net 2010-08-2 Proceedings of the Seminars Future Internet (fi) and Innovative Internet Technologies and Mobile Communications (iitm) Summer Semester 2010 Proceedings Zu Den Seminaren Future Internet (fi) Und Innovative Internet-technologien Und Mobilkommunikation (iitm) Cataloging-in-publication Data
Bigtable is a storage system for structured or semi-structured data [1]. Bigtable can be regarded as a distributed, non-relational Database from a system point of view (Bigtable is using a different data model than relational Databases). Bigtable scales to large data sets and provides a good performance of accessing the data. As of January 2008, there are more than sixty Google applications usi...
متن کاملService-Oriented Middleware Architectures for Cyber-Physical Systems
ion for Cyber Physical Systems. in Proceedings ofICCPS '10. 2010. Stockholm, Sweden: ACM. [15] Kim, M., et al. An Application Framework for LooselyCoupled Networked Cyber-Physical Systems. inProceedings of EUC '10. 2010. Hong Kong, China.[16] Basanta-Val, P., M. Garcí anda-Valls, and I. Esté andvezAyres. Towards a Cyber-Physical Architecture for IndustrialSystems via Real-Ti...
متن کاملNetwork Architectures and Services NET 2012 - 08 - 2 Proceedings of the Seminar Sensor Nodes – Operation , Network and Application
Wireless sensor networks can be used in a lot of different application areas. Since such networks were first proposed, many different node platforms both in regard to hardware and software were introduced. In this paper we present operating systems for wireless sensor nodes in general and two of the best known operating systems, TinyOS and Contiki with their most notable differences and similar...
متن کامل