Methods of Attacking and Defending Cryptosystems
نویسنده
چکیده
94.7 Steganography...................................................................... 1260 94.8 Key Distribution .................................................................. 1260 94.9 Key Management ................................................................. 1260 94.10 Public versus Proprietary Algorithms and Systems.......... 1260 94.11 Classic Attacks...................................................................... 1260 94.12 Standard Cryptanalysis........................................................ 1261 Reverse Engineering † Guessing † Frequency Analysis † Brute Force † Ciphertext-Only Attack † Known Plaintext Attack † Chosen Plaintext Attack † Birthday Attack † Factoring Attacks † Replay Attack † Man-in-the-Middle Attack † Dictionary Attacks † Attacking Random Number Generators † Inference
منابع مشابه
Machine Learning in the Presence of an Adversary: Attacking and Defending the SpamBayes Spam Filter
Machine Learning in the Presence of an Adversary: Attacking and Defending the SpamBayes Spam Filter
متن کاملComplexity Evaluation of Knapsack Crypto System using Fuzzy Set
It is well known that the knapsack cryptosystem is a type of public key cryptosystems. It is based on the well known mathematical concept, i.e., the choosing of one way function. Many Knapsack cryptosystems were invented in the last 20 years, and many attacking methods were invented as a counterattack against the developed knapsack cryptosystems. All the attacking methods aim towards breaking t...
متن کاملSolving Hard Lattice Problems and the Security of Lattice-Based Cryptosystems
This paper is a tutorial introduction to the present state-of-the-art in the field of security of latticebased cryptosystems. After a short introduction to lattices, we describe the main hard problems in lattice theory that cryptosystems base their security on, and we present the main methods of attacking these hard problems, based on lattice basis reduction. We show how to find shortest vector...
متن کاملThe Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems
Abs t rac t . The notion of a Secretly Embedded Trapdoor with Universal Protection (SETUP) and its variations on attacking black-box cryptosysterns has been recently introduced. The basic definitions, issues, and examples of various setup attacks (called Kleptographic attacks) have also been presented. The goal of this work is to describe a methodological way of attacking cryptosystems which ex...
متن کاملOnline onslaught: Internet-based methods for attacking and defending citizens' organisations
Review policy About the author How to cite item Indexing metadata Print version Notify colleague* Email the author* RELATED ITEMS Author's work Government policy Book Book reviews Dissertations Online forums Quotations Resources Media reports Web search
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007