To Decrypt or not to Decrypt? That is the Question

نویسندگان

  • Wenbo Mao
  • Colin Boyd
چکیده

Authentication protocols are known to be error prone. In this paper we identify non-methodical use of decryption as a typical design feature which is found in many published authentication protocols and is responsible for various problems in these protocols. We reason that authentication protocols can be greatly strengthened by the methodical use of decryption.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Method for Protecting Access Pattern in Outsourced Data

Protecting the information access pattern, which means preventing the disclosure of data and structural details of databases, is very important in working with data, especially in the cases of outsourced databases and databases with Internet access. The protection of the information access pattern indicates that mere data confidentiality is not sufficient and the privacy of queries and accesses...

متن کامل

Decrypting the Ciphertexts of Rsa with Public-key

The RSA is based on a trapdoor one-way function which is easy to compute but is most hard to revert without knowing the trapdoor. A cryptanalysis, presented in this paper, consists in finding a new decrypt key which plays the same role of the original trapdoor. To find this new decrypt key we must seek the maximum degree of ciphering function composition in a given modulus N. The maximum degree...

متن کامل

Split Knowledge Generation of RSA Parameters

We show how it is possible for two parties to cooperate in generating the parameters for an RSA encryption system in such a w a y that neither individually has the ability to decrypt enciphered data. In order to decrypt data the two parties instead follow the cooperative procedure described.

متن کامل

Cryptanalysis of Modification to Self-Certified Group-Oriented Cryptosystem without A Combiner

In a (t, n) group-oriented cryptosystem collaboration of at least t participants is required to perform a designated cryptographic operation. This type of cryptographic operation is very important to support an ad-hoc type network, such as the one that is built using Bluetooth or ad-hoc wireless LAN, since the existence of a combiner is not required to decrypt an encrypted message. In the earli...

متن کامل

Disguisable Symmetric Encryption Schemes for an Anti-forensics Purpose

In this paper, we propose a new notion of secure disguisable symmetric encryption schemes, which captures the idea that the attacker can decrypt a cipher text he encrypted to different meaningful values when different keys are put to the decryption algorithm. This notion is aimed for the following anti-forensics purpose: the attacker can cheat the forensics investigator by decrypting an encrypt...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007