To Decrypt or not to Decrypt? That is the Question
نویسندگان
چکیده
Authentication protocols are known to be error prone. In this paper we identify non-methodical use of decryption as a typical design feature which is found in many published authentication protocols and is responsible for various problems in these protocols. We reason that authentication protocols can be greatly strengthened by the methodical use of decryption.
منابع مشابه
A Method for Protecting Access Pattern in Outsourced Data
Protecting the information access pattern, which means preventing the disclosure of data and structural details of databases, is very important in working with data, especially in the cases of outsourced databases and databases with Internet access. The protection of the information access pattern indicates that mere data confidentiality is not sufficient and the privacy of queries and accesses...
متن کاملDecrypting the Ciphertexts of Rsa with Public-key
The RSA is based on a trapdoor one-way function which is easy to compute but is most hard to revert without knowing the trapdoor. A cryptanalysis, presented in this paper, consists in finding a new decrypt key which plays the same role of the original trapdoor. To find this new decrypt key we must seek the maximum degree of ciphering function composition in a given modulus N. The maximum degree...
متن کاملSplit Knowledge Generation of RSA Parameters
We show how it is possible for two parties to cooperate in generating the parameters for an RSA encryption system in such a w a y that neither individually has the ability to decrypt enciphered data. In order to decrypt data the two parties instead follow the cooperative procedure described.
متن کاملCryptanalysis of Modification to Self-Certified Group-Oriented Cryptosystem without A Combiner
In a (t, n) group-oriented cryptosystem collaboration of at least t participants is required to perform a designated cryptographic operation. This type of cryptographic operation is very important to support an ad-hoc type network, such as the one that is built using Bluetooth or ad-hoc wireless LAN, since the existence of a combiner is not required to decrypt an encrypted message. In the earli...
متن کاملDisguisable Symmetric Encryption Schemes for an Anti-forensics Purpose
In this paper, we propose a new notion of secure disguisable symmetric encryption schemes, which captures the idea that the attacker can decrypt a cipher text he encrypted to different meaningful values when different keys are put to the decryption algorithm. This notion is aimed for the following anti-forensics purpose: the attacker can cheat the forensics investigator by decrypting an encrypt...
متن کامل