نتایج جستجو برای: secret disclosure attack

تعداد نتایج: 121525  

2008
Kamer Kaya Ali Aydin Selçuk

In this paper, we investigate how to achieve verifiable secret sharing (VSS) schemes by using the Chinese Remainder Theorem (CRT). We first show that two schemes proposed earlier are not secure by an attack where the dealer is able to distribute inconsistent shares to the users. Then we propose a new VSS scheme based on the CRT and prove its security. Using the proposed VSS scheme, we develop a...

2011
Louis Goubin Ange Martinelli

Cryptographic algorithms embedded on physical devices are particularly vulnerable to Side Channel Analysis (SCA). The most common countermeasure for block cipher implementations is masking, which randomizes the variables to be protected by combining them with one or several random values. In this paper, we propose an original masking scheme based on Shamir’s Secret Sharing scheme [23] as an alt...

2002
Adam Stubblefield John Ioannidis Aviel D. Rubin

We implemented an attack against WEP, the link-layer security protocol for 802.11 networks. The attack was described in a recent paper by Fluhrer, Mantin, and Shamir. With our implementation, and permission of the network administrator, we were able to recover the 128 bit secret key used in a production network, with a passive attack. The WEP standard uses RC4 IVs improperly, and the attack exp...

Journal: :Quantum Information Processing 2016
Luis F. M. Borelli Leandro da S. Aguiar José Antônio Roversi Antonio Vidiella-Barranco

In this work we present a quantum key distribution protocol using continuous-variable nonGaussian states, homodyne detection and post-selection. The employed signal states are the Photon Added then Subtracted Coherent States (PASCS) in which one photon is added and subsequently one photon is subtracted. We analyze the performance of our protocol, compared to a coherent state based protocol, for...

2007
Pierre-Alain Fouque Gilles Macario-Rat Ludovic Perret Jacques Stern

In this paper, we describe efficient forgery and full-key recovery attacks on the `-IC− signature scheme recently proposed at PKC 2007. This cryptosystem is a multivariate scheme based on a new internal quadratic primitive which avoids some drawbacks of previous multivariate schemes: the scheme is extremely fast since it requires one exponentiation in a finite field of medium size and the publi...

Journal: :IACR Cryptology ePrint Archive 2012
Subidh Ali Debdeep Mukhopadhyay

In this paper we propose a new differential fault analysis (DFA) on CLEFIA of 128-bit key. The proposed attack requires to induce byte faults at the fourteenth round of CLEFIA encryption. The attack uses only two pairs of fault-free and faulty ciphertexts and uniquely determines the 128-bit secret key. The attacker does not need to know the plaintext. The most efficient reported fault attack on...

2011
Laxminath Tripathy Nayan Ranjan Paul

In a key management scheme for hierarchy based access control, each security class having higher clearance can derive the cryptographic secret keys of its other security classes having lower clearances. In 2006 Jeng-Wang proposed an efficient scheme on access control in user hierarchy based on elliptic curve cryptosystem. Their scheme provides solution of key management efficiently for dynamic ...

2008
Pierre-Alain Fouque Gilles Macario-Rat Ludovic Perret Jacques Stern

In this paper, we describe efficient forgery and full-key recovery attacks on the `-IC− signature scheme recently proposed at PKC 2007. This cryptosystem is a multivariate scheme based on a new internal quadratic primitive which avoids some drawbacks of previous multivariate schemes: the scheme is extremely fast since it requires one exponentiation in a finite field of medium size and the publi...

1991
Peter de Rooij

In this paper, it is shorn that the Schnorr scheme with preprocessing BE proposed in I41 leaks too much information. An attack based on this information leakage is presented that retrieves the secret key. The complexity of this attack is upper bounded by 2k. b3(d-2) steps, and the expected required number of signatures is lees than Zk: .(j)"-', where k is a security parameter. This complexity i...

Journal: :IACR Cryptology ePrint Archive 2012
Philipp Jovanovic Martin Kreuzer Ilia Polian

In this paper we propose an attack on block ciphers where we combine techniques derived from algebraic and fault based cryptanalysis. The recently introduced block cipher LED serves us as a target for our attack. We show how to construct an algebraic representation of the encryption map and how to cast the side channel information gained from a fault injection into polynomial form. The resultin...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید