نتایج جستجو برای: distinguishing attacks

تعداد نتایج: 86712  

2005
Itsik Mantin

In this paper we analyze the statistical distribution of the keystream generator used by the stream ciphers RC4 and RC4A. Our first result is the discovery of statistical biases of the digraphs distribution of RC4/RC4A generated streams, where digraphs tend to repeat with short gaps between them. We show how an attacker can use these biased patterns to distinguish RC4 keystreams of 2 bytes and ...

2014
Ming Li Wei Zhao Tomas Pereira Shengyong Chen

Reliable distinguishing DDOS flood traffic from aggregated traffic is desperately desired by reliable prevention of DDOS attacks. By reliable distinguishing, we mean that flood traffic can be distinguished from aggregated one for a predetermined probability. The basis to reliably distinguish flood traffic from aggregated one is reliable detection of signs of DDOS flood attacks. As is known, rel...

Journal: :Computer Networks 2004
Alefiya Hussain John S. Heidemann Christos Papadopoulos

Launching a denial of service (DoS) attack is trivial, but detection and response is a painfully slow and often a manual process. Automatic classification of attacks as singleor multi-source can help focus a response, but current packet-header-based approaches are susceptible to spoofing. This paper introduces a framework for classifying DoS attacks based on header content, transient ramp-up be...

Journal: :IACR Cryptology ePrint Archive 2017
Vahid Amin Ghafari Honggang Hu Mohammadsadegh alizadeh

After the introduction of some stream ciphers with the minimal internal state, the design idea of these ciphers (i.e. the design of stream ciphers by using a secret key, not only in the initialization but also permanently in the keystream generation) has been developed. The idea lets to design lighter stream ciphers that they are suitable for devices with limited resources such as RFID, WSN. We...

2005
Gilles Piret

DICING is a synchronous stream cipher submitted to the ECRYPT stream cipher project. Two versions of the cipher actually exist: the first one can be found in the proceedings of the SKEW conference, while the second is available from the web site. In this paper we describe practical distinguishing and key recovery attacks against the first version. These attacks do not apply as such to the web s...

Journal: :IACR Cryptology ePrint Archive 2015
Goutam Paul Souvik Ray

We revisit the different approaches used in the literature to estimate the data complexity of distinguishing attacks on stream ciphers and analyze their inter-relationships. In the process, we formally argue which approach is applicable (or not applicable) in what scenario. To our knowledge, this is the first kind of such an exposition. We also perform a rigorous statistical analysis of the mes...

2012
Christophe Clavier Benoit Feix Georges Gagnerot Christophe Giraud Mylène Roussellet Vincent Verneuil

In most efficient exponentiation implementations, recovering the secret exponent is equivalent to disclosing the sequence of squaring and multiplication operations. Some known attacks on the RSA exponentiation apply this strategy, but cannot be used against classical blinding countermeasures. In this paper, we propose new attacks distinguishing squaring from multiplications using a single side-...

Journal: :IACR Cryptology ePrint Archive 2013
Jian Guo Yu Sasaki Lei Wang Shuang Wu

In this paper, we present universal forgery and key recovery attacks on the most popular hash-based MAC constructions, e.g., HMAC and NMAC, instantiated with an AES-like hash function Whirlpool. These attacks work with Whirlpool reduced to 6 out of 10 rounds in single-key setting. To the best of our knowledge, this is the first result on “original” key recovery for HMAC (previous works only suc...

2005
An Braeken Joseph Lano

A vast amount of literature on stream ciphers is directed to the cryptanalysis of LFSR-based filters and combiners, resulting in various attack models such as distinguishing attacks, (fast) correlation attacks and (fast) algebraic attacks. However, very little is known on the combined effects of these attacks and the resulting cryptographic requirements. In this paper, we present a unified fram...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید