نتایج جستجو برای: middle mitm

تعداد نتایج: 155067  

Journal: :IACR transaction on symmetric cryptology 2022

At ASIACRYPT 2012, Sasaki et al. introduced the guess-and-determine approach to extend meet-in-the-middle (MITM) preimage attack. CRYPTO 2021, Dong proposed a technique derive solution spaces of nonlinear constrained neutral words in MITM In this paper, we try combine these two techniques further improve attacks. Based on previous MILP-based automatic tools for attacks, introduce new constraint...

Journal: :IEEE Transactions on Dependable and Secure Computing 2022

Since the nineties, Man-in-The-Middle (MITM) attack has been one of most effective strategies adopted for compromising information security in network environments. In this article, we focus our attention on ARP cache poisoning, which is well-known and more techniques performing MITM attacks Ethernet local area networks. More precisely, will prove that, environments with at least malicious host...

Journal: :CoRR 2016
Guy Kloss

For secure communication it is not just sufficient to use strong cryptography with good and strong keys, but to actually have the assurance, that the keys in use for it are authentic and from the contact one is expecting to communicate with. Without that, it is possible to be subject to impersonation or man-in-the-middle (MitM) attacks. Mega meets this problem by providing a hierarchical authen...

Journal: :CoRR 2012
K. Saravanan L. Vijayanand R. K. Negesh

As an interconnection technology, Bluetooth has to address all traditional security problems, well known from the distributed networks. Moreover, as Bluetooth networks are formed by the radio links, there are also additional security aspects whose impact is yet not well understood. In this paper, we propose a novel Man-In-The-Middle (MITM) attack against Bluetooth enabled mobile phone that supp...

Journal: :IJSN 2009
Claudio Soriente Gene Tsudik Ersin Uzun

Secure initial pairing of electronic gadgets is a challenging problem because of the usual lack of a common security infrastructure and the threat of so-called Man-in-the-Middle (MiTM) attacks. A number of techniques have been proposed to address the problem, butmany are not applicable to devices lacking required interfaces, such as displays or speakers. In this paper, we introduce a new secure...

2012
Saurabh R Kulkarni Chinmay Khasnis

This paper deals with modern cellular phones that operate on Voice over Internet Protocol, their current development, several Information security risks associated with them and various countermeasures that can be undertaken to prevent data theft/misuse. VoIP is vulnerable to well known traditional modes of attack such as Denial of Service (DoS),Man in the middle (MiTM) etc but also introduces ...

Journal: :Symmetry 2022

Mobile ad hoc networks (MANETs) are being used more and in a variety of fields, including the environment, energy efficiency, smart transportation, intelligent agriculture, Internet Things (IoT) ecosystems. They also anticipated to play an increasingly significant role future due strong evolution wireless technology recent years. Nevertheless, this inter-node communication is vulnerable various...

Journal: :Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 2022

Man in the Middle (MitM) is one of attack techniques conducted for eavesdropping on data transitions or conversations between users some systems secretly. It has a sizeable impact because it could make attackers will do another attack, such as website system deface phishing. Deep Learning be able to predict various well. Hence, this study, we would like present approach detect MitM attacks and ...

Journal: :Lecture Notes in Computer Science 2023

The Demirci-Selçuk meet-in-the-middle (DS-MITM) attack is a sophisticated variant of differential attacks. Due to its sophistication, it hard efficiently find the best DS-MITM attacks on most ciphers except for AES. Moreover, current automatic tools only capture basic version attacks, and critical techniques developed enhancing (e.g., enumeration key-dependent-sieve) still rely manual work. In ...

Journal: :J. UCS 2008
Helmut Hlavacs Wilfried N. Gansterer Hannes Schabauer Joachim Zottl Martin Petraschek Thomas Hoeher Oliver Jung

In this paper we present and discuss a new approach for securing multimedia communication, which is based on three innovations. The first innovation is the integration of a challenge-response scheme for enhancing the Diffie-Hellman based ZRTP protocol. When being called, a callee must present the result of a computational puzzle (a “token”) within a short amount of time. A Man-in-the-Middle (Mi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید