نتایج جستجو برای: middle mitm

تعداد نتایج: 155067  

Journal: :Expert Systems With Applications 2022

Multi-Channel Man-in-the-Middle (MitM) attacks are special MitM capable of manipulating encrypted wireless frames between two legitimate endpoints. Since its inception in 2014, attackers have been targeting Wi-Fi networks to perform different attacks, such as cipher downgrades, denial service, key reinstallation (KRACK) 2017, and recently FragAttacks 2021, which widely impacted millions devices...

Journal: :IET cyber-physical systems 2021

Man-in-The-Middle (MiTM) attacks present numerous threats to a smart grid. In MiTM attack, an intruder embeds itself within conversation between two devices either eavesdrop or impersonate one of the devices, making it appear be normal exchange information. Thus, can perform false data injection (FDI) and command (FCI) that compromise power system operations, such as state estimation, economic ...

Journal: :Quantum Information Processing 2023

Inspired by Hosoyamada and Sasaki (in: International conference on security cryptography for networks, pp 386–403. Springer, 2018), we propose a new quantum meet-in-the-middle (QMITM) attack r-round ( $$r \ge 7$$ ) Feistel construction to reduce the time complexity, which is based Guo et al. (Des Codes Cryptogr 80(3):587–618, 2016) classical (MITM) attack. In our attack, adjust size of truncate...

Journal: :CoRR 2012
Robayet Nasim

Exponential growth of the volume of Bluetooth-enabled devices indicates that it has become a popular way of wireless interconnections for exchanging information. The main goal of this paper is to analyze the most critical Bluetooth attacks in real scenarios. In order to find out the major vulnerabilities in modern Bluetooth-enabled mobile devices several attacks have performed successfully such...

Journal: :Lecture Notes in Computer Science 2023

The Meet-in-the-Middle (MitM) attack has been widely applied to preimage attacks on Merkle-Damgård (MD) hashing. In this paper, we introduce a generic framework of the MitM sponge-based We find certain bit conditions can significantly reduce diffusion unknown bits and lead longer characteristics. To good or optimal configurations attacks, e.g., conditions, neutral sets, matching points, bit-lev...

Journal: :IEEE Transactions on Vehicular Technology 2021

Key establishment is one fundamental issue in wireless security. The widely used Diffie-Hellman key exchange vulnerable to the man-in-the-middle (MITM) attack due its lack of mutual authentication. This paper presents a novel in-band solution for defending MITM during process devices. Our based on insight that an attacker inevitably affects link layer behavior channel, and this change introduce...

2017
Akinori Hosoyamada Yu Sasaki

This paper shows that quantum computers can significantly speed-up a type of meet-in-the-middle attacks initiated by Demiric and Selçuk (DS-MITM attacks), which is currently one of the most powerful cryptanalytic approaches in the classical setting against symmetric-key schemes. The quantum DS-MITM attacks are then demonstrated against 6 rounds of the generic Feistel construction supporting an ...

2013
Dominik Schürmann Stephan Sigg

Recently, several mobile applications were released that claim to provide secure Voice-over-IP communications. Most of these, e.g., Redphone by Open WhisperSystems or Silent Phone by Silent Circle, are utilizing ZRTP [4] to establish session keys for end-to-end security. ZRTP was designed to achieve key exchange without trusted third parties or certificate infrastructure, while providing a way ...

Journal: :JNW 2014
Jia-Ning Luo Ming-Hour Yang

In this paper, we propose a new protocol to allow delegation transfer between offline mobile readers in the mobile RFID (Radio Frequency Identification) environment. A mobile reader can grant the access rights of a specific tag to another reader. Besides, our protocol is efficient and secure against most current network threats, such as replay attacks, Man-in-the-Middle (MITM) attacks, denial o...

2015
Yaoqi Jia Yue Chen Xinshu Dong Prateek Saxena Jian Mao Zhenkai Liang

When browsing the web using HTTPS, if a user Alice ignores, or clicks through, the browser’s SSL warnings of an invalid SSL certificate, she exposes her browser sessions to a Man-in-the-middle (MITM) attack, allowing attackers to intercept communication in the SSL channel. Recent work has measured the click-through rates for SSL warnings, indicating that more than 50% users click through SSL wa...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید