نتایج جستجو برای: forgery attack

تعداد نتایج: 82328  

Journal: :Journal of Information Processing 2008

2014
Rigel Gjomemo Hafiz Malik Nilesh Sumb V. N. Venkatakrishnan Rashid Ansari

In this paper, we present a digital check forgery attack on check processing systems used in online banking that results in check fraud. Such an attack is facilitated by multiple factors: the use of digital images to perform check transactions, advances in image processing technologies, the use of untrusted client-side devices and software, and the modalities of deposit. We note that digital ch...

2011
Raja Zeshan Haider

128-EIA3 is an integrity algorithm considered for adoption as a third integrity algorithm by European Telecommunication Standard Institute (ETSI) for 4th generation of GSM networks.128-EIA3 is vulnerable to birthday forgery attack. Birthday forgery attack requires minimum 2 known message-MAC pairs for finding collision in 128-EIA3. 128-EIA3 is susceptible to internal collision of its universal ...

2007
Yongdong Wu Feng Bao Robert H. Deng

In this paper, we present a forgery attack to a black-box traitor tracing scheme [2] called as CPP scheme. CPP scheme has efficient transmission rate and allows the tracer to identify a traitor with just one invalid ciphertext. Since the original CPP scheme is vulnerable to the multi-key attack, we improved CPP to thwart the attack. However, CPP is vulnerable to a fatal forgery attack. In the f...

Journal: :I. J. Network Security 2013
Kitae Kim Hyung-Don Kim Seungho Kim Ikkwon Yie

We first give an analysis on Zhang et al.’s attack on a short signature scheme so called ZCSM scheme and point out their forgery attack is not correct one. Furthermore, we present a forgery attack under the chosen message and public key attacks on ZCSM scheme, in the sense of Zhang et al.’s attack. We also analyze Zhang et al.’s improved signature scheme suggested to resist their attacks and po...

2006
Behnam Sattarzadeh Mahdi Asadpour Rasool Jalili

In 2003, Wu and Chieu proposed a user friendly remote authentication scheme using smart cards. Later, Yang and Wang pointed out that Wu and Chieu’s scheme is vulnerable to the password guessing and forgery attacks. Recently, Lee et al. proposed an improved authentication scheme and claimed that their scheme is secure against forgery attack. However, in this paper, we illustrate that Lee et al.’...

Journal: :IACR Cryptology ePrint Archive 2014
Yu Sasaki Lei Wang

PAES is an authenticated encryption scheme designed by Ye et al., and submitted to the CAESAR competition. The designers claim that PAES-8, which is one of the designs of the PAES-family, provides 128-bit security in the nonce misuse model. In this note, we show our forgery attack against PAES-8. Our attack works in the nonce misuse model. The attack exploits the slow propagation of message dif...

2009
Jean-Sébastien Coron David Naccache Mehdi Tibouchi Ralf-Philipp Weinmann

In 1999, Coron, Naccache and Stern discovered an existential signature forgery for two popular rsa signature standards, iso/iec 97961 and 2. Following this attack iso/iec 9796-1 was withdrawn. iso/iec 9796-2 was amended by increasing the message digest to at least 160 bits. Attacking this amended version required at least 2 operations. In this paper, we exhibit algorithmic refinements allowing ...

Journal: :IACR Cryptology ePrint Archive 2002
Jung Hee Cheon

In this paper we propose a universal forgery attack of Hess’s second IDbased signature scheme against the known-message attack.

Journal: :Applied Mathematics and Computation 2005
Chou Chen Yang Ren-Chiun Wang Ting Yi Chang

Recently, Yang and Shieh proposed two password authentication schemes by employing smart cards. One is a timestamp-based password authentication scheme and the other is a nonce-based password authentication scheme. In 2002, Chan and Cheng pointed out that Yang and Shieh’s timestamp-based password authentication scheme was vulnerable to the forgery attack. However, in 2003, Sun and Yeh pointed o...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید