Chip flaws could provide a way to beat encryption
Related Articles
- Cryptanalysis of Server-Aided Password-Based Authenticated Key Exchange Protocols. Junghyun Nam; Kim-Kwang Raymond Choo; Juryon Paik; Dongho Won // International Journal of Security & Its Applications;Mar2013, Vol. 7 Issue 2, p47
Protocols for password-based authenticated key exchange (PAKE) enable two or more parties communicating over a public network to build a secure communication channel using their easy-to-remember passwords. However, off-line dictionary attacks have always been a major security concern in...
- A Simpler Construction of CCA2-Secure Public-Key Encryption under General Assumptions. Lindell, Yehuda // Journal of Cryptology;Summer2006, Vol. 19 Issue 3, p359
In this paper we present a simpler construction of a public-key encryption scheme that achieves adaptive chosen ciphertext security (CCA2), assuming the existence of trapdoor permutations. We build on previous works of Sahai and De Santis et al. and construct a scheme that we believe is the...
- Cryptanalysis of Hwang et al.'s Improved Encryption Scheme. Dezhi Gao; Xiangqian Liang // Journal of Systems Science & Information;Jun2009, Vol. 7 Issue 2, p159
Recently, Tseng et al. proposed authenticated encryption scheme with message recovery using self-certified public keys. Hwang et al. proposed an attack to show that the Tseng et al.'s scheme was not secure. And Hwang et al. proposed an improved scheme and claimed to that the new scheme satisfy...
- SUPPORTING NATIONAL PUBLIC KEY INFRASTRUCTURES USING SMART CARDS. Dos Santos, A. L. M.; Torrey, M. E.; El Sheshai, A. // International Journal of Computers & Applications;2005, Vol. 27 Issue 1, p35
National public key infrastructures have been proposed by governmental entities all over the world. Such infrastructures can be used to further build functionalities enabling e-government services. This article describes protocols for certificate generation and revocation that are appropriate...
- Public-key encryption based on generalized synchronization of coupled map lattices. Xingang Wang; Xiaofeng Gong; Meng Zhan; Choy Heng Lai // Chaos;Jun2005, Vol. 15 Issue 2, p023109
Currently used public-key cryptosystems are based on difficulties in solving certain numeric theoretic problems, in which the way to predict the private key from the knowledge of the public key is computationally infeasible. Here we propose a method of constructing public-key cryptosystems by...
- Breaking four mix-related schemes based on Universal Re-encryption. Danezis, George // International Journal of Information Security;Oct2007, Vol. 6 Issue 6, p393
Universal Re-encryption allows El-Gamal ciphertexts to be re-encrypted without knowledge of their corresponding public keys. This has made it an enticing building block for anonymous communications protocols. In this work we analyze four schemes related to mix networks that make use of Universal...
- Privacy-aware searching with oblivious term matching for cloud storage. Pervez, Zeeshan; Awan, Ammar; Khattak, Asad; Lee, Sungyoung; Huh, Eui-Nam // Journal of Supercomputing;Feb2013, Vol. 63 Issue 2, p538
Encryption ensures confidentiality of the data outsourced to cloud storage services. Searching the encrypted data enables subscribers of a cloud storage service to access only relevant data, by defining trapdoors or evaluating search queries on locally stored indexes. However, these approaches...
- New technology could simplify encryption management. // Secured Lender;Nov/Dec2006, Vol. 62 Issue 6, p146
The article provides information on identity-based encryption (IBE) system designed to solve the shortcomings of public key infrastructure (PKI) encryption. A typical PKI requires users to register with a certificate authority to receive a pair of keys that encrypt and decrypt messages. IBE...
- ELECRONIC INSURANCE SECURITY. Sanayei, Ali; Torkestani, Mohammad Saleh; Ahadi, Pari // Proceedings of the IADIS International Conference on WWW/Interne;Nov2008, p59
The low-cost nature of the Internet coupled with the ease of making transactions has led to an explosive growth in ebusiness but trust in this medium is still a major concern. E-security is the foundation that enables trust in e-business. In this sense, main cryptographic aspects of modern...