Open Access
Secure Communications over Insecure Channels Using an Authenticated Channel
TLDR
This work sketches three generic attacks against any message authentication protocol, concludes on their maximal security, and proposes a new protocol which achieves the same security level as that of SSH and GPG, but using much less authenticated bits.Abstract:
A secure communication over an insecure channel without any prior exchanged key can be established with the help of an authentication step to exchange a public key and then using public-key cryptography such as RSA. In this work, we concentrate on message authentication protocols which require an extra authenticated channel. We also recall biometrics-based systems which are hard to implement and distance bounding-based authentication systems which are limited to closer communications. We sketch three generic attacks against any message authentication protocol, conclude on their maximal security, and study the security of some protocols. Finally, we propose a new protocol which achieves the same security level as that of SSH and GPG, but using much less authenticated bits.read more
Citations
More filters
Proceedings ArticleDOI
Security Authentication System Using Encrypted Channel on UAV Network
TL;DR: This paper proposed maintaining control of UAV in hijacking problem with an additional encrypted communication channel, authentication algorithm and DoS attack through Raspberry Pi and shown high applicability on the commercial UAVs.
Book ChapterDOI
An optimal non-interactive message authentication protocol
Sylvain Pasini,Serge Vaudenay +1 more
TL;DR: In this paper, the authors proposed a non-interactive message authentication protocol (NIMAP) based on short authenticated strings (SAS), which can achieve the same security as the first protocol but using less authenticated bits, without any stronger communication model, and without requiring a hash function to be collision-resistant.
Book ChapterDOI
Timed release cryptography from bilinear pairings using hash chains
TL;DR: This work proposes a new Timed Release Cryptography (TRC) scheme which is based on bilinear pairings together with an S/Key-like procedure used for private key generation, and uses continuous hashed time-instant private keys (hash chain) for this purpose.
Journal Article
On deniability in the common reference String and Random Oracle model
TL;DR: In this paper, the notion of deniable zero-knowledge in the Common Reference String (CRS) model and the Random Oracle (RO) model was revisited and the possibility of achieving deniability in these models was investigated.
Journal Article
Requirements for Client Puzzles to Defeat the Denial of Service and the Distributed Denial of Service Attacks.
TL;DR: A solution is proposed based on including a puzzle-solution request in different states of a given connection such that the computational load for solving the puzzles will be noted but the clients’ operations will not be totally interrupted.
References
More filters
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI
A method for obtaining digital signatures and public-key cryptosystems
TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Book
Handbook of Applied Cryptography
TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Journal ArticleDOI
Communication theory of secrecy systems
TL;DR: A theory of secrecy systems is developed on a theoretical level and is intended to complement the treatment found in standard works on cryptography.
Book ChapterDOI
Public-key cryptosystems based on composite degree residuosity classes
TL;DR: A new trapdoor mechanism is proposed and three encryption schemes are derived : a trapdoor permutation and two homomorphic probabilistic encryption schemes computationally comparable to RSA, which are provably secure under appropriate assumptions in the standard model.
Related Papers (5)
Method and system for authenticated secure key distribution in a communication system
Philippe Janson,Gene Tsudik +1 more