scispace - formally typeset
Open Access

Secure Communications over Insecure Channels Using an Authenticated Channel

TLDR
This work sketches three generic attacks against any message authentication protocol, concludes on their maximal security, and proposes a new protocol which achieves the same security level as that of SSH and GPG, but using much less authenticated bits.
Abstract
A secure communication over an insecure channel without any prior exchanged key can be established with the help of an authentication step to exchange a public key and then using public-key cryptography such as RSA. In this work, we concentrate on message authentication protocols which require an extra authenticated channel. We also recall biometrics-based systems which are hard to implement and distance bounding-based authentication systems which are limited to closer communications. We sketch three generic attacks against any message authentication protocol, conclude on their maximal security, and study the security of some protocols. Finally, we propose a new protocol which achieves the same security level as that of SSH and GPG, but using much less authenticated bits.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

Security Authentication System Using Encrypted Channel on UAV Network

TL;DR: This paper proposed maintaining control of UAV in hijacking problem with an additional encrypted communication channel, authentication algorithm and DoS attack through Raspberry Pi and shown high applicability on the commercial UAVs.
Book ChapterDOI

An optimal non-interactive message authentication protocol

TL;DR: In this paper, the authors proposed a non-interactive message authentication protocol (NIMAP) based on short authenticated strings (SAS), which can achieve the same security as the first protocol but using less authenticated bits, without any stronger communication model, and without requiring a hash function to be collision-resistant.
Book ChapterDOI

Timed release cryptography from bilinear pairings using hash chains

TL;DR: This work proposes a new Timed Release Cryptography (TRC) scheme which is based on bilinear pairings together with an S/Key-like procedure used for private key generation, and uses continuous hashed time-instant private keys (hash chain) for this purpose.
Journal Article

On deniability in the common reference String and Random Oracle model

TL;DR: In this paper, the notion of deniable zero-knowledge in the Common Reference String (CRS) model and the Random Oracle (RO) model was revisited and the possibility of achieving deniability in these models was investigated.
Journal Article

Requirements for Client Puzzles to Defeat the Denial of Service and the Distributed Denial of Service Attacks.

TL;DR: A solution is proposed based on including a puzzle-solution request in different states of a given connection such that the computational load for solving the puzzles will be noted but the clients’ operations will not be totally interrupted.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI

A method for obtaining digital signatures and public-key cryptosystems

TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Book

Handbook of Applied Cryptography

TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Journal ArticleDOI

Communication theory of secrecy systems

TL;DR: A theory of secrecy systems is developed on a theoretical level and is intended to complement the treatment found in standard works on cryptography.
Book ChapterDOI

Public-key cryptosystems based on composite degree residuosity classes

TL;DR: A new trapdoor mechanism is proposed and three encryption schemes are derived : a trapdoor permutation and two homomorphic probabilistic encryption schemes computationally comparable to RSA, which are provably secure under appropriate assumptions in the standard model.
Related Papers (5)