Results 1  10
of
17,339
Vulnerability of SSL to ChosenPlaintext Attack
, 2004
"... The Secure Sockets Layer (SSL) protocol is widely used for securing communication over the Internet. When utilizing block ciphers for encryption, the SSL standard mandates the use of the cipher block chaining (CBC) mode of encryption which requires an initialization vector (IV) in order to encryp ..."
Abstract

Cited by 16 (1 self)
 Add to MetaCart
The Secure Sockets Layer (SSL) protocol is widely used for securing communication over the Internet. When utilizing block ciphers for encryption, the SSL standard mandates the use of the cipher block chaining (CBC) mode of encryption which requires an initialization vector (IV) in order
Secure and robust SIFT with resistance to chosenplaintext attack
 In Proceedings of 2010 IEEE International Conference on Image Processing
, 2010
"... Scaleinvariant feature transform (SIFT) is a powerful tool extensively used in the community of pattern recognition and computer vision. The security issue of SIFT, however, is relatively unexplored. We point out the potential weakness of SIFT, meaning that the SIFT features can be deleted or dest ..."
Abstract

Cited by 2 (0 self)
 Add to MetaCart
or destroyed while maintaining acceptable visual qualities. To properly achieve the tradeoff between security and robustness of SIFT, we present a cubebased secure transformation mechanism to enable the SIFT method to resist up to the chosen plaintext attack while robustness against geometric attacks can
Instantiability of rsaoaep under chosenplaintext attack
 In CRYPTO
, 2010
"... We show that the widely deployed RSAOAEP encryption scheme of Bellare and Rogaway (Eurocrypt 1994), which combines RSA with two rounds of an underlying Feistel network whose hash(i.e., round)functions aremodeledasrandomoracles,meets indistinguishabilityunderchosenplaintext attack (INDCPA) in the s ..."
Abstract

Cited by 16 (1 self)
 Add to MetaCart
wise independent for appopriate t and that RSA satisfies condition (2) under the ΦHiding Assumption of Cachin et al. (Eurocrypt 1999). This appears to be the first nontrivial positive result about the instantiability ofRSAOAEP. In particular, it increases our confidence that chosenplaintext attacks
Modes of Encryption Secure against BlockwiseAdaptive ChosenPlaintext Attack
, 2006
"... Blockwiseadaptive chosenplaintext and chosenciphertext attack are new models for cryptanalytic adversaries, first discovered by Joux, et al [JMV02], and describe a vulnerability in SSH discovered by Bellare, et al [BKN02]. Unlike traditional chosenplaintext (CPA) or chosenciphertext (CCA) ad ..."
Abstract
 Add to MetaCart
Blockwiseadaptive chosenplaintext and chosenciphertext attack are new models for cryptanalytic adversaries, first discovered by Joux, et al [JMV02], and describe a vulnerability in SSH discovered by Bellare, et al [BKN02]. Unlike traditional chosenplaintext (CPA) or chosenciphertext (CCA
A Challenging But Feasible BlockwiseAdaptive ChosenPlaintext Attack on SSL
 SECRYPT 2006, PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SET'UBAL
, 2006
"... This paper introduces a chosenplaintext vulnerability in the Secure Sockets Layer (SSL) and Trasport Layer Security (TLS) protocols which enables recovery of low entropy strings such as can be guessed from a likely set of 21000 options. SSL and TLS are widely used for securing communication ove ..."
Abstract

Cited by 21 (1 self)
 Add to MetaCart
This paper introduces a chosenplaintext vulnerability in the Secure Sockets Layer (SSL) and Trasport Layer Security (TLS) protocols which enables recovery of low entropy strings such as can be guessed from a likely set of 21000 options. SSL and TLS are widely used for securing communication
Chosenplaintext cryptanalysis of a clippedneuralnetworkbased chaotic cipher
 In Advances in Neural Networks C ISNN 2005 Proceedings, Part II
, 2005
"... Abstract. In ISNN’04, a novel symmetric cipher was proposed, by combining a chaotic signal and a clipped neural network (CNN) for encryption. The present paper analyzes the security of this chaotic cipher against chosenplaintext attacks, and points out that this cipher can be broken by a chosenpla ..."
Abstract

Cited by 3 (2 self)
 Add to MetaCart
Abstract. In ISNN’04, a novel symmetric cipher was proposed, by combining a chaotic signal and a clipped neural network (CNN) for encryption. The present paper analyzes the security of this chaotic cipher against chosenplaintext attacks, and points out that this cipher can be broken by a chosenplaintext
Direct chosenciphertext secure identitybased key encapsulation without random oracles
 In ACISP 2006
, 2006
"... We describe a practical identitybased encryption scheme that is secure in the standard model against chosenciphertext attacks. Our construction applies “direct chosenciphertext techniques ” to Waters ’ chosenplaintext secure scheme and is not based on hierarchical identitybased encryption. Furt ..."
Abstract

Cited by 31 (4 self)
 Add to MetaCart
We describe a practical identitybased encryption scheme that is secure in the standard model against chosenciphertext attacks. Our construction applies “direct chosenciphertext techniques ” to Waters ’ chosenplaintext secure scheme and is not based on hierarchical identitybased encryption
Data Security
, 1979
"... The rising abuse of computers and increasing threat to personal privacy through data banks have stimulated much interest m the techmcal safeguards for data. There are four kinds of safeguards, each related to but distract from the others. Access controls regulate which users may enter the system and ..."
Abstract

Cited by 611 (3 self)
 Add to MetaCart
of statistical queries and correlating the responses. Statlstmal data banks are much less secure than most people beheve. Data encryption attempts to prevent unauthorized disclosure of confidential information in transit or m storage. This paper describes the general nature of controls of each type, the kinds
Relations among notions of security for publickey encryption schemes
, 1998
"... Abstract. We compare the relative strengths of popular notions of security for public key encryption schemes. We consider the goals of privacy and nonmalleability, each under chosen plaintext attack and two kinds of chosen ciphertext attack. For each of the resulting pairs of definitions we prove e ..."
Abstract

Cited by 514 (68 self)
 Add to MetaCart
Abstract. We compare the relative strengths of popular notions of security for public key encryption schemes. We consider the goals of privacy and nonmalleability, each under chosen plaintext attack and two kinds of chosen ciphertext attack. For each of the resulting pairs of definitions we prove
Results 1  10
of
17,339