1,804 research outputs found
Key exchange with the help of a public ledger
Blockchains and other public ledger structures promise a new way to create
globally consistent event logs and other records. We make use of this
consistency property to detect and prevent man-in-the-middle attacks in a key
exchange such as Diffie-Hellman or ECDH. Essentially, the MitM attack creates
an inconsistency in the world views of the two honest parties, and they can
detect it with the help of the ledger. Thus, there is no need for prior
knowledge or trusted third parties apart from the distributed ledger. To
prevent impersonation attacks, we require user interaction. It appears that, in
some applications, the required user interaction is reduced in comparison to
other user-assisted key-exchange protocols
On the Design of Cryptographic Primitives
The main objective of this work is twofold. On the one hand, it gives a brief
overview of the area of two-party cryptographic protocols. On the other hand,
it proposes new schemes and guidelines for improving the practice of robust
protocol design. In order to achieve such a double goal, a tour through the
descriptions of the two main cryptographic primitives is carried out. Within
this survey, some of the most representative algorithms based on the Theory of
Finite Fields are provided and new general schemes and specific algorithms
based on Graph Theory are proposed
Security by Spatial Reference:Using Relative Positioning to Authenticate Devices for Spontaneous Interaction
Spontaneous interaction is a desirable characteristic associated with mobile and ubiquitous computing. The aim is to enable users to connect their personal devices with devices encountered in their environment in order to take advantage of interaction opportunities in accordance with their situation. However, it is difficult to secure spontaneous interaction as this requires authentication of the encountered device, in the absence of any prior knowledge of the device. In this paper we present a method for establishing and securing spontaneous interactions on the basis of emphspatial references that capture the spatial relationship of the involved devices. Spatial references are obtained by accurate sensing of relative device positions, presented to the user for initiation of interactions, and used in a peer authentication protocol that exploits a novel mechanism for message transfer over ultrasound to ensures spatial authenticity of the sender
Resolution of Linear Algebra for the Discrete Logarithm Problem Using GPU and Multi-core Architectures
In cryptanalysis, solving the discrete logarithm problem (DLP) is key to
assessing the security of many public-key cryptosystems. The index-calculus
methods, that attack the DLP in multiplicative subgroups of finite fields,
require solving large sparse systems of linear equations modulo large primes.
This article deals with how we can run this computation on GPU- and
multi-core-based clusters, featuring InfiniBand networking. More specifically,
we present the sparse linear algebra algorithms that are proposed in the
literature, in particular the block Wiedemann algorithm. We discuss the
parallelization of the central matrix--vector product operation from both
algorithmic and practical points of view, and illustrate how our approach has
contributed to the recent record-sized DLP computation in GF().Comment: Euro-Par 2014 Parallel Processing, Aug 2014, Porto, Portugal.
\<http://europar2014.dcc.fc.up.pt/\>
New, efficient and robust, fiber-based quantum key distribution schemes
We present a new fiber based quantum key distribution (QKD) scheme which can
be regarded as a modification of an idea proposed by Inoue, Waks and Yamamoto
(IWY) [1]. The scheme described here uses a single phase modulator and two
differential delay elements in series at the transmitter that form an
interferometer when combined with a third differential delay element at the
receiver. The protocol is characterized by a high efficiency, reduced exposure
to an attack by an eavesdropper, and higher sensitivity to such an attack when
compared to other QKD schemes. For example, the efficiency with which
transmitted data contribute to the private key is 3/4 compared with 1/4 for
BB84 [2]. Moreover, an eavesdropper can aquire a maximum of 1/3 of the key
which leads to an error probability in the private key of 1/3. This can be
compared to 1/2 and 1/4 for these same parameters in both BB84 and IWY. The
combination of these considerations should lead to increased range and key
distribution rate over present fiber-based QKD schemes.Comment: 4 pages, 5 figures, 1 equatio
An application of group theory in confidential network communications : special Issue paper
A new proposal for group key exchange is introduced which proves to be both efficient and secure and compares favorably with state of the art protocols
Experimentally realizable quantum comparison of coherent states and its applications
When comparing quantum states to each other, it is possible to obtain an
unambiguous answer, indicating that the states are definitely different,
already after a single measurement. In this paper we investigate comparison of
coherent states, which is the simplest example of quantum state comparison for
continuous variables. The method we present has a high success probability, and
is experimentally feasible to realize as the only required components are beam
splitters and photon detectors. An easily realizable method for quantum state
comparison could be important for real applications. As examples of such
applications we present a "lock and key" scheme and a simple scheme for quantum
public key distribution.Comment: 14 pages, 5 figures, version one submitted to PRA. Version two is the
final accepted versio
Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions
Authenticated Diffie-Hellman key exchange allows two principals communicating over a public network, and each holding public /private keys, to agree on a shared secret value. In this paper we study the natural extension of this cryptographic problem to a group of principals. We begin from existing formal security models and refine them to incorporate major missing details (e.g., strong-corruption and concurrent sessions). Within this model we define the execution of a protocol for authenticated dynamic group Diffie-Hellman and show that it is provably secure under the decisional Diffie-Hellman assumption. Our security result holds in the standard model and thus provides better security guarantees than previously published results in the random oracle model
Analysis of common attacks in LDPCC-based public-key cryptosystems
We analyze the security and reliability of a recently proposed class of
public-key cryptosystems against attacks by unauthorized parties who have
acquired partial knowledge of one or more of the private key components and/or
of the plaintext. Phase diagrams are presented, showing critical partial
knowledge levels required for unauthorized decryptionComment: 14 pages, 6 figure
- …
