Title of paper:
|
Modeling net attacks for listening and break-down crypted messages by using of generalized net model
|
Author(s):
|
Ivelina Vardeva
|
University of „Prof. d-r Assen Zlatarov” – Bourgas, Bulgaria
|
iveto@btu.bg
|
|
Presented at:
|
9th ICIFS, Sofia, 4 July 2008
|
Published in:
|
Conference proceedings, pages 20—27
|
Download:
|
PDF (235 Kb, File info)
|
Abstract:
|
The article examines the structure of two of the basic attacks of sent in the public net cipher messages. It is used the apparatus of generalized net for modeling the processes of attacks for listening and braking the sent messages. About the examined ciphered messages is used RSA asymmetric algorithm.
|
Keywords:
|
Generalized nets, Cryptography, Cryptoattack, Listening, Break-down, RSA, Attacker’s capabilities, Attacker’s goal
|
References:
|
- Atanassov, K., „Introduction in the theory generalized nets”, Burgas, Bulgaria, 1992г.
- Atanassov, K., Generalized nets, World Scientific, Singapore, New Jersey, London1991
- Bellare, M., Rogaway, P., “Optimal Asymmetric Encryption.” In A. De Santis, ed, Proceedings of Eurocrypt ‘94 vol. 950 of Lecture Notes in Computer Science (LNCS), pp. 92–111. Springer-Verlag,1994.
- Blaze, M., Ioannidis, J., University of Pennsylvania,”DSA and RSA Key and Signature Encoding for the KeyNote Trust Management System”, March 2000
- C. Rackoff and D. R. Simon. Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack. In Crypto ‘91, LNCS 576, pages 433-444. Springer-Verlag, Berlin, 1992.
- CryptoBytes Volume 5, No. 1 Winter/Spring 2002
- D. Boneh and G. Durfee. “Cryptanalysis of RSA with Private Key d Less than n0.292.” IEEE Transactions on Information Theory 46(4):1339–1349, Jul. 2000. Early version in Proceedings of Eurocrypt ’99
- Goldwasser, S., Micali, S., Probabilistic Encryption. Journal of Computer and System Sciences, 28:270-299, 1984.
- Hristov, H., Trifonov, V., „Reliability and security of communications”, Sofia, Bulgaria 2005
- http://www.rsa.com/
- Menezes, A., Van Oorschot, P., Vanstone, S., Handbook of Applied Cryptography. CRC Press, 1997.
- Piper, F., Murphy, S., „Cryptography: A Very Short Introduction”, Oxford University Press 2002
- RSA Labs. Public Key Cryptography Standards (PKCS), Number 1 Version 2.0. Version 2.1 draft is available at http://www.rsalabs.com/pkcs/pkcs-1/index.html
- Vardeva, I., Generalized Net model of the Creation of Virtual Private Network by using Point-to-Point Protocol over Secure Shell, Issue on Intuitionistic Fuzzy Sets and Generalized nets, Volume 4, Warsaw, 2006
- Vardeva, I., Sotirov, S., Generalized Net model of SSL with intuitionistic fuzzy estimations, Notes on IFS, Proceedings of the Eleventh International Conference on Intuitionistic Fuzzy Sets, Sofia , Volume 13, April 2007, 48-53
- Wiener, M., “Cryptanalysis of Short RSA Secret Exponents.” IEEE Trans. on Info. Th. 36(3):553–558. May 1990.
|
Citations:
|
The list of publications, citing this article may be empty or incomplete. If you can provide relevant data, please, write on the talk page.
|
|