Submit your research to the International Journal "Notes on Intuitionistic Fuzzy Sets". Contact us at

Call for Papers for the 25th Jubilee Edition of the International Conference on Intuitionistic Fuzzy Sets is now open!
Conference: 9–10 September 2022 • Deadline for submission: 30 May 2022.

Issue:Modeling net attacks for listening and break-down crypted messages by using of generalized net model

From Ifigenia, the wiki for intuitionistic fuzzy sets and generalized nets
Jump to navigation Jump to search
Title of paper: Modeling net attacks for listening and break-down crypted messages by using of generalized net model
Ivelina Vardeva
University of „Prof. d-r Assen Zlatarov” – Bourgas, Bulgaria
Presented at: 9th IWGN, Sofia, 4 July 2008
Published in: Conference proceedings, pages 20—27
Download: Download-icon.png PDF (235  Kb, Info)
Abstract: The article examines the structure of two of the basic attacks of sent in the public net cipher messages. It is used the apparatus of generalized net for modeling the processes of attacks for listening and braking the sent messages. About the examined ciphered messages is used RSA asymmetric algorithm.
Keywords: Generalized nets, Cryptography, Cryptoattack, Listening, Break-down, RSA, Attacker’s capabilities, Attacker’s goal
  1. Atanassov, K., „Introduction in the theory generalized nets”, Burgas, Bulgaria, 1992г.
  2. Atanassov, K., Generalized nets, World Scientific, Singapore, New Jersey, London1991
  3. Bellare, M., Rogaway, P., “Optimal Asymmetric Encryption.” In A. De Santis, ed, Proceedings of Eurocrypt ‘94 vol. 950 of Lecture Notes in Computer Science (LNCS), pp. 92–111. Springer-Verlag,1994.
  4. Blaze, M., Ioannidis, J., University of Pennsylvania,”DSA and RSA Key and Signature Encoding for the KeyNote Trust Management System”, March 2000
  5. C. Rackoff and D. R. Simon. Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack. In Crypto ‘91, LNCS 576, pages 433-444. Springer-Verlag, Berlin, 1992.
  6. CryptoBytes Volume 5, No. 1 Winter/Spring 2002
  7. D. Boneh and G. Durfee. “Cryptanalysis of RSA with Private Key d Less than n0.292.” IEEE Transactions on Information Theory 46(4):1339–1349, Jul. 2000. Early version in Proceedings of Eurocrypt ’99
  8. Goldwasser, S., Micali, S., Probabilistic Encryption. Journal of Computer and System Sciences, 28:270-299, 1984.
  9. Hristov, H., Trifonov, V., „Reliability and security of communications”, Sofia, Bulgaria 2005
  11. Menezes, A., Van Oorschot, P., Vanstone, S., Handbook of Applied Cryptography. CRC Press, 1997.
  12. Piper, F., Murphy, S., „Cryptography: A Very Short Introduction”, Oxford University Press 2002
  13. RSA Labs. Public Key Cryptography Standards (PKCS), Number 1 Version 2.0. Version 2.1 draft is available at
  14. Vardeva, I., Generalized Net model of the Creation of Virtual Private Network by using Point-to-Point Protocol over Secure Shell, Issue on Intuitionistic Fuzzy Sets and Generalized nets, Volume 4, Warsaw, 2006
  15. Vardeva, I., Sotirov, S., Generalized Net model of SSL with intuitionistic fuzzy estimations, Notes on IFS, Proceedings of the Eleventh International Conference on Intuitionistic Fuzzy Sets, Sofia , Volume 13, April 2007, 48-53
  16. Wiener, M., “Cryptanalysis of Short RSA Secret Exponents.” IEEE Trans. on Info. Th. 36(3):553–558. May 1990.

The list of publications, citing this article may be empty or incomplete. If you can provide relevant data, please, write on the talk page.