首页> 外文会议>International Carnahan Conference on Security Technology >Beyond cryptography: threats before and after
【24h】

Beyond cryptography: threats before and after

机译:超越加密:之前和之后的威胁

获取原文

摘要

Cryptography is a powerful tool for computer and computer network security. This paper explores threats, other than cryptanalysis, to systems using cryptography for privacy and authentication. Even systems using the strongest cryptographic methods can be vulnerable to upstream and downstream threats, i.e. threats before and after cryptographic protection. Examples of such threats are described, with emphasis given to keystroke capture and hijacking threats. Vulnerabilities of various operating systems and routable protocols are detailed. It is shown that secure session authentication requires both secure user authentication and secure computer authentication.
机译:加密是计算机和计算机网络安全的强大工具。本文探讨了使用密码专制的密码分析以外的隐私和身份验证的威胁。即使是使用最强的加密方法的系统也可能容易受到上游和下游威胁的影响,即加密保护前后的威胁。描述了这种威胁的示例,重点给予击键捕获和劫持威胁。详细说明了各种操作系统和可路由协议的漏洞。结果表明,安全会话认证需要安全的用户身份验证和安全计算机认证。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号