Global Information Lookup Global Information

Deniable authentication information


In cryptography, deniable authentication refers to message authentication between a set of participants where the participants themselves can be confident in the authenticity of the messages, but it cannot be proved to a third party after the event.[1][2][3]

In practice, deniable authentication between two parties can be achieved through the use of message authentication codes (MACs) by making sure that if an attacker is able to decrypt the messages, they would also know the MAC key as part of the protocol, and would thus be able to forge authentic-looking messages.[4] For example, in the Off-the-Record Messaging (OTR) protocol, MAC keys are derived from the asymmetric decryption key through a cryptographic hash function. In addition to that, the OTR protocol also reveals used MAC keys as part of the next message, after they have already been used to authenticate previously received messages, and will not be re-used.[5]

  1. ^ Wei-Bin Lee; Chia-Chun Wu; Woei-Jiunn Tsaur (17 April 2006). "A novel deniable authentication protocol using generalized ElGamal signature scheme" (PDF). Information Sciences. 177 (6): 1376–1381. doi:10.1016/j.ins.2006.09.020. Retrieved 21 January 2015.
  2. ^ Mario Di Raimondo; Rosario Gennaro (28 May 2009). "New Approaches for Deniable Authentication". Journal of Cryptology. 22 (4): 572–615. CiteSeerX 10.1.1.59.1917. doi:10.1007/s00145-009-9044-3. S2CID 211210. (Download 2005 preprint version)
  3. ^ Jayaprakash Kar; Banshidhar Majhi (11 June 2010). "A secure Deniable Authentication Protocol based on Bilinear Diffie-Hellman Algorithm". Preprint.
  4. ^ Lein Harn; Chia-Yin Lee; Changlu Lin; Chin-Chen Chang (11 June 2011). "Fully Deniable Message Authentication Protocols Preserving Confidentiality" (PDF). The Computer Journal. 54 (10): 1688–1699.
  5. ^ Nikita Borisov; Ian Goldberg; Eric Brewer (2004-10-28). Off-the-Record Communication, or, Why Not To Use PGP (PDF). Workshop on Privacy in the Electronic Society 2004. Retrieved 2007-02-01.

and 24 Related for: Deniable authentication information

Request time (Page generated in 0.8381 seconds.)

Deniable authentication

Last Update:

In cryptography, deniable authentication refers to message authentication between a set of participants where the participants themselves can be confident...

Word Count : 319

Deniable encryption

Last Update:

Messaging, offer deniable authentication which gives the participants plausible deniability of their conversations. While deniable authentication is not technically...

Word Count : 2854

Message authentication

Last Update:

quantum cryptography. Data integrity Authentication Deniable authentication Mihir Bellare. "Chapter 7: Message Authentication" (PDF). CSE 207: Modern Cryptography...

Word Count : 612

Kopete

Last Update:

Off-the-Record Messaging enabling for encrypted conversations with deniable authentication and perfect forward secrecy. Antispam by asking a simple question...

Word Count : 542

Open Whisper Systems

Last Update:

messages. It used end-to-end encryption with forward secrecy and deniable authentication to secure all instant messages to other TextSecure users. TextSecure...

Word Count : 4322

Comparison of disk encryption software

Last Update:

more prone to watermarking attacks than others. Pre-boot authentication: Whether authentication can be required before booting the computer, thus allowing...

Word Count : 2827

TrueCrypt

Last Update:

"Plausible Deniability". FreeOTFE. Archived from the original on 24 January 2013. TrueCrypt FAQ - see question I use pre-boot authentication. Can I prevent...

Word Count : 6401

Cryptographic protocol

Last Update:

aspects: Key agreement or establishment Entity authentication Symmetric encryption and message authentication material construction Secured application-level...

Word Count : 1009

Cryptovirology

Last Update:

and its applications are defensive in nature, and provide privacy, authentication, and security to users. Cryptovirology employs a twist on cryptography...

Word Count : 1453

VeraCrypt

Last Update:

a partition or (in Windows) the entire storage device with pre-boot authentication. VeraCrypt is a fork of the discontinued TrueCrypt project. It was initially...

Word Count : 3203

Index of cryptography articles

Last Update:

Chaffing and winnowing • Challenge-Handshake Authentication Protocol • Challenge–response authentication • Chosen-ciphertext attack • Chosen-plaintext...

Word Count : 2943

Double Ratchet Algorithm

Last Update:

(ECDH) with Curve25519, for message authentication codes (MAC, authentication) Keyed-hash message authentication code (HMAC) based on SHA-256, for symmetric...

Word Count : 1363

Forward secrecy

Last Update:

Whitfield; van Oorschot, Paul C.; Wiener, Michael J. (June 1992). "Authentication and Authenticated Key Exchanges" (PDF). Designs, Codes and Cryptography. 2 (2):...

Word Count : 2923

FreeOTFE

Last Update:

any number of "hidden volumes" to be created, giving plausible deniability and deniable encryption, and also has the option of encrypting full partitions...

Word Count : 819

Cryptography

Last Update:

keystream. Message authentication codes (MACs) are much like cryptographic hash functions, except that a secret key can be used to authenticate the hash value...

Word Count : 10726

TrueCrypt version history

Last Update:

working on commercial encryption software. TrueCrypt VeraCrypt Plausible Deniability The authors of Scramdisk and E4M exchanged some code – the author of...

Word Count : 169

Keystroke logging

Last Update:

pre-boot authentication passwords by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)"...

Word Count : 5267

Secure communication

Last Update:

steganography is plausible deniability, that is, unless one can prove the data is there (which is usually not easy), it is deniable that the file contains...

Word Count : 2426

Malware

Last Update:

March 2016. Retrieved 28 November 2018. Young, Adam; Yung, Moti (1997). "Deniable Password Snatching: On the Possibility of Evasive Electronic Espionage"...

Word Count : 7384

International cybercrime

Last Update:

public or private proxy and computer forensics, encryption and plausible deniability, etc. In terms of cybercrime, we may often associate it with various...

Word Count : 3492

Cypherpunk

Last Update:

Project employee, political advocate Julian Assange: WikiLeaks founder, deniable cryptography inventor, journalist; co-author of Underground; author of...

Word Count : 5252

Ciphertext indistinguishability

Last Update:

of the innocent "random" image noise in digital photos. To support such deniable encryption systems, a few cryptographic algorithms are specifically designed...

Word Count : 1892

Knives Out

Last Update:

as the antagonist. It is in the second shift that, through plausible deniability, Marta's innocence is unequivocal. This posed a significant writing challenge...

Word Count : 11363

Saddam Hussein

Last Update:

remained classified or heavily redacted, thus "allow[ing] for plausible deniability." It is generally accepted that Egypt, in some capacity, was involved...

Word Count : 21196

PDF Search Engine © AllGlobal.net