Global Information Lookup Global Information

Kleptography information


Kleptography is the study of stealing information securely and subliminally. The term was introduced by Adam Young and Moti Yung in the Proceedings of Advances in Cryptology – Crypto '96.[1] Kleptography is a subfield of cryptovirology and is a natural extension of the theory of subliminal channels that was pioneered by Gus Simmons while at Sandia National Laboratory.[2][3][4] A kleptographic backdoor is synonymously referred to as an asymmetric backdoor. Kleptography encompasses secure and covert communications through cryptosystems and cryptographic protocols. This is reminiscent of, but not the same as steganography that studies covert communications through graphics, video, digital audio data, and so forth.

  1. ^ Young, A.; Yung, M. (1996). "The Dark Side of Black-Box Cryptography, or: Should we trust Capstone?". In Koblitz, Neal (ed.). Advances in Cryptology — CRYPTO '96: 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18–22, 1996, Proceedings. Lecture Notes in Computer Science. Springer Berlin Heidelberg. pp. 89–103. ISBN 978-3-540-68697-2.
  2. ^ Simmons, G. J. (1984). "The Prisoners' Problem and the Subliminal Channel". In Chaum, D. (ed.). Proceedings of Crypto '83. Plenum Press. pp. 51–67. doi:10.1007/978-1-4684-4730-9_5. ISBN 978-1-4684-4732-3.
  3. ^ Simmons, G. J. (1985). "The Subliminal Channel and Digital Signatures". In Beth, T.; Cot, N.; Ingemarsson, I. (eds.). Proceedings of Eurocrypt '84. Lecture Notes in Computer Science. Vol. 209. Springer-Verlag. pp. 364–378. doi:10.1007/3-540-39757-4_25. ISBN 978-3-540-16076-2.
  4. ^ Simmons, G. J. (1993). "Subliminal Communication is Easy Using the DSA". In Helleseth, T. (ed.). Proceedings of Eurocrypt '93. Lecture Notes in Computer Science. Vol. 765. Springer-Verlag. pp. 218–232. doi:10.1007/3-540-48285-7_18. ISBN 978-3-540-57600-6.

and 22 Related for: Kleptography information

Request time (Page generated in 0.5349 seconds.)

Kleptography

Last Update:

Kleptography is the study of stealing information securely and subliminally. The term was introduced by Adam Young and Moti Yung in the Proceedings of...

Word Count : 1088

Moti Yung

Last Update:

cryptographer and computer scientist known for his work on cryptovirology and kleptography. Yung earned his PhD from Columbia University in 1988 under the supervision...

Word Count : 1571

RSA Security

Last Update:

private key to the backdoor. Scientifically speaking, the backdoor employs kleptography, and is, essentially, an instance of the Diffie Hellman kleptographic...

Word Count : 3678

Cryptocurrency

Last Update:

Cryptographic hash function Key derivation function Digital signature Kleptography Key (cryptography) Key exchange Key generator Key schedule Key stretching...

Word Count : 19000

Cryptography

Last Update:

Cryptographic hash function Key derivation function Digital signature Kleptography Key (cryptography) Key exchange Key generator Key schedule Key stretching...

Word Count : 10726

Cryptovirology

Last Update:

traditional backdoor that is symmetric, i.e., anyone that finds it can use it. Kleptography, a subfield of cryptovirology, is the study of asymmetric backdoors in...

Word Count : 1453

Elliptic Curve Digital Signature Algorithm

Last Update:

Cryptographic hash function Key derivation function Digital signature Kleptography Key (cryptography) Key exchange Key generator Key schedule Key stretching...

Word Count : 2833

Digital signature

Last Update:

Cryptographic hash function Key derivation function Digital signature Kleptography Key (cryptography) Key exchange Key generator Key schedule Key stretching...

Word Count : 5198

Advanced Encryption Standard

Last Update:

Cryptographic hash function Key derivation function Digital signature Kleptography Key (cryptography) Key exchange Key generator Key schedule Key stretching...

Word Count : 5609

Enigma machine

Last Update:

Cryptographic hash function Key derivation function Digital signature Kleptography Key (cryptography) Key exchange Key generator Key schedule Key stretching...

Word Count : 11278

Merkle tree

Last Update:

Cryptographic hash function Key derivation function Digital signature Kleptography Key (cryptography) Key exchange Key generator Key schedule Key stretching...

Word Count : 1787

PKCS 7

Last Update:

Cryptographic hash function Key derivation function Digital signature Kleptography Key (cryptography) Key exchange Key generator Key schedule Key stretching...

Word Count : 310

Joan Clarke

Last Update:

Cryptographic hash function Key derivation function Digital signature Kleptography Key (cryptography) Key exchange Key generator Key schedule Key stretching...

Word Count : 1524

ROT13

Last Update:

Cryptographic hash function Key derivation function Digital signature Kleptography Key (cryptography) Key exchange Key generator Key schedule Key stretching...

Word Count : 2025

PKCS

Last Update:

Cryptographic hash function Key derivation function Digital signature Kleptography Key (cryptography) Key exchange Key generator Key schedule Key stretching...

Word Count : 263

Cipher

Last Update:

Cryptographic hash function Key derivation function Digital signature Kleptography Key (cryptography) Key exchange Key generator Key schedule Key stretching...

Word Count : 2044

PKCS 12

Last Update:

Cryptographic hash function Key derivation function Digital signature Kleptography Key (cryptography) Key exchange Key generator Key schedule Key stretching...

Word Count : 698

Cryptogram

Last Update:

Cryptographic hash function Key derivation function Digital signature Kleptography Key (cryptography) Key exchange Key generator Key schedule Key stretching...

Word Count : 725

Cryptographic Message Syntax

Last Update:

Cryptographic hash function Key derivation function Digital signature Kleptography Key (cryptography) Key exchange Key generator Key schedule Key stretching...

Word Count : 281

Steganography

Last Update:

Cryptographic hash function Key derivation function Digital signature Kleptography Key (cryptography) Key exchange Key generator Key schedule Key stretching...

Word Count : 5799

Certificate signing request

Last Update:

Cryptographic hash function Key derivation function Digital signature Kleptography Key (cryptography) Key exchange Key generator Key schedule Key stretching...

Word Count : 1114

PKCS 1

Last Update:

Cryptographic hash function Key derivation function Digital signature Kleptography Key (cryptography) Key exchange Key generator Key schedule Key stretching...

Word Count : 1484

PDF Search Engine © AllGlobal.net