Improved cryptanalysis of SecurID
S Contini, YL Yin - Cryptology ePrint Archive, 2003 - eprint.iacr.org
… SecurID is a widely used hardware token for strengthening … presented an attack on the alleged
SecurID hash function~\cite … and present several techniques to improve it significantly. Our …
SecurID hash function~\cite … and present several techniques to improve it significantly. Our …
Cryptanalysis of the alleged SecurID hash function
A Biryukov, J Lano, B Preneel - … , SAC 2003, Ottawa, Canada, August 14-15 …, 2004 - Springer
… 4, we show how to use these weaknesses for the cryptanalysis of the full ASHF … of SecurID
encryptions. In terms of processing time, one permutation is equivalent to 5% of a SecurID …
encryptions. In terms of processing time, one permutation is equivalent to 5% of a SecurID …
Recent attacks on alleged securid and their practical implications
A Biryukov, J Lano, B Preneel - Computers & Security, 2005 - Elsevier
… Using the improvements by Contini and Yin, we only need a cluster of about 30 computers …
In this paper, we have performed a cryptanalysis of the Alleged SecurID Hash Function (ASHF…
In this paper, we have performed a cryptanalysis of the Alleged SecurID Hash Function (ASHF…
Fast Software Encryption [electronic resource]: 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004. Revised Papers
B Roy, W Meier - sidalc.net
New Cryptographic Primitives Based on Multiword T-Functions--Towards a Unifying View of
Block Cipher Cryptanalysis--Algebraic Attacks on Summation Generators--Algebraic Attacks …
Block Cipher Cryptanalysis--Algebraic Attacks on Summation Generators--Algebraic Attacks …
[PDF][PDF] Case studies in symmetric key cryptography
SP Contini - 2005 - research.tue.nl
… the resistance of RC6 to differential cryptanalysis, which is a major … on practical attacks which
can defeat the security of SecurID. … There have been no improvements upon our differential …
can defeat the security of SecurID. … There have been no improvements upon our differential …
[PDF][PDF] CRYPTANALYSIS AND DESIGN OF SYNCHRONOUS STREAM CIPHERS
B Preneel, L Joseph - 2006 - esat.kuleuven.be
… A concrete application of differential cryptanalysis will be presented in Chapter 8 on
SecurID. For synchronous stream ciphers, differential cryptanalysis can be used to attack the …
SecurID. For synchronous stream ciphers, differential cryptanalysis can be used to attack the …
Fast software-based attacks on SecurID
S Contini, YL Yin - Fast Software Encryption: 11th International Workshop …, 2004 - Springer
… improve the [1] attack. Our theoretical analysis and implementation experiments show that
the running time of our improved … In later sections we will show that we can improve the time …
the running time of our improved … In later sections we will show that we can improve the time …
Cryptanalysis with COPACOBANA
Cryptanalysis of ciphers usually involves massive computations. The security parameters of …
In addition, we introduce efficient implementations of more complex cryptanalysis on …
In addition, we introduce efficient implementations of more complex cryptanalysis on …
Vulnerability analysis and the practical implications of a server‐challenge‐based one‐time password system
SS Yang, H Choi - Information Management & Computer Security, 2010 - emerald.com
… The SecurID system uses a fixed length string for authentication shown in the SecurID token
… Finally, we analyzed how to improve its security by changing the cardinality of the GridCode…
… Finally, we analyzed how to improve its security by changing the cardinality of the GridCode…
Vulnerability analysis of the grid data security authentication system
SS Yang, H Choi, H Joo - Information Security Journal: A Global …, 2010 - Taylor & Francis
… A user possesses a SecurID token that is registered and synchronized with a SecurID server.
… We use cookies to improve your website experience. To learn about our use of cookies and …
… We use cookies to improve your website experience. To learn about our use of cookies and …