The (in)security of proprietary cryptography

作者: Roel Verdult

DOI:

关键词: EncryptionSecurity assessmentCryptographyComputer securityConfidentialityCryptography lawCryptosystemCompetence (human resources)Financial cryptographyComputer science

摘要: Proprietary cryptography is a term used to describe custom encryption techniques that are kept secret by its designers add additional security. It questionable if such an approach increases the cryptographic strength of underlying mathematical algorithms. The security proprietary encryption techniques relies entirely on competence semi - conductor companies, which keep technical description strictly confidential after designing. It is difficult give public and independent assessment the cryptography, without having access detailed information design. The first part this dissertation dedicated introduction the general field computer cryptography. includes extensive theoretical background refers related literature gives summary well known at tack techniques. Additionally, broad scientific research given. Finally, doctoral presents serious weaknesses in widely deployed cryptosystems, still actively billions consumers their daily lives.

参考文章(479)
Nicolas T Courtois, Willi Meier, Algebraic attacks on stream ciphers with linear feedback theory and application of cryptographic techniques. pp. 345- 359 ,(2003) , 10.1007/978-3-540-45146-4_11
Satya N. Atluri, Chein Shan Liu, A Novel Time Integration Method for Solving A Large System of Non-Linear Algebraic Equations Cmes-computer Modeling in Engineering & Sciences. ,vol. 31, pp. 71- 84 ,(2008) , 10.3970/CMES.2008.031.071
van Mpwj Michiel Osch, Automated model-based testing of hybrid systems Technische Universiteit Eindhoven. ,(2009) , 10.6100/IR640216
Tim Kristian Cocx, Algorithmic tools for data-oriented law enforcement Leiden Institute of Advanced Computer Science (LIACS), Faculty of Science, Leiden University. ,(2009)
Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis Taylor, Sangho Oh, Wenyuan Xu, Marco Gruteser, Wade Trappe, Ivan Seskar, None, Security and privacy vulnerabilities of in-car wireless networks: a tire pressure monitoring system case study usenix security symposium. pp. 21- 21 ,(2010)
Bruce Schneier, SECURITY PITFALLS IN CRYPTOGRAPHY ,(1998)
Subhamoy Maitra, Goutam Paul, Sourav Sen Gupta, Attack on broadcast RC4 revisited fast software encryption. pp. 199- 217 ,(2011) , 10.1007/978-3-642-21702-9_12
David Wagner, The Boomerang Attack fast software encryption. pp. 156- 170 ,(1999) , 10.1007/3-540-48519-8_12
Kerstin Lemke, Ahmad-Reza Sadeghi, Christian Stüble, Anti-theft Protection: Electronic Immobilizers Springer, Berlin, Heidelberg. pp. 51- 67 ,(2006) , 10.1007/3-540-28428-1_4