Cryptographic Tamper Evidence
#1

Cryptographic Tamper Evidence
Abstract
We propose a new notion of cryptographic tamper evidence A tamper-evident signature scheme provides an additional procedure which detects tampering: given two signatures, this can determine whether one of them was generated by the forger. In this case, it might be impossible to tell which signature is generated by the legitimate signer and which by the forger, but at least the fact of the tampering will be made evident. We define several variants of tamper-evidence, differing in their power to detect tampering. In all of these, we assume an equally powerful adversary: she adaptively controls all the inputs to the legitimate signer (i.e., all messages to be signed and their timing), and observes all his outputs; she can also adaptively expose all the secrets at arbitrary times. We provide tamper-evident schemes for all the variants.

Our mechanisms are purely cryptographic: the tamper- detection algorithm is stateless and takes no inputs except the two signatures, it uses no infrastructure (or other ways to conceal additional secrets),and relies on no hard-ware properties (except those implied by the standard cryptographic assumptions, such as random number generators).

Key exposure is a well-known threat for any cryptographic tool. For signatures, exposure of a secret key compromises the corresponding public key After the exposure is detected,
the compromised keys can be revoked. This detection of the exposure has previously been dealt with outside the scope of cryptography. Indeed, it may seem that if an adversary in-conspicuously learns all the secrets within the system, then the cryptographic tools are helpless.

Thus, while it still might not be possible to distinguish the forger-generated signatures from the legitimate ones, our mechanisms can at least make the tampering evident.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: cryptographic authentication protocols, java cryptographic architecture diagram, evidence collection from car black boxes using smartphones, tamper, tamper detection matlab code, tamper evident contest, cryptographic algorithms pdf,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Quantum cryptographic network using entanglement swapping seminar class 2 1,260 29-02-2012, 02:43 PM
Last Post: seminar paper
  A Fragile Watermarking Scheme for Image Authentication with Tamper Localization Using seminar class 0 1,091 05-05-2011, 03:56 PM
Last Post: seminar class
  Design and Implementation of Multiple Cryptographic Algorithm Interface Circuit Based seminar class 0 1,092 04-05-2011, 09:39 AM
Last Post: seminar class
  ACHEIVING NETWORK SECURITY BY ECPVS, ECDH AND ECIES CRYPTOGRAPHIC ALGORITHMS USING DI seminar class 0 1,152 02-04-2011, 10:14 AM
Last Post: seminar class
  Water marking and tamper proofing for software protection seminar class 0 899 18-03-2011, 11:56 AM
Last Post: seminar class
  Verification of Cryptographic Protocals Using Logic Programming nit_cal 0 982 30-10-2009, 04:48 PM
Last Post: nit_cal

Forum Jump: