Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions.
Marc StevensDaniel ShumowPublished in: IACR Cryptol. ePrint Arch. (2017)
Keyphrases
- attack detection
- network attacks
- countermeasures
- normal traffic
- misuse detection
- distributed denial of service attacks
- intrusion detection
- anomaly detection
- intrusion detection system
- normal behavior
- detecting malicious
- attack scenarios
- power analysis
- sufficient conditions
- malicious users
- denial of service attacks
- network traffic
- network intrusion detection
- dos attacks
- network intrusions
- detection method
- network intrusion
- differential power analysis
- object detection
- data corruption
- security risks
- ddos attacks
- malicious attacks
- false positives
- cyber attacks
- block cipher
- computer security
- fault injection
- false alarms
- security vulnerabilities
- security measures
- hash functions
- detection rate
- collision detection
- detection algorithm
- phishing attacks
- detect malicious
- injection attacks