Transcript Collision Attacks: Breaking Authentication in TLS, IKE and SSH.
Karthikeyan BhargavanGaëtan LeurentPublished in: NDSS (2016)
Keyphrases
- security mechanisms
- semi fragile watermarking
- detect malicious
- digital watermarking
- countermeasures
- security threats
- security protocols
- biometric authentication
- smart card
- malicious attacks
- image authentication
- authentication protocol
- collision detection
- collision avoidance
- watermarking scheme
- computer security
- access control
- malicious users
- authentication scheme
- resource constrained
- fragile watermarking
- user authentication
- identity management
- cryptographic protocols
- watermarking algorithm
- parameter estimation
- watermarking method
- security risks
- data encryption
- virtual environment