Обложка книги Distinguishing Attack

Distinguishing Attack

ISBN: 978-6-1329-2222-9;
Издательство: Книга по требованию

Distance bounding protocols are cryptographic protocols that enable a verifier V to establish an upper bound on the physical distance to a prover P. They are based on timing the delay between sending out a challenge bits and receiving back the corresponding response bits. The delay time for responses enables V to compute an upper-bound on the distance, as the round trip delay time divided into twice the speed of light. The computation is based on the fact that electro-magnetic waves travel nearly at the speed of light, but cannot travel faster. Distance bounding protocols can have different applications. For example, when a person conducts a cryptographic identification protocol at an entrance to a building, the access control computer in the building would like to be ensured that the person giving the responses is no more than a few meters away.

Похожие книги:

Lambert M. Surhone
s operations, so M6 is considered a family of ciphers. …

Lambert M. Surhone
s unique tree structure based stream generation. LEVIAT

Lambert M. Surhone
Ciphertext indistinguishability is an important securit…
In cryptography, variably modified permutation composit…

Lambert M. Surhone
Robert Kingsbury Huntington (13 March 1921 - 5 June 194…

Lambert M. Surhone
Garlic routing is a variant of onion routing that encry…

Lambert M. Surhone
Ralph Puckett Jr. (born 8 December 1926 in Tifton, Geor…
Please note that the content of this book primarily con…

Lambert M. Surhone
Please note that the content of this book primarily con…
Building Electro–Optical Systems

Lambert M. Surhone
A Controlled Cryptographic Item (CCI) is a U.S. Nationa…

Lambert M. Surhone
In mathematics, specifically in abstract algebra and it…