In 1999, Liaw proposed a new broadcasting cryptosystem, which requires smaller bandwidth as compared to the previously proposed broadcasting cryptosystems. However, this article will show that the proposed system is insecure enough by presenting a conspiracy attack on it. We will also point out some
Security of the redefined Liaw’s broadcasting cryptosystem
✍ Scribed by Wen-Tao Zhu; Chuan-Kun Wu
- Publisher
- Elsevier Science
- Year
- 2008
- Tongue
- English
- Weight
- 206 KB
- Volume
- 56
- Category
- Article
- ISSN
- 0898-1221
No coin nor oath required. For personal study only.
✦ Synopsis
Liaw proposed a broadcasting cryptosystem [H.T. Liaw, Broadcasting cryptosystem in computer networks, Computers & Mathematics with Applications 37 (Mar. 1999) 85-87] which claims to involve fewer broadcasting messages, and has attracted quite some research efforts on iterative analysis and improvement [H.M. Sun, Security of broadcasting cryptosystem in computer networks,
📜 SIMILAR VOLUMES
Intro; Title; Copyright; Contents; Abbreviations; Preface; PART 1: THE CLANDESTINE AGENCIES; 1 The security scandal that the US hid from the newborn ASIO; 2 ASIO struggles with change; 3 An information gatherer mutates into a secret police agency; 4 ASIS: The government agency you pay to break the l
Introduction -- Journalism and showmanship -- Winged Mercury -- Martians of the mind's eye -- Yours in terror -- Public frightener no. 1 -- Air racketeers -- The public interest -- The story of the century -- A matter of psychology -- The horror man -- Conclusion.;On the evening of October 30, 1938,
Chen (Computers and Electrical Engineering, vol. 30, 2004) illustrated that Tseng et al.'s authenticated encryption schemes, with message linkages for message flows, do not achieve their claimed integrity and authenticity properties. Furthermore, Chen presented some modified schemes to repair these