-
Cross-temporal Detection of Novel Ransomware Campaigns: A Multi-Modal Alert Approach
Abstract: We present a novel approach to identify ransomware campaigns derived from attack timelines representations within victim networks. Malicious activity profiles developed from multiple alert sources support the construction of alert graphs. This approach enables an effective and scalable representation of the attack timelines where individual nodes represent malicious activity detections with connec… ▽ More
Submitted 1 September, 2023; originally announced September 2023.
Comments: Preprint. Under Review
-
arXiv:2011.07483 [pdf, ps, other]
Removable Weak Keys for Discrete Logarithm Based Cryptography
Abstract: We describe a novel type of weak cryptographic private key that can exist in any discrete logarithm based public-key cryptosystem set in a group of prime order $p$ where $p-1$ has small divisors. Unlike the weak private keys based on \textit{numerical size} (such as smaller private keys, or private keys lying in an interval) that will \textit{always} exist in any DLP cryptosystems, our type of wea… ▽ More
Submitted 15 November, 2020; originally announced November 2020.
Journal ref: Journal of Cryptographic Engineering 2020
-
Optimal Runtime Verification of Finite State Properties over Lossy Event Streams
Abstract: Monitoring programs for finite state properties is challenging due to high memory and execution time overheads it incurs. Some events if skipped or lost naturally can reduce both overheads, but lead to uncertainty about the current monitor state. In this work, we present a theoretical framework to model these lossy event streams and provide a construction for a monitor which observes them without… ▽ More
Submitted 8 April, 2020; originally announced April 2020.
-
arXiv:1701.07172 [pdf, ps, other]
A Probabilistic Baby-Step Giant-Step Algorithm
Abstract: In this paper, a new algorithm to solve the discrete logarithm problem is presented which is similar to the usual baby-step giant-step algorithm. Our algorithm exploits the order of the discrete logarithm in the multiplicative group of a finite field. Using randomization with parallelized collision search, our algorithm indicates some weakness in NIST curves over prime fields which are considered… ▽ More
Submitted 25 January, 2017; originally announced January 2017.
Report number: ISBN 978-989-758-259-2
Journal ref: SECRYPT 2017
-
arXiv:1610.01354 [pdf, ps, other]
Improved Lower Bound on DHP: Towards the Equivalence of DHP and DLP for Important Elliptic Curves Used for Implementation
Abstract: In 2004, Muzereau et al. showed how to use a reduction algorithm of the discrete logarithm problem to Diffie-Hellman problem in order to estimate lower bound on Diffie-Hellman problem on elliptic curves. They presented their estimates for various elliptic curves that are used in practical applications. In this paper, we show that a much tighter lower bound for Diffie-Hellman problem on those curve… ▽ More
Submitted 26 November, 2016; v1 submitted 5 October, 2016; originally announced October 2016.
Comments: To keep the paper short, we have not included appendices in the main paper. The appendices have been separately added. The reader may refer to appendices for the relevant values which have been used to complete Table 1 and Table 2 in the paper
Report number: ISSN: 1862-2976
Journal ref: Journal of Mathematical Cryptology 2018