Skip to main content

Showing 1–5 of 5 results for author: Kushwaha, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2309.00700  [pdf, other

    cs.CR

    Cross-temporal Detection of Novel Ransomware Campaigns: A Multi-Modal Alert Approach

    Authors: Sathvik Murli, Dhruv Nandakumar, Prabhat Kumar Kushwaha, Cheng Wang, Christopher Redino, Abdul Rahman, Shalini Israni, Tarun Singh, Edward Bowen

    Abstract: We present a novel approach to identify ransomware campaigns derived from attack timelines representations within victim networks. Malicious activity profiles developed from multiple alert sources support the construction of alert graphs. This approach enables an effective and scalable representation of the attack timelines where individual nodes represent malicious activity detections with connec… ▽ More

    Submitted 1 September, 2023; originally announced September 2023.

    Comments: Preprint. Under Review

  2. Removable Weak Keys for Discrete Logarithm Based Cryptography

    Authors: Michael John Jacobson, Jr., Prabhat Kushwaha

    Abstract: We describe a novel type of weak cryptographic private key that can exist in any discrete logarithm based public-key cryptosystem set in a group of prime order $p$ where $p-1$ has small divisors. Unlike the weak private keys based on \textit{numerical size} (such as smaller private keys, or private keys lying in an interval) that will \textit{always} exist in any DLP cryptosystems, our type of wea… ▽ More

    Submitted 15 November, 2020; originally announced November 2020.

    Journal ref: Journal of Cryptographic Engineering 2020

  3. arXiv:2004.04214  [pdf, other

    cs.LO cs.SE

    Optimal Runtime Verification of Finite State Properties over Lossy Event Streams

    Authors: Peeyush Kushwaha, Rahul Purandare, Matthew B. Dwyer

    Abstract: Monitoring programs for finite state properties is challenging due to high memory and execution time overheads it incurs. Some events if skipped or lost naturally can reduce both overheads, but lead to uncertainty about the current monitor state. In this work, we present a theoretical framework to model these lossy event streams and provide a construction for a monitor which observes them without… ▽ More

    Submitted 8 April, 2020; originally announced April 2020.

  4. A Probabilistic Baby-Step Giant-Step Algorithm

    Authors: Prabhat Kushwaha, Ayan Mahalanobis

    Abstract: In this paper, a new algorithm to solve the discrete logarithm problem is presented which is similar to the usual baby-step giant-step algorithm. Our algorithm exploits the order of the discrete logarithm in the multiplicative group of a finite field. Using randomization with parallelized collision search, our algorithm indicates some weakness in NIST curves over prime fields which are considered… ▽ More

    Submitted 25 January, 2017; originally announced January 2017.

    Report number: ISBN 978-989-758-259-2

    Journal ref: SECRYPT 2017

  5. Improved Lower Bound on DHP: Towards the Equivalence of DHP and DLP for Important Elliptic Curves Used for Implementation

    Authors: Prabhat Kushwaha

    Abstract: In 2004, Muzereau et al. showed how to use a reduction algorithm of the discrete logarithm problem to Diffie-Hellman problem in order to estimate lower bound on Diffie-Hellman problem on elliptic curves. They presented their estimates for various elliptic curves that are used in practical applications. In this paper, we show that a much tighter lower bound for Diffie-Hellman problem on those curve… ▽ More

    Submitted 26 November, 2016; v1 submitted 5 October, 2016; originally announced October 2016.

    Comments: To keep the paper short, we have not included appendices in the main paper. The appendices have been separately added. The reader may refer to appendices for the relevant values which have been used to complete Table 1 and Table 2 in the paper

    Report number: ISSN: 1862-2976

    Journal ref: Journal of Mathematical Cryptology 2018