Publication: Methods and Algorithms for Detecting Compromise of Secret Keys
Дата
2020
Авторы
Journal Title
Journal ISSN
Volume Title
Издатель
Аннотация
© 2020, Springer Nature Switzerland AG.It is not uncommon for a single user to use multiple devices to access applications, such as messengers. The legitimacy of using client devices and access rights should be monitored to ensure the necessary level of information security. In the paper authors analyze and discuss some approaches to detect unauthorized usage of cryptographic keys. The first approach is known as trace-independent inconsistency, the second approach is an observation of contradiction, the third approach called an observation of acausality. All three approaches are based on the additional dedicated audit service to the application under protection. The main result of our investigation is the technique for applying these principles to the secure communication and messaging protocols. In the paper authors suggest a cryptographically protocol for detecting compromise of secret keys based on blockchain technology.
Описание
Ключевые слова
Цитирование
Kuzmicheva, S. Methods and Algorithms for Detecting Compromise of Secret Keys / Kuzmicheva, S., Kiryakina, M., Zapechnikov, S. // Mechanisms and Machine Science. - 2020. - 80. - P. 275-283. - 10.1007/978-3-030-33491-8_33