The scenario of using a social network as a source of key material for the one-time pad
- Authors: Mutsenek V.E.1
-
Affiliations:
- Иркутский государственный университет
- Issue: Vol 214 (2022)
- Pages: 60-68
- Section: Статьи
- URL: https://journal-vniispk.ru/2782-4438/article/view/271755
- DOI: https://doi.org/10.36535/0233-6723-2022-214-60-68
- ID: 271755
Cite item
Full Text
Abstract
The scenario of use of social media as a mean for delivery of key material for the one-time pad is described. Technical capabilities of social media to deliver plain text, capabilities of automatic intercept of data from social media, and matters of cryptographic strength are considered.
Keywords
About the authors
V. E. Mutsenek
Иркутский государственный университет
Author for correspondence.
Email: comsecsurvey@gmail.com
Russian Federation, Иркутск
References
- Авдонин И. А., Будько М. Б., Грозов В. А. Организация защиты данных, передаваемых между беспилотным летательным аппаратом и наземной станцией управления, на основе шифра Вернама// Науч.-техн. вестн. информ. технол. мех. опт. — 2016. — №5. — С. 850-855.
- Артамошкин М. Отбор признаков пользователя социальной сети для построения модели машинного обучения. https://blog.zverit.com/.
- Гребенников В. В. Американская криптология. История спецсвязи. — М.: Литрес: Самиздат, 2019.
- Дужникова А. С. Социальные сети: современные тенденции и типы пользования// Мониторинг общественного мнения. — 2010. — №5 (99). — С. 238-251.
- Жуков К. Д. Обзор атак на AES-128: к пятнадцатилетию стандарта AES// Прикл. дискр. мат. — 2017.№ 35. — С. 48-62.
- Abiodun E. O., Aman J., Oludare I. A., Humaira A. An enhanced practical difficulty of one-time pad algorithm resolving the key management and distribution problem// in: Lect. Notes Eng. Comput. Sci./ Proc. Int. Multiconf. of Engineers and Computer Scientists (Hong Kong, March 14-16, 2018), 2018. — P. 409-415.
- Bansimba G. R., Babindamana R. F., Peter A. G. A new approach in one time pad key management// Res. J. Math. Comput. Sci. — 2019. — 3, № 17. — P. 1-8.
- Blackledge J. et al. Secrecy and randomness: encoding cloud data locally using a one-time pad// Int. J. Adv. Security. — 2017. — 10, № 3-4. — P. 167-181.
- Brosas D. G., Sison A. M, Medina R. P. Strengthening the Vernam cipher algorithm using multilevel encryption techniques// Int. J. Sci. Technol. Res. — 2019. — 8, № 10. — P. 601-606.
- Brosas D. G, Sison A. M., Medina R. P., Hernandez A. Analysis of the randomness performance of the proposed stream cipher based cryptographic algorithm// 11th IEEE Control and System Graduate Research Colloquium (Shah Alam, Malaysia, 2020), 2020. — P. 76-81.
- Chandrakar S, Tiwari S., Shree Jain B. An innovative approach for implementation of one-time pads// Int. J. Comput. Appl. — 2014. — 89, № 13. — P. 35-37.
- Dent A. W. Implementation attack against EPOC-2 public-key cryptosystem// Electr. Lett. — 2002. — № 38. — P. 412-413.
- Devipriya M., Sasikala G. A new technique for one time pad security scheme with complement method// Int. J. Adv. Res. Comput. Sci. Software Eng. — 2015. — 5, № 6. — P. 220-223.
- Limaye S., Thadathil R.. Influence of social media on behavior patterns// Proc. Natl. Conf. on Research In Information Technology And Management (Bangalore, 2016), 2016. — P. 1-4.
- Pelosi M. J., Kessler G., Brown M. S. S. One-time pad encryption steganography system// Proc. Conf. “Annual ADFSL Conference on Digital Forensics, Security and Law” (Daytona Beach, Florida, 2016), 2016.P. 131-154.
- Tang S., Liu F. A one-time pad encryption algorithm based on one-way hash and conventional block cipher// Proc. 2 Int. Conf. on Consumer Electronics, Communications and Networks, 2012. — P. 72-74.
- Upadhyay G., Nene M. J. One time pad generation using quantum superposition states// Proc. IEEE Int. Conf. on Recent Trends in Electronics, Information, and Communication Technology (Bangalore, 2016), 2016. — P. 1882-1886.
- Wang X., Yin Y. L, Yu H. Finding collisions in the full SHA-1// Adv. Cryptology. — 2005. — 3621. — P. 17-36.
- Zhou Y., Feng D. Side-channel attacks: ten years after its publication and the impacts on cryptographic module security testing/ Cryptology ePrint Archive, Report 2005/388. https://ia.cr/2005/388.
Supplementary files
