It is not uncommon for a single user to use multiple devices to access applications, such as messengers. The legitimacy of using client devices and access rights should be monitored to ensure the necessary level of information security. In the paper authors analyze and discuss some approaches to detect unauthorized usage of cryptographic keys. The first approach is known as trace-independent inconsistency, the second approach is an observation of contradiction, the third approach called an observation of acausality. All three approaches are based on the additional dedicated audit service to the application under protection. The main result of our investigation is the technique for applying these principles to the secure communication and messaging protocols. In the paper authors suggest a cryptographically protocol for detecting compromise of secret keys based on blockchain technology.
CITATION STYLE
Kuzmicheva, S., Kiryakina, M., & Zapechnikov, S. (2020). Methods and Algorithms for Detecting Compromise of Secret Keys. In Mechanisms and Machine Science (Vol. 80, pp. 275–283). Springer Science and Business Media B.V. https://doi.org/10.1007/978-3-030-33491-8_33
Mendeley helps you to discover research relevant for your work.