Methods and Algorithms for Detecting Compromise of Secret Keys

0Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

It is not uncommon for a single user to use multiple devices to access applications, such as messengers. The legitimacy of using client devices and access rights should be monitored to ensure the necessary level of information security. In the paper authors analyze and discuss some approaches to detect unauthorized usage of cryptographic keys. The first approach is known as trace-independent inconsistency, the second approach is an observation of contradiction, the third approach called an observation of acausality. All three approaches are based on the additional dedicated audit service to the application under protection. The main result of our investigation is the technique for applying these principles to the secure communication and messaging protocols. In the paper authors suggest a cryptographically protocol for detecting compromise of secret keys based on blockchain technology.

Cite

CITATION STYLE

APA

Kuzmicheva, S., Kiryakina, M., & Zapechnikov, S. (2020). Methods and Algorithms for Detecting Compromise of Secret Keys. In Mechanisms and Machine Science (Vol. 80, pp. 275–283). Springer Science and Business Media B.V. https://doi.org/10.1007/978-3-030-33491-8_33

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free