Repetition pattern attack on multi-word-containing securestring 2.0 objects

4Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cloud computing appeals to private individuals and particularly enterprises at a progressive rate, but a noticeable percentage of them refuse it due to mistrust or missing commitment to security. The cryptosystem SecureString 2.0 was designed to outweigh these deficits through the support of blind computations on character strings. Repetition pattern attacks count among the m8/ost hazardous enemies of SecureString 2.0 objects because reoccurring ciphergrams within them may reveal linguistic identifying features of the correspondent plaintext. This paper analyzes and compares the success 25**probability of repetition pattern attacks on the following three sorts of SecureString 2.0 objects: singleword- containing ones, multi-word-containing ones with a known number of words plus unknown delimiter positions, and multi-word-containing ones with an unknown number of words plus unknown boundary locations. The latter type is expected to provide the highest privacy.

Cite

CITATION STYLE

APA

Fahrnberger, G. (2015). Repetition pattern attack on multi-word-containing securestring 2.0 objects. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8956, pp. 265–277). Springer Verlag. https://doi.org/10.1007/978-3-319-14977-6_26

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free