Computer Network’s Time (Synchronization) Systems Espionage and Its Possible Consequences

This paper proposes cryptanalysis attacks on network time (synchronization) systems method (computer espionage) based on timestamp fractional value falsification that software’s implant realizes. For massive time stamps using in a public key infrastructure, the considered method of attack can comple...

وصف كامل

التفاصيل البيبلوغرافية
الحاوية / القاعدة:Безопасность информационных технологий
المؤلفون الرئيسيون: Dmitry Anatolevich Melnikov, Vladislav Romanovich Petrov, Evgeny Vasilevich Dirienko, Anton Anatolevich Abramov, Ivan Alexandrovich Korsakov, Stanislav Sergeevich Kuzminov
التنسيق: مقال
اللغة:الإنجليزية
منشور في: Joint Stock Company "Experimental Scientific and Production Association SPELS 2013-12-01
الموضوعات:
الوصول للمادة أونلاين:https://bit.mephi.ru/index.php/bit/article/view/305
_version_ 1851830787514564608
author Dmitry Anatolevich Melnikov
Vladislav Romanovich Petrov
Evgeny Vasilevich Dirienko
Anton Anatolevich Abramov
Ivan Alexandrovich Korsakov
Stanislav Sergeevich Kuzminov
author_facet Dmitry Anatolevich Melnikov
Vladislav Romanovich Petrov
Evgeny Vasilevich Dirienko
Anton Anatolevich Abramov
Ivan Alexandrovich Korsakov
Stanislav Sergeevich Kuzminov
author_sort Dmitry Anatolevich Melnikov
collection DOAJ
container_title Безопасность информационных технологий
description This paper proposes cryptanalysis attacks on network time (synchronization) systems method (computer espionage) based on timestamp fractional value falsification that software’s implant realizes. For massive time stamps using in a public key infrastructure, the considered method of attack can completely compromise that infrastructure.
format Article
id doaj-art-5d24052d0e2848e2930af141458bb08f
institution Directory of Open Access Journals
issn 2074-7128
2074-7136
language English
publishDate 2013-12-01
publisher Joint Stock Company "Experimental Scientific and Production Association SPELS
record_format Article
spelling doaj-art-5d24052d0e2848e2930af141458bb08f2025-08-19T22:32:09ZengJoint Stock Company "Experimental Scientific and Production Association SPELSБезопасность информационных технологий2074-71282074-71362013-12-012047782297Computer Network’s Time (Synchronization) Systems Espionage and Its Possible ConsequencesDmitry Anatolevich Melnikov0Vladislav Romanovich Petrov1Evgeny Vasilevich Dirienko2Anton Anatolevich Abramov3Ivan Alexandrovich Korsakov4Stanislav Sergeevich Kuzminov5National Research Nuclear University “MEPhI”National Research Nuclear University “MEPhI”National Research Nuclear University “MEPhI”National Research Nuclear University “MEPhI”National Research Nuclear University “MEPhI”National Research Nuclear University “MEPhI”This paper proposes cryptanalysis attacks on network time (synchronization) systems method (computer espionage) based on timestamp fractional value falsification that software’s implant realizes. For massive time stamps using in a public key infrastructure, the considered method of attack can completely compromise that infrastructure.https://bit.mephi.ru/index.php/bit/article/view/305computer espionagenetwork time
spellingShingle Dmitry Anatolevich Melnikov
Vladislav Romanovich Petrov
Evgeny Vasilevich Dirienko
Anton Anatolevich Abramov
Ivan Alexandrovich Korsakov
Stanislav Sergeevich Kuzminov
Computer Network’s Time (Synchronization) Systems Espionage and Its Possible Consequences
computer espionage
network time
title Computer Network’s Time (Synchronization) Systems Espionage and Its Possible Consequences
title_full Computer Network’s Time (Synchronization) Systems Espionage and Its Possible Consequences
title_fullStr Computer Network’s Time (Synchronization) Systems Espionage and Its Possible Consequences
title_full_unstemmed Computer Network’s Time (Synchronization) Systems Espionage and Its Possible Consequences
title_short Computer Network’s Time (Synchronization) Systems Espionage and Its Possible Consequences
title_sort computer network s time synchronization systems espionage and its possible consequences
topic computer espionage
network time
url https://bit.mephi.ru/index.php/bit/article/view/305
work_keys_str_mv AT dmitryanatolevichmelnikov computernetworkstimesynchronizationsystemsespionageanditspossibleconsequences
AT vladislavromanovichpetrov computernetworkstimesynchronizationsystemsespionageanditspossibleconsequences
AT evgenyvasilevichdirienko computernetworkstimesynchronizationsystemsespionageanditspossibleconsequences
AT antonanatolevichabramov computernetworkstimesynchronizationsystemsespionageanditspossibleconsequences
AT ivanalexandrovichkorsakov computernetworkstimesynchronizationsystemsespionageanditspossibleconsequences
AT stanislavsergeevichkuzminov computernetworkstimesynchronizationsystemsespionageanditspossibleconsequences