Computer Network’s Time (Synchronization) Systems Espionage and Its Possible Consequences
This paper proposes cryptanalysis attacks on network time (synchronization) systems method (computer espionage) based on timestamp fractional value falsification that software’s implant realizes. For massive time stamps using in a public key infrastructure, the considered method of attack can comple...
| الحاوية / القاعدة: | Безопасность информационных технологий |
|---|---|
| المؤلفون الرئيسيون: | , , , , , |
| التنسيق: | مقال |
| اللغة: | الإنجليزية |
| منشور في: |
Joint Stock Company "Experimental Scientific and Production Association SPELS
2013-12-01
|
| الموضوعات: | |
| الوصول للمادة أونلاين: | https://bit.mephi.ru/index.php/bit/article/view/305 |
| _version_ | 1851830787514564608 |
|---|---|
| author | Dmitry Anatolevich Melnikov Vladislav Romanovich Petrov Evgeny Vasilevich Dirienko Anton Anatolevich Abramov Ivan Alexandrovich Korsakov Stanislav Sergeevich Kuzminov |
| author_facet | Dmitry Anatolevich Melnikov Vladislav Romanovich Petrov Evgeny Vasilevich Dirienko Anton Anatolevich Abramov Ivan Alexandrovich Korsakov Stanislav Sergeevich Kuzminov |
| author_sort | Dmitry Anatolevich Melnikov |
| collection | DOAJ |
| container_title | Безопасность информационных технологий |
| description | This paper proposes cryptanalysis attacks on network time (synchronization) systems method (computer espionage) based on timestamp fractional value falsification that software’s implant realizes. For massive time stamps using in a public key infrastructure, the considered method of attack can completely compromise that infrastructure. |
| format | Article |
| id | doaj-art-5d24052d0e2848e2930af141458bb08f |
| institution | Directory of Open Access Journals |
| issn | 2074-7128 2074-7136 |
| language | English |
| publishDate | 2013-12-01 |
| publisher | Joint Stock Company "Experimental Scientific and Production Association SPELS |
| record_format | Article |
| spelling | doaj-art-5d24052d0e2848e2930af141458bb08f2025-08-19T22:32:09ZengJoint Stock Company "Experimental Scientific and Production Association SPELSБезопасность информационных технологий2074-71282074-71362013-12-012047782297Computer Network’s Time (Synchronization) Systems Espionage and Its Possible ConsequencesDmitry Anatolevich Melnikov0Vladislav Romanovich Petrov1Evgeny Vasilevich Dirienko2Anton Anatolevich Abramov3Ivan Alexandrovich Korsakov4Stanislav Sergeevich Kuzminov5National Research Nuclear University “MEPhI”National Research Nuclear University “MEPhI”National Research Nuclear University “MEPhI”National Research Nuclear University “MEPhI”National Research Nuclear University “MEPhI”National Research Nuclear University “MEPhI”This paper proposes cryptanalysis attacks on network time (synchronization) systems method (computer espionage) based on timestamp fractional value falsification that software’s implant realizes. For massive time stamps using in a public key infrastructure, the considered method of attack can completely compromise that infrastructure.https://bit.mephi.ru/index.php/bit/article/view/305computer espionagenetwork time |
| spellingShingle | Dmitry Anatolevich Melnikov Vladislav Romanovich Petrov Evgeny Vasilevich Dirienko Anton Anatolevich Abramov Ivan Alexandrovich Korsakov Stanislav Sergeevich Kuzminov Computer Network’s Time (Synchronization) Systems Espionage and Its Possible Consequences computer espionage network time |
| title | Computer Network’s Time (Synchronization) Systems Espionage and Its Possible Consequences |
| title_full | Computer Network’s Time (Synchronization) Systems Espionage and Its Possible Consequences |
| title_fullStr | Computer Network’s Time (Synchronization) Systems Espionage and Its Possible Consequences |
| title_full_unstemmed | Computer Network’s Time (Synchronization) Systems Espionage and Its Possible Consequences |
| title_short | Computer Network’s Time (Synchronization) Systems Espionage and Its Possible Consequences |
| title_sort | computer network s time synchronization systems espionage and its possible consequences |
| topic | computer espionage network time |
| url | https://bit.mephi.ru/index.php/bit/article/view/305 |
| work_keys_str_mv | AT dmitryanatolevichmelnikov computernetworkstimesynchronizationsystemsespionageanditspossibleconsequences AT vladislavromanovichpetrov computernetworkstimesynchronizationsystemsespionageanditspossibleconsequences AT evgenyvasilevichdirienko computernetworkstimesynchronizationsystemsespionageanditspossibleconsequences AT antonanatolevichabramov computernetworkstimesynchronizationsystemsespionageanditspossibleconsequences AT ivanalexandrovichkorsakov computernetworkstimesynchronizationsystemsespionageanditspossibleconsequences AT stanislavsergeevichkuzminov computernetworkstimesynchronizationsystemsespionageanditspossibleconsequences |
