DocumentCode :
2045510
Title :
Beyond cryptography: threats before and after
Author :
Fabian, Dr Walter
Author_Institution :
Walter Fabian & Associates, Nashua, NH, USA
fYear :
1998
fDate :
12-14 Oct 1998
Firstpage :
97
Lastpage :
107
Abstract :
Cryptography is a powerful tool for computer and computer network security. This paper explores threats, other than cryptanalysis, to systems using cryptography for privacy and authentication. Even systems using the strongest cryptographic methods can be vulnerable to upstream and downstream threats, i.e. threats before and after cryptographic protection. Examples of such threats are described, with emphasis given to keystroke capture and hijacking threats. Vulnerabilities of various operating systems and routable protocols are detailed. It is shown that secure session authentication requires both secure user authentication and secure computer authentication
Keywords :
cryptography; data privacy; message authentication; operating systems (computers); protocols; computer network security; computer security; cryptanalysis; cryptography; data privacy; hijacking threats; keystroke capture; operating systems; routable protocols; secure computer authentication; secure session authentication; secure user authentication; Authentication; Computer security; Cryptography; Invasive software; Keyboards; Monitoring; Physics computing; Power system security; Privacy; Protection;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security Technology, 1998. Proceedings., 32nd Annual 1998 International Carnahan Conference on
Conference_Location :
Alexandria, VA
Print_ISBN :
0-7803-4535-5
Type :
conf
DOI :
10.1109/CCST.1998.723773
Filename :
723773
Link To Document :
بازگشت