Cryptographic Tamper Evidence
Thread Rating:
  • 1 Vote(s) - 1 Average
  • 1
  • 2
  • 3
  • 4
  • 5
mechanical engineering crazy
Active In SP

Posts: 226
Joined: Jul 2009
28-08-2009, 02:29 AM

Cryptographic Tamper Evidence
We propose a new notion of cryptographic tamper evidence A tamper-evident signature scheme provides an additional procedure which detects tampering: given two signatures, this can determine whether one of them was generated by the forger. In this case, it might be impossible to tell which signature is generated by the legitimate signer and which by the forger, but at least the fact of the tampering will be made evident. We define several variants of tamper-evidence, differing in their power to detect tampering. In all of these, we assume an equally powerful adversary: she adaptively controls all the inputs to the legitimate signer (i.e., all messages to be signed and their timing), and observes all his outputs; she can also adaptively expose all the secrets at arbitrary times. We provide tamper-evident schemes for all the variants.

Our mechanisms are purely cryptographic: the tamper- detection algorithm is stateless and takes no inputs except the two signatures, it uses no infrastructure (or other ways to conceal additional secrets),and relies on no hard-ware properties (except those implied by the standard cryptographic assumptions, such as random number generators).

Key exposure is a well-known threat for any cryptographic tool. For signatures, exposure of a secret key compromises the corresponding public key After the exposure is detected,
the compromised keys can be revoked. This detection of the exposure has previously been dealt with outside the scope of cryptography. Indeed, it may seem that if an adversary in-conspicuously learns all the secrets within the system, then the cryptographic tools are helpless.

Thus, while it still might not be possible to distinguish the forger-generated signatures from the legitimate ones, our mechanisms can at least make the tampering evident.
Use Search at wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Computational Methods for a Mathematical Theory of Evidence seminar projects maker 0 262 26-09-2013, 02:12 PM
Last Post: seminar projects maker
  Secured Data Transmission using Cryptographic and Steganographic Techniques Report study tips 0 304 18-05-2013, 11:34 AM
Last Post: study tips
  A Family of Fast Syndrome Based Cryptographic Hash Functions pdf project girl 0 362 04-02-2013, 10:39 AM
Last Post: project girl
  High-Speed Architectures of the Cryptographic Hash Function BLAKE seminar tips 0 283 03-12-2012, 04:44 PM
Last Post: seminar tips
  Image Watermarking for Tamper Detection seminar flower 1 715 22-11-2012, 11:43 AM
Last Post: seminar tips
  Erratum: Evidence That a Deep Meridional Flow Sets the Sunspot Cycle Period seminar flower 0 304 27-10-2012, 02:01 PM
Last Post: seminar flower
  A RSA- DWT Based Visual Cryptographic Steganogrphy Technique seminar ideas 0 500 11-08-2012, 04:05 PM
Last Post: seminar ideas
  New Symmetric key Cryptographic algorithm using combined bit manipulation and MSA.... project uploader 0 355 09-08-2012, 01:39 PM
Last Post: project uploader
  Cryptographic Versus Trust-based Metho ds for MANET Routing Security seminar flower 0 372 24-07-2012, 04:30 PM
Last Post: seminar flower
  Quantum cryptographic network using entanglement swapping seminar class 2 991 29-02-2012, 02:43 PM
Last Post: seminar paper