Sprache: Englisch
Verlag: Creative Media Partners, LLC Mai 2025, 2025
ISBN 10: 1025137086 ISBN 13: 9781025137087
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Neuware - This work presents a brute-force attack on an elliptic curve cryptosystemimplemented on UC Berkley's TinyOS operating system for wireless sensor networks.The attack exploits the short period of the pseudorandom number generator (PRNG) usedby the cryptosystem to generate private keys. The attack assumes a laptop is listeningpromiscuously to network traffic for key messages and requires only the sensor node'spublic key and network address to discover the private key. Experimental results showthat roughly 50% of the address space leads to a private key compromise in 25 minuteson average.
Sprache: Englisch
Verlag: Creative Media Partners, LLC Mai 2025, 2025
ISBN 10: 1025132599 ISBN 13: 9781025132594
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch. Zustand: Neu. Neuware.
Sprache: Englisch
Verlag: Books on Demand|BiblioScholar, 2012
ISBN 10: 1288368585 ISBN 13: 9781288368587
Anbieter: moluna, Greven, Deutschland
EUR 61,74
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. This work presents a brute-force attack on an elliptic curve cryptosystemimplemented on UC Berkley&aposs TinyOS operating system for wireless sensor networks.The attack exploits the short period of the pseudorandom number generator (PRNG) usedby the crypto.
Sprache: Englisch
Verlag: Creative Media Partners, LLC Nov 2012, 2012
ISBN 10: 1288368585 ISBN 13: 9781288368587
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Neuware - This work presents a brute-force attack on an elliptic curve cryptosystemimplemented on UC Berkley's TinyOS operating system for wireless sensor networks.The attack exploits the short period of the pseudorandom number generator (PRNG) usedby the cryptosystem to generate private keys. The attack assumes a laptop is listeningpromiscuously to network traffic for key messages and requires only the sensor node'spublic key and network address to discover the private key. Experimental results showthat roughly 50% of the address space leads to a private key compromise in 25 minuteson average.