Proceedings of the 7th Annual International Conference on Mobile Computing and Networking 2001
DOI: 10.1145/381677.381695
|View full text |Cite
|
Sign up to set email alerts
|

Intercepting mobile communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
314
0
7

Year Published

2003
2003
2014
2014

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 612 publications
(328 citation statements)
references
References 5 publications
0
314
0
7
Order By: Relevance
“…The key extraction attack requires decryption of ciphertexts adaptively chosen by the attacker. Prior works requiring chosen plaintext or ciphertext typically attacked network protocols such as SSL/TLS [BB05] or WEP [BGW01,BHL06], or used direct access to a protected device's input. To apply the attack to GnuPG, we identified and exploited a new chosenciphertext attack vector: OpenPGP encrypted e-mail messages.…”
Section: Overviewmentioning
confidence: 99%
“…The key extraction attack requires decryption of ciphertexts adaptively chosen by the attacker. Prior works requiring chosen plaintext or ciphertext typically attacked network protocols such as SSL/TLS [BB05] or WEP [BGW01,BHL06], or used direct access to a protected device's input. To apply the attack to GnuPG, we identified and exploited a new chosenciphertext attack vector: OpenPGP encrypted e-mail messages.…”
Section: Overviewmentioning
confidence: 99%
“…In addition, a continuously transmitting node can always capture the channel and cause other nodes to back off endlessly which can trigger a chain reaction from upper layer protocols (e.g. TCP window management) [2,15].…”
Section: Security Issues In the Data Link Layermentioning
confidence: 99%
“…In practice, it is challenging to ensure that a nonce is never reused. Flawed implementations of nonces are ubiquitous [9,20,28,44,45]. Apart from implementation failures, there are fundamental reasons why software developers can't always prevent nonce reuse.…”
Section: Introductionmentioning
confidence: 99%