Sarad Venugopalan Home Page

Welcome to data.at.preempted.net
Tuesday, October 17 2017 @ 08:30 PM UTC

View Printable Version

Introduction to Diffie-Hellman and its Analog over Elliptic Curves using polynomial basis

ArticlesA basic introduction to Elliptic Curve Cryptography.

Read PDF

View Printable Version

Attacking the Interlock Protocol

ArticlesAbstract The Interlock Protocol is used as a mechanism to foil the Man in the Middle Attack, however by the attack proposed below, it is shown that the Interlock Protocol is insecure. It involves faking the first packet of the communication and the man in the middle sending forth half of the (n) th packet when he receives half of the (n+1) th packet and completes the attack.

Read PDF

View Printable Version

B-Tree Optimizations in free text search

ArticlesTalk slides

- B+ tree is a multi way decision tree under certain constraints and a variant of the B tree
- Secondary disk storage provides cheaper mass storage support when compared to main memory devices
- The requirement to storage large indices make main memory solutions economically infeasible
- Secondary storage access time is usually at least 100,000 times slower that main memory
- B+ tree is used to minimize I/O operations

Read PDF

View Printable Version

Two Cryptanalysis Challenges based on the Discrete Log Problem

ArticlesI had the good fortune to write two Crypto Challenges based on the Discrete Log Problem and I thank Nequ Marba for trying them out and solving it correctly.

Read PDF

View Printable Version

RSA Cryptography challenge and 2 D matrix challenge

ArticlesI wrote two other crypto challenges, redoing some of the cryptanalysis problems in [1]. Hope you enjoy it.

Read PDF

View Printable Version

Cryptovirology: Threats and Countermeasures

ArticlesWe describe a less prominent attack on standalone and networked computer systems known as CryptoViral attacks. These are very powerful attacks, where the attacker can hold the victim's data for ransom. The organization of this presentation is as follows. We define the basic terminology and then discuss four different scenario's in which a cryptovirus is used to extort information or/and ransom. Scenario 1 is a cryptoviral extortion protocol performed by holding the victim's data as ransom. Scenario 2 is similar to Scenario 1 except for that the virus writer also demands the victim's encrypted text along with the ransom. Scenario 3 describes a secret sharing cryptovirus. The attack works on a computer network with infected hosts. In this attack the asymmetric private key is split and shared among the infected network hosts. Scenario 4 explores the role of a cryptovirus in a Deniable Password Snatching (DPS) attack commonly used in espionage.

Read PDF