Search Results

1 - 10 of 20 items :

  • "deniability" x
Clear All
PD-DM: An efficient locality-preserving block device mapper with plausible deniability

deniability against multi-snapshot adversaries. Proceedings on Privacy Enhancing Technologies , 2017(3), 2017. [7] D. Beaver. Plug and play encryption. In Advances in Cryptology – CRYPTO’97 , pages 75–89. springer. [8] E.-O. Blass, T. Mayberry, G. Noubir, and K. Onarlioglu. Toward robust hidden volumes using write-only oblivious ram. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security , pages 203–214. ACM, 2014. [9] R. Canetti, C. Dwork, M. Naor, and R. Ostrovsky. Deniable encryption. In Advances in Cryptology

Open access
Improved Strongly Deniable Authenticated Key Exchanges for Secure Messaging

of Witness Hiding Protocols. In Annual International Cryptology Conference , pages 174–187. Springer, 1994. [36] Mario Di Raimondo, Rosario Gennaro, and Hugo Krawczyk. Secure Off-the-Record Messaging. In Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society , pages 81–89. ACM, 2005. [37] Mario Di Raimondo, Rosario Gennaro, and Hugo Krawczyk. Deniable Authentication and Key Exchange. In Conference on Computer and Communications Security , pages 400–409. ACM, 2006. [38] Theodore Diament, Homin K Lee, Angelos D Keromytis, and

Open access
Circumventing Cryptographic Deniability with Remote Attestation

Activities Board, Jan. 1999. [18] Y. Dodis, J. Katz, A. Smith, and S. Walfish, “Composability and on-line deniability of authentication,” in TCC 2009: 6th Theory of Cryptography Conference , ser. Lecture Notes in Computer Science, O. Reingold, Ed., vol. 5444. Springer, Heidelberg, Mar. 2009, pp. 146–162. [19] M. Gay, “Political world embraces encrypted-messaging app Signal amid fears of hacking,” The Wall Street Journal , 2017, 2017-01-27. [Online]. Available: https

Open access
DataLair: Efficient Block Storage with Plausible Deniability against Multi-Snapshot Adversaries

1 A preliminary version of this paper was present as a poster [26] with an overview of the technical solution described here. References [1] Bonnie++ . “ http://www.coker.com.au/bonnie++ ”. [2] Hive . “ http://www.onarlioglu.com/hive ”. [3] Plausible Deniability . “ http://en.wikipedia.org/wiki/Plausible_deniability ”. [4] Rubberhose . “ http://en.wikipedia.org/wiki/Rubberhose_(filesystem) ”. [5] TrueCrypt . “ http://truecrypt.sourceforge.net/ ”. [6] Ross Anderson, Roger Needham, and Adi Shamir. The steganographic

Open access
SqORAM: Read-Optimized Sequential Write-Only Oblivious RAM

, G. Noubir, and K. Onarlioglu, “Toward robust hidden volumes using write-only oblivious RAM,” in Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014 , 2014, pp. 203–214. [5] A. Chakraborti, C. Chen, and R. Sion, “Datalair: Efficient block storage with plausible deniability against multi-snapshot adversaries,” PoPETs , vol. 2017, no. 3, p. 179, 2017. [Online]. Available: https://doi.org/10.1515/popets-2017-0035 [6] A. Chakraborti, A. J. Aviv, S. G. Choi, T. Mayberry, D. S

Open access
Hybrid warfare on the Ukrainian battlefield: developing theory based on empirical evidence

Abstract

With the takeover of Crimea by masked Russian soldiers/fighters without national insignia in February/March 2014, with the Kremlin at first denying its involvement, war became ‘hybrid’ in our minds. The follow-on conflict in Eastern Ukraine, with separatism supported by neighbouring countries and the armed establishment and military securing of pseudo-state people’s republics, including recourse to pro-Russian fighters ‘on holiday’, has reinforced the impression of a hybrid form of warfare, raising the question: what is hybrid warfare? This article argues that the specific nature of hybrid warfare is essentially a strategic matter characterised by three key tendencies and their orchestration within a hybrid ‘grand strategy’: 1. Focusing the decision of the war/conflict, as such, primarily on a broad spectrum of non-military centres of gravity in a flexible and dynamic manner. 2. Operating in the shadow of various interfaces against specific vulnerabilities of the opponent, thus challenging traditional lines of order and responsibilities, creating ambiguity and paralysing the decision-making process of the opponent. 3. Creative combination and parallel use of different civilian and military means and methods, categories and forms of warfare and fighting, thus creating ‘new’ mixed, hybrid forms.1 At the same time, there is a growing sense that hybrid forms of warfare will shape the face of war in the 21st century.2 They seem to offer unpretentious political success by smart recourse to limited, deniable and supposedly manageable use of force. The assumption that the risk of military escalation and political damage could be kept within limits may at the same time increase the likelihood of the offensive use of hybrid forms of warfare. For this reason, it is high time to improve our common and comprehensive understanding of hybrid forms of warfare as a precondition for common and comprehensive action in defence and response.

Open access
Sender-equivocable encryption schemes secure against chosen-ciphertext attacks revisited

. and Wei, B. (2012). Deniable encryptions secure against adaptive chosen ciphertext attack, in M.D. Ryan, B. Smyth and G. Wang (Eds.), Information Security Practice and Experience, Springer, Berlin/Heidelberg, pp. 46-62. Hemenway, B., Libert, B., Ostrovsky, R. and Vergnaud, D. (2011). Lossy encryption: Constructions from general assumptions and efficient selective opening chosen ciphertext security, in D.H. Lee and X. Wang (Eds.), Advances in Cryptology-ASIACRYPT 2011, Springer, Berlin/Heidelberg, pp. 70-88. Hofheinz, D. (2012). All

Open access
The Baltic states should adopt the self-defence pinpricks doctrine: the “accumulation of events” threshold as a deterrent to Russian hybrid warfare

References Allain, J. (2004). The True Challenge to the United Nations System of the Use of Force: The Failures of Kosovo and Iraq and the Emergence of the African Union. 8 Max Planck Yearbook of United Nations Law , pp. 237-242. Allison, R. (2014). Russian “deniable” intervention in Ukraine: how and why Russia broke the rules, International Affairs, The Royal Institute of International Affairs , available at: http://commonweb.unifr.ch/artsdean/pub/gestens/f/as/files/4760/39349_202339.pdf (accessed January 22nd, 2017). Blank, S. (2011

Open access
Consistent Synchronous Group Off-The-Record Messaging with SYM-GOTR

. [19] M. Di Raimondo, R. Gennaro, and H. Krawczyk, “Deniable authentication and key exchange,” in Proceedings of the 13th ACM conference on Computer and communications security, pp. 400-409, ACM, 2006. [20] linode, linode. https://linode.com/. [21] J. Ugander, B. Karrer, L. Backstrom, and C. Marlow, “The anatomy of the facebook social graph,” arXiv preprint arXiv:1111.4503, 2011. [22] OpenStack IRC meetings. http://eavesdrop.openstack.org/. [23] twitter, twitter. https://twitter.com/. [24

Open access
A branch hash function as a method of message synchronization in anonymous P2P conversations

-10. Berthold, O., Federrath, H. and Kpsell, S. (2001). Web mixes: A system for anonymous and unobservable internet access, International Workshop on Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, pp. 115-129. Boyd, C., Mao, W. and Paterson, K.G. (2005). Deniable authenticated key establishment for internet protocols, in B. Christianson et al. (Eds.), Security Protocols, Springer, Berlin/Heidelberg, pp. 255-271. Dabek, F., Li, J., Sit, E., Robertson, J., Kaashoek, M. and Morris, R

Open access