Zobrazeno 1 - 10
of 501
pro vyhledávání: '"Mitchell, Chris J."'
This technical report investigates the integration of generative AI (GenAI), specifically ChatGPT, into the practice of ethical hacking through a comprehensive experimental study and conceptual analysis. Conducted in a controlled virtual environment,
Externí odkaz:
http://arxiv.org/abs/2410.05105
Autor:
Mitchell, Chris J, Wild, Peter R
Analogously to de Bruijn sequences, orientable sequences have application in automatic position-location applications and, until recently, studies of these sequences focused on the binary case. In recent work by Alhakim et al., a range of methods of
Externí odkaz:
http://arxiv.org/abs/2409.00672
We describe new, simple, recursive methods of construction for orientable sequences over an arbitrary finite alphabet, i.e. periodic sequences in which any sub-sequence of n consecutive elements occurs at most once in a period in either direction. In
Externí odkaz:
http://arxiv.org/abs/2407.14866
Autor:
Mitchell, Chris J
This paper re-examines the security of three related block cipher modes of operation designed to provide authenticated encryption. These modes, known as PES-PCBC, IOBC and EPBC, were all proposed in the mid-1990s. However, analyses of security of the
Externí odkaz:
http://arxiv.org/abs/2403.03654
Autor:
Mitchell, Chris J, Wild, Peter R
This paper describes new, simple, recursive methods of construction for orientable sequences, i.e. periodic binary sequences in which any n-tuple occurs at most once in a period in either direction. As has been previously described, such sequences ha
Externí odkaz:
http://arxiv.org/abs/2108.03069
Autor:
Mitchell, Chris J
Two recently published papers propose some very simple key distribution schemes designed to enable two or more parties to establish a shared secret key with the aid of a third party. Unfortunately, as we show, most of the schemes are inherently insec
Externí odkaz:
http://arxiv.org/abs/2101.08132
Autor:
Mitchell, Chris J
Serious weaknesses in two very closely related group authentication and group key establishment schemes are described. Simple attacks against the group key establishment part of the schemes are described, which strongly suggest that the schemes shoul
Externí odkaz:
http://arxiv.org/abs/2009.09278
Autor:
Mitchell, Chris J
A paper presented at the ICICS 2019 conference describes what is claimed to be a `provably secure group authentication [protocol] in the asynchronous communication model'. We show here that this is far from being the case, as the protocol is subject
Externí odkaz:
http://arxiv.org/abs/2005.05376
How not to secure wireless sensor networks revisited: Even if you say it twice it's still not secure
Autor:
Mitchell, Chris J
Two recent papers describe almost exactly the same group key establishment protocol for wireless sensor networks. Quite part from the duplication issue, we show that both protocols are insecure and should not be used - a member of a group can success
Externí odkaz:
http://arxiv.org/abs/2005.04434
Autor:
Mitchell, Chris J
There has been much recent discussion of the criticality of the 5G infrastructure, and whether certain vendors should be able to supply 5G equipment. The key issue appears to be about trust, namely to what degree the security and reliability properti
Externí odkaz:
http://arxiv.org/abs/2005.00862