The search functionality is under construction.

IEICE TRANSACTIONS on Communications

Security Analysis of DoS Vulnerability in Stream Authentication Schemes Using Hash Chaining

Namhi KANG, Christoph RULAND

  • Full Text Views

    0

  • Cite this

Summary :

In this letter, we show that some stream authentication schemes using hash chaining are highly vulnerable to denial of service (DoS) attacks. An adversary can disrupt all receivers of group by making use of modifying a few packets in those schemes.

Publication
IEICE TRANSACTIONS on Communications Vol.E88-B No.3 pp.1264-1265
Publication Date
2005/03/01
Publicized
Online ISSN
DOI
10.1093/ietcom/e88-b.3.1264
Type of Manuscript
LETTER
Category
Internet

Authors

Keyword