搜索结果: 1-6 共查到“军事学 DNSSEC”相关记录6条 . 查询时间(0.265 秒)
Securing DNSSEC Keys via Threshold ECDSA From Generic MPC
Multiparty computation Threshold ECDSA Honest majority
2019/8/6
A surge in DNS cache poisoning attacks in the recent years generated an incentive to push the deployment of DNSSEC forward. ICANN accredited registrars are required to support DNSSEC signing for their...
Can NSEC5 be practical for DNSSEC deployments?
Internet protocols verifiable random functions zone enumeration
2017/2/20
NSEC5 is a new proposal for providing authenticated denial of existence for DNSSEC, i.e., for securely responding to DNS queries for names that do not exist in a zone. NSEC5 simultaneously guarantees ...
NSEC5 from Elliptic Curves: Provably Preventing DNSSEC Zone Enumeration with Shorter Responses
verifiable random functions DNSSEC zone enumeration secure Internet protocols
2016/2/23
While DNSSEC securely provides authenticity and integrity to the domain name system (DNS), it also creates a new security vulnerability called zone enumeration that allows an adversary that asks a sma...
We use cryptographic techniques to study zone enumeration in DNSSEC. DNSSEC is designed to prevent attackers from tampering with domain name system (DNS) messages. The cryptographic machinery used in ...
Towards Adoption of DNSSEC: Availability and Security Challenges
DNS security DNS cache poisoning
2014/3/13
DNSSEC deployment is long overdue; however, it seems to be finally taking off. Recent cache poisoning attacks motivate protecting DNS, with strong cryptography, rather than with challenge-response ‘de...
Domain Name System Security Extensions (DNSSEC) and
Hashed Authenticated Denial of Existence (NSEC3) are
slated for adoption by important parts of the DNS hierarchy,
including the root zone, as a s...