Learn More
While keystream reuse in stream ciphers and one-time pads has been a well known problem for several decades, the risk to real systems has been underappreciated. Previous techniques have relied on being able to accurately guess words and phrases that appear in one of the plaintext messages, making it far easier to claim that "an attacker would never be able(More)
This research seeks to minimize the transmission of unnecessary data when sending forensically sound drive images from remote client locations back to a central site. Files such as operating-system files, applications, and media files are likely to exist on many hard drives. The concept combines common data from local stores with unique data from the remote(More)
  • 1