[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
:: Volume 7, Issue 2 (3-2019) ::
3 2019, 7(2): 40-31 Back to browse issues page
Investigating Methods of Kleptography
Hadi Soleimany , Farokh Lagha Moazemi
Abstract:   (799 Views)
Due to the fast development in information and communication technology, new challenging problems appear in the security. So, it is important and vital that the scientific society of our country focuses on research and studies these problems and by providing new proposal try to respond to these critical needs of our country. Hence, our aim in this paper is to study and highlight one of the important problems of applied cryptography that appear recently in cryptography society but in our country, there is not much research about it. In this paper, we investigate a special and applied category of a backdoor in cryptography systems which is named Kleptography. In this paper, in addition to the investigation of the kleptographic attack, we study its application. Our purpose in this paper is to shed some new light on the kleptographic attack by studying new concepts that recently have appeared about it.
Keywords: Kleptography, malicious cryptography, backdoor
Full-Text [PDF 2326 kb]   (123 Downloads)    
Type of Study: Scientific extension | Subject: Special
Received: 2018/09/8 | Accepted: 2019/01/6 | Published: 2019/08/3
Send email to the article author

Add your comments about this article
Your username or Email:


XML   Persian Abstract   Print

Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Soleimany H, Moazemi F L. Investigating Methods of Kleptography. 3. 2019; 7 (2) :40-31
URL: http://monadi.isc.org.ir/article-1-126-en.html

Volume 7, Issue 2 (3-2019) Back to browse issues page
دوفصل نامه علمی ترویجی منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.05 seconds with 29 queries by YEKTAWEB 4217