2015
DOI: 10.1007/978-81-322-2526-3_11
|View full text |Cite
|
Sign up to set email alerts
|

CRiPT: Cryptography in Penetration Testing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 8 publications
0
1
0
Order By: Relevance
“…They validate user input text against sanitizer model and input entries which create SQL queries are validated against security query model in production mode. In [8] author(s) demonstrates the vulnerabilities and network attacks pertaining to cryptographic algorithms such as AES, DES and MD 5 et al In [10] author(s) also proposes a similar technique to handle the security of the alphabets and numbers but without any detailed comparison. In [11] author(s) proposes a technique to encrypt and decrypt the Alphabets, Numbers and Alphanumeric data in minimum span of time with minimum lines of code, designed logic of which has been coded in JAVA In [12] author(s) have designed a Java based tool to show the exploitation of Injection using SQL Injection attack and Broken Authentication using Brute Force Attack and Dictionary Attack and the prevention of all these attacks by storing the data in our database in encrypted form using AES algorithm.…”
Section: Related Workmentioning
confidence: 99%
“…They validate user input text against sanitizer model and input entries which create SQL queries are validated against security query model in production mode. In [8] author(s) demonstrates the vulnerabilities and network attacks pertaining to cryptographic algorithms such as AES, DES and MD 5 et al In [10] author(s) also proposes a similar technique to handle the security of the alphabets and numbers but without any detailed comparison. In [11] author(s) proposes a technique to encrypt and decrypt the Alphabets, Numbers and Alphanumeric data in minimum span of time with minimum lines of code, designed logic of which has been coded in JAVA In [12] author(s) have designed a Java based tool to show the exploitation of Injection using SQL Injection attack and Broken Authentication using Brute Force Attack and Dictionary Attack and the prevention of all these attacks by storing the data in our database in encrypted form using AES algorithm.…”
Section: Related Workmentioning
confidence: 99%