Fig 1 - uploaded by Cheman Shaik
Content may be subject to copyright.
Encryption and decryption of user login credentials

Encryption and decryption of user login credentials

Source publication
Article
Full-text available
Presented herein is a User-SpecificKey Scheme based on Elliptic Curve Cryptography that defeats man-inthe-middle attacks on cryptocurrency exchange accounts. In this scheme, a separate public and private key pair is assigned to every account and the public key is shifted either forward or backward on the elliptic curve by a difference of the accoun...

Contexts in source publication

Context 1
... exchange server obtains a public and private key pair from a certificate authority to secure all its communication with its account users. The same key pair is used to encrypt and decrypt all communications, irrespective of the user the server is communicating with, and this practice gives way to MITM attacks through key spoofing. Fig. 1 below illustrates how encryption and decryption of user credentials take place using the server's public and private keys. As shown in the above figure, the server's public key is passed to the user machine during login. The user's login credentials are encrypted with the public key to generate a ciphertext which is passed to the ...
Context 2
... exchange server obtains a public and private key pair from a certificate authority to secure all its communication with its account users. The same key pair is used to encrypt and decrypt all communications, irrespective of the user the server is communicating with, and this practice gives way to MITM attacks through key spoofing. Fig. 1 below illustrates how encryption and decryption of user credentials take place using the server's public and private keys. As shown in the above figure, the server's public key is passed to the user machine during login. The user's login credentials are encrypted with the public key to generate a ciphertext which is passed to the ...