首页 > 最新文献

International Journal on Cryptography and Information Security最新文献

英文 中文
The Evolving Landscape of Cybersecurity: Red Teams, Large Language Models, and the Emergence of New AI Attack Surfaces 网络安全的发展前景:红队、大型语言模型和新的人工智能攻击面出现
Pub Date : 2023-03-30 DOI: 10.5121/ijcis.2023.13101
Forrest McKee, David Noever
This study explores cybersecurity questions using a question-and-answer format with the advanced ChatGPT model from OpenAI. Unlike previous chatbots, ChatGPT demonstrates an enhanced understanding of complex coding questions. We present thirteen coding tasks aligned with various stages of the MITRE ATT&CK framework, covering areas such as credential access and defense evasion. The experimental prompts generate keyloggers, logic bombs, obfuscated worms, and ransomware with payment fulfillment, showcasing an impressive range of functionality, including self-replication, self-modification, and evasion. Despite being a language-only model, a notable feature of ChatGPT showcases its coding approaches to produce images with obfuscated or embedded executable programming steps or links.
本研究利用OpenAI的高级ChatGPT模型采用问答形式探讨网络安全问题。与以前的聊天机器人不同,ChatGPT演示了对复杂编码问题的增强理解。我们提出了13个编码任务,这些任务与MITRE攻击和攻击框架的各个阶段相一致,涵盖了诸如凭据访问和防御逃避等领域。实验提示生成键盘记录程序、逻辑炸弹、混淆蠕虫和具有支付功能的勒索软件,展示了一系列令人印象深刻的功能,包括自我复制、自我修改和逃避。尽管只是一个语言模型,但ChatGPT的一个显著特性展示了它的编码方法,可以生成带有混淆或嵌入可执行编程步骤或链接的图像。
{"title":"The Evolving Landscape of Cybersecurity: Red Teams, Large Language Models, and the Emergence of New AI Attack Surfaces","authors":"Forrest McKee, David Noever","doi":"10.5121/ijcis.2023.13101","DOIUrl":"https://doi.org/10.5121/ijcis.2023.13101","url":null,"abstract":"This study explores cybersecurity questions using a question-and-answer format with the advanced ChatGPT model from OpenAI. Unlike previous chatbots, ChatGPT demonstrates an enhanced understanding of complex coding questions. We present thirteen coding tasks aligned with various stages of the MITRE ATT&CK framework, covering areas such as credential access and defense evasion. The experimental prompts generate keyloggers, logic bombs, obfuscated worms, and ransomware with payment fulfillment, showcasing an impressive range of functionality, including self-replication, self-modification, and evasion. Despite being a language-only model, a notable feature of ChatGPT showcases its coding approaches to produce images with obfuscated or embedded executable programming steps or links.","PeriodicalId":225810,"journal":{"name":"International Journal on Cryptography and Information Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130454162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptibility 基于奇异值分解的多图像水印:提高容量和不可感知性
Pub Date : 2022-12-30 DOI: 10.5121/ijcis.2022.12401
Henri Bruno Razafindradina, P. A. Randriamitantsoa
Digital watermarking consists of inserting a mark (text, image, sound or video) in a medium. The goal is to be able to identify the author or owner of a digital document by the inserted mark. Watermarking algorithms must find a compromise between capacity and imperceptibility. Capacity represents the amount of data inserted and the imperceptibility makes the mark invisible. Our research is related to images watermarking based on singular value decomposition. There are two main approaches to improving capacity and imperceptibility : dual technique and multiple technique. Most algorithms based on these two approaches have low capacity : the watermarks are generally smaller than the host image. Agarwal & al worked on inserting an image into another image of the same size, imperceptibly. Their method adds the mark in the V matrix of the image after its singular value decomposition. A λ parameter was chosen to specify the power of insertion. Our contribution is to add two images by simultaneously improving capacity and imperceptibility. This new method consists on adding the mark in the 2 matrices U and V after singular value decomposition. The insertion of the first mark is an addition as in Agarwal’s method while that of the second mark is a subtraction to make the watermark less imperceptible. The result shows that our method is robust against different attacks such as compression, noise addition, median filtering and rotation. It is also imperceptible because not only we obtain a PSNR of 27 dB, but the histogram obtained is closer to that of the original image than that of Agarwal. A test on a database of 180 images shows that the marks are still detected. However, despite these advantages, the first mark is less visible and of poor quality compared to the second after their extraction. One solution to this is to increase the value of the parameter λ for the insertion of the first mark.
数字水印包括在媒体中插入标记(文本、图像、声音或视频)。目标是能够通过插入的标记识别数字文档的作者或所有者。水印算法必须在容量和不可感知性之间找到一个平衡点。容量表示插入的数据量,不可感知性使标记不可见。我们的研究涉及到基于奇异值分解的图像水印。提高能力和隐蔽性的途径主要有两种:双重技术和多重技术。基于这两种方法的大多数算法都存在容量小的问题:水印通常比宿主图像小。阿加瓦尔和他的同事们在不知不觉中将一个图像插入到另一个相同大小的图像中。他们的方法是在图像奇异值分解后的V矩阵中加入标记。选择λ参数来指定插入功率。我们的贡献是通过同时提高容量和隐蔽性来增加两个图像。该方法是将奇异值分解后的2个矩阵U和V的标记相加。在Agarwal的方法中,第一个标记的插入是一个加法,而第二个标记的插入是一个减法,以使水印不那么难以察觉。结果表明,该方法对压缩、噪声添加、中值滤波和旋转等攻击具有较强的鲁棒性。这也是难以察觉的,因为我们不仅得到了27 dB的PSNR,而且得到的直方图比Agarwal的直方图更接近原始图像。在一个包含180张图像的数据库中进行的测试表明,这些标记仍然被检测到。然而,尽管有这些优点,与提取后的第二个标记相比,第一个标记不太明显,质量也差。对此的一个解决方案是增加参数λ的值以插入第一个标记。
{"title":"Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptibility","authors":"Henri Bruno Razafindradina, P. A. Randriamitantsoa","doi":"10.5121/ijcis.2022.12401","DOIUrl":"https://doi.org/10.5121/ijcis.2022.12401","url":null,"abstract":"Digital watermarking consists of inserting a mark (text, image, sound or video) in a medium. The goal is to be able to identify the author or owner of a digital document by the inserted mark. Watermarking algorithms must find a compromise between capacity and imperceptibility. Capacity represents the amount of data inserted and the imperceptibility makes the mark invisible. Our research is related to images watermarking based on singular value decomposition. There are two main approaches to improving capacity and imperceptibility : dual technique and multiple technique. Most algorithms based on these two approaches have low capacity : the watermarks are generally smaller than the host image. Agarwal & al worked on inserting an image into another image of the same size, imperceptibly. Their method adds the mark in the V matrix of the image after its singular value decomposition. A λ parameter was chosen to specify the power of insertion. Our contribution is to add two images by simultaneously improving capacity and imperceptibility. This new method consists on adding the mark in the 2 matrices U and V after singular value decomposition. The insertion of the first mark is an addition as in Agarwal’s method while that of the second mark is a subtraction to make the watermark less imperceptible. The result shows that our method is robust against different attacks such as compression, noise addition, median filtering and rotation. It is also imperceptible because not only we obtain a PSNR of 27 dB, but the histogram obtained is closer to that of the original image than that of Agarwal. A test on a database of 180 images shows that the marks are still detected. However, despite these advantages, the first mark is less visible and of poor quality compared to the second after their extraction. One solution to this is to increase the value of the parameter λ for the insertion of the first mark.","PeriodicalId":225810,"journal":{"name":"International Journal on Cryptography and Information Security","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133705354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Graph-based and Declarative Approach to a Secure Resource Management in Smart Factories 智能工厂中基于图形和声明的安全资源管理方法
Pub Date : 2022-09-30 DOI: 10.5121/ijcis.2022.12301
Alexander Lawall, Thomas W. Schaller
The article presents an applied research using the Design Science Research Methodology for securely managing resources of smart factories via a graph-based approach combined with a declarative query language. This query language can be used to find appropriate production facilities that are able to fulfill specific manufacturing tasks. This approach is aimed to solve the problem with the management effort for production facilities using enumeration for naming these facilities for the manufacturing tasks. Thus, the security is ensured by identifying the “current” valid identities (resources). Additionally, the usage of deputy relationships leads to alternative production facilities if resources have a breakdown or have to be serviced which has an effect on the availability.
本文提出了一项应用研究,利用设计科学研究方法,通过基于图形的方法结合声明性查询语言,安全管理智能工厂的资源。该查询语言可用于查找能够完成特定制造任务的适当生产设施。该方法旨在解决生产设施管理工作中的问题,使用枚举为生产任务命名这些设施。因此,通过标识“当前”有效的标识(资源)来确保安全性。此外,如果资源出现故障或必须提供服务,则使用代理关系可导致替代生产设施,从而影响可用性。
{"title":"A Graph-based and Declarative Approach to a Secure Resource Management in Smart Factories","authors":"Alexander Lawall, Thomas W. Schaller","doi":"10.5121/ijcis.2022.12301","DOIUrl":"https://doi.org/10.5121/ijcis.2022.12301","url":null,"abstract":"The article presents an applied research using the Design Science Research Methodology for securely managing resources of smart factories via a graph-based approach combined with a declarative query language. This query language can be used to find appropriate production facilities that are able to fulfill specific manufacturing tasks. This approach is aimed to solve the problem with the management effort for production facilities using enumeration for naming these facilities for the manufacturing tasks. Thus, the security is ensured by identifying the “current” valid identities (resources). Additionally, the usage of deputy relationships leads to alternative production facilities if resources have a breakdown or have to be serviced which has an effect on the availability.","PeriodicalId":225810,"journal":{"name":"International Journal on Cryptography and Information Security","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115399438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Highly Secure Cryptography Algorithm Method to Safeguard Audios and Visuals 保护音频和视觉的高度安全的加密算法方法
Pub Date : 2022-09-30 DOI: 10.5121/ijcis.2022.12302
Janaki Raman Palaniappan
Internet hacking has become common now a days and is increasing day by day. It is a high time to safeguard our data. There are several cryptographic methods and algorithms that are evolved and already exist. How about additional protection makes us stress free? In this paper, I present a unique design of cryptographic algorithm which is specifically designed for Auditory cryptography and visual cryptography to make the encryption and decryption technique stronger. The purpose is to make it very difficult to decode the file when an unauthorized user accesses the data. This algorithm is a combination of multiple techniques such as Ant Algorithm, Logical Gates Technique, Dual authorization PINs, Indexed Arrays. Combination of these techniques makes the algorithm unique and strong to secure the data. This research was implemented on audio files, images and video files. The study of the result shows effective way of masking the data as it is hard to decode without PINs. Also, performance of the algorithm is efficient during encryption and decryption process.
网络黑客现在已经成为普遍的一天,并日益增加。是时候保护我们的数据了。有几种加密方法和算法正在发展并已经存在。额外的保护能让我们摆脱压力吗?本文提出了一种专门针对听觉密码和视觉密码设计的独特的加密算法,使加密和解密技术更加强大。目的是使未经授权的用户访问数据时很难解码文件。该算法结合了蚂蚁算法、逻辑门技术、双授权pin、索引数组等多种技术。这些技术的结合使得该算法具有唯一性和强安全性。本研究对音频文件、图像文件和视频文件进行了研究。研究结果显示了一种有效的屏蔽数据的方法,因为没有pin码很难解码。同时,该算法在加解密过程中具有较高的性能。
{"title":"Highly Secure Cryptography Algorithm Method to Safeguard Audios and Visuals","authors":"Janaki Raman Palaniappan","doi":"10.5121/ijcis.2022.12302","DOIUrl":"https://doi.org/10.5121/ijcis.2022.12302","url":null,"abstract":"Internet hacking has become common now a days and is increasing day by day. It is a high time to safeguard our data. There are several cryptographic methods and algorithms that are evolved and already exist. How about additional protection makes us stress free? In this paper, I present a unique design of cryptographic algorithm which is specifically designed for Auditory cryptography and visual cryptography to make the encryption and decryption technique stronger. The purpose is to make it very difficult to decode the file when an unauthorized user accesses the data. This algorithm is a combination of multiple techniques such as Ant Algorithm, Logical Gates Technique, Dual authorization PINs, Indexed Arrays. Combination of these techniques makes the algorithm unique and strong to secure the data. This research was implemented on audio files, images and video files. The study of the result shows effective way of masking the data as it is hard to decode without PINs. Also, performance of the algorithm is efficient during encryption and decryption process.","PeriodicalId":225810,"journal":{"name":"International Journal on Cryptography and Information Security","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122346636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number System 基于剩余数系统的安全Paillier同态加密方案
Pub Date : 2022-03-31 DOI: 10.5121/ijcis.2022.12101
Daniel Asiedu, Abdul- MuminSalifu
In this paper, we present an improved Paillier Cryptosystem for a secured data transmission based on the Residue Number System (RNS). The current state of Paillier Cryptosystem allows the computation of the plaintext from the cipher text without solving its security assumption of Decisional Composite Residuosity or the knowledge of its private keys under mathematical attacks. The proposed RNS based cryptosystem involving two stages of encryption and two stages of decryption has never been adequately studied before. This paper attempts to solve by introducing two stages of encryption and two stages of decryption. The first stage of the encryption process maintains the traditional Paillier encryption process and the second stage process is the encryption using the recommended moduli set – by the RNS Forward converter. At the first stage of the decryption process, our proposed RNS based reverse converter is adopted and finally, the traditional Paillier decryption process will be used at the second stage of the decryption process. Because the entire encryption technique is randomized, it can withstand chosen bruteforce attacks. The suggested algorithm's security study reveals that it has a wide key space ( , a high level resistance to key sensitivity attacks, and an acceptable level of resilience. In terms of security, it has been discovered that the proposed system outperforms the present algorithm.
本文提出了一种改进的基于剩余数系统(RNS)的安全数据传输Paillier密码系统。目前的Paillier密码系统允许从密文中计算出明文,而无需解决其在数学攻击下的决策复合残差的安全假设或私钥的知识。提出的基于RNS的密码系统涉及两阶段的加密和两阶段的解密,以前从未有过充分的研究。本文试图通过引入两阶段的加密和两阶段的解密来解决这个问题。第一阶段的加密过程保持传统的Paillier加密过程,第二阶段的加密过程是使用RNS前向转换器推荐的模集进行加密。在解密过程的第一阶段,采用我们提出的基于RNS的反向转换器,最后,在解密过程的第二阶段将使用传统的Paillier解密过程。因为整个加密技术是随机的,所以它可以抵御选择的暴力攻击。该算法的安全性研究表明,它具有广泛的密钥空间,对密钥敏感性攻击的高水平抵抗,以及可接受的弹性水平。在安全性方面,本文提出的系统优于现有算法。
{"title":"Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number System","authors":"Daniel Asiedu, Abdul- MuminSalifu","doi":"10.5121/ijcis.2022.12101","DOIUrl":"https://doi.org/10.5121/ijcis.2022.12101","url":null,"abstract":"In this paper, we present an improved Paillier Cryptosystem for a secured data transmission based on the Residue Number System (RNS). The current state of Paillier Cryptosystem allows the computation of the plaintext from the cipher text without solving its security assumption of Decisional Composite Residuosity or the knowledge of its private keys under mathematical attacks. The proposed RNS based cryptosystem involving two stages of encryption and two stages of decryption has never been adequately studied before. This paper attempts to solve by introducing two stages of encryption and two stages of decryption. The first stage of the encryption process maintains the traditional Paillier encryption process and the second stage process is the encryption using the recommended moduli set – by the RNS Forward converter. At the first stage of the decryption process, our proposed RNS based reverse converter is adopted and finally, the traditional Paillier decryption process will be used at the second stage of the decryption process. Because the entire encryption technique is randomized, it can withstand chosen bruteforce attacks. The suggested algorithm's security study reveals that it has a wide key space ( , a high level resistance to key sensitivity attacks, and an acceptable level of resilience. In terms of security, it has been discovered that the proposed system outperforms the present algorithm.","PeriodicalId":225810,"journal":{"name":"International Journal on Cryptography and Information Security","volume":"284 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131995404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing Cryptocurrency Wallet Seed Phrase Digitally with Blind Key Encryption 用盲密钥加密数字保护加密货币钱包种子短语
Pub Date : 2020-12-30 DOI: 10.5121/IJCIS.2020.10401
Cheman Shaik
A cryptographic method of digitally securing cryptocurrency wallet seed phrase through Blind Key Encryption is discussed wherein two blind keys random in nature are generated and used to produce two ciphertexts. The mathematical algorithm used in blind key encryption is described in detail and also an explanation is provided as to how the encryption defeats hackers even after they could successfully compromise a ciphertext of the seed phrase along with its decryption key. Different scenarios of storing the ciphertexts are documented.
讨论了一种通过盲密钥加密对加密货币钱包种子短语进行数字保护的加密方法,其中生成两个本质上随机的盲密钥并用于生成两个密文。详细描述了盲密钥加密中使用的数学算法,并解释了加密如何在黑客成功地泄露种子短语的密文及其解密密钥后击败黑客。本文记录了存储密文的不同场景。
{"title":"Securing Cryptocurrency Wallet Seed Phrase Digitally with Blind Key Encryption","authors":"Cheman Shaik","doi":"10.5121/IJCIS.2020.10401","DOIUrl":"https://doi.org/10.5121/IJCIS.2020.10401","url":null,"abstract":"A cryptographic method of digitally securing cryptocurrency wallet seed phrase through Blind Key Encryption is discussed wherein two blind keys random in nature are generated and used to produce two ciphertexts. The mathematical algorithm used in blind key encryption is described in detail and also an explanation is provided as to how the encryption defeats hackers even after they could successfully compromise a ciphertext of the seed phrase along with its decryption key. Different scenarios of storing the ciphertexts are documented.","PeriodicalId":225810,"journal":{"name":"International Journal on Cryptography and Information Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121463992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A DNA-based Privacy-preserving Scheme in Smart-grid 一种基于dna的智能电网隐私保护方案
Pub Date : 2019-09-30 DOI: 10.5121/ijcis.2019.9301
W. M. Abed
Smart grid utility provider collects consumers’ power consumption data for three main reasons: billing, analysis, and operation. Billing needs coarse-grained data where there are no, or minimal, privacy concerns. While analysis and operation needs fine-grained data which can highly explore consumers’ privacy. Hence, consumers might be reluctant to allow for operational metering to protect their privacy.This paper presents detail description of a reliable DNA-based privacy-preserving (DNAPP) scheme in smart grid. DNAPP assures robust authentication, confidentiality, message integrity, and nonrepudiation across the smart grid as well as assuring high consumers’ privacy. The scheme demonstrates many good security features, such as: high complexity of O(n!), light-weight, scalable, minimum overhead, no cryptography key exchange between the communicating parties as each of them can determine the key locally and independently. This scheme does not require any level of modifications to the existing smart grid infrastructure or smart meter. It only requires some software modifications.
智能电网公用事业提供商收集用户的电力消耗数据主要有三个原因:计费、分析和运行。计费需要粗粒度的数据,其中没有或只有很少的隐私问题。而分析和运营需要细粒度的数据,可以高度挖掘消费者的隐私。因此,消费者可能不愿意允许操作计量来保护他们的隐私。详细描述了一种基于dna的智能电网可靠隐私保护方案。DNAPP在整个智能电网中确保强大的身份验证、机密性、消息完整性和不可否认性,并确保消费者的高度隐私。该方案具有复杂度O(n!)高、重量轻、可扩展、开销小、通信双方可以在本地独立确定密钥而无需加密密钥交换等优点。该方案不需要对现有的智能电网基础设施或智能电表进行任何程度的修改。它只需要对软件进行一些修改。
{"title":"A DNA-based Privacy-preserving Scheme in Smart-grid","authors":"W. M. Abed","doi":"10.5121/ijcis.2019.9301","DOIUrl":"https://doi.org/10.5121/ijcis.2019.9301","url":null,"abstract":"Smart grid utility provider collects consumers’ power consumption data for three main reasons: billing, analysis, and operation. Billing needs coarse-grained data where there are no, or minimal, privacy concerns. While analysis and operation needs fine-grained data which can highly explore consumers’ privacy. Hence, consumers might be reluctant to allow for operational metering to protect their privacy.This paper presents detail description of a reliable DNA-based privacy-preserving (DNAPP) scheme in smart grid. DNAPP assures robust authentication, confidentiality, message integrity, and nonrepudiation across the smart grid as well as assuring high consumers’ privacy. The scheme demonstrates many good security features, such as: high complexity of O(n!), light-weight, scalable, minimum overhead, no cryptography key exchange between the communicating parties as each of them can determine the key locally and independently. This scheme does not require any level of modifications to the existing smart grid infrastructure or smart meter. It only requires some software modifications.","PeriodicalId":225810,"journal":{"name":"International Journal on Cryptography and Information Security","volume":"11 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129215216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Privacy Preserving User Authentication Scheme Based on Smart Card 基于智能卡的隐私保护用户认证方案
Pub Date : 2018-09-30 DOI: 10.5121/ijcis.2018.8302
Beaton Kapito, Patrick Ali, L. Eneya, Hyunsung Kim
One of the most commonly used user authentication mechanisms is two factor authentication based on smart card and password. The core feature of the scheme is to enforce that the user must have the smart card and know the password in order to gain access to server. Recently, Liu et al. proposed a smart card based password authentication scheme and argued that it is secure against insider attack, replay attack and man in the middle attack and provides perfect forward secrecy. In this paper, we show security weaknesses in Liu et al.’s scheme focused on off-line password guessing attack and masquerading attack and it does not provide perfect forward secrecy and anonymity. Accordingly, we propose a privacy preserving user authentication scheme based on smart card, denoted as PUAS, to remedy these security weaknesses and to provide anonymity and perfect forward secrecy. PUAS is more secure with a bit of computational overhead to support several positive properties in security and privacy.
最常用的用户身份验证机制之一是基于智能卡和密码的双因素身份验证。该方案的核心特征是强制用户必须拥有智能卡并知道密码才能访问服务器。最近,Liu等人提出了一种基于智能卡的密码认证方案,认为该方案对内部攻击、重放攻击和中间人攻击具有安全性,并提供了完美的前向保密。本文指出Liu等人的方案存在安全缺陷,主要集中在离线密码猜测攻击和伪装攻击,并且该方案不能提供完美的前向保密和匿名性。因此,我们提出了一种基于智能卡的隐私保护用户认证方案,称为PUAS,以弥补这些安全漏洞,并提供匿名性和完善的前向保密。PUAS更安全,但需要一些计算开销来支持安全和隐私方面的几个积极属性。
{"title":"Privacy Preserving User Authentication Scheme Based on Smart Card","authors":"Beaton Kapito, Patrick Ali, L. Eneya, Hyunsung Kim","doi":"10.5121/ijcis.2018.8302","DOIUrl":"https://doi.org/10.5121/ijcis.2018.8302","url":null,"abstract":"One of the most commonly used user authentication mechanisms is two factor authentication based on smart card and password. The core feature of the scheme is to enforce that the user must have the smart card and know the password in order to gain access to server. Recently, Liu et al. proposed a smart card based password authentication scheme and argued that it is secure against insider attack, replay attack and man in the middle attack and provides perfect forward secrecy. In this paper, we show security weaknesses in Liu et al.’s scheme focused on off-line password guessing attack and masquerading attack and it does not provide perfect forward secrecy and anonymity. Accordingly, we propose a privacy preserving user authentication scheme based on smart card, denoted as PUAS, to remedy these security weaknesses and to provide anonymity and perfect forward secrecy. PUAS is more secure with a bit of computational overhead to support several positive properties in security and privacy.","PeriodicalId":225810,"journal":{"name":"International Journal on Cryptography and Information Security","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125073234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
International Journal on Cryptography and Information Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1