首页 > 最新文献

Int. J. Appl. Cryptogr.最新文献

英文 中文
Dynamic attribute-based signcryption without random oracles 动态的基于属性的签名加密,没有随机的预言
Pub Date : 2012-02-01 DOI: 10.1504/IJACT.2012.045589
K. Emura, A. Miyaji, Mohammad Shahriar Rahman
In SCN2010, Gagne, Narayan, and Safavi-Naini proposed attribute-based signcryption (ABSC) with threshold structure. As in ciphertext-policy attribute-based encryption (CP-ABE), an encryptor can specify the access structure of decryptors, and as in attribute-based signature (ABS), each decryptor can verify the encryptor's attributes. In contrast to the access structure of decryptors, the access structure of the encryptor needs to be fixed in the setup phase. In this paper, we propose ABSC with dynamic property, where access structures of encryptor can be updated flexibly without re-issuing secret keys of users. We call this primitive dynamic attribute-based signcryption (DABSC). Our DABSC scheme is secure in the standard model under the decision bilinear Diffie-Hellman assumption and the computational Diffie-Hellman assumption.
Gagne, Narayan和Safavi-Naini在SCN2010中提出了基于阈值结构的属性签名加密(ABSC)。与密文策略基于属性的加密(CP-ABE)一样,加密方可以指定解密方的访问结构;与基于属性的签名(ABS)一样,每个解密方都可以验证加密方的属性。与解密器的访问结构相反,加密器的访问结构需要在设置阶段固定。本文提出了一种具有动态特性的ABSC,可以灵活地更新加密器的访问结构,而无需重新颁发用户的密钥。我们称之为原始动态基于属性的签名加密(DABSC)。在决策双线性Diffie-Hellman假设和计算型Diffie-Hellman假设下,我们的DABSC方案在标准模型下是安全的。
{"title":"Dynamic attribute-based signcryption without random oracles","authors":"K. Emura, A. Miyaji, Mohammad Shahriar Rahman","doi":"10.1504/IJACT.2012.045589","DOIUrl":"https://doi.org/10.1504/IJACT.2012.045589","url":null,"abstract":"In SCN2010, Gagne, Narayan, and Safavi-Naini proposed attribute-based signcryption (ABSC) with threshold structure. As in ciphertext-policy attribute-based encryption (CP-ABE), an encryptor can specify the access structure of decryptors, and as in attribute-based signature (ABS), each decryptor can verify the encryptor's attributes. In contrast to the access structure of decryptors, the access structure of the encryptor needs to be fixed in the setup phase. In this paper, we propose ABSC with dynamic property, where access structures of encryptor can be updated flexibly without re-issuing secret keys of users. We call this primitive dynamic attribute-based signcryption (DABSC). Our DABSC scheme is secure in the standard model under the decision bilinear Diffie-Hellman assumption and the computational Diffie-Hellman assumption.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122011687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Attribute-based encryption without key cloning 不克隆密钥的基于属性的加密
Pub Date : 2012-02-01 DOI: 10.1504/IJACT.2012.045587
M. Hinek, Shaoquan Jiang, R. Safavi-Naini, S. F. Shahandashti
In this work, we consider the problem of key cloning in attribute-based encryption schemes. We introduce a new type of attribute-based encryption scheme, called token-based attribute-based encryption (tk-ABE) that provides strong deterrence for key cloning, in the sense that delegation of keys reveals some personal information about the user. It also has the feature that a misbehaving user can be easily revoked. We formalise the security requirements for such a scheme in terms of indistinguishability of the ciphertexts and two new security requirements which we call uncloneability and privacy-preserving. We construct a privacy-preserving uncloneable token-based attribute-based encryption scheme based on Cheung and Newport's ciphertext-policy attribute-based encryption scheme and prove the scheme satisfies the above three security requirements. We also introduce the notion of non-interactive uncloneable attribute-based encryption in order to remove the online token server in the tk-ABE. We then construct such a new scheme with provable security. It should be pointed out that, although our non-interactive scheme is token-free, the scheme does not have the capability to easily revoke users from the scheme. Hence, both types of schemes have their own merits of existence.
在这项工作中,我们考虑了基于属性的加密方案中的密钥克隆问题。我们引入了一种新的基于属性的加密方案,称为基于令牌的基于属性的加密(tk-ABE),它为密钥克隆提供了强大的威慑,因为密钥的授权会泄露用户的一些个人信息。它还具有行为不端的用户可以很容易被撤销的功能。我们根据密文的不可区分性和两个我们称为不可克隆性和隐私保护的新安全要求形式化了这种方案的安全要求。我们在Cheung和Newport的密文-策略属性加密方案的基础上构造了一个保密性不可克隆的基于令牌的属性加密方案,并证明了该方案满足上述三个安全要求。我们还引入了基于属性的非交互式不可克隆加密的概念,以便在tk-ABE中删除在线令牌服务器。然后构造了一个具有可证明安全性的新方案。需要指出的是,尽管我们的非交互式方案是无令牌的,但该方案不具有轻松从方案中撤销用户的能力。因此,这两种方案都有其存在的优点。
{"title":"Attribute-based encryption without key cloning","authors":"M. Hinek, Shaoquan Jiang, R. Safavi-Naini, S. F. Shahandashti","doi":"10.1504/IJACT.2012.045587","DOIUrl":"https://doi.org/10.1504/IJACT.2012.045587","url":null,"abstract":"In this work, we consider the problem of key cloning in attribute-based encryption schemes. We introduce a new type of attribute-based encryption scheme, called token-based attribute-based encryption (tk-ABE) that provides strong deterrence for key cloning, in the sense that delegation of keys reveals some personal information about the user. It also has the feature that a misbehaving user can be easily revoked. We formalise the security requirements for such a scheme in terms of indistinguishability of the ciphertexts and two new security requirements which we call uncloneability and privacy-preserving. We construct a privacy-preserving uncloneable token-based attribute-based encryption scheme based on Cheung and Newport's ciphertext-policy attribute-based encryption scheme and prove the scheme satisfies the above three security requirements. We also introduce the notion of non-interactive uncloneable attribute-based encryption in order to remove the online token server in the tk-ABE. We then construct such a new scheme with provable security. It should be pointed out that, although our non-interactive scheme is token-free, the scheme does not have the capability to easily revoke users from the scheme. Hence, both types of schemes have their own merits of existence.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"100 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116652247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Solving a 112-bit prime elliptic curve discrete logarithm problem on game consoles using sloppy reduction 用草率约简在游戏机上求解一个112位素数椭圆曲线离散对数问题
Pub Date : 2012-02-01 DOI: 10.1504/IJACT.2012.045590
Joppe W. Bos, Marcelo E. Kaihara, T. Kleinjung, A. Lenstra, P. L. Montgomery
We describe a cell processor implementation of Pollard's rho method to solve discrete logarithms in groups of elliptic curves over prime fields. The implementation was used on a cluster of PlayStation 3 game consoles to set a new record. We present in detail the underlying single instruction multiple data modular arithmetic.
我们描述了一种用波拉德方法求解素数域上椭圆曲线群中的离散对数的元处理器实现。该实现在PlayStation 3游戏控制台集群上使用,创造了一个新记录。详细介绍了底层的单指令多数据模块化算法。
{"title":"Solving a 112-bit prime elliptic curve discrete logarithm problem on game consoles using sloppy reduction","authors":"Joppe W. Bos, Marcelo E. Kaihara, T. Kleinjung, A. Lenstra, P. L. Montgomery","doi":"10.1504/IJACT.2012.045590","DOIUrl":"https://doi.org/10.1504/IJACT.2012.045590","url":null,"abstract":"We describe a cell processor implementation of Pollard's rho method to solve discrete logarithms in groups of elliptic curves over prime fields. The implementation was used on a cluster of PlayStation 3 game consoles to set a new record. We present in detail the underlying single instruction multiple data modular arithmetic.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121886820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 73
On the security of the Winternitz one-time signature scheme 论Winternitz一次性签名方案的安全性
Pub Date : 2011-07-05 DOI: 10.1504/IJACT.2013.053435
J. Buchmann, Erik Dahmen, S. Ereth, Andreas Hülsing, M. Rückert
We show that the Winternitz one-time signature scheme is existentially unforgeable under adaptive chosen message attacks when instantiated with a family of pseudorandom functions. Our result halves the signature size at the same security level, compared to previous results, which require a collision resistant hash function. We also consider security in the strong sense and show that the Winternitz one-time signature scheme is strongly unforgeable assuming additional properties of the pseudorandom function family. In this context we formally define several key-based security notions for function families and investigate their relation to pseudorandomness. All our reductions are exact and in the standard model and can directly be used to estimate the output length of the hash function required to meet a certain security level.
我们证明了当使用一组伪随机函数实例化时,Winternitz一次性签名方案在自适应选择消息攻击下是存在不可伪造的。与之前的结果相比,我们的结果在相同安全级别下将签名大小减半,这需要一个抗碰撞哈希函数。我们还考虑了强意义上的安全性,并证明了假定伪随机函数族的附加性质,Winternitz一次性签名方案是强不可伪造的。在这种情况下,我们正式定义了函数族的几个基于密钥的安全概念,并研究了它们与伪随机性的关系。我们所有的约简都是精确的,并且在标准模型中,可以直接用于估计满足一定安全级别所需的哈希函数的输出长度。
{"title":"On the security of the Winternitz one-time signature scheme","authors":"J. Buchmann, Erik Dahmen, S. Ereth, Andreas Hülsing, M. Rückert","doi":"10.1504/IJACT.2013.053435","DOIUrl":"https://doi.org/10.1504/IJACT.2013.053435","url":null,"abstract":"We show that the Winternitz one-time signature scheme is existentially unforgeable under adaptive chosen message attacks when instantiated with a family of pseudorandom functions. Our result halves the signature size at the same security level, compared to previous results, which require a collision resistant hash function. We also consider security in the strong sense and show that the Winternitz one-time signature scheme is strongly unforgeable assuming additional properties of the pseudorandom function family. In this context we formally define several key-based security notions for function families and investigate their relation to pseudorandomness. All our reductions are exact and in the standard model and can directly be used to estimate the output length of the hash function required to meet a certain security level.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122188695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 123
Notions for RSA integers RSA整数的概念
Pub Date : 2011-04-21 DOI: 10.1504/IJACT.2014.062723
Daniel Loebenberger, Michael Nüsken
The key-generation algorithm for the RSA cryptosystem is specified in several standards, such as PKCS#1, IEEE 1363-2000, FIPS 186-3, ANSI X9.44, or ISO/IEC 18033-2. All of them substantially differ in their requirements. This indicates that for computing a 'secure' RSA modulus it does not matter how exactly one generates RSA integers. In this work, we show that this is indeed the case to a large extent. First, we give a theoretical framework that enables us to easily compute the entropy of the output distribution of the considered standards and show that it is comparatively high. To do so, we compute for each standard the number of integers they define up to an error of very small order and discuss different methods of generating integers of a specific form. Second, we show that factoring such integers is hard, provided factoring a product of two primes of similar size is hard.
RSA密码系统的密钥生成算法在几个标准中指定,例如pkcs# 1、IEEE 1363-2000、FIPS 183 -3、ANSI X9.44或ISO/IEC 18033-2。它们在要求上都有很大的不同。这表明,对于计算“安全”RSA模数,如何精确地生成RSA整数并不重要。在这项工作中,我们表明在很大程度上确实如此。首先,我们给出了一个理论框架,使我们能够轻松地计算所考虑的标准的输出分布的熵,并表明它相对较高。为此,我们为每个标准计算它们定义的整数的数量,直至误差非常小的顺序,并讨论生成特定形式整数的不同方法。其次,我们证明分解这样的整数是困难的,假设分解两个大小相似的素数的乘积是困难的。
{"title":"Notions for RSA integers","authors":"Daniel Loebenberger, Michael Nüsken","doi":"10.1504/IJACT.2014.062723","DOIUrl":"https://doi.org/10.1504/IJACT.2014.062723","url":null,"abstract":"The key-generation algorithm for the RSA cryptosystem is specified in several standards, such as PKCS#1, IEEE 1363-2000, FIPS 186-3, ANSI X9.44, or ISO/IEC 18033-2. All of them substantially differ in their requirements. This indicates that for computing a 'secure' RSA modulus it does not matter how exactly one generates RSA integers. In this work, we show that this is indeed the case to a large extent. First, we give a theoretical framework that enables us to easily compute the entropy of the output distribution of the considered standards and show that it is comparatively high. To do so, we compute for each standard the number of integers they define up to an error of very small order and discuss different methods of generating integers of a specific form. Second, we show that factoring such integers is hard, provided factoring a product of two primes of similar size is hard.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128065680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Designing attacks on SIP call set-up 设计对SIP呼叫设置的攻击
Pub Date : 2010-07-01 DOI: 10.1504/IJACT.2010.033795
A. M. Hagalisletto, Lars Strand
Many protocols running over the internet are neither formalised, nor formally analysed. The amount of documentation for telecommunication protocols used in real-life applications is huge, while the available analysis methods and tools require precise and clear-cut protocol clauses. A manual formalisation of the Session Initiation Protocol (SIP) used in Voice over IP (VoIP) applications is not feasible. Therefore, by combining the information retrieved from the specification documents published by the IETF and traces of real-world SIP traffic, we craft a formal specification of the protocol in addition to an implementation of the protocol. In the course of our work we detected several weaknesses, both of SIP call set-up and in the Asterisk implementation of the protocol. These weaknesses could be exploited and pose as a threat for authentication and non-repudiation of VoIP calls.
互联网上运行的许多协议既没有形式化,也没有正式分析。在实际应用中使用的电信协议的文档数量是巨大的,而可用的分析方法和工具需要精确和明确的协议条款。在IP语音(VoIP)应用程序中使用的会话发起协议(SIP)的手动形式化是不可行的。因此,通过结合从IETF发布的规范文档中检索到的信息和真实SIP流量的跟踪,除了协议的实现之外,我们还制定了协议的正式规范。在我们的工作过程中,我们发现了几个弱点,包括SIP呼叫设置和协议的Asterisk实现。这些弱点可能被利用,并对VoIP呼叫的身份验证和不可否认性构成威胁。
{"title":"Designing attacks on SIP call set-up","authors":"A. M. Hagalisletto, Lars Strand","doi":"10.1504/IJACT.2010.033795","DOIUrl":"https://doi.org/10.1504/IJACT.2010.033795","url":null,"abstract":"Many protocols running over the internet are neither formalised, nor formally analysed. The amount of documentation for telecommunication protocols used in real-life applications is huge, while the available analysis methods and tools require precise and clear-cut protocol clauses. A manual formalisation of the Session Initiation Protocol (SIP) used in Voice over IP (VoIP) applications is not feasible. Therefore, by combining the information retrieved from the specification documents published by the IETF and traces of real-world SIP traffic, we craft a formal specification of the protocol in addition to an implementation of the protocol. In the course of our work we detected several weaknesses, both of SIP call set-up and in the Asterisk implementation of the protocol. These weaknesses could be exploited and pose as a threat for authentication and non-repudiation of VoIP calls.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134539382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Some results on cryptanalysis of SMS4 block cipher SMS4分组密码分析的一些结果
Pub Date : 2010-07-01 DOI: 10.1504/IJACT.2010.033799
Wentao Zhang, Bozhan Su, Wenling Wu, D. Feng
SMS4 is a 128-bit block cipher used in the WAPI standard in wireless networks in China. The cipher has attracted much attention in the past several years. This paper consists of two parts. The first part is on the design of the linear diffusion layer L of SMS4. Some observations on L are present, which open out the design rationales of L and such class functions to a great extent. The second part is on the differential attack against SMS4. An effective 19-round differential characteristic is presented. Then, a simple differential attack on 23-round SMS4 is given, which is the best known attack on SMS4 so far.
SMS4是中国无线网络WAPI标准中使用的128位分组密码。在过去的几年里,这个密码引起了很多关注。本文由两部分组成。第一部分是SMS4的线性扩散层L的设计。对L的一些观察,在很大程度上揭示了L和此类类函数的设计原理。第二部分是针对SMS4的差分攻击。提出了一种有效的19轮差分特性。然后,给出了一种针对23轮SMS4的简单差分攻击,这是迄今为止最著名的针对SMS4的攻击。
{"title":"Some results on cryptanalysis of SMS4 block cipher","authors":"Wentao Zhang, Bozhan Su, Wenling Wu, D. Feng","doi":"10.1504/IJACT.2010.033799","DOIUrl":"https://doi.org/10.1504/IJACT.2010.033799","url":null,"abstract":"SMS4 is a 128-bit block cipher used in the WAPI standard in wireless networks in China. The cipher has attracted much attention in the past several years. This paper consists of two parts. The first part is on the design of the linear diffusion layer L of SMS4. Some observations on L are present, which open out the design rationales of L and such class functions to a great extent. The second part is on the differential attack against SMS4. An effective 19-round differential characteristic is presented. Then, a simple differential attack on 23-round SMS4 is given, which is the best known attack on SMS4 so far.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132130330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
TWISTERpi - a framework for secure and fast hash functions TWISTERpi -一个安全、快速的哈希函数框架
Pub Date : 2010-07-01 DOI: 10.1504/IJACT.2010.033800
E. Fleischmann, C. Forler, M. Gorski, S. Lucks
In this paper we present TWISTER π, a framework for hash functions. It is an improved version of TWISTER, a candidate of the NIST SHA-3 hash function competition. TWISTER π is built upon the ideas of wide pipe and sponge functions. The core of this framework is a – very easy to analyse – Twister-Round providing both extremely fast diffusion as well as collision-freeness for one internal Twister-Round. The total security level is claimed to be not below 2 n/2 for collision attacks and 2 n for (2nd) pre-image attacks. TWISTER π instantiations are secure against all known generic attacks. We also propose two instances TWISTER π-n for hash output sizes n = 256 and n = 512. These instantiations are highly optimised for 64-bit architectures and run very fast in hardware and software, e.g TWISTER π-256 is faster than SHA2-256 on 64-bit platforms and TWISTER π-512 is faster than SHA2-512 on 32-bit platforms. Furthermore, TWISTER π scales very well on low-end platforms.
本文给出了一个关于散列函数的框架TWISTER π。它是TWISTER的改进版本,TWISTER是NIST SHA-3哈希函数竞赛的候选函数。TWISTER π是建立在宽管和海绵功能的基础上的。这个框架的核心是一个非常容易分析的Twister-Round,它为一个内部的Twister-Round提供了极快的扩散和无碰撞。对于碰撞攻击,总安全级别不低于2n /2,对于(第二次)预图像攻击,总安全级别不低于2n。TWISTER π实例化对所有已知的通用攻击都是安全的。对于输出大小分别为n = 256和n = 512的哈希,我们还提出了两个实例TWISTER π-n。这些实例化对64位架构进行了高度优化,并且在硬件和软件上运行速度非常快,例如TWISTER π-256在64位平台上比SHA2-256快,TWISTER π-512在32位平台上比SHA2-512快。此外,TWISTER π在低端平台上可以很好地扩展。
{"title":"TWISTERpi - a framework for secure and fast hash functions","authors":"E. Fleischmann, C. Forler, M. Gorski, S. Lucks","doi":"10.1504/IJACT.2010.033800","DOIUrl":"https://doi.org/10.1504/IJACT.2010.033800","url":null,"abstract":"In this paper we present TWISTER π, a framework for hash functions. It is an improved version of TWISTER, a candidate of the NIST SHA-3 hash function competition. TWISTER π is built upon the ideas of wide pipe and sponge functions. The core of this framework is a – very easy to analyse – Twister-Round providing both extremely fast diffusion as well as collision-freeness for one internal Twister-Round. The total security level is claimed to be not below 2 n/2 for collision attacks and 2 n for (2nd) pre-image attacks. TWISTER π instantiations are secure against all known generic attacks. We also propose two instances TWISTER π-n for hash output sizes n = 256 and n = 512. These instantiations are highly optimised for 64-bit architectures and run very fast in hardware and software, e.g TWISTER π-256 is faster than SHA2-256 on 64-bit platforms and TWISTER π-512 is faster than SHA2-512 on 32-bit platforms. Furthermore, TWISTER π scales very well on low-end platforms.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"193 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127560502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Achieving high security and efficiency in RFID-tagged supply chains 实现rfid标签供应链的高安全性和高效性
Pub Date : 2010-07-01 DOI: 10.1504/IJACT.2010.033794
Shaoying Cai, Yingjiu Li, Tieyan Li, R. Deng, Haixia Yao
While RFID technology has greatly facilitated visible supply chain management, designing a secure and efficient RFID-tagged supply chain system is still a challenge. To achieve high security and efficiency at the same time, we categorise RFID-tagged supply chain environments in two security levels and design an RFID-tagged supply chain system accordingly. In the relatively secure environment, our system is set to the weak security mode, and the tagged products can be processed in a highly efficient manner. While in the less secure environment, our system is tuned into the strong security mode so as to maintain a high level of security with its efficiency lower than that in the weak security mode. A set of RFID protocols are designed to enable the duel security modes.
虽然RFID技术极大地促进了可见供应链管理,但设计一个安全高效的RFID标签供应链系统仍然是一个挑战。为了同时实现高安全性和高效率,我们将rfid标签供应链环境分为两个安全级别,并相应地设计了rfid标签供应链系统。在相对安全的环境下,我们的系统设置为弱安全模式,可以高效地处理标签产品。而在不太安全的环境下,我们的系统调到强安全模式,以保持较高的安全水平,其效率低于弱安全模式。设计了一套RFID协议来实现双重安全模式。
{"title":"Achieving high security and efficiency in RFID-tagged supply chains","authors":"Shaoying Cai, Yingjiu Li, Tieyan Li, R. Deng, Haixia Yao","doi":"10.1504/IJACT.2010.033794","DOIUrl":"https://doi.org/10.1504/IJACT.2010.033794","url":null,"abstract":"While RFID technology has greatly facilitated visible supply chain management, designing a secure and efficient RFID-tagged supply chain system is still a challenge. To achieve high security and efficiency at the same time, we categorise RFID-tagged supply chain environments in two security levels and design an RFID-tagged supply chain system accordingly. In the relatively secure environment, our system is set to the weak security mode, and the tagged products can be processed in a highly efficient manner. While in the less secure environment, our system is tuned into the strong security mode so as to maintain a high level of security with its efficiency lower than that in the weak security mode. A set of RFID protocols are designed to enable the duel security modes.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122832178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A five-round algebraic property of AES and its application to the ALPHA-MAC AES的五轮代数性质及其在ALPHA-MAC中的应用
Pub Date : 2009-08-01 DOI: 10.1504/IJACT.2009.028027
Jianyong Huang, J. Seberry, W. Susilo
We present a five-round algebraic property of the advanced encryption standard (AES), and we show that this algebraic property can be used to analyse the internal structure of ALPHA-MAC whose underlying block cipher is AES. In the proposed property, we modify 20 bytes from five intermediate values at some fixed locations in five consecutive rounds, and we show that after five rounds of operations, such modifications do not change the intermediate result and finally, still produce the same ciphertext. By employing the proposed five-round algebraic property of AES, we provide a method to find second preimages of the ALPHA-MAC based on the assumption that a key or an intermediate value is known. We also show that our idea can also be used to find internal collisions of the ALPHA-MAC under the same assumption.
我们给出了高级加密标准(AES)的一个五轮代数性质,并证明了该代数性质可用于分析底层分组密码为AES的ALPHA-MAC的内部结构。在提议的性质中,我们连续五轮修改了固定位置的五个中间值的20个字节,并且我们证明了经过五轮操作后,这种修改不会改变中间结果,最终仍然产生相同的密文。通过使用AES的五轮代数特性,我们提供了一种基于已知密钥或中间值的假设来查找ALPHA-MAC的第二个预像的方法。我们还表明,在相同的假设下,我们的想法也可以用于寻找ALPHA-MAC的内部碰撞。
{"title":"A five-round algebraic property of AES and its application to the ALPHA-MAC","authors":"Jianyong Huang, J. Seberry, W. Susilo","doi":"10.1504/IJACT.2009.028027","DOIUrl":"https://doi.org/10.1504/IJACT.2009.028027","url":null,"abstract":"We present a five-round algebraic property of the advanced encryption standard (AES), and we show that this algebraic property can be used to analyse the internal structure of ALPHA-MAC whose underlying block cipher is AES. In the proposed property, we modify 20 bytes from five intermediate values at some fixed locations in five consecutive rounds, and we show that after five rounds of operations, such modifications do not change the intermediate result and finally, still produce the same ciphertext. By employing the proposed five-round algebraic property of AES, we provide a method to find second preimages of the ALPHA-MAC based on the assumption that a key or an intermediate value is known. We also show that our idea can also be used to find internal collisions of the ALPHA-MAC under the same assumption.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133149978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Int. J. Appl. Cryptogr.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1