首页 > 最新文献

Cryptography最新文献

英文 中文
Locking-Enabled Security Analysis of Cryptographic Circuits 加密电路的锁定安全分析
IF 1.6 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-05 DOI: 10.3390/cryptography8010002
Devanshi Upadhyaya, Mael Gay, Ilia Polian
Hardware implementations of cryptographic primitives require protection against physical attacks and supply chain threats. This raises the question of secure composability of different attack countermeasures, i.e., whether protecting a circuit against one threat can make it more vulnerable against a different threat. In this article, we study the consequences of applying logic locking, a popular design-for-trust solution against intellectual property piracy and overproduction, to cryptographic circuits. We show that the ability to unlock the circuit incorrectly gives the adversary new powerful attack options. We introduce LEDFA (locking-enabled differential fault analysis) and demonstrate for several ciphers and families of locking schemes that fault attacks become possible (or consistently easier) for incorrectly unlocked circuits. In several cases, logic locking has made circuit implementations prone to classical algebraic attacks with no fault injection needed altogether. We refer to this “zero-fault” version of LEDFA by the term LEDA, investigate its success factors in-depth and propose a countermeasure to protect the logic-locked implementations against LEDA. We also perform test vector leakage assessment (TVLA) of incorrectly unlocked AES implementations to show the effects of logic locking regarding side-channel leakage. Our results indicate that logic locking is not safe to use in cryptographic circuits, making them less rather than more secure.
加密基元的硬件实现需要防范物理攻击和供应链威胁。这就提出了不同攻击对策的安全可组合性问题,即保护电路免受一种威胁是否会使其更容易受到另一种威胁的攻击。在本文中,我们研究了将逻辑锁定应用于加密电路的后果,逻辑锁定是一种流行的针对知识产权盗版和过度生产的信任设计解决方案。我们表明,错误解锁电路的能力为对手提供了新的强大攻击选择。我们介绍了 LEDFA(锁定启用差分故障分析),并针对几种密码和锁定方案系列证明了故障攻击在错误解锁的电路中变得可能(或始终更容易)。在一些情况下,逻辑锁定使得电路实现容易受到经典代数攻击,而完全不需要故障注入。我们将这种 "零故障 "版 LEDFA 称为 LEDA,深入研究了其成功因素,并提出了保护逻辑锁定实现免受 LEDA 攻击的对策。我们还对错误解锁的 AES 实现进行了测试向量泄漏评估(TVLA),以显示逻辑锁定对侧信道泄漏的影响。我们的研究结果表明,在加密电路中使用逻辑锁定并不安全,会降低而不是提高电路的安全性。
{"title":"Locking-Enabled Security Analysis of Cryptographic Circuits","authors":"Devanshi Upadhyaya, Mael Gay, Ilia Polian","doi":"10.3390/cryptography8010002","DOIUrl":"https://doi.org/10.3390/cryptography8010002","url":null,"abstract":"Hardware implementations of cryptographic primitives require protection against physical attacks and supply chain threats. This raises the question of secure composability of different attack countermeasures, i.e., whether protecting a circuit against one threat can make it more vulnerable against a different threat. In this article, we study the consequences of applying logic locking, a popular design-for-trust solution against intellectual property piracy and overproduction, to cryptographic circuits. We show that the ability to unlock the circuit incorrectly gives the adversary new powerful attack options. We introduce LEDFA (locking-enabled differential fault analysis) and demonstrate for several ciphers and families of locking schemes that fault attacks become possible (or consistently easier) for incorrectly unlocked circuits. In several cases, logic locking has made circuit implementations prone to classical algebraic attacks with no fault injection needed altogether. We refer to this “zero-fault” version of LEDFA by the term LEDA, investigate its success factors in-depth and propose a countermeasure to protect the logic-locked implementations against LEDA. We also perform test vector leakage assessment (TVLA) of incorrectly unlocked AES implementations to show the effects of logic locking regarding side-channel leakage. Our results indicate that logic locking is not safe to use in cryptographic circuits, making them less rather than more secure.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":"18 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139383498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Residue Number System (RNS) and Power Distribution Network Topology-Based Mitigation of Power Side-Channel Attacks 基于余数系统 (RNS) 和配电网络拓扑的电力侧信道攻击缓解方案
IF 1.6 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-21 DOI: 10.3390/cryptography8010001
R. Selvam, Akhilesh Tyagi
Over the past decade, significant research has been performed on power side-channel mitigation techniques. Logic families based on secret sharing schemes, such as t-private logic, that serve to secure cryptographic implementations against power side-channel attacks represent one such countermeasure. These mitigation techniques are applicable at various design abstraction levels—algorithm, architecture, logic, physical, and gate levels. One research question is when can the two mitigation techniques from different design abstraction levels be employed together gainfully? We explore this notion of the orthogonality of two mitigation techniques with respect to the RNS secure logic, a logic level power side-channel mitigation technique, and power distribution network (PDN), with the decoupling capacitance, a mitigation technique at physical level. Machine learning (ML) algorithms are employed to measure the effectiveness of power side-channel attacks in terms of the success rate of the adversary. The RNS protected LED block cipher round function is implemented as the test circuit in both tree-style and grid-style PDN using the FreePDK 45 nm technology library. The results show that the success rate of an unsecured base design 68.96% for naive Bayes, 67.44% with linear discriminant analysis, 67.51% for quadratic discriminant analysis, and 66.58% for support vector machine. It is reduced to a success rate of 19.68% for naive Bayes, 19.62% with linear discriminant analysis, 19.10% for quadratic discriminant analysis, and 10.54% in support vector machine. Grid-type PDN shows a slightly better reduction in success rate compared to the tree-style PDN.
过去十年间,人们对功率侧信道缓解技术进行了大量研究。基于秘密共享方案的逻辑系列(如 t-private logic)就是其中的一种对策,它可确保加密实现免受功率侧信道攻击。这些缓解技术适用于不同的设计抽象层次--算法、架构、逻辑、物理和门级。一个研究问题是,什么时候可以将来自不同设计抽象层次的两种缓解技术有效地结合起来使用?我们针对 RNS 安全逻辑(一种逻辑级功率侧信道缓解技术)和功率分配网络 (PDN)(一种物理级去耦电容缓解技术),探讨了两种缓解技术的正交性概念。采用机器学习(ML)算法来衡量电源侧信道攻击的有效性,即对手的成功率。使用 FreePDK 45 nm 技术库在树型和网格型 PDN 中实现了受 RNS 保护的 LED 区块密码轮函数作为测试电路。结果表明,不安全基础设计的成功率为天真贝叶斯 68.96%、线性判别分析 67.44%、二次判别分析 67.51%、支持向量机 66.58%。天真贝叶斯的成功率为 19.68%,线性判别分析的成功率为 19.62%,二次判别分析的成功率为 19.10%,支持向量机的成功率为 10.54%。与树型 PDN 相比,网格型 PDN 在降低成功率方面略胜一筹。
{"title":"Residue Number System (RNS) and Power Distribution Network Topology-Based Mitigation of Power Side-Channel Attacks","authors":"R. Selvam, Akhilesh Tyagi","doi":"10.3390/cryptography8010001","DOIUrl":"https://doi.org/10.3390/cryptography8010001","url":null,"abstract":"Over the past decade, significant research has been performed on power side-channel mitigation techniques. Logic families based on secret sharing schemes, such as t-private logic, that serve to secure cryptographic implementations against power side-channel attacks represent one such countermeasure. These mitigation techniques are applicable at various design abstraction levels—algorithm, architecture, logic, physical, and gate levels. One research question is when can the two mitigation techniques from different design abstraction levels be employed together gainfully? We explore this notion of the orthogonality of two mitigation techniques with respect to the RNS secure logic, a logic level power side-channel mitigation technique, and power distribution network (PDN), with the decoupling capacitance, a mitigation technique at physical level. Machine learning (ML) algorithms are employed to measure the effectiveness of power side-channel attacks in terms of the success rate of the adversary. The RNS protected LED block cipher round function is implemented as the test circuit in both tree-style and grid-style PDN using the FreePDK 45 nm technology library. The results show that the success rate of an unsecured base design 68.96% for naive Bayes, 67.44% with linear discriminant analysis, 67.51% for quadratic discriminant analysis, and 66.58% for support vector machine. It is reduced to a success rate of 19.68% for naive Bayes, 19.62% with linear discriminant analysis, 19.10% for quadratic discriminant analysis, and 10.54% in support vector machine. Grid-type PDN shows a slightly better reduction in success rate compared to the tree-style PDN.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":"42 3","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138950009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Practical Certificate-Less Infrastructure with Application in TLS 应用于 TLS 的实用无证书基础设施
IF 1.6 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-14 DOI: 10.3390/cryptography7040063
Li Duan, Yong Li, Lijun Liao
We propose highly efficient certificate-less (CL) protocols for the infrastructure used by authenticated key exchange (AKE). The construction is based on elliptic curves (EC) without pairing, which means it can be easily supported by most industrial cryptography libraries on constrained devices. Compared with other pairing-free CL solutions, the new CL-AKE protocol enjoys the least number of scalar multiplications over EC groups. We use a unified game-based model to formalize the security of each protocol, while most previous works only assess the security against a list of attacks, provide informal theorems without proper modeling, or use separate models for protocols in different stages. We also present an efficient integration of the core protocols into the TLS cipher suites and a stand-alone implementation for constrained devices. The performance is evaluated on constrained devices in real-world settings, which further confirms the efficiency of our proposal.
我们为认证密钥交换(AKE)所使用的基础设施提出了高效的无证书(CL)协议。该协议的构建基于椭圆曲线(EC),无需配对,这意味着大多数工业密码学库都能在受限设备上轻松支持该协议。与其他无配对椭圆曲线解决方案相比,新的 CL-AKE 协议在椭圆曲线组上的标量乘法次数最少。我们使用统一的基于博弈的模型来形式化每个协议的安全性,而之前的大多数研究只评估了针对一系列攻击的安全性,提供了非正式的定理而没有适当的建模,或者针对不同阶段的协议使用了单独的模型。我们还介绍了将核心协议有效集成到 TLS 密码套件中的方法,以及针对受限设备的独立实现方法。我们在真实世界的受限设备上对其性能进行了评估,这进一步证实了我们建议的效率。
{"title":"Practical Certificate-Less Infrastructure with Application in TLS","authors":"Li Duan, Yong Li, Lijun Liao","doi":"10.3390/cryptography7040063","DOIUrl":"https://doi.org/10.3390/cryptography7040063","url":null,"abstract":"We propose highly efficient certificate-less (CL) protocols for the infrastructure used by authenticated key exchange (AKE). The construction is based on elliptic curves (EC) without pairing, which means it can be easily supported by most industrial cryptography libraries on constrained devices. Compared with other pairing-free CL solutions, the new CL-AKE protocol enjoys the least number of scalar multiplications over EC groups. We use a unified game-based model to formalize the security of each protocol, while most previous works only assess the security against a list of attacks, provide informal theorems without proper modeling, or use separate models for protocols in different stages. We also present an efficient integration of the core protocols into the TLS cipher suites and a stand-alone implementation for constrained devices. The performance is evaluated on constrained devices in real-world settings, which further confirms the efficiency of our proposal.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":"1 8","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138972137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Publicly Verifiable E-Voting System Based on Biometrics 基于生物识别技术的可公开验证的电子投票系统
IF 1.6 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-28 DOI: 10.3390/cryptography7040062
Jinhui Liu, Tianyi Han, Maolin Tan, Bo Tang, Wei Hu, Yong Yu
Voters use traditional paper ballots, a method limited by the factors of time and space, to ensure their voting rights are exercised; this method requires a lot of manpower and resources. Duplicate voting problems may also occur, meaning the transparency and reliability of the voting results cannot be guaranteed. With the rapid developments in science and technology, E-voting system technology is being adopted more frequently in election activities. However, E-voting systems still cannot address the verifiability of the election process; the results of a given election and the credibility of the host organization will be questioned if the election’s verifiability cannot be ensured. Elections may also pose a series of problems related to privacy, security, and so on. To address these issues, this paper presents a public, and verifiable E-voting system with hidden statistics; this system is based on commitment, zk-SNARKs, and machine learning. The system can deal with a large number of candidates, complex voting methods, and result functions in counting both hidden and public votes and can satisfy the requirements of verifiability, privacy, security, and intelligence. Our security analysis shows that our scheme achieves privacy, hidden vote counting and verifiability. Our performance evaluation demonstrates that our system has reasonable applications in real scenarios.
选民使用传统的纸质选票,这种方法受时间和空间因素的限制,无法确保他们行使投票权;这种方法需要大量的人力和物力。此外,还可能出现重复投票的问题,这意味着投票结果的透明度和可靠性无法得到保证。随着科学技术的飞速发展,电子投票系统技术在选举活动中的应用越来越广泛。然而,电子投票系统仍然无法解决选举过程的可验证性问题;如果选举的可验证性无法得到保证,选举结果和主办组织的公信力都将受到质疑。选举还可能带来一系列与隐私、安全等相关的问题。为了解决这些问题,本文提出了一种具有隐藏统计功能的公开、可验证的电子投票系统;该系统基于承诺、zk-SNARKs 和机器学习。该系统可以处理大量的候选人、复杂的投票方法以及统计隐藏和公开票数的结果函数,并能满足可验证性、隐私性、安全性和智能性的要求。我们的安全分析表明,我们的方案实现了隐私、隐藏计票和可验证性。我们的性能评估表明,我们的系统在实际场景中有合理的应用。
{"title":"A Publicly Verifiable E-Voting System Based on Biometrics","authors":"Jinhui Liu, Tianyi Han, Maolin Tan, Bo Tang, Wei Hu, Yong Yu","doi":"10.3390/cryptography7040062","DOIUrl":"https://doi.org/10.3390/cryptography7040062","url":null,"abstract":"Voters use traditional paper ballots, a method limited by the factors of time and space, to ensure their voting rights are exercised; this method requires a lot of manpower and resources. Duplicate voting problems may also occur, meaning the transparency and reliability of the voting results cannot be guaranteed. With the rapid developments in science and technology, E-voting system technology is being adopted more frequently in election activities. However, E-voting systems still cannot address the verifiability of the election process; the results of a given election and the credibility of the host organization will be questioned if the election’s verifiability cannot be ensured. Elections may also pose a series of problems related to privacy, security, and so on. To address these issues, this paper presents a public, and verifiable E-voting system with hidden statistics; this system is based on commitment, zk-SNARKs, and machine learning. The system can deal with a large number of candidates, complex voting methods, and result functions in counting both hidden and public votes and can satisfy the requirements of verifiability, privacy, security, and intelligence. Our security analysis shows that our scheme achieves privacy, hidden vote counting and verifiability. Our performance evaluation demonstrates that our system has reasonable applications in real scenarios.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":"8 11 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139220718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Garbled Circuits Reimagined: Logic Synthesis Unleashes Efficient Secure Computation 重塑乱码电路:逻辑合成带来高效安全计算
IF 1.6 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-23 DOI: 10.3390/cryptography7040061
Mingfei Yu, Dewmini Sudara Marakkalage, Giovanni De Micheli
Garbled circuit (GC) is one of the few promising protocols to realize general-purpose secure computation. The target computation is represented by a Boolean circuit that is subsequently transformed into a network of encrypted tables for execution. The need for distributing GCs among parties, however, requires excessive data communication, called garbling cost, which bottlenecks system performance. Due to the zero garbling cost of XOR operations, existing works reduce garbling cost by representing the target computation as the XOR-AND graph (XAG) with minimal structural multiplicative complexity (MC). Starting with a thorough study of the cipher-text efficiency of different types of logic primitives, for the first time, we propose XOR-OneHot graph (X1G) as a suitable logic representation for the generation of low-cost GCs. Our contribution includes (a) an exact algorithm to synthesize garbling-cost-optimal X1G implementations for small-scale functions and (b) a set of logic optimization algorithms customized for X1Gs, which together form a robust optimization flow that delivers high-quality X1Gs for practical functions. The effectiveness of the proposals is evidenced by comprehensive evaluations: compared with the state of the art, 7.34%, 26.14%, 13.51%, and 4.34% reductions in garbling costs are achieved on average for the involved benchmark suites, respectively, with reasonable runtime overheads.
加码电路(GC)是实现通用安全计算的少数几个有前途的协议之一。目标计算由布尔电路表示,随后转换成加密表网络执行。然而,在各方之间分配 GC 需要过多的数据通信,即所谓的乱码成本,这会使系统性能受限。由于 XOR 运算的乱码成本为零,现有研究通过将目标计算表示为结构乘法复杂度(MC)最小的 XOR-AND 图(XAG)来降低乱码成本。从深入研究不同类型逻辑基元的密码文本效率开始,我们首次提出了 XOR-OneHot 图(X1G)作为生成低成本 GC 的合适逻辑表示法。我们的贡献包括:(a)为小规模函数合成乱码成本最优的 X1G 实现的精确算法;(b)为 X1G 定制的一套逻辑优化算法,它们共同构成了一个稳健的优化流程,可为实际函数提供高质量的 X1G。综合评估证明了这些建议的有效性:与现有技术相比,在运行时间开销合理的情况下,相关基准套件的乱码成本分别平均降低了 7.34%、26.14%、13.51% 和 4.34%。
{"title":"Garbled Circuits Reimagined: Logic Synthesis Unleashes Efficient Secure Computation","authors":"Mingfei Yu, Dewmini Sudara Marakkalage, Giovanni De Micheli","doi":"10.3390/cryptography7040061","DOIUrl":"https://doi.org/10.3390/cryptography7040061","url":null,"abstract":"Garbled circuit (GC) is one of the few promising protocols to realize general-purpose secure computation. The target computation is represented by a Boolean circuit that is subsequently transformed into a network of encrypted tables for execution. The need for distributing GCs among parties, however, requires excessive data communication, called garbling cost, which bottlenecks system performance. Due to the zero garbling cost of XOR operations, existing works reduce garbling cost by representing the target computation as the XOR-AND graph (XAG) with minimal structural multiplicative complexity (MC). Starting with a thorough study of the cipher-text efficiency of different types of logic primitives, for the first time, we propose XOR-OneHot graph (X1G) as a suitable logic representation for the generation of low-cost GCs. Our contribution includes (a) an exact algorithm to synthesize garbling-cost-optimal X1G implementations for small-scale functions and (b) a set of logic optimization algorithms customized for X1Gs, which together form a robust optimization flow that delivers high-quality X1Gs for practical functions. The effectiveness of the proposals is evidenced by comprehensive evaluations: compared with the state of the art, 7.34%, 26.14%, 13.51%, and 4.34% reductions in garbling costs are achieved on average for the involved benchmark suites, respectively, with reasonable runtime overheads.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":"66 ","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139245423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Study of Keccak SHA-3 Implementations Keccak SHA-3 实现比较研究
IF 1.6 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-20 DOI: 10.3390/cryptography7040060
Alessandra Dolmeta, Maurizio Martina, Guido Masera
This paper conducts an extensive comparative study of state-of-the-art solutions for implementing the SHA-3 hash function. SHA-3, a pivotal component in modern cryptography, has spawned numerous implementations across diverse platforms and technologies. This research aims to provide valuable insights into selecting and optimizing Keccak SHA-3 implementations. Our study encompasses an in-depth analysis of hardware, software, and software–hardware (hybrid) solutions. We assess the strengths, weaknesses, and performance metrics of each approach. Critical factors, including computational efficiency, scalability, and flexibility, are evaluated across different use cases. We investigate how each implementation performs in terms of speed and resource utilization. This research aims to improve the knowledge of cryptographic systems, aiding in the informed design and deployment of efficient cryptographic solutions. By providing a comprehensive overview of SHA-3 implementations, this study offers a clear understanding of the available options and equips professionals and researchers with the necessary insights to make informed decisions in their cryptographic endeavors.
本文对实现 SHA-3 哈希函数的最先进解决方案进行了广泛的比较研究。SHA-3 是现代密码学的重要组成部分,在不同的平台和技术中产生了大量的实现方案。本研究旨在为选择和优化 Keccak SHA-3 实现提供有价值的见解。我们的研究包括对硬件、软件和软硬件(混合)解决方案的深入分析。我们评估了每种方法的优缺点和性能指标。在不同的使用案例中,对包括计算效率、可扩展性和灵活性在内的关键因素进行了评估。我们研究了每种实现方式在速度和资源利用率方面的表现。这项研究旨在提高人们对加密系统的认识,帮助人们在知情的情况下设计和部署高效的加密解决方案。通过对 SHA-3 实现的全面概述,本研究清楚地了解了可用的选项,并为专业人士和研究人员提供了必要的见解,以便他们在加密工作中做出明智的决定。
{"title":"Comparative Study of Keccak SHA-3 Implementations","authors":"Alessandra Dolmeta, Maurizio Martina, Guido Masera","doi":"10.3390/cryptography7040060","DOIUrl":"https://doi.org/10.3390/cryptography7040060","url":null,"abstract":"This paper conducts an extensive comparative study of state-of-the-art solutions for implementing the SHA-3 hash function. SHA-3, a pivotal component in modern cryptography, has spawned numerous implementations across diverse platforms and technologies. This research aims to provide valuable insights into selecting and optimizing Keccak SHA-3 implementations. Our study encompasses an in-depth analysis of hardware, software, and software–hardware (hybrid) solutions. We assess the strengths, weaknesses, and performance metrics of each approach. Critical factors, including computational efficiency, scalability, and flexibility, are evaluated across different use cases. We investigate how each implementation performs in terms of speed and resource utilization. This research aims to improve the knowledge of cryptographic systems, aiding in the informed design and deployment of efficient cryptographic solutions. By providing a comprehensive overview of SHA-3 implementations, this study offers a clear understanding of the available options and equips professionals and researchers with the necessary insights to make informed decisions in their cryptographic endeavors.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":"292 2-3","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139257042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-Preserving k-Nearest Neighbor Classification over Malicious Participants in Outsourced Cloud Environments 外包云计算环境中针对恶意参与者的隐私保护 k 近邻分类
IF 1.6 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-17 DOI: 10.3390/cryptography7040059
Xian Guo, Ye Li, Yongbo Jiang, Jing Wang, Junli Fang
In recent years, many companies have chosen to outsource data and other data computation tasks to cloud service providers to reduce costs and increase efficiency. However, there are risks of security and privacy breaches when users outsource data to a cloud environment. Many researchers have proposed schemes based on cryptographic primitives to address these risks under the assumption that the cloud is a semi-honest participant and query users are honest participants. However, in a real-world environment, users’ data privacy and security may be threatened by the presence of malicious participants. Therefore, a novel scheme based on secure multi-party computation is proposed when attackers gain control over both the cloud and a query user in the paper. We prove that our solution can satisfy our goals of security and privacy protection. In addition, our experimental results based on simulated data show feasibility and reliability.
近年来,许多公司选择将数据和其他数据计算任务外包给云服务提供商,以降低成本和提高效率。然而,当用户将数据外包给云环境时,存在安全和隐私泄露的风险。许多研究人员提出了基于加密原语的方案来应对这些风险,前提是云是半诚信的参与者,查询用户是诚信的参与者。然而,在现实环境中,用户的数据隐私和安全可能会受到恶意参与者的威胁。因此,本文提出了一种基于安全多方计算的新方案,当攻击者同时获得对云和查询用户的控制权时,该方案就会生效。我们证明,我们的方案可以满足安全和隐私保护的目标。此外,我们基于模拟数据的实验结果表明了该方案的可行性和可靠性。
{"title":"Privacy-Preserving k-Nearest Neighbor Classification over Malicious Participants in Outsourced Cloud Environments","authors":"Xian Guo, Ye Li, Yongbo Jiang, Jing Wang, Junli Fang","doi":"10.3390/cryptography7040059","DOIUrl":"https://doi.org/10.3390/cryptography7040059","url":null,"abstract":"In recent years, many companies have chosen to outsource data and other data computation tasks to cloud service providers to reduce costs and increase efficiency. However, there are risks of security and privacy breaches when users outsource data to a cloud environment. Many researchers have proposed schemes based on cryptographic primitives to address these risks under the assumption that the cloud is a semi-honest participant and query users are honest participants. However, in a real-world environment, users’ data privacy and security may be threatened by the presence of malicious participants. Therefore, a novel scheme based on secure multi-party computation is proposed when attackers gain control over both the cloud and a query user in the paper. We prove that our solution can satisfy our goals of security and privacy protection. In addition, our experimental results based on simulated data show feasibility and reliability.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":"36 2","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139266023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hardware Implementations of Elliptic Curve Cryptography Using Shift-Sub Based Modular Multiplication Algorithms 基于移位子的模乘法算法的椭圆曲线密码的硬件实现
Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-10 DOI: 10.3390/cryptography7040057
Yamin Li
Elliptic curve cryptography (ECC) over prime fields relies on scalar point multiplication realized by point addition and point doubling. Point addition and point doubling operations consist of many modular multiplications of large operands (256 bits for example), especially in projective and Jacobian coordinates which eliminate the modular inversion required in affine coordinates for every point addition or point doubling operation. Accelerating modular multiplication is therefore important for high-performance ECC. This paper presents the hardware implementations of modular multiplication algorithms, including (1) interleaved modular multiplication (IMM), (2) Montgomery modular multiplication (MMM), (3) shift-sub modular multiplication (SSMM), (4) SSMM with advance preparation (SSMMPRE), and (5) SSMM with CSAs and sign detection (SSMMCSA) algorithms, and evaluates their execution time (the number of clock cycles and clock frequency) and required hardware resources (ALMs and registers). Experimental results show that SSMM is 1.80 times faster than IMM, and SSMMCSA is 3.27 times faster than IMM. We also present the ECC hardware implementations based on the Secp256k1 protocol in affine, projective, and Jacobian coordinates using the IMM, SSMM, SSMMPRE, and SSMMCSA algorithms, and investigate their cost and performance. Our ECC implementations can be applied to the design of hardware security module systems.
素数域上的椭圆曲线加密依赖于通过点加法和点加倍实现的标量点乘法。点加法和点加倍操作由许多大操作数(例如256位)的模乘法组成,特别是在射影和雅可比坐标中,这消除了仿射坐标中每个点加法或点加倍操作所需的模反转。因此,加速模块化乘法对于高性能ECC非常重要。本文介绍了模块化乘法算法的硬件实现,包括(1)交错模块化乘法(IMM)、(2)Montgomery模块化乘法(MMM)、(3)移位-子模块化乘法(SSMM)、(4)带预准备的SSMM (SSMMPRE)和(5)带csa和符号检测的SSMM (SSMMCSA)算法,并评估了它们的执行时间(时钟周期数和时钟频率)和所需的硬件资源(alm和寄存器)。实验结果表明,SSMM比IMM快1.80倍,SSMMCSA比IMM快3.27倍。我们还介绍了基于Secp256k1协议的仿射、射影和雅可比坐标的ECC硬件实现,使用IMM、SSMM、SSMMPRE和SSMMCSA算法,并研究了它们的成本和性能。我们的ECC实现可以应用于硬件安全模块系统的设计。
{"title":"Hardware Implementations of Elliptic Curve Cryptography Using Shift-Sub Based Modular Multiplication Algorithms","authors":"Yamin Li","doi":"10.3390/cryptography7040057","DOIUrl":"https://doi.org/10.3390/cryptography7040057","url":null,"abstract":"Elliptic curve cryptography (ECC) over prime fields relies on scalar point multiplication realized by point addition and point doubling. Point addition and point doubling operations consist of many modular multiplications of large operands (256 bits for example), especially in projective and Jacobian coordinates which eliminate the modular inversion required in affine coordinates for every point addition or point doubling operation. Accelerating modular multiplication is therefore important for high-performance ECC. This paper presents the hardware implementations of modular multiplication algorithms, including (1) interleaved modular multiplication (IMM), (2) Montgomery modular multiplication (MMM), (3) shift-sub modular multiplication (SSMM), (4) SSMM with advance preparation (SSMMPRE), and (5) SSMM with CSAs and sign detection (SSMMCSA) algorithms, and evaluates their execution time (the number of clock cycles and clock frequency) and required hardware resources (ALMs and registers). Experimental results show that SSMM is 1.80 times faster than IMM, and SSMMCSA is 3.27 times faster than IMM. We also present the ECC hardware implementations based on the Secp256k1 protocol in affine, projective, and Jacobian coordinates using the IMM, SSMM, SSMMPRE, and SSMMCSA algorithms, and investigate their cost and performance. Our ECC implementations can be applied to the design of hardware security module systems.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":" February","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135186678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Groups for Threshold Cryptography and Number-Theoretic Multiparty Computation 阈值密码和数论多方计算的安全组
Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-09 DOI: 10.3390/cryptography7040056
Berry Schoenmakers, Toon Segers
In this paper, we introduce secure groups as a cryptographic scheme representing finite groups together with a range of operations, including the group operation, inversion, random sampling, and encoding/decoding maps. We construct secure groups from oblivious group representations combined with cryptographic protocols, implementing the operations securely. We present both generic and specific constructions, in the latter case specifically for number-theoretic groups commonly used in cryptography. These include Schnorr groups (with quadratic residues as a special case), Weierstrass and Edwards elliptic curve groups, and class groups of imaginary quadratic number fields. For concreteness, we develop our protocols in the setting of secure multiparty computation based on Shamir secret sharing over a finite field, abstracted away by formulating our solutions in terms of an arithmetic black box for secure finite field arithmetic or for secure integer arithmetic. Secure finite field arithmetic suffices for many groups, including Schnorr groups and elliptic curve groups. For class groups, we need secure integer arithmetic to implement Shanks’ classical algorithms for the composition of binary quadratic forms, which we will combine with our adaptation of a particular form reduction algorithm due to Agarwal and Frandsen. As a main result of independent interest, we also present an efficient protocol for the secure computation of the extended greatest common divisor. The protocol is based on Bernstein and Yang’s constant-time 2-adic algorithm, which we adapt to work purely over the integers. This yields a much better approach for multiparty computation but raises a new concern about the growth of the Bézout coefficients. By a careful analysis, we are able to prove that the Bézout coefficients in our protocol will never exceed 3max(a,b) in absolute value for inputs a and b. We have integrated secure groups in the Python package MPyC and have implemented threshold ElGamal and threshold DSA in terms of secure groups. We also mention how our results support verifiable multiparty computation, allowing parties to jointly create a publicly verifiable proof of correctness for the results accompanying the results of a secure computation.
在本文中,我们将安全群作为一种表示有限群的加密方案,并引入了一系列操作,包括群操作、反转、随机抽样和编码/解码映射。我们将遗忘组表示与加密协议相结合,构造安全组,安全地实现了操作。我们提出了一般和特定的结构,在后者的情况下,专门用于密码学中常用的数论群。这包括Schnorr群(以二次残数为特例),Weierstrass和Edwards椭圆曲线群,以及虚二次数域的类群。具体来说,我们在基于有限域上的Shamir秘密共享的安全多方计算设置中开发了我们的协议,通过根据安全有限域算法或安全整数算法的算术黑箱制定我们的解决方案来抽象。安全有限域算法可以满足许多群,包括Schnorr群和椭圆曲线群。对于类群,我们需要安全的整数算法来实现Shanks的二元二次型组合的经典算法,我们将结合我们对Agarwal和Frandsen的特定形式约简算法的改编。作为独立研究的主要成果,我们还提出了一种安全计算扩展最大公约数的有效协议。该协议基于Bernstein和Yang的常时间2进算法,我们使其完全适用于整数。这为多方计算提供了一种更好的方法,但也引起了对bsamzout系数增长的新关注。通过仔细分析,我们能够证明我们的协议中的bsamzout系数对于输入a和b的绝对值永远不会超过3max(a,b)。我们在Python包MPyC中集成了安全组,并在安全组方面实现了阈值ElGamal和阈值DSA。我们还提到了我们的结果如何支持可验证的多方计算,允许各方共同为伴随安全计算结果的结果创建一个公开可验证的正确性证明。
{"title":"Secure Groups for Threshold Cryptography and Number-Theoretic Multiparty Computation","authors":"Berry Schoenmakers, Toon Segers","doi":"10.3390/cryptography7040056","DOIUrl":"https://doi.org/10.3390/cryptography7040056","url":null,"abstract":"In this paper, we introduce secure groups as a cryptographic scheme representing finite groups together with a range of operations, including the group operation, inversion, random sampling, and encoding/decoding maps. We construct secure groups from oblivious group representations combined with cryptographic protocols, implementing the operations securely. We present both generic and specific constructions, in the latter case specifically for number-theoretic groups commonly used in cryptography. These include Schnorr groups (with quadratic residues as a special case), Weierstrass and Edwards elliptic curve groups, and class groups of imaginary quadratic number fields. For concreteness, we develop our protocols in the setting of secure multiparty computation based on Shamir secret sharing over a finite field, abstracted away by formulating our solutions in terms of an arithmetic black box for secure finite field arithmetic or for secure integer arithmetic. Secure finite field arithmetic suffices for many groups, including Schnorr groups and elliptic curve groups. For class groups, we need secure integer arithmetic to implement Shanks’ classical algorithms for the composition of binary quadratic forms, which we will combine with our adaptation of a particular form reduction algorithm due to Agarwal and Frandsen. As a main result of independent interest, we also present an efficient protocol for the secure computation of the extended greatest common divisor. The protocol is based on Bernstein and Yang’s constant-time 2-adic algorithm, which we adapt to work purely over the integers. This yields a much better approach for multiparty computation but raises a new concern about the growth of the Bézout coefficients. By a careful analysis, we are able to prove that the Bézout coefficients in our protocol will never exceed 3max(a,b) in absolute value for inputs a and b. We have integrated secure groups in the Python package MPyC and have implemented threshold ElGamal and threshold DSA in terms of secure groups. We also mention how our results support verifiable multiparty computation, allowing parties to jointly create a publicly verifiable proof of correctness for the results accompanying the results of a secure computation.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":" 22","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135241436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
One-to-Many Simultaneous Secure Quantum Information Transmission 一对多同时安全量子信息传输
IF 1.6 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-05 DOI: 10.3390/cryptography7040064
T. Andronikos, A. Sirokofskich
This paper presents a new quantum protocol designed to transmit information from one source to many recipients simultaneously. The proposed protocol, which is based on the phenomenon of entanglement, is completely distributed and is provably information-theoretically secure. Numerous existing quantum protocols guarantee secure information communication between two parties but are not amenable to generalization in situations where the source must transmit information to two or more recipients. Hence, they must be executed sequentially two or more times to achieve the desired goal. The main novelty of the new protocol is its extensibility and generality to situations involving one party that must simultaneously communicate different, in general, messages to an arbitrary number of spatially distributed parties. This is achieved in the special way employed to encode the transmitted information in the entangled state of the system, one of the distinguishing features compared with previous protocols. This protocol can prove expedient whenever an information broker, say, Alice, must communicate distinct secret messages to her agents, all in different geographical locations, in one go. Due to its relative complexity compared with similar cryptographic protocols, as it involves communication among n parties and relies on |GHZn⟩ tuples, we provide an extensive and detailed security analysis so as to prove that it is information-theoretically secure. Finally, in terms of its implementation, the prevalent characteristics of the proposed protocol are its uniformity and simplicity, because it only requires CNOT and Hadamard gates and the local quantum circuits are identical for all information recipients.
本文提出了一种新的量子协议,旨在将信息从一个信息源同时传输给多个接收者。所提出的协议基于纠缠现象,是完全分布式的,并且在信息论上是安全的。现有的许多量子协议都能保证双方之间的安全信息通信,但在信息源必须向两个或更多接收者传输信息的情况下,这些协议却无法通用。因此,这些协议必须连续执行两次或更多次才能达到预期目标。新协议的主要新颖之处在于它的可扩展性和通用性,适用于一方必须同时向任意数量的空间分布方发送不同的一般信息的情况。这一点是通过在系统纠缠状态中对传输信息进行编码的特殊方式实现的,这也是与以往协议相比的显著特点之一。当信息中介(如爱丽丝)必须一次性向其位于不同地理位置的代理传递不同的秘密信息时,该协议就显得非常有用。与类似的加密协议相比,该协议相对复杂,因为它涉及 n 方之间的通信,并且依赖于 |GHZn⟩ 元组,因此我们提供了广泛而详细的安全性分析,以证明它在信息论上是安全的。最后,在实现方面,拟议协议的主要特点是统一性和简单性,因为它只需要 CNOT 和 Hadamard 门,而且所有信息接收者的本地量子电路都是相同的。
{"title":"One-to-Many Simultaneous Secure Quantum Information Transmission","authors":"T. Andronikos, A. Sirokofskich","doi":"10.3390/cryptography7040064","DOIUrl":"https://doi.org/10.3390/cryptography7040064","url":null,"abstract":"This paper presents a new quantum protocol designed to transmit information from one source to many recipients simultaneously. The proposed protocol, which is based on the phenomenon of entanglement, is completely distributed and is provably information-theoretically secure. Numerous existing quantum protocols guarantee secure information communication between two parties but are not amenable to generalization in situations where the source must transmit information to two or more recipients. Hence, they must be executed sequentially two or more times to achieve the desired goal. The main novelty of the new protocol is its extensibility and generality to situations involving one party that must simultaneously communicate different, in general, messages to an arbitrary number of spatially distributed parties. This is achieved in the special way employed to encode the transmitted information in the entangled state of the system, one of the distinguishing features compared with previous protocols. This protocol can prove expedient whenever an information broker, say, Alice, must communicate distinct secret messages to her agents, all in different geographical locations, in one go. Due to its relative complexity compared with similar cryptographic protocols, as it involves communication among n parties and relies on |GHZn⟩ tuples, we provide an extensive and detailed security analysis so as to prove that it is information-theoretically secure. Finally, in terms of its implementation, the prevalent characteristics of the proposed protocol are its uniformity and simplicity, because it only requires CNOT and Hadamard gates and the local quantum circuits are identical for all information recipients.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":"11 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139288802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Cryptography
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1