首页 > 最新文献

ISC Int. J. Inf. Secur.最新文献

英文 中文
Impossible Differential Cryptanalysis on Deoxys-BC-256 Deoxys-BC-256的不可能差分密码分析
Pub Date : 2018-07-05 DOI: 10.22042/ISECURE.2018.114245.405
Alireza Mehrdad, F. Moazami, H. Soleimany
Deoxys is a final-round candidate of the CAESAR competition. Deoxys is built upon an internal tweakable block cipher Deoxys-BC, where in addition to the plaintext and key, it takes an extra non-secret input called a tweak. This paper presents the first impossible differential cryptanalysis of Deoxys-BC-256 which is used in Deoxys as an internal tweakable block cipher. First, we find a 4.5-round ID characteristic by utilizing a miss-in-the-middle-approach. We then present several cryptanalysis based upon the 4.5 rounds distinguisher against round-reduced Deoxys-BC-256 in both single-key and related-key settings. Our contributions include impossible differential attacks on up to 8-round Deoxys-BC-256 in the single-key model. Our attack reaches 9 rounds in the related-key related-tweak model which has a slightly higher data complexity than the best previous results obtained by a related-key related-tweak rectangle attack presented at FSE 2018, but requires a lower memory complexity with an equal time complexity.
Deoxys是CAESAR竞赛的最后一轮候选人。Deoxys是建立在一个内部可调整的分组密码Deoxys- bc之上的,除了明文和密钥之外,它还需要一个额外的非秘密输入,称为微调。本文提出了Deoxys- bc -256的第一个不可能差分密码分析,该密码分析在Deoxys中用作内部可调分组密码。首先,我们利用中间缺失方法找到4.5轮ID特征。然后,我们在单密钥和相关密钥设置下,基于4.5轮区分符对轮缩减Deoxys-BC-256进行了几个密码分析。我们的贡献包括在单密钥模型中对多达8轮Deoxys-BC-256的不可能差分攻击。我们的攻击在关联键相关调整模型中达到9轮,与FSE 2018上提出的关联键相关调整矩形攻击获得的最佳结果相比,该模型的数据复杂度略高,但在相同的时间复杂度下需要更低的内存复杂度。
{"title":"Impossible Differential Cryptanalysis on Deoxys-BC-256","authors":"Alireza Mehrdad, F. Moazami, H. Soleimany","doi":"10.22042/ISECURE.2018.114245.405","DOIUrl":"https://doi.org/10.22042/ISECURE.2018.114245.405","url":null,"abstract":"Deoxys is a final-round candidate of the CAESAR competition. Deoxys is built upon an internal tweakable block cipher Deoxys-BC, where in addition to the plaintext and key, it takes an extra non-secret input called a tweak. This paper presents the first impossible differential cryptanalysis of Deoxys-BC-256 which is used in Deoxys as an internal tweakable block cipher. First, we find a 4.5-round ID characteristic by utilizing a miss-in-the-middle-approach. We then present several cryptanalysis based upon the 4.5 rounds distinguisher against round-reduced Deoxys-BC-256 in both single-key and related-key settings. Our contributions include impossible differential attacks on up to 8-round Deoxys-BC-256 in the single-key model. Our attack reaches 9 rounds in the related-key related-tweak model which has a slightly higher data complexity than the best previous results obtained by a related-key related-tweak rectangle attack presented at FSE 2018, but requires a lower memory complexity with an equal time complexity.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130109115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Survey of Anomaly Detection Approaches in Internet of Things 物联网中异常检测方法综述
Pub Date : 2018-07-01 DOI: 10.22042/ISECURE.2018.116976.408
M. Behniafar, A. Nowroozi, H. Shahriari
Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this regard, Anomaly based Intrusion Detection Systems identify anomalous behavior of the network and consequently detect possible intrusion, unknown and stealth attacks. To this end, this paper analyses, evaluates and classifies anomaly detection approaches and systems specific to the Internet of Things. For this purpose, anomaly detection systems and approaches are analyzed in terms of engine architecture, application position, and detection method and in each point of view, approaches are investigated considering the associated classification.
物联网是一个由异构和约束节点组成的不断增长的网络,这些节点相互连接,相互连接。在这样的网络中,安全起着重要的作用。经验证明,仅靠加密和认证不足以保证网络的安全,需要入侵检测系统来检测和防止恶意节点的攻击。在这方面,基于异常的入侵检测系统识别网络的异常行为,从而检测可能的入侵,未知和隐形攻击。为此,本文对针对物联网的异常检测方法和系统进行了分析、评估和分类。为此,从引擎结构、应用位置和检测方法等方面分析了异常检测系统和方法,并在每个角度考虑相关的分类对方法进行了研究。
{"title":"A Survey of Anomaly Detection Approaches in Internet of Things","authors":"M. Behniafar, A. Nowroozi, H. Shahriari","doi":"10.22042/ISECURE.2018.116976.408","DOIUrl":"https://doi.org/10.22042/ISECURE.2018.116976.408","url":null,"abstract":"Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this regard, Anomaly based Intrusion Detection Systems identify anomalous behavior of the network and consequently detect possible intrusion, unknown and stealth attacks. To this end, this paper analyses, evaluates and classifies anomaly detection approaches and systems specific to the Internet of Things. For this purpose, anomaly detection systems and approaches are analyzed in terms of engine architecture, application position, and detection method and in each point of view, approaches are investigated considering the associated classification.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128721998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Distributed Contingency Logic and Security 分布式应急逻辑和安全性
Pub Date : 2018-07-01 DOI: 10.22042/ISECURE.2018.114354.406
Rahim Ramezanian
In information security, ignorance is not bliss. It is always stated that hiding the protocols (let the other be ignorant about it) does not increase the security of organizations. However, there are cases that ignorance creates protocols. In this paper, we propose distributed contingency logic, a proper extension of contingency (ignorance) logic. Intuitively, a formula is distributed contingent in a group of agent if and only if it does not follow from the knowledge of all individual agents put together. We formalize secret sharing scheme (a security property that is built upon ignorance of all agents), and a man in the middle attack to a weak protocol in our logic. We also illustrate a condition where disclose a secret may hide another one forever. Finally we prove the main theorems of every logic, soundness and completeness. We also prove that distributed contingency logic is more expressive than classical contingency logic and epistemic logic.
在信息安全领域,无知不是福。人们总是说,隐藏协议(让对方不知道)并不会增加组织的安全性。然而,在某些情况下,无知创造了协议。本文提出了分布式偶然性逻辑,这是偶然性(忽略)逻辑的适当扩展。直观地说,一个公式在一组智能体中是偶然分布的,当且仅当它不是从所有个体智能体的知识中得出的。我们形式化了秘密共享方案(建立在对所有代理一无所知的基础上的安全属性),并且在我们的逻辑中对弱协议进行了中间人攻击。我们还举例说明了披露一个秘密可能永远隐藏另一个秘密的情况。最后证明了每个逻辑的主要定理,即完备性和完备性。我们还证明了分布式偶然性逻辑比经典偶然性逻辑和认知逻辑更具表现力。
{"title":"Distributed Contingency Logic and Security","authors":"Rahim Ramezanian","doi":"10.22042/ISECURE.2018.114354.406","DOIUrl":"https://doi.org/10.22042/ISECURE.2018.114354.406","url":null,"abstract":"In information security, ignorance is not bliss. It is always stated that hiding the protocols (let the other be ignorant about it) does not increase the security of organizations. However, there are cases that ignorance creates protocols. In this paper, we propose distributed contingency logic, a proper extension of contingency (ignorance) logic. Intuitively, a formula is distributed contingent in a group of agent if and only if it does not follow from the knowledge of all individual agents put together. We formalize secret sharing scheme (a security property that is built upon ignorance of all agents), and a man in the middle attack to a weak protocol in our logic. We also illustrate a condition where disclose a secret may hide another one forever. Finally we prove the main theorems of every logic, soundness and completeness. We also prove that distributed contingency logic is more expressive than classical contingency logic and epistemic logic.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122249366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version) 论O-PSI的安全性:外包数据集上的委托私有集交集(扩展版)
Pub Date : 2018-07-01 DOI: 10.22042/ISECURE.2018.120860.410
Mahdi Mahdavi Oliaee, M. Delavar, Mohammad Hassan Ameri, J. Mohajeri, M. Aref
In recent years, determining the common information privately and efficiently between two mutually mistrusting parties have become an important issue in social networks. Many Private Set Intersection (PSI) protocols have been introduced to address this issue. By applying these protocols, two parties can compute the intersection between their sets without disclosing any information about components that are not in the intersection. Due to the broad range of computational resources that the cloud can provide for its users, determining the set intersection by cloud may decrease the computational cost of the users. The proposed protocols by Abadi et al. are two protocols in this context. In this paper, we show that their protocols are vulnerable to eavesdropping attack. Also, a solution is proposed to secure the protocol against mentioned attack. Moreover, we analyze the performance of both O-PSI and modified O-PSI protocols and show that our scheme is comparable with the O-PSI protocol. Actually, one trivial solution for the Abadi et al.’s proposed schemes is to use a secure channel like TLS. However, in the performance evaluation, we compare our applied modification with this trivial solution, and show that our proposed modification is more efficient as some extra encryptions imposed by TLS are no longer required.
近年来,如何在互不信任的双方之间私下高效地确定共同信息已成为社交网络中的一个重要问题。为了解决这个问题,引入了许多私有集交集(PSI)协议。通过应用这些协议,双方可以计算其集合之间的交集,而不会泄露任何关于不在交集中的组件的信息。由于云可以为其用户提供广泛的计算资源,通过云确定集合交集可以降低用户的计算成本。Abadi等人提出的方案是这方面的两种方案。在本文中,我们证明了它们的协议容易受到窃听攻击。同时,提出了一种保护协议免受上述攻击的解决方案。此外,我们还分析了O-PSI协议和改进的O-PSI协议的性能,表明我们的方案与O-PSI协议具有可比性。实际上,Abadi等人提出的方案的一个简单解决方案是使用像TLS这样的安全通道。然而,在性能评估中,我们将应用的修改与这个平凡的解决方案进行比较,并表明我们提出的修改更有效,因为不再需要TLS强加的一些额外加密。
{"title":"On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version)","authors":"Mahdi Mahdavi Oliaee, M. Delavar, Mohammad Hassan Ameri, J. Mohajeri, M. Aref","doi":"10.22042/ISECURE.2018.120860.410","DOIUrl":"https://doi.org/10.22042/ISECURE.2018.120860.410","url":null,"abstract":"In recent years, determining the common information privately and efficiently between two mutually mistrusting parties have become an important issue in social networks. Many Private Set Intersection (PSI) protocols have been introduced to address this issue. By applying these protocols, two parties can compute the intersection between their sets without disclosing any information about components that are not in the intersection. Due to the broad range of computational resources that the cloud can provide for its users, determining the set intersection by cloud may decrease the computational cost of the users. The proposed protocols by Abadi et al. are two protocols in this context. In this paper, we show that their protocols are vulnerable to eavesdropping attack. Also, a solution is proposed to secure the protocol against mentioned attack. Moreover, we analyze the performance of both O-PSI and modified O-PSI protocols and show that our scheme is comparable with the O-PSI protocol. Actually, one trivial solution for the Abadi et al.’s proposed schemes is to use a secure channel like TLS. However, in the performance evaluation, we compare our applied modification with this trivial solution, and show that our proposed modification is more efficient as some extra encryptions imposed by TLS are no longer required.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127864794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Feature-based Malicious URL and Attack Type Detection Using Multi-class Classification 基于特征的恶意URL及多类分类攻击类型检测
Pub Date : 2018-03-20 DOI: 10.22042/ISECURE.2018.0.0.1
D. Patil, J. Patil
Nowadays, malicious URLs are the common threat to the businesses, social networks, net-banking. Existing approaches have focused on binary detection i.e., either the URL is malicious or benign. Very few literature is found which focused on the detection of malicious URLs and their attack types. Hence, it becomes necessary to know the attack type and adopt an effective countermeasure. This paper proposes a methodology to detect malicious URLs and the type of attacks based on multi-class classification. In this work, we propose 42 new features of spam, phishing and malware URLs. These features are not considered in the earlier studies for malicious URLs detection and attack types identification. Binary and multi-class dataset is constructed using 49935 malicious and benign URLs. It consists of 26041 benign and 23894 malicious URLs containing 11297 malware, 8976 phishing and 3621 spam URLs. To evaluate the proposed approach, the state-of-the-art supervised batch and online machine learning classifiers are used. Experiments are performed on the binary and multi-class dataset using the aforementioned machine learning classifiers. It is found that, confidence weighted learning classifier achieves the best 98.44% average detection accuracy with 1.56% error-rate in the multi-class setting and 99.86% detection accuracy with negligible error-rate of 0.14% in binary setting using our proposed URL features.
目前,恶意url是企业、社交网络、网上银行的常见威胁。现有的方法侧重于二进制检测,即URL是恶意的还是良性的。很少有文献关注恶意url及其攻击类型的检测。因此,有必要了解攻击类型并采取有效的对策。本文提出了一种基于多类分类的恶意url和攻击类型检测方法。在这项工作中,我们提出了42个垃圾邮件、网络钓鱼和恶意软件url的新功能。在早期的恶意url检测和攻击类型识别研究中,没有考虑到这些特征。二进制和多类数据集是使用49935个恶意和良性url构建的。它由26041个良性网址和23894个恶意网址组成,其中包含11297个恶意网址、8976个钓鱼网址和3621个垃圾网址。为了评估所提出的方法,使用了最先进的监督批处理和在线机器学习分类器。使用上述机器学习分类器在二元和多类数据集上进行了实验。研究发现,在多类设置下,置信度加权学习分类器的平均检测准确率为98.44%,错误率为1.56%;在二元设置下,置信度加权学习分类器的平均检测准确率为99.86%,错误率为0.14%。
{"title":"Feature-based Malicious URL and Attack Type Detection Using Multi-class Classification","authors":"D. Patil, J. Patil","doi":"10.22042/ISECURE.2018.0.0.1","DOIUrl":"https://doi.org/10.22042/ISECURE.2018.0.0.1","url":null,"abstract":"Nowadays, malicious URLs are the common threat to the businesses, social networks, net-banking. Existing approaches have focused on binary detection i.e., either the URL is malicious or benign. Very few literature is found which focused on the detection of malicious URLs and their attack types. Hence, it becomes necessary to know the attack type and adopt an effective countermeasure. This paper proposes a methodology to detect malicious URLs and the type of attacks based on multi-class classification. In this work, we propose 42 new features of spam, phishing and malware URLs. These features are not considered in the earlier studies for malicious URLs detection and attack types identification. Binary and multi-class dataset is constructed using 49935 malicious and benign URLs. It consists of 26041 benign and 23894 malicious URLs containing 11297 malware, 8976 phishing and 3621 spam URLs. To evaluate the proposed approach, the state-of-the-art supervised batch and online machine learning classifiers are used. Experiments are performed on the binary and multi-class dataset using the aforementioned machine learning classifiers. It is found that, confidence weighted learning classifier achieves the best 98.44% average detection accuracy with 1.56% error-rate in the multi-class setting and 99.86% detection accuracy with negligible error-rate of 0.14% in binary setting using our proposed URL features.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"168 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122518579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Phishing website detection using weighted feature line embedding 基于加权特征线嵌入的钓鱼网站检测
Pub Date : 2017-07-31 DOI: 10.22042/ISECURE.2017.83439.377
M. Imani, G. Montazer
The aim of phishing is tracing the users’ s private information without their permission by designing a new website which mimics the trusted website. The specialists of information technology do not agree on a unique definition for the discriminative features that characterizes the phishing websites. Therefore, the number of reliable training samples in phishing detection problems is limited. Moreover, among the available training samples, there are abnormal samples that cause classification error. For instance, it is possible that there are phishing samples with similar features to legitimate ones and vice versa. A supervised feature extraction method, called weighted feature line embedding, is proposed in this paper to solve these problems. The proposed method virtually generates training samples by utilizing the feature line metric. Hence, it can solve the small sample size problem. Moreover, by assigning appropriate weights to each pair of feature points, it corrects the undesirable quality of abnormal samples. The features extracted by our method improve the performance of phishing website detection specially by using small training
网络钓鱼的目的是在未经用户允许的情况下,通过设计一个模仿可信网站的新网站来追踪用户的私人信息。信息技术专家对网络钓鱼网站的鉴别特征没有统一的定义。因此,网络钓鱼检测问题中可靠的训练样本数量是有限的。此外,在可用的训练样本中,存在导致分类误差的异常样本。例如,有可能存在与合法样本具有相似特征的网络钓鱼样本,反之亦然。为了解决这些问题,本文提出了一种有监督的特征提取方法——加权特征线嵌入。该方法利用特征线度量虚拟生成训练样本。因此,它可以解决小样本量问题。此外,通过对每对特征点分配适当的权重,它纠正了异常样本的不良质量。该方法提取的特征通过小训练提高了网络钓鱼网站的检测性能
{"title":"Phishing website detection using weighted feature line embedding","authors":"M. Imani, G. Montazer","doi":"10.22042/ISECURE.2017.83439.377","DOIUrl":"https://doi.org/10.22042/ISECURE.2017.83439.377","url":null,"abstract":"The aim of phishing is tracing the users’ s private information without their permission by designing a new website which mimics the trusted website. The specialists of information technology do not agree on a unique definition for the discriminative features that characterizes the phishing websites. Therefore, the number of reliable training samples in phishing detection problems is limited. Moreover, among the available training samples, there are abnormal samples that cause classification error. For instance, it is possible that there are phishing samples with similar features to legitimate ones and vice versa. A supervised feature extraction method, called weighted feature line embedding, is proposed in this paper to solve these problems. The proposed method virtually generates training samples by utilizing the feature line metric. Hence, it can solve the small sample size problem. Moreover, by assigning appropriate weights to each pair of feature points, it corrects the undesirable quality of abnormal samples. The features extracted by our method improve the performance of phishing website detection specially by using small training","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132301639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study 具有平滑功耗的对称密码的一种新的抗CPA软件实现:SIMON案例研究
Pub Date : 2017-07-31 DOI: 10.22042/ISECURE.2017.82990.376
Morteza Safaei Pour, M. Salmasizadeh
In this paper we propose a new method for applying hiding countermeasure against CPA attacks. This method is for software implementation, based on smoothing power consumption of the device. This method is evaluated on the SIMON scheme as a case study; however, it is not relying on any specific SIMON features. Our new method includes only AND equivalent and XOR equivalent operations since every cryptographic algorithm can be implemented with two basic operations, namely AND and XOR. Therefore, hamming weight and hamming distance take constant values at each moment of time. This can decrease data-dependency between processed values and consumed power. In order to practically evaluate the resulting implementation overheads and the resistance improvement against CPA, we implement the proposed coding scheme on SIMON, a lightweight block cipher, on a smart card with the ATmega163 microprocessor. We define resistance as the number of traces, which for less than that number; the correct key cannot be distinguished from all other hypothetical keys by its correlation coefficient in any moment of time. The results of this implementation show 350 times more immunity against correlation attacks.
本文提出了一种针对CPA攻击应用隐藏对抗的新方法。该方法是软件实现,基于平滑设备功耗。以SIMON方案为例对该方法进行了评价;但是,它不依赖于任何特定的SIMON特性。我们的新方法只包括与等价和异或等价操作,因为每个密码算法都可以用两种基本操作来实现,即与和异或。因此,汉明权值和汉明距离在每一时刻取恒定值。这可以减少处理值和消耗功率之间的数据依赖性。为了实际评估由此产生的实现开销和对CPA的抗性改进,我们在带有ATmega163微处理器的智能卡上实现了轻量级分组密码SIMON的编码方案。我们把电阻定义为走线的数量,小于这个数量;正确的键不能通过其在任何时刻的相关系数与所有其他假设的键区分开来。结果表明,该算法对相关攻击的免疫力提高了350倍。
{"title":"A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study","authors":"Morteza Safaei Pour, M. Salmasizadeh","doi":"10.22042/ISECURE.2017.82990.376","DOIUrl":"https://doi.org/10.22042/ISECURE.2017.82990.376","url":null,"abstract":"In this paper we propose a new method for applying hiding countermeasure against CPA attacks. This method is for software implementation, based on smoothing power consumption of the device. This method is evaluated on the SIMON scheme as a case study; however, it is not relying on any specific SIMON features. Our new method includes only AND equivalent and XOR equivalent operations since every cryptographic algorithm can be implemented with two basic operations, namely AND and XOR. Therefore, hamming weight and hamming distance take constant values at each moment of time. This can decrease data-dependency between processed values and consumed power. In order to practically evaluate the resulting implementation overheads and the resistance improvement against CPA, we implement the proposed coding scheme on SIMON, a lightweight block cipher, on a smart card with the ATmega163 microprocessor. We define resistance as the number of traces, which for less than that number; the correct key cannot be distinguished from all other hypothetical keys by its correlation coefficient in any moment of time. The results of this implementation show 350 times more immunity against correlation attacks.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133570589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An efficient secure channel coding scheme based on polar codes 一种有效的基于极化码的安全信道编码方案
Pub Date : 2017-07-28 DOI: 10.22042/ISECURE.2017.84609.380
Behnam Mafakheri, T. Eghlidos, Hossein Pilaram
In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods show that the proposed scheme has an acceptable level of security with a relatively smaller key size in comparison with the previous works. The results indicate that the scheme provides an efficient error performance and benefits from a higher code rate which can approach the channel capacity for large enough polar codes. The most important property of the proposed scheme is that if we increase the block length of the code, we can have a higher code rate and higher level of security without significant changes in the key size of the scheme. The resulting characteristics of the proposed scheme make it suitable for high-speed communications, such as deep space communication systems.
本文提出了一种基于极码的联合加密编码方案框架,即高效安全的联合密钥加密信道编码方案。解决了使用新编码结构的问题,即在Rao-Nam (RN)类方案中使用极性编码。密码分析方法表明,与以前的工作相比,所提出的方案具有可接受的安全级别,密钥大小相对较小。结果表明,该方案具有较好的误码性能,并且具有较高的码率,对于足够大的极化码,其码率接近信道容量。该方案最重要的特性是,如果我们增加代码的块长度,我们可以在不显著改变方案密钥大小的情况下获得更高的码率和更高的安全性。该方案的特性使其适用于高速通信,如深空通信系统。
{"title":"An efficient secure channel coding scheme based on polar codes","authors":"Behnam Mafakheri, T. Eghlidos, Hossein Pilaram","doi":"10.22042/ISECURE.2017.84609.380","DOIUrl":"https://doi.org/10.22042/ISECURE.2017.84609.380","url":null,"abstract":"In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods show that the proposed scheme has an acceptable level of security with a relatively smaller key size in comparison with the previous works. The results indicate that the scheme provides an efficient error performance and benefits from a higher code rate which can approach the channel capacity for large enough polar codes. The most important property of the proposed scheme is that if we increase the block length of the code, we can have a higher code rate and higher level of security without significant changes in the key size of the scheme. The resulting characteristics of the proposed scheme make it suitable for high-speed communications, such as deep space communication systems.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116206242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Analyzing new features of infected web content in detection of malicious web pages 分析受感染网页内容在检测恶意网页中的新特征
Pub Date : 2017-07-20 DOI: 10.22042/ISECURE.2017.9.2.2
Javad Hajian Nezhad, M. V. Jahan, Mohammad-Hassan Tayarani-Najaran, Zohre Sadrnezhad
Recent improvements in web standards and technologies enable the attackers to hide and obfuscate infectious codes with new methods and thus escaping the security filters. In this paper, we study the application of machine learning techniques in detecting malicious web pages. In order to detect malicious web pages, we propose and analyze a novel set of features including HTML, JavaScript (jQuery library) and XSS attacks. The proposed features are evaluated on a data set that is gathered by a crawler from malicious web domains, IP and address black lists. For the purpose of evaluation, we use a number of machine learning algorithms. Experimental results show that using the proposed set of features, the C4.5-Tree algorithm offers the best performance with 97.61% accuracy, and F1-measure has 96.75% accuracy. We also rank the quality of the features. Experimental results suggest that nine of the proposed features are among the twenty best discriminative features.
web标准和技术的最新改进使攻击者能够使用新方法隐藏和混淆感染代码,从而逃避安全过滤器。在本文中,我们研究了机器学习技术在恶意网页检测中的应用。为了检测恶意网页,我们提出并分析了一套新的特性,包括HTML、JavaScript (jQuery库)和XSS攻击。所提出的特征在一个数据集上进行评估,该数据集是由爬虫从恶意网络域、IP和地址黑名单中收集的。为了评估的目的,我们使用了许多机器学习算法。实验结果表明,使用所提出的特征集,C4.5-Tree算法的准确率为97.61%,而F1-measure的准确率为96.75%。我们还对功能的质量进行排名。实验结果表明,所提出的特征中有9个是20个最佳判别特征之一。
{"title":"Analyzing new features of infected web content in detection of malicious web pages","authors":"Javad Hajian Nezhad, M. V. Jahan, Mohammad-Hassan Tayarani-Najaran, Zohre Sadrnezhad","doi":"10.22042/ISECURE.2017.9.2.2","DOIUrl":"https://doi.org/10.22042/ISECURE.2017.9.2.2","url":null,"abstract":"Recent improvements in web standards and technologies enable the attackers to hide and obfuscate infectious codes with new methods and thus escaping the security filters. In this paper, we study the application of machine learning techniques in detecting malicious web pages. In order to detect malicious web pages, we propose and analyze a novel set of features including HTML, JavaScript (jQuery library) and XSS attacks. The proposed features are evaluated on a data set that is gathered by a crawler from malicious web domains, IP and address black lists. For the purpose of evaluation, we use a number of machine learning algorithms. Experimental results show that using the proposed set of features, the C4.5-Tree algorithm offers the best performance with 97.61% accuracy, and F1-measure has 96.75% accuracy. We also rank the quality of the features. Experimental results suggest that nine of the proposed features are among the twenty best discriminative features.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122739958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
On the computational complexity of finding a minimal basis for the guess and determine attack 在计算复杂度上寻找最小基进行猜测和确定攻击
Pub Date : 2017-07-12 DOI: 10.22042/ISECURE.2017.79681.373
Shahram Khazaei, F. Moazami
Guess-and-determine attack is one of the general attacks on stream ciphers. It is a common cryptanalysis tool for evaluating security of stream ciphers. The effectiveness of this attack is based on the number of unknown bits which will be guessed by the attacker to break the cryptosystem. In this work, we present a relation between the minimum numbers of the guessed bits and uniquely restricted matching of a graph. This leads us to see that finding the minimum number of the guessed bits is NP-complete. Although fixed parameter tractability of the problem in term of minimum number of the guessed bits remains an open question, we provide some related results. Moreover, we introduce some closely related graph concepts and problems including alternating cycle free matching, jump number and forcing number of a perfect matching.
猜测和确定攻击是针对流密码的常见攻击之一。它是评估流密码安全性的常用密码分析工具。这种攻击的有效性是基于未知比特的数量,这些未知比特将被攻击者猜测以破坏密码系统。在这项工作中,我们提出了最小猜测位数与图的唯一限制匹配之间的关系。这使我们看到,找到最小猜测位数是np完全的。虽然从最小猜测比特数的角度看问题的固定参数可跟踪性仍然是一个悬而未决的问题,但我们提供了一些相关的结果。此外,我们还引入了一些密切相关的图概念和问题,包括交替循环自由匹配、跳跃数和完美匹配的强制数。
{"title":"On the computational complexity of finding a minimal basis for the guess and determine attack","authors":"Shahram Khazaei, F. Moazami","doi":"10.22042/ISECURE.2017.79681.373","DOIUrl":"https://doi.org/10.22042/ISECURE.2017.79681.373","url":null,"abstract":"Guess-and-determine attack is one of the general attacks on stream ciphers. It is a common cryptanalysis tool for evaluating security of stream ciphers. The effectiveness of this attack is based on the number of unknown bits which will be guessed by the attacker to break the cryptosystem. In this work, we present a relation between the minimum numbers of the guessed bits and uniquely restricted matching of a graph. This leads us to see that finding the minimum number of the guessed bits is NP-complete. Although fixed parameter tractability of the problem in term of minimum number of the guessed bits remains an open question, we provide some related results. Moreover, we introduce some closely related graph concepts and problems including alternating cycle free matching, jump number and forcing number of a perfect matching.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122108709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
ISC Int. J. Inf. Secur.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1