首页 > 最新文献

Cryptography - Recent Advances and Future Developments最新文献

英文 中文
The Security of Cryptosystems Based on Error-Correcting Codes 基于纠错码的密码系统安全性
Pub Date : 2021-08-18 DOI: 10.5772/intechopen.93782
A. Drissi
Quantum computers are distinguished by their enormous storage capacity and relatively high computing speed. Among the cryptosystems of the future, the best known and most studied which will resist when using this kind of computer are cryptosystems based on error-correcting codes. The use of problems inspired by the theory of error-correcting codes in the design of cryptographic systems adds an alternative to cryptosystems based on number theory, as well as solutions to their vulnerabilities. Their security is based on the problem of decoding a random code that is NP-complete. In this chapter, we will discuss the cryptographic properties of error-correcting codes, as well as the security of cryptosystems based on code theory.
量子计算机的特点是其巨大的存储容量和相对较高的计算速度。在未来的密码系统中,最著名和研究最多的是基于纠错码的密码系统,当使用这种计算机时,它会抵抗。在密码系统的设计中使用受纠错码理论启发的问题,为基于数论的密码系统增加了一种替代方案,同时也为其漏洞提供了解决方案。它们的安全性是基于解码np完全的随机代码的问题。在本章中,我们将讨论纠错码的密码学性质,以及基于码理论的密码系统的安全性。
{"title":"The Security of Cryptosystems Based on Error-Correcting Codes","authors":"A. Drissi","doi":"10.5772/intechopen.93782","DOIUrl":"https://doi.org/10.5772/intechopen.93782","url":null,"abstract":"Quantum computers are distinguished by their enormous storage capacity and relatively high computing speed. Among the cryptosystems of the future, the best known and most studied which will resist when using this kind of computer are cryptosystems based on error-correcting codes. The use of problems inspired by the theory of error-correcting codes in the design of cryptographic systems adds an alternative to cryptosystems based on number theory, as well as solutions to their vulnerabilities. Their security is based on the problem of decoding a random code that is NP-complete. In this chapter, we will discuss the cryptographic properties of error-correcting codes, as well as the security of cryptosystems based on code theory.","PeriodicalId":438596,"journal":{"name":"Cryptography - Recent Advances and Future Developments","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125789670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Encryption Model Based on Advanced Encryption Standard and Elliptic Curve Pseudo Random 基于高级加密标准和椭圆曲线伪随机的混合加密模型
Pub Date : 2021-08-18 DOI: 10.5772/intechopen.95511
Amal Hafsa, M. Gafsi, J. Malek, Mohsen Machhout
Securing multimedia applications becomes a major challenge with the violation of the information increasing currently. In this paper, a novel method for color image encryption is proposed. The procedure of encryption is performed using cooperation between Elliptic Curve Cryptography (ECC) and the Advanced Encryption Standard (AES) with CTR (Counter) mode. In the cryptographic system, we have proposed to take advantage of the Elliptic Curve Random Generator to generate a sequence of arbitrary numbers based on the curve. The random generation step is founded on the public key sharing and a changing point G. Then, the AES-CTR is performed to these sequences using arbitrary keys for image encryption. The use of the AES alongside greatly distributed random results an interesting encryption method. Security analysis is successfully performed and our experiments prove that the suggested technique provides the basis of cryptography with more simplicity and correctness.
随着信息入侵的增加,多媒体应用的安全成为当前面临的重大挑战。提出了一种新的彩色图像加密方法。加密过程采用椭圆曲线加密(ECC)和高级加密标准AES (Advanced encryption Standard, AES)配合CTR (Counter)模式完成。在密码系统中,我们提出利用椭圆曲线随机生成器来生成基于曲线的任意数序列。随机生成步骤建立在公钥共享和更改点g的基础上,然后使用任意密钥对这些序列进行AES-CTR进行图像加密。AES与大分布随机的结合使用是一种有趣的加密方法。本文成功地进行了安全性分析,并通过实验证明,该方法为加密提供了更加简单和正确的基础。
{"title":"Hybrid Encryption Model Based on Advanced Encryption Standard and Elliptic Curve Pseudo Random","authors":"Amal Hafsa, M. Gafsi, J. Malek, Mohsen Machhout","doi":"10.5772/intechopen.95511","DOIUrl":"https://doi.org/10.5772/intechopen.95511","url":null,"abstract":"Securing multimedia applications becomes a major challenge with the violation of the information increasing currently. In this paper, a novel method for color image encryption is proposed. The procedure of encryption is performed using cooperation between Elliptic Curve Cryptography (ECC) and the Advanced Encryption Standard (AES) with CTR (Counter) mode. In the cryptographic system, we have proposed to take advantage of the Elliptic Curve Random Generator to generate a sequence of arbitrary numbers based on the curve. The random generation step is founded on the public key sharing and a changing point G. Then, the AES-CTR is performed to these sequences using arbitrary keys for image encryption. The use of the AES alongside greatly distributed random results an interesting encryption method. Security analysis is successfully performed and our experiments prove that the suggested technique provides the basis of cryptography with more simplicity and correctness.","PeriodicalId":438596,"journal":{"name":"Cryptography - Recent Advances and Future Developments","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126875549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Emphasis on Quantum Cryptography and Quantum Key Distribution 量子密码学与量子密钥分发研究
Pub Date : 2021-02-05 DOI: 10.5772/INTECHOPEN.95383
Bharadwaja V. Srividya, S. Sasi
The application of internet has spiked up in the present-day scenario, as the exchange of information made between two parties happens in public environment. Hence privacy of information plays an important role in our day to day life. There have been incredible developments made in the field of cryptography resulting in modern cryptography at its zenith. Quantum computers are one among them creating fear into security agencies across the world. Solving the complex mathematical calculations is uncomplicated using quantum computers which results in breaking the keys of modern cryptography, which cannot be broken using classical computers. The concept of quantum physics, into the cryptographic world has resulted in the advancement of quantum cryptography. This technique utilizes the idea of key generation by photons, and communicates between peer entities by secured channel. Quantum cryptography adapts quantum mechanical principles like Heisenberg Uncertainty principle and photon polarization principle to provide secure communication between two parties. This article focuses on generation of a secret shared key, later converted into Quantum bits (Qbits) and transmitted to the receiver securely.
在当今的场景中,互联网的应用激增,因为双方之间的信息交换发生在公共环境中。因此,信息隐私在我们的日常生活中起着重要的作用。密码学领域取得了令人难以置信的发展,使现代密码学达到了顶峰。量子计算机是让世界各地的安全机构感到恐惧的技术之一。使用量子计算机解决复杂的数学计算并不复杂,从而可以破解传统计算机无法破解的现代密码学密钥。量子物理学的概念,进入了密码学的世界,导致了量子密码学的进步。该技术利用光子生成密钥的思想,通过安全信道在对等实体之间进行通信。量子密码学采用海森堡测不准原理、光子偏振原理等量子力学原理,为双方通信提供安全保障。本文重点介绍秘密共享密钥的生成,然后将其转换为量子比特(Qbits)并安全地传输给接收者。
{"title":"An Emphasis on Quantum Cryptography and Quantum Key Distribution","authors":"Bharadwaja V. Srividya, S. Sasi","doi":"10.5772/INTECHOPEN.95383","DOIUrl":"https://doi.org/10.5772/INTECHOPEN.95383","url":null,"abstract":"The application of internet has spiked up in the present-day scenario, as the exchange of information made between two parties happens in public environment. Hence privacy of information plays an important role in our day to day life. There have been incredible developments made in the field of cryptography resulting in modern cryptography at its zenith. Quantum computers are one among them creating fear into security agencies across the world. Solving the complex mathematical calculations is uncomplicated using quantum computers which results in breaking the keys of modern cryptography, which cannot be broken using classical computers. The concept of quantum physics, into the cryptographic world has resulted in the advancement of quantum cryptography. This technique utilizes the idea of key generation by photons, and communicates between peer entities by secured channel. Quantum cryptography adapts quantum mechanical principles like Heisenberg Uncertainty principle and photon polarization principle to provide secure communication between two parties. This article focuses on generation of a secret shared key, later converted into Quantum bits (Qbits) and transmitted to the receiver securely.","PeriodicalId":438596,"journal":{"name":"Cryptography - Recent Advances and Future Developments","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130948244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Survey and Analysis of Lightweight Authentication Mechanisms 轻量级认证机制综述与分析
Pub Date : 2020-12-30 DOI: 10.5772/INTECHOPEN.94407
Adarsh Kumar, Deepak Kumar Sharma
Interconnection of devices through Radio Frequency IDentification (RFID) brings enormous applications that are increasing constantly day by day. Due to the rapid growth of such applications, security of RFID networks becomes crucial and is a major challenge. Classical or lightweight cryptography primitives and protocols are the solutions to enhance the security standards in such networks. Authentication protocols are one of the important security protocols required to be integrated before exchange of secured information. This work surveyed the recently developed authentication protocols. Further, classifications, security challenges, and attack analysis are explored. A comparative analysis of different types of authentication protocols explains their applications in resourceful and resource constraint Internet of Things (IoT). Authentication protocols are categorized into: symmetric, asymmetric, lightweight, ultra-lightweight and group protocols. Symmetric and asymmetric protocols are more suitable for resourceful devices whereas lightweight and ultra-lightweight protocols are designed for resource constraint devices. Security and cost analysis shows that asymmetric protocols provide higher security than any other protocol at a reasonable cost. However, lightweight authentication protocols are suitable for passive RFID devices but do not provide full security.
通过射频识别(RFID)实现设备互联带来了巨大的应用,且应用日益增多。由于此类应用的快速增长,RFID网络的安全性变得至关重要,并且是一个重大挑战。经典或轻量级加密原语和协议是增强此类网络中的安全标准的解决方案。身份验证协议是安全信息交换前需要集成的重要安全协议之一。这项工作调查了最近开发的身份验证协议。此外,还探讨了分类、安全挑战和攻击分析。通过对不同类型认证协议的比较分析,说明了它们在资源丰富和资源受限的物联网中的应用。认证协议分为:对称协议、非对称协议、轻量级协议、超轻量级协议和组协议。对称和非对称协议更适用于资源丰富的设备,而轻量级和超轻量级协议则适用于资源受限的设备。安全性和成本分析表明,非对称协议在合理的成本下提供了比其他协议更高的安全性。然而,轻量级身份验证协议适用于无源RFID设备,但不能提供完全的安全性。
{"title":"Survey and Analysis of Lightweight Authentication Mechanisms","authors":"Adarsh Kumar, Deepak Kumar Sharma","doi":"10.5772/INTECHOPEN.94407","DOIUrl":"https://doi.org/10.5772/INTECHOPEN.94407","url":null,"abstract":"Interconnection of devices through Radio Frequency IDentification (RFID) brings enormous applications that are increasing constantly day by day. Due to the rapid growth of such applications, security of RFID networks becomes crucial and is a major challenge. Classical or lightweight cryptography primitives and protocols are the solutions to enhance the security standards in such networks. Authentication protocols are one of the important security protocols required to be integrated before exchange of secured information. This work surveyed the recently developed authentication protocols. Further, classifications, security challenges, and attack analysis are explored. A comparative analysis of different types of authentication protocols explains their applications in resourceful and resource constraint Internet of Things (IoT). Authentication protocols are categorized into: symmetric, asymmetric, lightweight, ultra-lightweight and group protocols. Symmetric and asymmetric protocols are more suitable for resourceful devices whereas lightweight and ultra-lightweight protocols are designed for resource constraint devices. Security and cost analysis shows that asymmetric protocols provide higher security than any other protocol at a reasonable cost. However, lightweight authentication protocols are suitable for passive RFID devices but do not provide full security.","PeriodicalId":438596,"journal":{"name":"Cryptography - Recent Advances and Future Developments","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123685359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security and Privacy of PUF-Based RFID Systems 基于puf的RFID系统的安全性和隐私性
Pub Date : 2020-11-15 DOI: 10.5772/intechopen.94018
F. Ţiplea, C. Andriesei, Cristian Hristea
The last decade has shown an increasing interest in the use of the physically unclonable function (PUF) technology in the design of radio frequency identification (RFID) systems. PUFs can bring extra security and privacy at the physical level that cannot be obtained by symmetric or asymmetric cryptography at the moment. However, many PUF-based RFID schemes proposed in recent years do not even achieve the lowest privacy level in reputable security and privacy models, such as Vaudenay’s model. In contrast, the lowest privacy in this model can be achieved through standard RFID schemes that use only symmetric cryptography. The purpose of this chapter is to analyze this aspect. Thus, it is emphasized the need to use formal models in the study of the security and privacy of (PUF-based) RFID schemes. We broadly discuss the tag corruption oracle and highlight some aspects that can lead to schemes without security or privacy. We also insist on the need to formally treat the cryptographic properties of PUFs to obtain security and privacy proofs. In the end, we point out a significant benefit of using PUF technology in RFID, namely getting schemes that offer destructive privacy in Vaudenay’s model.
在过去的十年中,人们对在射频识别(RFID)系统的设计中使用物理不可克隆功能(PUF)技术越来越感兴趣。puf可以在物理层面带来额外的安全性和隐私性,这是目前对称或非对称加密所无法获得的。然而,近年来提出的许多基于puf的RFID方案甚至没有达到信誉良好的安全和隐私模型(如Vaudenay模型)的最低隐私级别。相比之下,该模型中的最低隐私可以通过仅使用对称加密的标准RFID方案来实现。本章的目的就是对这方面进行分析。因此,强调在研究(基于puf的)RFID方案的安全性和隐私性时需要使用形式化模型。我们广泛地讨论了标签损坏预言,并强调了可能导致没有安全性或隐私的方案的一些方面。我们还坚持需要正式对待puf的加密属性,以获得安全性和隐私性证明。最后,我们指出了在RFID中使用PUF技术的一个显著好处,即在Vaudenay模型中获得提供破坏性隐私的方案。
{"title":"Security and Privacy of PUF-Based RFID Systems","authors":"F. Ţiplea, C. Andriesei, Cristian Hristea","doi":"10.5772/intechopen.94018","DOIUrl":"https://doi.org/10.5772/intechopen.94018","url":null,"abstract":"The last decade has shown an increasing interest in the use of the physically unclonable function (PUF) technology in the design of radio frequency identification (RFID) systems. PUFs can bring extra security and privacy at the physical level that cannot be obtained by symmetric or asymmetric cryptography at the moment. However, many PUF-based RFID schemes proposed in recent years do not even achieve the lowest privacy level in reputable security and privacy models, such as Vaudenay’s model. In contrast, the lowest privacy in this model can be achieved through standard RFID schemes that use only symmetric cryptography. The purpose of this chapter is to analyze this aspect. Thus, it is emphasized the need to use formal models in the study of the security and privacy of (PUF-based) RFID schemes. We broadly discuss the tag corruption oracle and highlight some aspects that can lead to schemes without security or privacy. We also insist on the need to formally treat the cryptographic properties of PUFs to obtain security and privacy proofs. In the end, we point out a significant benefit of using PUF technology in RFID, namely getting schemes that offer destructive privacy in Vaudenay’s model.","PeriodicalId":438596,"journal":{"name":"Cryptography - Recent Advances and Future Developments","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127854107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Advancements in Optical Data Transmission and Security Systems 光数据传输与安全系统研究进展
Pub Date : 2020-11-11 DOI: 10.5772/intechopen.94835
M. Domb
Optical Communication (OC) for data transmission was introduced more than 30 years ago. It employs two main technologies, fiber optics using a physical wire and Free Space Optical (FSO) wireless transmission. Fiber optics has been well developed over the years in terms of distance, bandwidth, speed, reliability, and other enhancements that contribute to its use. Recent developments in FSO transmission has made it the mainstream and a better alternative compared to RF wireless transmission, concerning all parameters. In this chapter, we focus on advancements in OC that represent innovative ideas of how to enable new methods of secured optical data transmission in different ways and not simply as an extension to current methods and technologies.
用于数据传输的光通信(OC)在30多年前被引入。它采用两种主要技术,使用物理线的光纤和自由空间光(FSO)无线传输。多年来,光纤在距离、带宽、速度、可靠性和其他有助于其使用的增强方面得到了很好的发展。FSO传输的最新发展使其成为主流,与RF无线传输相比,在所有参数方面都是更好的选择。在本章中,我们将重点介绍光学传输技术的进步,这些进步代表了如何以不同的方式实现安全光学数据传输的新方法的创新思想,而不仅仅是作为当前方法和技术的扩展。
{"title":"Advancements in Optical Data Transmission and Security Systems","authors":"M. Domb","doi":"10.5772/intechopen.94835","DOIUrl":"https://doi.org/10.5772/intechopen.94835","url":null,"abstract":"Optical Communication (OC) for data transmission was introduced more than 30 years ago. It employs two main technologies, fiber optics using a physical wire and Free Space Optical (FSO) wireless transmission. Fiber optics has been well developed over the years in terms of distance, bandwidth, speed, reliability, and other enhancements that contribute to its use. Recent developments in FSO transmission has made it the mainstream and a better alternative compared to RF wireless transmission, concerning all parameters. In this chapter, we focus on advancements in OC that represent innovative ideas of how to enable new methods of secured optical data transmission in different ways and not simply as an extension to current methods and technologies.","PeriodicalId":438596,"journal":{"name":"Cryptography - Recent Advances and Future Developments","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126825289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Cryptography - Recent Advances and Future Developments
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1