首页 > 最新文献

IET Information Security最新文献

英文 中文
MF-RF: A detection approach based on multi-features and random forest algorithm for improved collusive interest flooding attack MF-RF:一种基于多特征和随机森林算法的改进共谋利益泛滥攻击检测方法
IF 1.4 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-11-28 DOI: 10.1049/ise2.12100
Meng Yue, Silin Peng, Wenzhi Feng

A new type of Collusive Interest Flooding Attack (CIFA), Improved Collusive Interest Flooding Attack (I-CIFA), which originates from CIFA with a stronger concealment, higher attack effect, lower attack cost, and wider attack range in Named Data Networking (NDN). In order to detect this attack, the present study explores new detection features and establishes a sample set of attack features with different granularities, and accordingly, the Pearson coefficient is used to validate the correlation between the proposed features and the network states. Finally, the Random Forest model is designed to detect the I-CIFA attack. To evaluate the performance of the approach, extensive experiments are conducted in ndnSIM platform. Test results show that the proposed detection approach outperforms other existing approaches with a detection rate of 98.1%, error rate of 1.9%, and false positive rate of 1.5%.

一种新型的共谋利益淹没攻击(CIFA),即改进的共谋利益泛滥攻击(I-CIFA)。它源于命名数据网络中具有更强的隐蔽性、更高的攻击效果、更低的攻击成本和更宽的攻击范围的CIFA。为了检测这种攻击,本研究探索了新的检测特征,并建立了一个具有不同粒度的攻击特征样本集,因此,使用Pearson系数来验证所提出的特征与网络状态之间的相关性。最后,设计了随机森林模型来检测I-CIFA攻击。为了评估该方法的性能,在ndnSIM平台上进行了大量的实验。测试结果表明,所提出的检测方法优于其他现有方法,检测率为98.1%,错误率为1.9%,假阳性率为1.5%。
{"title":"MF-RF: A detection approach based on multi-features and random forest algorithm for improved collusive interest flooding attack","authors":"Meng Yue,&nbsp;Silin Peng,&nbsp;Wenzhi Feng","doi":"10.1049/ise2.12100","DOIUrl":"https://doi.org/10.1049/ise2.12100","url":null,"abstract":"<p>A new type of Collusive Interest Flooding Attack (CIFA), Improved Collusive Interest Flooding Attack (I-CIFA), which originates from CIFA with a stronger concealment, higher attack effect, lower attack cost, and wider attack range in Named Data Networking (NDN). In order to detect this attack, the present study explores new detection features and establishes a sample set of attack features with different granularities, and accordingly, the Pearson coefficient is used to validate the correlation between the proposed features and the network states. Finally, the Random Forest model is designed to detect the I-CIFA attack. To evaluate the performance of the approach, extensive experiments are conducted in ndnSIM platform. Test results show that the proposed detection approach outperforms other existing approaches with a detection rate of 98.1%, error rate of 1.9%, and false positive rate of 1.5%.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"17 3","pages":"360-376"},"PeriodicalIF":1.4,"publicationDate":"2022-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2.12100","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50124187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Conditional differential analysis on the KATAN ciphers based on deep learning 基于深度学习的KATAN密码的条件差分分析
IF 1.4 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-11-19 DOI: 10.1049/ise2.12099
Dongdong Lin, Manman Li, Zezhou Hou, Shaozhen Chen

KATAN ciphers are block ciphers using non-linear feedback shift registers. In this study, the authors improve the results of conditional differential analysis on KATAN by using deep learning. Multi-differential neural distinguishers are built to improve the accuracy of the neural distinguishers and increase the number of its rounds. Moreover, a conditional differential analysis framework is proposed based on deep learning with the multi-differential neural distinguishers, resulting in a significant improvement than the previous. We present a practical key recovery attack on the 97-round KATAN32 with 215.5 data complexity and 220.5 time complexity. The attack of the 82-round KATAN48 and 70-round KATAN64 are also presented as the best known practical results.

KATAN密码是使用非线性反馈移位寄存器的分组密码。在这项研究中,作者利用深度学习改进了KATAN的条件微分分析结果。建立了多差分神经分类器,提高了神经分类器的精度,增加了其轮数。此外,提出了一种基于深度学习的条件微分分析框架,该框架与多微分神经分类器相结合,比以前有了显著的改进。我们对97轮KATAN32提出了一种实用的密钥恢复攻击,数据复杂度为215.5,时间复杂度为220.5。82发KATAN48和70发KATAN64的攻击也被认为是最著名的实际结果。
{"title":"Conditional differential analysis on the KATAN ciphers based on deep learning","authors":"Dongdong Lin,&nbsp;Manman Li,&nbsp;Zezhou Hou,&nbsp;Shaozhen Chen","doi":"10.1049/ise2.12099","DOIUrl":"https://doi.org/10.1049/ise2.12099","url":null,"abstract":"<p>KATAN ciphers are block ciphers using non-linear feedback shift registers. In this study, the authors improve the results of conditional differential analysis on KATAN by using deep learning. Multi-differential neural distinguishers are built to improve the accuracy of the neural distinguishers and increase the number of its rounds. Moreover, a conditional differential analysis framework is proposed based on deep learning with the multi-differential neural distinguishers, resulting in a significant improvement than the previous. We present a practical key recovery attack on the 97-round KATAN32 with 2<sup>15.5</sup> data complexity and 2<sup>20.5</sup> time complexity. The attack of the 82-round KATAN48 and 70-round KATAN64 are also presented as the best known practical results.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"17 3","pages":"347-359"},"PeriodicalIF":1.4,"publicationDate":"2022-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2.12099","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50138280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and cryptanalysis of a new iterative structure 一种新的迭代结构的设计与密码分析
IF 1.4 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-11-14 DOI: 10.1049/ise2.12098
Jiajie Liu, Bing Sun, Chao Li

This study proposes a new iterative structure called the L-Feistel structure, which shares similar procedures between encryption and decryption and could unify the Feistel structure and the Lai-Massey structure. This paper evaluates the security of the L-Feistel structure from the perspective of provable security and classical analysis, respectively. Firstly, it is proved that the 4-round Key-Alternating L-Feistel cipher with independent round keys and independent round functions is secure against 2n/2 queries that is, birthday-bound security. Then by presenting the dual structure of the L-Feistel structure with SP-type round functions, it is proven that a differential of the L-Feistel structure is impossible when and only when it is a zero-correlation linear hull of its dual structure. Finally, the paper constructs impossible differentials, zero-correlation linear hulls and integral distinguishers of the L-Feistel structure with SP-type round functions which cover six and seven rounds, respectively, under different conditions.

本研究提出了一种新的迭代结构,称为L-Feistel结构,它在加密和解密之间具有相似的过程,可以统一Feistel和Lai-Massey结构。本文分别从可证明安全性和经典分析的角度对L-Feistel结构的安全性进行了评价。首先,证明了具有独立循环密钥和独立循环函数的4循环密钥交替L-Feistel密码对2n/2查询的安全性,即生日界安全性。然后,通过用SP型圆函数表示L-Feistel结构的对偶结构,证明了当且仅当L-Feistell结构是其对偶结构的零相关线性壳时,L-Feistle结构的微分是不可能的。最后,本文构造了L-Feistel结构的不可能微分、零相关线性壳和积分判别器,其SP型圆函数分别覆盖6和7个圆,在不同条件下。
{"title":"Design and cryptanalysis of a new iterative structure","authors":"Jiajie Liu,&nbsp;Bing Sun,&nbsp;Chao Li","doi":"10.1049/ise2.12098","DOIUrl":"https://doi.org/10.1049/ise2.12098","url":null,"abstract":"<p>This study proposes a new iterative structure called the L-Feistel structure, which shares similar procedures between encryption and decryption and could unify the Feistel structure and the Lai-Massey structure. This paper evaluates the security of the L-Feistel structure from the perspective of provable security and classical analysis, respectively. Firstly, it is proved that the 4-round Key-Alternating L-Feistel cipher with independent round keys and independent round functions is secure against 2<sup><i>n</i>/2</sup> queries that is, birthday-bound security. Then by presenting the dual structure of the L-Feistel structure with SP-type round functions, it is proven that a differential of the L-Feistel structure is impossible when and only when it is a zero-correlation linear hull of its dual structure. Finally, the paper constructs impossible differentials, zero-correlation linear hulls and integral distinguishers of the L-Feistel structure with SP-type round functions which cover six and seven rounds, respectively, under different conditions.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"17 3","pages":"335-346"},"PeriodicalIF":1.4,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2.12098","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50132941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An embedded intrusion detection and prevention system for home area networks in advanced metering infrastructure 一种先进计量基础设施中用于家庭局域网的嵌入式入侵检测和预防系统
IF 1.4 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-11-07 DOI: 10.1049/ise2.12097
Sahar Lazim Qaddoori, Qutaiba Ibrahim Ali

With the widespread adoption of smart metres in the power sector, anomaly detection has become a critical tool for analysing customers' unusual consumption patterns and network traffic. Detecting anomalies in power consumption and communication is primarily a real-time big data analytics issue regarding data mining along with a vast number of parallel streaming data from smart metres. In this study, an embedded Intrusion Detection and Prevention System (IDPS) is proposed as a Wifi-based smart metre for Home Area Networks (HANs) in the Advanced Metering Infrastructure (AMI) network. So, the proposed system employs one machine learning model based on IDPS to guard the HAN network from various attacks that utilise the Message Queueing Telemetry Transport protocol between the smart metre and IoT sensors. Also, it uses two machine learning models to detect the abnormality in periodic and daily data metering respectively. So, multiple algorithms have been used to find the suitable algorithm for each of the three anomaly detection models. These models have been evaluated and tested using real data sets regarding resources usage and detection performance to demonstrate the efficiency and effectiveness of using machine learning algorithms in the built anomaly detection models. The experiments show that the anomaly detection models performed well for various abnormalities.

随着智能电表在电力行业的广泛应用,异常检测已成为分析客户异常消费模式和网络流量的关键工具。检测功耗和通信中的异常主要是一个实时大数据分析问题,涉及数据挖掘以及来自智能电表的大量并行流数据。在本研究中,提出了一种嵌入式入侵检测和预防系统(IDPS),作为高级计量基础设施(AMI)网络中用于家庭局域网(HAN)的基于Wifi的智能电表。因此,所提出的系统采用了一个基于IDPS的机器学习模型来保护HAN网络免受各种攻击,这些攻击利用了智能电表和物联网传感器之间的消息队列遥测传输协议。此外,它使用两个机器学习模型分别检测周期性和日常数据测量中的异常。因此,已经使用了多种算法来为三个异常检测模型中的每一个找到合适的算法。这些模型已经使用关于资源使用和检测性能的真实数据集进行了评估和测试,以证明在构建的异常检测模型中使用机器学习算法的效率和有效性。实验表明,异常检测模型对各种异常都表现良好。
{"title":"An embedded intrusion detection and prevention system for home area networks in advanced metering infrastructure","authors":"Sahar Lazim Qaddoori,&nbsp;Qutaiba Ibrahim Ali","doi":"10.1049/ise2.12097","DOIUrl":"https://doi.org/10.1049/ise2.12097","url":null,"abstract":"<p>With the widespread adoption of smart metres in the power sector, anomaly detection has become a critical tool for analysing customers' unusual consumption patterns and network traffic. Detecting anomalies in power consumption and communication is primarily a real-time big data analytics issue regarding data mining along with a vast number of parallel streaming data from smart metres. In this study, an embedded Intrusion Detection and Prevention System (IDPS) is proposed as a Wifi-based smart metre for Home Area Networks (HANs) in the Advanced Metering Infrastructure (AMI) network. So, the proposed system employs one machine learning model based on IDPS to guard the HAN network from various attacks that utilise the Message Queueing Telemetry Transport protocol between the smart metre and IoT sensors. Also, it uses two machine learning models to detect the abnormality in periodic and daily data metering respectively. So, multiple algorithms have been used to find the suitable algorithm for each of the three anomaly detection models. These models have been evaluated and tested using real data sets regarding resources usage and detection performance to demonstrate the efficiency and effectiveness of using machine learning algorithms in the built anomaly detection models. The experiments show that the anomaly detection models performed well for various abnormalities.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"17 3","pages":"315-334"},"PeriodicalIF":1.4,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2.12097","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50124342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A deep learning-based framework to identify and characterise heterogeneous secure network traffic 一种基于深度学习的框架,用于识别和表征异构安全网络流量
IF 1.4 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-10-03 DOI: 10.1049/ise2.12095
Faiz Ul Islam, Guangjie Liu, Weiwei Liu, Qazi Mazhar ul Haq

The evergrowing diversity of encrypted and anonymous network traffic makes network management more formidable to manage the network traffic. An intelligent system is essential to analyse and identify network traffic accurately. Network management needs such techniques to improve the Quality of Service and ensure the flow of secure network traffic. However, due to the usage of non-standard ports and encryption of data payloads, the classical port-based and payload-based classification techniques fail to classify the secured network traffic. To solve the above-mentioned problems, this paper proposed an effective deep learning-based framework employed with flow-time-based features to predict heterogeneous secure network traffic best. The state-of-the-art machine learning strategies (C4.5, random forest, and K-nearest neighbour) are investigated for comparison. The proposed 1D-CNN model achieved higher accuracy in classifying the heterogeneous secure network traffic. In the next step, the proposed deep learning model characterises the major categories (virtual private network traffic, the onion router network traffic, and plain encrypted network traffic) into several application types. The experimental results show the effectiveness and feasibility of the proposed deep learning framework, which yields improved predictive power compared to the state-of-the-art machine learning techniques employed for secure network traffic analysis.

加密和匿名网络流量的日益多样化使得网络管理对网络流量的管理变得更加困难。智能系统是准确分析和识别网络流量的关键。网络管理需要这样的技术来提高服务质量并确保安全网络流量的流动。然而,由于使用了非标准端口和数据有效载荷的加密,传统的基于端口和基于有效载荷的分类技术无法对安全的网络流量进行分类。为了解决上述问题,本文提出了一种有效的基于深度学习的框架,结合基于流时间的特征,对异构安全网络流量进行最佳预测。研究了最先进的机器学习策略(C4.5、随机森林和K近邻)进行比较。所提出的1D-CNN模型在对异构安全网络流量进行分类时获得了更高的精度。在下一步中,所提出的深度学习模型将主要类别(虚拟专用网络流量、洋葱路由器网络流量和纯加密网络流量)划分为几种应用程序类型。实验结果表明了所提出的深度学习框架的有效性和可行性,与用于安全网络流量分析的最先进的机器学习技术相比,该框架的预测能力有所提高。
{"title":"A deep learning-based framework to identify and characterise heterogeneous secure network traffic","authors":"Faiz Ul Islam,&nbsp;Guangjie Liu,&nbsp;Weiwei Liu,&nbsp;Qazi Mazhar ul Haq","doi":"10.1049/ise2.12095","DOIUrl":"https://doi.org/10.1049/ise2.12095","url":null,"abstract":"<p>The evergrowing diversity of encrypted and anonymous network traffic makes network management more formidable to manage the network traffic. An intelligent system is essential to analyse and identify network traffic accurately. Network management needs such techniques to improve the Quality of Service and ensure the flow of secure network traffic. However, due to the usage of non-standard ports and encryption of data payloads, the classical port-based and payload-based classification techniques fail to classify the secured network traffic. To solve the above-mentioned problems, this paper proposed an effective deep learning-based framework employed with flow-time-based features to predict heterogeneous secure network traffic best. The state-of-the-art machine learning strategies (C4.5, random forest, and K-nearest neighbour) are investigated for comparison. The proposed 1D-CNN model achieved higher accuracy in classifying the heterogeneous secure network traffic. In the next step, the proposed deep learning model characterises the major categories (virtual private network traffic, the onion router network traffic, and plain encrypted network traffic) into several application types. The experimental results show the effectiveness and feasibility of the proposed deep learning framework, which yields improved predictive power compared to the state-of-the-art machine learning techniques employed for secure network traffic analysis.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"17 2","pages":"294-308"},"PeriodicalIF":1.4,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2.12095","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50120020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient module learning with errors-based post-quantum password-authenticated key exchange 基于错误的后量子密码认证密钥交换的高效模块学习
IF 1.4 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-09-20 DOI: 10.1049/ise2.12094
Peixin Ren, Xiaozhuo Gu, Ziliang Wang

Password-authenticated key exchange (PAKE) is a cryptographic primitive that can establish secure remote communications between the client and the server, especially with the advantage of amplifying memorable passwords into strong session keys. However, the arrival of the quantum computing era has brought new challenges to traditional PAKE protocols. Thus, designing an efficient post-quantum PAKE scheme becomes an open research question. In this paper, the authors construct a quantum-safe PAKE protocol, which is a horizontal extension of the password-authenticated key (PAK) protocol in the field of module lattices. Subsequently, the authors accompany the proposed protocol with a rigorous security proof in the random oracle model with two adaptions: applying the CDF-Zipf model to characterise the ability of the adversary and using the pairing with errors assumption to simplify the proof. Taking the flexibility of the module learning with errors (MLWE) problem, the authors elaborately select three parameter sets to meet different application scenarios. Specifically, the authors’ Recommended-PAKE implementation achieves 177-bit post-quantum security with a generous margin to cope with later improvement in cryptanalysis. The performance results indicate that the authors’ MLWE-PAKE is quite practical: compared with the latest Yang-PAK, the authors’ Recommended-PAK reduces the communication cost and the running time by 36.8% and 13.8%, respectively.

密码认证密钥交换(PAKE)是一种加密原语,可以在客户机和服务器之间建立安全的远程通信,特别是具有将可记忆密码放大为强会话密钥的优势。然而,量子计算时代的到来给传统的PAKE协议带来了新的挑战。因此,设计一个有效的后量子PAKE方案成为一个开放的研究问题。本文构造了一个量子安全的密码认证密钥(PAK)协议,它是密码认证密钥(PAK)协议在模格领域的水平扩展。随后,作者在随机oracle模型中对所提出的协议进行了严格的安全性证明,并进行了两种调整:应用CDF-Zipf模型来表征对手的能力,并使用配对错误假设来简化证明。针对有误差模块学习(MLWE)问题的灵活性,作者精心选择了三个参数集,以满足不同的应用场景。具体来说,作者推荐的pake实现实现了177位的后量子安全性,并有很大的余量来应对密码分析的后期改进。性能测试结果表明,mlwe - pak具有较强的实用性:与最新的Yang-PAK相比,推荐- pak的通信成本和运行时间分别降低了36.8%和13.8%。
{"title":"Efficient module learning with errors-based post-quantum password-authenticated key exchange","authors":"Peixin Ren,&nbsp;Xiaozhuo Gu,&nbsp;Ziliang Wang","doi":"10.1049/ise2.12094","DOIUrl":"10.1049/ise2.12094","url":null,"abstract":"<p>Password-authenticated key exchange (<span>PAKE</span>) is a cryptographic primitive that can establish secure remote communications between the client and the server, especially with the advantage of amplifying memorable passwords into strong session keys. However, the arrival of the quantum computing era has brought new challenges to traditional <span>PAKE</span> protocols. Thus, designing an efficient post-quantum <span>PAKE</span> scheme becomes an open research question. In this paper, the authors construct a quantum-safe <span>PAKE</span> protocol, which is a horizontal extension of the <span>password-authenticated key (PAK)</span> protocol in the field of module lattices. Subsequently, the authors accompany the proposed protocol with a rigorous security proof in the random oracle model with two adaptions: applying the CDF-Zipf model to characterise the ability of the adversary and using the pairing with errors assumption to simplify the proof. Taking the flexibility of the module learning with errors (<span>MLWE</span>) problem, the authors elaborately select three parameter sets to meet different application scenarios. Specifically, the authors’ Recommended-PAKE implementation achieves 177-bit post-quantum security with a generous margin to cope with later improvement in cryptanalysis. The performance results indicate that the authors’ <span>MLWE-PAKE</span> is quite practical: compared with the latest <span>Yang-PAK</span>, the authors’ <span>Recommended-PAK</span> reduces the communication cost and the running time by 36.8% and 13.8%, respectively.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"17 1","pages":"3-17"},"PeriodicalIF":1.4,"publicationDate":"2022-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2.12094","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41530747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comments on ‘Chinese Remainder Theorem-based centralised group key management for secure multicast communication’ 对“基于中国剩余定理的安全组播通信集中组密钥管理”的评论
IF 1.4 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-09-16 DOI: 10.1049/ise2.12085
Zhe Xia, Yu Yang, Fuyou Miao

To ensure private message exchange among the group members, it is desirable to construct secure and efficient group key management schemes. Moreover, these schemes are more versatile if they could support dynamic join or leave of group members. In IET Information Security 2014, Vijayakumar et al. have introduced such a group key management scheme with lightweight overheads in both computation and communication. And this scheme has been used as a building block in many cryptographic protocols afterwards. In this paper, the authors demonstrate that Vijayakumar's scheme suffers some potential security weaknesses. First, after participating in the group communications for some sessions, a group member may still be able to obtain the group key after it leaves the group, and this violates the claimed security property of forward secrecy. Second, some colluding group members may derive another group member's long term secret key, and obviously, this has more serious consequences. One of the main reasons for the existence of these attacks is that the security analyses in Vijayakumar's scheme are informal and they cannot cover the dynamic environment. To address this issue, the authors’ suggestion is that heuristic arguments of security are not adequate in the design of cryptographic protocols, but formal security definitions and proofs are required.

为了保证群组成员之间的私有消息交换,需要构建安全高效的群组密钥管理方案。此外,如果这些方案能够支持群组成员的动态加入或离开,则这些方案将更加通用。在IET Information Security 2014中,Vijayakumar等人引入了这样一种组密钥管理方案,该方案在计算和通信方面的开销都很轻。此后,该方案被用作许多加密协议的构建块。在本文中,作者证明了Vijayakumar的方案存在一些潜在的安全弱点。首先,在参与了某些会话的组通信之后,组成员可能在离开组后仍然能够获得组密钥,这违反了所声称的前向保密的安全属性。其次,一些串通的组成员可能会获得另一个组成员的长期秘密密钥,显然,这有更严重的后果。这些攻击存在的主要原因之一是Vijayakumar方案中的安全分析是非正式的,它们不能涵盖动态环境。为了解决这个问题,作者的建议是,安全性的启发式论证在加密协议的设计中是不够的,而需要正式的安全定义和证明。
{"title":"Comments on ‘Chinese Remainder Theorem-based centralised group key management for secure multicast communication’","authors":"Zhe Xia,&nbsp;Yu Yang,&nbsp;Fuyou Miao","doi":"10.1049/ise2.12085","DOIUrl":"10.1049/ise2.12085","url":null,"abstract":"<p>To ensure private message exchange among the group members, it is desirable to construct secure and efficient group key management schemes. Moreover, these schemes are more versatile if they could support dynamic join or leave of group members. In IET Information Security 2014, Vijayakumar et al. have introduced such a group key management scheme with lightweight overheads in both computation and communication. And this scheme has been used as a building block in many cryptographic protocols afterwards. In this paper, the authors demonstrate that Vijayakumar's scheme suffers some potential security weaknesses. First, after participating in the group communications for some sessions, a group member may still be able to obtain the group key after it leaves the group, and this violates the claimed security property of forward secrecy. Second, some colluding group members may derive another group member's long term secret key, and obviously, this has more serious consequences. One of the main reasons for the existence of these attacks is that the security analyses in Vijayakumar's scheme are informal and they cannot cover the dynamic environment. To address this issue, the authors’ suggestion is that heuristic arguments of security are not adequate in the design of cryptographic protocols, but formal security definitions and proofs are required.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"17 2","pages":"309-314"},"PeriodicalIF":1.4,"publicationDate":"2022-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2.12085","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47975772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Arithmetic correlation of binary half-ℓ-sequences 二进制一半的算术相关-ℓ-序列
IF 1.4 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-09-13 DOI: 10.1049/ise2.12093
Zhixiong Chen, Vladimir Edemskiy, Zhihua Niu, Yuqi Sang

The arithmetic correlations of two binary half--sequences with connection integer pr, which is an odd prime power, are investigated. Possible values (of the arithmetic correlation) are calculated. In particular, if p ≡ 1 (mod 8), the authors prove that they are zero for non-trivial shifts, that is, the half--sequences have ideal arithmetic correlations. If p ≡ −1 (mod 8), an upper bound, which is of order of magnitude pr−1/2 ln p, is derived by using earlier results on the imbalance of half--sequences with connection integer p studied by Gu and Klapper and later improved by Wang and Tan.

二元半的算术相关性-ℓ-研究了连接整数pr为奇素数幂的序列。计算(算术相关性的)可能值。特别地,如果p≠1(mod 8),作者证明了它们对于非平凡移位是零,即半-ℓ-序列具有理想的算术相关性。如果p elec−1(mod 8),则通过使用关于半不平衡的早期结果,导出了一个数量级为pr−1/2 ln p的上界-ℓ-Gu和Klapper研究了具有连接整数p的序列,后来由Wang和Tan改进。
{"title":"Arithmetic correlation of binary half-ℓ-sequences","authors":"Zhixiong Chen,&nbsp;Vladimir Edemskiy,&nbsp;Zhihua Niu,&nbsp;Yuqi Sang","doi":"10.1049/ise2.12093","DOIUrl":"https://doi.org/10.1049/ise2.12093","url":null,"abstract":"<p>The arithmetic correlations of two binary half-<i>ℓ</i>-sequences with connection integer <i>p</i><sup><i>r</i></sup>, which is an odd prime power, are investigated. Possible values (of the arithmetic correlation) are calculated. In particular, if <i>p</i> ≡ 1 (mod 8), the authors prove that they are zero for non-trivial shifts, that is, the half-<i>ℓ</i>-sequences have ideal arithmetic correlations. If <i>p</i> ≡ −1 (mod 8), an upper bound, which is of order of magnitude <i>p</i><sup><i>r</i>−1/2</sup> ln <i>p</i>, is derived by using earlier results on the imbalance of half-<i>ℓ</i>-sequences with connection integer <i>p</i> studied by Gu and Klapper and later improved by Wang and Tan.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"17 2","pages":"289-293"},"PeriodicalIF":1.4,"publicationDate":"2022-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2.12093","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50150568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recent progress in the security evaluation of multivariate public-key cryptography 多元公钥密码的安全性评价研究进展
IF 1.4 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-09-03 DOI: 10.1049/ise2.12092
Yasuhiko Ikematsu, Shuhei Nakamura, Tsuyoshi Takagi

Multivariate public-key cryptography (MPKC) is considered a leading candidate for post-quantum cryptography (PQC). It is based on the hardness of the multivariate quadratic polynomial (MQ) problem, which is a problem of finding a solution to a system of quadratic equations over a finite field. In this paper, we survey some recent progress in the security analysis of MPKC. Among various existing multivariate schemes, the most important one is the Rainbow signature scheme proposed by Ding et al. in 2005, which was later selected as a finalist in the third round of the PQC standardization project by the National Institute of Standards and Technology. Under the circumstances, some recent research studies in MPKC have focussed on the security analysis of the Rainbow scheme. In this paper, the authors first explain efficient algorithms for solving the MQ problem and the research methodology for estimating their complexity in MPKC. Then, the authors survey some recent results related to the security analysis of the Rainbow scheme. In particular, the authors provide a detailed description of the complexity analysis for solving the bi-graded polynomial systems studied independently by Nakamura et al. and Smith-Tone et al., and then expound the rectangular MinRank attack against Rainbow proposed by Beullens.

多元公钥密码学(MPKC)被认为是后量子密码学(PQC)的主要候选者。它基于多元二次多项式(MQ)问题的难度,这是一个在有限域上寻找二次方程系统解的问题。本文综述了近年来MPKC安全分析的研究进展。在现有的多种多元方案中,最重要的是Ding等人在2005年提出的彩虹签名方案,该方案后来被国家标准技术研究院选入PQC标准化项目第三轮决赛。在这种情况下,最近MPKC的一些研究集中在彩虹方案的安全性分析上。在本文中,作者首先解释了MPKC中解决MQ问题的有效算法和估计其复杂性的研究方法。然后,综述了近年来有关彩虹方案安全性分析的一些研究成果。特别地,作者详细描述了Nakamura et al.和Smith-Tone et al.独立研究的双梯度多项式系统求解的复杂度分析,然后阐述了Beullens提出的针对Rainbow的矩形MinRank攻击。
{"title":"Recent progress in the security evaluation of multivariate public-key cryptography","authors":"Yasuhiko Ikematsu,&nbsp;Shuhei Nakamura,&nbsp;Tsuyoshi Takagi","doi":"10.1049/ise2.12092","DOIUrl":"10.1049/ise2.12092","url":null,"abstract":"<p>Multivariate public-key cryptography (MPKC) is considered a leading candidate for post-quantum cryptography (PQC). It is based on the hardness of the multivariate quadratic polynomial (MQ) problem, which is a problem of finding a solution to a system of quadratic equations over a finite field. In this paper, we survey some recent progress in the security analysis of MPKC. Among various existing multivariate schemes, the most important one is the Rainbow signature scheme proposed by Ding et al. in 2005, which was later selected as a finalist in the third round of the PQC standardization project by the National Institute of Standards and Technology. Under the circumstances, some recent research studies in MPKC have focussed on the security analysis of the Rainbow scheme. In this paper, the authors first explain efficient algorithms for solving the MQ problem and the research methodology for estimating their complexity in MPKC. Then, the authors survey some recent results related to the security analysis of the Rainbow scheme. In particular, the authors provide a detailed description of the complexity analysis for solving the bi-graded polynomial systems studied independently by Nakamura et al. and Smith-Tone et al., and then expound the rectangular MinRank attack against Rainbow proposed by Beullens.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"17 2","pages":"210-226"},"PeriodicalIF":1.4,"publicationDate":"2022-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2.12092","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49332852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum algorithms for attacking hardness assumptions in classical and post-quantum cryptography 用于攻击经典和后量子密码学中硬度假设的量子算法
IF 1.4 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-08-29 DOI: 10.1049/ise2.12081
J.-F. Biasse, X. Bonnetain, E. Kirshanova, A. Schrottenloher, F. Song

In this survey, the authors review the main quantum algorithms for solving the computational problems that serve as hardness assumptions for cryptosystem. To this end, the authors consider both the currently most widely used classically secure cryptosystems, and the most promising candidates for post-quantum secure cryptosystems. The authors provide details on the cost of the quantum algorithms presented in this survey. The authors furthermore discuss ongoing research directions that can impact quantum cryptanalysis in the future.

在这项调查中,作者回顾了解决作为密码系统硬度假设的计算问题的主要量子算法。为此,作者考虑了目前使用最广泛的经典安全密码系统,以及最有前途的后量子安全密码系统候选者。作者详细介绍了本次调查中提出的量子算法的成本。作者进一步讨论了未来可能影响量子密码分析的正在进行的研究方向。
{"title":"Quantum algorithms for attacking hardness assumptions in classical and post-quantum cryptography","authors":"J.-F. Biasse,&nbsp;X. Bonnetain,&nbsp;E. Kirshanova,&nbsp;A. Schrottenloher,&nbsp;F. Song","doi":"10.1049/ise2.12081","DOIUrl":"10.1049/ise2.12081","url":null,"abstract":"<p>In this survey, the authors review the main quantum algorithms for solving the computational problems that serve as hardness assumptions for cryptosystem. To this end, the authors consider both the currently most widely used classically secure cryptosystems, and the most promising candidates for post-quantum secure cryptosystems. The authors provide details on the cost of the quantum algorithms presented in this survey. The authors furthermore discuss ongoing research directions that can impact quantum cryptanalysis in the future.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"17 2","pages":"171-209"},"PeriodicalIF":1.4,"publicationDate":"2022-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2.12081","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47108276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
IET Information Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1