首页 > 最新文献

IET Information Security最新文献

英文 中文
Improving the Performance of CPA Attacks for Ciphers Using Parallel Implementation of S-Boxes 利用并行 S 盒提高密码的 CPA 攻击性能
IF 1.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-12 DOI: 10.1049/2023/6653956
Fu Yao, Yongzhuang Wei, Hua Chen, Enes Pasalic

Since their introduction in early 2000, CPA (correlation power analysis), as a cryptographic tool, has been widely used in the cryptanalysis of cryptographic algorithms (being applicable to both symmetric key ciphers as well as to public key encryption schemes). An application of the classical CPA method, along with its variants, to cryptographic algorithms that use parallel implementation of its substitution boxes (S-boxes) commonly requires more power traces to extract the secret key compared to the case when serial implementation of S-boxes is employed. To reduce the amount of power traces in this scenario, we propose a modification of the standard CPA approaches and demonstrate practically that our method performs better than the existing ones in this respect. To verify the efficiency of our improved CPA method, we apply it to the public databases of DPA Contest V2. In particular, the experimental results show that only 495 power traces are required to recover the secret key of AES. We also compare the performance of our attack to the relevant methods whose parameters are available at DPA Contest V2. The results show that compared to the best nonprofiling side-channel attack (SCA) attack, our method reduces the number of power traces required to recover the secret key by 6,566. Also, our new method performs almost similarly as the best profiling SCA attack of Benoit Gerard (in terms of the required number of power traces), thus reducing the gap in the performance of profiling and nonprofiling SCA attacks.

自 2000 年初推出以来,CPA(相关幂分析)作为一种密码学工具,已广泛应用于密码算法的密码分析(既适用于对称密钥密码,也适用于公钥加密方案)。经典 CPA 方法及其变体在加密算法中的应用,如果使用并行执行替换盒(S-boxes),通常需要比使用串行执行 S-boxes 时更多的功率轨迹来提取密钥。为了减少这种情况下的功率轨迹量,我们提出了一种对标准 CPA 方法的修改,并实际证明我们的方法在这方面比现有方法性能更好。为了验证改进后的 CPA 方法的效率,我们将其应用于 DPA Contest V2 的公共数据库。实验结果特别表明,只需要 495 个功率跟踪就能恢复 AES 密钥。我们还将我们的攻击性能与 DPA Contest V2 提供参数的相关方法进行了比较。结果表明,与最好的非仿真侧信道攻击(SCA)方法相比,我们的方法将恢复密钥所需的功率轨迹数量减少了 6566 个。此外,我们的新方法与 Benoit Gerard 的最佳剖析式 SCA 攻击(所需功率轨迹数)性能几乎相似,从而缩小了剖析式和非剖析式 SCA 攻击的性能差距。
{"title":"Improving the Performance of CPA Attacks for Ciphers Using Parallel Implementation of S-Boxes","authors":"Fu Yao,&nbsp;Yongzhuang Wei,&nbsp;Hua Chen,&nbsp;Enes Pasalic","doi":"10.1049/2023/6653956","DOIUrl":"10.1049/2023/6653956","url":null,"abstract":"<div>\u0000 <p>Since their introduction in early 2000, CPA (correlation power analysis), as a cryptographic tool, has been widely used in the cryptanalysis of cryptographic algorithms (being applicable to both symmetric key ciphers as well as to public key encryption schemes). An application of the classical CPA method, along with its variants, to cryptographic algorithms that use parallel implementation of its substitution boxes (S-boxes) commonly requires more power traces to extract the secret key compared to the case when serial implementation of S-boxes is employed. To reduce the amount of power traces in this scenario, we propose a modification of the standard CPA approaches and demonstrate practically that our method performs better than the existing ones in this respect. To verify the efficiency of our improved CPA method, we apply it to the public databases of DPA Contest V2. In particular, the experimental results show that only 495 power traces are required to recover the secret key of AES. We also compare the performance of our attack to the relevant methods whose parameters are available at DPA Contest V2. The results show that compared to the best nonprofiling side-channel attack (SCA) attack, our method reduces the number of power traces required to recover the secret key by 6,566. Also, our new method performs almost similarly as the best profiling SCA attack of Benoit Gerard (in terms of the required number of power traces), thus reducing the gap in the performance of profiling and nonprofiling SCA attacks.</p>\u0000 </div>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2023 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2023-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/2023/6653956","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139007622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SAT-Based Security Evaluation for WARP against Linear Cryptanalysis 针对线性密码分析的基于 SAT 的 WARP 安全性评估
IF 1.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-06 DOI: 10.1049/2023/5323380
Jiali Shi, Guoqiang Liu, Chao Li

WARP, an efficient lightweight block cipher presented by Banik et al., offers a viable alternative to AES with its 128-bit block and a 128-bit key. It adopts a 32-nibble type-II generalized Feistel network (GFN) structure, incorporating a nibble permutation optimized for both security and efficiency. Notably, WARP has achieved the lowest hardware implementation among 128-bit block ciphers. Its bit-serial encryption-only circuit is only 763 gate equivalents (GEs). Consequently, WARP has received significant attention since its inception. The designers evaluated the number of active Sboxes for linear trails in WARP to establish its security. To further investigate WARP’s resistance against linear attacks, we employed an automated model to analyze the optimal linear trails/hulls of WARP. To achieve this, the problem will be transformed into a Boolean satisfiability problem (SAT). The constraints in conjunctive normal form (CNF) are used to describe the mask propagation of WARP and invoke the SAT solver to find valid solutions. The results allowed us to obtain the optimal correlation of the initial 21-round linear trails for WARP. Furthermore, by enumerating the linear trails within a linear hull, the distribution of linear trails is revealed, and the probability of the linear hull is improved to be more accurate. This work extends the linear distinguisher from 18 to 21 rounds. Additionally, the first independent analysis of WARP’s linear properties is presented, offering a more precise evaluation of its resistance against linear cryptanalysis.

WARP是Banik等人提出的一种高效的轻量级分组密码,它以128位块和128位密钥为AES提供了可行的替代方案。它采用32-nibble type-II广义费斯特尔网络(GFN)结构,结合了一种既安全又高效的nibble排列。值得注意的是,WARP在128位分组密码中实现了最低的硬件实现。它的位串行加密电路只有763个栅极当量(ge)。因此,WARP自一开始就受到了极大的关注。设计师评估了WARP中线性轨迹的活跃sbox数量,以确定其安全性。为了进一步研究WARP对线性攻击的抵抗力,我们采用了一个自动化模型来分析WARP的最佳线性轨迹/船体。为了实现这一点,将问题转化为布尔可满足性问题(SAT)。利用合取范式(CNF)约束描述WARP的掩模传播,并调用SAT求解器寻找有效解。结果使我们能够获得WARP初始21轮线性轨迹的最佳相关性。此外,通过枚举线性船体内的线性轨迹,揭示了线性轨迹的分布,提高了线性船体的概率,从而提高了船体的准确性。这项工作将线性区分器从18轮扩展到21轮。此外,提出了WARP的线性特性的第一个独立分析,提供了对其抵抗线性密码分析的更精确的评估。
{"title":"SAT-Based Security Evaluation for WARP against Linear Cryptanalysis","authors":"Jiali Shi,&nbsp;Guoqiang Liu,&nbsp;Chao Li","doi":"10.1049/2023/5323380","DOIUrl":"10.1049/2023/5323380","url":null,"abstract":"<div>\u0000 <p><span>WARP</span>, an efficient lightweight block cipher presented by Banik et al., offers a viable alternative to AES with its 128-bit block and a 128-bit key. It adopts a 32-nibble type-II generalized Feistel network (GFN) structure, incorporating a nibble permutation optimized for both security and efficiency. Notably, <span>WARP</span> has achieved the lowest hardware implementation among 128-bit block ciphers. Its bit-serial encryption-only circuit is only 763 gate equivalents (GEs). Consequently, <span>WARP</span> has received significant attention since its inception. The designers evaluated the number of active Sboxes for linear trails in <span>WARP</span> to establish its security. To further investigate <span>WARP</span>’s resistance against linear attacks, we employed an automated model to analyze the optimal linear trails/hulls of <span>WARP</span>. To achieve this, the problem will be transformed into a Boolean satisfiability problem (SAT). The constraints in conjunctive normal form (CNF) are used to describe the mask propagation of <span>WARP</span> and invoke the SAT solver to find valid solutions. The results allowed us to obtain the optimal correlation of the initial 21-round linear trails for <span>WARP</span>. Furthermore, by enumerating the linear trails within a linear hull, the distribution of linear trails is revealed, and the probability of the linear hull is improved to be more accurate. This work extends the linear distinguisher from 18 to 21 rounds. Additionally, the first independent analysis of <span>WARP</span>’s linear properties is presented, offering a more precise evaluation of its resistance against linear cryptanalysis.</p>\u0000 </div>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2023 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2023-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/2023/5323380","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138596857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK 对轻量级区块密码 RBFK 的差分、线性和中间人攻击
IF 1.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-23 DOI: 10.1049/2023/6691726
Sugio Nobuyuki

Randomized butterfly architecture of fast Fourier transform for key cipher (RBFK) is the lightweight block cipher for Internet of things devices in an edge computing environment. Although the authors claimed that RBFK is secure against differential cryptanalysis, linear cryptanalysis, impossible differential attack, and zero correlation linear cryptanalysis, the details were not explained in the literature. Therefore, we have evaluated the security of RBFK by application of differential cryptanalysis, linear cryptanalysis, and meet-in-the-middle (MITM) attack and have found that RBFK is not secure against these attacks. This paper introduces not only a distinguish attack but also key recovery attacks on full-round RBFK. In the distinguish attack scenario, data for differential cryptanalysis are two, and the time complexity is one for an exclusive-OR operation. In the key recovery attack scenario, the data for linear cryptanalysis are one pair of known plaintext–ciphertext. The time complexity is one operation for a linear sum. Data for an MITM attack are two. The time complexity is 248 encryptions; the memory complexity is 245 bytes. Because the vulnerabilities are identified in the round function and the key scheduling part, we propose some improvements for RBFK against these attacks.

用于密钥密码的快速傅立叶变换随机蝶形结构(RBFK)是边缘计算环境中用于物联网设备的轻量级块密码。虽然作者声称 RBFK 可安全对抗差分密码分析、线性密码分析、不可能的差分攻击和零相关线性密码分析,但文献中并没有详细说明。因此,我们应用差分密码分析、线性密码分析和中间人攻击(MITM)评估了 RBFK 的安全性,发现 RBFK 对这些攻击并不安全。本文不仅介绍了区分攻击,还介绍了对全轮 RBFK 的密钥恢复攻击。在区分攻击中,用于差分密码分析的数据为两个,对于排他-OR 操作,时间复杂度为一个。在密钥恢复攻击中,线性密码分析的数据是一对已知的明文-密文。线性和的时间复杂度为一个操作。MITM 攻击的数据为两个。时间复杂度为 2 48 次加密;内存复杂度为 2 45 个字节。由于在轮函数和密钥调度部分发现了漏洞,我们提出了一些针对这些攻击的 RBFK 改进方案。
{"title":"Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK","authors":"Sugio Nobuyuki","doi":"10.1049/2023/6691726","DOIUrl":"10.1049/2023/6691726","url":null,"abstract":"<div>\u0000 <p>Randomized butterfly architecture of fast Fourier transform for key cipher (RBFK) is the lightweight block cipher for Internet of things devices in an edge computing environment. Although the authors claimed that RBFK is secure against differential cryptanalysis, linear cryptanalysis, impossible differential attack, and zero correlation linear cryptanalysis, the details were not explained in the literature. Therefore, we have evaluated the security of RBFK by application of differential cryptanalysis, linear cryptanalysis, and meet-in-the-middle (MITM) attack and have found that RBFK is not secure against these attacks. This paper introduces not only a distinguish attack but also key recovery attacks on full-round RBFK. In the distinguish attack scenario, data for differential cryptanalysis are two, and the time complexity is one for an exclusive-OR operation. In the key recovery attack scenario, the data for linear cryptanalysis are one pair of known plaintext–ciphertext. The time complexity is one operation for a linear sum. Data for an MITM attack are two. The time complexity is 2<sup>48</sup> encryptions; the memory complexity is 2<sup>45</sup> bytes. Because the vulnerabilities are identified in the round function and the key scheduling part, we propose some improvements for RBFK against these attacks.</p>\u0000 </div>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2023 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2023-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/2023/6691726","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139244466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generic Construction of Fully Anonymous Broadcast Authenticated Encryption with Keyword Search with Adaptive Corruptions 具有自适应损坏的关键字搜索的完全匿名广播认证加密的一般构造
IF 1.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-07 DOI: 10.1049/2023/9922828
Keita Emura

As a multireceiver variant of public key authenticated encryption with keyword search (PAEKS), broadcast authenticated encryption with keyword search (BAEKS) was proposed by Liu et al. (ACISP 2021). BAEKS focuses on receiver anonymity, where no information about the receiver is leaked from ciphertexts, which is reminiscent of the anonymous broadcast encryption. Here, there are rooms for improving their security definitions, e.g., two challenge sets of receivers are selected before the setup phase, and an adversary is not allowed to corrupt any receiver. In this paper, we propose a generic construction of BAEKS derived from PAEKS that provides ciphertext anonymity and consistency in a multireceiver setting. The proposed construction is an extension of the generic construction proposed by Libert et al. (PKC 2012) for the fully anonymous broadcast encryption and provides adaptive corruptions. We also demonstrate that the Qin et al. PAEKS scheme (ProvSec 2021) provides ciphertext anonymity and consistency in a multireceiver setting and can be employed as a building block of the proposed generic construction.

broadcast authenticated encryption with keyword search (BAEKS)是public key authentication encryption with PAEKS (public key authentication encryption with keyword search)的一种多接收方变体,Liu等人(ACISP 2021)提出了该算法。BAEKS侧重于接收者的匿名性,其中没有关于接收者的信息从密文中泄露,这让人想起匿名广播加密。在这里,存在改进其安全定义的空间,例如,在设置阶段之前选择两个接收器的挑战集,并且不允许攻击者破坏任何接收器。在本文中,我们提出了一种基于PAEKS的通用BAEKS结构,该结构在多接收者设置下提供密文匿名性和一致性。提出的构造是Libert等人(PKC 2012)提出的用于完全匿名广播加密的通用构造的扩展,并提供自适应损坏。我们也证明了秦等人。PAEKS方案(ProvSec 2021)在多接收者设置中提供密文匿名性和一致性,可以用作提议的通用结构的构建块。
{"title":"Generic Construction of Fully Anonymous Broadcast Authenticated Encryption with Keyword Search with Adaptive Corruptions","authors":"Keita Emura","doi":"10.1049/2023/9922828","DOIUrl":"10.1049/2023/9922828","url":null,"abstract":"<div>\u0000 <p>As a multireceiver variant of public key authenticated encryption with keyword search (PAEKS), broadcast authenticated encryption with keyword search (BAEKS) was proposed by Liu et al. (ACISP 2021). BAEKS focuses on receiver anonymity, where no information about the receiver is leaked from ciphertexts, which is reminiscent of the anonymous broadcast encryption. Here, there are rooms for improving their security definitions, e.g., two challenge sets of receivers are selected before the setup phase, and an adversary is not allowed to corrupt any receiver. In this paper, we propose a generic construction of BAEKS derived from PAEKS that provides ciphertext anonymity and consistency in a multireceiver setting. The proposed construction is an extension of the generic construction proposed by Libert et al. (PKC 2012) for the fully anonymous broadcast encryption and provides adaptive corruptions. We also demonstrate that the Qin et al. PAEKS scheme (ProvSec 2021) provides ciphertext anonymity and consistency in a multireceiver setting and can be employed as a building block of the proposed generic construction.</p>\u0000 </div>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2023 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2023-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/2023/9922828","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135432911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Inner-Product Matchmaking Encryption: Bilateral Access Control and Beyond Equality 产品内部匹配加密:双边访问控制和超越平等
IF 1.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-02 DOI: 10.1049/2023/8829580
Qiaohan Chu, Anmin Fu, Haifeng Qian, Jie Chen

We present an inner-product matchmaking encryption (IP-ME) scheme achieving weak privacy and authenticity in prime-order groups under symmetric external Diffie–Hellman (SXDH) assumption in the standard model. We further present an IP-ME with Monotone Span Program Authenticity (IP-ME with MSP Auth) scheme, where the chosen sender policy is upgraded to MSP, and the scheme also achieves weak privacy and authenticity in prime-order groups under SXDH assumption in the standard model. Both of the schemes have more expressive functionalities than identity-based matchmaking encryption (IB-ME) scheme, and are simpler than Ateniese et al.’s modular ME scheme (Crypto’ 19). But our schemes only achieve a very limited flavor of security, which is reflected in the privacy.

在标准模型中,在对称外部Diffie-Hellman (SXDH)假设下,提出了一种内积配对加密(IP-ME)方案,实现了质数群中的弱隐私性和弱真实性。在此基础上,提出了一种IP-ME with Monotone Span Program Authenticity (IP-ME with MSP Auth)方案,将选择的发送方策略升级为MSP,并在标准模型的SXDH假设下实现了素阶群的弱隐私性和弱真实性。这两种方案都比基于身份的配对加密(IB-ME)方案具有更多的表达功能,并且比Ateniese等人的模块化ME方案(Crypto ' 19)更简单。但是我们的方案只能实现非常有限的安全性,这反映在隐私上。
{"title":"Inner-Product Matchmaking Encryption: Bilateral Access Control and Beyond Equality","authors":"Qiaohan Chu,&nbsp;Anmin Fu,&nbsp;Haifeng Qian,&nbsp;Jie Chen","doi":"10.1049/2023/8829580","DOIUrl":"10.1049/2023/8829580","url":null,"abstract":"<div>\u0000 <p>We present an inner-product matchmaking encryption (IP-ME) scheme achieving weak privacy and authenticity in prime-order groups under symmetric external Diffie–Hellman (SXDH) assumption in the standard model. We further present an IP-ME with Monotone Span Program Authenticity (IP-ME with MSP Auth) scheme, where the chosen sender policy is upgraded to MSP, and the scheme also achieves weak privacy and authenticity in prime-order groups under SXDH assumption in the standard model. Both of the schemes have more expressive functionalities than identity-based matchmaking encryption (IB-ME) scheme, and are simpler than Ateniese et al.’s modular ME scheme (Crypto’ 19). But our schemes only achieve a very limited flavor of security, which is reflected in the privacy.</p>\u0000 </div>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2023 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2023-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/2023/8829580","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135933620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Publicly Verifiable Leveled Fully Homomorphic Signcryption Scheme 一个可公开验证的水平全同态签名加密方案
IF 1.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-31 DOI: 10.1049/2023/1377042
Zhaoxuan Bian, Fuqun Wang, Renjun Zhang, Bin Lian, Lidong Han, Kefei Chen

With the deepening of research, how to construct a fully homomorphic signcryption scheme based on standard assumptions is a problem that we need to solve. For this question, recently, Jin et al. proposed a leveled fully homomorphic signcryption scheme from standard lattices. However, when verifying, it is supposed to unsigncrypt first as they utilize sign-then-encrypt method. This leads to users being unable to verify the authenticity of the data first, which resulting in the waste of resources. This raises another question of how to construct an fully homomorphic signcryption (FHSC) scheme with public verifiability. To solve this problem, we propose a leveled fully homomorphic signcryption scheme that can be publicly verified and show its completeness, IND-CPA security, and strong unforgeability.

随着研究的深入,如何在标准假设的基础上构造一个完全同态的签名加密方案是我们需要解决的一个问题。针对这个问题,Jin等人最近提出了一种基于标准格的水平全同态签名加密方案。然而,在验证时,应该先解除签名,因为他们使用先签名后加密的方法。这导致用户无法首先验证数据的真实性,从而造成资源的浪费。这就提出了如何构造具有公共可验证性的完全同态签名加密(FHSC)方案的另一个问题。为了解决这一问题,我们提出了一种可公开验证的分层全同态签名加密方案,该方案具有完备性、IND-CPA安全性和强不可伪造性。
{"title":"A Publicly Verifiable Leveled Fully Homomorphic Signcryption Scheme","authors":"Zhaoxuan Bian,&nbsp;Fuqun Wang,&nbsp;Renjun Zhang,&nbsp;Bin Lian,&nbsp;Lidong Han,&nbsp;Kefei Chen","doi":"10.1049/2023/1377042","DOIUrl":"10.1049/2023/1377042","url":null,"abstract":"<div>\u0000 <p>With the deepening of research, how to construct a fully homomorphic signcryption scheme based on standard assumptions is a problem that we need to solve. For this question, recently, Jin et al. proposed a leveled fully homomorphic signcryption scheme from standard lattices. However, when verifying, it is supposed to unsigncrypt first as they utilize sign-then-encrypt method. This leads to users being unable to verify the authenticity of the data first, which resulting in the waste of resources. This raises another question of how to construct an fully homomorphic signcryption (FHSC) scheme with public verifiability. To solve this problem, we propose a leveled fully homomorphic signcryption scheme that can be publicly verified and show its completeness, IND-CPA security, and strong unforgeability.</p>\u0000 </div>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2023 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2023-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/2023/1377042","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135872344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Kyber, Saber, and SK-MLWR Lattice-Based Key Encapsulation Mechanisms Model Checking with Maude Kyber, Saber和SK-MLWR基于格子的密钥封装机制模型检查与Maude
IF 1.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-30 DOI: 10.1049/2023/9399887
Duong Dinh Tran, Kazuhiro Ogata, Santiago Escobar, Sedat Akleylek, Ayoub Otmani

Facing the potential threat raised by quantum computing, a great deal of research from many groups and industrial giants has gone into building public-key post-quantum cryptographic primitives that are resistant to the quantum attackers. Among them, there is a large number of post-quantum key encapsulation mechanisms (KEMs), whose purpose is to provide a secure key exchange, which is a very crucial component in public-key cryptography. This paper presents a formal security analysis of three lattice-based KEMs including Kyber, Saber, and SK-MLWR. We use Maude, a specification language supporting equational and rewriting logic and a high-performance tool equipped with many advanced features, such as a reachability analyzer that can be used as a model checker for invariant properties, to model the three KEMs as state machines. Because they all belong to the class of lattice-based KEMs, they share many common parts in their designs, such as polynomials, vectors, and message exchange patterns. We first model these common parts and combine them into a specification, called base specification. After that, for each of the three KEMs, by extending the base specification, we just need to model some additional parts and the mechanism execution. Once completing the three specifications, we conduct invariant model checkings with the Maude search command, pointing out a similar man-in-the-middle attack. The occurrence of this attack is due to the fact that authentication is not part of the KEMs, and therefore an active attacker can modify all communication between two honest parties.

面对量子计算带来的潜在威胁,许多团体和工业巨头都在进行大量的研究,以构建能够抵抗量子攻击者的公钥后量子密码原语。其中,有大量的后量子密钥封装机制(kem),其目的是提供安全的密钥交换,这是公钥加密中非常关键的组成部分。本文对Kyber、Saber和SK-MLWR三种基于格子的kem进行了形式化的安全性分析。我们使用Maude,一种支持等价和重写逻辑的规范语言,以及一种配备了许多高级特性的高性能工具,例如可用作不变属性的模型检查器的可达性分析器,将三个kem建模为状态机。因为它们都属于基于格的kem类,所以它们在设计中有许多共同的部分,例如多项式、向量和消息交换模式。我们首先对这些公共部分建模,并将它们组合成一个规范,称为基本规范。之后,对于三个kem中的每一个,通过扩展基本规范,我们只需要对一些附加部分和机制执行进行建模。完成这三个规范后,我们使用Maude搜索命令执行不变模型检查,指出类似的中间人攻击。这种攻击的发生是由于身份验证不是kem的一部分,因此主动攻击者可以修改两个诚实方之间的所有通信。
{"title":"Kyber, Saber, and SK-MLWR Lattice-Based Key Encapsulation Mechanisms Model Checking with Maude","authors":"Duong Dinh Tran,&nbsp;Kazuhiro Ogata,&nbsp;Santiago Escobar,&nbsp;Sedat Akleylek,&nbsp;Ayoub Otmani","doi":"10.1049/2023/9399887","DOIUrl":"10.1049/2023/9399887","url":null,"abstract":"<div>\u0000 <p>Facing the potential threat raised by quantum computing, a great deal of research from many groups and industrial giants has gone into building public-key post-quantum cryptographic primitives that are resistant to the quantum attackers. Among them, there is a large number of post-quantum key encapsulation mechanisms (KEMs), whose purpose is to provide a secure key exchange, which is a very crucial component in public-key cryptography. This paper presents a formal security analysis of three lattice-based KEMs including Kyber, Saber, and SK-MLWR. We use Maude, a specification language supporting equational and rewriting logic and a high-performance tool equipped with many advanced features, such as a reachability analyzer that can be used as a model checker for invariant properties, to model the three KEMs as state machines. Because they all belong to the class of lattice-based KEMs, they share many common parts in their designs, such as polynomials, vectors, and message exchange patterns. We first model these common parts and combine them into a specification, called base specification. After that, for each of the three KEMs, by extending the base specification, we just need to model some additional parts and the mechanism execution. Once completing the three specifications, we conduct invariant model checkings with the Maude search command, pointing out a similar man-in-the-middle attack. The occurrence of this attack is due to the fact that authentication is not part of the KEMs, and therefore an active attacker can modify all communication between two honest parties.</p>\u0000 </div>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2023 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2023-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/2023/9399887","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136019437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bit-Sliced Implementation of SM4 and New Performance Records SM4的位切片实现和新的性能记录
IF 1.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-27 DOI: 10.1049/2023/1821499
Xin Miao, Lu Li, Chun Guo, Meiqin Wang, Weijia Wang

SM4 is a popular block cipher issued by the Office of State Commercial Cryptography Administration (OSCCA) of China. In this paper, we use the bit-slicing technique that has been shown as a powerful strategy to achieve very fast software implementations of SM4. We investigate optimizations on two frontiers. First, we present a more efficient bit-sliced representation for SM4, which enables running 64 blocks in parallel with 256-bit registers. Second, we describe an optimized algorithm for data form transformations, also allowing efficient implementations of SM4 under Counter (CTR) mode and Galois/Counter mode. The above optimizations contribute to a significant performance gain on one core compared with the state-of-the-art results. This work is an extension of the conference paper at Inscrypt 2022, awarded the best paper award.

SM4是由中国国家商业密码管理局办公室(OSCCA)发布的一种流行的分组密码。在本文中,我们使用位切片技术作为一种强大的策略来实现非常快速的SM4软件实现。我们研究了两个前沿的优化。首先,我们为SM4提供了一种更有效的位切片表示,它支持使用256位寄存器并行运行64块。其次,我们描述了一种数据形式转换的优化算法,也允许在计数器(CTR)模式和伽罗瓦/计数器模式下有效实现SM4。与最先进的结果相比,上述优化有助于在一个核心上获得显着的性能增益。这项工作是在Inscrypt 2022会议论文的延伸,获得了最佳论文奖。
{"title":"Bit-Sliced Implementation of SM4 and New Performance Records","authors":"Xin Miao,&nbsp;Lu Li,&nbsp;Chun Guo,&nbsp;Meiqin Wang,&nbsp;Weijia Wang","doi":"10.1049/2023/1821499","DOIUrl":"10.1049/2023/1821499","url":null,"abstract":"<div>\u0000 <p>SM4 is a popular block cipher issued by the Office of State Commercial Cryptography Administration (OSCCA) of China. In this paper, we use the bit-slicing technique that has been shown as a powerful strategy to achieve very fast software implementations of SM4. We investigate optimizations on two frontiers. First, we present a more efficient bit-sliced representation for SM4, which enables running 64 blocks in parallel with 256-bit registers. Second, we describe an optimized algorithm for data form transformations, also allowing efficient implementations of SM4 under Counter (CTR) mode and Galois/Counter mode. The above optimizations contribute to a significant performance gain on one core compared with the state-of-the-art results. This work is an extension of the conference paper at Inscrypt 2022, awarded the best paper award.</p>\u0000 </div>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2023 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2023-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/2023/1821499","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136234434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey of Secure Communications for Satellite Internet Based on Cryptography and Physical Layer Security 基于密码学和物理层安全的卫星互联网安全通信研究
IF 1.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-26 DOI: 10.1049/2023/5604802
Yu Zhang, Shuangrui Zhao, Ji He, Yuanyu Zhang, Yulong Shen, Xiaohong Jiang

Satellite internet serves as an indispensable component of the upcoming sixth-generation networks for providing global broadband internet access service. Due to the open nature of satellite-ground communication, security issue in satellite internet has always been an important concern for both industry and academia. Although many researchers focus on secure communications in satellite internet, the literature is surprisingly sparse, with no comprehensive overview of the state-of-the-art security techniques. This paper provides an in-depth survey of secure communications for various satellite internet scenarios. Based on different security mechanisms, we first categorize the existing works of secure communications in satellite internet into two categories: cryptography-based and physical layer security-based. The former includes classical encryption-based and quantum encryption-based secure communication, and the latter is further divided into precoding-based, cooperative jamming-based, relay selection-based, and physical-layer authentication-based secure communication depending on the applied techniques. Finally, we provide some future research directions.

卫星互联网是即将到来的第六代网络不可或缺的组成部分,提供全球宽带互联网接入服务。由于卫星与地面通信的开放性,卫星互联网的安全问题一直是业界和学术界关注的重要问题。尽管许多研究人员关注卫星互联网的安全通信,但令人惊讶的是,文献很少,没有对最先进的安全技术进行全面的概述。本文对各种卫星互联网场景下的安全通信进行了深入的研究。基于不同的安全机制,我们首先将现有的卫星互联网安全通信工作分为两类:基于加密的和基于物理层安全的。前者包括基于经典加密的安全通信和基于量子加密的安全通信,后者根据应用技术的不同又分为基于预编码的、基于协同干扰的、基于中继选择的和基于物理层认证的安全通信。最后,对今后的研究方向进行了展望。
{"title":"A Survey of Secure Communications for Satellite Internet Based on Cryptography and Physical Layer Security","authors":"Yu Zhang,&nbsp;Shuangrui Zhao,&nbsp;Ji He,&nbsp;Yuanyu Zhang,&nbsp;Yulong Shen,&nbsp;Xiaohong Jiang","doi":"10.1049/2023/5604802","DOIUrl":"10.1049/2023/5604802","url":null,"abstract":"<div>\u0000 <p>Satellite internet serves as an indispensable component of the upcoming sixth-generation networks for providing global broadband internet access service. Due to the open nature of satellite-ground communication, security issue in satellite internet has always been an important concern for both industry and academia. Although many researchers focus on secure communications in satellite internet, the literature is surprisingly sparse, with no comprehensive overview of the state-of-the-art security techniques. This paper provides an in-depth survey of secure communications for various satellite internet scenarios. Based on different security mechanisms, we first categorize the existing works of secure communications in satellite internet into two categories: cryptography-based and physical layer security-based. The former includes classical encryption-based and quantum encryption-based secure communication, and the latter is further divided into precoding-based, cooperative jamming-based, relay selection-based, and physical-layer authentication-based secure communication depending on the applied techniques. Finally, we provide some future research directions.</p>\u0000 </div>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2023 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2023-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/2023/5604802","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134907874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cross-Space Conduction Assessment Method of Network Attack Risk under the Strong Coupling Characteristics of Electric Power Cyber Physics 电力网络物理强耦合特性下网络攻击风险跨空间传导评估方法
IF 1.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-25 DOI: 10.1049/2023/9006166
Shenjian Qiu, Jiaxuan Fei, Jian Wang

With the deep integration and wide application of advanced digital sensing, Internet of Things technology, and energy technology in power systems. Power information systems and physical systems are gradually being coupled and developed into power cyber–physical systems (CPS). A number of blackouts in recent years have shown that cyberspace cyber attacks on CPS can lead to the intensification and rapid spread of faults in the physical space of the power grid, and even system collapse. Aiming at the difficulty of analyzing the evolution of cyber–physical cross-space impacts of cyber-attacks, this paper proposes a cross-domain propagation impact assessment method that considers cyber–physical coupling risks caused by attacks. First, according to the multiple coupling relationship between the power system information space and physical space, the monitoring function model and the control function model are established. Second, under the effect of high-concealment attack, analyze the impact of the risk caused by its failure after it is transmitted to the physical space with different propagation probabilities. Finally, the experimental verification was carried out using the IEEE RTS79 standard test system. The simulation results show that the proposed method can comprehensively consider the cyber–physical energy supply coupling relationship, the risk propagation probability, and the operating characteristics of the information system, and effectively quantify and evaluate the impact of information space network attacks on the physical space entity power grid. It further reveals the objective law that information space risks can evolve and spread across domains under the condition of strong coupling of information physics.

随着先进的数字传感、物联网技术和能源技术在电力系统中的深度融合和广泛应用。电力信息系统与物理系统正逐步耦合发展成为电力信息物理系统。近年来的多次停电事件表明,网络空间对CPS的网络攻击会导致电网物理空间故障的加剧和迅速蔓延,甚至导致系统崩溃。针对网络攻击的网络物理跨空间影响演化分析困难的问题,提出了一种考虑攻击引起的网络物理耦合风险的跨域传播影响评估方法。首先,根据电力系统信息空间与物理空间的多重耦合关系,建立了监测功能模型和控制功能模型;其次,在高隐蔽性攻击作用下,分析其失效风险以不同传播概率传播到物理空间后的影响。最后,利用IEEE RTS79标准测试系统进行了实验验证。仿真结果表明,该方法能够综合考虑信息空间网络攻击对物理空间实体电网的影响,综合考虑信息空间网络的能量供应耦合关系、风险传播概率和信息系统的运行特点,有效地量化和评估信息空间网络攻击对物理空间实体电网的影响。进一步揭示了信息物理强耦合条件下信息空间风险跨域演化和扩散的客观规律。
{"title":"Cross-Space Conduction Assessment Method of Network Attack Risk under the Strong Coupling Characteristics of Electric Power Cyber Physics","authors":"Shenjian Qiu,&nbsp;Jiaxuan Fei,&nbsp;Jian Wang","doi":"10.1049/2023/9006166","DOIUrl":"10.1049/2023/9006166","url":null,"abstract":"<div>\u0000 <p>With the deep integration and wide application of advanced digital sensing, Internet of Things technology, and energy technology in power systems. Power information systems and physical systems are gradually being coupled and developed into power cyber–physical systems (CPS). A number of blackouts in recent years have shown that cyberspace cyber attacks on CPS can lead to the intensification and rapid spread of faults in the physical space of the power grid, and even system collapse. Aiming at the difficulty of analyzing the evolution of cyber–physical cross-space impacts of cyber-attacks, this paper proposes a cross-domain propagation impact assessment method that considers cyber–physical coupling risks caused by attacks. First, according to the multiple coupling relationship between the power system information space and physical space, the monitoring function model and the control function model are established. Second, under the effect of high-concealment attack, analyze the impact of the risk caused by its failure after it is transmitted to the physical space with different propagation probabilities. Finally, the experimental verification was carried out using the IEEE RTS79 standard test system. The simulation results show that the proposed method can comprehensively consider the cyber–physical energy supply coupling relationship, the risk propagation probability, and the operating characteristics of the information system, and effectively quantify and evaluate the impact of information space network attacks on the physical space entity power grid. It further reveals the objective law that information space risks can evolve and spread across domains under the condition of strong coupling of information physics.</p>\u0000 </div>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2023 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2023-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/2023/9006166","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135112439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IET Information Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1