首页 > 最新文献

IET Information Security最新文献

英文 中文
Bit-level evaluation of piccolo block cipher by satisfiability problem solver 用可满足性问题求解器评价piccolo分组密码的比特级
IF 1.4 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-05-28 DOI: 10.1049/ise2.12119
Shion Utsumi, Kosei Sakamoto, Takanori Isobe

In the field of symmetric key cryptography, the security against distinguishing attacks is one of the crucial security requirements. With advancements in computing capabilities and cryptanalysis techniques in recent years, more efficient methods have been proposed for exploring distinguishers using Mixed-Integer Linear Programing (MILP) or satisfiability problem (SAT), thereby updating the security bounds of various ciphers. Piccolo is a lightweight block cipher proposed at CHES in 2011, with support 80-bit and 128-bit keys. Designers have undergone a rough security evaluation against differential, impossible differential, and related-key differential attacks, based on nibble-wise estimations due to the limitation of computational resource. Here, the authors perform bit-level evaluations on Piccolo block cipher against differential, integral and impossible differential attacks by leveraging SAT-based approaches. For the first time, the authors succeed in identifying optimal differential distinguisher on 6 rounds in the single key setting, and on 10/12 rounds in the related-key setting for 80-bit and 128-bit keys, respectively. For integral attacks, the authors find integral distinguisher up to 7 rounds. Although the number of attacked rounds is the same as that of the previous attack, the authors find the 56th ordered integral distinguisher, which enable reducing the data complexity for attacks from 263 to 256. As a result, the authors find the 7-round impossible differentials which is the same number of rounds as the previous nibble-wise evaluation.

在对称密钥密码学领域,对区分攻击的安全性是关键的安全要求之一。近年来,随着计算能力和密码分析技术的进步,人们提出了更有效的方法来利用混合整数线性规划(MILP)或可满足性问题(SAT)来探索识别器,从而更新各种密码的安全边界。Piccolo是CHES于2011年提出的一种轻量级分组密码,支持80位和128位密钥。由于计算资源的限制,设计者已经基于半字节估计对差分、不可能差分和相关的密钥差分攻击进行了粗略的安全评估。在这里,作者通过利用基于SAT的方法对Piccolo分组密码进行比特级评估,以抵御差分、积分和不可能的差分攻击。对于80位和128位密钥,作者首次在单密钥设置的6轮和相关密钥设置的10/12轮中成功地识别出最佳差分识别器。对于积分攻击,作者发现积分可以区分多达7轮。尽管被攻击的回合数与前一次攻击相同,但作者发现了第56阶积分分类器,这使得攻击的数据复杂度从263降低到256。因此,作者发现了7轮不可能微分,这与之前的半字节评估的轮数相同。
{"title":"Bit-level evaluation of piccolo block cipher by satisfiability problem solver","authors":"Shion Utsumi,&nbsp;Kosei Sakamoto,&nbsp;Takanori Isobe","doi":"10.1049/ise2.12119","DOIUrl":"https://doi.org/10.1049/ise2.12119","url":null,"abstract":"<p>In the field of symmetric key cryptography, the security against distinguishing attacks is one of the crucial security requirements. With advancements in computing capabilities and cryptanalysis techniques in recent years, more efficient methods have been proposed for exploring distinguishers using Mixed-Integer Linear Programing (MILP) or satisfiability problem (SAT), thereby updating the security bounds of various ciphers. Piccolo is a lightweight block cipher proposed at CHES in 2011, with support 80-bit and 128-bit keys. Designers have undergone a rough security evaluation against differential, impossible differential, and related-key differential attacks, based on nibble-wise estimations due to the limitation of computational resource. Here, the authors perform bit-level evaluations on Piccolo block cipher against differential, integral and impossible differential attacks by leveraging SAT-based approaches. For the first time, the authors succeed in identifying optimal differential distinguisher on 6 rounds in the single key setting, and on 10/12 rounds in the related-key setting for 80-bit and 128-bit keys, respectively. For integral attacks, the authors find integral distinguisher up to 7 rounds. Although the number of attacked rounds is the same as that of the previous attack, the authors find the 56th ordered integral distinguisher, which enable reducing the data complexity for attacks from 2<sup>63</sup> to 2<sup>56</sup>. As a result, the authors find the 7-round impossible differentials which is the same number of rounds as the previous nibble-wise evaluation.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"17 4","pages":"616-625"},"PeriodicalIF":1.4,"publicationDate":"2023-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2.12119","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50147304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
FlowMFD: Characterisation and classification of tor traffic using MFD chromatographic features and spatial–temporal modelling FlowMFD:使用MFD色谱特征和时空建模对tor流量进行表征和分类
IF 1.4 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-05-25 DOI: 10.1049/ise2.12118
Liukun He, Liangmin Wang, Keyang Cheng, Yifan Xu

Tor traffic tracking is valuable for combating cybercrime as it provides insights into the traffic active on the Tor network. Tor-based application traffic classification is one of the tracking methods, which can effectively classify Tor application services. However, it is not effective in classifying specific applications due to more complicated traffic patterns in the spatial and temporal dimensions. As a solution, the authors propose FlowMFD, a novel Tor-based application traffic classification approach using amount-frequency-direction (MFD) chromatographic features and spatial-temporal modelling. Expressly, FlowMFD mines the interaction pattern between Tor applications and servers by analysing the time series features (TSFs) of different size packets. Then MFD chromatographic features (MFDCF) are designed to represent the pattern. Those features integrate multiple low-dimensional TSFs into a single plane and retain most pattern information. In addition, FlowMFD utilises a cascaded model with a two-dimensional convolutional neural network (2D-CNN) and a bidirectional gated recurrent unit to capture spatial-temporal dependencies between MFDCF. The authors evaluate FlowMFD under the public ISCXTor2016 dataset and the self-collected dataset, where we achieve an accuracy of 92.1% (4.2%↑) and 88.3% (4.5%↑), respectively, outperforming state-of-the-art comparison methods.

Tor流量跟踪对于打击网络犯罪很有价值,因为它可以深入了解Tor网络上活跃的流量。基于Tor的应用流量分类是跟踪方法之一,可以有效地对Tor应用服务进行分类。然而,由于在空间和时间维度上更复杂的交通模式,它在对特定应用进行分类方面并不有效。作为一种解决方案,作者提出了FlowMFD,这是一种新的基于Tor的应用流量分类方法,使用量频方向(MFD)色谱特征和时空建模。FlowMFD通过分析不同大小数据包的时间序列特征来挖掘Tor应用程序和服务器之间的交互模式。然后设计MFD色谱特征(MFDCF)来表示模式。这些特征将多个低维TSF集成到单个平面中,并保留了大多数图案信息。此外,FlowMFD利用具有二维卷积神经网络(2D-CNN)和双向门控递归单元的级联模型来捕捉MFDCF之间的时空相关性。作者在公开的ISCXTor2016数据集和自行收集的数据集下评估FlowMFD,我们获得了92.1%(4.2%↑) 88.3%(4.5%↑), 分别优于最先进的比较方法。
{"title":"FlowMFD: Characterisation and classification of tor traffic using MFD chromatographic features and spatial–temporal modelling","authors":"Liukun He,&nbsp;Liangmin Wang,&nbsp;Keyang Cheng,&nbsp;Yifan Xu","doi":"10.1049/ise2.12118","DOIUrl":"https://doi.org/10.1049/ise2.12118","url":null,"abstract":"<p>Tor traffic tracking is valuable for combating cybercrime as it provides insights into the traffic active on the Tor network. Tor-based application traffic classification is one of the tracking methods, which can effectively classify Tor application services. However, it is not effective in classifying specific applications due to more complicated traffic patterns in the spatial and temporal dimensions. As a solution, the authors propose FlowMFD, a novel Tor-based application traffic classification approach using amount-frequency-direction (MFD) chromatographic features and spatial-temporal modelling. Expressly, FlowMFD mines the interaction pattern between Tor applications and servers by analysing the time series features (TSFs) of different size packets. Then MFD chromatographic features (MFDCF) are designed to represent the pattern. Those features integrate multiple low-dimensional TSFs into a single plane and retain most pattern information. In addition, FlowMFD utilises a cascaded model with a two-dimensional convolutional neural network (2D-CNN) and a bidirectional gated recurrent unit to capture spatial-temporal dependencies between MFDCF. The authors evaluate FlowMFD under the public ISCXTor2016 dataset and the self-collected dataset, where we achieve an accuracy of 92.1% (4.2%↑) and 88.3% (4.5%↑), respectively, outperforming state-of-the-art comparison methods.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"17 4","pages":"598-615"},"PeriodicalIF":1.4,"publicationDate":"2023-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2.12118","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50143678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
CryptoEval: Evaluating the risk of cryptographic misuses in Android apps with data-flow analysis CryptoEval:通过数据流分析评估安卓应用程序中密码滥用的风险
IF 1.4 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-05-24 DOI: 10.1049/ise2.12117
Cong Sun, Xinpeng Xu, Yafei Wu, Dongrui Zeng, Gang Tan, Siqi Ma, Peicheng Wang

The misunderstanding and incorrect configurations of cryptographic primitives have exposed severe security vulnerabilities to attackers. Due to the pervasiveness and diversity of cryptographic misuses, a comprehensive and accurate understanding of how cryptographic misuses can undermine the security of an Android app is critical to the subsequent mitigation strategies but also challenging. Although various approaches have been proposed to detect cryptographic misuse in Android apps, studies have yet to focus on estimating the security risks of cryptographic misuse. To address this problem, the authors present an extensible framework for deciding the threat level of cryptographic misuse in Android apps. Firstly, the authors propose a general and unified specification for representing cryptographic misuses to make our framework extensible and develop adapters to unify the detection results of the state-of-the-art cryptographic misuse detectors, resulting in an adapter-based detection tool chain for a more comprehensive list of cryptographic misuses. Secondly, the authors employ a misuse-originating data-flow analysis to connect each cryptographic misuse to a set of data-flow sinks in an app, based on which the authors propose a quantitative data-flow-driven metric for assessing the overall risk of the app introduced by cryptographic misuses. To make the per-app assessment more useful for app vetting at the app-store level, the authors apply unsupervised learning to predict and classify the top risky threats to guide more efficient subsequent mitigation. In the experiments on an instantiated implementation of the framework, the authors evaluate the accuracy of our detection and the effect of data-flow-driven risk assessment of our framework. Our empirical study on over 40,000 apps, and the analysis of popular apps reveal important security observations on the real threats of cryptographic misuse in Android apps.

密码原语的误解和不正确的配置向攻击者暴露了严重的安全漏洞。由于密码滥用的普遍性和多样性,全面准确地了解密码滥用如何破坏安卓应用程序的安全性对后续的缓解策略至关重要,但也具有挑战性。尽管已经提出了各种方法来检测安卓应用程序中的密码滥用,但研究尚未集中在估计密码滥用的安全风险上。为了解决这个问题,作者提出了一个可扩展的框架,用于决定安卓应用程序中密码滥用的威胁级别。首先,作者提出了一个表示密码误用的通用统一规范,以使我们的框架具有可扩展性,并开发适配器来统一最先进的密码误用检测器的检测结果,从而形成了一个基于适配器的检测工具链,用于更全面的密码误用列表。其次,作者采用源自滥用的数据流分析,将每一次加密滥用与应用程序中的一组数据流汇连接起来,在此基础上,作者提出了一个定量的数据流驱动指标,用于评估加密滥用引入的应用程序的总体风险。为了使每个应用程序的评估对应用商店级别的应用程序审查更有用,作者应用无监督学习来预测和分类最高风险威胁,以指导更有效的后续缓解措施。在该框架的实例化实现的实验中,作者评估了我们的检测的准确性以及数据流驱动的框架风险评估的效果。我们对40000多个应用程序的实证研究,以及对流行应用程序的分析,揭示了安卓应用程序中密码滥用的真实威胁的重要安全观察结果。
{"title":"CryptoEval: Evaluating the risk of cryptographic misuses in Android apps with data-flow analysis","authors":"Cong Sun,&nbsp;Xinpeng Xu,&nbsp;Yafei Wu,&nbsp;Dongrui Zeng,&nbsp;Gang Tan,&nbsp;Siqi Ma,&nbsp;Peicheng Wang","doi":"10.1049/ise2.12117","DOIUrl":"https://doi.org/10.1049/ise2.12117","url":null,"abstract":"<p>The misunderstanding and incorrect configurations of cryptographic primitives have exposed severe security vulnerabilities to attackers. Due to the pervasiveness and diversity of cryptographic misuses, a comprehensive and accurate understanding of how cryptographic misuses can undermine the security of an Android app is critical to the subsequent mitigation strategies but also challenging. Although various approaches have been proposed to detect cryptographic misuse in Android apps, studies have yet to focus on estimating the security risks of cryptographic misuse. To address this problem, the authors present an extensible framework for deciding the threat level of cryptographic misuse in Android apps. Firstly, the authors propose a general and unified specification for representing cryptographic misuses to make our framework extensible and develop adapters to unify the detection results of the state-of-the-art cryptographic misuse detectors, resulting in an adapter-based detection tool chain for a more comprehensive list of cryptographic misuses. Secondly, the authors employ a misuse-originating data-flow analysis to connect each cryptographic misuse to a set of data-flow sinks in an app, based on which the authors propose a quantitative data-flow-driven metric for assessing the overall risk of the app introduced by cryptographic misuses. To make the per-app assessment more useful for app vetting at the app-store level, the authors apply unsupervised learning to predict and classify the top risky threats to guide more efficient subsequent mitigation. In the experiments on an instantiated implementation of the framework, the authors evaluate the accuracy of our detection and the effect of data-flow-driven risk assessment of our framework. Our empirical study on over 40,000 apps, and the analysis of popular apps reveal important security observations on the real threats of cryptographic misuse in Android apps.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"17 4","pages":"582-597"},"PeriodicalIF":1.4,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2.12117","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50154035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An interpretable semi-supervised system for detecting cyberattacks using anomaly detection in industrial scenarios 一种可解释的半监督系统,用于在工业场景中使用异常检测来检测网络攻击
IF 1.4 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-05-09 DOI: 10.1049/ise2.12115
Ángel Luis Perales Gómez, Lorenzo Fernández Maimó, Alberto Huertas Celdrán, Félix J. García Clemente

When detecting cyberattacks in Industrial settings, it is not sufficient to determine whether the system is suffering a cyberattack. It is also fundamental to explain why the system is under a cyberattack and which are the assets affected. In this context, the Anomaly Detection based on Machine Learning (ML) and Deep Learning (DL) techniques showed great performance when detecting cyberattacks in industrial scenarios. However, two main limitations hinder using them in a real environment. Firstly, most solutions are trained using a supervised approach, which is impractical in the real industrial world. Secondly, the use of black-box ML and DL techniques makes it impossible to interpret the decision made by the model. This article proposes an interpretable and semi-supervised system to detect cyberattacks in Industrial settings. Besides, our proposal was validated using data collected from the Tennessee Eastman Process. To the best of our knowledge, this system is the only one that offers interpretability together with a semi-supervised approach in an industrial setting. Our system discriminates between causes and effects of anomalies and also achieved the best performance for 11 types of anomalies out of 20 with an overall recall of 0.9577, a precision of 0.9977, and a F1-score of 0.9711.

在工业环境中检测网络攻击时,不足以确定系统是否遭受网络攻击。解释系统为什么受到网络攻击以及哪些资产受到影响也是至关重要的。在这种情况下,基于机器学习(ML)和深度学习(DL)技术的异常检测在检测工业场景中的网络攻击时表现出了良好的性能。然而,有两个主要限制阻碍了在真实环境中使用它们。首先,大多数解决方案都是使用监督方法进行训练的,这在现实工业世界中是不切实际的。其次,黑盒ML和DL技术的使用使得无法解释模型所做的决策。本文提出了一种可解释的半监督系统,用于检测工业环境中的网络攻击。此外,我们的建议还使用从田纳西-伊斯曼过程中收集的数据进行了验证。据我们所知,该系统是唯一一个在工业环境中提供可解释性和半监督方法的系统。我们的系统能够区分异常的原因和影响,在20种异常中,有11种异常表现最佳,总体召回率为0.9577,精度为0.9977,F1得分为0.9711。
{"title":"An interpretable semi-supervised system for detecting cyberattacks using anomaly detection in industrial scenarios","authors":"Ángel Luis Perales Gómez,&nbsp;Lorenzo Fernández Maimó,&nbsp;Alberto Huertas Celdrán,&nbsp;Félix J. García Clemente","doi":"10.1049/ise2.12115","DOIUrl":"https://doi.org/10.1049/ise2.12115","url":null,"abstract":"<p>When detecting cyberattacks in Industrial settings, it is not sufficient to determine whether the system is suffering a cyberattack. It is also fundamental to explain why the system is under a cyberattack and which are the assets affected. In this context, the Anomaly Detection based on Machine Learning (ML) and Deep Learning (DL) techniques showed great performance when detecting cyberattacks in industrial scenarios. However, two main limitations hinder using them in a real environment. Firstly, most solutions are trained using a supervised approach, which is impractical in the real industrial world. Secondly, the use of black-box ML and DL techniques makes it impossible to interpret the decision made by the model. This article proposes an interpretable and semi-supervised system to detect cyberattacks in Industrial settings. Besides, our proposal was validated using data collected from the Tennessee Eastman Process. To the best of our knowledge, this system is the only one that offers interpretability together with a semi-supervised approach in an industrial setting. Our system discriminates between causes and effects of anomalies and also achieved the best performance for 11 types of anomalies out of 20 with an overall recall of 0.9577, a precision of 0.9977, and a F1-score of 0.9711.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"17 4","pages":"553-566"},"PeriodicalIF":1.4,"publicationDate":"2023-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2.12115","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50126571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revocable identity-based matchmaking encryption in the standard model 标准模型中基于可撤销身份的匹配加密
IF 1.4 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-05-09 DOI: 10.1049/ise2.12116
Zhe Jiang, Xiwen Wang, Kai Zhang, Junqing Gong, Jie Chen, Haifeng Qian

Identity-based Matchmaking Encryption (IB-ME) is an extension notion of matchmaking encryption (CRYPTO 2019), where a sender and a receiver can specify an access policy for the other party. In IB-ME, data encryption is performed by not only a receiver identity but also a sender's encryption key. Nevertheless, previous IB-ME schemes have not considered the problem of efficient revocation. Hence, the authors introduce a new notion of revocable IB-ME (RIB-ME) and formalise the syntax and security model of RIB-ME. In particular, the authors give an effective and simple construction of RIB-ME in the standard model, whose security is reduced to the hardness of decisional bilinear Diffie—Hellman problem and computational Diffie—Hellman problem. In addition, the authors show two extensions of our RIB-ME scheme to consider chosen-ciphertext security and forward privacy.

基于身份的配对加密(IB-ME)是配对加密(CRYPTO 2019)的扩展概念,其中发送方和接收方可以为另一方指定访问策略。在IB-ME中,数据加密不仅通过接收方身份来执行,还通过发送方的加密密钥来执行。然而,以前的IB-ME方案没有考虑有效撤销的问题。因此,作者引入了可撤销IB-ME(RIB-ME)的新概念,并将RIB-ME的语法和安全模型形式化。特别是,作者在标准模型中给出了一个有效而简单的RIB-ME构造,其安全性降低到决策双线性Diffie-Hellman问题和计算Diffie-Hell man问题的硬度。此外,作者还展示了我们的RIB-ME方案的两个扩展,以考虑所选密文的安全性和前向隐私。
{"title":"Revocable identity-based matchmaking encryption in the standard model","authors":"Zhe Jiang,&nbsp;Xiwen Wang,&nbsp;Kai Zhang,&nbsp;Junqing Gong,&nbsp;Jie Chen,&nbsp;Haifeng Qian","doi":"10.1049/ise2.12116","DOIUrl":"https://doi.org/10.1049/ise2.12116","url":null,"abstract":"<p>Identity-based Matchmaking Encryption (IB-ME) is an extension notion of matchmaking encryption (CRYPTO 2019), where a sender and a receiver can specify an access policy for the other party. In IB-ME, data encryption is performed by not only a receiver identity but also a sender's encryption key. Nevertheless, previous IB-ME schemes have not considered the problem of <i>efficient revocation</i>. Hence, the authors introduce a new notion of revocable IB-ME (RIB-ME) and formalise the syntax and security model of RIB-ME. In particular, the authors give an effective and simple construction of RIB-ME in the standard model, whose security is reduced to the hardness of decisional bilinear Diffie—Hellman problem and computational Diffie—Hellman problem. In addition, the authors show two extensions of our RIB-ME scheme to consider chosen-ciphertext security and forward privacy.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"17 4","pages":"567-581"},"PeriodicalIF":1.4,"publicationDate":"2023-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2.12116","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50126572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Meet-in-the-middle attacks on round-reduced CRAFT based on automatic search 基于自动搜索的圆形精简CRAFT中间相遇攻击
IF 1.4 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-04-02 DOI: 10.1049/ise2.12114
Zhangjun Ma, Manman Li, Shaozhen Chen

CRAFT is a lightweight block cipher designed by Beierle et al. to effectively resist differential fault attacks at fast software encryption 2019. In this article, Demirci-Selçuk meet-in-the-middle (DS-MITM) attacks on round-reduced CRAFT based on automatic search are proposed. A DS-MITM automatic search model for CRAFT was constructed, and then, the automatic search model was used to detect a 9-round DS-MITM distinguisher. The strong relations between the round-subtweakeys were observed and the key-dependent sieve technique was adopted to reduce the memory complexity of the attack. Based on the 9-round distinguisher, a 19-round DS-MITM attack can be presented. Due to the strong key relations, the time complexity can be reduced by the key-bridging technique and the equivalent round-subtweakey. The time complexity of the 19-round DS-MITM attack is 2114.68 19-round CRAFT encryption, the data complexity is 256 chosen plaintexts, and the memory complexity is 2109 64-bit blocks. Adding one round to the end of the 19-round DS-MITM attack, a 20-round DS-MITM attack can be proposed. The time complexity of the 20-round attack is 2126.94 20-round CRAFT encryption, the data complexity is 256 chosen plaintexts, and the memory complexity is 2109 64-bit blocks.

CRAFT是Beierle等人设计的一种轻量级分组密码。以有效抵御快速软件加密2019中的差分故障攻击。本文提出了基于自动搜索的圆形精简CRAFT的Demirci Selçuk中间相遇(DS-MITM)攻击。建立了CRAFT的DS-MITM自动搜索模型,并利用该自动搜索模型对9轮DS-MITM分类器进行了检测。观察到圆形子密钥之间的强关系,并采用密钥相关的筛选技术来降低攻击的记忆复杂性。基于9轮识别器,可以提出一种19轮DS-MITM攻击。由于强密钥关系,可以通过密钥桥接技术和等效的圆形子密钥来降低时间复杂度。19轮DS-MITM攻击的时间复杂度为2114.68次19轮CRAFT加密,数据复杂度为256个选择明文,内存复杂度为2109个64位块。在19轮DS-MITM攻击的末尾增加一轮,可以提出20轮DS-MIDM攻击。20轮攻击的时间复杂度为2126.94 20轮CRAFT加密,数据复杂度为256个选择明文,内存复杂度为2109个64位块。
{"title":"Meet-in-the-middle attacks on round-reduced CRAFT based on automatic search","authors":"Zhangjun Ma,&nbsp;Manman Li,&nbsp;Shaozhen Chen","doi":"10.1049/ise2.12114","DOIUrl":"https://doi.org/10.1049/ise2.12114","url":null,"abstract":"<p>CRAFT is a lightweight block cipher designed by Beierle et al. to effectively resist differential fault attacks at fast software encryption 2019. In this article, Demirci-Selçuk meet-in-the-middle (DS-MITM) attacks on round-reduced CRAFT based on automatic search are proposed. A DS-MITM automatic search model for CRAFT was constructed, and then, the automatic search model was used to detect a 9-round DS-MITM distinguisher. The strong relations between the round-subtweakeys were observed and the key-dependent sieve technique was adopted to reduce the memory complexity of the attack. Based on the 9-round distinguisher, a 19-round DS-MITM attack can be presented. Due to the strong key relations, the time complexity can be reduced by the key-bridging technique and the equivalent round-subtweakey. The time complexity of the 19-round DS-MITM attack is 2<sup>114.68</sup> 19-round CRAFT encryption, the data complexity is 2<sup>56</sup> chosen plaintexts, and the memory complexity is 2<sup>109</sup> 64-bit blocks. Adding one round to the end of the 19-round DS-MITM attack, a 20-round DS-MITM attack can be proposed. The time complexity of the 20-round attack is 2<sup>126.94</sup> 20-round CRAFT encryption, the data complexity is 2<sup>56</sup> chosen plaintexts, and the memory complexity is 2<sup>109</sup> 64-bit blocks.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"17 3","pages":"534-543"},"PeriodicalIF":1.4,"publicationDate":"2023-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2.12114","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50117512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hardware-assisted remote attestation design for critical embedded systems 关键嵌入式系统的硬件辅助远程认证设计
IF 1.4 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-14 DOI: 10.1049/ise2.12113
Munir Geden, Kasper Rasmussen

Remote attestation, as a challenge-response protocol, enables a trusted entity, called verifier, to ask a potentially infected device, called prover, to provide integrity assurance about its internal state. Remote attestation is becoming increasingly vital for embedded systems that serve in many critical domains, as part of health, military, transportation and industry services, but still lack the most security features available to high-end systems. In most attestation techniques, the prover provides a cryptographic checksum of its static memory contents, that is, code segments, to the verifier when requested to demonstrate that the device is loaded with the right software. However, those measurements are subject to two limitations. First, they cannot guarantee that the prover has always had legitimate software in the memory prior to attestation. This is because occasional measurements, triggered by the verifier, still leave the device vulnerable to the compromise between two attestation windows as a time-of-check-to-time-of-use (TOCTOU) problem. Second, including dynamic memory regions in the checksum calculation is not helpful in practice, since the verifier typically does not know what those regions should contain or which checksums should be accepted as valid. Hence, many attack scenarios residing in those dynamic regions (e.g. stack) would also go unnoticed. To reveal attack scenarios exploiting the memory regions and time windows left unattested, we propose an attestation scheme that can continuously monitor both static and dynamic memory regions with better spatial and temporal attestation coverage. Our monitoring mechanism is designed to be performed in real time using a novel hardware security module (HSM) connected to the prover's system bus. The proposed HSM monitors not only the integrity of the code on the prover but also its execution by checking the compliance of the bits seen on the bus according to a runtime integrity model (RIM) of the prover's software. Therefore, our attestation scheme is capable of reporting scenarios that violate both the (static) code and (dynamic) runtime integrity since the deployment time.

远程认证作为一种质询-响应协议,使一个被称为验证器的可信实体能够要求一个被潜在感染的设备(称为证明者)提供其内部状态的完整性保证。远程认证对于在许多关键领域服务的嵌入式系统来说越来越重要,这些领域是卫生、军事、运输和工业服务的一部分,但仍然缺乏高端系统可用的最安全功能。在大多数证明技术中,当被要求证明设备加载了正确的软件时,证明者向验证器提供其静态存储器内容(即代码段)的密码校验和。然而,这些测量受到两个限制。首先,他们不能保证证明者在证明之前总是在内存中有合法的软件。这是因为由验证器触发的偶尔测量仍然会使设备容易受到两个证明窗口之间的折衷影响,这是检查时间到使用时间(TOCTOU)问题。其次,在校验和计算中包括动态存储器区域在实践中没有帮助,因为验证器通常不知道这些区域应该包含什么,或者哪些校验和应该被接受为有效。因此,驻留在这些动态区域(例如堆栈)中的许多攻击场景也会被忽视。为了揭示利用未经测试的内存区域和时间窗口的攻击场景,我们提出了一种证明方案,该方案可以连续监控静态和动态内存区域,并具有更好的空间和时间证明覆盖率。我们的监控机制设计为使用连接到证明方系统总线的新型硬件安全模块(HSM)实时执行。所提出的HSM不仅监控证明器上代码的完整性,而且通过根据证明器软件的运行时完整性模型(RIM)检查总线上看到的位的一致性来监控其执行。因此,我们的证明方案能够报告自部署以来违反(静态)代码和(动态)运行时完整性的场景。
{"title":"Hardware-assisted remote attestation design for critical embedded systems","authors":"Munir Geden,&nbsp;Kasper Rasmussen","doi":"10.1049/ise2.12113","DOIUrl":"https://doi.org/10.1049/ise2.12113","url":null,"abstract":"<p>Remote attestation, as a challenge-response protocol, enables a trusted entity, called <i>verifier</i>, to ask a potentially infected device, called <i>prover</i>, to provide integrity assurance about its internal state. Remote attestation is becoming increasingly vital for embedded systems that serve in many critical domains, as part of health, military, transportation and industry services, but still lack the most security features available to high-end systems. In most attestation techniques, the prover provides a cryptographic checksum of its static memory contents, that is, code segments, to the verifier when requested to demonstrate that the device is loaded with the right software. However, those measurements are subject to two limitations. First, they cannot guarantee that the prover has always had legitimate software in the memory prior to attestation. This is because occasional measurements, triggered by the verifier, still leave the device vulnerable to the compromise between two attestation windows as a time-of-check-to-time-of-use (TOCTOU) problem. Second, including dynamic memory regions in the checksum calculation is not helpful in practice, since the verifier typically does not know what those regions should contain or which checksums should be accepted as valid. Hence, many attack scenarios residing in those dynamic regions (e.g. stack) would also go unnoticed. To reveal attack scenarios exploiting the memory regions and time windows left unattested, we propose an attestation scheme that can continuously monitor both static and dynamic memory regions with better spatial and temporal attestation coverage. Our monitoring mechanism is designed to be performed in real time using a novel hardware security module (HSM) connected to the prover's system bus. The proposed HSM monitors not only the integrity of the code on the prover but also its execution by checking the compliance of the bits seen on the bus according to a runtime integrity model (RIM) of the prover's software. Therefore, our attestation scheme is capable of reporting scenarios that violate both the (static) code and (dynamic) runtime integrity since the deployment time.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"17 3","pages":"518-533"},"PeriodicalIF":1.4,"publicationDate":"2023-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2.12113","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50132835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient inner product arguments and their applications in range proofs 有效内积自变量及其在区间证明中的应用
IF 1.4 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-08 DOI: 10.1049/ise2.12111
Zibo Zhou, Zongyang Zhang, Hongyu Tao, Tianyu Li, Boyu Zhao

Inner product arguments allow a prover to prove that the inner product of two committed vectors equals a public scalar. They are used to reduce the complexity of many cryptographic primitives, such as range proofs. Range proofs are deployed in numerous applications to prove that a committed value lies in a certain range. As core building blocks, their complexity largely determines the performance of corresponding applications. In this paper, we have optimised the inner product argument with statement including two vector commitments (IPAtvc) and range proof of Daza et al. (PKC’20), the inner product argument with statement including only one vector commitment (IPAovc) of Bünz et al. (S&P′18). For IPAtvc, we reduce the concrete communication complexity by 2 log2n field elements, where n is the vector dimension. For range proofs, we reduce the concrete communication and prover complexities by about 2 log2m field elements and 11m field multiplications, respectively, where m is the bit length of range. For IPAovc, we exponentially reduce the asymptotic verifier complexity from linear to logarithmic. Due to the asymptotic characteristics, our protocols are highly competitive when the vector dimension or bit length of range is large.

内积自变量允许证明者证明两个提交向量的内积等于公共标量。它们用于降低许多密码原语的复杂性,例如范围证明。范围证明被部署在许多应用程序中,以证明承诺的价值在一定范围内。作为核心构建块,它们的复杂性在很大程度上决定了相应应用程序的性能。在本文中,我们用包括两个向量承诺(IPAtvc)和Daza等人的范围证明的陈述优化了内积论点。(PKC’20),内积论点,其陈述仅包括Bünz等人的一个向量承诺(IPAovc)。(标准普尔′18)。对于IPAtvc,我们将具体通信复杂性降低了2 log2n个场元素,其中n是向量维度。对于范围证明,我们将具体通信和证明器的复杂性降低了约2 log2m字段元素和11m字段乘法,其中m是范围的比特长度。对于IPAovc,我们将渐近验证器的复杂度从线性指数降低到对数。由于渐近特性,当范围的向量维数或比特长度较大时,我们的协议具有很强的竞争力。
{"title":"Efficient inner product arguments and their applications in range proofs","authors":"Zibo Zhou,&nbsp;Zongyang Zhang,&nbsp;Hongyu Tao,&nbsp;Tianyu Li,&nbsp;Boyu Zhao","doi":"10.1049/ise2.12111","DOIUrl":"https://doi.org/10.1049/ise2.12111","url":null,"abstract":"<p>Inner product arguments allow a prover to prove that the inner product of two committed vectors equals a public scalar. They are used to reduce the complexity of many cryptographic primitives, such as range proofs. Range proofs are deployed in numerous applications to prove that a committed value lies in a certain range. As core building blocks, their complexity largely determines the performance of corresponding applications. In this paper, we have optimised the inner product argument with statement including two vector commitments (IPA<sub>tvc</sub>) and range proof of Daza et al. (PKC’20), the inner product argument with statement including only one vector commitment (IPA<sub>ovc</sub>) of Bünz et al. (S&amp;P′18). For IPA<sub>tvc</sub>, we reduce the concrete communication complexity by 2 log<sub>2</sub><i>n</i> field elements, where <i>n</i> is the vector dimension. For range proofs, we reduce the concrete communication and prover complexities by about 2 log<sub>2</sub><i>m</i> field elements and 11<i>m</i> field multiplications, respectively, where <i>m</i> is the bit length of range. For IPA<sub>ovc</sub>, we exponentially reduce the asymptotic verifier complexity from linear to logarithmic. Due to the asymptotic characteristics, our protocols are highly competitive when the vector dimension or bit length of range is large.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"17 3","pages":"485-504"},"PeriodicalIF":1.4,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2.12111","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50125357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A fast user actual privilege reasoning framework based on privilege dependency graph reduction 基于权限依赖图约简的快速用户实际权限推理框架
IF 1.4 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-07 DOI: 10.1049/ise2.12112
Wei Bai, Angxuan Cheng, Cailing Wang, Zhisong Pan

It is a key point to find out the actual privileges of network users in network security risk assessment. The Privilege dependency graph (PDG) provides an effective way to reason the actual privileges of network users from their initial privileges. The existing User Actual Privilege reasoning method is time-consuming and not suitable for large-scale networks. This paper introduces a fast User Actual Privilege reasoning framework based on PDG reduction. The core idea is to reduce the size of the graph as much as possible before the actual privilege reasoning. Three different nodes merged scenarios are proposed and discussed, as well as the influences of different execution sequences and execution times. Networks of different sizes were simulated to validate the effectiveness and scalability of their method. The experimental results show that the proposed method can decrease the time of User Actual Privilege reasoning by over 25% in large-scale networks.

了解网络用户的实际权限是网络安全风险评估的关键。特权依赖图(PDG)提供了一种有效的方法来从网络用户的初始特权推断网络用户的实际特权。现有的用户实际权限推理方法耗时长,不适合大规模网络。本文介绍了一种基于PDG约简的快速用户实际权限推理框架。核心思想是在实际的特权推理之前尽可能地减小图的大小。提出并讨论了三种不同的节点合并场景,以及不同执行顺序和执行时间的影响。对不同规模的网络进行了仿真,以验证其方法的有效性和可扩展性。实验结果表明,在大规模网络中,该方法可以将用户实际权限推理的时间减少25%以上。
{"title":"A fast user actual privilege reasoning framework based on privilege dependency graph reduction","authors":"Wei Bai,&nbsp;Angxuan Cheng,&nbsp;Cailing Wang,&nbsp;Zhisong Pan","doi":"10.1049/ise2.12112","DOIUrl":"https://doi.org/10.1049/ise2.12112","url":null,"abstract":"<p>It is a key point to find out the actual privileges of network users in network security risk assessment. The Privilege dependency graph (PDG) provides an effective way to reason the actual privileges of network users from their initial privileges. The existing User Actual Privilege reasoning method is time-consuming and not suitable for large-scale networks. This paper introduces a fast User Actual Privilege reasoning framework based on PDG reduction. The core idea is to reduce the size of the graph as much as possible before the actual privilege reasoning. Three different nodes merged scenarios are proposed and discussed, as well as the influences of different execution sequences and execution times. Networks of different sizes were simulated to validate the effectiveness and scalability of their method. The experimental results show that the proposed method can decrease the time of User Actual Privilege reasoning by over 25% in large-scale networks.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"17 3","pages":"505-517"},"PeriodicalIF":1.4,"publicationDate":"2023-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2.12112","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50137415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Nonce-misuse resilience of Romulus-N and GIFT-COFB Romulus-N和GIFT-COFB的非滥用弹性
IF 1.4 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-02-11 DOI: 10.1049/ise2.12110
Akiko Inoue, Chun Guo, Kazuhiko Minematsu

Nonce-misuse resilience (NMRL) security of Romulus-N and GIFT-COFB is analysed, the two finalists of NIST Lightweight Cryptography project for standardising lightweight authenticated encryption. NMRL, introduced by Ashur et al. at CRYPTO 2017, is a relaxed security notion from a stronger, nonce-misuse resistance notion. The authors have proved that Romulus-N and GIFT- COFB have nonce-misuse resilience. For Romulus-N, the perfect privacy (NMRL-PRIV) and n/2-bit authenticity (NMRL-AUTH) with graceful degradation with respect to nonce repetition are showed. For GIFT-COFB, n/4-bit security for both NMRL-PRIV and NMRL-AUTH notions is showed.

分析了NIST轻量级加密项目标准化轻量级认证加密的两个最终入围者Romulus-N和GIFT-COFB的非滥用弹性(NMRL)安全性。NMRL,由Ashur等人介绍。在CRYPTO 2017上,这是一个从更强大的、非滥用抵抗概念转变而来的宽松的安全概念。作者证明了Romulus-N和GIFT-COFB具有随机误用弹性。对于Romulus-N,显示了相对于非ce重复具有优美退化的完美私密性(NMRL-PRIV)和N/2位真实性(NMRL-AUTH)。对于GIFT-COFB,给出了NMRL-PRIV和NMRL-AUTH概念的n/4位安全性。
{"title":"Nonce-misuse resilience of Romulus-N and GIFT-COFB","authors":"Akiko Inoue,&nbsp;Chun Guo,&nbsp;Kazuhiko Minematsu","doi":"10.1049/ise2.12110","DOIUrl":"https://doi.org/10.1049/ise2.12110","url":null,"abstract":"<p>Nonce-misuse resilience (NMRL) security of Romulus-N and GIFT-COFB is analysed, the two finalists of NIST Lightweight Cryptography project for standardising lightweight authenticated encryption. NMRL, introduced by Ashur et al. at CRYPTO 2017, is a relaxed security notion from a stronger, nonce-misuse resistance notion. The authors have proved that Romulus-N and GIFT- COFB have nonce-misuse resilience. For Romulus-N, the perfect privacy (NMRL-PRIV) and <i>n</i>/2-bit authenticity (NMRL-AUTH) with graceful degradation with respect to nonce repetition are showed. For GIFT-COFB, <i>n</i>/4-bit security for both NMRL-PRIV and NMRL-AUTH notions is showed.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"17 3","pages":"468-484"},"PeriodicalIF":1.4,"publicationDate":"2023-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2.12110","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50128528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
IET Information Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1