首页 > 最新文献

IET Information Security最新文献

英文 中文
Guest Editorial: Guest Editorial on Cryptanalysis of (NIST PQC) post-quantum proposals 客座编辑:(NIST PQC)后量子提案的密码分析客座编辑
IF 1.4 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-01-31 DOI: 10.1049/ise2.12105
Ayoub Otmani, Christophe Petit, Mehdi Tibouchi
<p>Public-key cryptography is now ubiquitous in our lives, protecting everyday interactions ranging from mobile and wireless communications to banking transactions, over-the-air software updates, electronic voting or digital car keys. However, almost the entirety of currently deployed public-key cryptography implementations rely on the hardness of integer factorisation or computing discrete logarithms, and both problems are known to be easy to solve using large-scale quantum computers. Whether such large-scale computers are years away, decades away or more remains to be seen, but since they would break the security of so many critical systems essentially overnight, preparing the transition from classical cryptography to so-called <i>post-quantum</i> primitives, which are believed to be secure even against quantum computers, is seen as necessary and urgent—particularly as updating existing systems is likely to be a lengthy process, and some systems rely on the security of cryptographic keys over long periods of time.</p><p>In view of these challenges, starting in 2016, US standards institute NIST has been running a standardisation effort in order to come up with post-quantum encryption and signature schemes ready for deployment. The first four selected primitives have been announced in July 2022, with other schemes undergoing further analysis. Concurrently, other countries, such as the Republic of Korea, have launched similar standardisation processes.</p><p>One of the difficulties involved in running such standardisation processes and selecting primitives is security estimation: in order to set parameters for candidate schemes and to make apple-to-apple comparisons between them, consistent security levels need to be defined, and evidence that the schemes achieve those levels needs to be provided. This is typically done by estimating the cost of the best attacks (both classical and quantum) against the proposed constructions. <i>Cryptanalysis</i> is thus an essential tool for design and standardisation. Not only does it allow to provide and progressively refine security estimates, it also sometimes eliminates entire schemes, plain and simple, by uncovering serious security flaws. Both applications of cryptanalysis have been extensively represented in the NIST standardisation process in particular.</p><p>Since some post-quantum proposals rely on relatively new assumptions that have only received much scrutiny as part of the standardisation processes, their cryptanalysis is a fast-changing landscape. Very recent, dramatic developments include W. Beullens' cryptanalysis of the Rainbow multivariate signature, and W. Castryk and T. Decru's cryptanalysis of the SIKE isogeny-based KEM (along with several follow-ups). Both Rainbow and SIKE were serious contenders for eventual standardisation. Those surprising results, which appeared too late to be captured in this special issue, are thus further testimonies to the utmost importance of cryptanalytic work a
公钥密码术现在在我们的生活中无处不在,保护着从移动和无线通信到银行交易、空中软件更新、电子投票或数字汽车钥匙的日常互动。然而,目前部署的几乎所有公钥密码实现都依赖于整数分解或计算离散对数的硬度,众所周知,使用大规模量子计算机很容易解决这两个问题。这种大规模的计算机是否还有几年、几十年或更长的时间还有待观察,但由于它们基本上会在一夜之间破坏许多关键系统的安全性,为从经典密码学向所谓的后量子基元的过渡做准备,人们认为,即使对量子计算机来说,后量子基基元也是安全的,被视为必要和紧迫的——特别是更新现有系统可能是一个漫长的过程,而且一些系统在很长一段时间内依赖加密密钥的安全性。鉴于这些挑战,从2016年开始,美国标准研究所NIST一直在进行标准化工作,以提出可供部署的后量子加密和签名方案。前四个选定的原语已于2022年7月公布,其他方案正在进行进一步分析。与此同时,大韩民国等其他国家也启动了类似的标准化进程。运行此类标准化过程和选择原语的困难之一是安全性估计:为了为候选方案设置参数并在它们之间进行苹果与苹果的比较,需要定义一致的安全级别,并提供方案达到这些级别的证据。这通常是通过估计针对所提出的构造的最佳攻击(包括经典攻击和量子攻击)的成本来完成的。因此,密码分析是设计和标准化的重要工具。它不仅允许提供并逐步完善安全估计,有时还通过发现严重的安全缺陷来消除整个方案,简单明了。尤其是在NIST标准化过程中,密码分析的两种应用都得到了广泛的体现。由于一些后量子提案依赖于相对较新的假设,而这些假设只是标准化过程中的一部分,因此它们的密码分析是一个快速变化的领域。最近,戏剧性的发展包括W.Beullens对Rainbow多元签名的密码分析,以及W.Castryk和T.Decru对基于SIKE同源性的KEM的密码分析(以及一些后续研究)。Rainbow和SIKE都是最终标准化的有力竞争者。这些令人惊讶的结果似乎为时已晚,无法在本期特刊中捕捉到,因此进一步证明了密码分析工作作为标准化工作的一部分的极端重要性。因此,我们希望本期特刊中的贡献将对社会具有重大价值,因为它们记录并以可访问的方式呈现了重要成果,以实现获得后量子密码学安全可靠标准的目标。
{"title":"Guest Editorial: Guest Editorial on Cryptanalysis of (NIST PQC) post-quantum proposals","authors":"Ayoub Otmani,&nbsp;Christophe Petit,&nbsp;Mehdi Tibouchi","doi":"10.1049/ise2.12105","DOIUrl":"https://doi.org/10.1049/ise2.12105","url":null,"abstract":"&lt;p&gt;Public-key cryptography is now ubiquitous in our lives, protecting everyday interactions ranging from mobile and wireless communications to banking transactions, over-the-air software updates, electronic voting or digital car keys. However, almost the entirety of currently deployed public-key cryptography implementations rely on the hardness of integer factorisation or computing discrete logarithms, and both problems are known to be easy to solve using large-scale quantum computers. Whether such large-scale computers are years away, decades away or more remains to be seen, but since they would break the security of so many critical systems essentially overnight, preparing the transition from classical cryptography to so-called &lt;i&gt;post-quantum&lt;/i&gt; primitives, which are believed to be secure even against quantum computers, is seen as necessary and urgent—particularly as updating existing systems is likely to be a lengthy process, and some systems rely on the security of cryptographic keys over long periods of time.&lt;/p&gt;&lt;p&gt;In view of these challenges, starting in 2016, US standards institute NIST has been running a standardisation effort in order to come up with post-quantum encryption and signature schemes ready for deployment. The first four selected primitives have been announced in July 2022, with other schemes undergoing further analysis. Concurrently, other countries, such as the Republic of Korea, have launched similar standardisation processes.&lt;/p&gt;&lt;p&gt;One of the difficulties involved in running such standardisation processes and selecting primitives is security estimation: in order to set parameters for candidate schemes and to make apple-to-apple comparisons between them, consistent security levels need to be defined, and evidence that the schemes achieve those levels needs to be provided. This is typically done by estimating the cost of the best attacks (both classical and quantum) against the proposed constructions. &lt;i&gt;Cryptanalysis&lt;/i&gt; is thus an essential tool for design and standardisation. Not only does it allow to provide and progressively refine security estimates, it also sometimes eliminates entire schemes, plain and simple, by uncovering serious security flaws. Both applications of cryptanalysis have been extensively represented in the NIST standardisation process in particular.&lt;/p&gt;&lt;p&gt;Since some post-quantum proposals rely on relatively new assumptions that have only received much scrutiny as part of the standardisation processes, their cryptanalysis is a fast-changing landscape. Very recent, dramatic developments include W. Beullens' cryptanalysis of the Rainbow multivariate signature, and W. Castryk and T. Decru's cryptanalysis of the SIKE isogeny-based KEM (along with several follow-ups). Both Rainbow and SIKE were serious contenders for eventual standardisation. Those surprising results, which appeared too late to be captured in this special issue, are thus further testimonies to the utmost importance of cryptanalytic work a","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"17 2","pages":"159-160"},"PeriodicalIF":1.4,"publicationDate":"2023-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2.12105","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50156078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modelling penetration testing with reinforcement learning using capture-the-flag challenges: Trade-offs between model-free learning and a priori knowledge 使用捕获标志的强化学习建模渗透测试挑战:无模型学习和先验知识之间的权衡
IF 1.4 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-01-27 DOI: 10.1049/ise2.12107
Fabio Massimo Zennaro, László Erdődi

Penetration testing is a security exercise aimed at assessing the security of a system by simulating attacks against it. So far, penetration testing has been carried out mainly by trained human attackers and its success critically depended on the available expertise. Automating this practice constitutes a non-trivial problem because of the range and complexity of actions that a human expert may attempt. The authors focus their attention on simplified penetration testing problems expressed in the form of capture the flag hacking challenges, and analyse how model-free reinforcement learning algorithms may help solving them. In modelling these capture the flag competitions as reinforcement learning problems the authors highlight the specific challenges that characterize penetration testing. The authors show how this challenge may be eased by relying on different forms of prior knowledge that may be provided to the agent. Since complexity scales exponentially as soon as the set of states and actions for the reinforcement learning agent is extended, the need to restrict the exploration space by using techniques to inject a priori knowledge is highlighted, thus making it possible to achieve solutions more efficiently.

渗透测试是一种安全演习,旨在通过模拟针对系统的攻击来评估系统的安全性。到目前为止,渗透测试主要由训练有素的人类攻击者进行,其成功与否主要取决于可用的专业知识。由于人类专家可能尝试的行动的范围和复杂性,自动化这一实践构成了一个不平凡的问题。作者将注意力集中在以捕获标志黑客挑战的形式表达的简化渗透测试问题上,并分析无模型强化学习算法如何帮助解决这些问题。在将这些旗帜竞赛建模为强化学习问题时,作者强调了渗透测试的具体挑战。作者展示了如何通过依赖于可以提供给代理人的不同形式的先验知识来缓解这一挑战。由于增强学习代理的状态和动作集一扩展,复杂性就呈指数级增长,因此强调了通过使用注入先验知识的技术来限制探索空间的必要性,从而使更有效地实现解决方案成为可能。
{"title":"Modelling penetration testing with reinforcement learning using capture-the-flag challenges: Trade-offs between model-free learning and a priori knowledge","authors":"Fabio Massimo Zennaro,&nbsp;László Erdődi","doi":"10.1049/ise2.12107","DOIUrl":"https://doi.org/10.1049/ise2.12107","url":null,"abstract":"<p>Penetration testing is a security exercise aimed at assessing the security of a system by simulating attacks against it. So far, penetration testing has been carried out mainly by trained human attackers and its success critically depended on the available expertise. Automating this practice constitutes a non-trivial problem because of the range and complexity of actions that a human expert may attempt. The authors focus their attention on simplified penetration testing problems expressed in the form of capture the flag hacking challenges, and analyse how model-free reinforcement learning algorithms may help solving them. In modelling these capture the flag competitions as reinforcement learning problems the authors highlight the specific challenges that characterize penetration testing. The authors show how this challenge may be eased by relying on different forms of prior knowledge that may be provided to the agent. Since complexity scales exponentially as soon as the set of states and actions for the reinforcement learning agent is extended, the need to restrict the exploration space by using techniques to inject a priori knowledge is highlighted, thus making it possible to achieve solutions more efficiently.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"17 3","pages":"441-457"},"PeriodicalIF":1.4,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2.12107","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50154901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
MILP-based security evaluation for AEGIS/Tiaoxin-346/Rocca 基于MILP的AEGIS/Tiaoxin-346/Rocca安全性评价
IF 1.4 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-01-27 DOI: 10.1049/ise2.12109
Takuro Shiraya, Nobuyuki Takeuchi, Kosei Sakamoto, Takanori Isobe

In this paper, the security of Advanced Encryption Standard-based authenticated encryption schemes, including AEGIS family, Tiaoxin-346, and Rocca by mixed integer linear programming tools is examined. Specifically, for the initialisation phase of AEGIS, Tiaoxin-346, and Rocca, the security against differential attacks and integral attacks is evaluated by estimating the lower bounds for the number of active S-boxes and utilising division property, respectively. In addition to the estimations of initialisation phases, the security of the encryption phases of AEGIS, Tiaoxin-346, and Rocca against distinguishing attacks on keystream is evaluated by exploiting integral properties. As a result, the authors show that the initialisation phases of AEGIS-128/128L/256, Tiaoxin-346, and Rocca are secure against differential attacks after 4/3/6, 5, and 6 rounds, respectively. Regarding integral attacks, the distinguisher is found on 6/6/7, 15, and 7 rounds in the initialisation phases of AEGIS-128/128L/256, Tiaoxin-346, and Rocca, respectively. Additionally, the integral distinguisher is presented on 2/2/4, 4, and 4 rounds in the encryption phases of AEGIS-128/128L/256, Tiaoxin-346, and Rocca, respectively. As far as it is known, this study’s results are the first distinguishing attacks on the keystream on AEGIS, Tiaoxin-346, and Rocca without relying on weak keys.

本文利用混合整数线性规划工具,研究了基于高级加密标准的认证加密方案的安全性,包括AEGIS家族、Tiaoxin-346和Rocca。具体而言,对于AEGIS、Tiaoxin-346和Rocca的初始化阶段,分别通过估计活动S盒数量的下限和利用除法性质来评估对差分攻击和积分攻击的安全性。除了初始化阶段的估计外,还通过利用积分特性评估了AEGIS、Tiaoxin-346和Rocca的加密阶段对密钥流的区别攻击的安全性。因此,作者表明,AEGIS-128/128L/256、Tiaoxin-346和Rocca的初始化阶段分别在4/3/6、5和6轮后对差分攻击是安全的。关于积分攻击,在AEGIS-128/128L/256、Tiaoxin-346和Rocca的初始化阶段,分别在6/6/7、15和7轮中发现了区别。此外,积分鉴别器分别在AEGIS-128/128L/256、Tiaoxin-346和Rocca的加密阶段的2/2/4、4和4轮上给出。据目前所知,本研究的结果是首次在不依赖弱密钥的情况下区分对AEGIS、Tiaoxin-346和Rocca的密钥流的攻击。
{"title":"MILP-based security evaluation for AEGIS/Tiaoxin-346/Rocca","authors":"Takuro Shiraya,&nbsp;Nobuyuki Takeuchi,&nbsp;Kosei Sakamoto,&nbsp;Takanori Isobe","doi":"10.1049/ise2.12109","DOIUrl":"https://doi.org/10.1049/ise2.12109","url":null,"abstract":"<p>In this paper, the security of Advanced Encryption Standard-based authenticated encryption schemes, including AEGIS family, Tiaoxin-346, and Rocca by mixed integer linear programming tools is examined. Specifically, for the initialisation phase of AEGIS, Tiaoxin-346, and Rocca, the security against differential attacks and integral attacks is evaluated by estimating the lower bounds for the number of active S-boxes and utilising division property, respectively. In addition to the estimations of initialisation phases, the security of the encryption phases of AEGIS, Tiaoxin-346, and Rocca against distinguishing attacks on keystream is evaluated by exploiting integral properties. As a result, the authors show that the initialisation phases of AEGIS-128/128L/256, Tiaoxin-346, and Rocca are secure against differential attacks after 4/3/6, 5, and 6 rounds, respectively. Regarding integral attacks, the distinguisher is found on 6/6/7, 15, and 7 rounds in the initialisation phases of AEGIS-128/128L/256, Tiaoxin-346, and Rocca, respectively. Additionally, the integral distinguisher is presented on 2/2/4, 4, and 4 rounds in the encryption phases of AEGIS-128/128L/256, Tiaoxin-346, and Rocca, respectively. As far as it is known, this study’s results are the first distinguishing attacks on the keystream on AEGIS, Tiaoxin-346, and Rocca without relying on weak keys.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"17 3","pages":"458-467"},"PeriodicalIF":1.4,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2.12109","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50154900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the security of ‘an ultra-lightweight and secure scheme for communications of smart metres and neighbourhood gateways by utilisation of an ARM Cortex-M microcontroller’ 关于“利用ARM Cortex-M微控制器实现智能电表和邻里网关通信的超轻量级安全方案”的安全性
IF 1.4 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-01-13 DOI: 10.1049/ise2.12108
Sonia Miri, Masoud Kaveh, Hadi Shahriar Shahhoseini, Mohammad Reza Mosavi, Saeed Aghapour

In 2018, Abbasinezhad-Mood and Nikooghadam (IEEE Transaction on Smart Grid, pp 6194–6205, 9(6), 2018) proposed an ultra-lightweight secure scheme for neighbourhood area network (NAN $boldsymbol{N}boldsymbol{A}boldsymbol{N}$) communications in smart grid. They have claimed that their protocol is secure against all known attacks in NAN $boldsymbol{N}boldsymbol{A}boldsymbol{N}$ environment by providing informal security analysis besides a formal analysis which was done by using an automatic verification tool. However, by performing several attacks, this study shows that their scheme has serious security flaws. After performing each attack, lightweight countermeasures is proposed for securing their protocol against that attack.

2018年,Abbasinezhad Mood和Nikooghadam(IEEE智能电网交易,第6194–6205页,9(6),2018)提出了一种用于智能电网中邻域网络(N A N$boldsymbol{N}boldsymbol{A}bold symbol{N}$)通信的超轻量级安全方案。他们声称,他们的协议除了通过使用自动验证工具。然而,通过多次攻击,本研究表明他们的方案存在严重的安全缺陷。在执行每一次攻击之后,都会提出轻量级对策来保护他们的协议免受该攻击。
{"title":"On the security of ‘an ultra-lightweight and secure scheme for communications of smart metres and neighbourhood gateways by utilisation of an ARM Cortex-M microcontroller’","authors":"Sonia Miri,&nbsp;Masoud Kaveh,&nbsp;Hadi Shahriar Shahhoseini,&nbsp;Mohammad Reza Mosavi,&nbsp;Saeed Aghapour","doi":"10.1049/ise2.12108","DOIUrl":"https://doi.org/10.1049/ise2.12108","url":null,"abstract":"<p>In 2018, Abbasinezhad-Mood and Nikooghadam (IEEE Transaction on Smart Grid, pp 6194–6205, 9(6), 2018) proposed an ultra-lightweight secure scheme for neighbourhood area network (<math>\u0000 <semantics>\u0000 <mrow>\u0000 <mi>N</mi>\u0000 <mi>A</mi>\u0000 <mi>N</mi>\u0000 </mrow>\u0000 <annotation> $boldsymbol{N}boldsymbol{A}boldsymbol{N}$</annotation>\u0000 </semantics></math>) communications in smart grid. They have claimed that their protocol is secure against all known attacks in <math>\u0000 <semantics>\u0000 <mrow>\u0000 <mi>N</mi>\u0000 <mi>A</mi>\u0000 <mi>N</mi>\u0000 </mrow>\u0000 <annotation> $boldsymbol{N}boldsymbol{A}boldsymbol{N}$</annotation>\u0000 </semantics></math> environment by providing informal security analysis besides a formal analysis which was done by using an automatic verification tool. However, by performing several attacks, this study shows that their scheme has serious security flaws. After performing each attack, lightweight countermeasures is proposed for securing their protocol against that attack.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"17 3","pages":"544-551"},"PeriodicalIF":1.4,"publicationDate":"2023-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2.12108","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50131207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Guest Editorial: Selected papers from the 24th International Conference on Information Security and Cryptology (ICISC 2021) 客座编辑:第24届信息安全与密码学国际会议论文选集(ICISC 2021)
IF 1.4 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-01-13 DOI: 10.1049/ise2.12096
Jong Hwan Park
<p>This is our first IET Information Security special issue from the Internation Conference on Information Security and Cryptology, which was held from December 1 to December 3, Seoul, South Korea, 2021. The aim of ICISC 2021 was to provide an international forum for the latest results of research, development, and applications within the field of information security and cryptography. In ICISC 2021, we received 63 submissions and were able to accept 23 papers for the presentation at the conference. Among accepted and presented papers at ICISC 2021, we selected six papers with high review scores and recommended them for publication in the special issue of IET information Security (via at least 30% extension). It is worth noting that the review and the selection process were successfully conducted by programme committee (PC) members, including reviewers dispatched from IET Information Security, and each paper underwent a blind review by at least three PC members.</p><p>The special issue contains six papers on topic areas, including lattice-based protocol constructions (Topic A), lattice-based analysis algorithms (Topic B), efficient quantum circuit constructions (Topic C), and analysis on symmetric-key primitives (Topic D).</p><p>Paper 1 by P. Ren, X. Gu, and Z. Wang investigates how to construct a quantum-safe password-authenticated key exchange (PAKE) as a cryptographic primitive that can establish secure remote communications between a client and a server. They suggest a new PAKE protocol based on module lattices with a rigorous security proof in the random oracle model. Taking the flexibility of the module learning with errors problem, they elaborately select 3 parameter sets to meet different application scenarios. Specifically, they show that their recommended PAKE implementation achieves 177-bit post-quantum security with a generous margin to cope with later improvement in the cryptanalysis. Their performance results indicate that the MLWE-PAKE is quite practical: compared with the latest Yang-PAKE, their PAKE reduces the communication cost and the running time by 36.8% and 13.8%, respectively.</p><p>Paper 2 by V. Farzaliyev, J. Willemson, and J. K. Kaasik investigates Mix-networks as a general tool for building anonymous communication systems. They focus on the application case of post-quantum electronic voting where the number of votes to be mixed may reach hundreds of thousands or even millions. They propose an improved architecture for lattice-based post-quantum mix-nets featuring more efficient zero-knowledge proofs while maintaining established security assumptions. Their implementation scales up to 100,000 votes, still leaving a lot of room for future optimisation.</p><p>Paper 3 by K. Yamamura, Y. Wang, and E. Fujisaki investigates an enumeration algorithm that is used as a subroutine for the BKZ algorithm, which is one of the most practical reduction algorithms. It is a critical issue to reduce the computational complexity of the en
洪对GIMLI-HASH的一个回合缩减变体提出了预图像攻击,其中消息吸收阶段使用5回合GIMLI,压缩阶段使用9回合GIMLI。他们将这种变体称为5-9周GIMLI-HASH。他们对5-9周GIMLI-HASH的图像前攻击需要294.44的时间复杂性和297的内存复杂性。此外,该方法可以在压缩阶段达到高达移位10轮的GIMLI。他们的第一次攻击需要内存来存储GIMLI SP盒操作中的几个预计算表。在他们的第二次攻击中,他们采取了时间-内存权衡方法,减少了预计算表的内存需求,但增加了SAT求解器求解SP盒方程的计算时间。该攻击需要266.17内存复杂度和296+ε时间复杂度,其中ε是求解SP盒方程的时间复杂度。他们使用CryptoMiniSat SAT解算器进行的实验表明,ε的最大时间复杂度约为220.57 9轮GIMLI。S.Lim和D.G.Han的论文6研究了ICISC 2020中提出的一种轻量级分组密码PIPO的差分故障攻击。PIPO设计用于在使用侧信道分析对策时提供强大的安全强度,同时具有较小的开销。差分故障攻击是一种侧通道分析,它在密码操作中引发故障,并利用发生的差分信息。他们提出了一种针对PIPO的基于单比特翻转的差分故障攻击,其中,通过64个故障密文,他们提出的攻击恢复PIPO 64/128的正确密钥的概率为98.9%。他们不仅通过模拟,还通过电磁故障注入对拟议的攻击进行了评估。本期特刊的所有论文都表明,在后量子密码学和分组密码安全分析的主题领域,信息安全和密码学有了进一步的改进。特别是,作者的各种实验结果将清楚地向读者展示,与目前与六篇精选论文相关的研究工作相比,他们的结果是多么先进。与此同时,该领域仍有许多挑战需要未来的研究关注,如基于格的密码原语的高效构建、基于格的约简算法的分析,以及针对后量子密码原语及其潜在复杂性假设的更现实的量子攻击。我们希望在不久的将来看到更多关于这些主题的先进研究成果。
{"title":"Guest Editorial: Selected papers from the 24th International Conference on Information Security and Cryptology (ICISC 2021)","authors":"Jong Hwan Park","doi":"10.1049/ise2.12096","DOIUrl":"https://doi.org/10.1049/ise2.12096","url":null,"abstract":"&lt;p&gt;This is our first IET Information Security special issue from the Internation Conference on Information Security and Cryptology, which was held from December 1 to December 3, Seoul, South Korea, 2021. The aim of ICISC 2021 was to provide an international forum for the latest results of research, development, and applications within the field of information security and cryptography. In ICISC 2021, we received 63 submissions and were able to accept 23 papers for the presentation at the conference. Among accepted and presented papers at ICISC 2021, we selected six papers with high review scores and recommended them for publication in the special issue of IET information Security (via at least 30% extension). It is worth noting that the review and the selection process were successfully conducted by programme committee (PC) members, including reviewers dispatched from IET Information Security, and each paper underwent a blind review by at least three PC members.&lt;/p&gt;&lt;p&gt;The special issue contains six papers on topic areas, including lattice-based protocol constructions (Topic A), lattice-based analysis algorithms (Topic B), efficient quantum circuit constructions (Topic C), and analysis on symmetric-key primitives (Topic D).&lt;/p&gt;&lt;p&gt;Paper 1 by P. Ren, X. Gu, and Z. Wang investigates how to construct a quantum-safe password-authenticated key exchange (PAKE) as a cryptographic primitive that can establish secure remote communications between a client and a server. They suggest a new PAKE protocol based on module lattices with a rigorous security proof in the random oracle model. Taking the flexibility of the module learning with errors problem, they elaborately select 3 parameter sets to meet different application scenarios. Specifically, they show that their recommended PAKE implementation achieves 177-bit post-quantum security with a generous margin to cope with later improvement in the cryptanalysis. Their performance results indicate that the MLWE-PAKE is quite practical: compared with the latest Yang-PAKE, their PAKE reduces the communication cost and the running time by 36.8% and 13.8%, respectively.&lt;/p&gt;&lt;p&gt;Paper 2 by V. Farzaliyev, J. Willemson, and J. K. Kaasik investigates Mix-networks as a general tool for building anonymous communication systems. They focus on the application case of post-quantum electronic voting where the number of votes to be mixed may reach hundreds of thousands or even millions. They propose an improved architecture for lattice-based post-quantum mix-nets featuring more efficient zero-knowledge proofs while maintaining established security assumptions. Their implementation scales up to 100,000 votes, still leaving a lot of room for future optimisation.&lt;/p&gt;&lt;p&gt;Paper 3 by K. Yamamura, Y. Wang, and E. Fujisaki investigates an enumeration algorithm that is used as a subroutine for the BKZ algorithm, which is one of the most practical reduction algorithms. It is a critical issue to reduce the computational complexity of the en","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"17 1","pages":"1-2"},"PeriodicalIF":1.4,"publicationDate":"2023-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2.12096","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50150345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An enhanced deep learning-based phishing detection mechanism to effectively identify malicious URLs using variational autoencoders 一种增强的基于深度学习的网络钓鱼检测机制,使用可变自动编码器有效识别恶意URL
IF 1.4 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-01-12 DOI: 10.1049/ise2.12106
Manoj Kumar Prabakaran, Parvathy Meenakshi Sundaram, Abinaya Devi Chandrasekar

Phishing attacks have become one of the powerful sources for cyber criminals to impose various forms of security attacks in which fake website Uniform Resource Locators (URL) are circulated around the Internet community in the form of email, messages etc., in order to deceive users, resulting in the loss of their valuable assets. The phishing URLs are predicted using several blacklist-based traditional phishing website detection techniques. However, numerous phishing websites are frequently constructed and launched on the Internet over time; these blacklist-based traditional methods do not accurately predict most phishing websites. In order to effectively identify malicious URLs, an enhanced deep learning-based phishing detection approach has been proposed by integrating the strength of Variational Autoencoders (VAE) and deep neural networks (DNN). In the proposed framework, the inherent features of a raw URL are automatically extracted by the VAE model by reconstructing the original input URL to enhance phishing URL detection. For experimentation, around 1 lakh URLs were crawled from two publicly available datasets, namely ISCX-URL-2016 dataset and Kaggle dataset. The experimental results suggested that the proposed model has reached a maximum accuracy of 97.45% and exhibits a quicker response time of 1.9 s, which is better when compared to all the other experimented models.

网络钓鱼攻击已成为网络犯罪分子实施各种形式安全攻击的强大来源之一,在这种攻击中,假冒网站统一资源定位器(URL)以电子邮件、消息等形式在互联网社区中传播,以欺骗用户,导致其宝贵资产损失。使用几种基于黑名单的传统钓鱼网站检测技术来预测钓鱼URL。然而,随着时间的推移,许多钓鱼网站经常在互联网上构建和推出;这些基于黑名单的传统方法并不能准确预测大多数钓鱼网站。为了有效识别恶意URL,结合变分自动编码器(VAE)和深度神经网络(DNN)的优势,提出了一种增强的基于深度学习的网络钓鱼检测方法。在所提出的框架中,VAE模型通过重构原始输入URL来自动提取原始URL的固有特征,以增强钓鱼URL检测。为了进行实验,从两个公开可用的数据集(即ISCX-URL-2016数据集和Kaggle数据集)中抓取了大约10万个URL。实验结果表明,所提出的模型达到了97.45%的最大精度,并表现出1.9s的更快响应时间,与所有其他实验模型相比,这是更好的。
{"title":"An enhanced deep learning-based phishing detection mechanism to effectively identify malicious URLs using variational autoencoders","authors":"Manoj Kumar Prabakaran,&nbsp;Parvathy Meenakshi Sundaram,&nbsp;Abinaya Devi Chandrasekar","doi":"10.1049/ise2.12106","DOIUrl":"https://doi.org/10.1049/ise2.12106","url":null,"abstract":"<p>Phishing attacks have become one of the powerful sources for cyber criminals to impose various forms of security attacks in which fake website Uniform Resource Locators (URL) are circulated around the Internet community in the form of email, messages etc., in order to deceive users, resulting in the loss of their valuable assets. The phishing URLs are predicted using several blacklist-based traditional phishing website detection techniques. However, numerous phishing websites are frequently constructed and launched on the Internet over time; these blacklist-based traditional methods do not accurately predict most phishing websites. In order to effectively identify malicious URLs, an enhanced deep learning-based phishing detection approach has been proposed by integrating the strength of Variational Autoencoders (VAE) and deep neural networks (DNN). In the proposed framework, the inherent features of a raw URL are automatically extracted by the VAE model by reconstructing the original input URL to enhance phishing URL detection. For experimentation, around 1 lakh URLs were crawled from two publicly available datasets, namely ISCX-URL-2016 dataset and Kaggle dataset. The experimental results suggested that the proposed model has reached a maximum accuracy of 97.45% and exhibits a quicker response time of 1.9 s, which is better when compared to all the other experimented models.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"17 3","pages":"423-440"},"PeriodicalIF":1.4,"publicationDate":"2023-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2.12106","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50129855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
On the performance of non-profiled side channel attacks based on deep learning techniques 基于深度学习技术的非轮廓侧信道攻击性能研究
IF 1.4 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-12-20 DOI: 10.1049/ise2.12102
Ngoc-Tuan Do, Van-Phuc Hoang, Van Sang Doan, Cong-Kha Pham

In modern embedded systems, security issues including side-channel attacks (SCAs) are becoming of paramount importance since the embedded devices are ubiquitous in many categories of consumer electronics. Recently, deep learning (DL) has been introduced as a new promising approach for profiled and non-profiled SCAs. This paper proposes and evaluates the applications of different DL techniques including the Convolutional Neural Network and the multilayer perceptron models for non-profiled attacks on the AES-128 encryption implementation. Especially, the proposed network is fine-tuned with different number of hidden layers, labelling techniques and activation functions. Along with the designed models, a dataset reconstruction and labelling technique for the proposed model has also been performed for solving the high dimension data and imbalanced dataset problem. As a result, the DL based SCA with our reconstructed dataset for different targets of ASCAD, RISC-V microcontroller, and ChipWhisperer boards has achieved a higher performance of non-profiled attacks. Specifically, necessary investigations to evaluate the efficiency of the proposed techniques against different SCA countermeasures, such as masking and hiding, have been performed. In addition, the effect of the activation function on the proposed DL models was investigated. The experimental results have clarified that the exponential linear unit function is better than the rectified linear unit in fighting against noise generation-based hiding countermeasure.

在现代嵌入式系统中,包括侧信道攻击(SCA)在内的安全问题变得至关重要,因为嵌入式设备在许多类别的消费电子产品中无处不在。最近,深度学习(DL)作为一种新的有前景的方法被引入到有轮廓和无轮廓的SCA中。本文提出并评估了不同DL技术的应用,包括卷积神经网络和多层感知器模型,用于AES-128加密实现中的非轮廓攻击。特别是,所提出的网络通过不同数量的隐藏层、标记技术和激活函数进行了微调。除了设计的模型外,还对所提出的模型进行了数据集重建和标记技术,以解决高维数据和不平衡数据集的问题。因此,基于DL的SCA和我们为ASCAD、RISC-V微控制器和ChipWhisperer板的不同目标重建的数据集实现了更高的非轮廓攻击性能。具体而言,已经进行了必要的调查,以评估所提出的技术对不同SCA对策(如掩蔽和隐藏)的效率。此外,还研究了激活函数对所提出的DL模型的影响。实验结果表明,在对抗基于噪声生成的隐藏对策方面,指数线性单元函数优于校正线性单元。
{"title":"On the performance of non-profiled side channel attacks based on deep learning techniques","authors":"Ngoc-Tuan Do,&nbsp;Van-Phuc Hoang,&nbsp;Van Sang Doan,&nbsp;Cong-Kha Pham","doi":"10.1049/ise2.12102","DOIUrl":"https://doi.org/10.1049/ise2.12102","url":null,"abstract":"<p>In modern embedded systems, security issues including side-channel attacks (SCAs) are becoming of paramount importance since the embedded devices are ubiquitous in many categories of consumer electronics. Recently, deep learning (DL) has been introduced as a new promising approach for profiled and non-profiled SCAs. This paper proposes and evaluates the applications of different DL techniques including the Convolutional Neural Network and the multilayer perceptron models for non-profiled attacks on the AES-128 encryption implementation. Especially, the proposed network is fine-tuned with different number of hidden layers, labelling techniques and activation functions. Along with the designed models, a dataset reconstruction and labelling technique for the proposed model has also been performed for solving the high dimension data and imbalanced dataset problem. As a result, the DL based SCA with our reconstructed dataset for different targets of ASCAD, RISC-V microcontroller, and ChipWhisperer boards has achieved a higher performance of non-profiled attacks. Specifically, necessary investigations to evaluate the efficiency of the proposed techniques against different SCA countermeasures, such as masking and hiding, have been performed. In addition, the effect of the activation function on the proposed DL models was investigated. The experimental results have clarified that the exponential linear unit function is better than the rectified linear unit in fighting against noise generation-based hiding countermeasure.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"17 3","pages":"377-393"},"PeriodicalIF":1.4,"publicationDate":"2022-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2.12102","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50138614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improved related-tweakey rectangle attacks on round-reduced Deoxys-BC 改进了对回合减少的Deoxys BC的相关调整矩形攻击
IF 1.4 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-12-19 DOI: 10.1049/ise2.12104
Jiamei Liu, Lin Tan, Hong Xu

Deoxys-BC is the internal tweakable block cipher of the authenticated encryption (AE) Deoxys family, in which Deoxys-II is the primary choice for the use case of ‘Defence in depth’ among the portfolio of CAESAR competition. Improvements of the related-tweakey rectangle attacks on round-reduced Deoxys-BC using the known distinguishers is focussed in this study. Under the new related-key rectangle attack framework proposed by Dong et al. in EUROCRYPT 2022, we present three kinds of precomputed tables to further reduce the time complexity in the key-recovery phase. In the related-tweakey rectangle attack, the invalid quartets are filtered or the subtweakey candidates are obtained by lookup the precomputed tables without more computation. Based on the precomputed table technique, we improved the related-tweakey rectangle attacks on 11-round Deoxys-BC-256, 13-round and 14-round Deoxys-BC-384. Furthermore, we reduce the time complexity of the 13-round related-tweakey rectangle attack on Deoxys AE scheme Deoxys-I-256-128 by a factor of 224 compared with the best previous attack.

Deoxys BC是认证加密(AE)Deoxys家族的内部可调整分组密码,其中Deoxys II是CAESAR竞争组合中“深度防御”用例的主要选择。使用已知的识别器改进了对圆形还原Deoxys BC的相关微调矩形攻击。在董等人提出的新的相关密钥矩形攻击框架下。在EUROCRYPT 2022中,我们提出了三种预计算表,以进一步降低密钥恢复阶段的时间复杂性。在相关的tweakey矩形攻击中,过滤无效的四元组,或者通过查找预先计算的表来获得子密钥候选,而不需要更多的计算。在预编算表技术的基础上,改进了对11轮Deoxy-BC-256、13轮Deoxy BC-384和14轮Deoxi-BC-384的相关调整矩形攻击。此外,与之前的最佳攻击相比,我们将Deoxys AE方案Deoxy-I-256-128上的13轮相关调整矩形攻击的时间复杂度降低了224倍。
{"title":"Improved related-tweakey rectangle attacks on round-reduced Deoxys-BC","authors":"Jiamei Liu,&nbsp;Lin Tan,&nbsp;Hong Xu","doi":"10.1049/ise2.12104","DOIUrl":"https://doi.org/10.1049/ise2.12104","url":null,"abstract":"<p>Deoxys-BC is the internal tweakable block cipher of the authenticated encryption (AE) Deoxys family, in which Deoxys-II is the primary choice for the use case of ‘Defence in depth’ among the portfolio of CAESAR competition. Improvements of the related-tweakey rectangle attacks on round-reduced Deoxys-BC using the known distinguishers is focussed in this study. Under the new related-key rectangle attack framework proposed by Dong <i>et al.</i> in EUROCRYPT 2022, we present three kinds of precomputed tables to further reduce the time complexity in the key-recovery phase. In the related-tweakey rectangle attack, the invalid quartets are filtered or the subtweakey candidates are obtained by lookup the precomputed tables without more computation. Based on the precomputed table technique, we improved the related-tweakey rectangle attacks on 11-round Deoxys-BC-256, 13-round and 14-round Deoxys-BC-384. Furthermore, we reduce the time complexity of the 13-round related-tweakey rectangle attack on Deoxys AE scheme Deoxys-I-256-128 by a factor of 2<sup>24</sup> compared with the best previous attack.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"17 3","pages":"407-422"},"PeriodicalIF":1.4,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2.12104","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50137697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preimage attacks on reduced-round Keccak hash functions by solving algebraic systems 用代数系统求解降维圆Keccak散列函数的预图像攻击
IF 1.4 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-12-13 DOI: 10.1049/ise2.12103
Junling Pei, Lusheng Chen

In this paper, improved preimage attacks are presented on 3-round Keccak-256 and Keccak-512 and 4-round Keccak-256 based on algebraic methods. The authors propose some new properties about the components of Keccak permutation, reconsider the existing preimage attacks, and further refine the linearisation processes of quadratic bits to lower the complexities. For 3-round Keccak-256 and Keccak-512, priority is given to values with higher probability for quadratic bits, such that the guessing complexities decrease from slightly more than 265 and 2440 to 264.79 and 2424, respectively. For preimage attack on 4-round Keccak-256, some strategies of saving degrees of freedom are applied to solve Boolean multivariate quadratic systems and reduce the guessing complexity from 2196 to 2188.

本文基于代数方法,对3轮Keccak-256、Keccak-512和4轮Keccak-256进行了改进的预图像攻击。作者提出了关于Keccak置换分量的一些新性质,重新考虑了现有的预图像攻击,并进一步改进了二次比特的线性化过程以降低复杂性。对于3轮Keccak-256和Keccak-512,优先考虑二次比特的概率更高的值,使得猜测复杂度分别从略高于265和2440降低到264.79和2424。对于4轮Keccak-256的预图像攻击,应用一些节省自由度的策略来求解布尔多元二次系统,并将猜测复杂度从2196降低到2188。
{"title":"Preimage attacks on reduced-round Keccak hash functions by solving algebraic systems","authors":"Junling Pei,&nbsp;Lusheng Chen","doi":"10.1049/ise2.12103","DOIUrl":"https://doi.org/10.1049/ise2.12103","url":null,"abstract":"<p>In this paper, improved preimage attacks are presented on 3-round Keccak-256 and Keccak-512 and 4-round Keccak-256 based on algebraic methods. The authors propose some new properties about the components of Keccak permutation, reconsider the existing preimage attacks, and further refine the linearisation processes of quadratic bits to lower the complexities. For 3-round Keccak-256 and Keccak-512, priority is given to values with higher probability for quadratic bits, such that the guessing complexities decrease from slightly more than 2<sup>65</sup> and 2<sup>440</sup> to 2<sup>64.79</sup> and 2<sup>424</sup>, respectively. For preimage attack on 4-round Keccak-256, some strategies of saving degrees of freedom are applied to solve Boolean multivariate quadratic systems and reduce the guessing complexity from 2<sup>196</sup> to 2<sup>188</sup>.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"17 3","pages":"394-406"},"PeriodicalIF":1.4,"publicationDate":"2022-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2.12103","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50131030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Lattice-based cryptosystems in standardisation processes: A survey 标准化过程中的基于格的密码系统:综述
IF 1.4 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-12-10 DOI: 10.1049/ise2.12101
Anyu Wang, Dianyan Xiao, Yang Yu

The current widely used public-key cryptosystems are vulnerable to quantum attacks. To prepare for cybersecurity in the quantum era, some projects have been launched to call for post-quantum alternatives. Due to solid security and desirable performance, lattice-based cryptosystems are viewed as promising candidates in the upcoming standardisation of post-quantum cryptography. This study surveys the lattice-based cryptosystems in the post-quantum standardisation processes including the NIST Post-Quantum Cryptography Standardisation and the Chinese Cryptographic Algorithm Design Competition, from both design and security aspects. We present generic design paradigms of lattice-based schemes and describe several representative proposals and recent progress. We also recap some main cryptanalytic results and methods for estimating the concrete security of lattice-based schemes.

目前广泛使用的公钥密码系统容易受到量子攻击。为了为量子时代的网络安全做好准备,一些项目已经启动,呼吁采用后量子替代方案。由于可靠的安全性和令人满意的性能,基于晶格的密码系统被视为即将到来的后量子密码标准化的有前途的候选者。本研究从设计和安全两个方面调查了后量子标准化过程中的基于晶格的密码系统,包括NIST后量子密码标准化和中国密码算法设计竞赛。我们提出了基于格的方案的通用设计范式,并描述了几个有代表性的建议和最新进展。我们还回顾了一些主要的密码分析结果和估计基于格的方案的具体安全性的方法。
{"title":"Lattice-based cryptosystems in standardisation processes: A survey","authors":"Anyu Wang,&nbsp;Dianyan Xiao,&nbsp;Yang Yu","doi":"10.1049/ise2.12101","DOIUrl":"https://doi.org/10.1049/ise2.12101","url":null,"abstract":"<p>The current widely used public-key cryptosystems are vulnerable to quantum attacks. To prepare for cybersecurity in the quantum era, some projects have been launched to call for post-quantum alternatives. Due to solid security and desirable performance, lattice-based cryptosystems are viewed as promising candidates in the upcoming standardisation of post-quantum cryptography. This study surveys the lattice-based cryptosystems in the post-quantum standardisation processes including the NIST Post-Quantum Cryptography Standardisation and the Chinese Cryptographic Algorithm Design Competition, from both design and security aspects. We present generic design paradigms of lattice-based schemes and describe several representative proposals and recent progress. We also recap some main cryptanalytic results and methods for estimating the concrete security of lattice-based schemes.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"17 2","pages":"227-243"},"PeriodicalIF":1.4,"publicationDate":"2022-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2.12101","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50146109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IET Information Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1