首页 > 最新文献

IET Information Security最新文献

英文 中文
Using WPCA and EWMA Control Chart to Construct a Network Intrusion Detection Model 使用 WPCA 和 EWMA 控制图构建网络入侵检测模型
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-25 DOI: 10.1049/2024/3948341
Ying-Ti Tsai, Chung-Ho Wang, Yung-Chia Chang, Lee-Ing Tong

Artificial intelligence algorithms and big data analysis methods are commonly employed in network intrusion detection systems. However, challenges such as unbalanced data and unknown network intrusion modes can influence the effectiveness of these methods. Moreover, the information personnel of most enterprises lack specialized knowledge of information security. Thus, a simple and effective model for detecting abnormal behaviors may be more practical for information personnel than attempting to identify network intrusion modes. This study develops a network intrusion detection model by integrating weighted principal component analysis into an exponentially weighted moving average control chart. The proposed method assists information personnel in easily determining whether a network intrusion event has occurred. The effectiveness of the proposed method was validated using simulated examples.

网络入侵检测系统通常采用人工智能算法和大数据分析方法。然而,数据不平衡和未知网络入侵模式等挑战会影响这些方法的有效性。此外,大多数企业的信息人员缺乏专业的信息安全知识。因此,对于信息人员来说,一个简单有效的异常行为检测模型可能比尝试识别网络入侵模式更实用。本研究通过将加权主成分分析融入指数加权移动平均控制图,建立了一个网络入侵检测模型。所提出的方法可帮助信息人员轻松确定是否发生了网络入侵事件。通过模拟实例验证了所提方法的有效性。
{"title":"Using WPCA and EWMA Control Chart to Construct a Network Intrusion Detection Model","authors":"Ying-Ti Tsai,&nbsp;Chung-Ho Wang,&nbsp;Yung-Chia Chang,&nbsp;Lee-Ing Tong","doi":"10.1049/2024/3948341","DOIUrl":"10.1049/2024/3948341","url":null,"abstract":"<p>Artificial intelligence algorithms and big data analysis methods are commonly employed in network intrusion detection systems. However, challenges such as unbalanced data and unknown network intrusion modes can influence the effectiveness of these methods. Moreover, the information personnel of most enterprises lack specialized knowledge of information security. Thus, a simple and effective model for detecting abnormal behaviors may be more practical for information personnel than attempting to identify network intrusion modes. This study develops a network intrusion detection model by integrating weighted principal component analysis into an exponentially weighted moving average control chart. The proposed method assists information personnel in easily determining whether a network intrusion event has occurred. The effectiveness of the proposed method was validated using simulated examples.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2024 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/2024/3948341","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141967577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Social Media Public Opinion Detection Using Multimodal Natural Language Processing and Attention Mechanisms 利用多模态自然语言处理和注意力机制进行社交媒体舆论检测
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-16 DOI: 10.1049/2024/8880804
Yanxia Dui, Hongchun Hu

The fast dissemination speed and wide range of information dissemination on social media also enable false information and rumors to spread rapidly on public social media. Attackers can use false information to trigger public panic and disrupt social stability. Traditional multimodal sentiment analysis methods face challenges due to the suboptimal fusion of multimodal features and consequent diminution in classification accuracy. To address these issues, this study introduces a novel emotion classification model. The model solves the problem of interaction between modalities, which is neglected by the direct fusion of multimodal features, and improves the model’s ability to understand and generalize the semantics of emotions. The Transformer’s encoding layer is applied to extract sophisticated sentiment semantic encodings from audio and textual sequences. Subsequently, a complex bimodal feature interaction fusion attention mechanism is deployed to scrutinize intramodal and intermodal correlations and capture contextual dependencies. This approach enhances the model’s capacity to comprehend and extrapolate sentiment semantics. The cross-modal fused features are incorporated into the classification layer, enabling sentiment prediction. Experimental testing on the IEMOCAP dataset demonstrates that the proposed model achieves an emotion recognition classification accuracy of 78.5% and an F1-score of 77.6%. Compared to other mainstream multimodal emotion recognition methods, the proposed model shows significant improvements in all metrics. The experimental results demonstrate that the proposed method based on the Transformer and interactive attention mechanism can more fully understand the information of discourse emotion features in the network model. This research provides robust technical support for social network public sentiment security monitoring.

社交媒体的传播速度快、信息传播范围广,也使得虚假信息和谣言在公共社交媒体上迅速传播。攻击者可以利用虚假信息引发公众恐慌,破坏社会稳定。传统的多模态情感分析方法由于多模态特征融合不理想而面临挑战,并因此降低了分类的准确性。为解决这些问题,本研究引入了一种新型情感分类模型。该模型解决了多模态特征直接融合所忽视的模态间交互问题,并提高了模型理解和概括情感语义的能力。Transformer 的编码层用于从音频和文本序列中提取复杂的情感语义编码。随后,采用复杂的双模特征交互融合关注机制来仔细检查模内和模间相关性,并捕捉上下文依赖关系。这种方法增强了模型理解和推断情感语义的能力。跨模态融合特征被纳入分类层,从而实现情感预测。在 IEMOCAP 数据集上进行的实验测试表明,所提出的模型达到了 78.5% 的情感识别分类准确率和 77.6% 的 F1 分数。与其他主流多模态情感识别方法相比,所提出的模型在所有指标上都有显著提高。实验结果表明,基于变换器和交互关注机制的拟议方法能更充分地理解网络模型中的话语情感特征信息。该研究为社交网络公共情绪安全监测提供了有力的技术支持。
{"title":"Social Media Public Opinion Detection Using Multimodal Natural Language Processing and Attention Mechanisms","authors":"Yanxia Dui,&nbsp;Hongchun Hu","doi":"10.1049/2024/8880804","DOIUrl":"10.1049/2024/8880804","url":null,"abstract":"<p>The fast dissemination speed and wide range of information dissemination on social media also enable false information and rumors to spread rapidly on public social media. Attackers can use false information to trigger public panic and disrupt social stability. Traditional multimodal sentiment analysis methods face challenges due to the suboptimal fusion of multimodal features and consequent diminution in classification accuracy. To address these issues, this study introduces a novel emotion classification model. The model solves the problem of interaction between modalities, which is neglected by the direct fusion of multimodal features, and improves the model’s ability to understand and generalize the semantics of emotions. The Transformer’s encoding layer is applied to extract sophisticated sentiment semantic encodings from audio and textual sequences. Subsequently, a complex bimodal feature interaction fusion attention mechanism is deployed to scrutinize intramodal and intermodal correlations and capture contextual dependencies. This approach enhances the model’s capacity to comprehend and extrapolate sentiment semantics. The cross-modal fused features are incorporated into the classification layer, enabling sentiment prediction. Experimental testing on the IEMOCAP dataset demonstrates that the proposed model achieves an emotion recognition classification accuracy of 78.5% and an F1-score of 77.6%. Compared to other mainstream multimodal emotion recognition methods, the proposed model shows significant improvements in all metrics. The experimental results demonstrate that the proposed method based on the Transformer and interactive attention mechanism can more fully understand the information of discourse emotion features in the network model. This research provides robust technical support for social network public sentiment security monitoring.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2024 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/2024/8880804","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141631141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TAAC: Secure and Efficient Time-Attribute-Based Access Control Scheme in SDN-IoT TAAC:SDN-IoT 中安全高效的基于时间属性的访问控制方案
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-03 DOI: 10.1049/2024/8059692
Jiamin Hu, Zhonghua Shen, Kefei Chen, Yuying Liu, Qian Meng, Fuqun Wang, Yong Liu

The convergence of software-defined networking (SDN) and the Internet of Things (IoT) provides a scalable method for handling the considerable volumes of data produced by IoT devices. However, the lack of appropriate security measures can lead to unauthorized access to sensitive data, potential breaches, and privacy violations, as well as time-consuming and inefficient data retrieval methods in SDN-IoT systems that require decrypting the entire dataset. To address these challenges, this article proposes the time-attribute-based access control scheme in SDN-IoT (TAAC). The TAAC scheme combines ciphertext-policy attribute-based encryption with a novel time-attribute-based access tree to ensure fine-grained access control on time and attributes, enabling secure ciphertext interaction and information sharing across domains. Furthermore, the TAAC scheme also incorporates searchable encryption, which enhances the efficiency of data retrieval. By implementing searchable encryption techniques, the data receiver can generate trapdoors to search and retrieve specific encrypted data without the need to decrypt the entire dataset. In summary, the TAAC scheme improves storage efficiency and computation, enhances scalability, and provides robust security, offering an efficient and secure solution for ciphertext sharing in SDN-IoT environments. Experimental results have demonstrated that the TAAC scheme shows excellent performance and outperforms other attribute-based searchable encryption algorithms.

软件定义网络(SDN)与物联网(IoT)的融合为处理物联网设备产生的大量数据提供了一种可扩展的方法。然而,缺乏适当的安全措施会导致对敏感数据的未经授权访问、潜在的漏洞和隐私侵犯,以及在 SDN-IoT 系统中需要解密整个数据集的耗时且低效的数据检索方法。为应对这些挑战,本文提出了基于时间属性的 SDN-IoT 访问控制方案(TAAC)。TAAC 方案将基于密文策略属性的加密与新颖的基于时间属性的访问树相结合,确保对时间和属性的细粒度访问控制,从而实现安全的密文交互和跨域信息共享。此外,TAAC 方案还采用了可搜索加密技术,提高了数据检索的效率。通过采用可搜索加密技术,数据接收方可以生成陷阱门来搜索和检索特定的加密数据,而无需对整个数据集进行解密。总之,TAAC方案提高了存储效率和计算能力,增强了可扩展性,并提供了稳健的安全性,为SDN-IoT环境中的密文共享提供了高效、安全的解决方案。实验结果表明,TAAC 方案性能卓越,优于其他基于属性的可搜索加密算法。
{"title":"TAAC: Secure and Efficient Time-Attribute-Based Access Control Scheme in SDN-IoT","authors":"Jiamin Hu,&nbsp;Zhonghua Shen,&nbsp;Kefei Chen,&nbsp;Yuying Liu,&nbsp;Qian Meng,&nbsp;Fuqun Wang,&nbsp;Yong Liu","doi":"10.1049/2024/8059692","DOIUrl":"10.1049/2024/8059692","url":null,"abstract":"<p>The convergence of software-defined networking (SDN) and the Internet of Things (IoT) provides a scalable method for handling the considerable volumes of data produced by IoT devices. However, the lack of appropriate security measures can lead to unauthorized access to sensitive data, potential breaches, and privacy violations, as well as time-consuming and inefficient data retrieval methods in SDN-IoT systems that require decrypting the entire dataset. To address these challenges, this article proposes the time-attribute-based access control scheme in SDN-IoT (TAAC). The TAAC scheme combines ciphertext-policy attribute-based encryption with a novel time-attribute-based access tree to ensure fine-grained access control on time and attributes, enabling secure ciphertext interaction and information sharing across domains. Furthermore, the TAAC scheme also incorporates searchable encryption, which enhances the efficiency of data retrieval. By implementing searchable encryption techniques, the data receiver can generate trapdoors to search and retrieve specific encrypted data without the need to decrypt the entire dataset. In summary, the TAAC scheme improves storage efficiency and computation, enhances scalability, and provides robust security, offering an efficient and secure solution for ciphertext sharing in SDN-IoT environments. Experimental results have demonstrated that the TAAC scheme shows excellent performance and outperforms other attribute-based searchable encryption algorithms.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2024 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/2024/8059692","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141536641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimized SM4 Hardware Implementations for Low Area Consumption 优化 SM4 硬件实现,实现低面积消耗
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-24 DOI: 10.1049/2024/7047055
Ruolin Zhang, Zejun Xiang, Shasha Zhang, Xiangyong Zeng, Min Song

The SM4 block cipher is standardized in ISO/IEC, and it is also the national standard of commercial cryptography in China. In this paper, we propose two new techniques called “split-and-join” and “off-peak and stagger” to make SM4 more applicable to resource-constrained environments. The area optimization method uses a 1-bit data path while reducing the number of registers from 64 to 8 and the number of XOR gates from 194 to 8. As a result, we report a 1-bit-serial SM4 encryption circuit that occupies 1771 GE with a latency of 2,336 cycles. Additionally, the “off-peak and stagger” technique compresses all the operations within the state update and key schedule into 32 clock cycles to reduce the latency. In other words, it takes 32 clock cycles to complete one round encryption. The new circuit occupies 1861 GE with a latency of 1,344 cycles. Moreover, we also discuss how to further reduce the latency by increasing the data path with a small area overhead to provide wider area-latency tradeoffs for SM4. Our designs make SM4 competitive with many ciphers specifically designed for lightweight cryptography.

SM4 嵌套密码是 ISO/IEC 标准,也是中国商用密码国家标准。本文提出了 "分割-连接 "和 "离峰-交错 "两种新技术,使 SM4 更适用于资源受限的环境。面积优化方法使用 1 位数据路径,同时将寄存器数量从 64 个减少到 8 个,将 XOR 门数量从 194 个减少到 8 个。因此,我们报告的 1 位串行 SM4 加密电路占用 1771 个 GE,延迟时间为 2336 个周期。此外,"离峰和错开 "技术将状态更新和密钥计划内的所有操作压缩到 32 个时钟周期内,以减少延迟。换句话说,完成一轮加密需要 32 个时钟周期。新电路占用 1861 个 GE,延迟时间为 1,344 个周期。此外,我们还讨论了如何通过增加小面积开销的数据路径来进一步降低延迟,从而为 SM4 提供更广泛的面积-延迟权衡。我们的设计使 SM4 能够与许多专为轻量级加密设计的密码相媲美。
{"title":"Optimized SM4 Hardware Implementations for Low Area Consumption","authors":"Ruolin Zhang,&nbsp;Zejun Xiang,&nbsp;Shasha Zhang,&nbsp;Xiangyong Zeng,&nbsp;Min Song","doi":"10.1049/2024/7047055","DOIUrl":"10.1049/2024/7047055","url":null,"abstract":"<p>The SM4 block cipher is standardized in ISO/IEC, and it is also the national standard of commercial cryptography in China. In this paper, we propose two new techniques called “split-and-join” and “off-peak and stagger” to make SM4 more applicable to resource-constrained environments. The area optimization method uses a 1-bit data path while reducing the number of registers from 64 to 8 and the number of XOR gates from 194 to 8. As a result, we report a 1-bit-serial SM4 encryption circuit that occupies 1771 GE with a latency of 2,336 cycles. Additionally, the “off-peak and stagger” technique compresses all the operations within the state update and key schedule into 32 clock cycles to reduce the latency. In other words, it takes 32 clock cycles to complete one <i>round</i> encryption. The new circuit occupies 1861 GE with a latency of 1,344 cycles. Moreover, we also discuss how to further reduce the latency by increasing the data path with a small area overhead to provide wider area-latency tradeoffs for SM4. Our designs make SM4 competitive with many ciphers specifically designed for lightweight cryptography.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2024 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/2024/7047055","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141488365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lattice-Based CP-ABE Access Control for SDS Constraint with Lazy Assignment of Attributes and Attribute Revocation 基于网格的 CP-ABE 访问控制,适用于具有懒惰属性分配和属性撤销功能的 SDS 约束
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-18 DOI: 10.1049/2024/6963475
Ting Guo, Abdugeni Abduxkur, Nurmamat Helil

Ciphertext-policy attribute-based encryption (CP-ABE) is a cryptographic scheme suitable for secure data sharing on cloud storage. The CP-ABE based on lattice theory has the property of resisting quantum attack. Some data objects uploaded to the cloud by the same data owner may cause conflicts of interest, or their combination may expose sensitive information. This paper proposes a revocable CP-ABE scheme on the lattice, based on ring learning with error (R-LWE) problem, to enforce access control constraints on user access to such data objects. In this scheme, first, the access policies of such data objects are amended by adding dummy attributes. Second, we control the secret key components associated with the dummy attributes or revoke the dummy attributes to prevent users from continuously accessing specific parts or all data objects from this kind of data set. Finally, we carry on the efficiency and security analysis of the scheme. The analysis results show that the scheme is efficient and safe.

基于密文策略属性的加密(CP-ABE)是一种适用于云存储安全数据共享的加密方案。基于网格理论的 CP-ABE 具有抵御量子攻击的特性。同一数据拥有者上传到云的一些数据对象可能会引起利益冲突,或者它们的组合可能会暴露敏感信息。本文基于环误差学习(R-LWE)问题,提出了一种网格上的可撤销 CP-ABE 方案,对用户访问此类数据对象实施访问控制约束。在该方案中,首先,通过添加虚拟属性来修改此类数据对象的访问策略。其次,我们控制与假属性相关的秘钥组件或撤销假属性,以防止用户持续访问此类数据集中的特定部分或全部数据对象。最后,我们对方案进行了效率和安全性分析。分析结果表明,该方案是高效和安全的。
{"title":"Lattice-Based CP-ABE Access Control for SDS Constraint with Lazy Assignment of Attributes and Attribute Revocation","authors":"Ting Guo,&nbsp;Abdugeni Abduxkur,&nbsp;Nurmamat Helil","doi":"10.1049/2024/6963475","DOIUrl":"10.1049/2024/6963475","url":null,"abstract":"<p>Ciphertext-policy attribute-based encryption (CP-ABE) is a cryptographic scheme suitable for secure data sharing on cloud storage. The CP-ABE based on lattice theory has the property of resisting quantum attack. Some data objects uploaded to the cloud by the same data owner may cause conflicts of interest, or their combination may expose sensitive information. This paper proposes a revocable CP-ABE scheme on the lattice, based on ring learning with error (R-LWE) problem, to enforce access control constraints on user access to such data objects. In this scheme, first, the access policies of such data objects are amended by adding dummy attributes. Second, we control the secret key components associated with the dummy attributes or revoke the dummy attributes to prevent users from continuously accessing specific parts or all data objects from this kind of data set. Finally, we carry on the efficiency and security analysis of the scheme. The analysis results show that the scheme is efficient and safe.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2024 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/2024/6963475","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141425052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Code-Based One-Time Blind Signature Scheme for Electronic Forensics 基于代码的高效电子取证一次性盲签名方案
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-14 DOI: 10.1049/2024/6656367
Haiyan Xiu, Fang Ren, Xinglong Xue, Dong Zheng

We propose a one-time blind signature scheme based on coding theory, which is improved on the basis of the SHMWW protocol. By adding two blinding factors, the anonymity of users is protected. The analysis proves that the scheme is secure and meets the requirements of completeness, blindness, and one-more unforgeability. Under the 128-bit security level, our scheme can achieve a signature length of 2.1 kB. The experimental results show that our scheme has a short signature length and high execution efficiency. Our scheme can also be applied to electronic forensics of traffic accidents on the Internet of Vehicles, which can protect users’ privacy.

我们提出了一种基于编码理论的一次性盲签名方案,该方案在 SHMWW 协议的基础上进行了改进。通过增加两个盲因子,保护了用户的匿名性。分析证明,该方案是安全的,满足完整性、盲性和一次不可伪造性的要求。在 128 位安全等级下,我们的方案可以实现 2.1 kB 的签名长度。实验结果表明,我们的方案具有较短的签名长度和较高的执行效率。我们的方案还可应用于车联网交通事故的电子取证,保护用户隐私。
{"title":"An Efficient Code-Based One-Time Blind Signature Scheme for Electronic Forensics","authors":"Haiyan Xiu,&nbsp;Fang Ren,&nbsp;Xinglong Xue,&nbsp;Dong Zheng","doi":"10.1049/2024/6656367","DOIUrl":"10.1049/2024/6656367","url":null,"abstract":"<p>We propose a one-time blind signature scheme based on coding theory, which is improved on the basis of the SHMWW protocol. By adding two blinding factors, the anonymity of users is protected. The analysis proves that the scheme is secure and meets the requirements of completeness, blindness, and one-more unforgeability. Under the 128-bit security level, our scheme can achieve a signature length of 2.1 kB. The experimental results show that our scheme has a short signature length and high execution efficiency. Our scheme can also be applied to electronic forensics of traffic accidents on the Internet of Vehicles, which can protect users’ privacy.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2024 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/2024/6656367","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141326744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LπCET: A Logic Security Analysis for Cryptographic Protocols Based on π-Calculus Extension Theory LπCET:基于π微积分扩展理论的密码协议逻辑安全分析
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-12 DOI: 10.1049/2024/2634744
Fusheng Wu, Jinhui Liu, Yanbin Li, Mingtao Ni

The π-calculus is a basic theory of mobile communication based on the notion of interaction, which, is aimed at analyzing and modeling the behaviors of communication processes in communicating and mobile systems, and is widely applied to the security analysis of cryptographic protocol’s design and implementation. But the π-calculus does not provide seamless logical security analysis, so the logical flaws in the design and the implementation of a cryptographic protocol cannot be discovered in time. This paper introduces logical rules and logical proofs, binary tree, and the KMP algorithm and proposes a new extension of the π-calculus theory, a logical security analysis method, and an algorithm. The aim is to analyze whether there are logical flaws in the design and the implementation of a cryptographic protocol, to ensure the security of the cryptographic protocol when it is encoded into software and implemented. This paper presents the logical security proof and analysis of the TLS1.3 protocol’s interactional implementation process. Empirical results show that the additional extension theory, the logical security analysis method, and the algorithm can effectively analyze whether there are logical flaws in the design and the implementation of a cryptographic protocol.

π演算法是基于交互概念的移动通信基础理论,旨在对通信和移动系统中的通信过程行为进行分析和建模,被广泛应用于密码协议设计和实现的安全分析。但π演算法不能提供无缝的逻辑安全分析,因此不能及时发现密码协议设计和实现中的逻辑缺陷。本文介绍了逻辑规则和逻辑证明、二叉树和 KMP 算法,并提出了 π 微积分理论的新扩展、逻辑安全分析方法和算法。其目的是分析加密协议在设计和实现过程中是否存在逻辑缺陷,以确保加密协议在编码成软件并实现时的安全性。本文介绍了 TLS1.3 协议交互实现过程的逻辑安全证明和分析。实证结果表明,附加扩展理论、逻辑安全分析方法和算法能有效分析加密协议在设计和实现过程中是否存在逻辑缺陷。
{"title":"LπCET: A Logic Security Analysis for Cryptographic Protocols Based on π-Calculus Extension Theory","authors":"Fusheng Wu,&nbsp;Jinhui Liu,&nbsp;Yanbin Li,&nbsp;Mingtao Ni","doi":"10.1049/2024/2634744","DOIUrl":"10.1049/2024/2634744","url":null,"abstract":"<p>The <i>π</i>-calculus is a basic theory of mobile communication based on the notion of interaction, which, is aimed at analyzing and modeling the behaviors of communication processes in communicating and mobile systems, and is widely applied to the security analysis of cryptographic protocol’s design and implementation. But the <i>π</i>-calculus does not provide seamless logical security analysis, so the logical flaws in the design and the implementation of a cryptographic protocol cannot be discovered in time. This paper introduces logical rules and logical proofs, binary tree, and the KMP algorithm and proposes a new extension of the <i>π</i>-calculus theory, a logical security analysis method, and an algorithm. The aim is to analyze whether there are logical flaws in the design and the implementation of a cryptographic protocol, to ensure the security of the cryptographic protocol when it is encoded into software and implemented. This paper presents the logical security proof and analysis of the TLS1.3 protocol’s interactional implementation process. Empirical results show that the additional extension theory, the logical security analysis method, and the algorithm can effectively analyze whether there are logical flaws in the design and the implementation of a cryptographic protocol.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2024 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/2024/2634744","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141308899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PATS: Let Parties Have a Say in Threshold Group Key Sharing PATS:让各方在阈值群组密钥共享中发表意见
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-09 DOI: 10.1049/2024/7557514
Adnan Kılıç, Cansu Betin Onur, Ertan Onur

We present a password-authenticated (2, 3)-threshold group key share (PATS) mechanism. Although PATS resembles threshold secret sharing schemes, it has a different structure. The innovative perspective of the PATS mechanism that makes a difference from the standard secret-sharing schemes is that it involves parties in the generation of the shares. PATS allows parties to communicate securely to establish their shares over insecure channels. Parties (shareholders) construct a secret (key) using shares obtained at the end of the protocol. PATS takes advantage of zero-knowledge proofs compared to well-known threshold key exchange schemes and will tolerate the existence of semi-trusted parties. We present two variants of PATS, centralized and distributed, and then generalize PATS to (t, n)-threshold scheme. PATS supports the distributed operation and optionally facilitates group key verification by a trusted third party, which may also partake in group key sharing. In this paper, we present PATS, which employs finite fields and elliptic curves, along with its security and complexity analyses.

我们提出了一种密码验证(2,3)阈值群组密钥共享(PATS)机制。虽然 PATS 与阈值密钥共享机制相似,但它的结构却有所不同。PATS 机制有别于标准秘密共享方案的创新之处在于,它让各方都参与到密钥共享的生成过程中。PATS 允许各方在不安全的信道上进行安全通信,以建立他们的共享。各方(股东)使用协议结束时获得的份额构建秘密(密钥)。与众所周知的阈值密钥交换方案相比,PATS 利用了零知识证明的优势,并能容忍半信任方的存在。我们介绍了 PATS 的两种变体:集中式和分布式,然后将 PATS 推广到 (t, n) 门槛方案。PATS 支持分布式操作,并可选择由受信任的第三方进行群组密钥验证,该第三方也可参与群组密钥共享。本文介绍了采用有限域和椭圆曲线的 PATS 及其安全性和复杂性分析。
{"title":"PATS: Let Parties Have a Say in Threshold Group Key Sharing","authors":"Adnan Kılıç,&nbsp;Cansu Betin Onur,&nbsp;Ertan Onur","doi":"10.1049/2024/7557514","DOIUrl":"10.1049/2024/7557514","url":null,"abstract":"<p>We present a password-authenticated (2, 3)-threshold group key share (PATS) mechanism. Although PATS resembles threshold secret sharing schemes, it has a different structure. The innovative perspective of the PATS mechanism that makes a difference from the standard secret-sharing schemes is that it involves parties in the generation of the shares. PATS allows parties to communicate securely to establish their shares over insecure channels. Parties (shareholders) construct a secret (key) using shares obtained at the end of the protocol. PATS takes advantage of zero-knowledge proofs compared to well-known threshold key exchange schemes and will tolerate the existence of semi-trusted parties. We present two variants of PATS, centralized and distributed, and then generalize PATS to (<i>t</i>, <i>n</i>)-threshold scheme. PATS supports the distributed operation and optionally facilitates group key verification by a trusted third party, which may also partake in group key sharing. In this paper, we present PATS, which employs finite fields and elliptic curves, along with its security and complexity analyses.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2024 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/2024/7557514","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141298410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Joint Defense and Monitoring for Networks Security under Uncertainty: A POMDP-Based Approach 不确定性条件下网络安全的最佳联合防御与监控:基于 POMDP 的方法
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-27 DOI: 10.1049/2024/7966713
Armita Kazeminajafabadi, Mahdi Imani

The increasing interconnectivity in our infrastructure poses a significant security challenge, with external threats having the potential to penetrate and propagate throughout the network. Bayesian attack graphs have proven to be effective in capturing the propagation of attacks in complex interconnected networks. However, most existing security approaches fail to systematically account for the limitation of resources and uncertainty arising from the complexity of attacks and possible undetected compromises. To address these challenges, this paper proposes a partially observable Markov decision process (POMDP) model for network security under uncertainty. The POMDP model accounts for uncertainty in monitoring and defense processes, as well as the probabilistic attack propagation. This paper develops two security policies based on the optimal stationary defense policy for the underlying POMDP state process (i.e., a network with known compromises): the estimation-based policy that performs the defense actions corresponding to the optimal minimum mean square error state estimation and the distribution-based policy that utilizes the posterior distribution of network compromises to make defense decisions. Optimal monitoring policies are designed to specifically support each of the defense policies, allowing dynamic allocation of monitoring resources to capture network vulnerabilities/compromises. The performance of the proposed policies is examined in terms of robustness, accuracy, and uncertainty using various numerical experiments.

我们基础设施中日益增长的互联性带来了巨大的安全挑战,外部威胁有可能渗透并传播到整个网络。事实证明,贝叶斯攻击图可以有效捕捉复杂互连网络中的攻击传播。然而,大多数现有的安全方法未能系统地考虑资源的局限性、攻击的复杂性所带来的不确定性以及可能未被发现的破坏。为应对这些挑战,本文提出了一种不确定情况下的部分可观测马尔可夫决策过程(POMDP)网络安全模型。POMDP 模型考虑了监控和防御过程中的不确定性,以及攻击传播的概率性。本文根据底层 POMDP 状态过程(即已知入侵情况的网络)的最优静态防御策略,开发了两种安全策略:基于估计的策略(执行与最优最小均方误差状态估计相对应的防御行动)和基于分布的策略(利用网络入侵情况的后验分布做出防御决策)。设计的最优监控策略专门支持每种防御策略,允许动态分配监控资源以捕获网络漏洞/威胁。通过各种数值实验,从稳健性、准确性和不确定性等方面检验了所建议策略的性能。
{"title":"Optimal Joint Defense and Monitoring for Networks Security under Uncertainty: A POMDP-Based Approach","authors":"Armita Kazeminajafabadi,&nbsp;Mahdi Imani","doi":"10.1049/2024/7966713","DOIUrl":"10.1049/2024/7966713","url":null,"abstract":"<p>The increasing interconnectivity in our infrastructure poses a significant security challenge, with external threats having the potential to penetrate and propagate throughout the network. Bayesian attack graphs have proven to be effective in capturing the propagation of attacks in complex interconnected networks. However, most existing security approaches fail to systematically account for the limitation of resources and uncertainty arising from the complexity of attacks and possible undetected compromises. To address these challenges, this paper proposes a partially observable Markov decision process (POMDP) model for network security under uncertainty. The POMDP model accounts for uncertainty in monitoring and defense processes, as well as the probabilistic attack propagation. This paper develops two security policies based on the optimal stationary defense policy for the underlying POMDP state process (i.e., a network with known compromises): the estimation-based policy that performs the defense actions corresponding to the optimal minimum mean square error state estimation and the distribution-based policy that utilizes the posterior distribution of network compromises to make defense decisions. Optimal monitoring policies are designed to specifically support each of the defense policies, allowing dynamic allocation of monitoring resources to capture network vulnerabilities/compromises. The performance of the proposed policies is examined in terms of robustness, accuracy, and uncertainty using various numerical experiments.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2024 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/2024/7966713","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141246107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automated Differential-Linear Cryptanalysis for AND-RX Ciphers AND-RX 密码的自动差分线性密码分析
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-21 DOI: 10.1049/2024/6164262
Wenya Li, Kai Zhang, Bin Hu

Differential and linear cryptanalysis are two important methods to evaluate the security of block ciphers. Building on these two methods, differential-linear (DL) cryptanalysis was introduced by Langford and Hellman in 1994. This cryptanalytic method has been not only extensively researched but also proven to be effective. In this paper, a security evaluation framework for AND-RX ciphers against DL cryptanalysis is proposed, which is denoted as . In addition to modeling the structure of all the possible differential trails and linear trails at the bit level, we introduce a method to calculate this structure round by round. Based on this approach, an automatic algorithm is proposed to construct the DL distinguisher. Unlike previous methods, uses a truncated differential and a linear hull instead of a differential characteristic and a linear approximation, which brings the bias of the DL distinguisher close to the experimental value. To validate the effectiveness of the framework, is applied to Simon and Simeck, which are two typical AND-RX ciphers. With the automatic algorithm, we discover an 11-round DL distinguisher of Simon32 with bias 2−14.89 and a 12-round DL distinguisher of Simeck32 with bias 2−14.89. Moreover, the 14-round DL distinguisher of Simon48 with bias 2−22.30 is longer than the longest DL distinguisher currently known. In addition, the framework shows advantages when analyzing ciphers with large block sizes. As far as we know, for Simon64/96/128 and Simeck48/64, the first DL distinguishers are obtained with our framework. The DL distinguishers are 16, 23, 32, 17, and 22 rounds of Simon64/96/128 and Simeck48/64 with bias 2−24.31, 2−47.57, 2−60.75, 2−22.54, and 2−31.41, respectively. To prove the correctness of distinguishers, experiments on Simon32 and Simeck32 have been performed. The experimental bias are 2−13.76 and 2−14.82, respectively. Comparisons of the theoretical and experimental results show good agreement.

微分和线性密码分析是评估块密码安全性的两种重要方法。在这两种方法的基础上,Langford 和 Hellman 于 1994 年提出了差分-线性(DL)密码分析法。这种密码分析方法不仅被广泛研究,而且被证明是有效的。本文提出了一个针对 DL 密码分析的 AND-RX 密码安全评估框架,并将其命名为 K6。除了在比特级对所有可能的差分轨迹和线性轨迹的结构进行建模外,我们还引入了一种逐轮计算这种结构的方法。基于这种方法,我们提出了一种构建 DL 识别器的自动算法。与之前的方法不同,K6 使用的是截断差分和线性外壳,而不是差分特征和线性近似,这使得 DL 区分器的偏差接近实验值。为了验证该框架的有效性,K6 被应用于 Simon 和 Simeck 这两个典型的 AND-RX 密码。通过自动算法,我们发现 Simon32 的 11 轮 DL 鉴别器偏差为 2-14.89,Simeck32 的 12 轮 DL 鉴别器偏差为 2-14.89。此外,偏差为 2-22.30 的西蒙 48 的 14 轮 DL 识别器比目前已知的最长 DL 识别器还要长。此外,K6 框架在分析大块大小的密码时也显示出优势。据我们所知,对于 Simon64/96/128 和 Simeck48/64,我们的框架首次获得了 DL 识别器。西蒙 64/96/128 和西梅克 48/64 的 DL 识别器分别为 16、23、32、17 和 22 轮,偏差分别为 2-24.31、2-47.57、2-60.75、2-22.54 和 2-31.41。为了证明区分器的正确性,对 Simon32 和 Simeck32 进行了实验。实验偏差分别为 2-13.76 和 2-14.82。理论结果和实验结果的比较显示出良好的一致性。
{"title":"Automated Differential-Linear Cryptanalysis for AND-RX Ciphers","authors":"Wenya Li,&nbsp;Kai Zhang,&nbsp;Bin Hu","doi":"10.1049/2024/6164262","DOIUrl":"10.1049/2024/6164262","url":null,"abstract":"<p>Differential and linear cryptanalysis are two important methods to evaluate the security of block ciphers. Building on these two methods, differential-linear (DL) cryptanalysis was introduced by Langford and Hellman in 1994. This cryptanalytic method has been not only extensively researched but also proven to be effective. In this paper, a security evaluation framework for AND-RX ciphers against DL cryptanalysis is proposed, which is denoted as <span></span><math></math>. In addition to modeling the structure of all the possible differential trails and linear trails at the bit level, we introduce a method to calculate this structure round by round. Based on this approach, an automatic algorithm is proposed to construct the DL distinguisher. Unlike previous methods, <span></span><math></math> uses a truncated differential and a linear hull instead of a differential characteristic and a linear approximation, which brings the bias of the DL distinguisher close to the experimental value. To validate the effectiveness of the framework, <span></span><math></math> is applied to Simon and Simeck, which are two typical AND-RX ciphers. With the automatic algorithm, we discover an 11-round DL distinguisher of Simon32 with bias 2<sup>−14.89</sup> and a 12-round DL distinguisher of Simeck32 with bias 2<sup>−14.89</sup>. Moreover, the 14-round DL distinguisher of Simon48 with bias 2<sup>−22.30</sup> is longer than the longest DL distinguisher currently known. In addition, the framework <span></span><math></math> shows advantages when analyzing ciphers with large block sizes. As far as we know, for Simon64/96/128 and Simeck48/64, the first DL distinguishers are obtained with our framework. The DL distinguishers are 16, 23, 32, 17, and 22 rounds of Simon64/96/128 and Simeck48/64 with bias 2<sup>−24.31</sup>, 2<sup>−47.57</sup>, 2<sup>−60.75</sup>, 2<sup>−22.54</sup>, and 2<sup>−31.41</sup>, respectively. To prove the correctness of distinguishers, experiments on Simon32 and Simeck32 have been performed. The experimental bias are 2<sup>−13.76</sup> and 2<sup>−14.82</sup>, respectively. Comparisons of the theoretical and experimental results show good agreement.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2024 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2024-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/2024/6164262","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141118099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IET Information Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1