The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The hardness of tensor decomposition problem has many achievements, but limited applications in cryptography, and the tensor decomposition problem has been considered to have the potential to resist quantum computing. In this paper, we firstly proposed a new variant of tensor decomposition problem, then two one-way functions are proposed based on the hard problem. Secondly we propose a key exchange...
With the rapid development of the information industry and the widespread use of information technology, information security has become a major concern in our society. In the information society, in addition to being a part of human society and the physical world, all persons are considered to belong to the information space. It is generally accepted that safety and reliability in human society are...
This paper presents a testing method of code redundancy simplification from the aspect of software static analysis. We study on the dependency relationships between the variables, branches and functions in source or intermediate code of the tested object by PDG (Program Dependence Graph). This method establishes an effective testing to discover and locate the redundant functional modules and the unreachable...
Software vulnerability orientation is of great significance to vulnerability exploiting and vulnerability repairing. This paper presents a new method of vulnerability orientation based on complex network theory. We describe the software structure by system-level characteristics of complex network and generate structural signatures of original and patched software. By comparing patches of the similar...
The P-permutation plays an important role in the round function of the block cipher, the MDS codes have been used to design the P-permutations with good characteristics in encryption-system for a long term. This paper finds two types of generated matrix of MDS codes viz. Vandermonde and Cauchy matrices, it gives two kinds of methods based on Vandermonde matrix and Cauchy matrix to construct good P-permutations...
The trusted computing group (TCG) has set down and issued trusted platform module (TPM) specification, and the security of the trusted computing system relies on the security of TPM. In this paper, the relationship between the keys inside TPM and TPM users has been established by analyzing the access control mechanism of TPM. The fact that a malignant user of a child key can break the integrity of...
Orthomorphism is a kind of elementary permutation with good cryptographic properties, which can be used for constructing the S-box in block cipher structure. This paper mainly discussed constructing some orthomorphisms with evolutionary computation, and got some orthomorphisms with high nonlinearity and low difference uniformity by evolutionary algorithm in the open documents for the first time.
The inference analysis of digital evidence aims to look for the clues for further crime detection or reconstruct the attack actions scenarios for prosecution in court. However, the inference analysis process of computer forensic is more subjective because too much experiential work and sensory presentation are in it. It is even possible that an event never occurred but that an inference conclusion...
In the specification of trusted platform module (TPM), object-independent authorization protocol (OIAP) is the protocol which guarantees the security of the communication between TPM and its users. Nowadays, there are many TPM manufacturers having made their own TPM. However, some of the TPM manufacturers don't implement the TPM completely according to the specification of TPM. In this paper, BAN...
With the rapid development of World Wide Web, the Web malicious attackers have taken the initiative jamming in Chinese to transform the form of the key words to be avoided being mined by the software existed. So how to filter the unhealthy Web page quickly and effectively has become the main content of the Web security. Because of the limitation of traditional rigid strings matching on the key words...
Trusted Platform Module (TPM) provides the cryptographic functions through the Application Programming Interfaces (APIs). The specification of APIs reflects the security policies of the designers, in order to manage and protect the sensitive information of users, which is stored in the hardware module. But the security of these APIs has not guaranteed. In this paper, a formal model to describe the...
With simple architecture and faster speed, linear feedback shift register often is selected to produce random number in many applications. However, the random number generated by LFSR cannot meet the demand of unpredictability for secure mechanism. The nonlinearity of genetic algorithm can be used to improve the property of LFSR. We present a novel random number generator by using genetic algorithm...
During these years, computer security is in expeditious progressing. With the serious risk of security, the idea of Trusted Computing was introduced to the Information Technology industry. Trusted Computing has to ensure the computing is on the trusted platforms, so the technology of Trusted Computing Platform (TCP) was developed. In the specification of Trusted Computing Group (TCG), Trusted Platform...
This paper proposes a starriness start-up mechanism in trusted embedded system, a bus arbitration method to implement this mechanism is also designed. At last, we implement this arbitration mechanism in concrete prototype system. As experiment shows, this mechanism is agile to control, easy to expand, secure and reliable.
The inductive approach has been used successfully to analyse local area network protocols, Internet protocols, e-commerce protocols and smart card protocols, But the theorems proofs method is very complex and is very difficult to master. lt requires that a user must guide the proof process, and select the tactic to be applied etc. Proofs are cumbersome and security properties are not built into the...
Presently the research on the security of network contents has faced the challenge of network breakthrough techniques. A popular Chinese network breakthrough technique is to jam malicious characters in key words, and/or replace the Chinese characters in key words with homonyms or homophones, or complicated Chinese characters. With this method some malicious web pages make themselves escape from the...
Survivability is the ability of a system to continue operating despite the presence of abnormal events such as failures and intrusions. This paper presents a quantitative model of spare resource limited survivability (SRLSQM), based on the definition and four characteristic attributes of network survivability. The executing process of SRLSQM is also illustrated and then the calculating formulas are...
One of the threats to watermarking security is unauthorized removal. In this paper, we present a framework based on extended TPM to solve this problem. As to the spread spectrum (SS) watermarking schemes we believe that it has the capability of read- but-not-remove if the platform software environment on which watermark detection process run is trusted. We think using Trusted Computing Platform could...
A RBAC(role based access control) model is extended to TinyRBAC which is a light-weight secured model for wireless sensor network in TinyOS. First the core module, role hierarchy and restricted mechanism of the TinyRBAC are described and defined; Through the analysis and experiments, the secure targets and performance are evaluated. The result shows that the TinyRABC is feasible and useful for wireless...
In this paper, the RBAC (role based access control) model is extended to TinyRBAC which is a light-weight secured model for wireless sensor network in TinyOS. The core module, role hierarchy and restricted mechanism are described and defined in the paper, through the analysis and experiments, the secure targets and performance are evaluated. The result shows that the TinyRABC is feasible and useful...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.