The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The method for finding inverse element by the module is based on the stepwise addition of residue is developed in this paper. This method allows avoiding performing the complex arithmetic operations and implementing calculations on numbers much lower bit compared to the classical approach based on the Euclid's algorithm and its consequences. Analytical expressions of time complexity characteristics...
IEEE Security & Privacy met with several interesting speakers at the 23rd ACM Conference on Computer and Communications Security (CCS), held 24-28 October 2016 in Vienna. IEEE S&P is highlighting these interviews in its Spotlight department. This issue features Turing Award winner Martin Hellman, who discusses issues including marriage and international security.
IEEE Security & Privacy met with several interesting speakers at the 23rd ACM Conference on Computer and Communications Security (CCS), held 24-28 October 2016 in Vienna. IEEE S&P is highlighting these interviews in its Spotlight department. This issue features MIT Lincoln Laboratory's Hamed Okhravi, cryptographer and cryptanalyst Bart Preneel of KU Leuven, and former assistant director...
With the continuing progress in semiconductor technology the design and certification of security microcontrollers faces new challenges. This presentation looks at the impact of technologies below 65nm from a manufacturer's perspective, analysing the changes in effectiveness and necessary effort of different attack techniques, and presenting scenarios that showcase the need for hardware security while...
The Integrity protection (IP) of software which deals with eHealth data, addresses the problem of static or dynamic code modification of the software. An attacker with the ability to modify the execution of software which deals with eHealth data can tamper with eHealth data. The target of IP is to protect the software assets; in this case it is to protect eHealth data. By modifying the binary source...
Assuring system integrity to a remote communication partner through attestation is a security concept which also is very important for safety-critical systems facing security threats. Most remote attestation methods are based on integrity measurement mechanisms embedded in the underlying hardware or software (e.g. operating system). Alternatively, the application software can measure itself, whereas...
This work seeks to expose the vulnerability of un-trusted computing platforms used in critical systems to hardware Trojans and combined hardware/software attacks. As part of our entry in the Cyber Security Awareness Week (CSAW) Embedded System Challenge hosted by NYU-Poly in 2011, we developed and presented 10 such processor-level hardware Trojans. These are split in five categories with various impacts,...
SQL Injection poses a serious security issue over the Internet or over web application. In SQL injection attacks, hackers can take advantage of poorly coded Web application software to introduce malicious code into the organization's systems and network. The vulnerability exists when a Web application do not properly filter or validate the entered data by a user on a Web page. Large Web applications...
In the field of information security, one of the most important topic is how to construct cryptosystem. In this paper, firstly we propose definition of cryptosystem with low-power consumption. Then, methods to construct symmetric and asymmetric cryptosystem with low-power consumption are given. Finally, we discuss how to design component element of cryptosystem with low-power consumption.
This paper utilized the arrangement points of AES_256 key, analyzed the difference features of AES_256, and found a method of collision attack. This paper also made use of connection differential features and collision method of AES_256 to analyze the 72 bytes of the initial key of AES_256, with a complexity of 2.
Secure computing is gaining importance in recent times as computing capability is increasingly becoming distributed and information is everywhere. Prevention of piracy and digital rights management has become very important. Information security is mandatory rather than an additional feature. Numerous software techniques have been proposed to provide certain level of copyright and intellectual property...
Summary form only given. Secure computing is gaining importance in recent times as computing capability is increasingly becoming distributed and information is everywhere. Prevention of piracy and digital rights management has become very important. Information security is mandatory rather than an additional feature. Numerous software techniques have been proposed to provide certain level of copyright...
Secure computing is gaining importance in recent times as computing capability is increasingly becoming distributed and information is everywhere. Prevention of piracy and digital rights management has become very important. Information security is mandatory rather than an additional feature. Numerous software techniques have been proposed to provide certain level of copyright and intellectual property...
Secure computing is gaining importance in recent times as computing capability is increasingly becoming distributed and information is everywhere. Prevention of piracy and digital rights management has become very important. Information security is mandatory rather than an additional feature. Numerous software techniques have been proposed to provide certain level of copyright and intellectual property...
Secure computing is gaining importance in recent times as computing capability is increasingly becoming distributed and information is everywhere. Prevention of piracy and digital rights management has become very important. Information security is mandatory rather than an additional feature. Numerous software techniques have been proposed to provide certain level of copyright and intellectual property...
The evaluation of intelligent decision making is a key quagmire. Given the current status of intelligent decision making archetypes, analysts clearly desire the rough sets and particle swarm optimization, which embodies the practical principles of cryptography. Our focus in our research is not on whether the intelligent decision making problem and the rough sets are rarely incompatible, but rather...
This paper introduces a method of hiding information in a 24-bit BMP image. The key technique of encryption is to convert the hidden messages into a bit stream, and fills it in the certain position of the BMP file. The size of the cover image file is not changed after data embedding and the color variations of each byte of the image are changed at most 1/256, which will not detected by human eyes...
Software piracy is the greatest threats to software industry, which will bring serious damages to the interests of software developers or providers. As a prevention technique, software watermarking is a new research area that aims at providing copyright protection for commercial software. This article proposes a hash function based dynamic software watermarking algorithm. By constructing appropriate...
This paper investigates the hardware trust of a trusted computing platform. Initially, some prior researches are discussed. Based on these researches, we point out that hardware trust is the same important as the software trust in a trusted computing platform. Then, we introduce the notion of Hardware Integrity Measurement (HIM), which is similar to the software integrity measurement required by the...
It is said that more than 50% of web-based malware originates in malicious IFRAME injection attacks. But what is behind those pesky URLs? A while back, it was an easy task to find out - the code behind it was plain or just slightly obfuscated. Lately though, script encryption routines have become more and more elegant and sophisticated. As attackers deploy exploits for a wide range of vulnerable components,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.