The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Efficient identity based signature/signcryption in the standard model with full security has been pursued for a long time. At ISDPE'07, Ren and Gu claimed to construct efficient identity based signature/signcryption schemes with full security in the standard model. They claimed their schemes have short public parameters, high efficiency and a tight reduction. But in this paper we give attacks to their...
This paper proposes a improvement of a common key block cipher, HyRAL[1], which has 128bits block length and supports key length of 128, 192, and256bits. It has a 4way generalized Feistel Structure of 24 rounds for 128bits key length, and 32 rounds for 192, 256, bits key length. The rounds are consists of G1,F2,F1,G2 functions which have 4-round Feistel structure to make the cryptanalysis hard. We...
This paper proposes a new joint error correction and encryption scheme based on turbo codes, which can be called as turbo-based encryption. The new scheme should have high error-correcting capability as well as security. In order to encrypt information by turbo code, two measures are adopted: 1) The interleaver of turbo code is improved, therefore it can be controlled by a secret key; 2) Another interleaver...
Create a Hamming-Weight model, combine it with traditional algebraic attack, and achieve the Correlation algebraic attack on the first round of AES128 according to correlation coefficient r. The attack experiment proves that owing to this proposed model, it can evidently distinguish the right key bytes from the wrong ones by this function with further computed correlation coefficient r, and in certain...
Hierarchical identity based signature generalizes the concept of identity based signature to organization hierarchy. Till now, there are many interesting hierarchical identity based signature schemes. At ChinaCrypt'08, Ren and Gu claimed to construct an efficient hierarchical identity based signature scheme based on the q-SDH problem with full security in the standard model. They claimed their scheme...
There has been a tremendous growth in the wireless communication networks and their applications around us. Different applications developed over wireless networks can have very different requirements. For some applications, protection from transmission errors might be of primary, whereas for other application the security and privacy of the information in transit might be the primary requirement...
The success and efficiency of managing an emergency situation (such as rescue operation, fire fighting etc.) depends on enabling a system that would ensure the timely availability of high-quality and latest information to the emergency Mobile Units (MU). The system must ensure the provisioning of relevant information in a secure manner irrespective of the location and/or mobility of the MU. The enabling...
This paper considers the problem of key management in wireless networks. In particular, we investigate the effect of dynamic key compromise and recovery on connectivity in large networks. A queuing model with a finite buffer is used to model the dynamics of key compromise. The exact distribution of the fraction of keys compromised is obtained. The result of the queuing analysis is used to determine...
Mobile E-Commerce, as a more convenient and express form of E-Commerce, is developing rapidly with the saturation of E-Commerce market coupled with the widespread of mobile devices. Meanwhile, speech recognition, as a fully-developed identification technology of biological character, receives more praise and abuse than any other scientific breakthroughs. Followed by a brief discussion of the safety...
A virtual disk encryption tool is a privacy protection tool that uses an encryption method by generating virtual disk images. It cannot mount an encrypted virtual disk without any authentication, such as key, passphrase, and etc. Thus, it can be used as an anti- forensic tool that makes difficult to process a digital forensic investigation because the content of the virtual disk cannot be identified...
Deniable ring authentication allows a member of an adhoc sunset of participants to authenticate a message without revealing which member has issued the signature, and the verifier cannot convince any third party that message m was indeed authenticated. Most of the proposed deniable ring authentication schemes's signature size is dependent linearly on the number of ring members which causes inefficiency...
This paper presents an FPGA implementation of Advance Encryption Standard (AES), using Minimal Instruction Set Computer (MISC) with Harvard Architecture. With simple logic components and a minimum set of fundamental instructions, the MISC using Harvard Architecture enables the AES encryption in severely constraint hardware environment, with lesser execution clock cycles. The MISC architecture was...
Communications usually do not have enough security. One of the ways for making the data secure is using methods for coding the information in a special manner. In this article one of the algorithms of coding and decoding information has been reviewed and explained. Coding is converting information to the form of coded text and decoding is the operation of converting coded information to the original...
Key transport protocols are useful to convey the secrete key or session key from one party to another party. These protocols play an important role in key distribution systems if they do not require any priori key sharing. Shamir's No-key protocol is the best example of it; but it does not provide an authentication. In this paper we propose an authenticated key transport protocol based on Shamir's...
The mobile ad hoc network(MANET) brings great challenges in security due to its high dynamics, link vulnerability, and complete decentralization. As an important routing protocol used in ad-hoc network, Multicast Ad-hoc On Demand Distance Vector (MAODV) protocol is not sufficient for security requirements and vulnerable to attacks induced by the hostile environment. In this paper we discuss the impact...
Chaos sequence produced by the chaos system existence of defects of the probability distribution non-uniform, that easily cause the system to be identified attack. By analyzing the value probability distribution in different number position which in chaos sequence, proposed to the chaos sequence kinetic property improvement algorithm. After the improvement chaos sequence distribution is even, has...
This paper proposes an approach to find solution to the Bounded Knapsack Problem (BKP). BKP is a generalization of 0/1 knapsack problem in which multiple instances of distinct items but a single knapsack is considered. This problem occurs in many ways in real-life, such as cryptography, finance, etc. A genetic algorithm using greedy approach is proposed to solve this problem. The experiments prove...
A novel search cheat image encryption algorithm based on hyper-chaotic Chen-system is proposed. Through mapping plain image and cheat image into hyper-chaos variables, the search and iteration algorithm is employed to encrypt plaint image to cheat image that is transferred to receiver in network. Security and performance analysis shows that this method can cheat attackers and has the same confidentiality...
Hidden identity-based signatures (abbreviated as Hidden-IBS) can be seen as a variant of the traditional notion of group signatures. Compared with group signature schemes, Hidden-IBS is more attractive in the application of identity-management systems and anonymous credential systems. In Financial Cryptography 2007, Kiayias and Zhou firstly proposed the Hidden-IBS from bilinear pairings. Unfortunately,...
Most hierarchical access control schemes are based on a trusted center, the keys of users will be fully exposed to it, which has brought potential problems for the scheme's security. This paper presents a hierarchical access control scheme based on the semi-trusted center. The user divides secret key into many shares and sends them to the semi-trusted centers separately. The centers will produce many...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.