The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The cryptographic properties of a class of Boolean functions with maximum algebraic immunity are investigated. Its algebraic normal form is described, its Walsh spectrum is determined and its resistance to fast algebraic attacks is observed by computer experiments. The maximum algebraic degree of this class of Boolean functions is n - 1. It has always the same nonlinearity, which is the minimum nonlinearity...
Chaos system is a kind of complicated, nonlinear dynamic system. The complexity, pseudo-random and sensitivity to initial conditions of chaotic sequence have close relationship to cryptographic properties. We analyze the typical dynamic system-logistic mapping. On the basis of this analysis, we present a novel Chinese character encryption algorithm based on logistic mapping. This new methods computes...
Online payment is the key point and the basic conditions to the development of electronic commerce, which greatly promote the development of e-commerce, and brought prosperity to the e-commerce. As e-commerce is one of the fastest economic growth of China, the online payment and its security becomes particularly important. This paper analysis from three aspects: the current development status of e-commerce...
A proxy signature scheme is an important extension of the digital signature scheme, nowadays, is an active research topic, which attracts more researchers' attentions. As an ordinary digital signature scheme, a proxy signature is a vulnerable to the key exposure problem. In case, the secret signing key of the authorized user is be revealed or stolen. The aim of this paper is to put forth a proxy signature...
This paper proposes to use a single unique global identity for every entity especially mankind, used for multiple purposes requiring only one IPv6 address to identify the entity. The IPv6 address assigned to a human entity can be used to identify the individual and coupled with the individuals biometric identity can access to the individuals records in a file stored in a distributed server. The IPv6...
Even as the rate of IPv6 deployment increases, there continues to be a number of key technical, operational and political challenges that have limited the overall adoption rate of IPv6. This paper is intended to explore the IPv6 technical features, advantages, research improvements, potential business benefits. This paper also investigates how some of the challenges have slowed the transition process...
In this paper, we review LEX, a stream cipher that harnesses the strength of the Advanced Encryption Standard (AES) block cipher to produce ciphertext at 2.5 times the speed of the AES. Both AES and LEX have been attacked due to the way that they convert master keys into round keys or state. We consider ways in which to remove the vulnerabilities of LEX without diminishing its throughput. We propose...
Mobile devices act as hosts and routers in Mobile Ad-hoc Networks with no designed infrastructure. The enormous increase in MANETs provides the evolution of various solutions from wired to wireless to Mobile Ad-hoc Networks. The security has been the key in any communication implementation. The security implementation in MANET is a challenging and not considered much for research. In this work we...
Acceptance of the use of Radio Frequency Identification is increasing day by day. The mass-market attention towards RFID can only by gathered if this technology can provide useful features to users for daily life without compromising the security concerns. Although the research is on its way to give many useful features like medical support for doctors using RFID Components, RFID-Enabled Electronic...
In many broadcast systems, it is important to protect both distributed content and the identities of authorized recipients. But many systems fail to protect the privacy of their users. In this paper, we propose the first identity-based broadcast encryption scheme with recipient privacy, enables the efficient encryption of messages to multiple recipients without revealing the identities of authorized...
One-Time-Password authentication is a simple, little cost and more efficient technology. Access control is another mechanism by controlling access which is legal or not. These two are separate. To get high safety and reduce the complexity of operating, this paper proposes a new integrated scheme base on them. It has some important merits include:(1)there is no verification table;(2)users can freely...
In order to maintain format compliance of MPEG video, some encryption algorithms using spatiotemporal chaotic system for information-carrying fields of MPEG are presented. For balancing the tradeoff between security and performance, a comprehensive algorithm is proposed then. Experiment results and performance analyses show that the proposed scheme achieves format compliance, high security, high compression...
As the quantum cryptography is the ultimate solution for information security. Quantum cryptography describes the ultimate way for key distribution. Unlike many of the classical cryptosystems in use today, whose security often draws on unproven assumptions about the computational complexity of mathematical problems, the security of quantum cryptography is based on the laws of physics. The Quantum...
In this paper, the non-uniform discrete Fourier transform (NDFT) is utilized to randomly select sampling points in frequency domain, which could make the embedding points private. Furthermore, to improve security two different chaotic maps is used. One chaotic map is used to choose the NDFT domain embedding points for making them unpredictable; the other is used to encrypt the watermark to be embedding...
As a new generation of basal construction has been established on Internet, Grid has great potentials and advantages. This paper focus on establishing a security architecture for E-Business in the grid environment based on OGSA grid security system structure. It is shown that the security framework not only can satisfy all of the security demands of e-business in grid, but also may better protect...
Model checking is to check whether a bounded state system can meet their design specifications using state-space search approach automatically. This paper describes the key exchange protocol SSL 3.0, and conducts a formalized analysis and modeling and verification of the protocol by using the famous model checker tool SPIN. The LTL property is dynamically changed during the verification which can...
In this paper a new block encryption algorithm is proposed by combining the one dimensional discrete chaotic map(Logistic map) and SPN structure. The algorithm has introduced chaotic theory into S-boxes and P-boxes respectively and fully utilized the character of chaotic system, such as Pseudo-random, unpredictable track and sensitive initial condition, to make sure that S-boxes have good confusion...
This paper points out that the capabilities of anti-time attack are worse and they can't keep forward-secure after leaking private key through the analysis of the forward-secure digital signature scheme based on factorization and discrete logarithm of finite field. A new forward security digital signature scheme based on elliptic cure is proposed in this paper. The security and forward-quality of...
Single sign-on (SSO) solutions are classified into several modes and the flaws of each mode are pointed out in the paper. To overcome these drawbacks, a support heterogeneous systems and multi-management mode SSO (SHM-SSO) schema is proposed. Data modeling and data synchronization strategy is used in the schema to ensure subsystems run well while the Authentication Center (AC) fails and decline the...
Privacy-preserving computational geometry (PPCG) is a Secure Multi-party Computation problem. Determining the relationship of a point and a hyperspace is a security of the points-range inclusion problem which is one of PPCG problems. This paper studies the special SMC protocols to solve the special computational geometry problem, uses random technology to improve efficiency, so that it can be better...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.