The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We address the problem of quantifying the cryptographic content of probability distributions, in relation to an application to secure multi-party sampling against a passive t-adversary. We generalize a recently introduced notion of assisted common information of a pair of correlated sources to that of K sources and define a family of monotone rate regions indexed by K. This allows for a simple characterization...
In this paper we propose a man in the middle attack on a class of SVD based watermarking methods. We have shown that our attack is successful in creating false positive detection rate with probability one. We also show the previously proposed a man in the middle attack is not realistic. Consequently, our proposed attack is the first realistic attack on this class of watermarking methods. The simulation...
A major breakthrough in side channel attacks came up when analysis of power consumption by a cryptographic device led to discovery of the secret key. This analysis technique popularly known as Power Analysis Attack is now one of the most volatile and successful side channel attacks. This technique uses the power consumed by a cryptographic system as the main parameter to identify the cryptographic...
In the last decade, many side channel attacks have been published in academic literature detailing how to efficiently extract secret keys by mounting various attacks, such as differential or correlation power analysis, on cryptosystems. Among the most efficient and widely utilized leakage models involved in these attacks are the Hamming weight and distance models which give a simple, yet effective,...
Recent results have shown that the compressed sensing (CS) framework can provide a form of data confidentiality when the signals are sensed by a fully random matrix. In this paper, we extend those results by considering the security achievable by partially circulant sensing matrices generated from a vector of random variables. Circulant matrices, having similar CS recovery performance as fully random...
Side-channel analysis has become a standard procedure for designing and implementing secure cryptographic primitives of embedded information technology based security systems. In this paper we introduce and discuss the usage of so-called constructive side-channel analysis to optimise the implementation process of secure cryptographic primitives with respect to implementation attacks such as side-channel...
A new model for a Client-Server Communication (CSC) system satisfying information theoretic security is proposed, and its fundamental properties are discussed. Our CSC allows n users to upload their respective messages to a server securely by using symmetric key encryptions with their own keys, and all ciphertexts are decrypted by the server. If we require all messages to be perfectly secure in CSC...
Trojan side channels (TSCs) are serious threats to the security of cryptographic systems because they facilitate to leak secret keys to attackers via covert side channels that are unknown to designers. To tackle this problem, we present a new hardware Trojan detection technique for TSCs. To be specific, we first investigate general power-based TSC designs and discuss the tradeoff between their hardware...
In this paper, the stop-and-go clock-controlled generator based on feedback with carry shift register (FCSR) is considered. The elementary statistical properties of its sequences are investigated. We prove that some d-decimation sequences are of ideal arithmetic correlation under certain conditions. Moreover, the upper and lower bounds of the 2-adic complexity of an output sequence are obtained when...
This paper reviews some major techniques related to the security issues in Picture Archiving and Communications System (PACS) of medical images. Three conventional techniques including watermarking, digital signature and encryptions are studied. The encryption scheme using highly-robust chaotic signals is also proposed as a new lossless physical-layer that improves security in medical images in PACS...
Side-channel attack (SCA) is a very efficient cryptanalysis technology to attack cryptographic devices. It takes advantage of physical information leakages to recover the cryptographic key. In order to strengthen the power to extract the cryptographic key-relevant information, this article introduces the Support Vector Machine technologies. Taking a software implementation of masked AES-256 on an...
The validation of images taken by digital cameras has become a great concern as the digital photography is gaining rapid popularity. So, due to lack of protection of digital content as they can be easily duplicated and disseminated without the owner's consent, publishers, artists, and photographers, however, are unwilling to distribute images or other data over the Internet. Therefore, to protect...
In this paper, a novel public key encryption scheme for large image is presented based on elliptic curve. As a public key encryption scheme, it does not need to exchange and distribute secret keys. Based on elliptic curve discrete logarithm problem (ECDLP), the scheme has high security. The simulation results show that the presented scheme is computationally less complex than ECC (Elliptic Curve Cryptography)...
In the distributed network, quantum teleportation can teleport a quantum state from one quantum device to a remote site by using quantum entangled particles. Quantum entangled particles have the correlation among sharing party of distributed node to form a special relation for transmitting quantum message and classical message. In the paper, we derive a novel quantum key with indirect communication...
This paper presents a new proposal for hiding the cryptographic key, when the so-called side-channel attacks (SCAs) are applied to break the security of AES-128. The algorithm was executed on MicroBlaze, but the proposed method is generic and can be extended to any other microprocessor. SCAs are based on examining the correlation produced between the data and operations performed by the microprocessor...
Furthering the study of cryptography in constant parallel time, we give new evidence for the security of Gold Reich's candidate pseudorandom generator with near-optimal, polynomial stretch. Our evidence consists both of security against sub exponential-time linear attacks as well as sub exponential-time attacks using SDP hierarchies such as Sherali-Adams+ and Lasserre/Parrilo. More specifically, instantiating...
Side-channel attacks reveal the secret key of a cryptographic circuit by measuring power consumption or electromagnetic radiation during cryptographic operations. Side-channel information leaks that are exploited by power analysis (PA) and electromagnetic analysis (EMA) attacks are thought to be caused by consumption current. However, our research group recently found novel geometric leaks that only...
The security of many cryptographic applications relies heavily on the quality of the random numbers used. Therefore, random number generation is one of the most critical primitives for cryptography. This paper focuses on true random number generators (TRNGs) and the analysis of their security requirements. After illustrating issues associated with adversarial influences on TRNGs, we propose a simple...
This paper presents Differential Power Analysis (DPA) attack on 32-bit ARM Cortex-M3 microprocessor. Attacked algorithm is unprotected Advanced Encryption Standard (AES) with 128-bit key. DPA attack is deployed on the ARM processor by measuring its instantaneous power consumption during encryption algorithm. Analyzed power consumption traces obtained from the measurement are out-of-sync as they would...
Pseudorandom number generators are used for session key generation, simulation and games, and other applications that need long bit sequences which posses a lot of qualities like large cycle length and uniform distribution over the range of number domain. There are many state of art algorithms present. This paper is the result of an effort to develop a new Pseudorandom Number Generator that can be...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.