Wireless ad hoc networks, especially in the hostile environment, are vulnerable to traffic analysis which allows the adversary to trace the routing messages and the sensitive data packets. Anonymity mechanism in ad ho...
详细信息
A cryptosystem based on a clipped Hopfield neural network (CHNN) was recently proposed primarily for encryption of digital images and videos. The system is fast and suitable for hardware implementation. The present pa...
详细信息
ISBN:
(纸本)1595930329
A cryptosystem based on a clipped Hopfield neural network (CHNN) was recently proposed primarily for encryption of digital images and videos. The system is fast and suitable for hardware implementation. The present paper investigates the security aspects of the CHNN-based cryptosystem, and the following weaknesses are pointed out: 1) the cryptosystem is not sufficiently secure against the ciphertextonly attacks due to the weak randomness properties of the generated keystream, and 2) the cryptosystem is insecure against known/chosen-plaintext attacks and only one known plaintext-ciphertext pair is enough to completely break all ciphertexts of the same or smaller size obtained using the same encryption keys. The security of CHNN-based cryptosystem cannot be improved unless the basic model is fundamentally changed. Copyright 2005 ACM.
A biometric-based method for multimedia content protection was recently proposed. The method relies on biometric data of the user and a layered encryption mechanism to achieve confidentiality of the multimedia content...
详细信息
ISBN:
(纸本)1595934936
A biometric-based method for multimedia content protection was recently proposed. The method relies on biometric data of the user and a layered encryption mechanism to achieve confidentiality of the multimedia content. Our analysis suggests that the method originally proposed has a few security related problems and several unnecessary performance bottlenecks. We point these out and propose corresponding security and performance improvements in order to make the scheme practical and efficient for the task it was originally designed for. Copyright 2006 ACM.
A recently proposed Chaotic-Key Based Algorithm (CKBA) has been shown to be unavoidably susceptible to chosen/known-plaintext attacks and ciphertext-only attacks. In this paper we enhance the CKBA algorithm three-fold...
详细信息
A recently proposed Chaotic-Key Based Algorithm (CKBA) has been shown to be unavoidably susceptible to chosen/known-plaintext attacks and ciphertext-only attacks. In this paper we enhance the CKBA algorithm three-fold: 1) we change the 1-D chaotic Logistic map to a piecewise linear chaotic map (PWLCM) to improve the balance property, 2) we increase the key size to 128 bits, and 3) we add two more cryptographic primitives and extend the scheme to operate on multiple rounds so that the chosen/knownplaintext attacks are no longer possible. The new cipher has much stronger security and its performance characteristics remain very good.
This book explores the development of several new learning algorithms that utilize recent optimization techniques and meta-heuristics. It addresses well-known models such as particle swarm optimization, genetic algori...
详细信息
ISBN:
(数字)9789819638499
ISBN:
(纸本)9789819638482;9789819638512
This book explores the development of several new learning algorithms that utilize recent optimization techniques and meta-heuristics. It addresses well-known models such as particle swarm optimization, genetic algorithm, ant colony optimization, evolutionary strategy, population-based incremental learning, and grey wolf optimizer for training neural networks. Additionally, the book examines the challenges associated with these processes in detail. This volume will serve as a valuable reference for individuals in both academia and industry.
Payment Channel Networks (PCNs), pivotal for blockchain scalability, facilitate multiple off-chain payments between any two users. They utilize scripts to define and execute payment conditions in various blockchains, ...
详细信息
Payment Channel Networks (PCNs), pivotal for blockchain scalability, facilitate multiple off-chain payments between any two users. They utilize scripts to define and execute payment conditions in various blockchains, but this poses privacy, efficiency, and compatibility challenges. To overcome these, scriptless cleverly embeds payment conditions into digital signatures instead of complex scripts. Cryptography effectively safeguards the construction and publication of transactions in script-based and scriptless PCNs. Although several surveys analyze PCN protocols, only a few discuss their underlying scripting languages and even none explore the cryptography involved. This survey is the first to comprehensively overview cryptography in PCNs from scripting perspectives, filling the existing knowledge void. Our analysis offers a complete picture of script-based and scriptless protocols and their coexistence. We then explore advanced cryptographic primitives in both categories, systematically studying these for the first time, and demonstrate their instantiations in atomic swaps. Finally, we research vast related surveys and provide a future-oriented outlook.
暂无评论