A new security test for substitution boxes(S-boxes),the nonlinearity profile test,is presented,together with its results over the S-boxes of DES and *** test can be used to measure the global nonlinearity for an S-box...
详细信息
A new security test for substitution boxes(S-boxes),the nonlinearity profile test,is presented,together with its results over the S-boxes of DES and *** test can be used to measure the global nonlinearity for an S-box effectively,which overcomes the disadvantage of existing methods that cannot evaluate the nonlinear capacity of an S-box against attacks which keep some input bits constant.
It is one of the important factors in iterative block ciphers design that proper rounds are used to resist differential analysis, linear analysis and many other kinds of attack. Block ciphers usually adopt loop codes ...
详细信息
It is one of the important factors in iterative block ciphers design that proper rounds are used to resist differential analysis, linear analysis and many other kinds of attack. Block ciphers usually adopt loop codes in software and repetition structures in hardware in order to reduce complexity and cost. This paper presents an effective fault-electromagnetic attack which can change the rounds of block ciphers in running process, by inducing appropriate fault to the cryptographic chip. The executing rounds of the attacked block cipher can be detected from the electromagnetic radiation track of cryptographic chip. Then the secret key can be deduced directly or with simple mathematical analysis. The simulation result of lightweight block cipher PRESENT shows that the suggested attack is feasible and efficient, when it is implemented with single chip microcomputer. Furthermore, countermeasures are given to resist this kind of attack.
作者:
Guang ChengSong WangSchool of Computer Science & Engineering
Key Laboratory of Computer Network and Information Integration Ministry of Education Key Laboratory of Computer Network Technology of Jiangsu South-East University Nanjing China
While the traditional Web, Email and other Internet applications are still used large-scale, Internet applications, such as typical P2P resource sharing, streaming, games, instant messaging and other new applications ...
详细信息
ISBN:
(纸本)9781424497621
While the traditional Web, Email and other Internet applications are still used large-scale, Internet applications, such as typical P2P resource sharing, streaming, games, instant messaging and other new applications emerging, is generating the rapid growth traffic. Connection pattern approach is to observe and identify connection patterns of host behavior at the transport layer. This method has no access to packet payload, no knowledge of port numbers and no additional information other than what current flow collectors provide. But traffic classification method based on host connection pattern can't distinguish some similar applications provided by one server. This paper analyzes the connection pattern between servers for SMTP, POP3, Web, BT traffic, and the distribution of simultaneous connections for each server port, and then propose a new traffic classified approach based on port connection pattern and the simultaneous connection number. The classified method can distinguish WEB, SMTP, POP3, and BT traffic each port in a server without any knowledge of port. The experimental result shows that this method is effective.
Formal concept analysis and rough set analysis are two complementary approaches for analyzing data. This paper studies approaches to constructing fuzzy concept lattices based on generalized fuzzy rough approximation o...
详细信息
Formal concept analysis and rough set analysis are two complementary approaches for analyzing data. This paper studies approaches to constructing fuzzy concept lattices based on generalized fuzzy rough approximation operators. For a residual implicator θ satisfying θ (a, b) = θ(1-b, 1-a) and its dual σ, a pair of (θ, σ)-fuzzy rough approximation operators is defined. We then propose three kinds of fuzzy operators, and examine some of their basic properties. Thus, three complete fuzzy concept lattices can be produced, for which the properties are analogous to those of the classical concept lattices.
Recently Vadim Lyubashevsky etc. built LWE problem on ring and proposed a public cryptosystem based on RLWE, which, to a certain extent, solved the defect of large public key of this kind, but it didn't offer p...
详细信息
Recently Vadim Lyubashevsky etc. built LWE problem on ring and proposed a public cryptosystem based on RLWE, which, to a certain extent, solved the defect of large public key of this kind, but it didn't offer parameter selections and performance analysis in detail. In this paper an improved scheme is proposed by sharing a ring' polynomial vector that makes public key as small as 1/m of the original scheme in multi-user environments. In additions, we introduce a parameter r to control both the private key space size and decryption errors probability, which greatly enhances the flexibly and practicality. The correctness, security and efficiency are analyzed in detail and choice of parameters is studied, at last concrete parameters are recommended for the new scheme.
Vehicular Ad hoc networks (VANET) consists of several vehicular nodes and uses 802.11p protocol for communication. Because of its unique characteristics, such as fast speed, serious Doppler effect, large node number e...
详细信息
Vehicular Ad hoc networks (VANET) consists of several vehicular nodes and uses 802.11p protocol for communication. Because of its unique characteristics, such as fast speed, serious Doppler effect, large node number etc, VANET is vulnerable to be affected by a variety of security threats. In this paper, we firstly introduce the system architecture, applications and categories of attacks in VANET. Then we summarize several types of anonymous authentication techniques which aim at protecting the privacy of vehicular nodes, then discuss and compare the typical anonymous authentication schemes of each type. Finally, we present the problems which should be considered in the next step of research.
Homologous recombination is a fundamental cellular process that is most widely used by cells to rearrange genes and accurately repair DNA double-strand breaks. It may result in the formation of a critical intermediate...
详细信息
Delay/disruption tolerant networking (DTN) is an approach to networking where intermittent connectivity exists: it is often afforded by a store and forward technique. Depending on the capability of intermediary nod...
详细信息
Delay/disruption tolerant networking (DTN) is an approach to networking where intermittent connectivity exists: it is often afforded by a store and forward technique. Depending on the capability of intermediary nodes to carry and forward messages, messages can be eventually delivered to their destination by mobile nodes with an appropriate routing protocol. To have achieved a successful delivery, most DTN routing protocols use message duplication methods. Although messages are rapidly transferred to the destination, the redundancy in the number of message copies increases rapidly. This paper presents a new routing scheme based on a stochastic process for epidemic routing. Message redundancy is efficiently reduced and the number of message copies is controlled reasonably. During the contact process of nodes in the network, the number of message copies changes, and according to the variability in the number of copies, we construct a special Markov chain, birth and death process, on the number of message copies then calculate and obtain a stationary distribution of the birth and death process. Comparing the theoretical model with the simulation we have performed we see similar results. Our method improves on time-to-live (TTL) and antipacket methods, in both redundancy and delivery success efficiency.
In this paper, hatch constrained quay crane scheduling problem is considered to minimize makespan with dual cycling, which can improve efficiency of operations and utilization of quay cranes. By analyzing precedence r...
详细信息
In this paper, hatch constrained quay crane scheduling problem is considered to minimize makespan with dual cycling, which can improve efficiency of operations and utilization of quay cranes. By analyzing precedence relationships intra- and inter- hatches, the problem is decomposed into two embedded sub-problems, each of which can be formulated as a 2-machine flow shop scheduling problem. A composite heuristic is introduced for stacks scheduling in a hatch by integrating the Johnson rule with a developed gap-shifting strategy. A better model is constructed for inter-hatches than existing ones, in which overlapped processing time is shorten and effectiveness can be improved by a reconstructive Johnson rule. Experimental results show that the proposed composite algorithm outperforms the existing hybrid heuristic.
In application layer multicast (ALM), member hosts lack direct knowledge of underlying network topology, which brings some performance penalty. This paper investigates an effective way to rapidly obtain some related t...
详细信息
In application layer multicast (ALM), member hosts lack direct knowledge of underlying network topology, which brings some performance penalty. This paper investigates an effective way to rapidly obtain some related topology knowledge, i.e. getting topology hints from existing IP registered resources - WHOIS database. We further propose a clustering scheme, which can be integrated into the existing ALM solutions. Our proposed scheme can cluster some nearby member hosts no matter when these hosts join the group. Therefore the scheme also solves the join sequences problem in some degree. We also present an application framework of the clustering scheme, and give an application example named HMTP-E that integrates the scheme into HMTP protocol. The experiment results show that the clustering scheme plays a positive role on improving the performance of existing ALM solutions.
暂无评论