Elliptic curve cryptography is one of the most important public-key *** Koblitz Curve is a special kind of elliptic curve in ECC and its security mainly depends on the base *** on Evolutionary Cryptography theory,whic...
详细信息
Elliptic curve cryptography is one of the most important public-key *** Koblitz Curve is a special kind of elliptic curve in ECC and its security mainly depends on the base *** on Evolutionary Cryptography theory,which becomes a principal concept for cryptography design and cryptanalysis,we propose a new algorithm for secure EC generation based on Ant Colony Optimization(ACO)to accelerate the search process of safe base *** preliminarily deal with secure Koblitz curve selecting over the field F(2800).Experiments show that the base field and base point of secure curves generated by ant colony algorithm have gone beyond the parameter range of Koblitz curves recommended by *** can present many new secure Koblitz curves,including base field and base point,which are not recommended by *** maximum size of our secure Koblitz curve has gone beyond *** algorithm in this paper follows the same cryptography criteria recommended by the ***,it can resist current *** analysis and experimental results prove that the new algorithm is effective and successful,and it is the first successful practice of Evolutionary Cryptography theory in public cryptography research.
In Eurocrypt'2005, Waters' identity-based encryption scheme suffers a drawback that the scheme only guarantees chosen plaintext security but chosen ciphertext security, and to give concurrent consideration bot...
详细信息
Fast-flux service network (FFSN) is consisted of a large scale of computers which have two main functions. Firstly, by providing a pool of huge number of IP addresses, the controller of FFSN can choose the IPs to prov...
详细信息
ISBN:
(纸本)9781457720031
Fast-flux service network (FFSN) is consisted of a large scale of computers which have two main functions. Firstly, by providing a pool of huge number of IP addresses, the controller of FFSN can choose the IPs to provide services for their own domain name. Secondly, these computers can be served as agents to hide mother-ship. The character of FFSN is that the DNS records of domain name changes constantly at a high frequency. In this paper, we analyze the issue on the reliability of FFSN. The issue is resulted from the uncontrollable nodes of FFSN. We establish a model to describe the reliability by the theory of Poisson Process, and analyze the relationship between the reliability of FFSN and its size.
Enterprises outsourcing their databases to the cloud and authorizing multiple users for access represents a typical use scenario of cloud storage services. In such a case of database outsourcing, data encryption is a ...
详细信息
An authenticated encryption scheme (AE scheme) allows the signer to generate a valid authenticated ciphertext on a message such that the designated recipient can recover the message. AE schemes can achieve confidentia...
详细信息
An authenticated encryption scheme (AE scheme) allows the signer to generate a valid authenticated ciphertext on a message such that the designated recipient can recover the message. AE schemes can achieve confidentiality and authenticity when message is transmitted over an insecure channel. The previous AE scheme only can allow one signer to generate the authenticated ciphertext. Recently, Chung et al. proposed a (t, n) threshold authenticated encryption scheme (TAE scheme) in which any t or more signers cooperate to produce a signature for a message and no one except the designated verifier can obtain the message from the ciphertext and verify the authenticity and integrity of the message. The scheme is based on elliptic curve cryptosystem. Moreover, the scheme applies a division-of-labour signature technique to reduce the load of every signer. In other words, every signer only needs to sign a message block assigned to it. Therefore, the (t, n) TAE scheme is more efficient than other AE schemes. However, some flaws of the scheme are found in this paper. Several security defects of the scheme are elaborated: (i) It suffers from conspiracy attack. (ii) It does not hold robustness. (iii) It is insecure against insider attacks. In addition, there exist some design defects in the TAE scheme. Some measures to remove these weaknesses are given in this paper.
Code injection attack is a major way of spreading malware on network. The key section of code injection attack is a small piece of code, called shellcode, which performs unauthorized operations when it is injected...
详细信息
Code injection attack is a major way of spreading malware on network. The key section of code injection attack is a small piece of code, called shellcode, which performs unauthorized operations when it is injected into software as part of valid data. On Windows CE, input data are often encoded using Unicode before being processed. In such cases, shellcode should be built in a way that bypasses such encoding;that is, it should be Unicode-proof. Unicode-proof shellcode also has great advantage of evading instruction detection system. However, it is quite difficult to build Unicode-proof shellcode for the ARM architecture,.on which most embedded devices are developed, because the subset of instructions that can be used to write Unicode-proof shellcode is very limited. Moreover, the instruction cache in the ARM processor restricts the application of selfmodifying code, which is frequently used in shellcode writing. This novel research proposes an approach to *** Unicode-proof shellcode on Windows CE under these constraints. The approach applies to all versions of ARM processors and Windows CE, including systems evolved from Windows CE, such as Windows Mobile and Windows Phone. The shellcode is tested on three currently available devices.
Since each user needs to have different passwords with different remote servers in the multi-server environment, it is impossible to apply the authentication methods in a single server environment to the multi-server ...
详细信息
Since each user needs to have different passwords with different remote servers in the multi-server environment, it is impossible to apply the authentication methods in a single server environment to the multi-server environment. Recently, Ren-Chiun Wang, Wen-Shenq Juang, and Chin-Laung Lei proposed an ID based remote user authentication scheme for multi-server environments. However, we demonstrate that their ID based authentication scheme lacks the authenticity of the Registration Center to the server. Moreover, their ID based authentication scheme does not satisfy perfect forward security. In this paper, an improved multi-server password based smart card authentication scheme is proposed. Our scheme can remove their security flaws. Compared with the previous password based smart card authentication schemes for the multi-server environments, our proposed scheme can hold more security advantages.
Recently, Hsiang and Shih proposed a secure dynamic ID based remote user authentication scheme for multi-server environment. In this paper, we show that Hsiang and Shih's scheme is still vulnerable to off-line pas...
详细信息
Recently, Hsiang and Shih proposed a secure dynamic ID based remote user authentication scheme for multi-server environment. In this paper, we show that Hsiang and Shih's scheme is still vulnerable to off-line password guessing attacks, impersonation attacks and server spoofing attacks. And it cannot resist against extracting secret data by intercepting the authentication message. Chen, Huang and Chou proposed an improvement on Hsiang and Shih's scheme. However, we demonstrate that Chen, Huang and Chou's improved scheme suffers from impersonation attacks, password guessing attacks and server spoofing attacks. In addition, Chen et al.'s scheme cannot provide perfect forward security.
With an ever-increasing interests and demands in Near-Space, more and more researchers have put their attentions on this field, leading to an emerging needs for modeling the 20-100km altitude space especially for broa...
详细信息
With an ever-increasing interests and demands in Near-Space, more and more researchers have put their attentions on this field, leading to an emerging needs for modeling the 20-100km altitude space especially for broadband communications. Among the lots of works, Media Access Control (MAC) undoubtedly has chief importance and urgency with which communicating objects or nodes can effectively access to Near-Space. However, previous MAC designs mainly focus their attentions on service differentiation by application purposes without considering nodal mobility. In fact, access control for nodes with different mobility levels has significantly influences to MAC performance and is complex and difficult to be implemented together with present MAC protocols. In this paper, we first presented a location method for Near-Space vehicles such as airships and unmanned planes and then modeled the mobile networks infrastructure with mobility considered. For determining the vehicles joining/leaving events locally, we quantify the communication range with Received Signal Strength Indicator (RSSI) aid. Then, for better managing the nodes access to the Near-Space with aforementioned works, we designed a TDMA based reservation MAC protocol to guarantee the servicedelay and networks coverage with best efforts. Simulation results showed that our proposed model better fit for Near-Space mobile communication environments and presented a lower delay and higher coverage regarding to different mobility levels.
In a recent paper [Chin. Phys. Lett 25(2008)1187], a quantum secret sharing scheme between multiparty and multiparty was presented. We show that the protocol is not secure because the last member in Alice's group c...
详细信息
In a recent paper [Chin. Phys. Lett 25(2008)1187], a quantum secret sharing scheme between multiparty and multiparty was presented. We show that the protocol is not secure because the last member in Alice's group can illegally obtain most secret messages without introducing any error. Finally, a possible way to avoid the security flaw is suggested.
暂无评论