The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Privacy for mobile devices will be more and more important, while data in the devices are easily be hacked. Traditional mobile unlocking systems such as inner password unlock and graphics unlock are unsecure so that this study is based on fingerprint with touch identify and Advanced Encryption Standard (AES) to effectively secure mobile privacy data and to reduce the risk of data leaking.
To deal with the problem of large certificate in Public Key Infrastructure, several techniques have been introduced such as Identity-based cryptography, Implicit certificate, Password-based cryptography and recently Certificateless cryptography at Asiacrypt'03. In a certificateless system, only user with her full private key can decrypt the ciphertext while the authority with her master key cannot...
This study evaluates the current state of wireless network security in the CBD of Nuku'alofa. Wireless Networks have grown significantly since their introduction. Security protocols supplied with the wireless equipment have reached a level of strong and robust security. However, security remains a problem; this study aims to answer two questions. What is the status of wireless network growth and security...
In this paper, we initiate the study of garbled protocols — a generalization of Yaos garbled circuits construction to distributed protocols. More specifically, in a garbled protocol construction, each party can independently generate a garbled protocol component along with pairs of input labels. Additionally, it generates an encoding of its input. The evaluation procedure takes as input...
In this paper we introduce the notion of lockable obfuscation. In a lockable obfuscation scheme there exists an obfuscation algorithm Obf that takes as input a security parameter, a program P, a message msg and lock value lck and outputs an obfuscated program oP. One can evaluate the obfuscated program oP on any input x where the output of evaluation is the message msg if P(x) = lck and otherwise...
The steganography is the art of hidden; its main aim is to pass unnoticed data in another data. There are many types of data that used in steganography, such as message, image, and video. In this work, we are interested in hiding a message inside an image. Our work focuses on the study of three approaches based on least significant bit (LSB) techniques that mean put the bits of the message in the...
Radio frequency identification is a modern technology for item identification that has widely spread over the recent years. In order to securely identify the items and transfer their ownership from one entity to another, several authentication and ownership management protocols have been proposed. One of the recent protocols is Niu et al.'s EPC Class 1 Generation 2 RFID Standard Authentication and...
The symmetric block ciphers, which represent a core element for building cryptographic communications systems and protocols, are used in providing message confidentiality, authentication and integrity. Various limitations in hardware and software resources, especially in terminal devices used in mobile communications, affect the selection of appropriate cryptosystem and its parameters. In this paper,...
Research on critical infrastructures (CI)s deals with sensitive data that demands underlying platform to be secure, in addition, testing of CI resilience strategies requires reproducibility of results. Disruption or natural disaster scenarios can not be tested on the physical systems, thus simulations are used for experimentation on CIs and as they are inherently distributed and interdependent which...
We show how to obfuscate a large and expressive class of programs, which we call compute-and-compare programs, under the learning-with-errors (LWE) assumption. Each such program CC[f,y] is parametrized by an arbitrary polynomial-time computable function f along with a target value y and we define CC[f,y](x) to output 1 if f(x)=y and 0 otherwise. In other words, the program performs an arbitrary {computation}...
Recently, a new lightweight block cipher, SKINNY, has been proposed by Beierle et al. in Annual Cryptology Conference 2016. This paper presents an area-efficient FPGA implementation of SKINNY block cipher. In this paper, a new column-serial structure is proposed to speed up SKINNY without compromising its area cost, and the implementation of SKINNY S-box is optimized by utilizing FPGA embedded dual-port...
When encrypting a single file in the CBC mode of 3DES, there is a feedback path which brings data dependency. Even much more resources are given, it does not help matters to increase the throughput of 3DES. In this paper, we propose a logic simplifying method to accelerate the throughput in the CBC mode. In the datapath, 15 levels of XORs from the critical path can be moved to the non-critical path...
With the development of cloud computing, storage of whole world started shifting to the cloud. Management and security of such a large data was very difficult, to lower the security issues, Tokenization was developed, but for maintaining the security and safety of the Tokenization servers, there was need of a strong encryption algorithm. This paper presents Next Generation Encryption Algorithm, a...
Cloud infrastructures provide database services as cost-efficient and scalable solutions for storing and processing large amounts of data. To maximize performance, these services require users to trust sensitive information to the cloud provider, which raises privacy and legal concerns. This represents a major obstacle to the adoption of the cloud computing paradigm. Recent work addressed this issue...
Cloud computing has become a widely used computing paradigm providing on-demand computing and storage capabilities based on pay-as-you-go model. Recently, many organizations, especially in the field of big data, have been adopting the cloud model to perform data analytics through leasing powerful Virtual Machines (VMs). VMs can be attractive targets to attackers as well as untrusted cloud providers...
Over the last decade, there has been a constant increase in the accessibility and utility of the Internet. More number of people are tending towards the use of mobile applications, E-mails, E-commerce and social networking sites. In this scenario, even the most confidential information travels through unsecured channels. Hence, it becomes crucial to ensure the security of the data being exchanged...
This paper presents the first practical fault attack on the ChaCha family of addition-rotation-XOR (ARX)-based stream ciphers. ChaCha has recently been deployed for speeding up and strengthening HTTPS connections for Google Chrome on Android devices. In this paper, we propose differential fault analysis attacks on ChaCha without resorting to nonce misuse. We use the instruction skip and instruction...
This paper presents a low power AES-GCM authenticated encryption IP core which combines an improved four-parallel architecture, an advanced 65nm SOTB CMOS technology and a low complexity clock gating technique. As a result, the power consumption of the proposed AES-GCM core is only 8.9mW which is lower than other AES-GCM IP cores presented in literature. The detail implementation results are also...
We present the first formal analysis of two avionic protocols that aim to secure air-ground communications, the ARINC823 public-key and shared-key protocols. We verify these protocols both in the symbolic model of cryptography, using ProVerif, and in the computational model, using CryptoVerif. While we confirm many security properties of these protocols, we also find several weaknesses, attacks, and...
As part of a new MPEG-A standardization activity, called Visual Identity Management Application Format (VIMAF), this paper presents an end-to-end encryption solution of Region of Interest (ROI) in both AVC and HEVC encoded streams for privacy protection applications. This solution uses a selective encryption method that encrypts only the most sensitive information of the video and proposes a new adapted...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.