
Applied Cryptography and Network Security
Beschreibung
This book constitutes the refereed proceedings of the 10th International Conference on Applied Cryptography and Network Security, ACNS 2012, held in Singapore, in June 2012.
The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sessions on authentication, key management, block ciphers, identity-based cryptography, cryptographic primitives, cryptanalysis, side channel attacks, network security, Web security, security and privacy in social networks, security and privacy in RFID systems, security and privacy in cloud systems, and security and privacy in smart grids.
Weitere Details
Weitere Ausgaben
Inhalt
- Title
- Preface
- organisation
- Table of Contents
- Authentication
- Security Analysis of a Multi-factor Authenticated Key Exchange Protocol
- Introduction
- Pointcheval-Zimmer Protocol
- Notation
- Description of Protocol
- Attacks
- Stealing Biometrics
- Disclosing Private Key
- Combining Two Attacks
- Discussion
- Conclusion
- References
- Breaking an Animated CAPTCHA Scheme
- Introduction
- Related Work
- Breaking CAPTCHAs
- Segmentation Resistant
- Animated CAPTCHAs
- The Targeted Animated CAPTCHA Scheme
- Breaking HelloCaptcha
- Type Distinction
- Single Image Extraction
- Pre-processing and Character Recognition
- Character Recognition
- Results and Discussion
- Method of Attack
- Security Issues
- Conclusion
- References
- Contextual OTP: Mitigating Emerging Man-in-the-Middle Attacks with Wireless Hardware Tokens
- Introduction
- The Contextual Factor Protocol
- The Setting
- The Current OTP Protocol
- The Contextual Factor Protocol
- Possible Contextual Factors
- URL
- Server's Certificate
- URL + Server's Certificate
- Session Key
- IP
- Other Factors
- System Setting Considerations and Extended Attacks
- Secure Communication of the XOTP in the Client's Environment
- Routing to a Different User Registered Website
- Additional Types of Extended Attacks
- Summary of Results: Real-Time Impersonation and More
- Related Work
- Concluding Remarks
- References
- Key Management
- RIKE: Using Revocable Identities to Support Key Escrow in PKIs
- Introduction
- Related Work
- RIKE: Supporting Key Escrow in PKIs
- Background
- Basic RIKE
- Certificate Renewal and Revocation in Basic RIKE
- Hierarchical RIKE
- Hierarchical RIKE with Cross Certification
- Certificate Renewal and Revocation in Hierarchical RIKE
- Features of RIKE
- Comparisons with other Schemes
- X.509-Based RIKE
- Conclusions
- References
- TreVisor
- Introduction
- Background
- TRESOR
- BitVisor
- Design and Implementation
- Compatibility
- Performance
- Security
- Conclusions and Future Work
- References
- Block Ciphers
- Authenticated Encryption: How Reordering Can Impact Performance
- Introduction
- Notations and Preliminaries
- Notations
- Universal Hash-Function Families
- Block Ciphers
- Authenticated Encryption Schemes
- Adversarial Model
- Properties of Odd Integers
- The Odd Key Hash Family
- Description of the OKH Authenticated Encryption
- Theorem Statements
- Security of Authentication
- Security of Encryption
- Design and Performance Discussions
- Conclusion
- References
- Length-Doubling Ciphers and Tweakable Ciphers
- Introduction
- Preliminaries
- A Fix-Input-Length Cipher
- A Length-Doubling VIL Cipher
- Length-Doubling VIL Tweakable Ciphers
- References
- Extending Higher-Order Integral: An Efficient Unified Algorithm of Constructing Integral Distinguishers for Block Ciphers
- Introduction
- Preliminaries
- Higher-Order Integral
- Matrix Characterization of a Block Cipher Structure
- A Unified Approach for the Design of Integral Distinguishers
- A New Representation of the 4 kinds of Integral States
- Rules for Applying Encryption/Decryption Characteristic Matrix to An Integral Form in Block
- Finishing Conditions for Calculus and an Extension of Higher-Order Integral
- A Unified Algorithm of Constructing Integral Distinguishers
- Experimental Results - Application to Gen-SMS4, Gen-Fourcell and Present
- Gen-SMS4
- Gen-Fourcell
- Present
- Selection of Initial Integral Forms
- Discussion and Conclusion
- References
- Identity-Based Cryptography
- Security Enhancements by OR-Proof in Identity-Based Identification
- Introduction
- Security Enhancement Transformations of Identity-Based Identification.
- Our Contributions.
- Organization.
- Definitions
- Identity-Based Identification.
- +- and *-type IBI Protocols.
- Security Enhancement Transformations
- Dual-Identity Transformation
- Master-Identity Transformation
- Double-Parameter Transformation
- Security of DI, MI and DP Transformations
- Discussions
- Comparisons
- Conclusion
- References
- Identity-Based Extractable Hash Proofs and Their Applications
- Introduction
- Background
- Motivation
- Our Contributions
- Preliminaries
- Definitions
- Identity-Based Key Encapsulation Mechanisms
- Bilinear Diffie-Hellman Assumption
- Binary Relations for Search Problems
- General Hashing
- Identity-Based Extractable Hash Proofs
- Relation to Extractable Hash Proof System
- Generic Constructions from Identity-Based Extractable Hash Proofs
- IND-ID-CPA Secure IBE
- IND-ID-CCA Secure IBE
- Instantiations of IB-EHPS
- Extension
- References
- Cryptographic Primitives
- On Structural Signatures for Tree Data Structures
- Introduction
- Preliminaries, the Scheme by Kundu and Bertino and the Extended Security Model
- Aggregate Signatures and Bilinear Pairings
- The Scheme by Kundu and Bertino
- Attacks on Kundu's Transparency and Privacy
- Attacks on Kundu's Unforgeability and Structural Integrity
- Our New Secure Construction
- Security
- Complexity Analysis
- Modifications to Our Scheme
- Consecutive Redaction Control
- Restricting to Sanitizers and Accountability
- Implementations and Performance Analysis
- Conclusion and Open Questions
- References
- Inner-Product Lossy Trapdoor Functions and Applications
- Introduction
- Our Contributions
- Related Works
- Notations
- Inner-Product Lossy Trapdoor Functions
- Lossy Attribute Hiding
- Inner-Product Trapdoor Functions from Lattices
- An Inner-Product Trapdoor Function from Lattices
- Correctness
- Security
- Parameter Selection
- Applications
- References
- On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification
- Introduction
- Related Work
- Preliminaries
- Compositions with Randomness Reuse
- Composition-Enabling Properties
- Security under Randomness-Dependent Attacks
- Secure Compositions under Randomness Reuse
- Instantiating the Constructions
- Security under Randomness-Dependent Attacks
- Compatibility, Reproducibility, and Conditional Injectivity
- An Efficient Instantiation
- References
- Secure Accumulators from Euclidean Rings without Trusted Setup
- Introduction
- Collision-Resistant and Undeniable Accumulators
- Module-Based Cryptography
- Accumulator with Prime-Valued Injective Functions
- Accumulator with Division-Intractable Function Family
- Relations between New Assumptions
- Example Instantiations
- RSA Accumulator
- Root Accumulator in Class Groups of IQ Order
- References
- Cryptanalysis
- Linear Fault Analysis of Block Ciphers
- Introduction
- Preliminaries
- Fault Injection
- Linear Fault Analysis
- Fault Model and Assumption
- Principle of Linear Fault Analysis
- A Key Recovery Attack on SERPENT by Using LFA
- A Brief Description of SERPENT
- Attacking SERPENT
- Experiments and Results
- Conclusion
- References
- Cryptanalysis of 256-Bit Key HyRAL via Equivalent Keys
- Introduction
- Specification of HyRAL
- Existence of Equivalent Keys
- Derivation of Equivalent Keys
- Equivalent Key Derivation Algorithm
- Time Complexity of the Algorithm
- Deriving Equivalent Keys
- Discussions
- Summary
- References
- Distinguishers beyond Three Rounds of the RIPEMD-128/-160 Compression
- Introduction
- Differential Properties to Be Distinguished
- Previously Discussed Properties
- 2-Dimension Sums and Suitability for Double-Branch Structure
- q-Multi-second-order Collision
- Remarks for the Motivation of Studying Weak Properties
- Specifications
- RIPEMD-128
- RIPEMD-160
- Attacks on RIPEMD-128
- Overall Strategy
- Constructing -Differential-Path
- Constructing -Differential-Path
- Searching for (H, M)
- Complexity Evaluation and Experiments
- Attacks on RIPEMD-160
- Overall Strategy and Relatively Slow Differential Propagation
- Scenario 1: Attack from the First Round
- Scenario 2: Attack from the Second Round
- Concluding Remarks
- References
- Side Channel Attacks
- Zero-Value Point Attacks on Kummer-Based Cryptosystem
- Introduction
- Side Channel Attacks and Zero-Value Point (ZVP) Attack on Scalar Multiplication
- Our Contributions
- Scalar Multiplication on the Kummer Surface
- Special Points on Kummer Surface
- The Possible Special Points for Duquesne's Pseudo-addition and Doubling Formula
- The Number of Special Points for Duquesne's Formula
- Special Points due to other Pseudo-addition and Doubling Formula
- Zero-Value Point Attacks on Kummer Surface
- General Zero-Value Point Attacks on Kummer Surface
- A Variant of Zero-Value Point Attack on Kummer Surface
- Countermeasures Against Zero-Value Point Attacks
- Conclusion
- References
- PICARO - A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance
- Introduction
- Preliminaries on Higher-Order Masking Schemes
- Masking Schemes
- Rivain-Prouff's Scheme
- Research of a "Good" S-Box
- Design Constraints
- Bijective vs Non-Bijective S-Box
- S-Box Description
- Masked S-Box Cost Evaluation
- From the S-Box to the Cipher
- Using a Feistel Network with SP-Type Round Function
- Why It Is Not a Good Idea
- Linear Counterpart to the Previous Attack
- Comparison of Specific Attacks on Feistel Ciphers with Non-bijective Round Function
- Non-injective Round Functions
- Non-surjective and Unbalanced Round Function
- Unbalanced Round Functions with Key Dependent Output Distribution
- Expansion and Compression Function
- Full Description of the Block Cipher
- Evaluation of the Number of Rounds
- The Key Schedule
- Performance Analysis
- Conclusion
- References
- Wide Collisions in Practice
- Motivation
- Background
- Collision Attack
- Wide Collisions
- Template Attack
- Practical Collision Attacks
- Outlier Method
- Inter-Bins Variation and Inner-Bin Variation
- Template-Based Collision Detection
- Template-Based Collision Detection Using Iterative PCA
- Experimental Results
- Results for the Outlier Method
- Results for Template-Based Detection
- Conclusion
- References
- Network Security
- A General Construction for 1-Round d-RMT and (0, d)-SMT
- Introduction
- Background and Primitives
- Folded Reed-Solomon Codes
- Description of Folded Reed-Solomon Codes.
- Multireceiver Message Authentication Codes
- New Constructions for Multireceiver MAC
- Construction of 1-Round -RMT for N2t+1
- An Optimal -RMT
- 1-Round (0, )-SMT
- A Construction for 1-Round (0, )-SMT for N=2t+1
- Comparison with Related Work.
- 1-Round (0,)-SMT for N=2t+ct, c&1/t
- Concluding Remarks
- References
- A Prefiltering Approach to Regular Expression Matching for Network Security Systems
- Introduction
- Related Work
- RegEx Print Generation
- RegEx Print
- RegEx Print Generation Algorithm
- Regex Print Matching
- Experimental Results
- Experimental Setup
- Experimental Evaluation
- Effect of Expression Size Threshold
- Effect of Matching Probability Threshold
- Conclusions
- References
- Web Security
- iHTTP: Efficient Authentication of Non-confidential HTTP Traffic
- Introduction
- Previous Work
- Our Contributions
- Design Goals, Assumptions, and Threat Model
- Preliminaries
- Our Approach - iHTTP
- Authenticator Generation
- Freshness Authentication
- Opportunistic Hash Verification
- Analysis
- Security Analysis
- Performance Analysis
- Limitation
- Implementation and Experimental Evaluation
- Implementation
- Experimental Evaluation
- Conclusion
- References
- ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request Caches
- Introduction
- HTTP Parameter Pollution
- Formal Threat Model
- Extreme Cases
- Application Request Cache
- Implementation
- Evaluation
- Request Resolution
- Request Throughput
- Memory Footprint
- Case Study
- Related Work
- Conclusion
- References
- Tracking the Trackers: Fast and Scalable Dynamic Analysis of Web Content for Privacy Violations
- Introduction
- Background
- System Design
- Principal-Based Tracking
- Principal Tagging
- Taint Sources and Sinks
- Implementation
- Instrumented Browser
- Crawler
- Evaluation and Findings
- General Findings
- Behavior Tracking Cases
- History Sniffing Cases
- Performance
- Related Work
- Detection
- Protection
- Conclusions
- References
- Security and Privacy in Social Networks
- The Shy Mayor: Private Badges in GeoSocial Networks
- Introduction
- Related Work
- Model
- The System
- Privacy and Correctness Properties
- Tools
- Spotr : Secure Location Verification
- Geo-Badge
- Analysis
- Geo-M
- Analysis
- Multi-player: MP-Badge
- Evaluation
- Conclusions
- References
- Detecting Social Spam Campaigns on Twitter
- Introduction
- Related Work
- Twitter and Related Social Spam Detection
- Scope of This Paper
- Characterization
- Data Collection
- Clustering
- Ground Truth Creation
- Campaign Analysis
- Classification
- Classification Features
- Content Semantic Similarity
- Machine Learning Classifier
- Evaluation
- Training
- Cross Validation
- Conclusion
- References
- Security and Privacy in RFID Systems
- A New Framework for Privacy of RFID Path Authentication
- Introduction
- Background
- RFID-Enabled Supply Chain Management System
- Adversary Model
- Existing Security and Privacy Notions
- A New RFID Privacy Notion for Path Authentication
- Path Privacy
- Relations among Privacy Notions
- A New RFID Path Authentication Protocol
- Building Blocks
- Protocol
- Security and Privacy Analysis
- Performance
- Conclusions
- References
- GHB#: A Provably Secure HB-Like Lightweight Authentication Protocol
- Introduction
- Our Contribution
- Outline
- Background
- Gold Functions
- The HB# protocol
- The GHB# protocol
- Complexity Analysis and Implementation Issues
- Security Analysis
- Definition of Security Models
- Security Proofs
- Conclusions
- References
- Security and Privacy in Cloud Systems
- Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud
- Introduction
- Related Work
- Problem Statement
- System Model
- Threat Model
- Design Goals
- Preliminaries
- Bilinear Maps
- Complexity Assumptions
- Group Signatures
- Homomorphic MACs
- Homomorphic Authenticators
- Homomorphic Authenticable Group Signatures
- Overview
- Construction of HAGS
- Security Analysis of HAGS
- Privacy-Preserving Auditing for Shared Data
- Overview
- Construction of Knox
- Security Analysis of Knox
- Experimental Results
- Conclusion
- References
- SPICE - Simple Privacy-Preserving Identity-Management for Cloud Environment
- Introduction
- Extended DIM Framework in the Cloud
- Desirable Properties for DIM in the Cloud
- Existing Solution and Limitations
- Our Contributions
- Related Work
- Identity Management Systems
- Other Credential-Based Authentication Systems
- Overview of SPICE
- Framework of SPICE
- Framework of Basic Group Signatures
- The Key Ideas
- Randomizable Group Signatures
- Design of Randomizable Group Signatures
- Concrete Construction
- Privacy-Preserving Identity-Management
- SPICE for Web Authentication
- Security, Privacy and Functional Requirements
- Conclusion
- References
- Security and Privacy in Smart Grids
- A Practical Smart Metering System Supporting Privacy Preserving Billing and Load Monitoring
- Introduction
- Related Work
- System Model
- Time Notations
- Smart Metering System
- Supporting Billing Applications
- Supporting Load Monitoring Applications
- Meter Model
- Privacy Preserving Smart Metering System
- Metering System Construction
- Supporting Billing Application
- Supporting Load Monitoring Application
- Privacy Requirements and Analysis
- ESP Privacy Requirement and Analysis
- LMC Privacy Requirement and Analysis
- Storage Security
- Performance Analysis
- Conclusion and Future Works
- References
- Private Computation of Spatial and Temporal Power Consumption with Smart Meters
- Introduction
- Related Work
- Preliminaries
- Anticipated Setting
- Notation
- Adversarial Model
- Homomorphic Encryption
- Aggregating Spatial Consumption
- Generating and Exchanging Random Numbers
- Encrypting Measurements
- Aggregation of Encrypted Measurements
- Computing Temporal Consumption
- Encrypting Measurements
- Obtaining Total Consumption
- Coping with Malfunctions
- Computing Spatio-temporal Consumption
- Encrypting Measurements
- Obtaining Spatial Consumption
- Obtaining Temporal Consumption
- Coping with Malfunctions
- Security Considerations
- Complexity and Data Packing
- Complexity
- Multiple Utility Measurements
- Conclusion
- References
- Author Index
Systemvoraussetzungen
Dateiformat: PDF
Kopierschutz: Wasserzeichen-DRM (Digital Rights Management)
Systemvoraussetzungen:
- Computer (Windows; MacOS X; Linux): Verwenden Sie zum Lesen die kostenlose Software Adobe Reader, Adobe Digital Editions oder einen anderen PDF-Viewer Ihrer Wahl (siehe E-Book Hilfe).
- Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions oder die App PocketBook (siehe E-Book Hilfe).
- E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m.
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein „weicher” Kopierschutz verwendet. Daher ist technisch zwar alles möglich – sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.
Weitere Informationen finden Sie in unserer E-Book Hilfe.