Filters








20,045 Hits in 6.8 sec

Efficient Side-Channel Secure Message Authentication with Better Bounds

Chun Guo, François-Xavier Standaert, Weijia Wang, Yu Yu
2020 IACR Transactions on Symmetric Cryptology  
We investigate constructing message authentication schemes from symmetric cryptographic primitives, with the goal of achieving security when most intermediate values during tag computation and verification  ...  Thus in practice, their main security threat is expected to be side-channel key recovery attacks against the AES implementations.  ...  To achieve better efficiency, the design of MA schemes with built-in side-channel security, a.k.a. leakage-resilience [DP08] , has recently attracted wide attention.  ... 
doi:10.13154/tosc.v2019.i4.23-53 dblp:journals/tosc/GuoSWY19 fatcat:cn6bia4ugng3tnmilfz2l6nbwq

Efficient Side-Channel Secure Message Authentication with Better Bounds

Chun Guo, François-Xavier Standaert, Weijia Wang, Yu Yu
2020 IACR Transactions on Symmetric Cryptology  
We investigate constructing message authentication schemes from symmetric cryptographic primitives, with the goal of achieving security when most intermediate values during tag computation and verification  ...  Thus in practice, their main security threat is expected to be side-channel key recovery attacks against the AES implementations.  ...  To achieve better efficiency, the design of MA schemes with built-in side-channel security, a.k.a. leakage-resilience [DP08] , has recently attracted wide attention.  ... 
doi:10.46586/tosc.v2019.i4.23-53 fatcat:4w3r7qxee5bhvdglob6zqcij2q

Provable Security Analysis of FIDO2 [article]

Shan Chen, Manuel Barbosa, Alexandra Boldyreva, Bogdan Warinschi
2020 IACR Cryptology ePrint Archive  
To withstand stronger yet realistic adversaries, we propose a generic protocol called sPACA and prove its strong security; with proper instantiations, sPACA is also more efficient than CTAP2.  ...  In addition, we advocate the adoption of our sPACA protocol as a substitute for CTAP2 for both stronger security and better performance.  ...  We thank Alexei Czeskis for help with FIDO2 details. A. Boldyreva and S. Chen were partially supported by the National Science Foundation under Grant No. 1946919. M.  ... 
dblp:journals/iacr/ChenBBW20 fatcat:jql4am7mrbavlishbp6zhioibi

A Channel Coding Approach for Physical-Layer Authentication [article]

Xiaofu Wu, Zhen Yang
2015 arXiv   pre-print
For physical-layer authentication, the authentication tags are often sent concurrently with messages without much bandwidth expansion.  ...  In this paper, we present a channel coding approach for physical-layer authentication.  ...  Let a message s ∈ S be sent, and the authentication tags are assumed to be transmited over a Bi-AWGN channel with the signal-to-noise ratio of γ t .  ... 
arXiv:1502.07567v1 fatcat:oasb4kiqmng6jkkm2l3jmouycq

Special Issue on Entropy-Based Applied Cryptography and Enhanced Security for Ubiquitous Computing

James Park, Wanlei Zhou
2016 Entropy  
algebraic and side channel attacks; entropy-based network anomaly detection; applied cryptography using chaos function, information hiding and watermark, secret sharing, message authentication, detection  ...  applications and services for Ubi-comp including secure encryption techniques, identity and authentication; credential cloning attacks and countermeasures; switching generator with resistance against the  ...  In the next paper [9] , entitled "Message Authentication over Noisy Channels", Fanfan Zheng, et al. reformulate the authentication problems in "Authentication over noisy channels" in IEEE Trans.  ... 
doi:10.3390/e18090334 fatcat:vxubyrnfrrhdzgedsufoews4gq

Direct Use of Secret Key in Quantum Cryptography [article]

Horace P. Yuen
2006 arXiv   pre-print
For single-photon quantum key generation between two users, it is shown that the use of a shared secret key extended via a pseudo-random number generator may simultaneously enhance the security and efficiency  ...  This effect arises from the intrinsic performance difference between quantum detectors with versus without knowledge of the key, a purely quantum effect and a new principle for key generation.  ...  The hash function used may also be keyed, as usually assumed in BB84 for the message authentication that creates the "unjammable" public channel guaranteeing unconditional security [10,Ch 9] even if no  ... 
arXiv:quant-ph/0603264v2 fatcat:nsekwicwbba7dajsxy4xyjg6zu

Physical-Layer Authentication via a Dynamic Scaling

Min LI, Shaoquan JIANG, Yongjian LIAO
2020 Chinese journal of electronics  
Our authentication is achieved through a statistical test. Our scheme is provably secure and performs better than the related existing schemes.  ...  Message authentication is a process that allows sender Alice to transmit a source state to receiver Bob such that the latter is assured of the authenticity.  ...  Further, it does not exploit the channel coding or modulation for better efficiency; see Refs. [6-8] for challenges in this setting.  ... 
doi:10.1049/cje.2020.05.009 fatcat:jbeisgmizvgvdd33i3fydxtpou

New Results on Unconditionally Secure Multi-receiver Manual Authentication [chapter]

Shuhong Wang, Reihaneh Safavi-Naini
2009 Lecture Notes in Computer Science  
We prove that unlike computational security framework, without interaction a secure authentication protocol requires the bandwidth of the manual channel to be at least the same as the message size, hence  ...  Manual authentication systems are studied in computational and information theoretic security model and protocols with provable security have been proposed.  ...  We also consider NIMAPs in unconditionally secure framework and show a lower bound on the bandwidth of the manual channel that effectively implies secure NIMAPs can only exist if the message is directly  ... 
doi:10.1007/978-3-642-10230-1_10 fatcat:zm3s7idisjdf3nh37ef3mtwlya

Using quantum key distribution for cryptographic purposes: a survey [article]

Romain Alléaume, Cyril Branciard, Jan Bouda, Thierry Debuisschert, Mehrdad Dianati, Nicolas Gisin, Mark Godfrey, Philippe Grangier, Thomas Langer, Norbert Lutkenhaus, Christian Monyk, Philippe Painchault, Momtchil Peev (+9 others)
2014 arXiv   pre-print
It is therefore important, in the perspective of integrating QKD in security infrastructures, to analyze how QKD can be combined with other cryptographic primitives.  ...  for which the requirements, the context of use and the security properties can vary.  ...  A also acknowledges enlightning discussions with Sylvain Guilley, Philippe Hoogsvorst and Jean-Luc Danger about side-channel attacks on cryptographic hardware.  ... 
arXiv:quant-ph/0701168v3 fatcat:j3wuwqjuarav3ft6chdvdsaw5a

Efficient Bit Sifting Scheme of Post-processing in Quantum Key Distribution [article]

Qiong Li, Dan Le, Xianyan Wu, Xiamu Niu, Hong Guo
2014 arXiv   pre-print
Our scheme can greatly decrease the communication traffic of the post-processing of a QKD system, which means it can decrease the secure key consumption for classical channel authentication and increase  ...  of quantum channel.  ...  However, the classical channel in a QKD system cannot be authenticated by itself unless we authenticate all interactive messages between Alice and Bob by employing an unconditionally secure authentication  ... 
arXiv:1409.7582v1 fatcat:n3od6n6zbrdpdhoc6a33wfko7e

Modified Timed Efficient Stream Loss-tolerant Authentication to Secure Power Line Communication

Boyce Sigweni, Mmoloki Mangwala, Joseph Chuma
2019 International Journal of Electrical and Computer Engineering (IJECE)  
In this paper we present modifications to Timed Efficient Stream Loss-tolerant Authentication for secure authentica- tion to secure messages for load management over PLC.  ...  We demonstrate that PLC can be used to securely and effectively deliver Load Management messages to smart meters, with minimal overhead. </span></p></div></div></div>  ...  Modified timed efficient stream loss-tolerant... (Boyce Sigweni)  ... 
doi:10.11591/ijece.v9i4.pp2281-2295 fatcat:vwdvcm46xvhjznvnkkgpguw7se

Towards Secure and Practical MACs for Body Sensor Networks [chapter]

Zheng Gong, Pieter Hartel, Svetla Nikova, Bo Zhu
2009 Lecture Notes in Computer Science  
First in this paper, some practical problems with the Message Authentication Codes (MACs), which are suggested in the current security architectures for WSN, are reconsidered.  ...  Wireless sensor network (WSN) commonly requires lower level security for public information gathering, whilst body sensor network (BSN) must be secured with strong authenticity to protect personal health  ...  injections, so the attacker can execute side-channel attacks in the known message scenario.  ... 
doi:10.1007/978-3-642-10628-6_13 fatcat:d4w5uo2bm5enblxioltw53ltxy

Falcon Codes

Ari Juels, James Kelley, Roberto Tamassia, Nikos Triandopoulos
2015 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15  
We study Falcon codes in a novel adversarial model for rateless codes over computational (corrupting) channels and prove their security under standard assumptions.  ...  For instance, one variant works well with small input messages (100s of KB to 10s of MB), but two other variants are designed to handle much larger messages (several GB).  ...  CONCLUSION We introduced a new security model for analyzing fountain codes over computationally bounded adversarial channels, and presented Falcon codes, a class of (block or rateless) authenticated ECCs  ... 
doi:10.1145/2810103.2813728 dblp:conf/ccs/JuelsKTT15 fatcat:543brrm6nrdmljnlcu2zfio5we

A Survey on Secure Wireless Body Area Networks

Shihong Zou, Yanhong Xu, Honggang Wang, Zhouzhou Li, Shanzhi Chen, Bo Hu
2017 Security and Communication Networks  
to enable a secure WBAN.  ...  In this article, we mainly focus on a survey on the security issues in WBAN, including securing internal communication in WBAN and securing communication between WBAN and external users.  ...  For internal communication security, channel characteristic-based scheme seems to be a better solution.  ... 
doi:10.1155/2017/3721234 fatcat:ftsizo7fzjeftbbgjaazoypeuy

Secured Identity Based Cryptosystem Approach for Intelligent Routing Protocol in VANET

A Karthikeyan, P G Kuppusamy, Iraj S Amiri
2020 Scalable Computing : Practice and Experience  
Secured Identity Based Cryptosystem Approach (SIDBC) for intelligent routing protocol is proposed for better results since implementing a secured network for traffic forecasting and efficient routing in  ...  The message confirmations among vehicles and infrastructure are fundamental for the VANET security.  ...  Secure and efficient authentication scheme (SEAS) [13] with unsupervised anomaly detection.  ... 
doi:10.12694/scpe.v21i1.1608 fatcat:5ntui3ukhffihfkb4c6n74h5py
« Previous Showing results 1 — 15 out of 20,045 results