Filters








69 Hits in 3.6 sec

On the Security of the CCM Encryption Mode and of a Slight Variant [chapter]

Pierre-Alain Fouque, Gwenaëlle Martinet, Frédéric Valette, Sébastien Zimmer
Applied Cryptography and Network Security  
In this paper, we present an analysis of the CCM mode of operations and of a slight variant.  ...  CCM is a simple and efficient encryption scheme which combines a CBC-MAC authentication scheme with the counter mode of encryption. It is used in several standards.  ...  Acknowledgment This work has been partially supported by the European Commission through the IST Program under Contract IST-2002-507932 ECRYPT.  ... 
doi:10.1007/978-3-540-68914-0_25 dblp:conf/acns/FouqueMVZ08 fatcat:colthyvgtzaepbfikz75y3wpc4

Low-Power IoT Communication Security: On the Performance of DTLS and TLS 1.3 [article]

Gabriele Restuccia, Hannes Tschofenig, Emmanuel Baccelli
2020 arXiv   pre-print
Similarly to elsewhere on the Internet, practical security in the Internet of Things (IoT) is achieved by combining an array of mechanisms, at work at all layers of the protocol stack, in system software  ...  Recently, the TLS 1.3 standard was released and DTLS 1.3 is in the final stages of standardization.  ...  This mode harmonizes three PSK variants available in previous TLS versions into one.  ... 
arXiv:2011.12035v2 fatcat:vgyt4pnrjndjdnohasz3vjlvh4

IPSec: Performance Analysis in IPv4 and IPv6

Prabhu Thiruvasagam, K. Jijo George, Sivabalan Arumugam, Anand R. Prasad
2019 Journal of ICT Standardization  
In this paper we present a throughput performance analysis of IPSec protocol, for both IPv4 and IPv6, using various cryptographic algorithms as recommended in the standards [13] .  ...  In this study we have considered only throughput performance for authenticated encryption algorithms AES-GCM and AES-CCM, encryption algorithms AES-CBC, AES-CTR, and 3DES, and authentication algorithms  ...  Table 2 2 ESP Authenticated Encryption (Combined Mode Algorithms) Requirement Authenticated Encryption Algorithm SHOULD+ AES-GCM with a 16 octet ICV [RFC4106] MAY AES-CCM [RFC4309] Table 3 ESP  ... 
doi:10.13052/jicts2245-800x.714 fatcat:izvvzsxvpzgp3fnedrwvbfc4pq

Authenticated Encryption Based on Chaotic Neural Networks and Duplex Construction

Nabil Abdoun, Safwan El Assad, Thang Manh Hoang, Olivier Deforges, Rima Assaf, Mohamad Khalil
2021 Symmetry  
The experimental results obtained on the security performance of the proposed AEADS system are notable and the proposed system can then be used to protect data and authenticate their sources.  ...  In this paper, we propose, implement and analyze an Authenticated Encryption with Associated Data Scheme (AEADS) based on the Modified Duplex Construction (MDC) that contains a chaotic compression function  ...  At its core, Oribatida, a variant of the MonkeyWrap AE mode, extended by a ciphertext masking that boosts the security, inherits the minimal security  ... 
doi:10.3390/sym13122432 fatcat:frwiostg4factit4fqwaiht7ge

Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions [chapter]

Kazuhiko Minematsu
2014 Lecture Notes in Computer Science  
When it is realized with a blockcipher, it requires one blockcipher call to process one input block (i.e. rate-1), and uses the encryption function of the blockcipher for both encryption and decryption  ...  This paper proposes a new scheme for authenticated encryption (AE) which is typically realized as a blockcipher mode of operation.  ...  The author would like to thank anonymous reviewers for careful reading and invaluable suggestions, which greatly improved the presentation of the paper.  ... 
doi:10.1007/978-3-642-55220-5_16 fatcat:vyv577v3ong4hokfyqzvrdsyzu

Twine: An Embedded Trusted Runtime for WebAssembly [article]

Jämes Ménétrey, Marcelo Pasin, Pascal Felber, Valerio Schiavoni
2021 arXiv   pre-print
In particular, we used Twine to implement a secure, trusted version of SQLite, a well-known full-fledged embeddable database.  ...  We evaluate Twine with a large set of general-purpose benchmarks and real-world applications.  ...  ACKNOWLEDGMENTS This publication incorporates results from the VEDLIoT project, which received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No  ... 
arXiv:2103.15860v1 fatcat:4k2flfy6qbab7lw3ahxkdbl7ki

Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers [chapter]

Thomas Peyrin, Yannick Seurin
2016 Lecture Notes in Computer Science  
To the best of our knowledge, this is the first authenticated encryption mode that provides at the same time close-to-optimal security in the noncerespecting scenario and birthday-bound security for the  ...  The SCT mode combines in a SIV-like manner a Wegman-Carter MAC inspired from PMAC for the authentication part and a new counter-like mode for the encryption part, with the unusual property that the counter  ...  Acknowledgements The authors would like to thank Jérémy Jean and Ivica Nikolic for their remarks on early designs.  ... 
doi:10.1007/978-3-662-53018-4_2 fatcat:h3vjushdvbeazfe4nuk6doeupq

Suit up! -- Made-to-Measure Hardware Implementations of ASCON

Hannes Gross, Erich Wenger, Christoph Dobraunig, Christoph Ehrenhofer
2015 2015 Euromicro Conference on Digital System Design  
Having ciphers that provide confidentiality and authenticity, that are fast in software and efficient in hardware, these are the goals of the CAESAR authenticated encryption competition.  ...  to encrypt a Gigabit Ethernet connection.  ...  This work has been supported by the FFG research program SeCoS (project number 836628), the European Commission through the FP7 program (project MATTHEW, project number 610436), and by the Austrian Science  ... 
doi:10.1109/dsd.2015.14 dblp:conf/dsd/GrossWDE15 fatcat:6tf3p7t4hzcrrf6o2n6skyj7wu

CLOC: Authenticated Encryption for Short Input [chapter]

Tetsu Iwata, Kazuhiko Minematsu, Jian Guo, Sumio Morioka
2015 Lecture Notes in Computer Science  
CLOC uses a variant of CFB mode in its encryption part and a variant of CBC MAC in the authentication part.  ...  We define and analyze the security of a blockcipher mode of operation, CLOC, for provably secure authenticated encryption with associated data.  ...  We have (18) = 1/2 n from the randomness of HASH4 ′′ , and (19) ≤ mm ′ /2 n + max{m, m ′ }/2 n from Lemma 5. We now evaluate the probability of the bad event.  ... 
doi:10.1007/978-3-662-46706-0_8 fatcat:lbofajfihvgvbarwr6k7u3hgh4

A framework for secure execution of software

Antonio Maña, Javier Lopez, Juan J. Ortega, Ernesto Pimentel, Jose M. Troya
2004 International Journal of Information Security  
This solution, called SmartProt, is based on the use of smart cards and cryptographic techniques, and its security relies only on the first of previous premises; that is, Smartprot has been designed to  ...  This type of solutions depends on two basic premises: (i) to increase the physical security by using tamperproof devices, and (ii) to increase the complexity of the analysis of the software.  ...  In this sense, the XSCD infrastructure [16] [30] is based on the dynamic creation of mobile software elements protected by a variant of SmartProt.  ... 
doi:10.1007/s10207-004-0048-6 fatcat:rgeihd3i3nfmdjfdfqdzqrv75q

Authenticated and Misuse-Resistant Encryption of Key-Dependent Data [chapter]

Mihir Bellare, Sriram Keelveedhi
2011 Lecture Notes in Computer Science  
This paper provides a comprehensive treatment of the security of authenticated encryption (AE) in the presence of key-dependent data, considering the four variants of the goal arising from the choice of  ...  We go on to give a key-dependent data treatment of the goal of misuse resistant AE. Implementations are provided and show that RHtE has small overhead.  ...  S[c], C) + S[c + 1] mod 2 to get a concrete attack that is only a slight modification of the BRS one but is proven to work.  ... 
doi:10.1007/978-3-642-22792-9_35 fatcat:htwppgpbbbfwlezbpryvzccmbm

Two Efficient Fault-Based Attacks on CLOC and SILC

Debapriya Basu Roy, Avik Chakraborti, Donghoon Chang, S. V. Dilip Kumar, Debdeep Mukhopadhyay, Mridul Nandi
2017 Journal of Hardware and Systems Security  
The designers of CLOC and SILC claimed n 2 -bit integrity security against nonce-reusing adversaries, where n is the blockcipher state size in bits.  ...  In the case of SILC, the forgery can be done for almost any associated data and message, except some nominal restrictions on associated data along with a fixed nonce.  ...  Acknowledgments Avik Chakraborti and Mridul Nandi are supported by the Centre of Excellence in Cryptology, Indian Statistical Institute, Kolkata.  ... 
doi:10.1007/s41635-017-0022-1 dblp:journals/jhss/RoyCCKMN17 fatcat:ytr7zw4ju5hmhffdsxjqnqxbsy

Hybrid Control of Digital Baker Map with Application to Pseudo-Random Number Generator

Yuhui Shi, Yashuang Deng
2021 Entropy  
Three different control modes are investigated, and the influence of control parameter on the properties of the controlled system is discussed.  ...  Dynamical degradation occurs when chaotic systems are implemented on digital devices, which seriously threatens the security of chaos-based cryptosystems.  ...  Thus far, many secure communication systems have been proposed, including multimedia digital encryption [3] , data watermarking, synchronization security systems, and data hiding systems based on chaos  ... 
doi:10.3390/e23050578 pmid:34066750 fatcat:a5m6mak2rna2xktplyrlmbx4ci

Saturnin: a suite of lightweight symmetric algorithms for post-quantum security

Anne Canteaut, Sébastien Duval, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, Thomas Pornin, André Schrottenloher
2020 IACR Transactions on Symmetric Cryptology  
In this paper, we specify a new block cipher, Saturnin, and its usage in different modes to provide hashing and authenticated encryption in such a way that we can rigorously argue its security in the post-quantum  ...  A simple answer to this problem is a compromise on the security level: through a weaker round function or a smaller number of rounds, the security level can be decreased in order to cheapen the implementation  ...  They are also particularly grateful to Xavier Bonnetain for very helpful discussions and comments, and in particular for an invaluable remark detecting a weakness on a preliminary version of Saturnin.  ... 
doi:10.13154/tosc.v2020.is1.160-207 dblp:journals/tosc/CanteautDLNPPS20 fatcat:jbovqcc6k5gvtopwgxcmadggd4

Insights into the Issue of Deploying a Private LoRaWAN

Radek Fujdiak, Konstantin Mikhaylov, Jan Pospisil, Ales Povalac, Jiri Misurec
2022 Sensors  
and give a clear overview of the advantages and disadvantages of the private versus public approaches.  ...  The last decade has transformed wireless access technologies and crystallized a new direction for the internet of things (IoT).  ...  Data Availability Statement: All data are available on demand via corresponding author. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s22052042 pmid:35271189 pmcid:PMC8914651 fatcat:wbrspl5mgrhmvmrv2ug2fmet5a
« Previous Showing results 1 — 15 out of 69 results