IET Information Security
Volume 12, Issue 4, July 2018
Volumes & issues:
Volume 12, Issue 4
July 2018
-
- Source: IET Information Security, Volume 12, Issue 4, page: 247 –247
- DOI: 10.1049/iet-ifs.2018.0049
- Type: Article
- + Show details - Hide details
-
p.
247
(1)
- Author(s): Vincenzo Iovino ; Qiang Tang ; Karol Żebrowski
- Source: IET Information Security, Volume 12, Issue 4, p. 248 –256
- DOI: 10.1049/iet-ifs.2016.0459
- Type: Article
- + Show details - Hide details
-
p.
248
–256
(9)
In the public-key setting, known constructions of function-private functional encryption (FPFE) were limited to very restricted classes of functionalities like inner-product. Moreover, its power has not been well investigated. The authors construct FPFE for general functions and explore its powerful applications, both for general and specific functionalities. One key observation entailed by their results is that attribute-based encryption with function privacy implies FE, a notable fact that sheds light on the importance of the function privacy property for FE.
- Author(s): Eunkyung Kim and Mehdi Tibouchi
- Source: IET Information Security, Volume 12, Issue 4, p. 257 –264
- DOI: 10.1049/iet-ifs.2017.0024
- Type: Article
- + Show details - Hide details
-
p.
257
–264
(8)
Fully homomorphic encryption (FHE) over the integers, as proposed by van Dijk et al. in 2010 and developed in a number of papers afterwards, originally supported the evaluation of Boolean circuits (i.e. mod-2 arithmetic circuits) only. It is easily generalised to the somewhat homomorphic versions of the corresponding schemes to support arithmetic operations modulo Q for any , but bootstrapping those generalised variants into fully homomorphic schemes is not easy. Thus, Nuida and Kurosawa settled an interesting open problem in 2015 by showing that one could in fact construct FHE over the integers with message space for any constant prime Q. As a result of their work, the authors can homomorphically evaluate a mod-Q arithmetic circuit with an FHE scheme over the integers in two different ways: one could either use their scheme with message space directly, or one could first convert the arithmetic circuit to a Boolean one, and then evaluate that converted circuit using an FHE scheme with binary message space. In this study, they compare both approaches and show that the latter is often preferable to the former.
- Author(s): Yusuke Naito
- Source: IET Information Security, Volume 12, Issue 4, p. 265 –274
- DOI: 10.1049/iet-ifs.2017.0027
- Type: Article
- + Show details - Hide details
-
p.
265
–274
(10)
In this study, the authors study the pseudo-random function (PRF) security of keyed sponges. ‘Capacity’ is a parameter of a keyed sponge that usually defines a dominant term in the PRF-security bound. The previous works have improved the capacity term in the PRF-security bound of the ‘prefix’ keyed sponge, where a secret key is prepended to an input message, and then the resultant value is inputted into the sponge function. A tight bound for the capacity term was given by Naito and Yasuda (FSE 2016): for the capacity c, the number of construction queries q and the number of primitive queries Q. Thus, the following question naturally arises: Can they construct a keyed sponge with beyond the -bound security? In this study, they consider the ‘sandwich’ keyed sponge, where a secret key is both prepended and appended to an input message, and then the resultant value is inputted into the sponge function. They prove that the capacity term becomes for the rate r, which is usually and . That is, the dependence between the capacity and construction queries can be removed by the sandwich construction.
- Author(s): Sergio De los Santos and José Torres
- Source: IET Information Security, Volume 12, Issue 4, p. 275 –284
- DOI: 10.1049/iet-ifs.2017.0030
- Type: Article
- + Show details - Hide details
-
p.
275
–284
(10)
HTTP Strict Transport Security (HSTS) and HTTP Public Key Pinning (HPKP) are two protocols aimed to enforce HTTPS connections and allow certificate pinning over HTTP. The combination of these recent protocols improves and strengthens HTTPS security in general, adding an additional layer of trust and verification. In addition, they help ensure that the connection is always ciphered and correctly authenticated. However, during the process of adoption and implementation of any protocol that is not yet completely settled, the possibility of introducing new weaknesses, opportunities or attack scenarios arises. Even when these protocols are implemented, bad practices prevent them from actually providing the additional security they are expected to provide. In this study, the authors review not just the quantity but the quality (according to several criteria) of the implementation in both servers and most popular browsers and report on some possible attack scenarios that the authors have discovered.
Guest Editorial: Selected Papers from the 15th International Conference on Cryptology and Network Security (CANS 2016)
Power of public-key function-private functional encryption
FHE over the integers and modular arithmetic circuits
Sandwich construction for keyed sponges: independence between capacity and construction queries
Analysing HSTS and HPKP implementation in both browsers and servers
-
- Author(s): Emad S. Hassan ; Amir S. Elsafrawey ; Moawad I. Dessouky
- Source: IET Information Security, Volume 12, Issue 4, p. 285 –292
- DOI: 10.1049/iet-ifs.2017.0369
- Type: Article
- + Show details - Hide details
-
p.
285
–292
(8)
This study investigates the performance analysis of mobile unattended wireless sensor networks (UWSNs) during the self-healing process under informed movement inside a cluster of healed and sick sensors. Introducing mobility within a cluster can increase the chance that a sick sensor has healthy neighbours and this will aid the sick sensor to be healed faster and better. However, sensor mobility is considered as one of the most energy consuming factors in UWSNs. This study proposes a new self-healing scheme based on a single flow controlled mobility within a cluster to make a trade-off between self-healing and energy consumption in mobile UWSNs. The obtained results show that using the proposed scheme, UWSNs can exploit controlled sensor mobility to enhance network capability in terms of self-healing and reduce the communication-related energy consumption. In addition, the proposed scheme with single flow controlled mobility does not disturb the number of neighbours per sensor and the network coverage.
- Author(s): Deepak Rewadkar and Dharmpal Doye
- Source: IET Information Security, Volume 12, Issue 4, p. 293 –304
- DOI: 10.1049/iet-ifs.2018.0002
- Type: Article
- + Show details - Hide details
-
p.
293
–304
(12)
Vehicular ad-hoc network (VANET) is a growing networking concept that has been used increasingly in various applications including traffic alert broadcasting. The main purpose of VANET is to provide safety to the drivers by alerting them to the dangers that may happen. This study presents a traffic-aware routing protocol in VANET by the introduction of multi-objective auto-regressive whale optimisation (ARWO) algorithm. ARWO algorithm selects the best path from the multiple paths by considering the multiple objectives, such as end-to-end delay (EED), link life time, packet delay and distance, in the fitness function. Here, the traffic density and the expected average speed of the vehicle are predicted by the exponential weighted moving average approach. The performance of ARWO protocol is compared with four existing techniques, like stable CDS-based routing protocol, fractional glow worm swarm optimisation, glow worm swarm optimisation, and Whale Optimization Algorithm (WOA), using the metrics, EED, distance, traffic density, and throughput. The simulation results show that the proposed ARWO algorithm achieves EED of 2.941, a distance of 2.15, traffic density of 0.009 and throughput of 0.1, respectively, at maximum constraints, i.e. at a maximum number of vehicles and simulation time and thus proves its efficiency against the comparative protocols.
- Author(s): Kunpeng Bai ; Chuankun Wu ; Zhenfeng Zhang
- Source: IET Information Security, Volume 12, Issue 4, p. 305 –313
- DOI: 10.1049/iet-ifs.2017.0046
- Type: Article
- + Show details - Hide details
-
p.
305
–313
(9)
White-box cryptography protects cryptographic software in a white-box attack context (WBAC), where the dynamic execution of the cryptographic software is under full control of an adversary. Protecting AES in the white-box setting attracted many scientists and engineers, and several solutions emerged. However, almost all these solutions have been badly broken by various efficient white-box attacks, which target compositions of key-embedding lookup tables. In 2014, Luo, Lai, and You proposed a new WBAC-oriented AES implementation, and claimed that their implementation is secure against both Billet et al.'s attack and De Mulder et al.'s attack. In this study, based on the existing table-composition-targeting cryptanalysis techniques, the authors show that the secret key of the Luo–Lai–You (LLY) implementation can be recovered with a time complexity of about 244. Furthermore, the authors propose a new white-box AES implementation based on table lookups, which is shown to be resistant against the existing table-composition-targeting white-box attacks. The authors, key-embedding tables are obfuscated with large affine mappings, which cannot be cancelled out by table compositions of the existing cryptanalysis techniques. Although their implementation requires twice as much memory as the LLY WBAES to store the tables, its speed is about 63 times of the latter.
- Author(s): Sadegh Sadeghi and Nasour Bagheri
- Source: IET Information Security, Volume 12, Issue 4, p. 314 –325
- DOI: 10.1049/iet-ifs.2016.0590
- Type: Article
- + Show details - Hide details
-
p.
314
–325
(12)
SIMECK is a family of three lightweight block ciphers designed by Yang et al., following the framework used by Beaulieu et al. from the United States National Security Agency to design SIMON and SPECK. In this study, the authors employ an improved miss-in-the-middle approach to find zero correlation linear distinguishers and impossible differentials on SIMECK48 and SIMECK64. Based on this novel technique, they will be able to present zero-correlation linear approximations for 15-round SIMECK48 and 17-round SIMECK64 and these zero-correlation linear approximations improve the previous best result by two rounds for SIMECK48 and SIMECK64. Moreover, they attack 27-round SIMECK48 and 31-round SIMECK64 based on these zero-correlation linear distinguishers. In addition, due to the duality of zero-correlation and impossible differential, they search for the impossible differential characteristics for SIMECK48 and SIMECK64 so that they will be able to present 15-round SIMECK48 and 17-round SIMECK64 while the best previously known results were 13-round impossible differentials for SIMECK48 and 15-round impossible differentials for SIMECK64. Moreover, they propose impossible differential attacks on 22-round SIMECK48 and 24-round SIMECK64 based on these impossible differential characteristics. The results significantly improve the previous zero correlation attack and impossible differential characteristic results for these variants of SIMECK to the best of the authors’ knowledge.
- Author(s): Zhe Xia ; Zheng Tong ; Min Xiao ; Chin-Chen Chang
- Source: IET Information Security, Volume 12, Issue 4, p. 326 –331
- DOI: 10.1049/iet-ifs.2017.0213
- Type: Article
- + Show details - Hide details
-
p.
326
–331
(6)
Remote voting allows the voters to cast their votes remotely at their convenience, and it is desirable in many circumstances. In the literature, a number of verifiable remote voting schemes have been introduced recently. However, some of these schemes are only suitable for the low coercion environment. Since without the receipt-freeness guarantee, voters can be coerced or bribed to vote the candidate favoured by adversaries. Some other schemes provide a very high level of security assurance, e.g. coercion resistance, but these schemes are normally very complex, and ordinary voters are required to perform complicated crypto calculations. In this study, the authors introduce a generic framework for practical and receipt-free remote voting. In their proposed scheme, voters do not need to have special knowledge or use any trusted device to cast their votes, and meanwhile, they cannot prove to the others how they have voted.
- Author(s): D. Menaga and S. Revathi
- Source: IET Information Security, Volume 12, Issue 4, p. 332 –340
- DOI: 10.1049/iet-ifs.2017.0634
- Type: Article
- + Show details - Hide details
-
p.
332
–340
(9)
Privacy preserving data mining (PPDM) is a well-known research area, which can analyse the database ensuring privacy such that it does not expose the confidential details. This study proposes a technique of secret key generation for privacy preserving using the least lion optimisation algorithm (LLOA). The proposed algorithm involves two stages: rule mining and secret key generation for the sanitisation. Initially, whale optimisation algorithm mines the association rules for the input database and validates the rules with the newly formulated fitness function. An algorithm, LLOA is developed by modifying the lion optimisation algorithm (LOA) with the inclusion of least mean square (LMS) which generates a secret key to provide privacy in mining. With the secret key, LLOA converts the original database into the sanitised database. Then, the algorithm optimally selects a secret key such that the sanitised database hides sensitive information by the utilisation of two factors, namely, privacy factor and utility factor, in its objective function. From the results, it can be shown that the LLOA technique attains the privacy of 84.36, 83.74, and 82.46%; and utility of 81.37, 83.96, and 81.37%, for chess, T10I4D100K, and retail datasets.
- Author(s): Ozgu Can
- Source: IET Information Security, Volume 12, Issue 4, p. 341 –347
- DOI: 10.1049/iet-ifs.2016.0613
- Type: Article
- + Show details - Hide details
-
p.
341
–347
(7)
Individual privacy protection in the released data sets has become an important issue in recent years. The release of microdata provides a significant information resource for researchers, whereas the release of person-specific data poses a threat to individual privacy. Unfortunately, microdata could be linked with publicly available information to exactly re-identify individuals’ identities. In order to relieve privacy concerns, data has to be protected with a privacy protection mechanism before its disclosure. The k-anonymity model is an important method in privacy protection to reduce the risk of re-identification in microdata release. This model necessitates the indistinguishably of each tuple from at least k − 1 other tuples in the released data. While k-anonymity preserves the truthfulness of the released data, the privacy level of anonymisation is same for each individual. However, different individuals have different privacy needs in the real world. Thereby, personalisation plays an important role in supporting the notion of individual privacy protection. This study proposes a personalised anonymity model that provides distinct privacy levels for each individual by offering them to control their anonymity on the released data. To satisfy the personal anonymity requirements with low information loss, the authors introduce a clustering based algorithm.
- Author(s): Meltem Kurt Pehlivanoğlu ; Muharrem Tolga Sakallı ; Sedat Akleylek ; Nevcihan Duru ; Vincent Rijmen
- Source: IET Information Security, Volume 12, Issue 4, p. 348 –355
- DOI: 10.1049/iet-ifs.2017.0156
- Type: Article
- + Show details - Hide details
-
p.
348
–355
(8)
In this study, the authors generalise Hadamard matrix over and propose a new form of Hadamard matrix, which they call generalised Hadamard (GHadamard) matrix. Then, they focus on generating lightweight (involutory) maximum distance separable (MDS) matrices. They also extend this idea to any matrix form, where k is not necessarily a power of 2. The new matrix form, GHadamard matrix, is used to generate new involutory MDS matrices over and , and involutory/non-involutory MDS matrices over by considering the minimum exclusive OR (XOR) count, which is a metric defined to estimate the hardware implementation cost. In this context, they improve the best-known results of XOR counts for involutory/non-involutory MDS matrices over .
- Author(s): Yongkang Tang ; Shaoqing Li ; Fan Zhang ; Liang Fang
- Source: IET Information Security, Volume 12, Issue 4, p. 356 –361
- DOI: 10.1049/iet-ifs.2017.0354
- Type: Article
- + Show details - Hide details
-
p.
356
–361
(6)
Hardware Trojan (HT) is increasingly becoming a serious problem in the information security field. Compared to other countermeasures, thermal maps based detection can mitigate process variation (PV) and have a higher accuracy. However, HT cannot be differentiated from the others directly from the original thermal maps. Therefore, in this study, the authors first propose a general HT detection framework based on difference temperature matrix, and introduce the PV mitigation mechanism. Then, they demonstrate how principal component analysis can implement spatial projection transformation and expose HT signal. Finally, they introduce their experimental setup and design, and then validate their countermeasure with Xilinx field programmable gate arrays which are configured with the pure AES circuit and the infected AES circuits. The power proportions (PPs) of HTs in the different infected AES circuits are various. The experimental results indicate that their proposed countermeasure can clearly detect HT with 0.14% small PP.
- Author(s): Yaojun Hao and Fuzhi Zhang
- Source: IET Information Security, Volume 12, Issue 4, p. 362 –374
- DOI: 10.1049/iet-ifs.2017.0012
- Type: Article
- + Show details - Hide details
-
p.
362
–374
(13)
To defend recommender systems, various methods have been proposed to detect shilling profiles, which can be categorised as user- and item-based detection methods. Most of the user-based methods identify shilling profiles via statistical signatures of rating values and suffer from low precision when detecting different types of attacks. Most of the item-based methods use temporal information to detect the anomaly items, but they assume that the fake ratings were injected in short periods. So they are invalid for the long duration and decentralised injection attacks. To address these limitations, the authors extract the multidimensional profile temporal features and present a shilling detection method. First, from the user profile view, user rating behaviours are characterised by corrected conditional entropy and the dissimilarity with the rest-rating model. Second, from the item profile view, the user features are extracted according to item temporal popularity. Third, the features based on weighted deviation from dynamic mean are extracted according to the fact that the items mean changes with time. Finally, support vector machine is exploited to detect shilling profiles based on the proposed features. Experimental results on the Netflix dataset indicate that the performance of the proposed method is better than that of the benchmark methods.
- Author(s): Yuan Ping ; Baocang Wang ; Shengli Tian ; Yuehua Yang ; Genyuan Du
- Source: IET Information Security, Volume 12, Issue 4, p. 375 –380
- DOI: 10.1049/iet-ifs.2017.0107
- Type: Article
- + Show details - Hide details
-
p.
375
–380
(6)
The knapsack problem is an important problem in computer science and had been used to design public key cryptosystems. Low-density subset sum algorithms are powerful tools to reduce the security of trapdoor knapsacks to the shortest vector problem (SVP) over lattices. Several knapsack ciphers Chor–Rivest, Okamoto–Tanaka–Uchiyama, and Kate–Goldberg were proposed to defend low-density attacks by utilising low-weight knapsack problems. Some evidence was also found on the vulnerabilities of the above three knapsack ciphers to lattice attacks. However, previous lattice-based cryptanalytic results have been established via a probabilistic approach. The authors investigate some collision-free properties and derive from the properties a deterministic reduction from the knapsack problems in the Chor–Rivest, Okamoto–Tanaka–Uchiyama, and Kate–Goldberg knapsack ciphers to SVP without imposing any restriction and assumption. To the best of the authors' knowledge, the proposed reduction is the first deterministic reduction from public key cryptographic knapsacks to SVP.
Trade-off between self-healing and energy consumption in mobile unattended WSNs
Multi-objective auto-regressive whale optimisation for traffic-aware routing in urban VANET
Protect white-box AES to resist table composition attacks
Improved zero-correlation and impossible differential cryptanalysis of reduced-round SIMECK block cipher
Framework for practical and receipt-free remote voting
Least lion optimisation algorithm (LLOA) based secret key generation for privacy preserving association rule hiding
Personalised anonymity for microdata release
Generalisation of Hadamard matrix to generate involutory MDS matrices for lightweight cryptography
Thermal maps based HT detection using spatial projection transformation
Detecting shilling profiles in collaborative recommender systems via multidimensional profile temporal features
Deterministic lattice reduction on knapsacks with collision-free properties
-
- Author(s): ThienLuan Ho ; Seong-Je Cho ; Seung-Rohk Oh
- Source: IET Information Security, Volume 12, Issue 4, p. 381 –388
- DOI: 10.1049/iet-ifs.2017.0421
- Type: Article
- + Show details - Hide details
-
p.
381
–388
(8)
A large amount of data now being transferred through networks has made deep packet inspection (DPI) an essential part of security activities. Several DPI systems are developed based on Bloom filters to defend against malicious worm attacks through the Internet. These approaches have achieved significant performance. However, they do not permit deletion of items from the set of target patterns. This study proposes two multiple pattern matching schemes for DPI to exploit high parallelism capacity of graphics processing units (GPUs). Firstly, a GPU-based Cuckoo filter scheme is proposed by adopting a new approximate set membership, called Cuckoo filter, for parallel multiple pattern matching. The Cuckoo filter has many advantages over the Bloom filter such as higher insert performance, higher lookup throughput, less memory consumption, less false positive rate, and delete operation support. Secondly, an implementation of the GPU-based Cuckoo filter, called GPUshared-based Cuckoo filter is proposed. This scheme can efficiently distribute input string and pre-processing data in the hierarchical memory of GPUs to optimise the performance of the GPU-based Cuckoo filter scheme. Experiments show that the proposed schemes offer better performance than the previous approaches based on the Bloom filter.
Parallel multiple pattern matching schemes based on cuckoo filter for deep packet inspection on graphics processing units
Most viewed content
Most cited content for this Journal
-
High accuracy android malware detection using ensemble learning
- Author(s): Suleiman Y. Yerima ; Sakir Sezer ; Igor Muttik
- Type: Article
-
Crypto-based algorithms for secured medical image transmission
- Author(s): Ali Al-Haj ; Gheith Abandah ; Noor Hussein
- Type: Article
-
Pseudorandom bit generator based on non-stationary logistic maps
- Author(s): Lingfeng Liu ; Suoxia Miao ; Hanping Hu ; Yashuang Deng
- Type: Article
-
Constructing important features from massive network traffic for lightweight intrusion detection
- Author(s): Wei Wang ; Yongzhong He ; Jiqiang Liu ; Sylvain Gombault
- Type: Article
-
Empirical analysis of Tor Hidden Services
- Author(s): Gareth Owen and Nick Savage
- Type: Article