Online ISSN
1751-8717
Print ISSN
1751-8709
IET Information Security
Volume 2, Issue 2, June 2008
Volumes & issues:
Volume 2, Issue 2
June 2008
-
- Author(s): N.P. Smart ; E. Oswald ; D. Page
- Source: IET Information Security, Volume 2, Issue 2, p. 19 –27
- DOI: 10.1049/iet-ifs:20070017
- Type: Article
- + Show details - Hide details
-
p.
19
–27
(9)
The authors show that a number of existing methods for side-channel defence are essentially the same techniques presented in different contexts. By abstracting this technique, they present necessary conditions which need to be satisfied for it to be successful in preventing side-channel analysis. They also show that concrete application of the technique via randomised field representation produces more efficient implementations than application of the technique via randomised projective coordinates. - Author(s): B. Bahrak and M.R. Aref
- Source: IET Information Security, Volume 2, Issue 2, p. 28 –32
- DOI: 10.1049/iet-ifs:20070078
- Type: Article
- + Show details - Hide details
-
p.
28
–32
(5)
A specific class of differential cryptanalytic approach, named as impossible differential attack, has been successfully applied to several symmetric cryptographic primitives in particular encryption schemes such as Advanced Encryption Standard (AES). Such attacks exploit differences that are impossible at some intermediate state of the cipher algorithm. The best-known impossible differential attack against AES-128 has applied to six rounds. An attack on AES-128 up to seven rounds is proposed. The proposed attack requires 2115.5 chosen plaintexts and 2109 bytes of memory and performs 2119 seven-round AES encryptions. This is also the best-known attack on a reduced version of the AES-128 till now. - Author(s): C.-C. Chang ; C.-C. Lin ; Y.-H. Chen
- Source: IET Information Security, Volume 2, Issue 2, p. 35 –46
- DOI: 10.1049/iet-ifs:20070004
- Type: Article
- + Show details - Hide details
-
p.
35
–46
(12)
Reversible data embedding is a very important issue, especially in dealing with sensitive images such as military data and medical data. Based on the edge-directed prediction scheme, the authors propose a reversible data-embedding scheme to embed secret information in original images. In the proposed scheme, an embedded pixel value is generalised according to a predetermined threshold and the difference between the predicted pixel value and its original pixel value. Experimental results show that the proposed scheme can provide great payload capacity while preserving the quality of the stego-image. The hiding capacity of the proposed scheme is about 1.7 times that of Tian's data-embedding scheme and twice that of Celik's. - Author(s): M. Bellare and S. Shoup
- Source: IET Information Security, Volume 2, Issue 2, p. 47 –63
- DOI: 10.1049/iet-ifs:20070089
- Type: Article
- + Show details - Hide details
-
p.
47
–63
(17)
The authors show how the Fiat–Shamir transform can be used to convert three-move identification protocols into two-tier signature schemes (a primitive that they define) with a proof of security that makes a standard assumption on the hash function rather than modelling it as a random oracle. The result requires security of the starting protocol against concurrent attacks. It is also shown that numerous protocols have the required properties, and thus numerous efficient two-tier schemes are obtained. The first application is an efficient transform of any unforgeable signature scheme into a strongly unforgeable one. (This extends the work of Boneh, Shen and Waters whose transform only applies to a limited class of schemes.) The second application is the new one-time signature schemes that, compared with the one-way function-based ones of the same computational cost, have smaller key and signature sizes.
Randomised representations
Impossible differential attack on seven-round AES-128
Reversible data-embedding scheme using differences between original and predicted pixel values
Two-tier signatures from the Fiat–Shamir transform, with applications to strongly unforgeable and one-time signatures
Most viewed content for this Journal
Article
content/journals/iet-ifs
Journal
5
Most cited content for this Journal
-
High accuracy android malware detection using ensemble learning
- Author(s): Suleiman Y. Yerima ; Sakir Sezer ; Igor Muttik
- Type: Article
-
Crypto-based algorithms for secured medical image transmission
- Author(s): Ali Al-Haj ; Gheith Abandah ; Noor Hussein
- Type: Article
-
Pseudorandom bit generator based on non-stationary logistic maps
- Author(s): Lingfeng Liu ; Suoxia Miao ; Hanping Hu ; Yashuang Deng
- Type: Article
-
Constructing important features from massive network traffic for lightweight intrusion detection
- Author(s): Wei Wang ; Yongzhong He ; Jiqiang Liu ; Sylvain Gombault
- Type: Article
-
Empirical analysis of Tor Hidden Services
- Author(s): Gareth Owen and Nick Savage
- Type: Article