Online ISSN
1751-8717
Print ISSN
1751-8709
IET Information Security
Volume 4, Issue 1, March 2010
Volumes & issues:
Volume 4, Issue 1
March 2010
-
- Author(s): M.H. Shirali-Shahreza and S. Shirali-Shahreza
- Source: IET Information Security, Volume 4, Issue 1, p. 1 –7
- DOI: 10.1049/iet-ifs.2008.0129
- Type: Article
- + Show details - Hide details
-
p.
1
–7
(7)
Embedding a secret message into a cover media without attracting any attention, known as steganography, is one of the methods used for hidden communication purposes. One of the cover media that can be used for steganography is speech. In this study, the authors propose a new steganography method in speech signals. In this method, the silence intervals of speech are found and the length (number of samples) of these intervals is changed to hide information. The main feature of our method is robustness to MPEG-1 layer III (MP3) compression. This method can hide information in a speech stream with very low processing time which makes it a real-time steganography method. The hiding capacity of our method is comparable with other MP3 resistance methods and the listening tests show that the degradation in speech quality is not annoying. Additionally, the effect of our method on chaotic features is negligible, so it is difficult to detect our method with chaotic-based steganalysis methods. - Author(s): H. Fan ; J. Sun ; M. Gu ; K.-Y. Lam
- Source: IET Information Security, Volume 4, Issue 1, p. 8 –14
- DOI: 10.1049/iet-ifs.2009.0039
- Type: Article
- + Show details - Hide details
-
p.
8
–14
(7)
The authors describe how a simple way to split input operands allows for fast VLSI implementations of subquadratic GF(2)[x] Karatsuba–Ofman multipliers. The theoretical XOR gate delay of the resulting multipliers is reduced significantly. For example, it is reduced by about 33 and 25% for n = 2t and n = 3t (t > 1), respectively. To the best of our knowledge, this parameter has never been improved since the original Karatsuba–Ofman algorithm was first used to design GF(2n) multipliers in 1990. - Author(s): J. Liu and L. Vigneron
- Source: IET Information Security, Volume 4, Issue 1, p. 15 –29
- DOI: 10.1049/iet-ifs.2009.0086
- Type: Article
- + Show details - Hide details
-
p.
15
–29
(15)
All the existing non-repudiation protocols ensuring strong fairness have to assume that the communication channel between trusted third party (TTP) and each player is resilient at least. Where only unreliable channel can be guaranteed, all these protocols become impractical. In this study, based on smart card on the receiver side, the authors design a fair non-repudiation protocol that needs no assumptions on the communication channel. The smart card takes over the role of an online TTP server. Without a dedicated TTP server, this protocol is ideal for some ad hoc scenarios where no infrastructure is available. This protocol can also be easily modified to support fair exchange of time-sensitive data. Compared with other traditional security protocols, automatic formal verification of fair non-repudiation protocols is much harder to achieve. The authors use meta-reasoning method to prove that the fair exchange property of this protocol can be reduced to three secrecy properties that fall into the scope of today's most automatic verification tools and therefore can be easily verified. The authors also use a recently proposed automatic method to verify the non-repudiation properties and fairness property of our protocol. - Author(s): D. Karakoyunlu ; F.K. Gurkaynak ; B. Sunar ; Y. Leblebici
- Source: IET Information Security, Volume 4, Issue 1, p. 30 –43
- DOI: 10.1049/iet-ifs.2009.0038
- Type: Article
- + Show details - Hide details
-
p.
30
–43
(14)
Elliptic curve cryptosystems (ECCs) are utilised as an alternative to traditional public-key cryptosystems, and are more suitable for resource-limited environments because of smaller parameter size. In this study, the authors carry out a thorough investigation of side-channel attack aware ECC implementations over finite fields of prime characteristic including the recently introduced Edwards formulation of elliptic curves. The Edwards formulation of elliptic curves is promising in performance with built-in resiliency against simple side-channel attacks. To our knowledge the authors present the first hardware implementation for the Edwards formulation of elliptic curves. The authors also propose a technique to apply non-adjacent form (NAF) scalar multiplication algorithm with side-channel security using the Edwards formulation. In addition, the authors implement Joye's highly regular add-always scalar multiplication algorithm both with the Weierstrass and Edwards formulation of elliptic curves. Our results show that the Edwards formulation allows increased area–time performance with projective coordinates. However, the Weierstrass formulation with affine coordinates results in the simplest architecture, and therefore has the best area–time performance as long as an efficient modular divider is available.
Real-time and MPEG-1 layer III compression resistant steganography in speech
Overlap-free Karatsuba–Ofman polynomial multiplication algorithms
Design and verification of a non-repudiation protocol based on receiver-side smart card
Efficient and side-channel-aware implementations of elliptic curve cryptosystems over prime fields
Most viewed content for this Journal
Article
content/journals/iet-ifs
Journal
5
Most cited content for this Journal
-
High accuracy android malware detection using ensemble learning
- Author(s): Suleiman Y. Yerima ; Sakir Sezer ; Igor Muttik
- Type: Article
-
Crypto-based algorithms for secured medical image transmission
- Author(s): Ali Al-Haj ; Gheith Abandah ; Noor Hussein
- Type: Article
-
Pseudorandom bit generator based on non-stationary logistic maps
- Author(s): Lingfeng Liu ; Suoxia Miao ; Hanping Hu ; Yashuang Deng
- Type: Article
-
Constructing important features from massive network traffic for lightweight intrusion detection
- Author(s): Wei Wang ; Yongzhong He ; Jiqiang Liu ; Sylvain Gombault
- Type: Article
-
Empirical analysis of Tor Hidden Services
- Author(s): Gareth Owen and Nick Savage
- Type: Article