IET Information Security
Volume 8, Issue 6, November 2014
Volumes & issues:
Volume 8, Issue 6
November 2014
Cryptanalysis of the Dragonfly key exchange protocol
- Author(s): Dylan Clarke and Feng Hao
- Source: IET Information Security, Volume 8, Issue 6, p. 283 –289
- DOI: 10.1049/iet-ifs.2013.0081
- Type: Article
- + Show details - Hide details
-
p.
283
–289
(7)
Dragonfly is a password authenticated key exchange protocol that has been submitted to the Internet engineering task force as a candidate standard for general internet use. The authors analysed the security of this protocol and devised an attack that is capable of extracting both the session key and password from an honest party. This attack was then implemented and experiments were performed to determine the time-scale required to successfully complete the attack.
Group-based key array authentication protocol in radio frequency identification systems
- Author(s): Yi Jiang ; Wei Cheng ; Xiaojiang Du
- Source: IET Information Security, Volume 8, Issue 6, p. 290 –296
- DOI: 10.1049/iet-ifs.2012.0241
- Type: Article
- + Show details - Hide details
-
p.
290
–296
(7)
For the purposes of information security and privacy between readers and tags, identity authentication is a significant issue for radio frequency identification (RFID) systems. In this study, the authors propose a novel security group-based key array authentication protocol, which is suitable for a large scale RFID environment. Based on a key array, this protocol can generate an authentication key for each pair of reader and tag with lower storage. Adding an identifier update phase, they design the authentication process passing the formal analysis from GNY. The security and performance analysis results show that the protocol they present can achieve better security than previous protocols in resisting external and internal attacks, with lower storage and acceptable communication and computation load.
Families of rotation symmetric functions with useful cryptographic properties
- Author(s): Guangpu Gao ; Thomas W. Cusick ; Wenfen Liu
- Source: IET Information Security, Volume 8, Issue 6, p. 297 –302
- DOI: 10.1049/iet-ifs.2013.0241
- Type: Article
- + Show details - Hide details
-
p.
297
–302
(6)
It is known that the set of rotation symmetric Boolean functions has many functions with various useful properties for cryptography. This study shows how to construct some families of rotation symmetric functions which are balanced or plateaued. The authors also consider vectorial Boolean functions [that is, maps from GF (2) n to GF (2) m ] which are k-rotation symmetric and they give two infinite families of such functions which are permutations with the maximum possible algebraic degree. The families of functions that they give provide a source, which can be searched for functions with other useful cryptographic properties.
Comments on ‘Fair (t, n) threshold secret sharing scheme’
- Author(s): Lein Harn
- Source: IET Information Security, Volume 8, Issue 6, p. 303 –304
- DOI: 10.1049/iet-ifs.2013.0302
- Type: Article
- + Show details - Hide details
-
p.
303
–304
(2)
Tian et al. have proposed a fair (t, n) threshold secret sharing scheme recently. Three attacks have been introduced and analysed in this study. Among them, two attacks are associated with a synchronous network where the shares are released simultaneously, and one attack is associated with an asynchronous network where the shares are released asynchronously. In this study, the authors want to point out that the scheme only works properly in a synchronous network; but not in an asynchronous network. In other words, Theorem 3 in their paper which was associated with the attack in an asynchronous network is incorrect.
Most viewed content
Most cited content for this Journal
-
High accuracy android malware detection using ensemble learning
- Author(s): Suleiman Y. Yerima ; Sakir Sezer ; Igor Muttik
- Type: Article
-
Crypto-based algorithms for secured medical image transmission
- Author(s): Ali Al-Haj ; Gheith Abandah ; Noor Hussein
- Type: Article
-
Pseudorandom bit generator based on non-stationary logistic maps
- Author(s): Lingfeng Liu ; Suoxia Miao ; Hanping Hu ; Yashuang Deng
- Type: Article
-
Constructing important features from massive network traffic for lightweight intrusion detection
- Author(s): Wei Wang ; Yongzhong He ; Jiqiang Liu ; Sylvain Gombault
- Type: Article
-
Empirical analysis of Tor Hidden Services
- Author(s): Gareth Owen and Nick Savage
- Type: Article