International Journal of Network Security

Displaying 1-40 of 97 results

  • White Papers // Jan 2015

    Energy Characterization of a Security Module in ARM Processor

    In this paper, the authors show the results obtained during simulations that measured run-time and energy consumption of a SEcurity MOdule (SEMO) when it executes in ARM processor. For the simulations, they considered the impacts of four algorithms (i.e. RSA, SHA-1, random numbers generator and AES). They have used the...

    Provided By International Journal of Network Security

  • White Papers // Jul 2014

    Cryptanalysis of Tan's Improvement on a Password Authentication Scheme for Multi-server Environments

    Smart cards have been applied on password authentication in recent years. A user can input their identity and password to require services from the remote server. There are various attacks through an insecure network to obtain a user's information. Therefore, many schemes are proposed to guarantee secure communication. However, a...

    Provided By International Journal of Network Security

  • White Papers // Mar 2014

    "Notes on ""Polynomial - Based Key Management for Secure Intra - Group and Inter - Group Communication"""

    "In 2012, the researcher proposed a polynomial-based key management for secure intra-group and inter-group communication. In this notes, they point out that there are some security weaknesses of the researcher intra-group key distribution scheme. One main problem is that their scheme cannot prevent a group member to obtain other members'...

    Provided By International Journal of Network Security

  • White Papers // Nov 2013

    A Study of Attribute-based Proxy Re-encryption Scheme in Cloud Environments

    Attribute-Based Proxy Re-Encryption (ABPRE) scheme is one of the proxy cryptography, which can delegate the re-encryption capability to the proxy and re-encrypt the encrypted data by using the re-encryption key. ABPRE extending the traditional proxy cryptography and attributes plays an important role. In ABPRE, users are identified by attributes, and...

    Provided By International Journal of Network Security

  • White Papers // Nov 2013

    A Comparison of Security in Wireless Network Standards with a Focus on Bluetooth, WiFi and WiMAX

    As wireless networks are finally coming of age, people and organizations start to implement critical applications and infrastructures based on them. As most wireless net-work standards have been designed with security as an afterthought, severe security shortcomings were the results and several improvements and amendments were necessary to fix the...

    Provided By International Journal of Network Security

  • White Papers // Nov 2013

    A Robust and Efficient Timestamp-Based Remote User Authentication Scheme with Smart Card Lost Attack Resistance

    Password-based authentication scheme with smart card is an important part of security for accessing remote servers. In 2011, Awasthi et al. proposed an improved timestamp-based remote user authentication scheme to eliminate the attacks in Shen et al.'s. However, the authors find that their scheme is vulnerable to the privileged insider,...

    Provided By International Journal of Network Security

  • White Papers // Nov 2013

    Secure Requirement Prioritized Grid Scheduling Model

    Grid computing is a high performance computing environment to solve larger scale computational demands. Grid computing contains resource management, task scheduling, security problems, information management and so on. Task scheduling in an important aspect of distributed computing. As grid computing is a form of distributed computing with heterogeneous resources working...

    Provided By International Journal of Network Security

  • White Papers // Nov 2013

    A Secure and Energy E

    Data dissemination is important concept in Wireless Sensor Networks (WSN). In this paper, the authors propose a secure and energy efficient data dissemination protocol for WSN. A routing metric is defined to choose the best route from the available routes. These metric guides those routes to be chosen that consume...

    Provided By International Journal of Network Security

  • White Papers // Nov 2013

    Privacy Protection Data Access Control

    For some purposes, such as benefits, requirement-fitted services and management, enterprises regularly ask customers, employees, and business partner to provide relevance data including sensitive personal information. However, transparent information brings the infringement of privacy and threats of living security to the data providers. Recently, enterprises have suffered from the loss...

    Provided By International Journal of Network Security

  • White Papers // Oct 2013

    Analysis of the WSN MAC Protocols under Jamming DoS Attack

    Wireless Sensor Network (WSN) is a wireless network consisting of small nodes with sensing, computation, and wireless communications capabilities. The design of wireless sensor networks depends of many factors, such as transmission errors, network topology and power consumption. Many routing protocols, protocols for data transmission, are specifically designed for wireless...

    Provided By International Journal of Network Security

  • White Papers // Sep 2013

    Wireless Honeypot: Framework, Architectures and Tools

    Even though a spectrum of security solutions exists, the lack of knowledge about the exploitation methods used to compromise wireless networks is threatening the free and easy usage of wireless technologies in commercial world. Wireless Honeypot has come up as a recent solution to evaluate and assess the security in...

    Provided By International Journal of Network Security

  • White Papers // Sep 2013

    A Survey on Various Cyber Attacks and Their Classification

    The role of computers and the Internet in modern society is well recognized. Recent developments in the fields of networking and cyberspace have greatly benefited mankind, but the rapid growth of cyberspace has also contributed to unethical practices by individuals who are bent on using the technology to exploit others....

    Provided By International Journal of Network Security

  • White Papers // Sep 2013

    Security Analysis of a Dynamic ID-Based Authentication Scheme for Multi-Server Environment Using Smart Cards

    As one of the simplest and the most convenient mechanism to ensure secure communication in open networks, user authentication scheme has been studied widely. To guarantee secure communications in multi-server environment, Lee et al. proposed a dynamic ID-based remote user authentication scheme using smart card. They also demonstrated that their...

    Provided By International Journal of Network Security

  • White Papers // Sep 2013

    ID-Based Deniable Authentication Protocol Based on Diffie-Hellman Problem on Elliptic Curve

    Now-a-days, authentication had emerged to be an essential communication process in key establishment. Deniable authentication protocol enables a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. This property is very useful for providing secure negotiation...

    Provided By International Journal of Network Security

  • White Papers // Jul 2013

    Quickest Detection of Denial-of-Service Attacks in Cognitive Wireless Networks

    Many Denial-Of-Service (DOS) attacks in wireless networks, such as jamming, will cause significant performance degradation to the network and thus need to be detected quickly. This becomes more important in a cognitive wireless network employing Dynamic Spectrum Access (DSA), where it is easier for the attackers to launch DOS attacks....

    Provided By International Journal of Network Security

  • White Papers // Jul 2013

    The Impact of Resource Consumption Attack on Mobile Ad-Hoc Network Routing

    Mobile Ad Hoc NETwork (MANET) is a temporary network of mobile nodes where mobile nodes communicate with each other through wireless links with no fixed infrastructure and no centralized control. Each mobile node in such a scenario acts as both a router and host. Security is an important issue in...

    Provided By International Journal of Network Security

  • White Papers // Jul 2013

    A Survey on Attribute-Based Encryption Schemes of Access Control in Cloud Environments

    In Attribute-Based Encryption (ABE) scheme, attributes play a very important role. Attributes have been exploited to generate a public key for encrypting data and have been used as an access policy to control users' access. The access policy can be categorized as either key-policy or ciphertext-policy. The key-policy is the...

    Provided By International Journal of Network Security

  • White Papers // Jul 2013

    Security Flaw of an ECC-Based Signcryption Scheme with Anonymity

    Confidentiality, integrity, non-repudiation and authentication are the important requirements for many cryptographic applications. A traditional approach to achieve these requirements is to sign-then-encrypt the message. Signcryption, first proposed by the researchers, is a cryptographic primitive that performs digital signature and public key encryption simultaneously, at lower computational costs and communication...

    Provided By International Journal of Network Security

  • White Papers // Jun 2013

    On the Security of Moessner's and Khan's Authentication Scheme for Passive EPCglobal C1G2 RFID Tags

    RFID technology is one of the most promising automatic data collection technologies. It uses radio waves to identify object. Through automatic and real-time data acquisition, this technology can give a great benefit to various industries by improving the efficiency of their operations. Due to the increasing popularity of RFID applications,...

    Provided By International Journal of Network Security

  • White Papers // Jun 2013

    Lattice Ciphertext Policy Attribute-based Encryption in the Standard Model

    A lattice Ciphertext Policy Attribute Based Encryption (CP-ABE) scheme is presented, in which the ciphertext policy achieved is the AND-gates on multi-valued attributes. The previous construction with AND-gates on multi-valued attributes as ciphertext policy is based on bilinear paring technology. In this paper, inspired by the recent progress of lattice...

    Provided By International Journal of Network Security

  • White Papers // Jun 2013

    On the Security of a Secure Batch Verification with Group Testing for VANET

    Vehicular communication networking can provide well-suited traffic messages, emergency warning messages and infotainment dissemination, and improve driving condition for drivers. The authentication of these information is particularly important in VANET since the wrong traffic information may result in traffic accident and traffic jam. And VANET requires short verifying delay to...

    Provided By International Journal of Network Security

  • White Papers // Jun 2013

    Trust-based Multi-Path Routing for Enhancing Data Security in MANETs

    Mobile Ad hoc NETworks (MANETs) are comprised of highly mobile nodes that communicate with each other without relying on a pre-existing network infrastructure. Therefore they are ideally suited for use in rescue and emergency operations. Due to their applications in situations such as emergencies, crisis management, military and healthcare, message...

    Provided By International Journal of Network Security

  • White Papers // Jun 2013

    A Fault Based Attack on MDS-AES

    In this paper a fault based attack on MDS-AES has been proposed. It has been shown that inducing random byte fault at the input of the ninth round of the MDS-AES algorithm the key can be retrieved. Simulation shows that two faulty cipher text pairs are required to deduce the...

    Provided By International Journal of Network Security

  • White Papers // May 2013

    Comments on FHH Anonymous Multireceiver Encryption

    Anonymous multi-receiver identity-based encryption, which holds the security of confidentiality and anonymity, has many practical applications such as pay-TV, secure email delivery and copyright distribution and so on. Since Boneh and Franklin construct a practical identity-based encryption with bilinear pairing, several multi-receiver identity-based encryptions were proposed. Recently, in order to...

    Provided By International Journal of Network Security

  • White Papers // May 2013

    An Anonymous Multi-Receiver Encryption Based on RSA

    With the rapid development of information and network technologies, communication security has become an important issue in many applications. There are many public-key based encryption schemes proposed in the literature. Network applications are no longer just one-to-one type of communication; but it involves multiple receivers (>1) (e.g., multicast transmission). One-to-one...

    Provided By International Journal of Network Security

  • White Papers // May 2013

    An Access Control Mechanism Based on the Generalized Aryabhata Remainder Theorem

    In this paper, the authors propose a novel access control mechanism using the single-key-lock system and the Generalized Aryabhata Remainder Theorem (GART), in which each user is associated with a key and each digital file with a lock. Their mechanism possesses three unique features, a high efficiency of constructing the...

    Provided By International Journal of Network Security

  • White Papers // May 2013

    Provably Secure Conference Key Distribution Mechanism Preserving the Forward and Backward Secrecy

    Due to the explosive development of emerging applications such as, Multicast service, Pay-TV systems, Teleconference, and Collaborate tasks, engineers have proposed many conference key distribution mechanisms. Hwang et al. recently proposed an efficient group key exchange method for providing secure multicast communications, which is a transformation from the two-party key...

    Provided By International Journal of Network Security

  • White Papers // May 2013

    User Traffic Profile for Traffic Reduction and Effective Bot C&C Detection

    Bots are malicious software components used for generating Spams, launching denial of service attacks, phishing, identity theft and information exhfiltration and such other illegal activities. Bot detection is an area of active research in recent times. Here, the authors propose a bot detection mechanism for a single host. A user...

    Provided By International Journal of Network Security

  • White Papers // Mar 2013

    Cryptanalysis of NTRU with two Public Keys

    The NTRU public key cryptosystem is a ring-based cryptosystem that was first introduced in the rump session at Crypto'96. It is one of the fastest public-key cryptosystems, offering both encryption (NTRUencrypt) and digital signatures (NTRUSign). It is a relatively new cryptosystem that appears to be more efficient than the current...

    Provided By International Journal of Network Security

  • White Papers // Mar 2013

    A Steganographic Method Based on DCT and New Quantization Technique

    In this paper, an efficient data hiding technique based on the Discrete Cosine Transform (DCT) of image is proposed. In this technique, the DCT coefficient is quantized using a predefined mathematical operation then the secret bits are embedded in all frequency component of the quantized DCT coefficient using Least Significant-Bit...

    Provided By International Journal of Network Security

  • White Papers // Feb 2013

    Improved Fault Attack Against Eta Pairing

    In recent years, an increasing number of cryptographic protocols based on bilinear pairings have been developed. With the enhancement of implementation efficiency, the algorithms of pairings are usually embedded in identity aware devices such as smartcards. Although many fault attacks and countermeasures for public key and elliptic curve cryptographic systems...

    Provided By International Journal of Network Security

  • White Papers // Feb 2013

    Fault Attack Against Miller's Algorithm for Even Embedding Degree

    In recent years, an increasing number of cryptographic protocols based on bilinear pairings have been proposed. Pairing based cryptosystems are usually embedded in resource constrained devices such as FPGAs and smart cards. While side channel attacks have imposed serious threats to such cryptography applications. Miller's algorithm is a critical step...

    Provided By International Journal of Network Security

  • White Papers // Dec 2012

    Provably Secure Routing Protocol for Wireless Mesh Networks

    Ensuring security of an underlying routing protocol in Wireless Mesh Network (WMN) is a crucial issue because of the multi-hop communication environment and wireless media. This has been realized by various researchers, and several secure routing protocols have been proposed to ad-dress the security vulnerabilities. In this paper, the authors...

    Provided By International Journal of Network Security

  • White Papers // Dec 2012

    An Efficient MQV Key Agreement Scheme

    The researcher proposed the first key agreement protocol (MQV) that employs a signature to sign Diffe-Hellman public keys without using a one-way hash function. The IEEE Standard Committee adopted the MQV protocol as a standard. In order to establish multiple common secret keys between two parties, Harn and Lin proposed...

    Provided By International Journal of Network Security

  • White Papers // Nov 2012

    Secured Rfid Mutual Authentication Scheme for Mifare Systems

    This research study and analyze the various attacks RFID card on Mifare's disadvantage and safety concerns crux of the problem. The key recovery attack method depends on a plaintext-ciphertext pair on the existing relationship, as well as the secret parameters of the pseudo random number for use of the timing...

    Provided By International Journal of Network Security

  • White Papers // Nov 2012

    Malware Detection, Supportive Software Agents and Its Classification Schemes

    Over time, the task of curbing the emergence of malware and its dastard activities has been identified in terms of analysis, detection and containment of malware. Malware is a general term that is used to describe the category of malicious software that is part of security threats to the computer...

    Provided By International Journal of Network Security

  • White Papers // Nov 2012

    A Quantum Based Challenge-Response User Authentication Scheme Over Noiseless Channel

    In this paper, the authors propose a quantum user authentication protocol with a single photon based on short shared secret key and quantum bit error ratio verification. In this scheme, usage of proposed deterministic quantum key distribution technique and simple verification in a public channel culminate reduced photon transmission. Security's...

    Provided By International Journal of Network Security

  • White Papers // Nov 2012

    Modelling and Verification of Extensible Authentication Protocol Using SPIN Model Checker

    The Extensible Authentication Protocol (EAP) is a framework for transporting authentication credentials. EAP offers simpler interoperability and compatibility across authentication methods. EAP supports multiple authentication methods. In this paper, the authors have modeled the Extensible Authentication Protocol as a finite state machine. The various entities in their model are Authenticator,...

    Provided By International Journal of Network Security

  • White Papers // Nov 2012

    Secure Key Management Protocol in WIMAX

    The Worldwide Interoperability for Microwave Access (WIMAX /IEEE 802.16), is new technology based on wireless metropolitan area network. Security of connections access in WIMAX /IEEE 802.16 is complete with respect to the Privacy Key Management (PKM) protocol. The protocol is responsible for providing the secure distribution of keying data from...

    Provided By International Journal of Network Security

  • White Papers // Nov 2012

    A Novel Multipoint Relay Based Secure Routing in MANET

    Security in routing is a challenging issue in Mobile Ad-hoc (MANET) NETwork because of its open nature, infrastructure less property, mobility and energy constraints. Messages typically roam in multi-hopped fashion and nodes may be powered by limited energy source and with limited physical security. So, the authors proposed a new...

    Provided By International Journal of Network Security

  • White Papers // Sep 2011

    PGP Modification for Securing Digital Envelope Mail Using COM+ and Web Services

    Certified email is a value-added service for standard email systems, which guarantees the fairness, i.e., the intended recipient gets the mail content if and only if the mail originator receives a non-repudiation receipt showing that the message has been received by the recipient. Most of certified email protocols schemes have...

    Provided By International Journal of Network Security

  • White Papers // May 2010

    An Enhanced Remote User Authentication Scheme With Smart Card

    In 2000, Hwang and Li's proposed a new remote user authentication scheme with smart cards. Some researchers pointed out the security weaknesses of Hwang and Li's scheme and they also proposed some modified schemes to avoid these weaknesses. In 2004, the author proposed a new remote user authentication scheme and...

    Provided By International Journal of Network Security

  • White Papers // Jan 2012

    Improving Identity-Based Random Key Establishment Scheme for Large-Scale Hierarchical Wireless Sensor Networks

    In this paper, the authors propose a novel identity-based random key pre-distribution scheme called the Identity Based key pre-distribution using a Pseudo Random Function (IBPRF), which has better trade-off between communication overhead, network connectivity and resilience against node capture compared to the other existing key pre-distribution schemes. IBPRF always guarantees...

    Provided By International Journal of Network Security

  • White Papers // Jan 2012

    A Novel Secure Self Proxy Signature Scheme

    Recently, Kim et al.'s proposed a new type of proxy signature scheme, called self proxy signature scheme. In their scheme, a signer, delegates his/her signing capability to himself/herself and uses the proxy private/public key pair as temporary keys. In this paper, the authors will demonstrate some security leaks inherent in...

    Provided By International Journal of Network Security

  • White Papers // Jan 2012

    A New Non Linear Model Based Encryption Mechanism With Time Stamp and Acknowledgement Support

    In this paper, a non linear model is going to be used which develops data distributed over an Identified Value which is used as nonce (IV). Thus by properly considering a combination of key values which are non linear in nature, data is derived from the developed model. This set...

    Provided By International Journal of Network Security

  • White Papers // Jan 2012

    Provably Secure and Efficient Identity-Based Signature Scheme Based on Cubic Residues

    Many Identity Based Signature (IBS) schemes have been proposed so far. However, most of the schemes are based on bilinear pairings. Only a few IBS schemes are without pairings. Up to now, there still remains a challenge to construct a provably secure and efficient IBS scheme without pairings. In this...

    Provided By International Journal of Network Security

  • White Papers // Jan 2012

    An Improved and Secure Smart Card Based Dynamic Identity Authentication Protocol

    Password is the most commonly used authentication technique in smart card based authentication protocols. During communication, the static identity based authentication protocols leaks out the user's authentication messages corresponding to static identity to the attacker. Therefore, the attacker can trace and identify the different requests belonging to the same user....

    Provided By International Journal of Network Security

  • White Papers // Nov 2011

    An Improved Efficient Remote Password Authentication Scheme With Smart Card Over Insecure Networks

    In 2006, Liao et al. proposed a scheme over insecure networks. In 2006, Yoon-Yoo, and in 2008, Xiang et al. analyzed Liao et al.'s scheme and both of them pointed out, more or less, same vulnerabilities: like offline password guessing attack, impersonating the server by replay at-tack, denial of service...

    Provided By International Journal of Network Security

  • White Papers // Jul 2010

    Simplified IPSec Protocol Stack for Micro Server

    In this paper, the authors propose a simple IPSec protocol stack for micro server. The authors proposed an implementation of IPSec protocol stack which is constructed by Encapsulating Security Payload (ESP) protocol with Advanced Encryption Security (AES) encryption scheme, whereas authentication using MD5 algorithm is optional. Researchers have focused on...

    Provided By International Journal of Network Security

  • White Papers // Jul 2014

    Cryptanalysis of Tan's Improvement on a Password Authentication Scheme for Multi-server Environments

    Smart cards have been applied on password authentication in recent years. A user can input their identity and password to require services from the remote server. There are various attacks through an insecure network to obtain a user's information. Therefore, many schemes are proposed to guarantee secure communication. However, a...

    Provided By International Journal of Network Security

  • White Papers // Jun 2013

    Trust-based Multi-Path Routing for Enhancing Data Security in MANETs

    Mobile Ad hoc NETworks (MANETs) are comprised of highly mobile nodes that communicate with each other without relying on a pre-existing network infrastructure. Therefore they are ideally suited for use in rescue and emergency operations. Due to their applications in situations such as emergencies, crisis management, military and healthcare, message...

    Provided By International Journal of Network Security

  • White Papers // Jul 2009

    A New Involutory MDS Matrix for the AES

    This paper proposes a new, large diffusion layer for the AES block cipher. This new layer replaces the ShiftRows and MixColumns operations by a new involutory matrix in every round. The objective is to provide complete diffusion in a single round, thus sharply improving the overall cipher security. Moreover, the...

    Provided By International Journal of Network Security

  • White Papers // Mar 2013

    A Steganographic Method Based on DCT and New Quantization Technique

    In this paper, an efficient data hiding technique based on the Discrete Cosine Transform (DCT) of image is proposed. In this technique, the DCT coefficient is quantized using a predefined mathematical operation then the secret bits are embedded in all frequency component of the quantized DCT coefficient using Least Significant-Bit...

    Provided By International Journal of Network Security

  • White Papers // Sep 2009

    Acceleration of the Elliptic Cryptography with Vector Finite Fields

    The most computationally efficient Digital Signature (DS) algorithms are based on Elliptic Curves (ECs) over finite fields. The well known DS standards ECDSA and GOST R 34.10 specify EC-based algorithms over the ground fields GF(p). However in many cases of the practical use of DS algorithms there are required the...

    Provided By International Journal of Network Security

  • White Papers // Sep 2009

    An Adaptive Chosen-Plaintext Attack of the Improved Cellular Message Encryption Algorithm

    In this paper, the authors analyzes the improved Cellular Message En-cryption Algorithm (CMEA-I) which is an improved version of the Telecommunication Industry Association's Cellular Message Encryption Algorithm (CMEA). They present a chosen-plaintext attack of CMEA-I which requires less than 850 plaintexts in its adaptive version. This demonstrates that the improvements...

    Provided By International Journal of Network Security

  • White Papers // Nov 2009

    Knapsack Based ECC Encryption and Decryption

    Elliptic Curve Cryptography provides a secure means of exchanging keys among communicating hosts using the Diffie Hellman Key Exchange algorithm. Encryption and Decryption of texts and messages have also been attempted. This paper presents the implementation of ECC by first transforming the message into an affine point on the EC,...

    Provided By International Journal of Network Security

  • White Papers // Nov 2009

    A Proxy Blind Signature Scheme Over Braid Groups

    Proxy signatures, Introduced by Mambo, Usuda and Okamoto, allow a designated person called proxy signer, to sign on behalf of an original signer. According to the delegation type, the proxy signatures are classified as full delegation, partial delegation and delegation by warrant. The proxy signature plays an important role in...

    Provided By International Journal of Network Security

  • White Papers // May 2013

    Comments on FHH Anonymous Multireceiver Encryption

    Anonymous multi-receiver identity-based encryption, which holds the security of confidentiality and anonymity, has many practical applications such as pay-TV, secure email delivery and copyright distribution and so on. Since Boneh and Franklin construct a practical identity-based encryption with bilinear pairing, several multi-receiver identity-based encryptions were proposed. Recently, in order to...

    Provided By International Journal of Network Security

  • White Papers // Jun 2013

    On the Security of a Secure Batch Verification with Group Testing for VANET

    Vehicular communication networking can provide well-suited traffic messages, emergency warning messages and infotainment dissemination, and improve driving condition for drivers. The authentication of these information is particularly important in VANET since the wrong traffic information may result in traffic accident and traffic jam. And VANET requires short verifying delay to...

    Provided By International Journal of Network Security

  • White Papers // Jan 2009

    On Post Decryption Error Probability in Counter Mode Operation with Explicit Counter Transmittal

    Communications channels are prone to errors due to various physical impairments. Although application of error correcting codes overcomes or reduces the impact of these errors, residual errors can pass through undetected in some cases. These residual errors can in turn have significant impact on the transmitted data if it is...

    Provided By International Journal of Network Security

  • White Papers // Jan 2009

    A New Secure Multicast Key Distribution Protocol Using Combinatorial Boolean Approach

    In this paper, the authors propose a new protocol for a scalable multicast key distribution protocol. The proposed protocol is based on Key Management using Boolean Function Minimization (KM-BFM) technique. It is considered one of the best solutions proposed for solving the scalability of multicast security protocols depending on a...

    Provided By International Journal of Network Security

  • White Papers // Jan 2009

    Short Signatures from Difficulty of Factorization Problem

    Public key cryptosystems based on hard mathematical problems are well approved for information authentication with digital signatures. An important practical problem is developing Digital Signature Schemes (DSSes) with short signature length. In general the minimum signature length provided by a DSS depends on the required security level that can be...

    Provided By International Journal of Network Security

  • White Papers // Jan 2009

    Ordered Semiring-Based Trust Establish Model with Risk Evaluating

    Distributed trust management supports the provision of the required levels in a flexible and scalable manner by locally discriminating between the entities with which a principal should interact. However, there is a tension between the preservation of privacy and the controlled release of information when an entity submits credentials for...

    Provided By International Journal of Network Security

  • White Papers // Jan 2009

    The New Block Cipher: BC2

    In this paper, the authors propose a new block cipher called BC2 (Block Cipher 2). They make a cipher using components that are believed secure. The structure of BC2 is very simple. They use Feistel network with input-output 128 bits, matrix Maximum Distance Separable (MDS) 8x8 with branch number 9...

    Provided By International Journal of Network Security

  • White Papers // Oct 2013

    Analysis of the WSN MAC Protocols under Jamming DoS Attack

    Wireless Sensor Network (WSN) is a wireless network consisting of small nodes with sensing, computation, and wireless communications capabilities. The design of wireless sensor networks depends of many factors, such as transmission errors, network topology and power consumption. Many routing protocols, protocols for data transmission, are specifically designed for wireless...

    Provided By International Journal of Network Security

  • White Papers // Jul 2013

    The Impact of Resource Consumption Attack on Mobile Ad-Hoc Network Routing

    Mobile Ad Hoc NETwork (MANET) is a temporary network of mobile nodes where mobile nodes communicate with each other through wireless links with no fixed infrastructure and no centralized control. Each mobile node in such a scenario acts as both a router and host. Security is an important issue in...

    Provided By International Journal of Network Security

  • White Papers // Jul 2013

    Quickest Detection of Denial-of-Service Attacks in Cognitive Wireless Networks

    Many Denial-Of-Service (DOS) attacks in wireless networks, such as jamming, will cause significant performance degradation to the network and thus need to be detected quickly. This becomes more important in a cognitive wireless network employing Dynamic Spectrum Access (DSA), where it is easier for the attackers to launch DOS attacks....

    Provided By International Journal of Network Security

  • White Papers // Jun 2013

    Lattice Ciphertext Policy Attribute-based Encryption in the Standard Model

    A lattice Ciphertext Policy Attribute Based Encryption (CP-ABE) scheme is presented, in which the ciphertext policy achieved is the AND-gates on multi-valued attributes. The previous construction with AND-gates on multi-valued attributes as ciphertext policy is based on bilinear paring technology. In this paper, inspired by the recent progress of lattice...

    Provided By International Journal of Network Security

  • White Papers // Jun 2013

    On the Security of Moessner's and Khan's Authentication Scheme for Passive EPCglobal C1G2 RFID Tags

    RFID technology is one of the most promising automatic data collection technologies. It uses radio waves to identify object. Through automatic and real-time data acquisition, this technology can give a great benefit to various industries by improving the efficiency of their operations. Due to the increasing popularity of RFID applications,...

    Provided By International Journal of Network Security

  • White Papers // Jul 2009

    On the Order of Round Components in the AES

    In this paper, the authors analyses all 24 possible round constructions using different combinations of the four round components of the AES cipher: SubBytes, ShiftRows, AddRoundKey and MixColumns. They investigate how the different round orderings affect the security of AES against differential, linear, multiset, impossible differential and boomerang attacks. The...

    Provided By International Journal of Network Security

  • White Papers // Jul 2008

    Parallel Hardware Architectures for the Cryptographic Tate Pairing

    Pairings play an important role in Identity-Based Encryption (IBE). Such form of cryptography was introduced by Shamir where a public key is derived from public identifiable information such as an e-mail address, and the corresponding private key is created by binding the user identity with a trusted authority's secret key....

    Provided By International Journal of Network Security

  • White Papers // Jul 2008

    Refuting the Security Claims of Mathuria and Jain (2005) Key Agreement Protocols

    Despite key establishment protocols being the sine qua non of many diverse secure electronic commerce applications, the design of secure key establishment protocols is still notoriously hard. The difficulties associated in obtaining a high level of assurance in the security of almost any new or even existing protocols are well...

    Provided By International Journal of Network Security

  • White Papers // Jul 2008

    Improving Security Through Analysis of Log Files Intersections

    In today's business environment almost all companies have their computers connected to the public Internet. As the number of companies with computers and services accessible to the Internet increases, a corresponding increase in the number of attacks against these businesses is also observed. Network-based attacks on business computers have been...

    Provided By International Journal of Network Security

  • White Papers // Jul 2012

    Efficient and Secured Ant Routing Algorithm for Wireless Sensor Networks

    Ant colony based routing algorithms addresses the adaptation of the collective behaviors observed in natural ant colonies for routing in wireless sensor network WSNs, ant swarms usually collectively achieve adaptive, scalable, and robust optimized paths between the net and the source of food with little intelligence and capacities at each...

    Provided By International Journal of Network Security

  • White Papers // May 2013

    An Anonymous Multi-Receiver Encryption Based on RSA

    With the rapid development of information and network technologies, communication security has become an important issue in many applications. There are many public-key based encryption schemes proposed in the literature. Network applications are no longer just one-to-one type of communication; but it involves multiple receivers (>1) (e.g., multicast transmission). One-to-one...

    Provided By International Journal of Network Security

  • White Papers // Jan 2012

    On the Design of RNS Bases for Modular Multiplication

    Modular multiplication is the main and basic operation in public key cryptography algorithms like Elliptic Curve Cryptography (ECC). By using Residue Number System (RNS) in these algorithms, large number computation is replaced by computation over the small moduli without carry propagation between moduli. Moduli selection has an important role in...

    Provided By International Journal of Network Security

  • White Papers // Feb 2013

    Fault Attack Against Miller's Algorithm for Even Embedding Degree

    In recent years, an increasing number of cryptographic protocols based on bilinear pairings have been proposed. Pairing based cryptosystems are usually embedded in resource constrained devices such as FPGAs and smart cards. While side channel attacks have imposed serious threats to such cryptography applications. Miller's algorithm is a critical step...

    Provided By International Journal of Network Security

  • White Papers // Dec 2012

    An Efficient MQV Key Agreement Scheme

    The researcher proposed the first key agreement protocol (MQV) that employs a signature to sign Diffe-Hellman public keys without using a one-way hash function. The IEEE Standard Committee adopted the MQV protocol as a standard. In order to establish multiple common secret keys between two parties, Harn and Lin proposed...

    Provided By International Journal of Network Security

  • White Papers // May 2013

    An Access Control Mechanism Based on the Generalized Aryabhata Remainder Theorem

    In this paper, the authors propose a novel access control mechanism using the single-key-lock system and the Generalized Aryabhata Remainder Theorem (GART), in which each user is associated with a key and each digital file with a lock. Their mechanism possesses three unique features, a high efficiency of constructing the...

    Provided By International Journal of Network Security

  • White Papers // Feb 2012

    One-Pass Key Establishment Model and Protocols for Wireless Roaming with User Anonymity

    Key Establishment for Wireless Roaming (KE-WR) is expected to ensure a mobile user to establish a fresh session key with a foreign WSP and also roam from one foreign network domain to another while enjoying the roaming services. However, so far there is no ID-based KE-WR protocol proposed in the...

    Provided By International Journal of Network Security