University of Luton

Displaying 1-36 of 36 results

  • White Papers // Dec 2013

    Automatic Search for Differential Trails in ARX Ciphers

    The authors propose a tool for automatic search for differential trails in ARX ciphers. By introducing the concept of a partial Difference Distribution Table (pDDT) they extend Matsui's algorithm, originally proposed for DES-like ciphers, to the class of ARX ciphers. To the best of their knowledge this is the first...

    Provided By University of Luton

  • White Papers // Oct 2013

    Trapdoor Privacy in Asymmetric Searchable Encryption Schemes

    Asymmetric searchable encryption allows searches to be carried over cipher-texts, through delegation, and by means of trapdoors issued by the owner of the data. Public key Encryption with Keyword Search (PEKS) is a primitive with such functionality that provides delegation of exact-match searches. As it is important that cipher-texts preserve...

    Provided By University of Luton

  • White Papers // Sep 2013

    A Holistic Model for Resource Representation in Virtualized Cloud Computing Data Centers

    Management and optimization of cloud infrastructures combine multiple challenges. The optimization of data centers targets such objectives as performance, reliability, energy consumption, and security. To achieve these goals, multiple actions can be taken, for example, task and virtual machine allocation or infrastructure management. In this paper the authors propose a...

    Provided By University of Luton

  • White Papers // Jul 2013

    ASMATRA: Ranking ASs Providing Transit Service to Malware Hosters

    The Internet has grown into an enormous network offering a variety of services, which are spread over a multitude of domains. BGP-routing and Autonomous Systems (AS) are the key components for maintaining high connectivity in the Internet. Unfortunately, Internet Service Providers (ISPs) operating ASs do not only host normal users...

    Provided By University of Luton

  • White Papers // Jun 2013

    The Local Attack: Cryptanalysis of the Authenticated Encryption Scheme ALE

    Cryptanalysis and design of authenticated encryption primitives are getting renewed interest, not least because of the CEASAR initiative. Recently, at DIAC 2012 and FSE 2013, a proposal named ALE was presented by researcher. ALE provides online single-pass encryption and authentication functionality with optional processing of associated data in a single...

    Provided By University of Luton

  • White Papers // May 2013

    ADTool: Security Analysis with Attack-Defense Trees

    Graphical security models provide an intuitive but systematic methodology to visualize possible attacks and countermeasures and to enable the computation of various security related parameters. The ADTool is free, open source software assisting graphical modeling and quantitative analysis of security, using attack-defense trees. The main features of the ADTool are...

    Provided By University of Luton

  • White Papers // May 2013

    DANAK: Finding the Odd!

    One kind of available information on network borders are Netflow records, which can be exported by mostly all routers today, but storing and analyzing these large quantities instantly is a problem. A question that arises is, if it is really necessary to evaluate all records or if abstractions of records...

    Provided By University of Luton

  • White Papers // May 2013

    Semantic Exploration of DNS

    The DNS structure discloses useful information about the organization and the operation of an enterprise network, which can be used for designing attacks as well as monitoring domains supporting malicious activities. Thus, this paper introduces a new method for exploring the DNS domains. Although the authors' previous work described a...

    Provided By University of Luton

  • White Papers // Mar 2013

    Design and Formal Analysis of a Group Signature Based Electronic Toll Pricing System

    Location-based vehicle services have been enduring a rapid growth with the prevalence of GNSS technologies, nowadays freely available for everyone. Given the nature of location data, privacy is of prime importance in services such as Electronic Tolling Pricing (ETP) and pay-as-you-drive. In this paper, the authors first propose a new...

    Provided By University of Luton

  • White Papers // Mar 2013

    Key Wrapping with a Fixed Permutation

    The authors present an efficient key wrapping scheme that uses a single wide permutation and does not rely on block ciphers. The scheme is capable of wrapping keys up to 1400 bits long and processing arbitrarily long headers. Their scheme easily delivers the security level of 128 bits or higher...

    Provided By University of Luton

  • White Papers // Nov 2012

    Bypassing the Combinatorial Explosion: Using Similarity to Generate and Prioritize T-Wise Test Suites for Large Software Product Lines

    Software Product Lines (SPLs) are families of products whose commonalities and variability can be captured by Feature Models (FMs). T-wise testing aims at finding errors triggered by all interactions amongst t features, thus reducing drastically the number of products to test. T-wise testing approaches for SPLs are limited to small...

    Provided By University of Luton

  • White Papers // Nov 2012

    Improving Highway Traffic Through Partial Velocity Synchronization

    In this paper, the authors address the problem of uncoordinated highway traffic. They first identify the main causes of the capacity drop, namely high traffic demand and inadequate driver reaction. In the past, traffic and user behavior have been accurately described by Cellular Automata (CA) models. In this paper, they...

    Provided By University of Luton

  • White Papers // Nov 2012

    XSS-FP: Browser Fingerprinting Using HTML Parser Quirks

    There are many scenarios in which inferring the type of a client browser is desirable, for instance to fight against session stealing. This is known as browser fingerprinting. This paper presents and evaluates a novel fingerprinting technique to determine the exact nature (browser type and version, e.g. Firefox 15) of...

    Provided By University of Luton

  • White Papers // Nov 2012

    Search in Encrypted Data: Theoretical Models and Practical Applications

    Recently, the concept of Search in Encrypted Data (SED) has become a highlight in cryptography. A SED scheme enables a client to have third-party server(s) to perform certain search functionalities on his encrypted data. In this paper, the authors aim at conducting a systematic study on SED schemes. They describe...

    Provided By University of Luton

  • White Papers // Nov 2012

    Refine the Concept of Public Key Encryption with Delegated Search

    The authors revisit the concept of Public Key Encryption with Delegated keyword Search (PKEDS), a concept proposed by Ibraimi et al. A PKEDS scheme allows a receiver to authorize third-party server(s) to search in two ways: either according to a message chosen by the server itself or according to a...

    Provided By University of Luton

  • White Papers // Nov 2012

    Proactive Discovery of Phishing Related Domain Names

    Phishing is an important security issue to the Internet, which has a significant economic impact. The main solution to counteract this threat is currently reactive blacklisting; however, as phishing attacks are mainly performed over short periods of time, reactive methods are too slow. As a result, new approaches to early...

    Provided By University of Luton

  • White Papers // Jul 2012

    TorScan: Tracing Long-lived Connections and Differential Scanning Attacks

    Tor is a widely used anonymity network providing low-latency communication capabilities. Around 400,000 users per day use Tor to route TCP traffic through a sequence of relays; three hops are selected from a pool of currently almost 3000 volunteer-operated Tor relays to comprise a route through the network for a...

    Provided By University of Luton

  • White Papers // Jul 2012

    Semantic Based DNS Forensics

    In network level forensics, Domain Name Service (DNS) is a rich source of information. This paper describes a new approach to mine DNS data for forensic purposes. The authors propose a new technique that leverages semantic and natural language processing tools in order to analyze large volumes of DNS data....

    Provided By University of Luton

  • White Papers // Jul 2012

    Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks

    Published attacks against Smartphones have concentrated on software running on the application processor. With numerous countermeasures like ASLR, DEP and code signing being deployed by operating system vendors, practical exploitation of memory corruptions on this processor has become a time-consuming endeavor. At the same time, the cellular baseband stack of...

    Provided By University of Luton

  • White Papers // May 2012

    On the Optimality of Beamformer Design for Zero-Forcing DPC With QR Decomposition

    The authors consider the beamformer design for Zero-Forcing Dirty Paper Coding (ZF-DPC), a suboptimal transmission technique for MISO Broadcast Channels (MISO BCs). Beamformers for ZF-DPC are designed to maximize a performance measure, subject to some power constraints and zero-interference constraints. For the sum rate maximization problem under a total power...

    Provided By University of Luton

  • White Papers // May 2012

    Traffic-Aware Time-Critical Scheduling in Heavily Duty-Cycled IEEE 802.15.4e for an Industrial IoT

    In the last few years, the new requirements of the emerging Internet of Thing (IoT) applications could not be satisfied anymore by the traditional IEEE 802.15.4. Thus, they entail the need for additional MAC layer options, enabling channel hopping, sampled listening and able to improve power consumption, resilience to inference,...

    Provided By University of Luton

  • White Papers // Apr 2012

    Standardized Protocol Stack for The Internet of (Important) Things

    The authors have witnessed the fixed internet emerging with virtually every computer being connected today; they are currently witnessing the emergence of the mobile internet with the exponential explosion of smart phones, tablets and net-books. However, both will be dwarfed by the anticipated emergence of the Internet of Things (IoT),...

    Provided By University of Luton

  • White Papers // Nov 2011

    Business Process Regulatory Compliance Management Solution Frameworks: A Comparative Evaluation

    Regulatory Compliance Management (RCM) is a problem gaining wide interest in the Business Process Management (BPM) community. However, research has not yet provided a non-ambiguous and agreed upon definition of RCM, and it is hard for newcomers to this field of research to get a clear overview of available results....

    Provided By University of Luton

  • White Papers // Jun 2011

    CoReL: Policy-Based and Model-Driven Regulatory Compliance Management

    Regulatory compliance management is now widely recognized as one of the main challenges still to be efficiently dealt with in information systems. In the discipline of Business Process Management in particular, compliance is considered as an important driver of the efficiency, reliability and market value of companies. It consists of...

    Provided By University of Luton

  • White Papers // Mar 2011

    Free Probability Based Capacity Calculation of Multiantenna Gaussian Fading Channels With Cochannel Interference

    During the last decade, it has been well understood that communication over multiple antennas can increase linearly the multiplexing capacity gain and provide large spectral efficiency improvements. However, the majority of studies in this area were carried out ignoring co-channel interference. Only a small number of investigations have considered co-channel...

    Provided By University of Luton

  • White Papers // Jan 2011

    Search for Related-key Differential Characteristics in DES-like ciphers

    The authors present the first automatic search algorithms for the best related-key differential characteristics in DES-like ciphers. They show that instead of brute-forcing the space of all possible differences in the master key and the plaintext, it is computationally more efficient to try only a reduced set of input-output differences...

    Provided By University of Luton

  • White Papers // Oct 2010

    Towards a Model for Security and Privacy in the Internet of Things

    The authors propose and give a high-level, work-in-progress description of a model which will allow them to reason about security and privacy of communication protocols in the Internet of Things and identify the next steps necessary towards a complete formal model. The model is built up from a few basic...

    Provided By University of Luton

  • White Papers // Mar 2010

    Rotational Cryptanalysis of ARX

    In this paper the authors analyze the security of systems based on modular Additions, Rotations, and XORs (ARX systems). They provide both theoretical support for their security and practical cryptanalysis of real ARX primitives. They use a technique called rotational cryptanalysis that is universal for the ARX systems and is...

    Provided By University of Luton

  • White Papers // Mar 2010

    Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others

    While differential behavior of modern ciphers in a single secret key scenario is relatively well understood, and simple techniques for computation of security lower bounds are readily available, the security of modern block ciphers against related-key attacks is still very ad hoc. In this paper the authors make a first...

    Provided By University of Luton

  • White Papers // Jan 2010

    A Gentle Transition From Java Programming to Web Services Using XML-RPC

    By selecting out key concepts and fundamental skills such as RPC's and by providing just enough industrial context, it is possible to marry vocational content with conceptual development, whilst also motivating students by relating key skills and concepts to the real world they see around them. The paper presented here...

    Provided By University of Luton

  • White Papers // Dec 2009

    A Domain Extender for the Ideal Cipher

    The authors describe the first domain extender for ideal ciphers, i.e. they show a construction that is indifferentiable from a 2n-bit ideal cipher, given a n-bit ideal cipher. Their construction is based on a 3-round Feistel, and is more efficient than first building a n-bit random oracle from a n-bit...

    Provided By University of Luton

  • White Papers // Oct 2009

    A Game Theoretic Approach to Multi-User Spectrum Allocation

    The authors consider the interaction of several transmit-receive pairs coexisting in the same area and communicating using the same portion of the spectrum. Using a game theoretic framework, each pair is regarded as a player whose payoff function is the individual link rate and power is allocated using the iterative...

    Provided By University of Luton

  • White Papers // Sep 2009

    PSS is Secure Against Random Fault Attacks

    A fault attack consists in inducing hardware malfunctions in order to recover secrets from electronic devices. One of the most famous fault attack is Bellcore's attack against RSA with CRT; it consists in inducing a fault modulo p but not modulo q at signature generation step; then by taking a...

    Provided By University of Luton

  • White Papers // Jun 2009

    Differential Fault Analysis on DES Middle Rounds

    Differential Fault Analysis (DFA) is a powerful cryptanalytic technique that disturbs cryptographic computations and exploits erroneous results to infer secret keys. Over the last decade, many works have described and improved DFA techniques against block ciphers thus showing an inherent need to protect their implementations. A simple and widely used...

    Provided By University of Luton

  • White Papers // May 2008

    Attack and Improvement of a Secure S-box Calculation Based on the Fourier Transform

    At CHES 2006, a Differential Power Analysis (DPA) countermeasure based on the Fourier transform was published. This generic countermeasure aims at protecting from DPA any S-box calculation used in symmetric cryptosystems implementations. In this paper, the authors show that this countermeasure has a aw and that it can be broken...

    Provided By University of Luton

  • White Papers // May 2008

    The Importance of Location on Trust in Mobile Networks

    Mobile wireless networks introduce new challenges regarding security and privacy of data. On the other hand, self-organization and independence of fixed infrastructure make these networks, such as Mobile Adhoc NETworks (MANETs) very attractive for military but also civilian application areas. They allows to extend the wireless link into areas with...

    Provided By University of Luton

  • White Papers // May 2012

    Traffic-Aware Time-Critical Scheduling in Heavily Duty-Cycled IEEE 802.15.4e for an Industrial IoT

    In the last few years, the new requirements of the emerging Internet of Thing (IoT) applications could not be satisfied anymore by the traditional IEEE 802.15.4. Thus, they entail the need for additional MAC layer options, enabling channel hopping, sampled listening and able to improve power consumption, resilience to inference,...

    Provided By University of Luton

  • White Papers // Nov 2012

    Bypassing the Combinatorial Explosion: Using Similarity to Generate and Prioritize T-Wise Test Suites for Large Software Product Lines

    Software Product Lines (SPLs) are families of products whose commonalities and variability can be captured by Feature Models (FMs). T-wise testing aims at finding errors triggered by all interactions amongst t features, thus reducing drastically the number of products to test. T-wise testing approaches for SPLs are limited to small...

    Provided By University of Luton

  • White Papers // Nov 2012

    Refine the Concept of Public Key Encryption with Delegated Search

    The authors revisit the concept of Public Key Encryption with Delegated keyword Search (PKEDS), a concept proposed by Ibraimi et al. A PKEDS scheme allows a receiver to authorize third-party server(s) to search in two ways: either according to a message chosen by the server itself or according to a...

    Provided By University of Luton

  • White Papers // Nov 2012

    Search in Encrypted Data: Theoretical Models and Practical Applications

    Recently, the concept of Search in Encrypted Data (SED) has become a highlight in cryptography. A SED scheme enables a client to have third-party server(s) to perform certain search functionalities on his encrypted data. In this paper, the authors aim at conducting a systematic study on SED schemes. They describe...

    Provided By University of Luton

  • White Papers // Jul 2012

    TorScan: Tracing Long-lived Connections and Differential Scanning Attacks

    Tor is a widely used anonymity network providing low-latency communication capabilities. Around 400,000 users per day use Tor to route TCP traffic through a sequence of relays; three hops are selected from a pool of currently almost 3000 volunteer-operated Tor relays to comprise a route through the network for a...

    Provided By University of Luton

  • White Papers // Nov 2012

    Improving Highway Traffic Through Partial Velocity Synchronization

    In this paper, the authors address the problem of uncoordinated highway traffic. They first identify the main causes of the capacity drop, namely high traffic demand and inadequate driver reaction. In the past, traffic and user behavior have been accurately described by Cellular Automata (CA) models. In this paper, they...

    Provided By University of Luton

  • White Papers // Mar 2010

    Rotational Cryptanalysis of ARX

    In this paper the authors analyze the security of systems based on modular Additions, Rotations, and XORs (ARX systems). They provide both theoretical support for their security and practical cryptanalysis of real ARX primitives. They use a technique called rotational cryptanalysis that is universal for the ARX systems and is...

    Provided By University of Luton

  • White Papers // Dec 2009

    A Domain Extender for the Ideal Cipher

    The authors describe the first domain extender for ideal ciphers, i.e. they show a construction that is indifferentiable from a 2n-bit ideal cipher, given a n-bit ideal cipher. Their construction is based on a 3-round Feistel, and is more efficient than first building a n-bit random oracle from a n-bit...

    Provided By University of Luton

  • White Papers // Sep 2009

    PSS is Secure Against Random Fault Attacks

    A fault attack consists in inducing hardware malfunctions in order to recover secrets from electronic devices. One of the most famous fault attack is Bellcore's attack against RSA with CRT; it consists in inducing a fault modulo p but not modulo q at signature generation step; then by taking a...

    Provided By University of Luton

  • White Papers // Jun 2009

    Differential Fault Analysis on DES Middle Rounds

    Differential Fault Analysis (DFA) is a powerful cryptanalytic technique that disturbs cryptographic computations and exploits erroneous results to infer secret keys. Over the last decade, many works have described and improved DFA techniques against block ciphers thus showing an inherent need to protect their implementations. A simple and widely used...

    Provided By University of Luton

  • White Papers // May 2008

    Attack and Improvement of a Secure S-box Calculation Based on the Fourier Transform

    At CHES 2006, a Differential Power Analysis (DPA) countermeasure based on the Fourier transform was published. This generic countermeasure aims at protecting from DPA any S-box calculation used in symmetric cryptosystems implementations. In this paper, the authors show that this countermeasure has a aw and that it can be broken...

    Provided By University of Luton

  • White Papers // Nov 2012

    Proactive Discovery of Phishing Related Domain Names

    Phishing is an important security issue to the Internet, which has a significant economic impact. The main solution to counteract this threat is currently reactive blacklisting; however, as phishing attacks are mainly performed over short periods of time, reactive methods are too slow. As a result, new approaches to early...

    Provided By University of Luton

  • White Papers // Jan 2010

    A Gentle Transition From Java Programming to Web Services Using XML-RPC

    By selecting out key concepts and fundamental skills such as RPC's and by providing just enough industrial context, it is possible to marry vocational content with conceptual development, whilst also motivating students by relating key skills and concepts to the real world they see around them. The paper presented here...

    Provided By University of Luton

  • White Papers // May 2012

    On the Optimality of Beamformer Design for Zero-Forcing DPC With QR Decomposition

    The authors consider the beamformer design for Zero-Forcing Dirty Paper Coding (ZF-DPC), a suboptimal transmission technique for MISO Broadcast Channels (MISO BCs). Beamformers for ZF-DPC are designed to maximize a performance measure, subject to some power constraints and zero-interference constraints. For the sum rate maximization problem under a total power...

    Provided By University of Luton

  • White Papers // Nov 2012

    XSS-FP: Browser Fingerprinting Using HTML Parser Quirks

    There are many scenarios in which inferring the type of a client browser is desirable, for instance to fight against session stealing. This is known as browser fingerprinting. This paper presents and evaluates a novel fingerprinting technique to determine the exact nature (browser type and version, e.g. Firefox 15) of...

    Provided By University of Luton

  • White Papers // Apr 2012

    Standardized Protocol Stack for The Internet of (Important) Things

    The authors have witnessed the fixed internet emerging with virtually every computer being connected today; they are currently witnessing the emergence of the mobile internet with the exponential explosion of smart phones, tablets and net-books. However, both will be dwarfed by the anticipated emergence of the Internet of Things (IoT),...

    Provided By University of Luton

  • White Papers // May 2008

    The Importance of Location on Trust in Mobile Networks

    Mobile wireless networks introduce new challenges regarding security and privacy of data. On the other hand, self-organization and independence of fixed infrastructure make these networks, such as Mobile Adhoc NETworks (MANETs) very attractive for military but also civilian application areas. They allows to extend the wireless link into areas with...

    Provided By University of Luton

  • White Papers // Mar 2011

    Free Probability Based Capacity Calculation of Multiantenna Gaussian Fading Channels With Cochannel Interference

    During the last decade, it has been well understood that communication over multiple antennas can increase linearly the multiplexing capacity gain and provide large spectral efficiency improvements. However, the majority of studies in this area were carried out ignoring co-channel interference. Only a small number of investigations have considered co-channel...

    Provided By University of Luton

  • White Papers // Oct 2009

    A Game Theoretic Approach to Multi-User Spectrum Allocation

    The authors consider the interaction of several transmit-receive pairs coexisting in the same area and communicating using the same portion of the spectrum. Using a game theoretic framework, each pair is regarded as a player whose payoff function is the individual link rate and power is allocated using the iterative...

    Provided By University of Luton

  • White Papers // Mar 2013

    Design and Formal Analysis of a Group Signature Based Electronic Toll Pricing System

    Location-based vehicle services have been enduring a rapid growth with the prevalence of GNSS technologies, nowadays freely available for everyone. Given the nature of location data, privacy is of prime importance in services such as Electronic Tolling Pricing (ETP) and pay-as-you-drive. In this paper, the authors first propose a new...

    Provided By University of Luton

  • White Papers // May 2013

    ADTool: Security Analysis with Attack-Defense Trees

    Graphical security models provide an intuitive but systematic methodology to visualize possible attacks and countermeasures and to enable the computation of various security related parameters. The ADTool is free, open source software assisting graphical modeling and quantitative analysis of security, using attack-defense trees. The main features of the ADTool are...

    Provided By University of Luton

  • White Papers // Jun 2011

    CoReL: Policy-Based and Model-Driven Regulatory Compliance Management

    Regulatory compliance management is now widely recognized as one of the main challenges still to be efficiently dealt with in information systems. In the discipline of Business Process Management in particular, compliance is considered as an important driver of the efficiency, reliability and market value of companies. It consists of...

    Provided By University of Luton

  • White Papers // Nov 2011

    Business Process Regulatory Compliance Management Solution Frameworks: A Comparative Evaluation

    Regulatory Compliance Management (RCM) is a problem gaining wide interest in the Business Process Management (BPM) community. However, research has not yet provided a non-ambiguous and agreed upon definition of RCM, and it is hard for newcomers to this field of research to get a clear overview of available results....

    Provided By University of Luton

  • White Papers // Oct 2010

    Towards a Model for Security and Privacy in the Internet of Things

    The authors propose and give a high-level, work-in-progress description of a model which will allow them to reason about security and privacy of communication protocols in the Internet of Things and identify the next steps necessary towards a complete formal model. The model is built up from a few basic...

    Provided By University of Luton

  • White Papers // Jul 2013

    ASMATRA: Ranking ASs Providing Transit Service to Malware Hosters

    The Internet has grown into an enormous network offering a variety of services, which are spread over a multitude of domains. BGP-routing and Autonomous Systems (AS) are the key components for maintaining high connectivity in the Internet. Unfortunately, Internet Service Providers (ISPs) operating ASs do not only host normal users...

    Provided By University of Luton

  • White Papers // Jul 2012

    Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks

    Published attacks against Smartphones have concentrated on software running on the application processor. With numerous countermeasures like ASLR, DEP and code signing being deployed by operating system vendors, practical exploitation of memory corruptions on this processor has become a time-consuming endeavor. At the same time, the cellular baseband stack of...

    Provided By University of Luton

  • White Papers // May 2013

    DANAK: Finding the Odd!

    One kind of available information on network borders are Netflow records, which can be exported by mostly all routers today, but storing and analyzing these large quantities instantly is a problem. A question that arises is, if it is really necessary to evaluate all records or if abstractions of records...

    Provided By University of Luton

  • White Papers // May 2013

    Semantic Exploration of DNS

    The DNS structure discloses useful information about the organization and the operation of an enterprise network, which can be used for designing attacks as well as monitoring domains supporting malicious activities. Thus, this paper introduces a new method for exploring the DNS domains. Although the authors' previous work described a...

    Provided By University of Luton

  • White Papers // Jul 2012

    Semantic Based DNS Forensics

    In network level forensics, Domain Name Service (DNS) is a rich source of information. This paper describes a new approach to mine DNS data for forensic purposes. The authors propose a new technique that leverages semantic and natural language processing tools in order to analyze large volumes of DNS data....

    Provided By University of Luton

  • White Papers // Jun 2013

    The Local Attack: Cryptanalysis of the Authenticated Encryption Scheme ALE

    Cryptanalysis and design of authenticated encryption primitives are getting renewed interest, not least because of the CEASAR initiative. Recently, at DIAC 2012 and FSE 2013, a proposal named ALE was presented by researcher. ALE provides online single-pass encryption and authentication functionality with optional processing of associated data in a single...

    Provided By University of Luton

  • White Papers // Oct 2013

    Trapdoor Privacy in Asymmetric Searchable Encryption Schemes

    Asymmetric searchable encryption allows searches to be carried over cipher-texts, through delegation, and by means of trapdoors issued by the owner of the data. Public key Encryption with Keyword Search (PEKS) is a primitive with such functionality that provides delegation of exact-match searches. As it is important that cipher-texts preserve...

    Provided By University of Luton

  • White Papers // Mar 2013

    Key Wrapping with a Fixed Permutation

    The authors present an efficient key wrapping scheme that uses a single wide permutation and does not rely on block ciphers. The scheme is capable of wrapping keys up to 1400 bits long and processing arbitrarily long headers. Their scheme easily delivers the security level of 128 bits or higher...

    Provided By University of Luton

  • White Papers // Dec 2013

    Automatic Search for Differential Trails in ARX Ciphers

    The authors propose a tool for automatic search for differential trails in ARX ciphers. By introducing the concept of a partial Difference Distribution Table (pDDT) they extend Matsui's algorithm, originally proposed for DES-like ciphers, to the class of ARX ciphers. To the best of their knowledge this is the first...

    Provided By University of Luton

  • White Papers // Sep 2013

    A Holistic Model for Resource Representation in Virtualized Cloud Computing Data Centers

    Management and optimization of cloud infrastructures combine multiple challenges. The optimization of data centers targets such objectives as performance, reliability, energy consumption, and security. To achieve these goals, multiple actions can be taken, for example, task and virtual machine allocation or infrastructure management. In this paper the authors propose a...

    Provided By University of Luton

  • White Papers // Jan 2011

    Search for Related-key Differential Characteristics in DES-like ciphers

    The authors present the first automatic search algorithms for the best related-key differential characteristics in DES-like ciphers. They show that instead of brute-forcing the space of all possible differences in the master key and the plaintext, it is computationally more efficient to try only a reduced set of input-output differences...

    Provided By University of Luton

  • White Papers // Mar 2010

    Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others

    While differential behavior of modern ciphers in a single secret key scenario is relatively well understood, and simple techniques for computation of security lower bounds are readily available, the security of modern block ciphers against related-key attacks is still very ad hoc. In this paper the authors make a first...

    Provided By University of Luton