By Topic

IET Information Security

Issue 4 • Date 7 2016

Filter Results

Displaying Results 1 - 7 of 7
  • Dynamic cube attack on Grain-v1

    Publication Year: 2016, Page(s):165 - 172
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (301 KB)

    This study presents a dynamic cube attack on the algorithm Grain-v1 which has resisted all the key-recovery attacks in the single key model. The dynamic cube attack finds the secret key by using distinguishers obtained from structural weaknesses of a cipher. The main idea of the attack lies in simplifying the cipher's output function. After making it simpler, the attack is able to exploit a distin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Leakage-resilient message authentication code scheme based on hidden identity weak hash proof system

    Publication Year: 2016, Page(s):173 - 179
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (175 KB)

    Hazay et al. initiated the formal study of leakage-resilient message authentication code (MAC) and presented a MAC scheme that is both leakage resilient and unforgeable against chosen message and no verification query attack (uf-cm-nvq). As the communication overhead of their construction is linear with the parameters that control the leakage bound, their scheme sacrifices efficie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effective certificate revocation scheme based on weighted voting game approach

    Publication Year: 2016, Page(s):180 - 187
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (638 KB)

    Mobile ad hoc networks (MANETs) are wireless networks that have a wide range of applications because of their dynamic topologies and ease of deployment. Owing to the independent and dynamic nature of mobile nodes, the topology of a MANET often changes and is prone to various attacks. Therefore, substantial research in the area of security is required. Certificate revocation is an effective ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy failure in the public-key distance-bounding protocols

    Publication Year: 2016, Page(s):188 - 193
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (358 KB)

    Public-key distance bounding protocols are well suited to defeat relay attacks in proximity access control systems when the author assume no prior shared key. At AsiaCCS 2014, Gambs, Onete, and Robert designed such a protocol with privacy protection for the prover. That is, the protocol hides the identity of the prover to active adversaries and the prover remains anonymous. In this study the autho... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cryptanalysis of McEliece cryptosystem variants based on quasi-cyclic low-density parity check codes

    Publication Year: 2016, Page(s):194 - 202
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (198 KB)

    One of the approaches to modify the McEliece cryptosystem to overcome its large key size is replacing binary Goppa codes with a new structured code. However, this modification makes such cryptosystems encounter some new attacks. There are a few modified McEliece cryptosystem variants which are known to be secure. One of them is the cryptosystem introduced by Baldi et al. which uses quasi-cy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and formal verification of a cloud compliant secure logging mechanism

    Publication Year: 2016, Page(s):203 - 214
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1486 KB)

    Security concerns are still retarding cloud adoption. While the research community work on clearing these concerns, an optimistic fair cloud compliant logging scheme may ease the cloud to spread. This study proposes a secure logging mechanism. The mechanism employs an online bulletin board as a public write-only storage for the log records. The bulletin board also acts as a trusted third party dur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multidimensional zero-correlation linear cryptanalysis of the block cipher KASUMI

    Publication Year: 2016, Page(s):215 - 221
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (593 KB)

    The block cipher KASUMI, proposed by ETSI SAGE over 10 years ago, is widely used for security in many synchronous wireless standards nowadays. For instance, the confidentiality and integrity of 3G mobile communications systems depend on the security of KASUMI. Up to now, there is a great deal of cryptanalytic results on KASUMI. However, its security evaluation against the recent zero-correlation l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IET Information Security publishes original research papers in the following areas of information security and cryptography.

Full Aims & Scope

Meet Our Editors

Publisher
IET Research Journals
iet_ifs@theiet.org