By Topic

IET Information Security

Issue 4 • December 2011

Filter Results

Displaying Results 1 - 6 of 6
  • Security evaluation of application-specific integrated circuits and field programmable gate arrays against setup time violation attacks

    Publication Year: 2011, Page(s):181 - 190
    Cited by:  Papers (3)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (846 KB)

    Fault attacks are real threats against hardware implementations of robust cryptographic algorithms such as advanced encryption standard (AES). The authors present an active non-invasive attack to inject faults during the execution of the algorithm and describe setup time violation attacks by under-powering and overclocking an application-specific integrated circuit. Then a security evaluation is p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Eigenviruses for metamorphic virus recognition

    Publication Year: 2011, Page(s):191 - 198
    Cited by:  Papers (3)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (296 KB)

    Metamorphic virus recognition is the most challenging task for antivirus software, because such viruses are the hardest to detect as they change their appearance and structure on each new infection. In this study, the authors present an effective system for metamorphic virus recognition based on statistical machine learning techniques. The authors approach has successfully scored high detection ra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the sliding property of SNOW 3 G and SNOW 2.0

    Publication Year: 2011, Page(s):199 - 206
    Cited by:  Papers (3)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (244 KB)

    SNOW 3G is a stream cipher chosen by the 3rd Generation Partnership Project (3GPP) as a crypto-primitive to substitute KASUMI in case its security is compromised. SNOW 2.0 is one of the stream ciphers chosen for the ISO/IEC standard IS 18033-4. In this study, the authors show that the initialisation procedure of the two ciphers admits a sliding property, resulting in several sets of related-key pa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Provable-security analysis of authenticated encryption in Kerberos

    Publication Year: 2011, Page(s):207 - 219
    Cited by:  Papers (3)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (282 KB)

    Kerberos is a widely deployed network authentication protocol currently being considered for standardisation. Many works have analysed its security, identifying flaws and often suggesting fixes, thus promoting the protocol's evolution. Several recent results present successful, formal methods-based verifications of a significant portion of the current version, v.5 and some even imply security in t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using opcode sequences in single-class learning to detect unknown malware

    Publication Year: 2011, Page(s):220 - 227
    Cited by:  Papers (5)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (347 KB)

    Malware is any type of malicious code that has the potential to harm a computer or network. The volume of malware is growing at a faster rate every year and poses a serious global security threat. Although signature-based detection is the most widespread method used in commercial antivirus programs, it consistently fails to detect new malware. Supervised machine-learning models have been used to a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Perfect involutory diffusion layers based on invertibility of some linear functions

    Publication Year: 2011, Page(s):228 - 236
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (213 KB)

    One of the most important structures used in modern block ciphers is the substitution-permutation network (SPN) structure. Many block ciphers with this structure widely use Maximun Distance Separable (MDS) matrices over finite fields as their diffusion layers, for example, advanced encryption standard (AES) uses a 4-4 MDS matrix as the main part of its diffusion layer and the block cipher Khazad h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IET Information Security publishes original research papers in the following areas of information security and cryptography.

Full Aims & Scope

Meet Our Editors

Publisher
IET Research Journals
iet_ifs@theiet.org