-
261
Research on the data link layer secure protocol of TES network based on ECC
Published 2009-01-01“…A workable and efficient data link layer security protocol had been proposed on the need of safety information transfer requirements of the TES system.The protocol provides a software registration solution for the remote sites and a information encryption method base on the elliptic curves cryptography(ECC) algorithm as well as a combined key allocation method.The protocol takes the characters of the TES system into account,improves its ability to identify remote sites,and provides ways to prevent information stealing and network attacks.…”
Get full text
Article -
262
INNOVATIVE MECHANISMS FOR IMPLEMENTING STATE ECONOMIC POLICY FOR POST-WAR RECONSTRUCTION OF UKRAINE: QUANTUM TRANSFORMATIONS AS A DRIVER OF DEVELOPMENT
Published 2024-12-01“…The second quantum revolution involves the introduction of quantum computers, quantum cryptography and quantum communication, capable of accelerating the development of new materials, optimizing logistics chains and increasing the level of data security. …”
Get full text
Article -
263
Description of global avalanche characteristics and constructions of Boolean functions
Published 2014-11-01“…Global avalanche characteristics matrix representation method starting from the expression of global avalanche characteristics was proposed and a new tool for research global avalanche characteristics was provided.According to properties of sum-of-square indicator,an odd almost optimal Boolean functions which meet savariety of properties of cryptography was constructed and hold slower sum-of-square indicator via M-M Boolean functions.It is a problem that how to construct a kind of functions satisfying GAC.There is a effecint way that modifying M-M functions with designing new mapping.…”
Get full text
Article -
264
Analysis of the Fault Attack ECDLP over Prime Field
Published 2011-01-01“…In 2000, Biehl et al. proposed a fault-based attack on elliptic curve cryptography. In this paper, we refined the fault attack method. …”
Get full text
Article -
265
Oblivious transfer based on physical unclonable function system
Published 2013-08-01“…Oblivious transfer (OT) is a fundamental protocol in cryptography. According to the analysis of physical un-clonable function, a physical unclonable function system framework was defined, and a novel oblivious transfer (POT, PUFS based OT) protocol was proposed based on this framework. …”
Get full text
Article -
266
Block cipher based on T-shaped cellular automata
Published 2009-01-01“…In order to overcome the defect on insecurity of block cipher with few reversible cellular automata, T-shaped cellular automata was proposed, which needed two initial states and applied their characteristics to construct more re-versible cellular automata.A new encryption system based on this class of self-reversible cellular automata was designed.Experiments show that block cipher based on reversible cellular automata not only achieves a better avalanche effect but also improves the security of the applications of cellular automata in cryptography, especially by using pseudo random sequences in the beginning of encryption.…”
Get full text
Article -
267
A hierarchy model on the research fields of cyberspace security technology
Published 2015-12-01“…Cyberspace security is an interdisciplinary subject involved with computer science and technology,in-formation and communication engineering,control science and engineering and cryptography.It has an explicit and in-depth discipline connotation.First,the concepts of cyberspace security were advanced,and the definition was given.Then,a hierarchy model of cyberspace security was proposed.Based on the model,the details technologies of eight research fields of cyberspace security including information security,information secrecy,information coun-termeasure,cloud security,big data,IOT security,mobile security,and trustable computing were presented.New guidance and experience for the research in cyberspace security could be taken as.…”
Get full text
Article -
268
The condition number associated with ideal lattices from odd prime degree cyclic number fields
Published 2025-02-01“…The condition number of a generator matrix of an ideal lattice derived from the ring of integers of an algebraic number field is an important quantity associated with the equivalence between two computational problems in lattice-based cryptography, the “Ring Learning With Errors (RLWE)” and the “Polynomial Learning With Errors (PLWE)”. …”
Get full text
Article -
269
Research on key management and authentication protocol of PDA in smart grid
Published 2018-03-01“…According to PDA in smart grid,which faced with security issues,key management and authentication protocol for PDA in smart grid based on scrambling PUF were presented.With the construction of mobile trusted platform by trusted hardware module and PDA,a key management mechanism was designed which presented for the indentify of hardware and controlled by user,to guarantee the security of key management and build a safe and effective mechanism of key backup and recovery.Based on trusted hardware module,security access for PDA in smart grid was realized,with the public and private key of key management strategy and improved access authentication protocol based on public key cryptography.…”
Get full text
Article -
270
Anonymous vehicle authentication scheme based on blockchain technology in the intersection scenario
Published 2020-10-01“…With the development of intelligent transportation system,the vehicles will no longer be controlled by the traditional traffic light when they enter or leave the intersection.Instead,they will interact with the local server (LS) near the intersection and accept the regulation of LS.The basic of the security vehicle communication at intersections is authentication of network node.Based on this,an anonymous vehicle authentication scheme based on blockchain technology was proposed.The scheme employed a hybrid cryptography based on identity and hash message authentication code,and recorded the authentication results in blockchains.According to simulation testing and result analysis,the scheme ensures the anonymity and privacy-preserving,with less communication overhead compared to other methods.…”
Get full text
Article -
271
Research on Security Algorithm for Crossing Heterogeneous Network Based on Unified Communication Technology
Published 2013-12-01“…Based on the study of heterogeneous networks through the issues and the status quo on the symmetric key cryptography, asymmetric key cryptosystem in-depth research, an encryption algorithm based on the RSA algorithm and improved DES algorithm was proposed. …”
Get full text
Article -
272
Dynamic hierarchical quantum information sharing protocol
Published 2016-12-01“…Quantum secret sharing (QSS) is one important branch of quantum cryptography.Based on the studies of multi-shared quantum bits,a new dynamic quantum bit sharing protocol was proposed.The participation of the shared members is hierarchical in this protocol.The quantum information leader,in the absence of the establishment of a new quantum channel,can remove some of the participants in the secret reconstruction system.After the layoffs,the leader can also update the quantum information using quantum operations,and the remaining effective partici-pants can recover the new quantum information without performing additional operations.In addition,the correct-ness,security and the hierarchy of the participants of the protocol were discussed.…”
Get full text
Article -
273
Novel key management and authentication scheme for ad hoc space networks
Published 2006-01-01“…To be implemented using a flexible distributed architecture consisting of a constellation of dynamically de-ployed or configured satellites that were networked together into an integrated information system,the satellites could form an ad hoc self-organizational network,which posed unique challenges to security for the network.A novel and flexible security architecture was proposed,which aimed to provide public key infrastructure and authentication scheme.Based on the absolute distributed certificate authority almost any standard public-key-based authentication protocol could be adopted directly.In cases where the space nodes involved were extremely limited in computational resources,a light-weight authentication scheme that provided integrity and confidentiality based on cryptographic hash functions and symmetric key cryptography was proposed.…”
Get full text
Article -
274
Achieving resist against DHCP man-in-the-middle attack scheme based on key agreement
Published 2021-08-01“…In order to deal with the issue of the man-in-the-middle attack in the process of using dynamic host configuration protocol, a lightweight scheme was proposed.A new key agreement algorithm was developed based on public key cryptography to generate relevant keys, reducing the key storage burden.On the basis, a secure scheme was proposed, where two-way authentication of participants was designed to prevent the man-in-the-middle attack and digital signatures conforming to protocol specifications was constructed to ensure the legitimacy of the message source.By security analysis, the proposed scheme was demonstrated to be secure and valid against the man-in-the-middle attack and other common attacks.Experimental results show that the proposed scheme has the better performance compared with the related schemes, and can be compatible with both DHCPv4 and DHCPv6.…”
Get full text
Article -
275
Provable secure mutual RFID authentication protocol based on QC-MDPC code
Published 2014-11-01“…The security of radio frequency identification (RFID) has become an increasingly severe issue.In order to protect the security of information interaction in wireless channel of RFID system,a mutual RFID authentication secure protocol was proposed.It was like the Niederreiter type public cryptography which based on the quasi-cyclic medium density parity check code(QC-MDPC).The security proof for this novel protocol was given by using a reduction method ,and the hardness of attacking was reduced to the decoding problem of the linear codes.Besides the performance results also exhibit that compared with other RFID authentication protocols,this protocol is more suitable for RFID system in areas of interaction,computation and storage,which owns limited resource and needs high efficiency.…”
Get full text
Article -
276
Research on secret key generation based on wireless channel characteristics in body area network
Published 2021-12-01“…Wireless body area network (WBAN) is a human-centered wireless network.With limitations of power and computation capabilities of WBAN, the significant challenge of ensuring security is how to generate a shared key between two entities based on a lightweight symmetric cryptography.To investigate this issue, a secret key generation scheme in ultra-wideband (UWB) WBAN was designed.In this scheme, the difference of multipath relative delay and its average value were chosen as common random source to reduce key mismatch probability.Furthermore, with the aid of relay, secret key generation rate could be increased.Simulation and test results demonstrate that the proposed scheme can achieve a good tradeoff between key match probability and key generation rate.Furthermore, security analysis of the scheme was also provided to validate its feasibility.…”
Get full text
Article -
277
Sieve Method for Polynomial Linear Equivalence
Published 2013-01-01“…We consider the polynomial linear equivalence (PLE) problem arising from the multivariate public key cryptography, which is defined as to find an invertible linear transformation ℒ satisfying 𝒫=𝒮∘ℒ for given nonlinear polynomial maps 𝒫 and 𝒮 over a finite field 𝔽q. …”
Get full text
Article -
278
A new mathematical model to improve encryption process based on Split-Radix Fast Fourier Transform algorithm
Published 2025-01-01“…This paper introduces a new encryption method aimed at improving the cryptography process through the use of splitting radix Fourier Transform technique called Split-Radix Fast Fourier Transforms (SRFFT). …”
Get full text
Article -
279
Forgery attacks on several certificateless signature schemes
Published 2020-06-01“…Since Al-Riyami and Paterson proposed the novel concept of certificateless cryptography and the first certificateless signature scheme in 2003,a lot of certificateless signature schemes were proposed one after another.Recently,Tang et al proposed nine certificateless signature schemes without bilinear pairing.Although they demonstrated that their schemes were unforgeable under the assumption of elliptic curve discrete logarithmic problem,it can be found that five of their schemes could not resist the public key substitution attack,the attacker could use the user's original public key to forge a valid signature for three of these schemes.The attack methods are to demonstrate that prove five certificateless signature schemes are insecure.…”
Get full text
Article -
280
Topological Indices of Total Graph and Zero Divisor Graph of Commutative Ring: A Polynomial Approach
Published 2023-01-01“…Graphs containing finite commutative rings have wide applications in robotics, information and communication theory, elliptic curve cryptography, physics, and statistics. In this article, the topological indices of the total graph Tℤnn∈ℤ+, the zero divisor graph Γℤrn (r is prime, n∈ℤ+), and the zero divisor graph Γℤr×ℤs×ℤt (r,s,t are primes) are computed using some algebraic polynomials.…”
Get full text
Article