Search results for "Cryptographic protocol"

showing 10 items of 12 documents

Mutual entity authentication for LTE

2011

In this paper we outline the Authentication and Key Agreement protocol (EPS-AKA) found in Long-Term Evolution (LTE) systems. This architecture is the 3GPP version of a 4G access security architecture. The LTE security architecture is a mature evolved architecture, with both strengths and weaknesses. In this paper we propose an amendment to the EPS-AKA protocol to make it a full mutual (online) entity authentication protocol. We also analyze the proposal, highlighting both the improvements and the drawbacks of the new AKA protocol.

Challenge-Handshake Authentication ProtocolKey-agreement protocolAuthenticationbusiness.industryComputer scienceAuthorizationMutual authenticationEnterprise information security architectureCryptographic protocolComputer securitycomputer.software_genreDistributed System Security ArchitectureGSMAuthentication protocolLightweight Extensible Authentication ProtocolbusinesscomputerAKAComputer network2011 7th International Wireless Communications and Mobile Computing Conference
researchProduct

If P ≠ NP then Some Strongly Noninvertible Functions Are Invertible

2001

Rabi, Rivest, and Sherman alter the standard notion of noninvertibility to a new notion they call strong noninvertibility, and show--via explicit cryptographic protocols for secret-key agreement ([RS93, RS97] attribute this to Rivest and Sherman) and digital signatures [RS93, RS97]--that strongly noninvertible functions would be very useful components in protocol design. Their definition of strong noninvertibility has a small twist ("respecting the argument given") that is needed to ensure cryptographic usefulness. In this paper, we show that this small twist has a large, unexpected consequence: Unless P = NP, some strongly noninvertible functions are invertible.

Discrete mathematicsComputational complexity theorybusiness.industryP versus NP problemCryptographyCryptographic protocollaw.inventionInvertible matrixDigital signaturelawTwistbusinessTime complexityMathematics
researchProduct

If P≠NP then some strongly noninvertible functions are invertible

2006

AbstractRabi, Rivest, and Sherman alter the standard notion of noninvertibility to a new notion they call strong noninvertibility, and show—via explicit cryptographic protocols for secret-key agreement (Rabi and Sherman attribute this protocol to Rivest and Sherman) and digital signatures (Rabi and Sherman)—that strongly noninvertible functions are very useful components in protocol design. Their definition of strong noninvertibility has a small twist (“respecting the argument given”) that is needed to ensure cryptographic usefulness. In this paper, we show that this small twist has a consequence: unless P=NP, some strongly noninvertible functions are invertible.

Discrete mathematicsGeneral Computer ScienceComputational complexity theorybusiness.industryP versus NP problemOne-way functionsCryptographyOne-way functionCryptographic protocolTheoretical Computer Sciencelaw.inventionComputational complexityInvertible matrixDigital signaturelawAssociativityCryptographyStrong noninvertibilitybusinessAssociative propertyMathematicsTheoretical Computer Science
researchProduct

Lightweight Privacy-aware yet Accountable Secure Scheme for SM-SGCC communications in smart grid

2011

Abstract Smart grid is envisioned as a critical application of cyber-physical systems and of the internet of things. In the smart grid, smart meters equipped with wireless sensors can upload meter readings (data) to smart grid control and schedule centers via the advanced metering infrastructure to improve power delivery efficiency. However, data gathered in short intervals, such as 15 minutes, will expose customers' detailed daily activities (for example, when they get up and when they use oven) using nonintrusive appliance load monitoring. Thus, data must be hidden to protect customers' privacy. However, data accountability is still required for emergency responses or to trace back suspec…

Flexibility (engineering)ScheduleSecurity analysisEngineeringMultidisciplinarybusiness.industryCryptographic protocolComputer securitycomputer.software_genreUploadSmart gridScalabilityWirelessbusinesscomputerTsinghua Science and Technology
researchProduct

Formal Analysis and Model Checking of a Group Authentication Protocol by Scyther

2016

Scyther [1] is designed to check the security and vulnerabilities of security protocols. In this paper, we use Scyther to analyze two discrete logarithm problem (DLP) based group authentication protocols proposed in [2]. These two protocols are claimed to satisfy several security requirements, but only part of them have been checked because of the properties and limitations of Scyther. Some positive results have been gained and show that the protocols provide mutual authentication and implicit key authentication and are secure against impersonation attack. An important innovation in this paper is that we have extended the expressing ability of Scyther by giving some reasonable assumption du…

Model checkingAuthenticationTheoretical computer scienceComputer sciencebusiness.industry020206 networking & telecommunicationsCryptography02 engineering and technologyMutual authenticationCryptographic protocolComputer securitycomputer.software_genreKey authenticationDiscrete logarithmAuthentication protocol0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinesscomputer2016 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP)
researchProduct

BVS: A Lightweight Forward and Backward Secure Scheme for PMU Communications in Smart Grid

2011

In smart grid, phaser measurement units (PMUs) can upload readings to utility centers via supervisory control and data acquisition (SCADA) or energy management system (EMS) to enable intelligent controlling and scheduling. It is critical to maintain the secrecy of readings so as to protect customers' privacy, together with integrity and source authentication for the reliability and stability of power scheduling. In particular, appealing security scheme needs to perform well in PMUs that usually have computational resource constraints, thus designed security protocols have to remain lightweight in terms of computation and storage. In this paper, we propose a family of schemes to solve this p…

PasswordSecurity analysisArticle SubjectComputer sciencebusiness.industryCommunicationHash functionComputerApplications_COMPUTERSINOTHERSYSTEMSCryptographic protocolComputational resourcelcsh:TelecommunicationPublic-key cryptographySmart gridSCADAlcsh:TK5101-6720Media TechnologyElectrical and Electronic EngineeringbusinessComputer networkInternational Journal of Digital Multimedia Broadcasting
researchProduct

PROLISEAN: A New Security Protocol for Programmable Matter

2021

The vision for programmable matter is to create a material that can be reprogrammed to have different shapes and to change its physical properties on demand. They are autonomous systems composed of a huge number of independent connected elements called particles. The connections to one another form the overall shape of the system. These particles are capable of interacting with each other and take decisions based on their environment. Beyond sensing, processing, and communication capabilities, programmable matter includes actuation and motion capabilities. It could be deployed in different domains and will constitute an intelligent component of the IoT. A lot of applications can derive fro…

Self-reconfiguring modular robot0209 industrial biotechnologySecurity AlgorithmsComputer Networks and CommunicationsComputer scienceDistributed computingHash functionSecurity Protocol02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]EncryptionLightweight Cryptography[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]020901 industrial engineering & automationComponent (UML)0202 electrical engineering electronic engineering information engineeringModular RobotsProgrammable MatterProtocol (object-oriented programming)IOTbusiness.industry020206 networking & telecommunicationsCryptographic protocolSupercomputer[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationProgrammable matter[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA][INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Amoebots[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessDistributed Computing
researchProduct

Privacy Enhanced Device Access

2012

In this paper we present the case for a device authentication protocol that authenticates a device/service class rather than an individual device. The devices in question are providing services available to the public. The proposed protocol is an online protocol and it uses a pseudo-random temporary identity scheme to provide user privacy.

Service (business)AuthenticationIntegrated access deviceComputer scienceAuthentication protocolNetwork Access DeviceNetwork block deviceCryptographic protocolComputer securitycomputer.software_genreProtocol (object-oriented programming)computer
researchProduct

SMCP: a Secure Mobile Crowdsensing Protocol for fog-based applications

2020

Abstract The possibility of performing complex data analysis through sets of cooperating personal smart devices has recently encouraged the definition of new distributed computing paradigms. The general idea behind these approaches is to move early analysis towards the edge of the network, while relying on other intermediate (fog) or remote (cloud) devices for computations of increasing complexity. Unfortunately, because both of their distributed nature and high degree of modularity, edge-fog-cloud computing systems are particularly prone to cyber security attacks that can be performed against every element of the infrastructure. In order to address this issue, in this paper we present SMCP…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniModularity (networks)General Computer ScienceExploitEdge devicebusiness.industryComputer scienceDistributed computingHuman Activity RecognitionCyber SecurityCloud computingCryptographic protocolEncryptionlcsh:Q350-390lcsh:QA75.5-76.95Artificial Intelligencelcsh:Information theoryMobile Crowdsensinglcsh:Electronic computers. Computer scienceEnhanced Data Rates for GSM EvolutionbusinessProtocol (object-oriented programming)
researchProduct

A TRNG Exploiting Multi-Source Physical Data

2010

In recent years, the considerable progress of miniaturization and the consequent increase of the efficiency of digital circuits has allowed a great diffusion of the wireless sensor network technology. This has led to the growth of applications and protocols for applying these networks to several scenarios, such as the military one, where it is essential to deploy security protocols in order to prevent opponents from accessing the information exchanged among sensor nodes. This paper analyzes security issues of data processed by the WSN and describes a system able to generate sequences of random numbers, which can be used by security algorithms and protocols. The proposed True Random Number G…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniRandom number generationbusiness.industryNetwork securityComputer scienceDistributed computingNode (networking)Cryptographic protocolTrusted third partyKey distribution in wireless sensor networksWireless Sensor Networks Random Number Generator Network SecurityNISTbusinessWireless sensor networkComputer network
researchProduct