Guest Editorial: Selected papers from the 24th International Conference on Information Security and Cryptology (ICISC 2021)

IF 1.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS
Jong Hwan Park
{"title":"Guest Editorial: Selected papers from the 24th International Conference on Information Security and Cryptology (ICISC 2021)","authors":"Jong Hwan Park","doi":"10.1049/ise2.12096","DOIUrl":null,"url":null,"abstract":"<p>This is our first IET Information Security special issue from the Internation Conference on Information Security and Cryptology, which was held from December 1 to December 3, Seoul, South Korea, 2021. The aim of ICISC 2021 was to provide an international forum for the latest results of research, development, and applications within the field of information security and cryptography. In ICISC 2021, we received 63 submissions and were able to accept 23 papers for the presentation at the conference. Among accepted and presented papers at ICISC 2021, we selected six papers with high review scores and recommended them for publication in the special issue of IET information Security (via at least 30% extension). It is worth noting that the review and the selection process were successfully conducted by programme committee (PC) members, including reviewers dispatched from IET Information Security, and each paper underwent a blind review by at least three PC members.</p><p>The special issue contains six papers on topic areas, including lattice-based protocol constructions (Topic A), lattice-based analysis algorithms (Topic B), efficient quantum circuit constructions (Topic C), and analysis on symmetric-key primitives (Topic D).</p><p>Paper 1 by P. Ren, X. Gu, and Z. Wang investigates how to construct a quantum-safe password-authenticated key exchange (PAKE) as a cryptographic primitive that can establish secure remote communications between a client and a server. They suggest a new PAKE protocol based on module lattices with a rigorous security proof in the random oracle model. Taking the flexibility of the module learning with errors problem, they elaborately select 3 parameter sets to meet different application scenarios. Specifically, they show that their recommended PAKE implementation achieves 177-bit post-quantum security with a generous margin to cope with later improvement in the cryptanalysis. Their performance results indicate that the MLWE-PAKE is quite practical: compared with the latest Yang-PAKE, their PAKE reduces the communication cost and the running time by 36.8% and 13.8%, respectively.</p><p>Paper 2 by V. Farzaliyev, J. Willemson, and J. K. Kaasik investigates Mix-networks as a general tool for building anonymous communication systems. They focus on the application case of post-quantum electronic voting where the number of votes to be mixed may reach hundreds of thousands or even millions. They propose an improved architecture for lattice-based post-quantum mix-nets featuring more efficient zero-knowledge proofs while maintaining established security assumptions. Their implementation scales up to 100,000 votes, still leaving a lot of room for future optimisation.</p><p>Paper 3 by K. Yamamura, Y. Wang, and E. Fujisaki investigates an enumeration algorithm that is used as a subroutine for the BKZ algorithm, which is one of the most practical reduction algorithms. It is a critical issue to reduce the computational complexity of the enumeration algorithm. First, they improve the mechanism, called Primal Projective Reordering (PPR) method, over the previous reordering method proposed by Wang in ACISP 2018. Next, they propose a Dual Projective Recording method in dual lattice, and also they propose a condition to decide whether the reordering method should be adapted or not. Finally, they propose an improved BKZ algorithm with the reordering methods and our proposed condition. Preliminary experimental results show that their proposed reordering methods can successfully reduce the number of enumeration algorithm search nodes compared to the predecessor, for example, PPR reduces around 9.6% on average in 30-dimensional random lattices, and DPR reduces around 32.8% on average in 45-dimensional random lattices.</p><p>Paper 4 by J. Lee, S. Lee, Y. S. Lee, and D. Choi suggests an efficient quantum circuit design of a given cryptographic algorithm in terms of reducing T-depth for time complexity efficiency. They propose a novel technique for reducing T-depth (and T-count) when some quantum circuits located between two Toffoli gates are interchangeable with a controlled phase gate (CP gate). They apply their technique to five types of quantum adders, reducing T-depth by more than 33%. They also present new SHA-256 quantum circuits, which have a critical path with only three quantum adders, while the critical paths of quantum circuits in the previous works consist of seven or 10 quantum adders. According to their four version of SHA-256 quantum circuit, T-depth of the proposed SHA-256 quantum circuit with the Width (the number of qubits) 797 is 16,055, which is remarkably reduced by about 85%. Another proposed quantum circuit only requires 768 qubits, which is the smallest width, to the best of their knowledge. Finally, one other version is the most time-efficient circuit with an overall Toffoli depth (and T-depth) that is less than 5000.</p><p>Paper 5 by Y. Lee, J. Kang, D. Chang, and S. Hong presents preimage attacks on a round-reduced variant of GIMLI-HASH, in which the message-absorbing phase used 5-round GIMLI and the squeezing phase used 9-round GIMLI. They call this variant as 5-9-round GIMLI-HASH. Their preimage attack on 5-9-round GIMLI-HASH requires 2<sup>94.44</sup> time complexity and 2<sup>97</sup> memory complexity. Also, this method can be reached up to round shifted 10-round GIMLI in the squeezing phase. Their first attack requires the memory for storing several precomputation tables in GIMLI SP-box operations. In their second attack, they take a time-memory trade-off approach, reducing memory requirements for precomputation tables but increasing computing time for solving SP-box equations by the SAT solver. This attack requires 2<sup>66.17</sup> memory complexity and 2<sup>96+ε</sup> time complexity, where ε is the time complexity for solving SP-box equations. Their experiments using the CryptoMiniSat SAT solver show that the maximum time complexity for ε is about 2<sup>20.57</sup> 9-round GIMLI.</p><p>Paper 6 by S. Lim and D. G. Han examines a differential fault attack on the PIPO, a lightweight block cipher, which was proposed in ICISC 2020. The PIPO was designed for providing robust security strength while having less overhead when using the side-channel analysis countermeasure. A differential fault attack is a type of side-channel analysis that induces fault in cryptographic operations and utilises difference information that occurs. They proposed a single-bit flip-based differential fault attack on PIPO, where, through 64 fault ciphertexts, their proposed attack has a 98.9% probability of recovering the correct secret key of PIPO 64/128. They evaluated the proposed attack not only through simulations but also through electromagnetic fault injection.</p><p>All of the papers selected for this Special Issue show that further improvements of information security and cryptography are made in the topic areas of post-quantum cryptography and security analysis on block ciphers. Especially, various experimental results by authors will clearly show the reader how advanced their results are, compared to the current research works related to six selected papers. In the meanwhile, there are still many challenges in this field that require future research attentions, such as efficient construction of lattice-based cryptographic primitives, analysis on lattice-based reduction algorithms, and more realistic quantum attacks against post-quantum cryptographic primitives and their underlying complexity assumptions. We hope to see more advanced research results on these topics in the near future.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"17 1","pages":"1-2"},"PeriodicalIF":1.3000,"publicationDate":"2023-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2.12096","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Information Security","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1049/ise2.12096","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

This is our first IET Information Security special issue from the Internation Conference on Information Security and Cryptology, which was held from December 1 to December 3, Seoul, South Korea, 2021. The aim of ICISC 2021 was to provide an international forum for the latest results of research, development, and applications within the field of information security and cryptography. In ICISC 2021, we received 63 submissions and were able to accept 23 papers for the presentation at the conference. Among accepted and presented papers at ICISC 2021, we selected six papers with high review scores and recommended them for publication in the special issue of IET information Security (via at least 30% extension). It is worth noting that the review and the selection process were successfully conducted by programme committee (PC) members, including reviewers dispatched from IET Information Security, and each paper underwent a blind review by at least three PC members.

The special issue contains six papers on topic areas, including lattice-based protocol constructions (Topic A), lattice-based analysis algorithms (Topic B), efficient quantum circuit constructions (Topic C), and analysis on symmetric-key primitives (Topic D).

Paper 1 by P. Ren, X. Gu, and Z. Wang investigates how to construct a quantum-safe password-authenticated key exchange (PAKE) as a cryptographic primitive that can establish secure remote communications between a client and a server. They suggest a new PAKE protocol based on module lattices with a rigorous security proof in the random oracle model. Taking the flexibility of the module learning with errors problem, they elaborately select 3 parameter sets to meet different application scenarios. Specifically, they show that their recommended PAKE implementation achieves 177-bit post-quantum security with a generous margin to cope with later improvement in the cryptanalysis. Their performance results indicate that the MLWE-PAKE is quite practical: compared with the latest Yang-PAKE, their PAKE reduces the communication cost and the running time by 36.8% and 13.8%, respectively.

Paper 2 by V. Farzaliyev, J. Willemson, and J. K. Kaasik investigates Mix-networks as a general tool for building anonymous communication systems. They focus on the application case of post-quantum electronic voting where the number of votes to be mixed may reach hundreds of thousands or even millions. They propose an improved architecture for lattice-based post-quantum mix-nets featuring more efficient zero-knowledge proofs while maintaining established security assumptions. Their implementation scales up to 100,000 votes, still leaving a lot of room for future optimisation.

Paper 3 by K. Yamamura, Y. Wang, and E. Fujisaki investigates an enumeration algorithm that is used as a subroutine for the BKZ algorithm, which is one of the most practical reduction algorithms. It is a critical issue to reduce the computational complexity of the enumeration algorithm. First, they improve the mechanism, called Primal Projective Reordering (PPR) method, over the previous reordering method proposed by Wang in ACISP 2018. Next, they propose a Dual Projective Recording method in dual lattice, and also they propose a condition to decide whether the reordering method should be adapted or not. Finally, they propose an improved BKZ algorithm with the reordering methods and our proposed condition. Preliminary experimental results show that their proposed reordering methods can successfully reduce the number of enumeration algorithm search nodes compared to the predecessor, for example, PPR reduces around 9.6% on average in 30-dimensional random lattices, and DPR reduces around 32.8% on average in 45-dimensional random lattices.

Paper 4 by J. Lee, S. Lee, Y. S. Lee, and D. Choi suggests an efficient quantum circuit design of a given cryptographic algorithm in terms of reducing T-depth for time complexity efficiency. They propose a novel technique for reducing T-depth (and T-count) when some quantum circuits located between two Toffoli gates are interchangeable with a controlled phase gate (CP gate). They apply their technique to five types of quantum adders, reducing T-depth by more than 33%. They also present new SHA-256 quantum circuits, which have a critical path with only three quantum adders, while the critical paths of quantum circuits in the previous works consist of seven or 10 quantum adders. According to their four version of SHA-256 quantum circuit, T-depth of the proposed SHA-256 quantum circuit with the Width (the number of qubits) 797 is 16,055, which is remarkably reduced by about 85%. Another proposed quantum circuit only requires 768 qubits, which is the smallest width, to the best of their knowledge. Finally, one other version is the most time-efficient circuit with an overall Toffoli depth (and T-depth) that is less than 5000.

Paper 5 by Y. Lee, J. Kang, D. Chang, and S. Hong presents preimage attacks on a round-reduced variant of GIMLI-HASH, in which the message-absorbing phase used 5-round GIMLI and the squeezing phase used 9-round GIMLI. They call this variant as 5-9-round GIMLI-HASH. Their preimage attack on 5-9-round GIMLI-HASH requires 294.44 time complexity and 297 memory complexity. Also, this method can be reached up to round shifted 10-round GIMLI in the squeezing phase. Their first attack requires the memory for storing several precomputation tables in GIMLI SP-box operations. In their second attack, they take a time-memory trade-off approach, reducing memory requirements for precomputation tables but increasing computing time for solving SP-box equations by the SAT solver. This attack requires 266.17 memory complexity and 296+ε time complexity, where ε is the time complexity for solving SP-box equations. Their experiments using the CryptoMiniSat SAT solver show that the maximum time complexity for ε is about 220.57 9-round GIMLI.

Paper 6 by S. Lim and D. G. Han examines a differential fault attack on the PIPO, a lightweight block cipher, which was proposed in ICISC 2020. The PIPO was designed for providing robust security strength while having less overhead when using the side-channel analysis countermeasure. A differential fault attack is a type of side-channel analysis that induces fault in cryptographic operations and utilises difference information that occurs. They proposed a single-bit flip-based differential fault attack on PIPO, where, through 64 fault ciphertexts, their proposed attack has a 98.9% probability of recovering the correct secret key of PIPO 64/128. They evaluated the proposed attack not only through simulations but also through electromagnetic fault injection.

All of the papers selected for this Special Issue show that further improvements of information security and cryptography are made in the topic areas of post-quantum cryptography and security analysis on block ciphers. Especially, various experimental results by authors will clearly show the reader how advanced their results are, compared to the current research works related to six selected papers. In the meanwhile, there are still many challenges in this field that require future research attentions, such as efficient construction of lattice-based cryptographic primitives, analysis on lattice-based reduction algorithms, and more realistic quantum attacks against post-quantum cryptographic primitives and their underlying complexity assumptions. We hope to see more advanced research results on these topics in the near future.

客座编辑:第24届信息安全与密码学国际会议论文选集(ICISC 2021)
洪对GIMLI-HASH的一个回合缩减变体提出了预图像攻击,其中消息吸收阶段使用5回合GIMLI,压缩阶段使用9回合GIMLI。他们将这种变体称为5-9周GIMLI-HASH。他们对5-9周GIMLI-HASH的图像前攻击需要294.44的时间复杂性和297的内存复杂性。此外,该方法可以在压缩阶段达到高达移位10轮的GIMLI。他们的第一次攻击需要内存来存储GIMLI SP盒操作中的几个预计算表。在他们的第二次攻击中,他们采取了时间-内存权衡方法,减少了预计算表的内存需求,但增加了SAT求解器求解SP盒方程的计算时间。该攻击需要266.17内存复杂度和296+ε时间复杂度,其中ε是求解SP盒方程的时间复杂度。他们使用CryptoMiniSat SAT解算器进行的实验表明,ε的最大时间复杂度约为220.57 9轮GIMLI。S.Lim和D.G.Han的论文6研究了ICISC 2020中提出的一种轻量级分组密码PIPO的差分故障攻击。PIPO设计用于在使用侧信道分析对策时提供强大的安全强度,同时具有较小的开销。差分故障攻击是一种侧通道分析,它在密码操作中引发故障,并利用发生的差分信息。他们提出了一种针对PIPO的基于单比特翻转的差分故障攻击,其中,通过64个故障密文,他们提出的攻击恢复PIPO 64/128的正确密钥的概率为98.9%。他们不仅通过模拟,还通过电磁故障注入对拟议的攻击进行了评估。本期特刊的所有论文都表明,在后量子密码学和分组密码安全分析的主题领域,信息安全和密码学有了进一步的改进。特别是,作者的各种实验结果将清楚地向读者展示,与目前与六篇精选论文相关的研究工作相比,他们的结果是多么先进。与此同时,该领域仍有许多挑战需要未来的研究关注,如基于格的密码原语的高效构建、基于格的约简算法的分析,以及针对后量子密码原语及其潜在复杂性假设的更现实的量子攻击。我们希望在不久的将来看到更多关于这些主题的先进研究成果。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
IET Information Security
IET Information Security 工程技术-计算机:理论方法
CiteScore
3.80
自引率
7.10%
发文量
47
审稿时长
8.6 months
期刊介绍: IET Information Security publishes original research papers in the following areas of information security and cryptography. Submitting authors should specify clearly in their covering statement the area into which their paper falls. Scope: Access Control and Database Security Ad-Hoc Network Aspects Anonymity and E-Voting Authentication Block Ciphers and Hash Functions Blockchain, Bitcoin (Technical aspects only) Broadcast Encryption and Traitor Tracing Combinatorial Aspects Covert Channels and Information Flow Critical Infrastructures Cryptanalysis Dependability Digital Rights Management Digital Signature Schemes Digital Steganography Economic Aspects of Information Security Elliptic Curve Cryptography and Number Theory Embedded Systems Aspects Embedded Systems Security and Forensics Financial Cryptography Firewall Security Formal Methods and Security Verification Human Aspects Information Warfare and Survivability Intrusion Detection Java and XML Security Key Distribution Key Management Malware Multi-Party Computation and Threshold Cryptography Peer-to-peer Security PKIs Public-Key and Hybrid Encryption Quantum Cryptography Risks of using Computers Robust Networks Secret Sharing Secure Electronic Commerce Software Obfuscation Stream Ciphers Trust Models Watermarking and Fingerprinting Special Issues. Current Call for Papers: Security on Mobile and IoT devices - https://digital-library.theiet.org/files/IET_IFS_SMID_CFP.pdf
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信