{"title":"On the Construction of the 4 x 4 Lightest Circulant MDS Matrices","authors":"Shiyi Zhang, Yongjuan Wang, Yang Gao, Tao Wang","doi":"10.1145/3058060.3058072","DOIUrl":"https://doi.org/10.1145/3058060.3058072","url":null,"abstract":"4 x 4 MDS (Maximal Distance Separable) matrices with few XORs have a wide range of applications in many mainstream lightweight ciphers. For 4 x 4 circulant MDS matrices over GL(4,F2), they have at least 12 XOR operations. In this paper, by traversing their structure characteristics, the utter construction and the numeration of the lightest circulant MDS matrices are firstly investigated. Then the overall structure and the diagrams of these matrices are given. Finally the characteristics of permutation group in the lightest circulant MDS matrices above are found: they possess characteristics of symmetric group S4, and for a kind of particular MDS matrices, they can even form a Klein four-group in some ways.","PeriodicalId":152599,"journal":{"name":"International Conference on Cryptography, Security and Privacy","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134269638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Covert Channel over Network Time Protocol","authors":"A. Ameri, Daryl Johnson","doi":"10.1145/3058060.3058082","DOIUrl":"https://doi.org/10.1145/3058060.3058082","url":null,"abstract":"In this paper, we scrutinize a way through which covert messages are sent and received using the Network Time Protocol (NTP), which is not easily detected since NTP should be present in most environment to synchronize the clock between clients and servers using at least one time server. We also present a proof of concept and investigate the throughput and robustness of this covert channel. This channel will use the 32 bits of fraction of seconds in timestamp to send the covert message. It also uses \"Peer Clock Precision\" field to track the messages between sender and receiver.","PeriodicalId":152599,"journal":{"name":"International Conference on Cryptography, Security and Privacy","volume":"390 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121785950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Video Dual Watermarking Algorithm Against Geometric Attack Based on Integer Wavelet and SIFT","authors":"Qingxia Gao, Zhi Li, Shuqin Chen","doi":"10.1145/3058060.3058079","DOIUrl":"https://doi.org/10.1145/3058060.3058079","url":null,"abstract":"In this paper, a video dual watermarking algorithm is presented which is based on integer wavelet and SIFT (scale invariant feature transform). Firstly, the maximum embedding intensity is acquired which is based on the visual threshold of video content by studying human visual masking model of three-dimensional motion feature in video sequence deeply, and using multiple motion characteristics. Secondly, in order to enhance the ability of resisting geometric attacks and non-geometric attacks, a video frame is divided into low frequency and medium-high frequency by integer wavelet transform, respectively in different watermarking algorithm. For medium-high frequency sub-band coefficients, an adaptive watermarking algorithm is proposed, which is based on video motion information. Then utilizing the stability of low frequency sub-band coefficients histogram under some geometric attacks such as rotation, scaling, and so on, the watermark can be embedded in its adjoining coefficients. And Finally, SIFT which has the scale invariance and direction invariance can be used as the trigger to judge whether the video is subjected to the geometric attacks. SIFT is used to correct video which is subjected to geometric attacks and use the low frequency watermarking extraction algorithm to get the water marking signals. For non-geometric attacks, the medium-high frequency watermarking extraction algorithm is used to get water marking signals. The experimental results proved that our method can more effectively resist the common attacks especially the geometrical attacks and consequently achieve higher robustness.","PeriodicalId":152599,"journal":{"name":"International Conference on Cryptography, Security and Privacy","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129297132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Communication for AMI on Basis of ECC and ESP","authors":"Xidong Zhang, Weiming Tong, Zhongwei Li","doi":"10.1145/3058060.3058071","DOIUrl":"https://doi.org/10.1145/3058060.3058071","url":null,"abstract":"The paper proposed a security communication solution which was suitable for Ethernet network in order to realize the secure transmission of the cipher texts in exchanging information process of the advanced metering infrastructure. Firstly, Ethernet communication network of advanced metering infrastructure was established based on the characteristics of high speed Ethernet communication technology, including the local Ethernet network and wide area network. Secondly, the application of elliptic curve cryptography fusion algorithm was realized by applying IPSec real-time secure communication protocol and incorporating into Ethernet/IP protocol in this paper. Finally, the Ethernet security communication network infrastructure was constructed by configuring ITU-TX.86 protocol for Ethernet/IP protocol, and the local Ethernet frames and wide area network frames was constructed for information exchange of the advanced metering infrastructure, according to the structures of ESP frames and LAPS frames. The research results show that the proposed solution which applies elliptic curve cryptography fusion algorithm and real time security protocol, and is suitable for Ethernet communication, can realize the information security exchange of the advanced metering infrastructure.","PeriodicalId":152599,"journal":{"name":"International Conference on Cryptography, Security and Privacy","volume":"165 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114368559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Online Biometric Authentication Using Subject-Specific Band Power features of EEG","authors":"Kavitha P. Thomas, A. P. Vinod, Neethu Robinson","doi":"10.1145/3058060.3058068","DOIUrl":"https://doi.org/10.1145/3058060.3058068","url":null,"abstract":"Biometric recognition of persons based on unique features extracted from brain signals is an emerging area of research nowadays, on account of the subject-specificity of human neural activity. This paper proposes an online Electroencephalogram (EEG) based biometric authentication system using band power features extracted from alpha, beta and gamma bands, when the subject is in relaxed rest state with eyes open or closed. The most distinct band features are chosen specifically for each subject which are then used to generate subject-specific template during enrollment. During online authentication, recorded test EEG pattern is matched with the respective template stored in the database and degree of matching in terms of its correlation coefficient predicts the genuineness of the claimant. A number of client and imposter authentication tests have been conducted in online framework among 6 subjects using the proposed system, and achieves an average recognition rate of 88.33% using 14 EEG channels. Experimental analysis shows the subject-specificity of distinct bands and features, and highlights the utility of subject-specific band power features in EEG-based biometric systems.","PeriodicalId":152599,"journal":{"name":"International Conference on Cryptography, Security and Privacy","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117277594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cross-site Scripting Attacks on Android Hybrid Applications","authors":"Wenying Bao, Wenbin Yao, Ming Zong, Dongbin Wang","doi":"10.1145/3058060.3058076","DOIUrl":"https://doi.org/10.1145/3058060.3058076","url":null,"abstract":"Hybrid mobile applications are coded in both standard web languages and native language. The including of web technologies results in that Hybrid applications introduce more security risks than the traditional web applications, which have more possible channels to inject malicious codes to gain much more powerful privileges. In this paper, Cross-site Scripting attacks specific to Android Hybrid apps developed with PhoneGap framework are investigated. We find out that the XSS vulnerability on Hybrid apps makes it possible for attackers to bypass the access control policies of WebView and WebKit to run malicious codes into victim's WebView. With the PhoneGap plugins, the malicious codes can steal user's private information and destroy user's file system, which are more damaging than cookie stealing.","PeriodicalId":152599,"journal":{"name":"International Conference on Cryptography, Security and Privacy","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127565621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Chandrasekar, Bharat Ramesh, V. Prabhu, S. Sajeev, Pratik K. Mohanty, G. Shobha
{"title":"Development of Intelligent Digital Certificate Fuzzer Tool","authors":"B. Chandrasekar, Bharat Ramesh, V. Prabhu, S. Sajeev, Pratik K. Mohanty, G. Shobha","doi":"10.1145/3058060.3058070","DOIUrl":"https://doi.org/10.1145/3058060.3058070","url":null,"abstract":"Present day software testing demands effective ways to find software vulnerabilities through testing. This is especially true in case of network security that employ digital certificates for authentication. Digital certificates are the de-facto standard for verification of users and an integral part of public key infrastructure used to secure channels of communication within networks. An effective approach to testing digital certificates is to implement protocol based fuzzing. Fuzzing in general terms is the process of inserting high volume of invalid or random inputs into a program with the aim of obtaining unexpected results, thus identifying errors and potential vulnerabilities. This paper aims to introduce a protocol aware, user friendly graphical user interface (GUI) based digital certificate fuzzing tool. The tool aims to provide an effective means of black box testing through the use of mutation based fuzzing and OpenSSL to create digital certificates with user provided test-case specific fields. The fuzzed certificates are used as inputs in order to expose defects in digital certificate validation systems.","PeriodicalId":152599,"journal":{"name":"International Conference on Cryptography, Security and Privacy","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132289300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ternary Linear Codes with Few Weights from Functions with Two Variables","authors":"Yongfeng Niu, Yanfeng Qi","doi":"10.1145/3058060.3058066","DOIUrl":"https://doi.org/10.1145/3058060.3058066","url":null,"abstract":"How to construct good linear codes is an important problem in coding theory. This paper considers the construction of linear codes from functions with two variables, presents a class of two-weight and three-weight ternary linear codes and employs the Gauss sums and exponential sums to determine the parameters and weight distribution of these codes. Linear codes with few weights have applications in consumer electronics, communication and date storage systems. Linear codes with two weights have applications in strongly regular graphs and linear codes with three weights can be applied in association schemes.","PeriodicalId":152599,"journal":{"name":"International Conference on Cryptography, Security and Privacy","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116379555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On A Class Pseudo-Dynamic Substitutions PD-Sbox, With A Perfect Averaged Distribution of Differentials in Static Mode of Work","authors":"S. Polikarpov, Dmitry Petrov, Alexey Kozhevnikov","doi":"10.1145/3058060.3058087","DOIUrl":"https://doi.org/10.1145/3058060.3058087","url":null,"abstract":"Paper present results of the initial analysis of class a pseudo-dynamic substitutions PD-sbox, having a perfect distribution of differentials, when averaged over all possible generated substitutions in static mode of work (in case of work with fixed values of the state of S). Search and further study of cryptographic properties of such substitutions will significantly improve the effectiveness of the pseudo-dynamic substitutions PD-sbox in symmetric crypto algorithms.","PeriodicalId":152599,"journal":{"name":"International Conference on Cryptography, Security and Privacy","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121518854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Equivalence with Output Sequence of Grain Model","authors":"Hong Wang, Jie Guan","doi":"10.1145/3058060.3058075","DOIUrl":"https://doi.org/10.1145/3058060.3058075","url":null,"abstract":"Grain is one of the hardware-oriented finalists of the eSTREAM. A generalized definition of all Grain-like stream ciphers is proposed in this paper, namely Grain Model. We construct equivalent sequences to the outputting and structures to the model, not only in key generation phase but also in initialization phase. A design proposal on tap selection and some particular properties, such us shift equivalence, one-to-one correspondence, et al. are also proposed.","PeriodicalId":152599,"journal":{"name":"International Conference on Cryptography, Security and Privacy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128214019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}