{"title":"Design and Implementation of a Data Stream Anonymization Core on FPGA","authors":"Bilal Moussa, Kabalan Chaccour, Mohamad Mroue, Rachid Bouyekhf","doi":"10.1109/CSP58884.2023.00025","DOIUrl":"https://doi.org/10.1109/CSP58884.2023.00025","url":null,"abstract":"Data privacy has become the center of attention to many researchers and engineers. With high speed data transmission, data privacy can be at risk. Data stream anonymization is a fairly new and effective technique that is being currently investigated. It aims to protect data from third-party attackers. A user must keep in mind that when applying anonymization on a dataset, there will be a tradeoff between data utility and the risk of data identification. I n this paper, w e propose various anonymization cores that can be used to hide the sensitive parts of the data. The hardware implementation on FPGA of these cores is also discussed. Each implementation takes into consideration the trade-off between the throughput and the power consumption in addition to the application type and specifications. The first architecture treats a simple application where two anonymization techniques are used (i.e. Perturbation and character masking). The second implementation requires more complex anonymization techniques and extends K-anonymity criteria and L-diversity for more sensitive applications where data identification is crucial. Results are compared with existing work implementations and many improvements are applied in terms of resource utilization and throughput.","PeriodicalId":255083,"journal":{"name":"2023 7th International Conference on Cryptography, Security and Privacy (CSP)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121804471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Inference Rules for Determined Decisions in Policy-Based ABAC Enforcement Systems","authors":"Bach-Hue Pham, Toan-Thinh Truong, Minh Tran","doi":"10.1109/CSP58884.2023.00027","DOIUrl":"https://doi.org/10.1109/CSP58884.2023.00027","url":null,"abstract":"Attribute-based access control (ABAC) model manages access to resources by policies. Incoming requests must satisfy some policy to be permitted to execute. Polices and requests are based on attributes, which are basic elements for constructing four components of each one, including Subject, Environment, Resource and Action. In XACML standard, for a given request the response can be one of the following values: Permit, Deny, Not Applicable and Indeterminate. The two last values are not decisive, bring no value to the requesters. We focus on the requests received Not Applicable in this article. Modifying the polices individually or rewriting the request by reducing the resource from the original one are solutions of existing studies. We theoretically introduce inference rules, which are applied to the policy set for computing the closure of it to evaluate whether the request is responded with firmed decision of permit or deny. Our proposals guide the security administrators in building the policy set satisfying an important property called completeness - the ability to be able to give determined responses to all the possible legal requests in the real world. In addition, we find out other necessary properties of the policy set and suggest the algorithms for ensuring some of them.","PeriodicalId":255083,"journal":{"name":"2023 7th International Conference on Cryptography, Security and Privacy (CSP)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120943703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hill Cipher Modifications and Dynamic Cryptosystem Design","authors":"MengZe Hong, Wing Loon Chee","doi":"10.1109/CSP58884.2023.00036","DOIUrl":"https://doi.org/10.1109/CSP58884.2023.00036","url":null,"abstract":"This paper proposes a highly scalable dynamic cryptosystem, Modified Affine Hill Cipher (AHC-M), which effectively addresses the known vulnerabilities of the classical Hill Cipher and provides an innovative design approach to the development of modern cryptography. By analyzing the existing Hill Cipher variations, the key concepts and design principles, such as non-linear encryption, dynamic key expansion, non-square matrix algebra and dynamic cryptosystem are investigated in detail. Building on these concepts, two practical modifications are proposed that can significantly improve computational complexity and enhance security. We also propose a cryptanalysis technique by extending the chosen-plaintext attack, which can be applied to break the Affine Hill Cipher and serves as a motivation towards the proposed cryptosystem. Lastly, these concepts are generalized as the starting point for further research.","PeriodicalId":255083,"journal":{"name":"2023 7th International Conference on Cryptography, Security and Privacy (CSP)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132529587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"White-Box PRNG: A Secure Pseudo-Random Number Generator under the White-Box Attack Model","authors":"Weijie Deng","doi":"10.1109/CSP58884.2023.00020","DOIUrl":"https://doi.org/10.1109/CSP58884.2023.00020","url":null,"abstract":"The random number generator (RNG) plays a crucial role in modern cryptography. While true RNG (TRNG) is available, pseudo RNG (PRNG) is often preferred due to its better compatibility. However, PRNGs have long been vulnerable to the leakage of internal states, which compromises their properties of resilience, forward security, and backward security. Furthermore, this threat will become more prevalent as adversaries gain full control of the PRNG. Inspired by white-box cryptography, we aim to provide a definition of white-box PRNG that protects against the leakage of internal states. Additionally, we bind the white-box PRNG with a specific application to resist code-lifting attacks. We implement the white-box PRNG based on various types of white-box SM4 ciphers and measure their storage overhead and random number generation speed. Meanwhile, we evaluate the randomness of the generated numbers using randomness test standards, including NIST SP 800-90B and GM/T 0005–2021, and compare the testing results to the output of Linux entropy pool and OpenSSL.","PeriodicalId":255083,"journal":{"name":"2023 7th International Conference on Cryptography, Security and Privacy (CSP)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116893469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Search over Multi-key Homomorphically Encrypted Data","authors":"B. Ganesh, Paolo Palmieri","doi":"10.1109/CSP58884.2023.00031","DOIUrl":"https://doi.org/10.1109/CSP58884.2023.00031","url":null,"abstract":"Homomorphic Encryption (HE) is a very attractive solution to ensure privacy when outsourcing confidential data to the cloud, as it enables computation on the data without de-cryption. However HE starts to lose effectiveness when scaled to multiple parties. In this paper, we propose the first multi-key HE search and computation framework. To achieve an efficient set-up for multi-party search and compute, we explore the different approaches to multi-key HE and secure search schemes to reduce rounds of communication. We propose a novel framework to search homomorphically encrypted data outsourced to a semi-honest server and shared with multiple parties dynamically using proxy re-encryption schemes. Our framework performs search with linear search complexity with just one round of communication between the two parties. The protocol provides multi-hop ca-pabilities that enable further computations on the search results.","PeriodicalId":255083,"journal":{"name":"2023 7th International Conference on Cryptography, Security and Privacy (CSP)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128467070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Authenticated Identity-Based Encryption Scheme with Equality Test for Cloud-Based Social Network","authors":"Jiaojiao Du, Sha Ma, Tian Yang, Qiong Huang","doi":"10.1109/CSP58884.2023.00012","DOIUrl":"https://doi.org/10.1109/CSP58884.2023.00012","url":null,"abstract":"Enabling registered users to match friends with the same interest, location, etc. is the most fundamental service provided by social network. With expanding openness of social network, the amount of data is growing exponentially. Cloud computing is then introduced into social network to mitigate the issue of storing and analyzing a substantial amount of data. How to realize user matching while protecting users' privacy remains a key challenge in cloud-based social network. As a cryptography tool, identity-based encryption with equality test (IBEET) can be used to match users with the same interest, location, etc. without decrypting the corresponding ciphertexts, therefore, it can well meet the key challenge in cloud-based social network. In this article, we propose an authenticated identity-based encryption with equality test (A-IBEET) scheme based on the observation that the cloud server may recover users' private information from the ciphertexts through offline message recovery attack (OMRA). Our scheme provides stronger security guarantee for social network users by resisting against OMRA in single-server setting. It could better protect users' privacy without sacrificing efficiency compared with related works.","PeriodicalId":255083,"journal":{"name":"2023 7th International Conference on Cryptography, Security and Privacy (CSP)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116205526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jianzhou Mao, Guobin Xu, Eric Sakk, Shuangbao Paul Wang
{"title":"Quantum Key Distribution and Security Studies","authors":"Jianzhou Mao, Guobin Xu, Eric Sakk, Shuangbao Paul Wang","doi":"10.1109/CSP58884.2023.00033","DOIUrl":"https://doi.org/10.1109/CSP58884.2023.00033","url":null,"abstract":"The current development of quantum computing threatens the security of conventional encryption algorithms such as RSA. In recent years, Quantum Key Distribution (QKD) has introduced to the world of information security a viable method that is anticipated to provide security protection against the threat of quantum computing. In this paper, we investigate the protocols of the QKD system. Next, we focus on an experimental study of quantum key distribution. A physical QKD system is leveraged to assist us in further investigating quantum key distribution processes. In our study, an eavesdropper was evaluated to analyze the impact on the QKD processes. In the experimental study results, the difference in key generation, exchange, and error rates between normal and attack scenarios can be observed.","PeriodicalId":255083,"journal":{"name":"2023 7th International Conference on Cryptography, Security and Privacy (CSP)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134550363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Case Study of Internet Banking Security of Banks Operated in Bangladesh","authors":"S. M. M. Rahman, Md. Golam, Rabiul Alam","doi":"10.1109/CSP58884.2023.00019","DOIUrl":"https://doi.org/10.1109/CSP58884.2023.00019","url":null,"abstract":"Now a day, Internet Banking is a popular service for the customer of the Banks. As a convenient way of doing banking more and more customers are registering for the internet banking. The banks also getting benefits of providing services to the customer round the clock without any manual involvement of the banker. As all the services done through an automated process, the security features should be implemented properly to protect the customers for any fraudulent transactions. The system should be available round the clock and transactions should be monitors as well as the systems should also monitored for any abnormal behavior of transactions and the system. The hacker group continuously try to penetrate the system and if become successful, the bank and customer both will bear loss. for banks, if the hackers cannot be protected, the bank may go out of business. This study intends to find out the issues of different internet banking site of Bangladeshi banks and recommend the best practices for the banks to be followed to do banking business securely. This will also secure the economy of the Country as a whole, as the banking system is the key to the Financial system of a country.","PeriodicalId":255083,"journal":{"name":"2023 7th International Conference on Cryptography, Security and Privacy (CSP)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115471949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"NIC Fingerprint-Based Switch Access Control Technology","authors":"Kaiwen Sheng, Aiqun Hu, Sheng Li","doi":"10.1109/CSP58884.2023.00022","DOIUrl":"https://doi.org/10.1109/CSP58884.2023.00022","url":null,"abstract":"Almost all existing access control systems authenticate end users based on their digital characteristics, such as MAC addresses. Since digital features are easily forged, these access control systems cannot secure the network well. In this paper, we propose an access control technology based on Ethernet network interface controller (NIC) fingerprint, a physical characteristic, to achieve identity authentication. At the switch side, the physical layer signals from the terminal NIC are collected, and the fingerprint of the NIC is extracted from the physical layer signals using the least mean square error (LMS) adaptive filter. On the basis of MAC address authentication, the proxy mechanism of Remote Authentication Dial In User Service (RADIUS) protocol is adopted to add the NIC fingerprint in the password field of the RADIUS request message, which enables the authentication server to perform two-factor authentication based on the NIC fingerprint and MAC address. The experimental results showed that the recognition accuracy for 75 NICs is 96.6%. In this paper, an access control system was built using a switch, a signal collector, a proxy server and an authentication server to realize that the terminal user was allowed to access the network only when both the NIC fingerprint and the MAC address were legal, which verified the feasibility of the scheme.","PeriodicalId":255083,"journal":{"name":"2023 7th International Conference on Cryptography, Security and Privacy (CSP)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124535961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Multi-Strategy Adversarial Attack Method for Deep Learning Based Malware Detectors","authors":"Wang Yang, Fan Yin","doi":"10.1109/CSP58884.2023.00018","DOIUrl":"https://doi.org/10.1109/CSP58884.2023.00018","url":null,"abstract":"Deep learning allows building high-accuracy malware detectors without complicated feature engineering. However, research shows that the deep learning model is vulnerable and can be deceived if attackers add perturbation to input samples to craft adversarial examples deliberately. By altering the pixel values of the images, attackers have been able to generate adversarial examples that can fool state-of-the-art deep learning based image classifiers. However, Windows malware is a structured binary program file. Therefore, arbitrarily altering its contents will often break the program's functionality. In order to solve this problem, a standard but inefficient method is to run the sample in the sandbox to verify whether its functionality is preserved. This paper proposes a multi-strategy adversarial attack method, which can generate malware adversarial examples with functionality-preserving. Our method manipulates the redundant or extended space in the Windows malware binary, so it will not break functionality. Experiments show that our method has a high attack success rate and efficiency.","PeriodicalId":255083,"journal":{"name":"2023 7th International Conference on Cryptography, Security and Privacy (CSP)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128854595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}