Cryptography最新文献

筛选
英文 中文
Detecting Smart Contract Vulnerabilities with Combined Binary and Multiclass Classification 结合二元和多类分类检测智能合约漏洞
IF 1.6
Cryptography Pub Date : 2023-07-07 DOI: 10.3390/cryptography7030034
Anzhelika Mezina, A. Ometov
{"title":"Detecting Smart Contract Vulnerabilities with Combined Binary and Multiclass Classification","authors":"Anzhelika Mezina, A. Ometov","doi":"10.3390/cryptography7030034","DOIUrl":"https://doi.org/10.3390/cryptography7030034","url":null,"abstract":"The development of Distributed Ledger Technology (DLT) is pushing toward automating decentralized data exchange processes. One of the key components of this evolutionary step is facilitating smart contracts that, in turn, come with several additional vulnerabilities. Despite the existing tools for analyzing smart contracts, keeping these systems running and preserving performance while maintaining a decent level of security in a constantly increasing number of contracts becomes challenging. Machine Learning (ML) methods could be utilized for analyzing and detecting vulnerabilities in DLTs. This work proposes a new ML-based two-phase approach for the detection and classification of vulnerabilities in smart contracts. Firstly, the system’s operation is set up to filter the valid contracts. Secondly, it focuses on detecting a vulnerability type, if any. In contrast to existing approaches in this field of research, our algorithm is more focused on vulnerable contracts, which allows to save time and computing resources in the production environment. According to the results, it is possible to detect vulnerability types with an accuracy of 0.9921, F1 score of 0.9902, precision of 0.9883, and recall of 0.9921 within reasonable execution time, which could be suitable for integrating existing DLTs.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":" ","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44606324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Threshold Lattice-Based Signature Scheme for Authentication by Wearable Devices 基于阈值格的可穿戴设备认证签名方案
IF 1.6
Cryptography Pub Date : 2023-07-04 DOI: 10.3390/cryptography7030033
A. Leevik, Vadim V. Davydov, S. Bezzateev
{"title":"Threshold Lattice-Based Signature Scheme for Authentication by Wearable Devices","authors":"A. Leevik, Vadim V. Davydov, S. Bezzateev","doi":"10.3390/cryptography7030033","DOIUrl":"https://doi.org/10.3390/cryptography7030033","url":null,"abstract":"This paper presents a new threshold signature scheme based on Damgaard’s work. The proposed scheme allows for changing the message signature threshold, thereby improving the flexibility of the original Damgaard scheme. This scheme can be applied as a user authentication system using wearable devices. Based on the hardness of lattice problems, this scheme is resistant to attacks on a quantum computer, which is an advantage over the currently used multi-factor authentication schemes. The scheme’s security relies on the computational complexity of the Module-LWE and Module-SIS problems, as well as the Shamir secret sharing scheme’s security.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":" ","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46135744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Linear Cryptanalysis of Reduced-Round Simeck Using Super Rounds 利用超轮对约轮Simeck进行线性密码分析
Cryptography Pub Date : 2023-02-09 DOI: 10.3390/cryptography7010008
Reham Almukhlifi, Poorvi L. Vora
{"title":"Linear Cryptanalysis of Reduced-Round Simeck Using Super Rounds","authors":"Reham Almukhlifi, Poorvi L. Vora","doi":"10.3390/cryptography7010008","DOIUrl":"https://doi.org/10.3390/cryptography7010008","url":null,"abstract":"The Simeck family of lightweight block ciphers was proposed by Yang et al. in 2015, which combines the design features of the NSA-designed block ciphers Simon and Speck. Previously, we proposed the use of linear cryptanalysis using super-rounds to increase the efficiency of implementing Matsui’s second algorithm and achieved good results on all variants of Simon. The improved linear attacks result from the observation that, after four rounds of encryption, one bit of the left half of the state of the cipher depends on only 17 key bits (19 key bits for the larger variants of the cipher). We were able to follow a similar approach, in all variants of Simeck, with an improvement in Simeck 32 and Simeck 48 by relaxing the previous constraint of a single active bit, using multiple active bits instead. In this paper we present improved linear attacks against all variants of Simeck: attacks on 19-rounds of Simeck 32/64, 28-rounds of Simeck 48/96, and 34-rounds of Simeck 64/128, often with the direct recovery of the full master key without repeating the attack over multiple rounds. We also verified the results of linear cryptanalysis on 8, 10, and 12 rounds for Simeck 32/64.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":"58-60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136155883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards Accurate Run-Time Hardware-Assisted Stealthy Malware Detection: A Lightweight, yet Effective Time Series CNN-Based Approach 走向精确的运行时硬件辅助隐形恶意软件检测:一种轻量级,但有效的基于cnn的时间序列方法
IF 1.6
Cryptography Pub Date : 2021-10-17 DOI: 10.3390/cryptography5040028
H. Sayadi, Yifeng Gao, Hosein Mohammadi Makrani, Jessica Lin, Paulo Cesar G. da Costa, S. Rafatirad, H. Homayoun
{"title":"Towards Accurate Run-Time Hardware-Assisted Stealthy Malware Detection: A Lightweight, yet Effective Time Series CNN-Based Approach","authors":"H. Sayadi, Yifeng Gao, Hosein Mohammadi Makrani, Jessica Lin, Paulo Cesar G. da Costa, S. Rafatirad, H. Homayoun","doi":"10.3390/cryptography5040028","DOIUrl":"https://doi.org/10.3390/cryptography5040028","url":null,"abstract":"According to recent security analysis reports, malicious software (a.k.a. malware) is rising at an alarming rate in numbers, complexity, and harmful purposes to compromise the security of modern computer systems. Recently, malware detection based on low-level hardware features (e.g., Hardware Performance Counters (HPCs) information) has emerged as an effective alternative solution to address the complexity and performance overheads of traditional software-based detection methods. Hardware-assisted Malware Detection (HMD) techniques depend on standard Machine Learning (ML) classifiers to detect signatures of malicious applications by monitoring built-in HPC registers during execution at run-time. Prior HMD methods though effective have limited their study on detecting malicious applications that are spawned as a separate thread during application execution, hence detecting stealthy malware patterns at run-time remains a critical challenge. Stealthy malware refers to harmful cyber attacks in which malicious code is hidden within benign applications and remains undetected by traditional malware detection approaches. In this paper, we first present a comprehensive review of recent advances in hardware-assisted malware detection studies that have used standard ML techniques to detect the malware signatures. Next, to address the challenge of stealthy malware detection at the processor’s hardware level, we propose StealthMiner, a novel specialized time series machine learning-based approach to accurately detect stealthy malware trace at run-time using branch instructions, the most prominent HPC feature. StealthMiner is based on a lightweight time series Fully Convolutional Neural Network (FCN) model that automatically identifies potentially contaminated samples in HPC-based time series data and utilizes them to accurately recognize the trace of stealthy malware. Our analysis demonstrates that using state-of-the-art ML-based malware detection methods is not effective in detecting stealthy malware samples since the captured HPC data not only represents malware but also carries benign applications’ microarchitectural data. The experimental results demonstrate that with the aid of our novel intelligent approach, stealthy malware can be detected at run-time with 94% detection performance on average with only one HPC feature, outperforming the detection performance of state-of-the-art HMD and general time series classification methods by up to 42% and 36%, respectively.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":"5 1","pages":"28"},"PeriodicalIF":1.6,"publicationDate":"2021-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69570616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Cryptographic Techniques Based on Bio-Inspired Systems 基于仿生系统的密码技术
IF 1.6
Cryptography Pub Date : 2020-01-01 DOI: 10.4018/978-1-4666-9474-3.CH003
P. Anghelescu
{"title":"Cryptographic Techniques Based on Bio-Inspired Systems","authors":"P. Anghelescu","doi":"10.4018/978-1-4666-9474-3.CH003","DOIUrl":"https://doi.org/10.4018/978-1-4666-9474-3.CH003","url":null,"abstract":"In this chapter, bio-inspired techniques based on the cellular automata (CAs) and programmable cellular automata (PCAs) theory are used to develop information security systems. The proposed cryptosystem is composed from a combination of a CA as a pseudorandom number generator (PRNG) and a PCA that construct the ciphering functions of the designed enciphering scheme. It is presented how simple elements named „cells” interact between each other using certain rules and topologies to form a larger system that can be used to encrypt/decrypt data sent over network communication systems. The proposed security system was implemented in hardware in FPGA devices of type Spartan 3E – XC3S500E and was analyzed and verified, including NIST statistical tests, to assure that the system has good security and high speed. The experimental results proves that the cryptographic techniques based on bio-inspired algorithms provides an alternative to the conventional techniques (computational methods).","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":"1 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70429091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DNA Sequence Based Cryptographic Solution for Secure Image Transmission 基于DNA序列的安全图像传输加密方案
IF 1.6
Cryptography Pub Date : 2020-01-01 DOI: 10.4018/978-1-5225-0105-3.CH021
Grasha Jacob, M. Annamalai
{"title":"DNA Sequence Based Cryptographic Solution for Secure Image Transmission","authors":"Grasha Jacob, M. Annamalai","doi":"10.4018/978-1-5225-0105-3.CH021","DOIUrl":"https://doi.org/10.4018/978-1-5225-0105-3.CH021","url":null,"abstract":"With the advent of electronic transactions, images transmitted across the internet must be protected and prevented from unauthorized access. Various encryption schemes have been developed to make information intelligible only to the intended user. This chapter proposes an encryption scheme based on DNA sequences enabling secure transmission of images.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":"1 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70430879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Methodological Evaluation of Crypto-Watermarking System for Medical Images 医学图像加密水印系统的方法学评价
IF 1.6
Cryptography Pub Date : 2020-01-01 DOI: 10.4018/978-1-5225-1002-4.CH010
Anna Babu, Sonal Ayyappan
{"title":"A Methodological Evaluation of Crypto-Watermarking System for Medical Images","authors":"Anna Babu, Sonal Ayyappan","doi":"10.4018/978-1-5225-1002-4.CH010","DOIUrl":"https://doi.org/10.4018/978-1-5225-1002-4.CH010","url":null,"abstract":"Health care institution demands exchange of medical images of number of patients to sought opinions from different experts. In order to reduce storage and for secure transmission of the medical images, Crypto-Watermarking techniques are adopted. The system is considered to be combinations of encryption technique with watermarking or steganography means adopted for safe transfer of medical images along with embedding of optional medical information. The Digital Watermarking is the process of embedding data to multimedia content. This can be done in spatial as well as frequency domain of the cover image to be transmitted. The robustness against attacks is ensured while embedding the encrypted data into transform domain, the encrypted data can be any secret key for the content recovery or patient record or the image itself. This chapter presents basic aspects of crypto-watermarking technique, as an application. It gives a detailed assessment on different approaches of crypto-watermarking for secure transmission of medical images and elaborates a case study on it.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":"1 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70432121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IPHDBCM IPHDBCM
IF 1.6
Cryptography Pub Date : 2020-01-01 DOI: 10.4018/978-1-7998-1763-5.ch005
E. Babu, C. Nagaraju, M. K. Prasad
{"title":"IPHDBCM","authors":"E. Babu, C. Nagaraju, M. K. Prasad","doi":"10.4018/978-1-7998-1763-5.ch005","DOIUrl":"https://doi.org/10.4018/978-1-7998-1763-5.ch005","url":null,"abstract":"Secure communication is one of the basic requirements for any network standard. Particularly, cryptographic algorithms have gained more popularity to protect the communication in a hostile environment. As the critical information that is being transferred over the wireless adhoc networks can be easily acquired and is vulnerable to many security attacks. However, several security communication threats had been detected and defended using conventional symmetric and asymmetric cryptographic mechanism, which are too difficult and resource consuming for such mobile adhoc networks. Recently, one of the severe security threats that have to be detected and defend in any type of network topology is blackhole attack and cooperative blackhole. Because of its severity, the black hole attack has attracted a great deal of attention in the research community. Comprehensively the results of the existing system conclude that the black hole attack on various mobile adhoc networks is hard to detect and easy to implement. This paper addresses to detect and defend the blackhole attack and cooperative blackhole attack using hybrid DNA-based cryptography (HDC) mechanism. Moreover, the proposed method upsurge the security issue with the underlying AODV routing protocol. Eventually, This Hybrid DNA-based Cryptography (HDC) is one of the high potential candidates for advanced wireless ad hoc networks, which require less communication bandwidth and memory in comparison with other cryptographic systems. The simulation results of this proposed method provide better security and network performances as compared to existing schemes.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":"1 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70443009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Digital Image Steganography 数字图像隐写术
IF 1.6
Cryptography Pub Date : 2020-01-01 DOI: 10.4018/978-1-7998-1763-5.ch020
C. Dhawale, N. D. Jambhekar
{"title":"Digital Image Steganography","authors":"C. Dhawale, N. D. Jambhekar","doi":"10.4018/978-1-7998-1763-5.ch020","DOIUrl":"https://doi.org/10.4018/978-1-7998-1763-5.ch020","url":null,"abstract":"Digital data transmitted over the insecure communication can be prone to attacks. Intruders try various attacks to unauthorized access of the confidential information. The Steganography is such as security system that provide the protection to the images, text and other type of data digitally transferred through the data communication network. This chapter elaborates the basics of Digital Image Steganographic techniques from ancient era to digital edge, types of images used for the steganography, payload used for the steganography, various attacks and different algorithms that can provide the information security. The performance analysis of the various Digital Image Steganographic algorithms are discussed. The current applications and their necessities are discussed in this chapter.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":"1 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70442728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Approach of Symmetric Key Cryptography using Genetic Algorithm Implemented on GPGPU 在GPGPU上实现的一种基于遗传算法的对称密钥加密新方法
IF 1.6
Cryptography Pub Date : 2020-01-01 DOI: 10.4018/978-1-4666-8853-7.CH014
K. Srinivasa, G. Siddesh, Srinidhi Hiriyannaiah, Anusha Morappanavar, Anurag Banerjee
{"title":"A Novel Approach of Symmetric Key Cryptography using Genetic Algorithm Implemented on GPGPU","authors":"K. Srinivasa, G. Siddesh, Srinidhi Hiriyannaiah, Anusha Morappanavar, Anurag Banerjee","doi":"10.4018/978-1-4666-8853-7.CH014","DOIUrl":"https://doi.org/10.4018/978-1-4666-8853-7.CH014","url":null,"abstract":"The world of digital communication consists of various applications which uses internet as the backbone for communication. These applications consist of data related to the users of the application, which is confidential and integrity needs to be maintained to protect against unauthorized access and use. In the information hiding field of research, Cryptography is one of the wide techniques used to provide security to the internet applications that overcome the challenges like confidentiality, integrity, authentication services etc. In this paper, we present a novel approach on symmetric key cryptography technique using genetic algorithm that is implemented on CUDA architecture.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":"1 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70428863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信