Vai al contenuto principale della pagina

Security, Privacy, and Applied Cryptography Engineering : 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings / / edited by Rajat Subhra Chakraborty, Peter Schwabe, Jon Solworth



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Titolo: Security, Privacy, and Applied Cryptography Engineering : 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings / / edited by Rajat Subhra Chakraborty, Peter Schwabe, Jon Solworth Visualizza cluster
Pubblicazione: Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Edizione: 1st ed. 2015.
Descrizione fisica: 1 online resource (XVIII, 373 p. 88 illus. in color.)
Disciplina: 005.82
Soggetto topico: Computer security
Computer communication systems
Data encryption (Computer science)
Management information systems
Computer science
Algorithms
Systems and Data Security
Computer Communication Networks
Cryptology
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Persona (resp. second.): ChakrabortyRajat Subhra
SchwabePeter
SolworthJon
Note generali: Includes index.
Nota di contenuto: Intro -- Preface -- Message from the General Chairs -- SPACE 2015 -- Abstracts of Invited Talks -- Boring Crypto -- Introduction to Security Analysis of Crypto APIs -- The Tor Network: Free Software for a Free Society -- Post-Quantum Cryptography -- Inferring Programmer Expectations to Protect Program Execution -- Side Channel Attacks: Types, Methods and Countermeasures -- Contents -- Efficient Protocol for Authenticated Email Search -- 1 Introduction -- 2 Preliminaries -- 2.1 Cryptographic Primitives and Complexity Assumptions -- 2.2 Authenticated Data Structure -- 2.3 System Overview -- 3 Proposed Protocol -- 3.1 Setup -- 3.2 Update -- 3.3 Intersection -- 3.4 Union -- 3.5 Composite Query -- 4 Comparison -- 4.1 Analytical Comparison -- 4.2 Experimental Results -- 5 Conclusion -- Analyzing Traffic Features of Common Standalone DoS Attack Tools -- 1 Introduction -- 2 Related Work -- 3 Experiment -- 3.1 DoS Tools Selection -- 3.2 Environment -- 3.3 Measurement -- 4 DoS Traffic Properties -- 4.1 Traffic Burst Behavior -- 4.2 Flow Count -- 4.3 Flow Parallelity -- 4.4 HTTP Requests Per Flow -- 4.5 HTTP Request URIs -- 4.6 Flow Packet Count -- 5 Discussion -- 5.1 Traffic Features and Aggregation -- 5.2 Repeating Patterns -- 5.3 Evasion Techniques -- 5.4 Future Work -- 6 Conclusions -- Design of Cyber Security for Critical Infrastructures: A Case for a Schizoid Design Approach -- Introduction -- Goals of Designing a Virtual SCADA Lab -- Virtual SCADA Testbed Design Methodology -- Distributed VSCADA Testbed System Architecture Design -- VSCADA Backend Architecture Design -- VSCADA Frontend Architecture Design -- Network Simulation/Emulation Architecture Design -- VSCADA Implementation -- Human Machine Interface (HMI) -- SCADA Master Control Server -- Communication Protocol -- Linux Containers/NS2 Interface -- Software Simulators.
Cyber Security Case Study -- Network Security Scenario -- Data Injection Attack Implementation -- Conclusion -- Designing for Attack Surfaces: Keep Your Friends Close, but Your Enemies Closer -- 1 Introduction -- 2 Background -- 2.1 System Configuration -- 2.2 Trends in System Configuration -- 3 Attack Surfaces -- 4 Proposed Approach -- 5 Deploying the Approach -- 5.1 Hierarchical State Machine Model -- 5.2 Proposing Attack Surfaces -- 5.3 Finding Flow Errors -- 5.4 Mediating Flow Errors -- 5.5 Testing the Resulting System -- 6 Conclusions -- Improving Application Security through TLS-Library Redesign -- Introduction -- Related Work -- API Pitfalls -- Improved APIs and Static Analysis -- Privilege Separation -- Specialized Cryptographic Key Isolation -- Threat Model -- Design of libtlssep -- Libtlssep Architecture -- LibtlssepAPI and Configuration -- Security, Programmability, and Performance -- Security Benefits of libtlssep's API and Architecture -- Programmability -- Performance -- Conclusion -- How Not to Combine RC4 States -- 1 Introduction -- 1.1 Contribution and Organization of the Paper -- 2 Description and Analysis of the RC4B Stream Cipher -- 2.1 Description of RC4B -- 2.2 Analysis of RC4B -- 3 Description and Analysis of Quad-RC4 and m-RC4 Stream Ciphers -- 3.1 Description of Quad-RC4 -- 3.2 Analysis of Quad-RC4 -- 3.3 Description of m-RC4 -- 3.4 Analysis for Even m -- 3.5 Analysis for General m -- 3.6 The Flaws in the Design -- 4 Experimental Results -- 5 Conclusion -- Preimage Analysis of the Maelstrom-0 Hash Function -- 1 Introduction -- 2 Related Work -- 3 Specifications of Maelstrom-0 -- 4 Pseudo Preimage Attack on the 6-Round Reduced Compression Function -- 5 Preimage of the Maelstrom-0 Hash Function -- 6 Conclusion -- Meet-in-the-Middle Attacks on Round-Reduced Khudra -- 1 Introduction -- 2 Specifications of Khudra -- 2.1 Notations.
3 MitM Attacks on Round-Reduced Khudra -- 3.1 A MitM Attack on 13-Round Khudra -- 3.2 A MitM Attack on 14-Round Khudra -- 4 Conclusion and Discussion -- Improved Key Recovery Attack on Round-reduced Hierocrypt-L1 in the Single-Key Setting -- 1 Introduction -- 2 Specification of Hierocrypt-L1 -- 3 A Differential Enumeration MitM Attack on HC-L1 -- 4 Conclusion -- S-boxes, Boolean Functions and Codes for the Resistance of Block Ciphers to Cryptographic Attacks, with or without Side Channels -- Introduction -- Known S-boxes with Good Properties -- The Case m
Evaluating the Security of the Infective Countermeasure against DFA -- Security against Single Fault Injections -- Security against Multiple Fault Injection -- Instruction Skip Threats to the Infective Countermeasure -- Possible Attacks on the Infective Countermeasure: Affecting Flow Sequence -- The Instruction Skip Fault Model -- Instruction Skip Attack on the Infective Countermeasure -- The Information Leakage : A Formal Quantification -- The Loopholes in the Infective Countermeasure : A Closer Look -- A Modified Infective Countermeasure -- Instruction Skip Attack on the Modified Algorithm -- Simulation and Experimental Results -- Simulation Results -- Experimental Results -- Conclusions -- Security of the Bit String cstr in the Modified Countermeasure -- Modified Transparency Order Property: Solution or Just Another Attempt -- Introduction -- Related Work -- Our Contributions -- Preliminaries -- Optimal S-boxes -- Cryptographic Properties of S-boxes -- Affine Equivalence -- Generating S-boxes -- Random Search -- Genetic Algorithm -- Evolved S-boxes -- Affine Transformations -- Success Rate Evaluation of DPA Attacks on the Synthesized S-boxes -- Conclusion -- Investigating SRAM PUFsin large CPUs and GPUs -- 1 Introduction -- 2 Experimental Setup for the CPU -- 3 CPU Registers -- 3.1 Boot Process -- 3.2 Kernel -- 3.3 GRUB -- 3.4 Coreboot -- 4 CPU Cache -- 4.1 Cache Operation -- 4.2 Coreboot -- 5 GPU Experimental Setup -- 6 GPU Multiprocessor Shared Memory -- 7 Discussion -- 7.1 Future Work -- Reconfigurable LUT: A Double Edged Sword for Security-Critical Applications -- Introduction -- Rationale of the RLUT -- Comparison with Dynamic Configuration -- RLUT and Security -- Destructive Applications of RLUT -- Adversary Model -- Trigger Design the Hardware Trojans -- Trojan Description -- Constructive Applications for RLUT -- Customizable Sboxes.
Sbox Scrambling for DPA Resistance -- Conclusions -- Trigger Generation for Hardware Trojans -- Architecture Considerations for Massively Parallel Hardware Security Platform -- Introduction -- Cryptography as a Service (CaaS) -- Levels of Trust and Security -- Usage Scenarios -- Typical Operations Needed for CaaS -- Preferred Properties of Cloud-Based High-Performance CaaS -- Building Hardware for CaaS Back-End -- Designing CaaS -- The Proposed Design -- Why Smart Cards? -- The Case Study: HMAC-Based One-Time Password -- Why Would HOTP Will Benefit from CaaS? -- Moving HOTP into CaaS -- HOTP Implementation -- Performance Results - A Single Card -- Improving Expected Performance -- Performance Results - Network of Processors -- Future Directions -- Conclusions -- Efficient and Secure Elliptic Curve Cryptography for 8-bit AVR Microcontrollers -- Introduction 2 pg -- Side-Channel Analysis on the AVR 1 pg -- Timing Analysis -- Simple Power Analysis -- Prime Field Arithmetic -- Arithmetic Modulo Ed25519 Group Order -- Scalar Multiplication -- Extended Twisted Edwards Coordinates -- Variable-Base Scalar Multiplication -- Flash Memory Address Leakage Through Power -- Fixed-Base ECSM for Ed25519 Key Generation and Signing -- Projective Coordinate Randomization -- Hashing and PRNG -- Elliptic Curve Protocols -- Benchmarking Results 1 pg -- Timing and Simple Power Analysis Leakage Evaluation -- Application of CRI's Methodology to ECC -- Measurement Setup and Capture of Power Traces -- SPA Leakage Analysis -- Side-Channel Analysis Results 1 pg -- Conclusion -- ATmega328P Microcontroller and Chipwhisperer -- Algorithms -- Towards Practical Attribute-Based Signatures -- 1 Introduction -- 2 About IRMA -- 3 IRMA's Selective Disclosure Proofs as Digital Signatures -- 3.1 IRMA Signature Scheme.
3.2 Diversification between SD Proofs Used for Authentication and Signatures.
Sommario/riassunto: This book constitutes the refereed proceedings of the 5th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2015, held in Jaipur, India, in October 2015. The 17 full papers presented in this volume were carefully reviewed and selected from 57 submissions. The book also contains 4 invited talks in full-paper length. The papers are devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering.
Titolo autorizzato: Security, privacy, and applied cryptography engineering  Visualizza cluster
ISBN: 3-319-24126-5
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910483202903321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Security and Cryptology ; ; 9354