Innovative Security Solutions for Information Technology and Communications 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers
This book constitutes the thoroughly refereedpost-conference proceedings of the 8th International Conference on Security forInformation Technology and Communications, SECITC 2015, held in Bucharest, Romania,in June 2015.The 17 revised full papers were carefully reviewed andselected from 36 submissio...
        Saved in:
      
    
          | Main Authors | , , | 
|---|---|
| Format | eBook | 
| Language | English | 
| Published | 
        Cham
          Springer Nature
    
        2016
     Springer International Publishing AG Springer  | 
| Edition | 1 | 
| Series | LNCS sublibrary. SL 4, Security and cryptology | 
| Subjects | |
| Online Access | Get full text | 
| ISBN | 3319271792 9783319271798 9783319271781 3319271784  | 
Cover
                Table of Contents: 
            
                  - 3.4 Dynamic Constant Scaling in Q[x] -- 4 Application to BCH Codes -- 4.1 General Remarks -- 4.2 Implementation and Results -- A Polynomial Barrett Complexity -- B Polynomial Barrett: Scheme Code -- References -- Security Technologies for ITC -- A Cooperative Black Hole Node Detection and Mitigation Approach for MANETs -- 1 Introduction -- 1.1 Taxonomy of Security Attacks -- 2 Related Work -- 3 Proposed Detection Scheme -- 3.1 Query Packet -- 3.2 Further Route Request (FRREQ) Packet -- 3.3 Detection Algorithm -- 4 Performance Evaluation -- 4.1 Simulation Environment and Scenarios -- 4.2 Movement Model -- 4.3 Communication Model -- 4.4 Performance Metrics -- 4.5 Results and Analysis -- 5 Conclusion and Future Work -- References -- Up-High to Down-Low: Applying Machine Learning to an Exploit Database -- 1 Introduction -- 2 The Exploit Database -- 3 Applying Supervised Learning -- 3.1 Creation of the Datasets -- 3.2 Single Stage Classifier of Machine Code -- 3.3 Two Stage Meta-Classifier on Machine Code and High Level Features -- 3.4 Comparing Results -- 4 Applying Unsupervised Learning -- 4.1 Creation of the Dataset -- 4.2 Applying the SOM -- 4.3 Observed Patterns and Results -- 5 Conclusion and Future Work -- References -- Detecting Computers in Cyber Space Maliciously Exploited as SSH Proxies -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Extracted Attributes -- 3.2 Machine Learning-Based Approach -- 3.3 Matching Attributes Approach -- 4 Evaluation -- 4.1 Evaluation Environment -- 4.2 Results -- 5 Conclusion and Future Work -- References -- On a Lightweight Authentication Protocol for RFID -- 1 Introduction -- 2 Remarks on the Position Digit Algebra Function -- 3 OK-equivalence and PDAF-based NLFSR Sequences -- 4 The Protocol -- 5 Correctness, Security, and Privacy Analysis of the Protocol -- 6 Conclusions -- References
 - 5 Conclusion -- References -- A Novel Key Management for Virtually Limitless Key Size -- 1 Introduction -- 1.1 Creation of Session-Based Type of Keys -- 1.2 Discovering Types of Multimedia Files Suitable for Session-Based Type of Keys -- 1.3 Implementation with Secure and Robust Key Exchange Properties -- 1.4 Our Contributions -- 1.5 Paper Organization -- 2 Related Work -- 2.1 Related Work on Creation of Keys -- 2.2 Related Work on QR Codes -- 3 How to Measure Randomness in Different Video and Audio Media Files -- 3.1 Randomness Tests -- 3.2 Testing Environment for Randomness Tests -- 3.3 Testing Procedure -- 3.4 Test Results -- 4 Proposed Implementation for Key Exchange -- 4.1 Distribution of the ``Master'' Key -- 4.2 Distribution of the ``Master'' Key - Sender Side -- 4.3 Distribution of the ``Master'' Key - Recipient Side -- 4.4 Secret Message Communication -- 4.5 Security Analysis -- 5 Conclusion -- References -- Efficient Montgomery Multiplication on GPUs -- 1 Introduction -- 1.1 Related Work -- 2 Preliminaries -- 2.1 Montgomery Multiplication -- 2.2 Binary Exponentiation -- 2.3 Montgomery's Ladder Technique -- 2.4 Compute Unified Device Architecture (CUDA) -- 3 Implementation and Results -- 3.1 Results -- 4 Conclusions -- References -- Stateful Certificateless Public Key Encryption with Application in Public Cloud -- 1 Introduction -- 2 Preliminaries -- 2.1 Review of Computational Assumptions -- 2.2 Framework for Stateful CLE -- 2.3 Security Model for CLE -- 3 Our Scheme - StCLE -- 3.1 Security Proof -- 4 Conclusion -- References -- Applying Cryptographic Acceleration Techniques to Error Correction -- 1 Introduction -- 2 Barrett's Reduction Algorithm -- 2.1 Dynamic Constant Scaling -- 3 Barrett's Algorithm for Polynomials -- 3.1 Orders -- 3.2 Terminology -- 3.3 Barrett's Algorithm for Multivariate Polynomials
 - 5.1 Key Space -- 5.2 Known Plaintext and Chosen Plaintext Analysis -- 5.3 Histogram Analysis -- 5.4 Information Entropy Analysis -- 5.5 Correlation Analysis -- 6 Conclusions -- 7 Future Work -- References -- Evaluation of Lightweight Block Ciphers for Embedded Systems -- 1 Introduction -- 2 Related Work -- 3 Block Ciphers -- 3.1 AES -- 3.2 TEA and xTEA -- 3.3 Simon and Speck -- 4 Testing Environments -- 5 Experimental Results -- 5.1 Performance Evaluation -- 6 Conclusions and Future Work -- References -- CART Versus CHAID Behavioral Biometric Parameter Segmentation Analysis -- 1 Introduction -- 2 Methodology and Related Work Analysis -- 2.1 Methodology -- 2.2 Related Work Analysis -- 3 Experimental Results -- 4 Conclusion -- References -- SCA Resistance Analysis on FPGA Implementations of Sponge Based MAC-PHOTON -- 1 Introduction -- 2 Technical Background -- 2.1 PHOTON Description -- 2.2 The MAC Construction -- 2.3 Side Channel Analysis -- 3 FPGA Implementation of the MAC-PHOTON-80/20/16 -- 4 Side Channel Attack Resistance of MAC-PHOTON-80/20/16 -- 4.1 Attacking MAC-PHOTON-80/20/16 -- 4.2 Experimental Results -- 5 Threshold Implementation of the MAC-PHOTON-80/20/16 -- 6 Conclusion -- A Our Communication Interface for SASEBO-GII -- A.1 The Interface Between the Control and Cryptographic FPGAs -- A.2 The Interface Between the PC and Control FPGA -- References -- A Novel Fast and Secure Chaos-Based Algorithm for Image Encryption -- 1 Introduction -- 2 Chaotic Maps -- 2.1 Logistic Map -- 2.2 Skew Tent Map -- 3 Proposed Encryption Scheme -- 3.1 Confusion -- 3.2 Diffusion -- 3.3 Encryption Scheme -- 4 Experiments and Security Analysis -- 4.1 Visual Test -- 4.2 Histogram Analysis -- 4.3 Key Space Analysis -- 4.4 Correlation Analysis -- 4.5 Differential Attack Analysis -- 4.6 Information Entropy -- 4.7 Key Sensitivity Analysis -- 4.8 Efficiency Analysis
 - Spam Filtering Using Automated Classifying Services over a Cloud Computing Infrastructure -- 1 Introduction -- 2 Related Work -- 3 Bayes Filters for Spam Detection -- 4 Service Based Antispam Architecture -- 4.1 DataBase Layer -- 4.2 Dummy Email -- 4.3 Message Filter -- 4.4 Message Analyzer -- 4.5 Processed Data Backup -- 5 Experimental Results -- 6 Conclusions and Future Work -- References -- Contributions to Steganographic Techniques on Mobile Devices -- 1 Introduction -- 2 Related Works -- 3 Proposed Solution and Implementation -- 3.1 Design of the Application -- 3.2 Cryptographic Solution -- 3.3 Embedding Solution -- 3.4 Results -- 4 Steganalysis -- 5 Conclusions and Future Work -- References -- Secure Implementation of Stream Cipher: Trivium -- 1 Introduction -- 2 Hardware Implementation of Trivium -- 2.1 Power Consumption of Trivium -- 2.2 Attack on Trivium Hardware Implementation -- 3 Countermeasures -- 3.1 Threshold Implementation -- 3.2 Modified Trivium -- 4 Performance Comparison of Implementation Techniques -- 5 Conclusion -- References -- Fast Searching in Image Databases Using Multi-index Robust Fingerprinting -- 1 Introduction -- 2 Image Hashing Framework for Image Retrieval -- 3 Overview of Our Perceptual Fingerprinting Scheme -- 4 Multi-index Hashing Approach -- 4.1 Searching r-neighbor Hamming Codes -- 4.2 Multi-index Hashing for r-neighbor Search -- 5 Experimental Results -- 5.1 Database Experiment Setup -- 5.2 Speed-up Rate Evaluation -- 6 Conclusion -- References -- Author Index -- Blank Page
 - Intro -- Foreword -- Preface -- Organization -- Invited Talks -- Authenticated-Encryption: Security Notions, Designs and Applications -- New Results on Identity-Based Encryption from Quadratic Residuosity -- Efficient Techniques for Extracting Secrets from Electronic Devices -- Secure and Trusted Application Execution on Embedded Devices -- A Number-Theoretic Error-Correcting Code -- Contents -- Invited Talks -- Secure and Trusted Application Execution on Embedded Devices -- 1 Introduction -- 2 Embedded Computing's Security Challenges -- 2.1 Rationale for Security Considerations -- 2.2 Threat Model for Embedded Devices -- 2.3 Hardware Attacks -- 2.4 Attacks on Persistent Storage -- 2.5 Attacks on Runtime Data -- 2.6 Notion of Trust and Trustworthiness -- 2.7 Trust in Execution Environment -- 3 Trust in the Underlying Hardware -- 3.1 Countermeasure -- 4 Trusted Platform and Execution for Embedded Devices -- 4.1 Trusted Environment and Execution Manager (TEM) -- 4.2 Architecture -- 4.3 Latency Analysis -- 4.4 Performance Analysis -- 5 Conclusions -- References -- A Number-Theoretic Error-Correcting Code -- 1 Introduction -- 2 Preliminaries -- 2.1 Notations -- 2.2 Error-Correcting Codes -- 3 A New Error-Correcting Code -- 3.1 Performance of the New Error-Correcting Code for =2 -- 3.2 The Case > -- 2 -- 4 Improvement Using Smaller Primes -- 4.1 Performance -- 5 Prime Packing Encoding -- 5.1 Performance -- A Toy Example -- References -- Cryptographic Algorithms and Protocols -- Full Duplex OTP Cryptosystem Based on DNA Key for Text Transmissions -- 1 Introduction -- 2 Access to the DNA Sequences -- 3 Key Generation Method -- 4 Full Duplex OTP Transmission Cryptosystem Based on DNA Keys and its Associated Protocol -- 4.1 Encryption and Transmission of the Cryptogram -- 4.2 Reception and Decryption of the Cryptogram -- 5 Security Analysis