15 resultados para defensive security
em Chinese Academy of Sciences Institutional Repositories Grid Portal
Resumo:
Interpolation attack was presented by Jakobsen and Knudsen at FSE'97. Interpolation attack is effective against ciphers that have a certain algebraic structure like the PURE cipher which is a prototype cipher, but it is difficult to apply the attack to real-world ciphers. This difficulty is due to the difficulty of deriving a low degree polynomial relation between ciphertexts and plaintexts. In other words, it is difficult to evaluate the security against interpolation attack. This paper generalizes the interpolation attack. The generalization makes easier to evaluate the security against interpolation attack. We call the generalized interpolation attack linear sum attack. We present an algorithm that evaluates the security of byte-oriented ciphers against linear sum attack. Moreover, we show the relationship between linear sum attack and higher order differential attack. In addition, we show the security of CRYPTON, E2, and RIJNDAEL against linear sum attack using the algorithm.
Resumo:
Password authentication has been adopted as one of the most commonly used solutions in network environment to protect resources from unauthorized access. Recently, Lee–Kim–Yoo [S.W. Lee, H.S. Kim, K.Y. Yoo, Improvement of Chien et al.'s remote user authentication scheme using smart cards, Computer Standards & Interfaces 27 (2) (2005) 181–183] and Lee-Chiu [N.Y. Lee, Y.C. Chiu, Improved remote authentication scheme with smart card, Computer Standards & Interfaces 27 (2) (2005) 177–180] respectively proposed a smart card based password authentication scheme. We show that these two schemes are both subject to forgery attacks provided that the information stored in the smart card is disclosed by the adversary. We also propose an improved scheme with formal security proof.
Resumo:
IEEE Computer Society
Resumo:
National Natural Science Foundation of China; Dalian University of Technology
Resumo:
The ecological interaction of brown algae are important as these macroalgae are common and often keystone members in many benthic marine communities.This review highlights their chemical interactions,particularly with potential herbivores,but also with fouling oranganisms,with potential pathogens,with each other as gametes,and with their microenvironments when they are spores.Phlorotannins,which are phenolic compounds unique to brown algae,have been studied hesvily in many of these respects and sre highlightes here.This includes recent controversy about their roles as defences against herbivory,as well as new understanding of their roles in primary cellular functions that may,in many instances,be more important than ,and which at least have to be considered in convert with,any possible ecological functions.Brown algae have also been useful models for testing theoties about the evolution of and ecological constraints on chemical defence.Furthermore,their mocroscopic motile gametes and spores have the ability to react to their chemical environments behavirourally.
Resumo:
IEEE Reliabil Soc, Shanghai Jiao Tong Univ