Security Standardisation Research: First International - download pdf or read online

By Liqun Chen, Chris Mitchell

ISBN-10: 3319140531

ISBN-13: 9783319140537

ISBN-10: 331914054X

ISBN-13: 9783319140544

This publication constitutes the complaints of the 1st foreign convention on defense Standardisation study, SSR 2014, which used to be held in London, united kingdom, in December 2014. The 14 complete papers provided during this quantity have been rigorously reviewed and chosen from 22 submissions. The papers hide a number of subject matters within the box of safeguard standardisation study, together with cryptographic overview, criteria improvement, research with formal equipment, capability destiny parts of standardisation, and bettering latest standards.

Show description

Read or Download Security Standardisation Research: First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings PDF

Best security books

Download PDF by Teri Bidwell: Hack Proofing Your Identity in the Information Age

This name offers security features collected from specialists in either the government and the personal zone to assist safe an individual's own details and resources on-line.

Download e-book for iPad: Security and democracy in Southern Africa by edited by Gavin Cawthra, Andre du Pisani and Abillah Omari.

Southern Africa has launched into one of many global? s so much formidable protection co-operation projects, trying to roll out the rules of the United countries at neighborhood degrees. This booklet examines the triangular dating among democratisation, the nature of democracy and its deficits, and nationwide defense practices and perceptions of 11 southern African states.

Download e-book for iPad: Information Security and Privacy: 5th Australasian by Adrian Spalka, Armin B. Cremers, Hartmut Lehmler (auth.), E.

This ebook constitutes the refereed complaints of the fifth Australasian convention on details protection and privateness, ACISP 2000, held in Brisbane, QLD, Australia, in July 2000. The 37 revised complete papers awarded including invited contributions have been conscientiously reviewed and chosen from a complete of eighty one submissions.

Günther Pernul, Peter Y A Ryan, Edgar Weippl's Computer Security – ESORICS 2015: 20th European Symposium on PDF

The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed complaints of the twentieth eu Symposium on examine in desktop protection, ESORICS 2015, held in Vienna, Austria, in September 2015. The fifty nine revised complete papers provided have been rigorously reviewed and chosen from 298 submissions. The papers deal with matters comparable to networks and net defense; method safety; crypto software and assaults; threat research; privateness; cloud defense; protocols and attribute-based encryption; code research and side-channels; detection and tracking; authentication; regulations; and utilized defense.

Additional info for Security Standardisation Research: First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings

Example text

Alice selects x ∈R [1, q − 1] and sends g x to Bob. Similarly, Bob selects y ∈R [1, q − 1] and sends g y to Alice. Upon receiving the sent data, Alice verifies that g y is within [2, p − 2]. This is to ensure the received element does not fall into the small subgroup of order two, which contains {1, p − 1}. Alice then computes a session key κ = H((g y )x ) = H(g xy ), where H is a secure one-way hash function. Similarly, Bob verifies that g x is within [2, p − 2]. He then computes the same session key κ = H((g x )y ) = H(g xy ).

One party sends H(H(κ)) and the other party replies with H(κ). The paper does not specify who must initiate the key confirmation and hence leaves it as a free choice for specific applications to decide. 28 3 F. F. Shahandashti Previously Reported Attacks In 2004, eight years after SPEKE was initially designed, Zhang presented an exponential-equivalence attack [8]. The attack is based on the observation that some passwords are exponentially equivalent. Hence, an active attacker can exploit that equivalence to test multiple passwords in one protocol execution.

The SPEKE protocol provides implicit authentication in one round, which is defined below. ) SPEKE (one round). Alice selects x ∈R [1, q − 1] and sends g x to Bob. Similarly, Bob selects y ∈R [1, q − 1] and sends g y to Alice. Upon receiving the sent data, Alice verifies that g y is within [2, p − 2]. This is to ensure the received element does not fall into the small subgroup of order two, which contains {1, p − 1}. Alice then computes a session key κ = H((g y )x ) = H(g xy ), where H is a secure one-way hash function.

Download PDF sample

Security Standardisation Research: First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings by Liqun Chen, Chris Mitchell


by Michael
4.5

Rated 4.62 of 5 – based on 25 votes