By Bart Preneel (auth.), Tsuyoshi Takagi, Masahiro Mambo (eds.)

This e-book constitutes the refereed complaints of the 4th foreign Workshop on safeguard, IWSEC 2009, held in Toyama, Japan, in October 2009.

The thirteen revised complete papers awarded including 1 invited speak have been rigorously reviewed and chosen from forty six submissions. The papers are prepared in topical sections on block cipher, cryptographic protocols, contents security and intrusion detection, in addition to authentication.

Show description

Read or Download Advances in Information and Computer Security: 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009 Proceedings PDF

Similar international books

Mobile Information Systems II: IFIP International Working Conference on Mobile Information Systems, MOBIS 2005, Leeds, UK, December 6-7, 2005 (IFIP International Federation for Information Processing)

Cellular details structures II presents a set of analysis at the making plans, research, layout, development, amendment, implementation, usage, overview, and administration of cellular info platforms. The articles concentrate on the results of this learn on this planet of trade, and deal with technical matters and constraints on cellular details structures functionalities and layout.

International Assessment of Research and Development in Simulation-Based Engineering and Science

Simulation-Based Engineering and technology (Sbe&S) cuts throughout disciplines, displaying large promise in components from typhoon prediction and weather modeling to knowing the mind and the habit of diverse different complicated structures. during this groundbreaking quantity, 9 amazing leaders determine the most recent learn traits, because of fifty two website visits in Europe and Asia and countless numbers of hours of specialist interviews, and talk about the results in their findings for the USA executive.

Interactive Theorem Proving: First International Conference, ITP 2010, Edinburgh, UK, July 11-14, 2010. Proceedings

This publication constitutes the refereed lawsuits of the 1st overseas convention on Interactive Theorem proving, ITP 2010, held in Edinburgh, united kingdom, in July 2010. The 33 revised complete papers awarded have been rigorously reviewed and chosen from seventy four submissions. The papers are prepared in issues akin to counterexample iteration, hybrid process verification, translations from one formalism to a different, and cooperation among instruments.

Additional resources for Advances in Information and Computer Security: 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009 Proceedings

Example text

Let z = z (3) z (2) z (1) z (0) , where z is a 32-bit integer, z (0) is the least significant byte of z, and z (3) is the most significant byte of z. Let F denote the event (2) (1) (0) (2) (1) (0) zj+10 zj+10 zj+10 = zj−10 zj−10 zj−10 . Now, recall that zj = zj−2048 + zj−10 + g1 (zj−3 , zj−2047 ). (12) zj+10 = zj−2038 + zj + g1 (zj+7 , zj−2037 ). (13) Therefore, 44 G. Sekar and B. Preneel Observation 1: When event E occurs, it follows from (12) and (13) that zj+10 and zj−10 take the forms zj+10 = A + B + C mod 232 and zj−10 = −A + B − C mod 232 , respectively.

Zj+10(31) = zj+10(31) (from Observation 1, this probability is 1 − 2−8 given condition 1 and condition 2), (3) (3) 4. rj+10 rj = 768 + zj+10 768 + zj−10 (probability 2−20 ) or rj+10 rj = 768 + (3) (3) zj−10 768 + zj+10 (we have just observed that the two events are mutually exclusive given condition 3; their combined probability is therefore 2−20 + 2−20 = 2−19 ). Therefore, P r[S1 ] = 2−96 · 2−23 · (1 − 2−8 ) · 2−19 ≈ 2−138 . 3 This is confirmed by our simple experiments with 8-bit and 16-bit integers.

In the case of HC-256, each distinguisher requires testing the validity of 2280 equations (where each equation involves 10 keystream output bits). Another observation, made by Dunkelman in [4], shows that the keystream words of HC-128 leak information on the internal states. However, this observation has not yet been exploited to construct distinguishers or to recover the key. Zenner has presented cache-timing attacks on unprotected implementations of HC-256 that allow reconstruction of the inner state and also the key [17].

Download PDF sample

Rated 4.62 of 5 – based on 32 votes