2,331 research outputs found
Cloud Computing in the Quantum Era
Cloud computing has become the prominent technology of this era. Its elasticity, dynamicity, availability, heterogeneity, and pay as you go pricing model has attracted several companies to migrate their businesses' services into the cloud. This gives them more time to focus solely on their businesses and reduces the management and backup overhead leveraging the flexibility of cloud computing. On the other hand, quantum technology is developing very rapidly. Experts are expecting to get an efficient quantum computer within the next decade. This has a significant impact on several sciences including cryptography, medical research, and other fields. This paper analyses the reciprocal impact of quantum technology on cloud computing and vice versa
Constructing Optimal Authentication Codes with Perfect Multi-fold Secrecy
We establish a construction of optimal authentication codes achieving perfect
multi-fold secrecy by means of combinatorial designs. This continues the
author's work (ISIT 2009) and answers an open question posed therein. As an
application, we present the first infinite class of optimal codes that provide
two-fold security against spoofing attacks and at the same time perfect two-
fold secrecy.Comment: 4 pages (double-column); to appear in Proc. 2010 International Zurich
Seminar on Communications (IZS 2010, Zurich
Combinatorial Bounds and Characterizations of Splitting Authentication Codes
We present several generalizations of results for splitting authentication
codes by studying the aspect of multi-fold security. As the two primary
results, we prove a combinatorial lower bound on the number of encoding rules
and a combinatorial characterization of optimal splitting authentication codes
that are multi-fold secure against spoofing attacks. The characterization is
based on a new type of combinatorial designs, which we introduce and for which
basic necessary conditions are given regarding their existence.Comment: 13 pages; to appear in "Cryptography and Communications
Hardware Implementation of the GPS authentication
In this paper, we explore new area/throughput trade- offs for the Girault,
Poupard and Stern authentication protocol (GPS). This authentication protocol
was selected in the NESSIE competition and is even part of the standard ISO/IEC
9798. The originality of our work comes from the fact that we exploit a fixed
key to increase the throughput. It leads us to implement GPS using the Chapman
constant multiplier. This parallel implementation is 40 times faster but 10
times bigger than the reference serial one. We propose to serialize this
multiplier to reduce its area at the cost of lower throughput. Our hybrid
Chapman's multiplier is 8 times faster but only twice bigger than the
reference. Results presented here allow designers to adapt the performance of
GPS authentication to their hardware resources. The complete GPS prover side is
also integrated in the network stack of the PowWow sensor which contains an
Actel IGLOO AGL250 FPGA as a proof of concept.Comment: ReConFig - International Conference on ReConFigurable Computing and
FPGAs (2012
On Experience of Using Distance Learning Technologies for Teaching Cryptology
Part 3: Tools and Applications for TeachingInternational audienceThe necessity of using Distance Learning (DL) for teaching cryptology is analyzed. The modern features of applying different DL approaches to solve this task are extracted. The NRNU MEPhIâs experience in creating mass-oriented DL project called Cryptowiki.net is described; its structure and assignments implemented by the students of cryptologic courses are shown. The related works are presented. Cryptowiki.netâs difference from the analogs is stressed out. The main findings of the research are formulated in conclusion
Discrete logarithms in curves over finite fields
A survey on algorithms for computing discrete logarithms in Jacobians of
curves over finite fields
Efficient algorithms for pairing-based cryptosystems
We describe fast new algorithms to implement recent cryptosystems based on the Tate pairing. In particular, our techniques improve pairing evaluation speed by a factor of about 55 compared to previously known methods in characteristic 3, and attain performance comparable
to that of RSA in larger characteristics.We also propose faster algorithms for scalar multiplication in characteristic 3 and square root extraction
over Fpm, the latter technique being also useful in contexts other than that of pairing-based cryptography
Innovative Method of the Power Analysis
This paper describes an innovative method of the power analysis which presents the typical example of successful attacks against trusted cryptographic devices such as RFID (Radio-Frequency IDentifications) and contact smart cards. The proposed method analyzes power consumption of the AES (Advanced Encryption Standard) algorithm with neural network, which successively classifies the first byte of the secret key. This way of the power analysis is an entirely new approach and it is designed to combine the advantages of simple and differential power analysis. In the extreme case, this feature allows to determine the whole secret key of a cryptographic module only from one measured power trace. This attribute makes the proposed method very attractive for potential attackers. Besides theoretical design of the method, we also provide the first implementation results. We assume that the method will be certainly optimized to obtain more accurate classification results in the future
- âŠ