[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1626195.1626256acmconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
research-article

AWGN based seed for random noise generator in ParseKey+

Published: 06 October 2009 Publication History

Abstract

This research presents an enhancement in the ParseKey+ authentication scheme presented in an earlier research. Basically, ParseKey+ relies on scattering sub-keys in a block of uniformly created random noise. The sequence of noise is created using the same hash function used to create the sub-key itself. Using timestamp as seed does not help in countering replay attack in one-way encryption functions as it cannot be discovered to be compared in sequence. However, its imperfect usage causes discovering the sequence of generated random noise so that sub-keys are distinguishable. We require a pure uniform random noise to be used as seed of hash function. In this respect, Additive White Gaussian Noise (AWGN) is used to provide sequence of seeds for hash function in generating ParseKey+ noise file. Similarly, such random noise can be applied in all security schemes relying on one-way encryption algorithms or in those which need instant update of the key without having any dependency in key sequence.

References

[1]
Proakis, John G. Digital Communications (Mcgraw Hill Series in Electrical and Computer Engineering). {ed.} 4 edition. s.l.: McGraw-Hill Science/Engineering/Math, August, 2000.
[2]
Low-Power VLSI Design of LDPC Decoder Using DVFS for AWGN Channels. Wang, Weihuang, Choi, Gwan and Gunnam, K.K. 2009. pp. 51--56.
[3]
Design of High Speed AWGN Communication Channel Emulator. Emmanuel, Boutillon, Jean-Luc, Danger and Adel, Ghazel. 2, s.l.: Springer Netherlands, February 2003, Analog Integrated Circuits and Signal Processing, Vol. 34, pp. 133--142.
[4]
A Real-Time SNR Estimator for D-MPSK over Frequency-Flat Slow Fading AWGN Channels. Yair, Linn. s.l.: IEEE, 2006. IEEE Sarnoff Symposium,006. pp. 1--8.
[5]
SNR estimation for constant envelope signals in AWGN channel. Jun, Ye pei and Jilan-ping, An. s.l.: IEEE, 2005. Wireless Communications, Networking and Mobile Computing, 2005. Proceedings. 2005 International Conference on. pp. 525--528.
[6]
Efficient FPGA implementation of Gaussian noise generator for communication channel emulation. Danger, J.-L., et al. 1, 2000, IEEE International Conference on Electronics, Circuits and Systems, 2000. ICECS 2000. The 7th, Vol. 2000, pp. 366--369.
[7]
Physical-layer secrecy in AWGN via a class of chaotic DS/SS systems: analysis and design. Yongsun, Hwang and Papadopoulos, H.C. s.l.: IEEE, 2008, Computing, Communication and Networking, 2008. ICCCn 2008. International Conference on, pp. 1--6.
[8]
Cryptographic primitives based on discrete-input AWGN channels. Isaka, M. and Shimizu, Y. s.l.: IEEE, 2008. Information Theory, 2008. ISIT 2008. IEEE International Symposium. pp. 737--741.
[9]
Performance of rate compatible punctured turbo codes over AWGN channels. Kabalan, K.Y., El-Hajj, A. and Choufani, D. s.l.: IEEE, 2004. pp. 287--288.
[10]
Performance of Unequal Error Protection using Soft Output Viterbi (SOVA) Algorithm and modified SOVA in AWGN and fading channel. Ganasekaran, T., Duraiswamy, K. and Kabilan, A.P. s.l.: IEEE, 2008. Computing, Communication and Networking, 2008. ICCCn 2008. pp. 1--6.
[11]
Capacity analysis of m-user self-encoded multiple access system in AWGN channels. Jang, Won Mee and Nguyen, Lim. s.l.: IEEE, 2000. Spread Spectrum Techniques and Applications, 2000 IEEE Sixth International Symposium on. Vol. 1, pp. 216--220.
[12]
Microcontroller-based AWGNG for Security Enhancement of Embedded Real-time Web Services. Rahnama, Behnam, et al. Seattle,Washington: IEEE, 20-24 July 2009. 33rd Annual IEEE International Computer Software and Applications Conference, The Second IEEE International Workshop on Real-Time Service-Oriented Architecture and Applications. p. Accepted for publication.
[13]
Atmel. ATmega128. Atmel. {Online} http://www.atmel.com/dyn/resources/prod_documents/doc2467.pdf.
[14]
--. AT32a. Atmel. {Online} http://www.atmel.com/dyn/resources/prod_documents/doc32003.pdf.
[15]
Ross, Sheldon M. A First Course in Probability. 7th Edition. s.l.: Prentice Hall, 2001. pp. 279--281. ISBN: 0131856626.
[16]
Capacity analysis of m-user self-encoded multiple access system in AWGN channels. Mee Jang, Won and Nguyen. s.l.: IEEE, 2000. Spread Spectrum Techniques and Applications, 2000 IEEE Sixth International Symposium on. Vol. 1, pp. 216--220.
[17]
Physical-layer secrecy in AWGN via a class of chaotic DS/SS systems: analysis and design. Hwang, Yongsun and H.C., Papadopoulos,. s.l.: IEEE, 2008, Computing, Communication and Networking, 2008. ICCCn 2008. International Conference on, pp. 1--6.
[18]
Cryptographic primitives based on discrete-input AWGN channels. M, Isaka and Y, Shimizu. s.l.: IEEE, 2008. Information Theory, 2008. ISIT 2008. IEEE International Symposium. pp. 737--741.
[19]
Rivest R, Shamir A and Adelman L, "A Method for Obtaining Digital Signature and Public Key Cryptosystems", Communications of the ACM, 21, pp. 120--126, 1978.
[20]
Bahr F, Boehm M, Franke J and Kleinjung T, "For the Successful Factorization of RSA-200" www.rsasecurity.com
[21]
Biryukov, Alex; and Kushilevitz, Eyal; From Differential Cryptanalysis to Ciphertext-Only Attacks, CRYPTO 1998, pp72--88
[22]
D. Borman and Ed., "Telnet Authentication: Kerberos Version 4," RFC 1411, IETF, Jan. 1993. 3.1.1
[23]
J. Kohl and C. Neuman, "The Kerberos Network Authentication Service (V5)," RFC 1510, IETF, Sept. 1993. 3.1.1
[24]
Lamport, L. (1981). Password Authentication with Insecure Communication. Communications of the ACM, 24 (11), 770--772.
[25]
Yeh, T., Shen, H.,&Hwang, J. (2002). A secure one-time password authentication scheme using smart cards. IEICE Transaction on Communication, E85-B (11), 2515--2518.
[26]
Haller, N. (1995, February). The S/KEY one-time password system. RFC 1760, Retrieved from http://www.faqs.org/rfcs/rfc1760.html, last visited: 17/10/2007
[27]
Yum, D.H.,&Lee, P.J. (2005). Cryptanalysis of Yeh-Shen-Hwang's One-Time Password Authentication Scheme. IEICE Transactions on Communication, E88-B (4).
[28]
Xiao-rong, Cheng; Qi-yuan, Feng; Chao, Dong; Ming-quan, Zhang; Research and realization of authentication technique based on OTP and Kerberos, Proceedings of Eighth International Conference on High-Performance Computing in Asia-Pacific Region, 2005. 30 Nov.-3 Dec. 2005 Page(s):1--5 pp.
[29]
Elçi Atilla, Rahnama Behnam, Applying ParseKey+ as an approach to resolve imperfect counter utilization in IEEE802.11i, International Conference on Security of Information and Networks (SIN 2007) May 8-10, 2007, Gazimagusa, TRNC, Turkey

Cited By

View all
  • (2010)Securing RFID-based authentication systems using ParseKey+Proceedings of the 3rd international conference on Security of information and networks10.1145/1854099.1854142(212-217)Online publication date: 7-Sep-2010

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
SIN '09: Proceedings of the 2nd international conference on Security of information and networks
October 2009
322 pages
ISBN:9781605584126
DOI:10.1145/1626195
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 06 October 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. awgn
  2. imperfect use of timestamp
  3. parsekey+
  4. side channel attack

Qualifiers

  • Research-article

Conference

SIN '09
Sponsor:

Acceptance Rates

Overall Acceptance Rate 102 of 289 submissions, 35%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)2
Reflects downloads up to 21 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2010)Securing RFID-based authentication systems using ParseKey+Proceedings of the 3rd international conference on Security of information and networks10.1145/1854099.1854142(212-217)Online publication date: 7-Sep-2010

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media