期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
On the Security of TLS Resumption and Renegotiation
1
作者 Xinyu Li Jingy Xu +1 位作者 Zhenfeng Zhang Dengguo Feng 《China Communications》 SCIE CSCD 2016年第12期176-188,共13页
The Transport Layer Security(TLS) protocol is the most important standard on the Internet for key exchange. TLS standard supports many additional handshake modes such as resumption and renegotiation besides the full h... The Transport Layer Security(TLS) protocol is the most important standard on the Internet for key exchange. TLS standard supports many additional handshake modes such as resumption and renegotiation besides the full handshake. The interaction and dependence of different modes may lead to some practical attacks on TLS. In 2014, Bhargavan et al. described a triple handshake attack on TLS 1.2 by exploiting the sequential running of three different modes of TLS, which can lead to a client impersonation attack after the third handshake. Subsequently, TLS 1.2 was patched with the extended master secret extension of RFC 7627 to prevent this attack. In this paper we introduce a new definition of "uniqueness" and present a renegotiable & resumable ACCE security model. We identify the triple handshake attack within the new model, and furthermore show TLS with the proposed fix can be proven secure in our model. 展开更多
关键词 TLS 1.2 resumption RENEGOTIATION security model
下载PDF
The theory and practice in the evolution of trusted computing 被引量:5
2
作者 Dengguo Feng Yu Qin +1 位作者 Wei Feng Jianxiong Shao 《Chinese Science Bulletin》 SCIE EI CAS 2014年第32期4173-4189,共17页
Trusted computing(TC)is an emerging technology to enhance the security of various computing platforms by a dedicated secure chip(TPM/TCM),which is widely accepted by both the industrial and academic world.This paper a... Trusted computing(TC)is an emerging technology to enhance the security of various computing platforms by a dedicated secure chip(TPM/TCM),which is widely accepted by both the industrial and academic world.This paper attempts to sketch the evolution of TC from the view of our theoretical and engineering work.In theory,we focus on protocol design and security analysis.We have proposed the first ECDAA protocol scheme based on q-SDH assumption,which highlights a new way to design direct anonymous attestation scheme.In technical evolution,we discuss the key technologies of trust chain,trusted network connection and TC testing and evaluation.We break through several key technologies such as trusted boot,OS measurement and remote attestation,and implement a TC system from TPM/TCM to network.We also design and implement a testing and evaluation system of TC platform,which is the first one put into practical application in China.Finally,with the rapid development of cloud computing and mobile applications,TC is moving toward some new directions,such as the trust in cloud and mobile environments,new TPM standard,and flexible trust execution environment trust establishment method. 展开更多
关键词 可信计算 TCM 计算平台 移动应用 TPM 安全芯片 安全分析 匿名认证
下载PDF
Formal analysis of TPM2.0 key management APIs 被引量:5
3
作者 Qianying Zhang Shijun Zhao +1 位作者 Yu Qin Dengguo Feng 《Chinese Science Bulletin》 SCIE EI CAS 2014年第32期4210-4224,共15页
The trusted platform module(TPM),a system component implemented on physical resources,is designed to enable computers to achieve a higher level of security than the security level that it is possible to achieve by sof... The trusted platform module(TPM),a system component implemented on physical resources,is designed to enable computers to achieve a higher level of security than the security level that it is possible to achieve by software alone.For this reason,the TPM provides a way to store cryptographic keys and other sensitive data in its memory,which is shielded from access by any entity other than the TPM.Users who want to use those keys and data to achieve some security goals are restricted to interact with the TPM through its APIs defined in the TPM specification.Therefore,whether the TPM can provide Protected Capabilities it claimed depends to a large extent on the security of its APIs.In this paper,we devise a formal model,which is accessible to a fully mechanized analysis,for the key management APIs in the TPM2.0 specification.We identify and formalize security properties of these APIs in our model and then successfully use the automated prover Tamarin to obtain the first mechanized analysis of them.The analysis shows that the key management subset of TPM APIs preserves the secrecy of non-duplicable keys for unbounded numbers of fresh keys and handles.The analysis also reports that the key duplication mechanism,used to duplicate a key between two hierarchies,is vulnerable to impersonation attacks,which enable an adversary to recover the duplicated key of the originating hierarchy or import his own key into the destination hierarchy.Aiming at avoiding these vulnerabilities,we proposean approach,which restricts the originating and destination TPMs to authenticate each other’s identity during duplication.Then we formally demonstrate that our approach maintains the secrecy of duplicable keys when they are duplicated. 展开更多
关键词 密钥管理 API 形式分析 自动校准装置 TPM 安全级别 物理资源 敏感数据
下载PDF
Zero-Correlation Linear Cryptanalysis of Reduced-Round SIMON 被引量:4
4
作者 于晓丽 吴文玲 +3 位作者 石振青 张建 张蕾 汪艳凤 《Journal of Computer Science & Technology》 SCIE EI CSCD 2015年第6期1358-1369,共12页
In June 2013, the U.S. National Security Agency proposed two families of lightweight block ciphers, called SIMON and SPECK respectively. These ciphers are designed to perform excellently on both hardware and software ... In June 2013, the U.S. National Security Agency proposed two families of lightweight block ciphers, called SIMON and SPECK respectively. These ciphers are designed to perform excellently on both hardware and software platforms. In this paper, we mainly present zero-correlation linear cryptanalysis on various versions of SIMON. Firstly, by using miss- in-the-middle approach, we construct zero-correlation linear distinguishers of SIMON, and zero-correlation linear attacks are presented based oi1 careful analysis of key recovery phase. Secondly, multidimensional zero-correlation linear attacks are used to reduce the data complexity. Our zero-correlation linear attacks perform better than impossible differential attacks proposed by Abed et al. in ePrint Report 2013/568. Finally, we also use the divide-and-conquer technique to improve the results of linear cryptanalysis proposed by Javad et al. in ePrint Report 2013/663. 展开更多
关键词 lightweight block cipher SIMON linear cryptanalysis ZERO-CORRELATION dual property
原文传递
Preface
5
作者 Dengguo Feng 《Chinese Science Bulletin》 SCIE EI CAS 2014年第32期4161-4162,共2页
在第二十一个世纪,网络和信息安全为到打战争的一种新生活方式和一条新途径正在成为电子空间的批评基础。从国家策略的观点,关于 Snowden 和国家安全机构棱柱的丑闻证明了所有联网因特网行为在在在信息技术(信息技术) 主导的那些国家... 在第二十一个世纪,网络和信息安全为到打战争的一种新生活方式和一条新途径正在成为电子空间的批评基础。从国家策略的观点,关于 Snowden 和国家安全机构棱柱的丑闻证明了所有联网因特网行为在在在信息技术(信息技术) 主导的那些国家边的全球世界上的监视下面的信息,通讯信息,和个人。在 2011, USA 为电子空间释放了国际策略[1 ] ,它在全球电子安全表达一个新趋势,与从防卫改变到冒犯的 US 电子安全策略。相应于这个趋势,在 USA 的军队网络战争营发射了巨大的砍的最近的年里,反对我们的公民的攻击和利用联网基础结构。他们试图严重损坏另外的国家造破坏电子武器边的批评基础结构并且…… 展开更多
关键词 网络安全策略 网络基础设施 网络空间 美国军队 网络信息 PRISM 国家战略 国家安全
下载PDF
Utilizing Probabilistic Linear Equations in Cube Attacks
6
作者 Yuan Yao Bin Zhang Wen-Ling Wu 《Journal of Computer Science & Technology》 SCIE EI CSCD 2016年第2期317-325,共9页
Cube attacks, proposed by Dinur and Shamir at EUROCRYPT 2009, have shown huge power against stream ciphers. In the original cube attacks, a linear system of secret key bits is exploited for key recovery attacks. Howev... Cube attacks, proposed by Dinur and Shamir at EUROCRYPT 2009, have shown huge power against stream ciphers. In the original cube attacks, a linear system of secret key bits is exploited for key recovery attacks. However, we find a number of equations claimed linear in previous literature actually nonlinear and not fit into the theoretical framework of cube attacks. Moreover, cube attacks are hard to apply if linear equations are rare. Therefore, it is of significance to make use of probabilistic linear equations, namely nonlinear superpolys that can be approximated by linear expressions effectively. In this paper, we suggest a way to test out and utilize these probabilistic linear equations, thus extending cube attacks to a wider scope. Concretely, we employ the standard parameter estimation approach and the sequential probability ratio test (SPRT) for linearity test in the preprocessing phase, and use maximum likelihood decoding (MLD) for solving the probabilistic linear equations in the online phase. As an application, we exhibit our new attack against 672 rounds of Trivium and reduce the number of key bits to search by 7. 展开更多
关键词 cube attack sequential probability ratio test maximum likelihood decoding Trivium
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部