Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Physical Sciences and Mathematics

On The Cca-1 Security Of Somewhat Homomorphic Encryption Over The Integers, Zhenfei Zhang, Thomas Plantard, Willy Susilo Dec 2012

On The Cca-1 Security Of Somewhat Homomorphic Encryption Over The Integers, Zhenfei Zhang, Thomas Plantard, Willy Susilo

Dr Thomas Plantard

The notion of fully homomorphic encryption is very important since it enables many important applications, such as the cloud computing scenario. In EUROCRYPT 2010, van Dijk, Gentry, Halevi and Vaikuntanathan proposed an interesting fully homomorphic encryption scheme based on a somewhat homomorphic encryption scheme using integers. In this paper, we demonstrate a very practical CCA-1 attack against this somewhat homomorphic encryption scheme. Given a decryption oracle, we show that within O(λ2) queries, we can recover the secret key successfully, where λ is the security parameter for the system.


A Generic Construction Of Dynamic Single Sign-On With Strong Security, Jinguang Han, Yi Mu, Willy Susilo, Jun Yan Dec 2012

A Generic Construction Of Dynamic Single Sign-On With Strong Security, Jinguang Han, Yi Mu, Willy Susilo, Jun Yan

Dr Jun Yan

Single Sign-On (SSO) is a core component in a federated identity management (FIM). Dynamic Single Sign-on (DSSO) is a more flexible SSO where users can change their service requirements dynamically. However, the security in the current SSO and DSSO systems remain questionable. As an example, personal credentials could be illegally used to allow illegal users to access the services. It is indeed a challenging task to achieve strong security in SSO and DSSO. In this paper, we propose a generic construction of DSSO with strong security. We propose the formal definitions and security models for SSO and DSSO, which enable …


A Study Of Information Security Awareness And Practices In Saudi Arabia, Abdulaziz Alarifi, Holly Tootell, Peter Hyland Dec 2012

A Study Of Information Security Awareness And Practices In Saudi Arabia, Abdulaziz Alarifi, Holly Tootell, Peter Hyland

Dr Holly Tootell

Although the Web, cell phoneand cloud computing put a world of information at our fingertips, that information is under constant threat from cyber vandals and hackers. While awareness of information threats is growing in the Western world, in places like Saudi Arabia, information security is very poor. Unlike Western pluralistic democracies, Saudi Arabia is a highly-censored country, with a patriarchical and tribal culture, which may influence its poor information security rating. This paper examines the level of information security awareness (ISA) among the general public in Saudi Arabia, using an anonymous online survey, based on instruments produced by the Malaysian …


On Capabilities Of Hash Domain Extenders To Preserve Enhanced Security Properties, Reza Reyhanitabar, Willy Susilo Dec 2012

On Capabilities Of Hash Domain Extenders To Preserve Enhanced Security Properties, Reza Reyhanitabar, Willy Susilo

Dr Reza Reyhanitabar

In this paper, we study property preservation capabilities of several domain extension transforms for hash functions with respect to multiple enhanced security notions. The transforms investigated include MD with strengthening padding (sMD), HAIFA, Enveloped Shoup (ESh) and Nested Linear Hash (nLH). While the first two transforms and their straightforward variants are among the most popular ones in practical hash designs including several SHA-3 candidates, the last two transforms (i.e. ESh and nLH) are mainly of a theoretical interest in the analysis of multi-property-preservation (MPP) capabilities of hash domain extenders. The security notions considered are the enhanced (or strengthened) variants of …


A Study Of Information Security Awareness And Practices In Saudi Arabia, Abdulaziz Alarifi, Holly Tootell, Peter Hyland Nov 2012

A Study Of Information Security Awareness And Practices In Saudi Arabia, Abdulaziz Alarifi, Holly Tootell, Peter Hyland

Associate Professor Peter Hyland

Although the Web, cell phoneand cloud computing put a world of information at our fingertips, that information is under constant threat from cyber vandals and hackers. While awareness of information threats is growing in the Western world, in places like Saudi Arabia, information security is very poor. Unlike Western pluralistic democracies, Saudi Arabia is a highly-censored country, with a patriarchical and tribal culture, which may influence its poor information security rating. This paper examines the level of information security awareness (ISA) among the general public in Saudi Arabia, using an anonymous online survey, based on instruments produced by the Malaysian …


Book Review Of Hacking: The Next Generation (Written By Nitesh Dhanjani, Billy Rios & Brett Hardin), Katina Michael Jun 2012

Book Review Of Hacking: The Next Generation (Written By Nitesh Dhanjani, Billy Rios & Brett Hardin), Katina Michael

Professor Katina Michael

Hacking: The Next Generation demonstrates just how hackers continue to exploit “back doors”. New ways of working and new ways of communicating have meant that the number of attack vectors continue to rise rapidly. This provides hackers with a greater number of opportunities to penetrate systems using blended approaches while organizations struggle to come up to speed with the latest technology developments and commensurate security capabilities. Dealing with anticipated threats is a lot harder than dealing with known threats.


Social-Technical Issues Facing The Humancentric Rfid Implantee Sub-Culture Through The Eyes Of Amal Graafstra, Amal Graafstra, K. Michael, M.G. Michael Jun 2010

Social-Technical Issues Facing The Humancentric Rfid Implantee Sub-Culture Through The Eyes Of Amal Graafstra, Amal Graafstra, K. Michael, M.G. Michael

Professor Katina Michael

Radio-frequency identification (RFID) tags and transponders have traditionally been used to identify domesticated animals so that they can be reunited with their owners in the event that they stray. In the late 1990s, industry started to investigate the benefits of using RFID to identifying non-living things throughout the supply chain toward new efficiencies in business operations. Not long after, people began to consider the possibilities of getting RFID tag or transponder implants for themselves. Mr Amal Graafstra of the United States is one of the first, and probably most well-known ‘do it yourselfer’ (DIY) implantees, who enjoys building customized projects …


Is Rfid Safe And Secure?, E. Latham, K. Michael Feb 2007

Is Rfid Safe And Secure?, E. Latham, K. Michael

Professor Katina Michael

No abstract provided.