To resist the side chaimel attacks of elliptic curve cryptography, a new fast and secure point multiplication algorithm is proposed. The algorithm is based on a particular kind of addition chains involving only additi...To resist the side chaimel attacks of elliptic curve cryptography, a new fast and secure point multiplication algorithm is proposed. The algorithm is based on a particular kind of addition chains involving only additions, providing a natural protection against side channel attacks. Moreover, the new addition formulae that take into account the specific structure of those chains making point multiplication very efficient are proposed. The point multiplication algorithm only needs 1 719 multiplications for the SAC260 of 160-bit integers. For chains of length from 280 to 260, the proposed method outperforms all the previous methods with a gain of 26% to 31% over double-and add, 16% to22% over NAF, 7% to 13% over4-NAF and 1% to 8% over the present best algorithm--double-base chain.展开更多
For the discontinuous occupancy of primary users in cognitive radio networks(CRN),the time-varying of spectrum holes becomes more and more highlighted.In the dynamic environment,cognitive users can access channels tha...For the discontinuous occupancy of primary users in cognitive radio networks(CRN),the time-varying of spectrum holes becomes more and more highlighted.In the dynamic environment,cognitive users can access channels that are not occupied by primary users,but they have to hand off to other spectrum holes to continue communication when primary users come back,which brings new security problems.Tracking user attack(TUA) is a typical attack during spectrum handoff,which will invalidate handoff by preventing user accessing,and break down the whole network.In this paper,we propose a Channel Selection Information Hiding scheme(CSIH) to defense TUA.With the proposed scheme,we can destroy the routes to the root node of the attack tree by hiding the information of channel selection and enhance the security of cognitive radio networks.展开更多
Actively taking the opportunity of participating in the Pyeongchang Winter Olympic Games held last February, the Democratic People's Republic of Korea(DPRK) launched a fierce diplomatic offensive: in March, Kim Jo...Actively taking the opportunity of participating in the Pyeongchang Winter Olympic Games held last February, the Democratic People's Republic of Korea(DPRK) launched a fierce diplomatic offensive: in March, Kim Jong-un, Chairman of the Korean Workers' Party, paid a visit to China; in April, the DPRK-ROK summit was held;and the DPRK and the US also announced that they would hold a summit in early June. Kim Jong-un has made positive moves, particularly on the nuclear issue: when visiting China, he affirmed that the DPRK would remain committed to denuclearization of the peninsula; at the Third Plenary Session of the 7 th National Congress of the Korean Workers' Party, he announced the termination of nuclear testing and the intercontinental ballistic missile(ICBM) test launches, as well as the abjuration of the nuclear testing site in the north; and later on, he affirmed with Moon Jae-in, President of the Republic of Korea(ROK), that the common goal of a nuclear free peninsula would be realized through denuclearization. This series of diplomatic moves by the DPRK has taken the world by surprise. The DPRK government's motivations are both internal and external. In their attempts to preserve and deepen the hard-won peace, and make it a true turning point in their history, the DPRK is obviously faced with multiple challenges, and a lot of work has to be done on the nuclear issue in particular.展开更多
With five thousand years of civilization, the profound traditional culture of China has cultivated generations of Chinese people to possess the spirit of manner, patience, humility, perseverance and self-improvement, ...With five thousand years of civilization, the profound traditional culture of China has cultivated generations of Chinese people to possess the spirit of manner, patience, humility, perseverance and self-improvement, which especially are expressed in the sports industry, let alone in taekwondo. Taekwondo emphasizes morality and respect for teachers. It requires practices to love the motherland, love the people, respect opponents and abide by good faith; to emphasis on inner training and spiritual cultivation; to develop noble moral characters like courtesy, patience, self-denial, humility and tolerance. Because taekwondo take footwork as the main means of attack, the atmosphere of competition will be intense and the two sides battle with wits and physical fighting with amazing destructive power and lethality. So practitioner' s inner practice and morality is particularly emphasized. Chinese traditional culture plays a vital role among it.展开更多
In this study, experiments were carried out to investigate aerodynamic characteristics of a high-speed train on viaducts in turbulent crosswinds using a 1:25 scaled sectional model wind-tunnel testing. Pressure measur...In this study, experiments were carried out to investigate aerodynamic characteristics of a high-speed train on viaducts in turbulent crosswinds using a 1:25 scaled sectional model wind-tunnel testing. Pressure measurements of two typical sections, one train-head section and one train-body section, at the windward and leeward tracks were conducted under the smooth and turbulence flows with wind attack angles between-6° and 6°, and the corresponding aerodynamic force coefficients were also calculated using the integral method. The experimental results indicate that the track position affects the mean aerodynamic characteristics of the vehicle, especially for the train-body section. The fluctuating pressure coefficients at the leeward track are more significantly affected by the bridge interference compared to those at the windward track. The effect of turbulence on the train-head section is less than that on the train-body section. Additionally, the mean aerodynamic force coefficients are almost negatively correlated to wind attack angles, which is more prominent for vehicles at the leeward track. Moreover, the lateral force plays a critical role in determining the corresponding overturning moment, especially on the train-body section.展开更多
With the rapid developments of information technology,various industries become much more dependent on networks.Driven by economic interests and the game between countries reflected by growing cyberspace confrontation...With the rapid developments of information technology,various industries become much more dependent on networks.Driven by economic interests and the game between countries reflected by growing cyberspace confrontations,evasive network attacks on information infrastructures with high-tech,high concealment and longterm sustainability become severe threats to national security.In this paper,we propose a novel two-phased method for the detection of evasive network attacks which exploit or pretend to be common legal encryption services in order to escape security inspection.Malicious communications which camouflage themselves as legal encryption application are identified in the SSL'session structure verification phase firstly,and then by serverside X.509 certificate based anomaly detection,suspicious attack behaviors are further distinguished effectively.Experiment results show that our method is very useful for detecting the network activities of certain unknown threats or new malwares.Besides,the proposed method can be applied to other similar services easily.展开更多
The security of cryptographic systems is a major concern for cryptosystem designers, even though cryptography algorithms have been improved. Side-channel attacks, by taking advantage of physical vulnerabilities of cry...The security of cryptographic systems is a major concern for cryptosystem designers, even though cryptography algorithms have been improved. Side-channel attacks, by taking advantage of physical vulnerabilities of cryptosystems, aim to gain secret information. Several approaches have been proposed to analyze side-channel information, among which machine learning is known as a promising method. Machine learning in terms of neural networks learns the signature (power consumption and electromagnetic emission) of an instruction, and then recognizes it automatically. In this paper, a novel experimental investigation was conducted on field-programmable gate array (FPGA) implementation of elliptic curve cryptography (ECC), to explore the efficiency of side-channel information characterization based on a learning vector quantization (LVQ) neural network. The main characteristics of LVQ as a multi-class classifier are that it has the ability to learn complex non-linear input-output relationships, use sequential training procedures, and adapt to the data. Experimental results show the performance of multi-class classification based on LVQ as a powerful and promising approach of side-channel data characterization.展开更多
Hash-based message authentication code(HMAC)is widely used in authentication and message integrity.As a Chinese hash algorithm,the SM3 algorithm is gradually winning domestic market value in China.The side channel sec...Hash-based message authentication code(HMAC)is widely used in authentication and message integrity.As a Chinese hash algorithm,the SM3 algorithm is gradually winning domestic market value in China.The side channel security of HMAC based on SM3(HMAC-SM3)is still to be evaluated,especially in hardware implementation,where only intermediate values stored in registers have apparent Hamming distance leakage.In addition,the algorithm structure of SM3 determines the difficulty in HMAC-SM3 side channel analysis.In this paper,a skillful bit-wise chosen-plaintext correlation power attack procedure is proposed for HMAC-SM3 hardware implementation.Real attack experiments on a field programmable gate array(FPGA)board have been performed.Experimental results show that we can recover the key from the hypothesis space of 2256 based on the proposed procedure.展开更多
基金The National Natural Science Foundation of China (No.60473029,60673072).
文摘To resist the side chaimel attacks of elliptic curve cryptography, a new fast and secure point multiplication algorithm is proposed. The algorithm is based on a particular kind of addition chains involving only additions, providing a natural protection against side channel attacks. Moreover, the new addition formulae that take into account the specific structure of those chains making point multiplication very efficient are proposed. The point multiplication algorithm only needs 1 719 multiplications for the SAC260 of 160-bit integers. For chains of length from 280 to 260, the proposed method outperforms all the previous methods with a gain of 26% to 31% over double-and add, 16% to22% over NAF, 7% to 13% over4-NAF and 1% to 8% over the present best algorithm--double-base chain.
基金the National Natural Science Foundation of China under Grant No.61172068,6137317 0.The Fundamental Research Funds for the Central Universities,Program for New Century Excellent Talents in University
文摘For the discontinuous occupancy of primary users in cognitive radio networks(CRN),the time-varying of spectrum holes becomes more and more highlighted.In the dynamic environment,cognitive users can access channels that are not occupied by primary users,but they have to hand off to other spectrum holes to continue communication when primary users come back,which brings new security problems.Tracking user attack(TUA) is a typical attack during spectrum handoff,which will invalidate handoff by preventing user accessing,and break down the whole network.In this paper,we propose a Channel Selection Information Hiding scheme(CSIH) to defense TUA.With the proposed scheme,we can destroy the routes to the root node of the attack tree by hiding the information of channel selection and enhance the security of cognitive radio networks.
文摘Actively taking the opportunity of participating in the Pyeongchang Winter Olympic Games held last February, the Democratic People's Republic of Korea(DPRK) launched a fierce diplomatic offensive: in March, Kim Jong-un, Chairman of the Korean Workers' Party, paid a visit to China; in April, the DPRK-ROK summit was held;and the DPRK and the US also announced that they would hold a summit in early June. Kim Jong-un has made positive moves, particularly on the nuclear issue: when visiting China, he affirmed that the DPRK would remain committed to denuclearization of the peninsula; at the Third Plenary Session of the 7 th National Congress of the Korean Workers' Party, he announced the termination of nuclear testing and the intercontinental ballistic missile(ICBM) test launches, as well as the abjuration of the nuclear testing site in the north; and later on, he affirmed with Moon Jae-in, President of the Republic of Korea(ROK), that the common goal of a nuclear free peninsula would be realized through denuclearization. This series of diplomatic moves by the DPRK has taken the world by surprise. The DPRK government's motivations are both internal and external. In their attempts to preserve and deepen the hard-won peace, and make it a true turning point in their history, the DPRK is obviously faced with multiple challenges, and a lot of work has to be done on the nuclear issue in particular.
文摘With five thousand years of civilization, the profound traditional culture of China has cultivated generations of Chinese people to possess the spirit of manner, patience, humility, perseverance and self-improvement, which especially are expressed in the sports industry, let alone in taekwondo. Taekwondo emphasizes morality and respect for teachers. It requires practices to love the motherland, love the people, respect opponents and abide by good faith; to emphasis on inner training and spiritual cultivation; to develop noble moral characters like courtesy, patience, self-denial, humility and tolerance. Because taekwondo take footwork as the main means of attack, the atmosphere of competition will be intense and the two sides battle with wits and physical fighting with amazing destructive power and lethality. So practitioner' s inner practice and morality is particularly emphasized. Chinese traditional culture plays a vital role among it.
基金Projects(51808563,51925808)supported by the National Natural Science Foundation of ChinaProject(KLWRTBMC18-03)supported by the Open Research Fund of the Key Laboratory of Wind Resistance Technology of Bridges of ChinaProject(2017YFB1201204)supported by the National Key R&D Program of China。
文摘In this study, experiments were carried out to investigate aerodynamic characteristics of a high-speed train on viaducts in turbulent crosswinds using a 1:25 scaled sectional model wind-tunnel testing. Pressure measurements of two typical sections, one train-head section and one train-body section, at the windward and leeward tracks were conducted under the smooth and turbulence flows with wind attack angles between-6° and 6°, and the corresponding aerodynamic force coefficients were also calculated using the integral method. The experimental results indicate that the track position affects the mean aerodynamic characteristics of the vehicle, especially for the train-body section. The fluctuating pressure coefficients at the leeward track are more significantly affected by the bridge interference compared to those at the windward track. The effect of turbulence on the train-head section is less than that on the train-body section. Additionally, the mean aerodynamic force coefficients are almost negatively correlated to wind attack angles, which is more prominent for vehicles at the leeward track. Moreover, the lateral force plays a critical role in determining the corresponding overturning moment, especially on the train-body section.
基金supported by the National Science and Technology Support Program under Grant No.2012BAH46B02 and 2012BAH45B01the National High Technology Research and Development Program(863 Program) of China under Grant No.2011AA010703the Strategic Priority Research Program of the Chinese Academy of Sciences under Grant No.XDA06030200
文摘With the rapid developments of information technology,various industries become much more dependent on networks.Driven by economic interests and the game between countries reflected by growing cyberspace confrontations,evasive network attacks on information infrastructures with high-tech,high concealment and longterm sustainability become severe threats to national security.In this paper,we propose a novel two-phased method for the detection of evasive network attacks which exploit or pretend to be common legal encryption services in order to escape security inspection.Malicious communications which camouflage themselves as legal encryption application are identified in the SSL'session structure verification phase firstly,and then by serverside X.509 certificate based anomaly detection,suspicious attack behaviors are further distinguished effectively.Experiment results show that our method is very useful for detecting the network activities of certain unknown threats or new malwares.Besides,the proposed method can be applied to other similar services easily.
文摘The security of cryptographic systems is a major concern for cryptosystem designers, even though cryptography algorithms have been improved. Side-channel attacks, by taking advantage of physical vulnerabilities of cryptosystems, aim to gain secret information. Several approaches have been proposed to analyze side-channel information, among which machine learning is known as a promising method. Machine learning in terms of neural networks learns the signature (power consumption and electromagnetic emission) of an instruction, and then recognizes it automatically. In this paper, a novel experimental investigation was conducted on field-programmable gate array (FPGA) implementation of elliptic curve cryptography (ECC), to explore the efficiency of side-channel information characterization based on a learning vector quantization (LVQ) neural network. The main characteristics of LVQ as a multi-class classifier are that it has the ability to learn complex non-linear input-output relationships, use sequential training procedures, and adapt to the data. Experimental results show the performance of multi-class classification based on LVQ as a powerful and promising approach of side-channel data characterization.
基金Project supported by the Major Program of the Ministry of Industry and Information Technology of China(No.2017ZX01030301)the Beijing Natural Science Foundation of China(No.4162053)
文摘Hash-based message authentication code(HMAC)is widely used in authentication and message integrity.As a Chinese hash algorithm,the SM3 algorithm is gradually winning domestic market value in China.The side channel security of HMAC based on SM3(HMAC-SM3)is still to be evaluated,especially in hardware implementation,where only intermediate values stored in registers have apparent Hamming distance leakage.In addition,the algorithm structure of SM3 determines the difficulty in HMAC-SM3 side channel analysis.In this paper,a skillful bit-wise chosen-plaintext correlation power attack procedure is proposed for HMAC-SM3 hardware implementation.Real attack experiments on a field programmable gate array(FPGA)board have been performed.Experimental results show that we can recover the key from the hypothesis space of 2256 based on the proposed procedure.