期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Dependence-Induced Risk: Security Metrics and Their Measurement Framework 被引量:2
1
作者 Liqiang Zhang Fei Yan +1 位作者 Bo Zhao Shouhuai Xu 《China Communications》 SCIE CSCD 2016年第11期119-128,共10页
Despite the tremendous effort made by industry and academia,we are still searching for metrics that can characterize Cyberspace and system security risks. In this paper,we study the class of security risks that are in... Despite the tremendous effort made by industry and academia,we are still searching for metrics that can characterize Cyberspace and system security risks. In this paper,we study the class of security risks that are inherent to the dependence structure in software with vulnerabilities and exhibit a "cascading" effect. We present a measurement framework for evaluating these metrics,and report a preliminary case study on evaluating the dependence-induced security risks in the Apache HTTP Server. The experiment results show that our framework can not only clearly analyze the root cause of the security risks but also quantitatively evaluate the attack consequence of the risks. 展开更多
关键词 Cyberspace security security metrics exploitability surface attack conse quence risk assessment
下载PDF
Evolutionary Cryptography Theory-Based Generating Method for Secure ECs 被引量:3
2
作者 Chao Wang Feng Hu +1 位作者 Huanguo Zhang Jie Wu 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2017年第5期499-510,共12页
Ant Colony Optimization (AGO) has the character of positive feedback, distributed searching, and greedy searching. It is applicable to optimization grouping problems. Traditional cryptographic research is mainly bas... Ant Colony Optimization (AGO) has the character of positive feedback, distributed searching, and greedy searching. It is applicable to optimization grouping problems. Traditional cryptographic research is mainly based on pure mathematical methods which have complicated theories and algorithm. It seems that there is no relationship between cryptography and ACO. Actually, some problems in cryptography are due to optimization grouping problems that could be improved using an evolutionary algorithm. Therefore, this paper presents a new method of solving secure curve selection problems using ACO. We improved Complex Multiplication (CM) by combining Evolutionary Cryptography Theory with Weber polynomial solutions. We found that ACO makes full use of valid information generated from factorization and allocates computing resource reasonably. It greatly increases the performance of Weber polynomial solutions. Compared with traditional CM, which can only search one root once time, our new method searches all roots of the polynomial once, and the average time needed to search for one root reduces rapidly. The more roots are searched, the more ECs are obtained. 展开更多
关键词 ECS Weber polynomial evolutionary algorithm ant algorithm complex multiplication
原文传递
Simple Method for Realizing Weil Theorem in Secure ECC Generation 被引量:2
3
作者 Feng Hu Chao Wang +1 位作者 Huanguo Zhang Jie Wu 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2017年第5期511-519,共9页
How to quickly compute the number of points on an Elliptic Curve (EC) has been a longstanding challenge. The computational complexity of the algorithm usually employed makes it highly inefficient. Unlike the general... How to quickly compute the number of points on an Elliptic Curve (EC) has been a longstanding challenge. The computational complexity of the algorithm usually employed makes it highly inefficient. Unlike the general EC, a simple method called the Weil theorem can be used to compute the order of an EC characterized by a small prime number, such as the Kobltiz EC characterized by two. The fifteen secure ECs recommended by the National Institute of Standards and Technology (NIST) Digital Signature Standard contain five Koblitz ECs whose maximum base domain reaches 571 bits. Experimental results show that the computation speed decreases for base domains exceeding 600 bits. In this paper, we propose a simple method that combines the Weil theorem with Pascals triangle, which greatly reduces the computational complexity. We have validated the performance of this method for base fields ranging from 2l^100 to 2^1000. Furthermore, this new method can be generalized to any ECs characterized by any small prime number. 展开更多
关键词 Elliptic Curves (ECs) Pascal's triangle Weil theorem
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部