Smooth Number Message Authentication Code in the IoT Landscape
- URL: http://arxiv.org/abs/2310.13954v1
- Date: Sat, 21 Oct 2023 09:18:17 GMT
- Title: Smooth Number Message Authentication Code in the IoT Landscape
- Authors: Eduard-Matei Constantinescu, Mohammed Elhajj, Luca Mariot,
- Abstract summary: This paper presents the Smooth Number Message Authentication Code (SNMAC) for the context of lightweight IoT devices.
The proposal is based on the use of smooth numbers in the field of cryptography, and investigates how one can use them to improve the security and performance of various algorithms or security constructs.
- Score: 0.7373617024876725
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: This paper presents the Smooth Number Message Authentication Code (SNMAC) for the context of lightweight IoT devices. The proposal is based on the use of smooth numbers in the field of cryptography, and investigates how one can use them to improve the security and performance of various algorithms or security constructs. The literature findings suggest that current IoT solutions are viable and promising, yet they should explore the potential usage of smooth numbers. The methodology involves several processes, including the design, implementation, and results evaluation. After introducing the algorithm, provides a detailed account of the experimental performance analysis of the SNMAC solution, showcasing its efficiency in real-world scenarios. Furthermore, the paper also explores the security aspects of the proposed SNMAC algorithm, offering valuable insights into its robustness and applicability for ensuring secure communication within IoT environments.
Related papers
- Developing and Evaluating Lightweight Cryptographic Algorithms for Secure Embedded Systems in IoT Devices [0.0]
The study presents novel lightweight algorithms that are founded upon the Feistel-network architecture and their safety under cryptanalytic attacks.<n>The results have shown that lightweight cryptography is an effective strategy that could be used to establish security and maintain performance in the IoT.
arXiv Detail & Related papers (2026-01-06T12:45:12Z) - Key Length-Oriented Classification of Lightweight Cryptographic Algorithms for IoT Security [0.0]
This study focuses on the security evaluation of lightweight symmetric ciphers commonly used in IoT systems.<n>Our findings indicate that key size is a critical parameter in the security of lightweight ciphers.<n> Ciphers employing keys shorter than 128 bits are considered less secure or even insecure for protecting sensitive data.
arXiv Detail & Related papers (2025-12-23T22:54:48Z) - Security-Aware Joint Sensing, Communication, and Computing Optimization in Low Altitude Wireless Networks [83.84711311344918]
Integrated sensing, communications, and computing (I SCC) is one of the core parts of Low-Altitude Wireless Networks (LAWNs)<n>This paper studies joint performance optimization of I SCC while considering secrecyness of the communications.<n>We propose a deep Q-network (DQN)-based multi-objective evolutionary algorithm, which adaptively selects evolutionary operators according to the evolving optimization objectives.
arXiv Detail & Related papers (2025-11-03T11:06:41Z) - Cross-Platform Benchmarking of the FHE Libraries: Novel Insights into SEAL and Openfhe [0.5991851254194097]
Homomorphic encryption (HE) has become a vital solution for addressing privacy concerns.
This paper provides a comprehensive evaluation of two leading HE libraries, SEAL and OpenFHE.
arXiv Detail & Related papers (2025-03-14T09:08:30Z) - Cryptanalysis via Machine Learning Based Information Theoretic Metrics [58.96805474751668]
We propose two novel applications of machine learning (ML) algorithms to perform cryptanalysis on any cryptosystem.
These algorithms can be readily applied in an audit setting to evaluate the robustness of a cryptosystem.
We show that our classification model correctly identifies the encryption schemes that are not IND-CPA secure, such as DES, RSA, and AES ECB, with high accuracy.
arXiv Detail & Related papers (2025-01-25T04:53:36Z) - Trustworthy Image Semantic Communication with GenAI: Explainablity, Controllability, and Efficiency [59.15544887307901]
Image semantic communication (ISC) has garnered significant attention for its potential to achieve high efficiency in visual content transmission.
Existing ISC systems based on joint source-channel coding face challenges in interpretability, operability, and compatibility.
We propose a novel trustworthy ISC framework that employs Generative Artificial Intelligence (GenAI) for multiple downstream inference tasks.
arXiv Detail & Related papers (2024-08-07T14:32:36Z) - Scalable Zero-Knowledge Proofs for Verifying Cryptographic Hashing in Blockchain Applications [16.72979347045808]
Zero-knowledge proofs (ZKPs) have emerged as a promising solution to address the scalability challenges in modern blockchain systems.
This study proposes a methodology for generating and verifying ZKPs to ensure the computational integrity of cryptographic hashing.
arXiv Detail & Related papers (2024-07-03T21:19:01Z) - Cryptanalysis of the SIMON Cypher Using Neo4j [0.0]
This paper introduces the novel use of knowledge graphs to identify intricate relationships between differentials in the SIMON LEA.
It allows the identification of optimal paths throughout the differentials, and increasing the effectiveness of the differential security analyses of SIMON.
arXiv Detail & Related papers (2024-05-08T00:52:57Z) - S-box Security Analysis of NIST Lightweight Cryptography Candidates: A Critical Empirical Study [0.2621434923709917]
NIST issued a call for standardization of Lightweight cryptography algorithms in 2018.
Ascon emerged as the winner of this competition.
We evaluate the S-boxes of six finalists in the NIST Lightweight Cryptography (LWC) standardization process.
arXiv Detail & Related papers (2024-04-09T07:56:52Z) - CRYPTO-MINE: Cryptanalysis via Mutual Information Neural Estimation [42.481750913003204]
Mutual Information (MI) is a measure to evaluate the efficiency of cryptosystems.
Recent advances in machine learning have enabled progress in estimating MI using neural networks.
This work presents a novel application of MI estimation in the field of cryptography.
arXiv Detail & Related papers (2023-09-14T20:30:04Z) - Zero-Effort Two-Factor Authentication Using Wi-Fi Radio Wave
Transmission and Machine Learning [0.0]
This paper presents a novel zero-effort two-factor authentication (2FA) approach that combines the unique characteristics of a users environment and Machine Learning (ML) to confirm their identity.
A prototype was developed using Raspberry Pi devices and experiments were conducted to demonstrate the effectiveness and practicality of the proposed approach.
The proposed system holds great promise in revolutionizing the field of 2FA and user authentication, offering a new era of secure and seamless access to sensitive information.
arXiv Detail & Related papers (2023-03-04T21:04:10Z) - The #DNN-Verification Problem: Counting Unsafe Inputs for Deep Neural
Networks [94.63547069706459]
#DNN-Verification problem involves counting the number of input configurations of a DNN that result in a violation of a safety property.
We propose a novel approach that returns the exact count of violations.
We present experimental results on a set of safety-critical benchmarks.
arXiv Detail & Related papers (2023-01-17T18:32:01Z) - Near-Optimal Multi-Agent Learning for Safe Coverage Control [76.99020416197631]
In multi-agent coverage control problems, agents navigate their environment to reach locations that maximize the coverage of some density.
In this paper, we aim to efficiently learn the density to approximately solve the coverage problem while preserving the agents' safety.
We give first of its kind results: near optimal coverage in finite time while provably guaranteeing safety.
arXiv Detail & Related papers (2022-10-12T16:33:34Z) - Bayesian Optimization with Machine Learning Algorithms Towards Anomaly
Detection [66.05992706105224]
In this paper, an effective anomaly detection framework is proposed utilizing Bayesian Optimization technique.
The performance of the considered algorithms is evaluated using the ISCX 2012 dataset.
Experimental results show the effectiveness of the proposed framework in term of accuracy rate, precision, low-false alarm rate, and recall.
arXiv Detail & Related papers (2020-08-05T19:29:35Z) - SAMBA: Safe Model-Based & Active Reinforcement Learning [59.01424351231993]
SAMBA is a framework for safe reinforcement learning that combines aspects from probabilistic modelling, information theory, and statistics.
We evaluate our algorithm on a variety of safe dynamical system benchmarks involving both low and high-dimensional state representations.
We provide intuition as to the effectiveness of the framework by a detailed analysis of our active metrics and safety constraints.
arXiv Detail & Related papers (2020-06-12T10:40:46Z) - CryptoSPN: Privacy-preserving Sum-Product Network Inference [84.88362774693914]
We present a framework for privacy-preserving inference of sum-product networks (SPNs)
CryptoSPN achieves highly efficient and accurate inference in the order of seconds for medium-sized SPNs.
arXiv Detail & Related papers (2020-02-03T14:49:18Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.