Current Issue : April-June Volume : 2026 Issue Number : 2 Articles : 5 Articles
Chaotic systems play an indispensable role in the fields of cryptography and information security. Sine-Transform- Based Chaotic System (STBCS) can address the shortcomings of low complexity and limited chaotic behaviour of classical chaos systems. In this paper, a compact hardware STBCS is proposed and developed on the FPGA device by using the Stochastic Computation (SC) technique. The traditional arithmetic operations are replaced by the SC and finite state machines design. The structure of STBCS is optimised, where the disturbance method is employed to improve the chaotic behaviours and also taking the SC method into account for implementation. The hardware performance of the proposed design is verified via various tests of the chaotic system and corresponding random number generator. Experimental results show that the utilisation of the hardware resources is reduced especially the DSP components compared to the traditional design methods. This provides an efficient design for the random generator of the alternative cryptosystems....
Face recognition has been widely used in many fields and has become an important identification method. The templates in face recognition systems are associated with the facial biometric features of users, and once leaked, it will pose a persistent threat to the users. Therefore, it is particularly important to protect the security of templates. In this work, a novel face template protection scheme is proposed by combining chaotic map, error correction code and locality sensitive hashing. The scheme utilizes two sets of parameters: global keys and user keys, and the generated data consists of two parts: storage key and biometric template. When generating a template, the extracted feature vector is permuted by using chaotic sequences to disrupt the correlation between different dimensions. Then, the user keys are processed by error correction code to generate the storage key, which can be used to recover the user keys during authentication. Finally, the permuted vector is processed by the proposed random number based locality sensitive hashing to generate biometric template. Experimental results and theoretical analysis show that the scheme has good accuracy and security, and can effectively resist various attacks on the face template....
Consumers and businesses are often connected online in today’s digitally connected world. Fast and barrier-free communication, easier and faster operation, and automation and networking of robots and production offer many competitive advantages. Recognizing the limiting factors of new technology, such as the significant dependency on technology and the vulnerability of IT devices, is crucial. As digitalization might increase the competitiveness of companies and have an impact on both the supply and value chains, we need to consider and assess their vulnerability from an information security perspective. Consequently, competitive advantage is not only about creating value more cost-efficiently and with higher quality but also about extracting the correct information from big data, interpreting and integrating it into business operations, and protecting it. This study proposes a fishbone model to help identify and overcome these challenges. It allows companies to identify the root cause of each information security incident....
The Stable Paths Problem (SPP) is a widely adopted model for analyzing the convergence of Border Gateway Protocol (BGP). Solving SPP correctly is of great significance for determining BGP convergence. Existing studies have proposed some SPP solving algorithms that can only solve a part of SPP instances and have limited capabilities. To fill this gap, in this paper we transform SPP into Boolean Satisfiability Problem (SAT) and propose a new SPP solving algorithm called SPPsolver, which can support the solution of any SPP instance. We use Binary Decision Diagrams (BDD) to encode and calculate the SAT formula and apply two optimization methods to accelerate SPPsolver. We use real-world datasets to perform experiments and compare with state-of-the-art algorithms, the results demonstrate the superiority and efficiency of SPPsolver....
Having a strong password is vital in maintaining secure access to private or sensitive data. However, strong passwords require good memorization skills, placing a significant burden on human memory and cognitive capacity. Using additional authentication measures, such as token-based access, reduces the need for overly complex passwords while maintaining a high level of security. However, using additional measures introduces additional user interaction during the log-in process. In this work, we propose a password hardening scheme that provides a location based authentication mechanism. We use the information contained within the local WiFi environment to strengthen a user’s password. With our method, the requirements on the user password remain at a reasonable level, while keeping extra user involvement to a minimum. We achieve this by generating a cryptographic key from WiFi beacon frames, which we combine with the user password using a key derivation function. Furthermore, we conduct an analysis to assess the stability of local WiFi environments to determine the practicality of our proposed password hardening scheme....
Loading....