scispace - formally typeset
BookDOI

Security Standardisation Research

Reads0
Chats0
TLDR
It is shown that the privacy properties of PLAID are significantly weaker than claimed: using a variety of techniques the authors can fingerprint and then later identify cards.
Abstract
The Protocol for Lightweight Authentication of Identity (PLAID) aims at secure and private authentication between a smart card and a terminal. Originally developed by a unit of the Australian Department of Human Services for physical and logical access control, PLAID has now been standardized as an Australian standard AS-5185-2010 and is currently in the fast track standardization process for ISO/IEC 251851.2. We present a cryptographic evaluation of PLAID. As well as reporting a number of undesirable cryptographic features of the protocol, we show that the privacy properties of PLAID are significantly weaker than claimed: using a variety of techniques we can fingerprint and then later identify cards. These techniques involve a novel application of standard statistical and data analysis techniques in cryptography. We also discuss countermeasures to our attacks.

read more

Citations
More filters
Journal ArticleDOI

A Survey on Hyperdimensional Computing aka Vector Symbolic Architectures, Part II: Applications, Cognitive Models, and Challenges

TL;DR: Hyperdimensional Computing and Vector Symbolic Architectures (HDC/VSA) as discussed by the authors is a family of computational models that use high-dimensional distributed representations and rely on the algebraic properties of their key operations to incorporate the advantages of structured symbolic representations and vector distributed representations.
Journal Article

New decidability results for fragments of first-order logic and application to cryptographic protocols

TL;DR: In this article, a new extension of the Skolem class for first-order logic was proposed and proved decidability by resolution techniques, including the built-in equational theory of exclusive or.

Cryptographic Solutions for Cyber-Physical System Security

Chenglu Jin
TL;DR: This dissertation will present an intrusion-tolerant and privacy-preserving sensor fusion scheme, a lightweight intrusion detection system for industrial control systems, and a multi-factor authenticated key exchange protocol based on historical data.
Journal ArticleDOI

Enhancing deep learning nuclear quadrupole resonance detection using transfer learning and autoencoders

TL;DR: In this paper , transfer learning was used to extend the applicability of deep learning detection using transfer learning to other spectrometers and denoising autoencoders to improve its performance at very low signal-to-noise ratios.
References
More filters
Proceedings ArticleDOI

An efficient cryptographic protocol verifier based on prolog rules

TL;DR: A new automatic cryptographic protocol verifier based on a simple representation of the protocol by Prolog rules, and on a new efficient algorithm that determines whether a fact can be proved from these rules or not, which proves secrecy properties of the protocols.
Proceedings ArticleDOI

The battle against phishing: Dynamic Security Skins

TL;DR: A new scheme is proposed, Dynamic Security Skins, that allows a remote web server to prove its identity in a way that is easy for a human user to verify and hard for an attacker to spoof.
Journal ArticleDOI

The NRL Protocol Analyzer: An Overview☆

TL;DR: An overview of how the NRL Protocol Analyzer works and how the use of the Prolog language benefited the design and implementation of the Analyzer is given.
Book ChapterDOI

The TAMARIN prover for the symbolic analysis of security protocols

TL;DR: The Tamarin prover supports the automated, unbounded, symbolic analysis of security protocols and features expressive languages for specifying protocols, adversary models, and properties, and support for efficient deduction and equational reasoning.