ISSN 1816-353X (Print) Vol. 21, No. 1 (Jan. 2019) ISSN 1816-3548 (Online)
Total Page:16
File Type:pdf, Size:1020Kb
ISSN 1816-353X (Print) Vol. 21, No. 1 (Jan. 2019) ISSN 1816-3548 (Online) INTERNATIONAL JOURNAL OF NETWORK SECURITY Editor-in-Chief Gregorio Martinez Prof. Min-Shiang Hwang University of Murcia (UMU) (Spain) Department of Computer Science & Information Engineering, Asia Sabah M.A. Mohammed University, Taiwan Department of Computer Science, Lakehead University (Canada) Co-Editor-in-Chief: Lakshmi Narasimhan Prof. Chin-Chen Chang (IEEE Fellow) School of Electrical Engineering and Computer Science, University of Department of Information Engineering and Computer Science, Newcastle (Australia) Feng Chia University, Taiwan Khaled E. A. Negm Publishing Editors Etisalat University College (United Arab Emirates) Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang Joon S. Park School of Information Studies, Syracuse University (USA) Board of Editors Antonio Pescapè University of Napoli "Federico II" (Italy) Ajith Abraham Zuhua Shao School of Computer Science and Engineering, Chung-Ang University Department of Computer and Electronic Engineering, Zhejiang University (Korea) of Science and Technology (China) Wael Adi Mukesh Singhal Institute for Computer and Communication Network Engineering, Technical Department of Computer Science, University of Kentucky (USA) University of Braunschweig (Germany) Nicolas Sklavos Sheikh Iqbal Ahamed Informatics & MM Department, Technological Educational Institute of Department of Math., Stat. and Computer Sc. Marquette University, Patras, Hellas (Greece) Milwaukee (USA) Tony Thomas Vijay Atluri School of Computer Engineering, Nanyang Technological University MSIS Department Research Director, CIMIC Rutgers University (USA) (Singapore) Mauro Barni Mohsen Toorani Dipartimento di Ingegneria dell’Informazione, Università di Siena (Italy) Department of Informatics, University of Bergen (Norway) Andrew Blyth Shuozhong Wang Information Security Research Group, School of Computing, University of School of Communication and Information Engineering, Shanghai Glamorgan (UK) University (China) Soon Ae Chun Zhi-Hui Wang College of Staten Island, City University of New York, Staten Island, NY School of Software, Dalian University of Technology (China) (USA) Chuan-Kun Wu Stefanos Gritzalis Chinese Academy of Sciences (P.R. China) and Department of Computer University of the Aegean (Greece) Science, National Australian University (Australia) Lakhmi Jain Chou-Chen Yang School of Electrical and Information Engineering, Department of Management of Information Systems, National Chung Hsing University of South Australia (Australia) University (Taiwan) James B D Joshi Sherali Zeadally Dept. of Information Science and Telecommunications, University of Department of Computer Science and Information Technology, University Pittsburgh (USA) of the District of Columbia, USA Ç etin Kaya Koç Jianping Zeng School of EECS, Oregon State University (USA) School of Computer Science, Fudan University (China) Shahram Latifi Justin Zhan Department of Electrical and Computer Engineering, University of Nevada, School of Information Technology & Engineering, University of Ottawa Las Vegas (USA) (Canada) Cheng-Chi Lee Mingwu Zhang Department of Library and Information Science, Fu Jen Catholic University College of Information, South China Agric University (China) (Taiwan) Yan Zhang Chun-Ta Li Wireless Communications Laboratory, NICT (Singapore) Department of Information Management, Tainan University of Technology (Taiwan) PUBLISHING OFFICE Iuon-Chang Lin Min-Shiang Hwang Department of Management of Information Systems, National Chung Hsing Department of Computer Science & Information Engineering, Asia University (Taiwan) University, Taichung 41354, Taiwan, R.O.C. John C.S. Lui Email: [email protected] Department of Computer Science & Engineering, Chinese University of Hong Kong (Hong Kong) International Journal of Network Security is published both in traditional Kia Makki paper form (ISSN 1816-353X) and in Internet (ISSN 1816-3548) at Telecommunications and Information Technology Institute, College of http://ijns.jalaxy.com.tw Engineering, Florida International University (USA) PUBLISHER: Candy C. H. Lin © Jalaxy Technology Co., Ltd., Taiwan 2005 23-75, P.O. Box, Taichung, Taiwan 40199, R.O.C. Volume: 21, No: 1 (January 1, 2019) International Journal of Network Security 1. 2-Adic Complexity of Sequences Generated by T-Functions Yan Wang, Xueming Ren, Shunbo Li, Vol. 21, No. 1, 2019, pp. 1-6 Fully Secure Anonymous Identity Based Broadcast Encryption with Group of 2. Prime Order Yang Ming and Hongping Yuan, Vol. 21, No. 1, 2019, pp. 7-16 3. On The Secrecy Performance of Wireless Powered Device to Device Systems Dinh-Thuan Do, Vol. 21, No. 1, 2019, pp. 17-21 An Image Encryption Scheme Based on The Three-dimensional Chaotic 4. Logistic Map Chunhu Li, Guangchun Luo, and Chunbao Li, Vol. 21, No. 1, 2019, pp. 22-29 5. Granger Causality in TCP Flooding Attack Rup Kumar Deka, Dhruba Kumar Bhattacharyya, and Jugal Kumar Kalita, Vol. 21, No. 1, 2019, pp. 30-39 6. New Hierarchical Identity Based Encryption with maximum hierarchy Dasari Kalyani and R. Sridevi, Vol. 21, No. 1, 2019, pp. 40-46 A Selective Self-adaptive Image Cryptosystem Based on Bit-planes 7. Decomposition Hossam Diab, Vol. 21, No. 1, 2019, pp. 47-61 8. Privacy-Preserving and Dynamic Authentication Scheme for Smart Metering Xiuxia Tian, Fuliang Tian, Anqin Zhang, and Xi Chen, Vol. 21, No. 1, 2019, pp. 62-70 9. Multi-party Fair Exchange Protocol with Smart Contract on Bitcoin Lijuan Guo, Xuelian Li, and Juntao Gao, Vol. 21, No. 1, 2019, pp. 71-82 Medical Image Encryption Scheme Based on Multiple Chaos and DNA 10. Coding Joshua C. Dagadu, Jian-Ping Li, Emelia O. Aboagye, Faith K. Deynu, Vol. 21, No. 1, 2019, pp. 83-90 11. An Efficient Fully Homomorphic Encryption Scheme Ahmed El-Yahyaoui and Mohamed Dafir Ech-Cherif El Kettani, Vol. 21, No. 1, 2019, pp. 91-99 Cryptanalysis of the Mutual Authentication and Key Agreement Protocol 12. with Smart Cards for Wireless Communications Shu-Fen Chiou, Hsieh-Tsen Pan, Eko Fajar Cahyadi, and Min-Shiang Hwang, Vol. 21, No. 1, 2019, pp. 100-104 Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data 13. by Chaos Based Arithmetic Coding and Confusion Mengting Hu, Hang Gao, Tiegang Gao , Vol. 21, No. 1, 2019, pp. 105-114 Three Kinds of Network Security Situation Awareness Model Based on Big 14. Data Bowen Zhu, Yonghong Chen, Yiqiao Cai, Vol. 21, No. 1, 2019, pp. 115-121 NPKG: Novel Pairwise Key Generation for Resisting Key-based Threats in 15. Wireless Sensor Network M. Vaneeta and S. Swapna Kumar, Vol. 21, No. 1, 2019, pp. 122-129 Cryptography Security Designs and Enhancements of DNP3-SA Protocol 16. Based on Trusted Computing Ye Lu and Tao Feng, Vol. 21, No. 1, 2019, pp. 130-136 Multimedia Social Network Authorization Scheme of Comparison-based 17. Encryption Cheng Li, Zhiyong Zhang, and Guoqin Chang, Vol. 21, No. 1, 2019, pp. 137-144 A Provable Secure Short Signature Scheme Based on Bilinear Pairing over 18. Elliptic Curve Subhas Chandra Sahana and Bubu Bhuyan, Vol. 21, No. 1, 2019, pp. 145-152 Identification and Processing of Network Abnormal Events Based on 19. Network Intrusion Detection Algorithm Yunbin He, Vol. 21, No. 1, 2019, pp. 153-159 Safety Protection of E-Commerce Logistics Information Data Under The 20. Background Of Big Data Yuan Zhao and Yanyan Zhang, Vol. 21, No. 1, 2019, pp. 160-165 A Context Establishment Framework for Cloud Computing Information 21. Security Risk Management Based on the STOPE View Bader Saeed Alghamdi, Mohamed Elnamaky, Mohammed Amer Arafah, Maazen Alsabaan, Saad Haj Bakry, Vol. 21, No. 1, 2019, pp. 166-176 International Journal of Network Security, Vol.21, No.1, PP.1-6, Jan. 2019 (DOI: 10.6633/IJNS.201901 21(1).01) 1 2-Adic Complexity of Sequences Generated by T-Functions Yan Wang, Xueming Ren, Shunbo Li, Song Zhao (Corresponding author: Yan Wang) Department of Mathematics, Xi'an University of Architecture and Technology 13, YanTa Road, Xi'an 710055, China (Email: [email protected]) (Received July 12, 2017; revised and accepted Dec. 8, 2017) Abstract pher and Hash functions to be the substitution of Linear Feedback Shift Register (LFSR). Single cycle T-functions are cryptographic primitives which can generate maximum periodic sequences. 2-Adic Sequences generated by single cycle T-function are complexity of a sequence measures the difficulty of out- studied from the point of cryptographic criterion. The putting a binary sequence using a feedback with carry autocorrelation property of coordinate sequences is stud- shift register. Based on the special properties of single ied by Kolokotronis and Wang [8,14], and the results show cycle T-functions, this paper investigates the 2-adic com- that such sequence is not so pseudorandom as people ex- plexity of sequences generated by single cycle T-functions pected. Linear complexity of sequences generated by sin- from the kth coordinate sequence to the state output se- gle cycle T-function has been discussed in [1, 9, 15{17], quence using the primality of Fermat number. It is shown which all show sequences generated by single cycle T- that the state output sequence of a T-function is far from function have quite high linear complexity. As for 2- high 2-adic complexity. adic complexity of a sequence, Dong [3] studied the k- Keywords: 2-Adic Complexity; Fermat Number; Se- error 2-adic complexity of a binary sequence of a period quence; T-Function pn. Anashin [2] present a new criteria for a T-function to be bijective or transitive. Jang and Jeong et al. [4] give a characterization of 1-Lipschitz functions on Fq[T ] 1 Introduction in terms of the van der Put expansion and use this re- sult to give sufficient conditions for measure-preserving The security of a stream cipher depends on the unpre- 1-Lipschitz function on Fq[T ] in terms of the three well dictability of the pseudo-random bit sequence. To ver- known bases, Carlitz polynomials, digit derivatives and ify the pseudo-randomness of a sequence, criterions of digit shifts. Sopin [12] presented the criteria of measure- pseudo-random sequence are proposed such as linear com- preserving(Haar) for pk−Lipschitz maps on the cartesian plexity, autocorrelation, 2-adic complexity and so on.