فهرست مطالب

International Journal of Information Security
Volume:3 Issue: 1, Jan 2011

  • تاریخ انتشار: 1390/04/14
  • تعداد عناوین: 5
|
  • Rasool Jalili Page 1
  • Matt Bishop Pages 3-27
    Until recently, computer security was an obscure discipline that seemed to have little relevance to everyday life. With the rapid growth of the Internet, e-commerce, and the widespread use of computers, computer security touches almost all aspects of daily life and all parts of society. Even those who do not use computers have information about them stored on computers. This paper reviews some aspects of the past and current state of computer security, and speculates about what the future of the field will being.
    Keywords: Computer Security, Computer Systems, Networking Infrastructure, Internet
  • Ehsan Malekian, Ali Zakerolhosseini, Atefeh Mashatan Pages 29-42
    In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent security on the intractability of finding the shortest vector in a certain non-convolutional modular lattice, yet it is efficient and cost effective, contrary to cryptosystems such as RSA or ECC. The detailed specification of the proposed cryptosystem, including the underlying algebraic structure, key generation, encryption and decryption process and also the issues regarding key security, message security, and probability of successful decryption are explained.We will further show, based on the existing results for lattice-reduction algorithms, that the proposed cryptosystem with a dimension of 41 will have a security equal to NTRU-167.
    Keywords: QTRU, NTRU, Quaternion Algebra, Public, Key Cryptography, Encryption
  • Yaser Baseri, Amir S. Mortazavi, Maryam Rajabzadeh Asaar, Mohsen Pourpouneh, Javad Mohajeri Pages 43-50
    Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them su er from the same weaknesses. In this paper, getting Asadpour et al.'s scheme as one of the latest ones and showing its weaknesses, we propose a new voting scheme which is immune to the weaknesses of previous schemes without losing efficiency. The scheme, is based on a special structure, which directly uses the identity of the voter, hides it in that structure and reveals it after double voting. We also, show that the security of this scheme depends on hardness of RSA cryptosystem, Discrete Logarithm problem and Representation problem.
    Keywords: Electronic Voting, Anonymity of Voter, Unforgeability of Ticket, Perceptibility of Double Voting, Security of Voting, Blind Signature
  • Intelligent Scalable Image Watermarking Robust against ProgressiveDWT-Based Compression Using Genetic Algorithms
    Mehran Deljavan Amiri, Habibollah Danyali, Bahram Zahir, Azami Pages 51-66