Loading...
Search for: salmasizadeh--mahmoud
0.006 seconds
Total 31 records

    Analyze and Improvement of Secret Handshake Protocols

    , M.Sc. Thesis Sharif University of Technology Yajam, HabibAllah (Author) ; Mohajeri, Javad (Supervisor) ; Salmasizadeh, Mahmoud (Supervisor)
    Abstract
    In today's world in which a major part of information is digitalized and a large portion of the communication is done via computer networks, entities authentication while maintaining privacy is a concern with the growing importance and value. To meet this goal, during the past two decades, anonymous authentication protocols with different approaches for use in various applications has presented and developed. These protocols enable users to authenticate based on some of their properties, without revealing their own identities. Secret handshake protocols are considered as type of anonymous authentication protocols. This protocol has the unique feature of hiding users' affiliation to the... 

    Design of a Traceable Optimistic Fair Exchange Protocol

    , M.Sc. Thesis Sharif University of Technology Ganjavi, Ramin (Author) ; Salmasizadeh, Mahmoud (Supervisor)
    Abstract
    Fair exchange of digital items through computer network is an important research topic of modern cryptography. Generallty, a fair exchange protocol is a way which helps two parties to exchange their digital items fairly, so that at the end of the protocol execution, both parties recieve their desirable items or none of them recieves anything. In a practical applications, fair exchange protocol is widely used in different but related fields like contract signing protocols,non-repudiation protocols,e-ayment system and certified e-mails. In a fair exchange protocol, a trusted third party (TTP) acts as an arbitrator between two parties. To reduce the traffic load of the arbitrator, the concept... 

    Analysis and Improvement of Private Set Intersection Schemes

    , M.Sc. Thesis Sharif University of Technology Kavousi, Alireza (Author) ; Mohajeri, Javad (Supervisor) ; Salmasizadeh, Mahmoud (Co-Supervisor)
    Abstract
    Secure multi-party computation (MPC) enables a group of mutually distrustful parties to compute a joint and agreed upon function of their private inputs without disclosing anything but the corresponding output. One of the most important secure computation protocols is private set intersection (PSI). In PSI, often two or several parties wish to find the intersection of their sets without revealing other non-common elements. There exist some other variants of PSI protocol like PSI cardinality or threshold PSI which in the former only the cardinality of the intersection set is revealed and in the latter the intersection set is revealed if its cardinality is greater (less) than a certain value.... 

    Design and Analysis of Authentication Protocols in Vehicular ad-hoc Networks

    , M.Sc. Thesis Sharif University of Technology Kazemi Dizaj, Mitra (Author) ; Salmasizadeh, Mahmoud (Supervisor) ; Mohajeri, Javad (Co-Supervisor)
    Abstract
    Design of anonymous authentication scheme is one of the most important challenges in Vehicular Ad hoc Networks (VANET). Most of the existing schemes have high computational and communication overhead and they do not meet security requirements. Recently, Azees et al. have introduced an Efficient Anonymous Authentication with Conditional Privacy-Preserving (EAAP) scheme for VANET and claimed that it is secure. We show that this protocol is vulnerable against replay attack, impersonation attack and message modification attack. Also, we show that the messages sent by a vehicle are linkable. Therefore, an adversary can easily track the vehicles. In addition, it is shown that vehicles face with... 

    Security Improvement of Recording and Transferring Medical Data Protocols Using Blockchain

    , M.Sc. Thesis Sharif University of Technology Mirza Mohammadi, Omid (Author) ; Aref, Mohammad Reza (Supervisor) ; Salmasizadeh, Mahmoud (Supervisor)
    Abstract
    The purpose of this thesis is to improve the protocols for recording and transmitting medical data in terms of security and performance using blockchain technology. The approach we take in this Thesis differs in three respects from most articles written in this field. The first is that unlike those who look at the blockchain as a black box and take advantage of only its positive features, we consider the details and challenges it creates for us and solve them in order to use it. The second important point is to justify the use of blockchain in this design. It can be seen in many designs that the use of this technology is useless according to their model and goals. Finally, one of the most... 

    Improvement of Security Features of Communication Networks with Network Coding

    , M.Sc. Thesis Sharif University of Technology Mousavi, Nima (Author) ; Aref, Mohammad Reza (Supervisor) ; Salmasizadeh, Mahmoud (Supervisor)
    Abstract
    In this thesis, we study security features of the networks which use linear network coding to multicast information to some nodes of the network in presence of a wiretapper and also an active intruder. We consider information theoretic security in which we assume no computation limits for enemy. Thus, we take advantage of the essence of network coding instead of cryptographic tools to improve security features of the network. First, we show how providing shannon security for such networks in presence of wiretapper, leads to different cost in multicast rate, depending on initial network code designed. Based on this, we present a modified secure network code design which can provide perfect... 

    Design of Leakage-resilient and Tamper-resilient Encoding Schemes with Provable Security

    , Ph.D. Dissertation Sharif University of Technology Mortazavi, Amir (Author) ; Salmasizadeh, Mahmoud (Supervisor) ; Daneshgar, Amir ($item.subfieldsMap.e)
    Abstract
    Security analysis of cryptographic systems against implementation attacks, including active and passive attacks, is an important issue due to the large number of such attacks in the real world. Since 2000’s, cryptographers have begun attempting to model active and passive attacks to implementation of cryptographic algorithms. At first, cryptographers modeled the attackers with ability to exploit leakaged information, leading to leakage-resilient cryptography. Afterwards, cryptographers modeled the attackers with ability to tamper with the cryptographic algorithms which led to tamper-resilient cryptography. Actually, the major proposed cryptographic primitive dealing with tampering is the... 

    Cryptanalysis of Verifiable Mix-net

    , M.Sc. Thesis Sharif University of Technology Mortazavi, Amir (Author) ; Salmasizadeh, Mahmoud (Supervisor) ; Mohajeri, Javad (Supervisor)
    Abstract
    Considering the advancement in cryptography technologies, data security in the computer networks has achieved to an acceptable level. But considering the structures and the protocols governing the data exchange in the computer networks, privacy of users and anonymity of transmitters is not preserved. Mix-nets are utilized to maintain anonymous data exchange in computer networks. Different types of Mix-net designs for various applications are proposed. Public verifiable Mix-nets are a group of Mix-nets that are used in designing cryptographic protocols such as electronic voting and payment. In this thesis, we have cryptanalysed structural weaknesses of the verifiable Mix-nets. The attacks on... 

    Design of a Lightweight and Provably Secure Ciphertext-policy Attribute-Based Encryption Algorithm for Cloud Computing

    , M.Sc. Thesis Sharif University of Technology Ghertasi Oskouei, Alireza (Author) ; Salmasizadeh, Mahmoud (Supervisor) ; Mohajeri, Javad (Supervisor)
    Abstract
    With the help of cloud computing, easy and fast access to a wide range of computing resources through the network is provided for a wide range of users. Cloud computing, on the other hand, faces security challenges in protecting users' privacy and access control because the cloud service provider is not a trusted entity, so it is possible to access or disclose sensitive data. Various solutions have been proposed to simultaneously meet the above two security requirements. The most well-known solution in this field is "Attribute-Based Encryption".In this dissertation, after reviewing the existing schemes to respond to the obstacles to implementing attribute-based encryption, an attribute-based... 

    An Optimistic Fair Exchange Protocol for Proxy Signatures

    , M.Sc. Thesis Sharif University of Technology Ghorbani, Kosar (Author) ; Salmasizadeh, Mahmoud (Supervisor)
    Abstract
    Increasing use of World Wide Web and users tend to accompany in the electronic transaction has caused a fair exchange becomes very important and pervasive electronic transaction. These transactions have a lot of usage and benefits. In this study, the optimistic fair exchange has been studied. It is a special case of the fair exchange while having more advantages than the fair exchange. A situation considered that a signer could not sign a message by himself so he delegates his right in signing to a person as a proxy signer. In this study, a protocol of optimistic fair exchange for proxy signature is presented. So, the proxy signer can accompany in the optimistic fair exchange instead of the... 

    Enhancing De-anonymization Attacks on Graph Data

    , M.Sc. Thesis Sharif University of Technology Aliakbari, Javad (Author) ; Mohajeri, Javad (Supervisor) ; Salmasizadeh, Mahmoud (Co-Supervisor)
    Abstract
    Social networks and the shared data in these networks are always considered as good opportunities in hands of the attackers. To evaluate the privacy risks in these networks and challenge the anonymization techniques, several de-anonymization attacks have been introduced so far. In this thesis, we propose a technique to improve the success rate of passive seed based de-anonymization attacks. Our proposed technique is simple and can be applied in combination with different types of de-anonymization attacks. We show that it can achieve high success rates with low number of seeds compared to similar attacks. Our technique can also be used for applying partial attacks on graphs which results in... 

    Shortcut Cryptanalysis of Symmetric Block Ciphers (Focusing on Differential and Impossible-Differential Cryptanalysis of ARX Ciphers)

    , Ph.D. Dissertation Sharif University of Technology Azimi, Arash (Author) ; Salmasizadeh, Mahmoud (Supervisor) ; Mohajeri, Javad (Supervisor) ; Aref, Mohammad Reza (Co-Supervisor)
    Abstract
    In this thesis, we analyze the security of symmetric block ciphers using shortcut cryptanalysis, mainly focusing on differential and impossible-differential cryptanalysis. The contributions of this thesis are twofold. First, we evaluate the security of 4 notable block ciphers named TEA, XTEA, Midori, and HIGHT using ad-hoc impossible-differential cryptanalysis in single-key settings. For each cipher, we introduce new impossible differentials in single-key settings, which are later used in the cryptanalysis. The results show that for all of the mentioned block ciphers, we are able to analyze the longest reduced-round versions of them in contrast to each of the previously mounted single-key... 

    Security Analysis, Enhancement and Implementation of IoT Systems

    , M.Sc. Thesis Sharif University of Technology Attari, Sadegh (Author) ; Salmasizadeh, Mahmoud (Supervisor) ; Gholampour, Iman (Co-Supervisor)
    Abstract
    The Internet of Things remains a matter of concern in the minds of the activists in the field after being raised. The structure of an IoT-based system, the components of an IoT-based system, the requirements and limitations of the Internet of Things are the most important parts of which no clear description of them has ever been presented. Structural modifiability, processing constraints, energy supply constraints, and most importantly the security of an IoT-based network are among the issues that have complicated the analysis of an IoT-based System. So providing a clear scheme and an open system for such networks can make it easier to make progress in this area. In this study, we first... 

    Application of Game Theory in the Design and Analysis Electronic Voting Protocols

    , M.Sc. Thesis Sharif University of Technology Asgariyan, Nesa (Author) ; Salmasizadeh, Mahmoud (Supervisor)
    Abstract
    A voting protocol was introduced by Popveniuc in 2006; it is receipt freeness, so appeared to be resistant against the bribed voter. In 2009 Clark using the bribed contract, and attacked to the voting protocol, in the elections by two candidates. He showed that this protocol is not resistant to the bribed voter. In this thesis, we use game theory and graph to extend the bribed contract for n candidates. Thus with the help of a graph, we show that this protocol with any number of candidates, is not resistant to the bribed voter, and we show that by increasing the number of candidates, the resistance of the protocol would be high and if the number of candidates is n, the success rate of this... 

    Analysis of Lightweight Attribute-Based Encryption Schemes and Presentation of Two New Schemes

    , M.Sc. Thesis Sharif University of Technology Abdollahi, Sina (Author) ; Mohajeri, Javad (Supervisor) ; Salmasizadeh, Mahmoud (Co-Supervisor)
    Abstract
    Cloud storage provides an accessible and cheap space for data storage. There is usually no trust between users and the Cloud. Consequently, to maintain confidentiality, outsourcing and storing sensitive data in an encrypted form is necessary. In applications where data sharing between several users is required, ciphertext-policy attribute-based encryption(CP-ABE) has been considered a promising solution, but the lack of efficiency and flexibility limits its usage in applications such as IoT. These problems are usually related to both the underlying structure and the required peripheral processes, such as key revocation. In this thesis, two schemes with the same basic structure and different... 

    Improving the Security of Searchable Encryption Schemes

    , M.Sc. Thesis Sharif University of Technology Ameri Ekhtiarabadi, Mohammad Hassan (Author) ; Mohajeri, Javad (Supervisor) ; Salmasizadeh, Mahmoud (Co-Advisor)
    Abstract
    In todays world, the importance of cloud computing is not deniable. Because, it provides an environment for accessing to a lot of useful applications in a convenient way with low cost. Cloud storage is one of such services which is provided by cloud computing. As the cloud providers are not fully trusted, it is necessary to encrypt the data before outsourcing, to preserve the privacy of stored information. To find a set of document which is related to some keywords, it is possible to designate cloud provider to search on behalf of entities. So, the encrypted data should be searchable and one solution which is suggested is searchable encryption. Related to this cryptographic primitive, there... 

    A New Scheme for Provable Secure Anonymous Proxy Signature in the Standard Model

    , M.Sc. Thesis Sharif University of Technology Toluee, Rahim (Author) ; Salmasizadeh, Mahmoud (Supervisor)
    Abstract
    In order to protect the proxy signers’ privacy, many anonymous proxy signature schemes have been proposed. As far as we know, there is no provable secure anonymous proxy signature scheme without random oracles. Because the provable security in the random oracle model has received a lot of criticism, in this thesis, the aim is proposing the first provable secure anonymous proxy signature in the standard model based on existing standard assumptions.It is shown in the standard model that, the proposal is anonymous against full key exposure and existential unforgeable with the computational Diffie Hellman (CDH) and Subgroup Hiding (SGH) assumptions in bilinear groups.To provide anonymity for proxy... 

    A Power Analysis Countermeasure for a Lightweight Symetric Block Cipher

    , M.Sc. Thesis Sharif University of Technology Safaei Pour, Morteza (Author) ; Salmasizadeh, Mahmoud (Supervisor) ; Moradi, Amir (Co-Advisor)
    Abstract
    Among cryptography devices, resource constrained devices like sensors, RFID tags, smart cards and etc need a special class of cryptography algorithms. These devices have three limitations: memory, consumed power and computing power. Therefore, need a special class of cryptography algorithms that is lightweight cryptography. Lightweight cryptography systems have features and limitations that make them more vulnerable against attacks such as power analysis attacks. For this reason strengthening them against these attacks need more attention. So far, various countermeasure for secure implementation of different cryptography systems proposed. Most of them trying to decrease the correlation... 

    Investigating Distributed Denial of Service Attacks on MQTT Protocol And Proposal of New Attack Scenarios

    , M.Sc. Thesis Sharif University of Technology Sadegh Esfahani, Hatef (Author) ; Aref, Mohammad Reza (Supervisor) ; Salmasizadeh, Mahmoud (Co-Supervisor)
    Abstract
    MQTT (Message Queuing Telemetry Transport) is one of the essential and widely used protocols in the Internet of Things (IoT) networks. It operates at the application layer (Layer 7) for data transmission. As IoT applications using this protocol for communication have grown, securing such systems against security attacks has become a significant challenge. One of the important attacks implementable by IoT networks is Distributed Denial of Service (DDoS) attacks. In this thesis, we initially provide a general overview of IoT security and demonstrate how DDoS attacks disrupt the availability feature in these networks. We then examine known types of DDoS attacks to gain a better understanding of... 

    Secrecy Rates in Wiretap Channels

    , Ph.D. Dissertation Sharif University of Technology Salimi, Somayeh (Author) ; Salmasizadeh, Mahmoud (Supervisor) ; Aref, Mohammad Reza (Supervisor)
    Abstract
    Security has been considered from the information theoretic point of view in different channels such as broadcast, multiple access and relay channels. Due to application of these channels in modern networks such as wireless, sensor and Ad-hoc networks, information theoretic security arguments especially wiretapping, has major significance in these networks. With regard to necessity of confidentiality protection in modern telecommunication services, security from the information theoretic point of view should be considered as well as capacity and achievable rate region considerations in these networks. In this thesis, first, a survey of basic works in the subjects of secrecy capacity and...