Loading...
Search for: eghlidos--traneh
0.115 seconds

    Analysis of Authentication Protocols in RFID Systems

    , M.Sc. Thesis Sharif University of Technology Aghaee Farouji, Majid (Author) ; Aref, Mohammad Reza (Supervisor) ; Eghlidos, Traneh (Supervisor)
    Abstract
    Radio frequency identification systems (RFID) were used in the past to identify physical objects. Along with the development of RFID systems and its wide range of applications in our daily life, the need for privacy in such systems is becoming more and more significant. Authentication protocols are used as the care of secure communication to preserve the privacy and security in RFID systems. In this thesis the security of authentication protocols against general attacks are investigated, using two typical authentication protocols. As an alternative, we use a privacy model as another tool to analyze two other types of authentication protocols. The results reveal the weakness in the design of... 

    Prediction of Crude Oil Viscosity Using Equations of State

    , M.Sc. Thesis Sharif University of Technology Farajpour, Ehsan (Author) ; Ghotbi, Sirous (Supervisor) ; Jafari behbahani, Traneh (Supervisor)
    Abstract
    experimental data of crude oil for viscosity are available in limited conditions of temperature and pressure. Therefore, the use of empirical equations and relations to predict it at temperatures and pressures beyond the temperature and pressure of the reservoir is inevitable. In order to reduce the cost of the laboratory, the use of a comprehensive model in this project is considered. For this purpose, using two theories of friction and free volume, the Peng Robinson and PC-SAFT equation of states and genetic algorithms and particle swarm optimization are widely used to calculate the viscosity of pure hydrocarbons, binary mixtures of hydrocarbons and crude oil have been used. Obviously, by... 

    Secret Sharing Schemes for General Access Structures

    , M.Sc. Thesis Sharif University of Technology Sefidgaran, Milad (Author) ; Eghlidos, Taraneh (Supervisor)
    Abstract
    Secret sharing scheme is a method for distributing the secret (secret information) among a set of participants in such a way that only the authorized sets can recover the secret and the unauthorized sets could not. In a perfect secret sharing scheme, unauthorized sets cannot get any additional (i.e. a posteriori) information about the possible value of the secret. In these schemes, to prevent information leakage and increase communication efficiency, the size of the share should be as close to the secret size as possible. In other words, finding the shares with reasonable size which results in an optimal information rate for a given access structure, improves the efficiency of the scheme.... 

    Distance Bounding Authentication Protocols in RFID Systems

    , M.Sc. Thesis Sharif University of Technology Babvey, Pouria (Author) ; Eghlidos, Taraneh (Supervisor)
    Abstract
    Ever-encreasing progress in the field of wireless communication has paved the way for utilisation based on radio frequency authentication systems. In recent years, ITU started the scenario of "Internet of Things". RFID systems have an exclusive role in development ofthis idea, since they can make it possible for things which have an ID to be identified automatically in a large scale. The necessity of identification and tracing people and things has caused the deployment of RFID technology. Onthe other hand, these systems communicate via a wireless channel to transmit data, therefore they are vulnerable to eavesdropping and interception. Thus, one of the most important issues in using such... 

    Design and Analysis of Joint Encoding-Encryption Schemes Based on Polar Codes

    , M.Sc. Thesis Sharif University of Technology Mafakheri, Behnam (Author) ; Eghlidos, Taraneh (Supervisor)
    Abstract
    Wide use of communication systems and transmission of huge data has increased the need for cryptographic and encoding systems with high speed operations and lower energy consumptions. Code based and joint encryption encoding schemes are examples of such systems, which enjoy simultaneously high performance and security against quantum computers. So far, there has not been developed any quantum algorithm which can solve any of the hard instances of coding theory based on which these cryptographic schemes have been designed. That is why such systems are called post quantum cryptosystems. The main disadvantage of such cryptosystems is large size the key which is to be stored or shared. In this... 

    A Lattice based Threshold Multi-Secret Sharing Scheme and its Application to Threshold Cryptography

    , Ph.D. Dissertation Sharif University of Technology Pilaram, Hossein (Author) ; Eghlidos, Taraneh (Supervisor)
    Abstract
    Secret sharing schemes are used for storage and management of sensitive data such as cryptographic keys and bank account numbers. These schemes provide both confidentiality and reliability. Advances in quantum computers have threatened the security of currently used public-key cryptographic algorithms. In this thesis, for designing quantum resistant cryptographic schemes, we construct a lattice based threshold multi-stage secret sharing (TMSSS) scheme. Using a lattice based one-way function, even after some secrets are revealed, the computational security of the unrecovered secrets is provided against quantum computers. The scheme is multi-use and verifiable meaning that the participants can... 

    Quantum Cryptanalysis of SPN Block ciphers

    , M.Sc. Thesis Sharif University of Technology Khosravi, Ali (Author) ; Eghlidos, Taraneh (Supervisor)
    Abstract
    Quantum computers can be used to process complex computations much more efficient than their classical counterparts. Cryptanalysis of classical ciphers is no exception to this rule. Most quantum cryptanalysis of symmetric ciphers is based on finding the periodicity, linear structure, and confidential information of the target algorithm. In this thesis, assuming that the attacker has access to the quantum computer, we propose a quantum method for deriving the appropriate differential characteristic of block ciphers, using Simon's quantum algorithm. It is worth noting that, unlike classical methods, where increasing the number of rounds of the target block cipher increases the complexity of... 

    Designing a Succinct Argument System Based on GKR Protocol Via Polynomial Commitment Schemes

    , M.Sc. Thesis Sharif University of Technology Shirzad, Alireza (Author) ; Eghlidos, Taraneh (Supervisor)
    Abstract
    With the dramatic advancements in information technology and the industry requirements for security and privacy, proof systems play a crucial role in cryptography. Among the vast variety of proof systems, succinct non-interactive arguments (SNARG) seem to be the most appealing class of proof systems, due to their attractive properties. SNARGs are usually made up of two constructive components, namely the information theoretic part and the cryptographic part. The GKR protocol was introduced as a proof system for a tractable family of languages called “log-Space Uniform Circuits”. The log-space uniformity is a necessary condition for the protocol to be succinct. Hence, it is not possible to... 

    Cryptanalysis of a Class of McEliece-like Code-Based Signature Schemes

    , M.Sc. Thesis Sharif University of Technology Babaei, Ali (Author) ; Eghlidos, Taraneh (Supervisor)
    Abstract
    With the advent of quantum computers, the security of cryptographic primitives, including digital signature schemes, has been compromised. Therefore, a kind of signature scheme has been introduced to resist these computers. These schemes are based on hard problems that have so far resisted against quantum computers, known as post-quantum schemes. One group of these schemes is based on the hard problems of coding theory, which are called code-based cryptographic schemes. The first code-based cryptosystem was the McEliece encryption scheme. A number of code-based signature schemes are based on the McEliece encryption scheme. Some of these schemes use three matrices including a non-singular... 

    Designing a Succinct Argument System Based on GKR Protocol Via Polynomial Commitment Schemes

    , M.Sc. Thesis Sharif University of Technology Shirzad, Alireza (Author) ; Eghlidos, Taraneh (Supervisor)
    Abstract
    With the dramatic advancements in information technology and the industry requirements for security and privacy, proof systems play a crucial role in cryptography. Among the vast variety of proof systems, succinct non-interactive arguments (SNARG) seem to be the most appealing class of proof systems, due to their attractive properties. SNARGs are usually made up of two constructive components, namely the information theoretic part and the cryptographic part. The GKR protocol was introduced as a proof system for a tractable family of languages called “log-Space Uniform Circuits”. The log-space uniformity is a necessary condition for the protocol to be succinct. Hence, it is not possible to... 

    Heuristic Cryptanalysis of Stream Ciphers Based on Connection Equations

    , M.Sc. Thesis Sharif University of Technology Fahimnia, Behnam (Author) ; Eghlidos, Taraneh (Supervisor)
    Abstract
    Stream ciphers are one of the cryptography primitives which have high speed in encryption process and less amount of hardware which they used. Guess and determine attacks are general attacks on stream ciphers which have often been implemented in ad hoc manner. Finding the minimal basis for internal state of a cryptosystem based on connection equations is the main challenge in stream ciphers. In recent years, some efforts for applying this attack in the systematic manner are started. First work in this area is the Simple Guess and Determine attack. The dvanced and Heuristic Guess and Determine attacks then presented, which all of them have heuristic structure. In this thesis, after reviewing... 

    An efficient public key encryption scheme based on QC-MDPC lattices

    , Article IEEE Access ; 2017 ; 21693536 (ISSN) Bagheri, K ; Sadeghi, M ; Eghlidos, T ; Sharif University of Technology
    2017
    Abstract
    In this paper, we introduce a new family of lattices, namely QC-MDPC lattices which are a special case of LDPC lattices, and an improved bit flipping algorithm for decoding of these lattices. Encoding and decoding implementations of QC-MDPC lattices are practical in high dimensions. Indeed, to take advantage of practical decoding we use "Construction-A" lattices which makes a tight connection between the structure of lattices and codes. Using these features we design a lattice-based public key encryption scheme enjoying linear encryption and decryption complexities. The proposed scheme has a reasonable key size due to the sparseness of the parity-check matrix and the quasi cyclic structure... 

    A Lightweight Lattice-Based Searchable Encryption Scheme

    , M.Sc. Thesis Sharif University of Technology Karimi, Mohammad Hossein (Author) ; Eghlidos, Taraneh (Supervisor)
    Abstract
    Many lattice-based public key encryption schemes are forced to use long keys. To deal with this problem, structured lattices such as NTRU can be used. Lattice-based searchable public key encryption schemes are no exception. Furthermore, in most existing searchable public key encryption schemes, it is assumed that the user searches documents with only one keyword. However, using a conjunctive keyword search, we can search for documents containing several keywords by executing the trapdoor generation algorithm only once. On the other hand, in most of the published searchable public key encryption schemes, storing and searching encrypted keywords are responsibility of a central entity called... 

    Security analysis of SKI protocol

    , Article 2014 11th International ISC Conference on Information Security and Cryptology, ISCISC 2014 ; 2014 , pp. 199-203 ; ISBN: 9781479953837 Babvey, P ; Yajam, H. A ; Eghlidos, T ; Sharif University of Technology
    2014
    Abstract
    A great number of authentication protocols used in several applications such as payment systems are inherently vulnerable against relay attacks. Distance bounding protocols provide practical solutions against such attacks; some of which are lightweight and implementable on cheap RFID tags. In recent years, numerous lightweight distance bounding protocols have been proposed; however, a few of them appeared to be resistant against the existing attacks up to the present. One of most well-known protocols in this field is the SKI protocol which has a security proof based on a non-standard strong assumption named Circular Keying. In this paper, we demonstrate that without this strong and... 

    Physical layer encryption scheme using finite-length polar codes

    , Article IET Communications ; Volume 9, Issue 15 , 2015 , Pages 1857-1866 ; 17518628 (ISSN) Hooshmand, R ; Aref, M. R ; Eghlidos, T ; Sharif University of Technology
    Institution of Engineering and Technology  2015
    Abstract
    In this study, by exploiting the properties of finite-length polar codes, the authors introduce a physical layer encryption scheme to make secure (from a computational security perspective) and efficient communication between a sender (Alice) and a legitimate receiver (Bob) against both active and passive attacks, simultaneously. To prevent active attacks, two techniques are considered: (i) a novel method is introduced to keep the generator matrix of polar code secret from an active attacker (Oscar); (ii) a proper joint polar encoding/encryption algorithm based on the hidden generator matrix is introduced. Two additional strategies are considered against passive attacks: (i) a new method is... 

    Secret key cryptosystem based on non-systematic polar codes

    , Article Wireless Personal Communications ; Volume 84, Issue 2 , September , 2015 , Pages 1345-1373 ; 09296212 (ISSN) Hooshmand, R ; Aref, M. R ; Eghlidos, T ; Sharif University of Technology
    Springer New York LLC  2015
    Abstract
    Polar codes are a new class of error correcting linear block codes, whose generator matrix is specified by the knowledge of transmission channel parameters, code length and code dimension. Moreover, regarding computational security, it is assumed that an attacker with a restricted processing power has unlimited access to the transmission media. Therefore, the attacker can construct the generator matrix of polar codes, especially in the case of binary erasure channels, on which this matrix can be easily constructed. In this paper, we introduce a novel method to keep the generator matrix of polar codes in secret in a way that the attacker cannot access the required information to decode the... 

    Secure one-way relaying scheme based on random difference family (RDF) lattice codes

    , Article Wireless Networks ; Volume 27, Issue 7 , 2021 , Pages 4615-4634 ; 10220038 (ISSN) Bagheri, Kh ; Khodaiemehr, H ; Eghlidos, T ; Panario, D ; Sharif University of Technology
    Springer  2021
    Abstract
    In this paper, we present a one-way relaying scheme in which two wireless nodes create an information flow to each other via a single decode-and-forward (DF) relay. We consider an additional secrecy constraint for protection against an honest-but-curious relay. Indeed, while the relay should decode the source message, it should be fully ignorant about the message content. We provide a secure lattice coding strategy based on random difference families (RDF) lattice codes for unidirectional Gaussian relay channels. RDF lattice codes are carved from infinite RDF lattices using a shaping algorithm. By RDF lattice we mean a Construction A lattice with a QC-LDPC code, which is obtained from random... 

    Dynamic Multi-Stage Multi-Secret Sharing Scheme

    , M.Sc. Thesis Sharif University of Technology Ghasemi, Reza (Author) ; Ramezanian, Rasoul (Supervisor) ; Eghlidos, Taraneh (Supervisor)
    Abstract
    Secret sharing is a method for sharing a secret among a number of participants in a manner that an authorized subset of participants can recover the secret using some information, called share, and some public values. One type of secret sharing schemes is Multi-stage Multisecret sharing scheme (MSSS). In such schemes, assigning one share to each participant, an authorized subset of participants is able to recover the secrets in different stages without any information leakage from the recovered secret(s) to the other one(s), using some public information.The number of public values is one of the most important parameters in secret sharing schemes. In this thesis we show that the number of... 

    Improving the Scalability of Blockchain Systems

    , M.Sc. Thesis Sharif University of Technology Azimi, Navid (Author) ; Eghlidos, Taraneh (Supervisor) ; Mohajeri, Javad (Co-Supervisor)
    Abstract
    Blockchain systems are considered a subclass of distributed systems and have drawn a lot of attention from academia in recent years. The deployment of these systems in various contexts has been the focus of extensive studies. Because of their design, which places a strong focus on security and decentralization, blockchain systems have some challenges. The most prominent challenge is the one that involves scalability. A blockchain's scalability refers to its capacity to achieve a target throughput and solid performance in confirming transactions with an ever-increasing workload or number of nodes in the network. A solid performance suggests that the blockchain system can sustain its... 

    Analysis of Hidden-policy Attribute-based Access Control Schemes for Cloud Environment

    , M.Sc. Thesis Sharif University of Technology Sotoudeh, Reihaneh (Author) ; Eghlidos, Taraneh (Supervisor) ; Mohajeri, Javad (Supervisor)
    Abstract
    Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is a promising access control mechanism for securing cloud data. In ciphertext-policy attribute-based encryption schemes, an access structure is sent along each ciphertext to specify authorized recipients. However, this approach can inadvertently expose users' privacy and compromise the integrity of the messages. To address these challenges, hidden-policy attribute-based encryption schemes have been developed. While numerous methods have been proposed to hide the access policy, limited research has comprehensively evaluated their effectiveness, particularly in terms of security and privacy guarantees. In this thesis, we first review and...