Skip to main content

Showing 1–50 of 79 results for author: Buchanan, W J

.
  1. arXiv:2506.01536  [pdf, ps, other

    quant-ph

    Quantum Agents

    Authors: Eldar Sultanow, Madjid Tehrani, Siddhant Dutta, William J Buchanan, Muhammad Shahbaz Khan

    Abstract: This paper explores the intersection of quantum computing and agentic AI by examining how quantum technologies can enhance the capabilities of autonomous agents, and, conversely, how agentic AI can support the advancement of quantum systems. We analyze both directions of this synergy and present conceptual and technical foundations for future quantum-agentic platforms. Our work introduces a formal… ▽ More

    Submitted 3 June, 2025; v1 submitted 2 June, 2025; originally announced June 2025.

    Comments: 45 Pages, 16 figures, 3 Tables

    MSC Class: 2010: Primary 81P68; 68T42; Secondary 68Q12; 68T05

  2. arXiv:2505.23772  [pdf, other

    cs.CR

    Anamorphic Cryptography with Elliptic Curve Methods

    Authors: William J Buchanan

    Abstract: In 2022, Persianom, Phan and Yung outlined the creation of Anamorphic Cryptography. With this, we can create a public key to encrypt data, and then have two secret keys. These secret keys are used to decrypt the cipher into different messages. So, one secret key is given to the Dictator (who must be able to decrypt all the messages), and the other is given to Alice. Alice can then decrypt the ciph… ▽ More

    Submitted 21 April, 2025; originally announced May 2025.

  3. arXiv:2505.16614  [pdf, ps, other

    cs.CR

    Energy Consumption Framework and Analysis of Post-Quantum Key-Generation on Embedded Devices

    Authors: J Cameron Patterson, William J Buchanan, Callum Turino

    Abstract: The emergence of quantum computing and Shor's algorithm necessitates an imminent shift from current public key cryptography techniques to post-quantum robust techniques. NIST has responded by standardising Post-Quantum Cryptography (PQC) algorithms, with ML-KEM (FIPS-203) slated to replace ECDH (Elliptic Curve Diffie-Hellman) for key exchange. A key practical concern for PQC adoption is energy con… ▽ More

    Submitted 22 May, 2025; originally announced May 2025.

  4. arXiv:2505.11058  [pdf, ps, other

    cs.CR

    Side Channel Analysis in Homomorphic Encryption

    Authors: Baraq Ghaleb, William J Buchanan

    Abstract: Homomorphic encryption provides many opportunities for privacy-aware processing, including with methods related to machine learning. Many of our existing cryptographic methods have been shown in the past to be susceptible to side channel attacks. With these, the implementation of the cryptographic methods can reveal information about the private keys used, the result, or even the original plaintex… ▽ More

    Submitted 16 May, 2025; originally announced May 2025.

  5. arXiv:2505.05920  [pdf, ps, other

    cs.CR

    Privacy-Preserving Credit Card Approval Using Homomorphic SVM: Toward Secure Inference in FinTech Applications

    Authors: Faneela, Baraq Ghaleb, Jawad Ahmad, William J. Buchanan, Sana Ullah Jan

    Abstract: The growing use of machine learning in cloud environments raises critical concerns about data security and privacy, especially in finance. Fully Homomorphic Encryption (FHE) offers a solution by enabling computations on encrypted data, but its high computational cost limits practicality. In this paper, we propose PP-FinTech, a privacy-preserving scheme for financial applications that employs a CKK… ▽ More

    Submitted 9 May, 2025; originally announced May 2025.

  6. arXiv:2504.14016  [pdf, other

    cs.CR

    Post Quantum Cryptography (PQC) Signatures Without Trapdoors

    Authors: William J Buchanan

    Abstract: Some of our current public key methods use a trap door to implement digital signature methods. This includes the RSA method, which uses Fermat's little theorem to support the creation and verification of a digital signature. The problem with a back-door is that the actual trap-door method could, in the end, be discovered. With the rise of PQC (Post Quantum Cryptography), we will see a range of met… ▽ More

    Submitted 18 April, 2025; originally announced April 2025.

  7. arXiv:2504.13737  [pdf, ps, other

    cs.CR

    Breaking ECDSA with Two Affinely Related Nonces

    Authors: Jamie Gilchrist, William J. Buchanan, Keir Finlow-Bates

    Abstract: The security of the Elliptic Curve Digital Signature Algorithm (ECDSA) depends on the uniqueness and secrecy of the nonce, which is used in each signature. While it is well understood that nonce $k$ reuse across two distinct messages can leak the private key, we show that even if a distinct value is used for $k_2$, where an affine relationship exists in the form of: \(k_m = a \cdot k_n + b\), we c… ▽ More

    Submitted 18 April, 2025; originally announced April 2025.

  8. arXiv:2504.09584   

    cs.CR

    Eccfrog512ck2: An Enhanced 512-bit Weierstrass Elliptic Curve

    Authors: Víctor Duarte Melo, William J. Buchanan

    Abstract: Whilst many key exchange and digital signature methods use the NIST P256 (secp256r1) and secp256k1 curves, there is often a demand for increased security. With these curves, we have a 128-bit security. These security levels can be increased to 256-bit security with NIST P-521 Curve 448 and Brainpool-P512. This paper outlines a new curve - Eccfrog512ck2 - and which provides 256-bit security and enh… ▽ More

    Submitted 27 May, 2025; v1 submitted 13 April, 2025; originally announced April 2025.

    Comments: Some aspects of the curve need to be reviewed and updated

  9. arXiv:2504.07265  [pdf, other

    cs.CR

    ECDSA Cracking Methods

    Authors: William J. Buchanan, Jamie Gilchrist, Keir Finlow-Bates

    Abstract: The ECDSA (Elliptic Curve Digital Signature Algorithm) is used in many blockchain networks for digital signatures. This includes the Bitcoin and the Ethereum blockchains. While it has good performance levels and as strong current security, it should be handled with care. This care typically relates to the usage of the nonce value which is used to create the signature. This paper outlines the metho… ▽ More

    Submitted 9 April, 2025; originally announced April 2025.

  10. arXiv:2503.12248  [pdf, other

    cs.CR

    Electromagnetic Side-Channel Analysis of PRESENT Lightweight Cipher

    Authors: Nilupulee A Gunathilake, Owen Lo, William J Buchanan, Ahmed Al-Dubai

    Abstract: Side-channel vulnerabilities pose an increasing threat to cryptographically protected devices. Consequently, it is crucial to observe information leakages through physical parameters such as power consumption and electromagnetic (EM) radiation to reduce susceptibility during interactions with cryptographic functions. EM side-channel attacks are becoming more prevalent. PRESENT is a promising light… ▽ More

    Submitted 15 March, 2025; originally announced March 2025.

  11. arXiv:2503.11216  [pdf, other

    cs.CR

    Cross-Platform Benchmarking of the FHE Libraries: Novel Insights into SEAL and Openfhe

    Authors: Faneela, Jawad Ahmad, Baraq Ghaleb, Sana Ullah Jan, William J. Buchanan

    Abstract: The rapid growth of cloud computing and data-driven applications has amplified privacy concerns, driven by the increasing demand to process sensitive data securely. Homomorphic encryption (HE) has become a vital solution for addressing these concerns by enabling computations on encrypted data without revealing its contents. This paper provides a comprehensive evaluation of two leading HE libraries… ▽ More

    Submitted 17 March, 2025; v1 submitted 14 March, 2025; originally announced March 2025.

  12. arXiv:2503.10238  [pdf, other

    cs.CR

    Post Quantum Migration of Tor

    Authors: Denis Berger, Mouad Lemoudden, William J Buchanan

    Abstract: Shor's and Grover's algorithms' efficiency and the advancement of quantum computers imply that the cryptography used until now to protect one's privacy is potentially vulnerable to retrospective decryption, also known as \emph{harvest now, decrypt later} attack in the near future. This dissertation proposes an overview of the cryptographic schemes used by Tor, highlighting the non-quantum-resistan… ▽ More

    Submitted 13 March, 2025; originally announced March 2025.

  13. arXiv:2503.09047  [pdf

    cs.CR

    Performance Evaluation of Threshold Signing Schemes in Cryptography

    Authors: Faneela, Jawad Ahmad, Baraq Ghaleb, Imdad Ullah Khan, William J. Buchanan, Sana Ullah Jan, Muhammad Shahbaz Khan

    Abstract: Threshold Signature Scheme (TSS) protocols have gained significant attention over the past ten years due to their widespread adoption in cryptocurrencies. The adoption is mainly boosted by Gennaro and Goldfedder's TSS protocol. Since then, various TSS protocols have been introduced with different features, such as security and performance, etc. Large organizations are using TSS protocols to protec… ▽ More

    Submitted 12 March, 2025; originally announced March 2025.

  14. arXiv:2503.04652  [pdf, other

    cs.CR

    Evaluation of Privacy-aware Support Vector Machine (SVM) Learning using Homomorphic Encryption

    Authors: William J Buchanan, Hisham Ali

    Abstract: The requirement for privacy-aware machine learning increases as we continue to use PII (Personally Identifiable Information) within machine training. To overcome these privacy issues, we can apply Fully Homomorphic Encryption (FHE) to encrypt data before it is fed into a machine learning model. This involves creating a homomorphic encryption key pair, and where the associated public key will be us… ▽ More

    Submitted 6 March, 2025; originally announced March 2025.

  15. arXiv:2503.02663  [pdf, ps, other

    math.CO math.NA

    Equivalence Classes Induced by Binary Tree Isomorphism -- Generating Functions

    Authors: David Serena, William J Buchanan

    Abstract: Working with generating functions, the combinatorics of a recurrence relation can be expressed in a way that allows for more efficient calculation of the quantity. This is true of the Catalan numbers for an ordered binary tree \cite{abboud2018subtree}. Binary tree isomorphism is an important problem in computer science. The enumeration of the number of non-isomorphic rooted binary trees is therefo… ▽ More

    Submitted 4 March, 2025; originally announced March 2025.

  16. arXiv:2502.16272  [pdf, other

    cs.CR

    Partial and Fully Homomorphic Matching of IP Addresses Against Blacklists for Threat Analysis

    Authors: William J Buchanan, Hisham Ali

    Abstract: In many areas of cybersecurity, we require access to Personally Identifiable Information (PII), such as names, postal addresses and email addresses. Unfortunately, this can lead to data breaches, especially in relation to data compliance regulations such as GDPR. An IP address is a typical identifier which is used to map a network address to a person. Thus, in applications which are privacy-aware,… ▽ More

    Submitted 22 February, 2025; originally announced February 2025.

  17. arXiv:2411.17321  [pdf, other

    cs.CR

    A Framework for the Security and Privacy of Biometric System Constructions under Defined Computational Assumptions

    Authors: Sam Grierson, William J Buchanan, Craig Thomson, Baraq Galeb, Chris Eckl

    Abstract: Biometric systems, while offering convenient authentication, often fall short in providing rigorous security assurances. A primary reason is the ad-hoc design of protocols and components, which hinders the establishment of comprehensive security proofs. This paper introduces a formal framework for constructing secure and privacy-preserving biometric systems. By leveraging the principles of univers… ▽ More

    Submitted 26 November, 2024; originally announced November 2024.

  18. arXiv:2410.05145  [pdf, other

    quant-ph

    Quantum Error Propagation

    Authors: Eldar Sultanow, Fation Selimllari, Siddhant Dutta, Barry D. Reese, Madjid Tehrani, William J Buchanan

    Abstract: Data poisoning attacks on machine learning models aim to manipulate the data used for model training such that the trained model behaves in the attacker's favour. In classical models such as deep neural networks, large chains of dot products do indeed cause errors injected by an attacker to propagate or accumulate. But what about quantum models? We hypothesise that, in quantum machine learning, er… ▽ More

    Submitted 26 January, 2025; v1 submitted 7 October, 2024; originally announced October 2024.

    MSC Class: 81Rxx ACM Class: I.2; J.2

  19. arXiv:2403.08701  [pdf, other

    cs.CR

    Review of Generative AI Methods in Cybersecurity

    Authors: Yagmur Yigit, William J Buchanan, Madjid G Tehrani, Leandros Maglaras

    Abstract: Over the last decade, Artificial Intelligence (AI) has become increasingly popular, especially with the use of chatbots such as ChatGPT, Gemini, and DALL-E. With this rise, large language models (LLMs) and Generative AI (GenAI) have also become more prevalent in everyday use. These advancements strengthen cybersecurity's defensive posture and open up new attack avenues for adversaries as well. Thi… ▽ More

    Submitted 19 March, 2024; v1 submitted 13 March, 2024; originally announced March 2024.

    Comments: 40 pages

  20. arXiv:2403.05275  [pdf, other

    cs.CR cs.CY

    vSPACE: Voting in a Scalable, Privacy-Aware and Confidential Election

    Authors: Se Elnour, William J Buchanan, Paul Keating, Mwrwan Abubakar, Sirag Elnour

    Abstract: The vSPACE experimental proof-of-concept (PoC) on the TrueElect[Anon][Creds] protocol presents a novel approach to secure, private, and scalable elections, extending the TrueElect and ElectAnon protocols with the integration of AnonCreds SSI (Self-Sovereign Identity). Such a protocol PoC is situated within a Zero-Trust Architecture (ZTA) and leverages confidential computing, continuous authenticat… ▽ More

    Submitted 8 March, 2024; originally announced March 2024.

  21. arXiv:2403.05271  [pdf, other

    cs.CR

    DID:RING: Ring Signatures using Decentralised Identifiers For Privacy-Aware Identity

    Authors: Dimitrios Kasimatis, Sam Grierson, William J. Buchanan, Chris Eckl, Pavlos Papadopoulos, Nikolaos Pitropakis, Craig Thomson, Baraq Ghaleb

    Abstract: Decentralised identifiers have become a standardised element of digital identity architecture, with supra-national organisations such as the European Union adopting them as a key component for a unified European digital identity ledger. This paper delves into enhancing security and privacy features within decentralised identifiers by integrating ring signatures as an alternative verification metho… ▽ More

    Submitted 11 March, 2024; v1 submitted 8 March, 2024; originally announced March 2024.

  22. arXiv:2403.05210  [pdf, other

    cs.CR

    TIPS: Threat Sharing Information Platform for Enhanced Security

    Authors: Lakshmi Rama Kiran Pasumarthy, Hisham Ali, William J Buchanan, Jawad Ahmad, Audun Josang, Vasileios Mavroeidis, Mouad Lemoudden

    Abstract: There is an increasing need to share threat information for the prevention of widespread cyber-attacks. While threat-related information sharing can be conducted through traditional information exchange methods, such as email communications etc., these methods are often weak in terms of their trustworthiness and privacy. Additionally, the absence of a trust infrastructure between different informa… ▽ More

    Submitted 8 March, 2024; originally announced March 2024.

  23. arXiv:2401.07691  [pdf, other

    cs.CR

    Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) using Bilinear Group Accumulators in Batch Mode

    Authors: William J Buchanan, Sam Grierson, Daniel Uribe

    Abstract: Biometric data is often highly sensitive, and a leak of this data can lead to serious privacy breaches. Some of the most sensitive of this type of data relates to the usage of DNA data on individuals. A leak of this type of data without consent could lead to privacy breaches of data protection laws. Along with this, there have been several recent data breaches related to the leak of DNA informatio… ▽ More

    Submitted 15 January, 2024; originally announced January 2024.

  24. arXiv:2401.04707  [pdf, other

    cs.CR

    RNA-TransCrypt: Image Encryption Using Chaotic RNA Encoding, Novel Transformative Substitution, and Tailored Cryptographic Operations

    Authors: Muhammad Shahbaz Khan, Jawad Ahmad, Ahmed Al-Dubai, Baraq Ghaleb, Nikolaos Pitropakis, William J. Buchanan

    Abstract: Given the security concerns of Internet of Things (IoT) networks and limited computational resources of IoT devices, this paper presents RNA-TransCrypt, a novel image encryption scheme that is not only highly secure but also efficient and lightweight. RNA-TransCrypt integrates the biocryptographic properties of RNA encoding with the non-linearity and unpredictability of chaos theory. This scheme i… ▽ More

    Submitted 9 January, 2024; originally announced January 2024.

  25. arXiv:2401.00215  [pdf, other

    math.NT math.AG

    On families of elliptic curves $E_{p,q}:y^2=x^3-pqx$ that intersect the same line $L_{a,b}:y=\frac{a}{b}x$ of rational slope

    Authors: Eldar Sultanow, Malik Amir, Anja Jeschke, Amir Darwish Tfiha, Madjid Tehrani, William J Buchanan

    Abstract: Let $p$ and $q$ be two distinct odd primes, $p<q$ and $E_{p,q}:y^2=x^3-pqx$ be an elliptic curve. Fix a line $L_{a.b}:y=\frac{a}{b}x$ where $a\in \mathbb{Z},b\in \mathbb{N}$ and $(a,b)=1$. We study sufficient conditions that $p$ and $q$ must satisfy so that there are infinitely many elliptic curves $E_{p,q}$ that intersect $L_{a,b}$.

    Submitted 8 June, 2024; v1 submitted 30 December, 2023; originally announced January 2024.

    Comments: 16 pages, 7 figures

    MSC Class: 14H52

  26. arXiv:2311.02795  [pdf, other

    cs.CR

    PermutEx: Feature-Extraction-Based Permutation -- A New Diffusion Scheme for Image Encryption Algorithms

    Authors: Muhammad Shahbaz Khan, Jawad Ahmad, Ahmed Al-Dubai, Zakwan Jaroucheh, Nikolaos Pitropakis, William J. Buchanan

    Abstract: Traditional permutation schemes mostly focus on random scrambling of pixels, often neglecting the intrinsic image information that could enhance diffusion in image encryption algorithms. This paper introduces PermutEx, a feature-extraction-based permutation method that utilizes inherent image features to scramble pixels effectively. Unlike random permutation schemes, PermutEx extracts the spatial… ▽ More

    Submitted 5 November, 2023; originally announced November 2023.

  27. arXiv:2310.05032  [pdf, other

    cs.CR

    PASSION: Permissioned Access Control for Segmented Devices and Identity for IoT Networks

    Authors: Hisham Ali, Mwrwan Abubakar, Jawad Ahmad, William J. Buchanan, Zakwan Jaroucheh

    Abstract: In recent years, there has been a significant proliferation of industrial Internet of Things (IoT) applications, with a wide variety of use cases being developed and put into operation. As the industrial IoT landscape expands, the establishment of secure and reliable infrastructure becomes crucial to instil trust among users and stakeholders, particularly in addressing fundamental concerns such as… ▽ More

    Submitted 8 October, 2023; originally announced October 2023.

  28. arXiv:2310.04898  [pdf, other

    cs.CR

    Scalable Multi-domain Trust Infrastructures for Segmented Networks

    Authors: Sam Grierson, William J Buchanan, Craig Thomson, Baraq Ghaleb, Leandros Maglaras, Chris Eckl

    Abstract: Within a trust infrastructure, a private key is often used to digitally sign a transaction, which can be verified with an associated public key. Using PKI (Public Key Infrastructure), a trusted entity can produce a digital signature, verifying the authenticity of the public key. However, what happens when external entities are not trusted to verify the public key or in cases where there is no Inte… ▽ More

    Submitted 10 October, 2023; v1 submitted 7 October, 2023; originally announced October 2023.

  29. arXiv:2309.11476  [pdf

    cs.CR

    CellSecure: Securing Image Data in Industrial Internet-of-Things via Cellular Automata and Chaos-Based Encryption

    Authors: Hassan Ali, Muhammad Shahbaz Khan, Maha Driss, Jawad Ahmad, William J. Buchanan, Nikolaos Pitropakis

    Abstract: In the era of Industrial IoT (IIoT) and Industry 4.0, ensuring secure data transmission has become a critical concern. Among other data types, images are widely transmitted and utilized across various IIoT applications, ranging from sensor-generated visual data and real-time remote monitoring to quality control in production lines. The encryption of these images is essential for maintaining operat… ▽ More

    Submitted 20 September, 2023; originally announced September 2023.

  30. arXiv:2308.15009  [pdf, ps, other

    cs.CR

    Double Public Key Signing Function Oracle Attack on EdDSA Software Implementations

    Authors: Sam Grierson, Konstantinos Chalkias, William J Buchanan, Leandros Maglaras

    Abstract: EdDSA is a standardised elliptic curve digital signature scheme introduced to overcome some of the issues prevalent in the more established ECDSA standard. Due to the EdDSA standard specifying that the EdDSA signature be deterministic, if the signing function were to be used as a public key signing oracle for the attacker, the unforgeability notion of security of the scheme can be broken. This pap… ▽ More

    Submitted 10 October, 2023; v1 submitted 29 August, 2023; originally announced August 2023.

  31. arXiv:2308.10834  [pdf, other

    cs.CR cs.IT

    SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data

    Authors: Muhammad Shahbaz Khan, Jawad Ahmad, Hisham Ali, Nikolaos Pitropakis, Ahmed Al-Dubai, Baraq Ghaleb, William J. Buchanan

    Abstract: With the advent of digital communication, securing digital images during transmission and storage has become a critical concern. The traditional s-box substitution methods often fail to effectively conceal the information within highly auto-correlated regions of an image. This paper addresses the security issues presented by three prevalent S-box substitution methods, i.e., single S-box, multiple… ▽ More

    Submitted 21 August, 2023; originally announced August 2023.

    Comments: 6 Pages

  32. arXiv:2306.13727  [pdf, other

    quant-ph

    Enabling Quantum Cybersecurity Analytics in Botnet Detection: Stable Architecture and Speed-up through Tree Algorithms

    Authors: Madjid Tehrani, Eldar Sultanow, William J Buchanan, Malik Amir, Anja Jeschke, Raymond Chow, Mouad Lemoudden

    Abstract: For the first time, we enable the execution of hybrid machine learning methods on real quantum computers with 100 data samples and real-device-based simulations with 5,000 data samples, thereby outperforming the current state of research of Suryotrisongko and Musashi from 2022 who were dealing with 1,000 data samples and quantum simulators (pure software-based emulators) only. Additionally, we bea… ▽ More

    Submitted 31 July, 2023; v1 submitted 23 June, 2023; originally announced June 2023.

    Comments: 32 pages, 4 figures, 5 tables

    ACM Class: I.2

  33. arXiv:2305.18852  [pdf, other

    cs.CR

    Majority Voting Approach to Ransomware Detection

    Authors: Simon R Davies, Richard Macfarlane, William J Buchanan

    Abstract: Crypto-ransomware remains a significant threat to governments and companies alike, with high-profile cyber security incidents regularly making headlines. Many different detection systems have been proposed as solutions to the ever-changing dynamic landscape of ransomware detection. In the majority of cases, these described systems propose a method based on the result of a single test performed on… ▽ More

    Submitted 30 May, 2023; originally announced May 2023.

    Comments: 17 pages

  34. arXiv:2303.14785  [pdf, ps, other

    cs.CR

    Review of the NIST Light-weight Cryptography Finalists

    Authors: William J Buchanan, Leandros Maglaras

    Abstract: Since 2016, NIST has been assessing lightweight encryption methods, and, in 2022, NIST published the final 10: ASCON, Elephant, GIFT-COFB, Grain128-AEAD, ISAP, Photon-Beetle, Romulus, Sparkle, TinyJambu, and Xoodyak. At the time that the article was written, NISC announced ASCOn as the chosen method that will be published as NIST'S lightweight cryptography standard later in 2023. In this article,… ▽ More

    Submitted 28 March, 2023; v1 submitted 26 March, 2023; originally announced March 2023.

    Comments: 6 pages

  35. arXiv:2302.08498  [pdf

    cs.CR cs.LG

    An Omnidirectional Approach to Touch-based Continuous Authentication

    Authors: Peter Aaby, Mario Valerio Giuffrida, William J Buchanan, Zhiyuan Tan

    Abstract: This paper focuses on how touch interactions on smartphones can provide a continuous user authentication service through behaviour captured by a touchscreen. While efforts are made to advance touch-based behavioural authentication, researchers often focus on gathering data, tuning classifiers, and enhancing performance by evaluating touch interactions in a sequence rather than independently. Howev… ▽ More

    Submitted 13 January, 2023; originally announced February 2023.

  36. Towards The Creation Of The Future Fish Farm

    Authors: Pavlos Papadopoulos, William J Buchanan, Sarwar Sayeed, Nikolaos Pitropakis

    Abstract: A fish farm is an area where fish raise and bred for food. Fish farm environments support the care and management of seafood within a controlled environment. Over the past few decades, there has been a remarkable increase in the calorie intake of protein attributed to seafood. Along with this, there are significant opportunities within the fish farming industry for economic development. Determinin… ▽ More

    Submitted 2 January, 2023; originally announced January 2023.

    Journal ref: Security and Safety, 3(4), 174-186 (2022)

  37. arXiv:2212.08035  [pdf, other

    cs.CR

    Hamming Distributions of Popular Perceptual Hashing Techniques

    Authors: Sean McKeown, William J Buchanan

    Abstract: Content-based file matching has been widely deployed for decades, largely for the detection of sources of copyright infringement, extremist materials, and abusive sexual media. Perceptual hashes, such as Microsoft's PhotoDNA, are one automated mechanism for facilitating detection, allowing for machines to approximately match visual features of an image or video in a robust manner. However, there d… ▽ More

    Submitted 15 December, 2022; originally announced December 2022.

    Journal ref: DFRWS (Digital Forensics Research Conference) EU 2023, 21-24 March 2023, Bonn, Germany

  38. Transforming EU Governance: The Digital Integration through EBSI and GLASS

    Authors: Dimitrios Kasimatis, William J Buchanan, Mwarwan Abubakar, Owen Lo, Christos Chrysoulas, Nikolaos Pitropakis, Pavlos Papadopoulos, Sarwar Sayeed, Marc Sel

    Abstract: Traditionally, government systems managed citizen identities through disconnected data systems, using simple identifiers and paper-based processes, limiting digital trust and requiring citizens to request identity verification documents. The digital era offers a shift towards unique digital identifiers for each citizen, enabling a 'citizen wallet' for easier access to personal documents like acade… ▽ More

    Submitted 19 April, 2024; v1 submitted 6 December, 2022; originally announced December 2022.

  39. A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder

    Authors: Fawad Ahmed, Muneeb Ur Rehman, Jawad Ahmad, Muhammad Shahbaz Khan, Wadii Boulila, Gautam Srivastava, Jerry Chun-Wei Lin, William J. Buchanan

    Abstract: With the advancement in technology, digital images can easily be transmitted and stored over the Internet. Encryption is used to avoid illegal interception of digital images. Encrypting large-sized colour images in their original dimension generally results in low encryption/decryption speed along with exerting a burden on the limited bandwidth of the transmission channel. To address the aforement… ▽ More

    Submitted 7 November, 2022; originally announced November 2022.

    Journal ref: (2022) ACM Trans. Multimedia Comput. Commun. Appl

  40. Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification

    Authors: Simon R Davies, Richard Macfarlane, William J. Buchanan

    Abstract: Ransomware is a malicious class of software that utilises encryption to implement an attack on system availability. The target's data remains encrypted and is held captive by the attacker until a ransom demand is met. A common approach used by many crypto-ransomware detection techniques is to monitor file system activity and attempt to identify encrypted files being written to disk, often using a… ▽ More

    Submitted 24 October, 2022; originally announced October 2022.

    Journal ref: Entropy. 2022; 24(10):1503

  41. GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture

    Authors: Owen Lo, William J. Buchanan, Sarwar Sayeed, Pavlos Papadopoulos, Nikolaos Pitropakis, Christos Chrysoulas

    Abstract: E-governance is a process that aims to enhance a government's ability to simplify all the processes that may involve government, citizens, businesses, and so on. The rapid evolution of digital technologies has often created the necessity for the establishment of an e-Governance model. There is often a need for an inclusive e-governance model with integrated multiactor governance services and where… ▽ More

    Submitted 16 March, 2022; originally announced March 2022.

    Comments: Sensors 2022, 22(6), 2291; https://doi.org/10.3390/s22062291

  42. Ransomware: Analysing the Impact on Windows Active Directory Domain Services

    Authors: Grant McDonald, Pavlos Papadopoulos, Nikolaos Pitropakis, Jawad Ahmad, William J. Buchanan

    Abstract: Ransomware has become an increasingly popular type of malware across the past decade and continues to rise in popularity due to its high profitability. Organisations and enterprises have become prime targets for ransomware as they are more likely to succumb to ransom demands as part of operating expenses to counter the cost incurred from downtime. Despite the prevalence of ransomware as a threat t… ▽ More

    Submitted 7 February, 2022; originally announced February 2022.

    Journal ref: Sensors 22, no. 3: 953 (2022)

  43. NapierOne: A modern mixed file data set alternative to Govdocs1

    Authors: Simon R Davies, Richard Macfarlane, William J Buchanan

    Abstract: It was found when reviewing the ransomware detection research literature that almost no proposal provided enough detail on how the test data set was created, or sufficient description of its actual content, to allow it to be recreated by other researchers interested in reconstructing their environment and validating the research results. A modern cybersecurity mixed file data set called NapierOne… ▽ More

    Submitted 20 January, 2022; originally announced January 2022.

    Journal ref: Forensic Science International: Digital Investigation, Volume 40, 2022, 301330, ISSN 2666-2817

  44. arXiv:2112.12232  [pdf, other

    cs.CR

    Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher

    Authors: Nilupulee A. Gunathilake, Ahmed Al-Dubai, William J. Buchanan, Owen Lo

    Abstract: Lightweight cryptography is a novel diversion from conventional cryptography that targets internet-of-things (IoT) platform due to resource constraints. In comparison, it offers smaller cryptographic primitives such as shorter key sizes, block sizes and lesser energy drainage. The main focus can be seen in algorithm developments in this emerging subject. Thus, verification is carried out based upo… ▽ More

    Submitted 22 December, 2021; originally announced December 2021.

    Journal ref: 2022 IEEE 6th International Conference on Cryptography, Security and Privacy (CSP 2022)

  45. arXiv:2112.10124  [pdf, other

    cs.CR

    Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates

    Authors: Mwrwan Abubakar, Pádraig McCarron, Zakwan Jaroucheh, Ahmed Al-Dubai, William J Buchanan

    Abstract: The COVID-19 pandemic has recently emerged as a worldwide health emergency that necessitates coordinated international measures. To contain the virus's spread, governments and health organisations raced to develop vaccines that would lower Covid-19 morbidity, relieve pressure on healthcare systems, and allow economies to open. As a way forward after the COVID-19 vaccination, the Vaccination certif… ▽ More

    Submitted 21 December, 2021; v1 submitted 19 December, 2021; originally announced December 2021.

    Journal ref: IEEE SINCONF 2021 (14th International Conference on Security of Information and Networks)

  46. arXiv:2112.10092  [pdf, other

    cs.CR

    Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers

    Authors: Hisham Ali, Pavlos Papadopoulos, Jawad Ahmad, Nikolaos Pitropakis, Zakwan Jaroucheh, William J. Buchanan

    Abstract: Threat information sharing is considered as one of the proactive defensive approaches for enhancing the overall security of trusted partners. Trusted partner organizations can provide access to past and current cybersecurity threats for reducing the risk of a potential cyberattack - the requirements for threat information sharing range from simplistic sharing of documents to threat intelligence sh… ▽ More

    Submitted 19 December, 2021; originally announced December 2021.

    Journal ref: IEEE SINCONF 2021: 14th International Conference on Security of Information and Networks

  47. arXiv:2112.02855  [pdf, other

    cs.CR cs.CY

    PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching

    Authors: William Abramson, William J. Buchanan, Sarwar Sayeed, Nikolaos Pitropakis, Owen Lo

    Abstract: The spread of COVID-19 has highlighted the need for a robust contact tracing infrastructure that enables infected individuals to have their contacts traced, and followed up with a test. The key entities involved within a contact tracing infrastructure may include the Citizen, a Testing Centre (TC), a Health Authority (HA), and a Government Authority (GA). Typically, these different domains need to… ▽ More

    Submitted 6 December, 2021; originally announced December 2021.

    Journal ref: IEEE SIN 2021

  48. arXiv:2112.01815  [pdf, other

    cs.CR

    A Privacy-Preserving Platform for Recording COVID-19 Vaccine Passports

    Authors: Masoud Barati, William J. Buchanan, Owen Lo, Omer Rana

    Abstract: Digital vaccine passports are one of the main solutions which would allow the restart of travel in a post COVID-19 world. Trust, scalability and security are all key challenges one must overcome in implementing a vaccine passport. Initial approaches attempt to solve this problem by using centralised systems with trusted authorities. However, sharing vaccine passport data between different organisa… ▽ More

    Submitted 3 December, 2021; originally announced December 2021.

    Journal ref: CloudAM: 10th International Workshop on Cloud and Edge Computing, and Applications Management, 2021

  49. arXiv:2110.01970  [pdf

    cs.CR

    Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure

    Authors: Edward Henry Young, Christos Chrysoulas, Nikolaos Pitropakis, Pavlos Papadopoulos, William J Buchanan

    Abstract: Little or no research has been directed to analysis and researching forensic analysis of the Bitcoin mixing or 'tumbling' service themselves. This work is intended to examine effective tooling and methodology for recovering forensic artifacts from two privacy focused mixing services namely Obscuro which uses the secure enclave on intel chips to provide enhanced confidentiality and Wasabi wallet wh… ▽ More

    Submitted 5 October, 2021; originally announced October 2021.

    Comments: Accepted for publication in the International Conference on Data Analytics for Business and Industry (ICDABI) 2021 - (DATA'21)

  50. arXiv:2109.08566  [pdf, other

    cs.CR cs.CY cs.DC

    GLASS: Towards Secure and Decentralized eGovernance Services using IPFS

    Authors: Christos Chrysoulas, Amanda Thomson, Nikolaos Pitropakis, Pavlos Papadopoulos, Owen Lo, William J. Buchanan, George Domalis, Nikos Karacapilidis, Dimitris Tsakalidis, Dimitris Tsolis

    Abstract: The continuously advancing digitization has provided answers to the bureaucratic problems faced by eGovernance services. This innovation led them to an era of automation it has broadened the attack surface and made them a popular target for cyber attacks. eGovernance services utilize internet, which is currently a location addressed system where whoever controls the location controls not only the… ▽ More

    Submitted 17 September, 2021; originally announced September 2021.

    Comments: To be published in the proceedings of the 7th Workshop On The Security Of Industrial Control Systems & Of Cyber-Physical Systems (CyberICPS 2021). In Conjunction With ESORICS 2021