-
FPGA Implementation of SIMON-128 Cryptographic Algorithm Using Artix-7
Authors:
Ridha Ghayoula,
Jaouhar Fattahi,
Amor Smida,
Issam El Gmati,
Emil Pricop,
Marwa Ziadia
Abstract:
FPGA is a hardware architecture based on a matrix of programmable and configurable logic circuits thanks to which a large number of functionalities inside the device can be modified using a hardware description language. These functionalities must often be secured especially when the context is sensitive (military, banking, medical, legal, etc.). In this paper, we put forward an efficient implemen…
▽ More
FPGA is a hardware architecture based on a matrix of programmable and configurable logic circuits thanks to which a large number of functionalities inside the device can be modified using a hardware description language. These functionalities must often be secured especially when the context is sensitive (military, banking, medical, legal, etc.). In this paper, we put forward an efficient implementation of SIMON's block cipher algorithm using Xilinx Vivado 2018.2. The proposed design is analyzed through simulation on Xilinx Artix-7. A prototype of our design is implemented using the xc7a35tcsg324-1 FPGA chip. Performance and results are discussed.
△ Less
Submitted 4 January, 2023;
originally announced January 2023.
-
Fuzzy approach on modelling cyber attacks patterns on data transfer in industrial control systems
Authors:
Emil Pricop,
Sanda Florentina Mihalache
Abstract:
Cybersecurity of industrial control system is a very complex and challenging research topic, due to the integration of these systems in national critical infrastructures. The control systems are now interconnected in industrial networks and frequently to the Internet. In this context they are becoming targets of various cyber attacks conducted by malicious people such as hackers, script kiddies, i…
▽ More
Cybersecurity of industrial control system is a very complex and challenging research topic, due to the integration of these systems in national critical infrastructures. The control systems are now interconnected in industrial networks and frequently to the Internet. In this context they are becoming targets of various cyber attacks conducted by malicious people such as hackers, script kiddies, industrial spies and even foreign armies and intelligence agencies. In this paper the authors propose a way to model the most frequent attacker profiles and to estimate the success rate of an attack conducted in given conditions. The authors use a fuzzy approach for generating attacker profiles based on attacker attributes such as knowledge, technical resources and motivation. The attack success rate is obtained by using another fuzzy inference system that analyzes the attacker profile and system intrinsic characteristics.
△ Less
Submitted 30 November, 2019;
originally announced December 2019.
-
On the design of an innovative solution for increasing hazardous materials transportation safety
Authors:
Emil Pricop
Abstract:
Transportation of hazardous materials represent a high risk operation all over the world. Flammable substances such as oil, kerosene, hydrocarbons, ammonium nitrate or toxic products are shipped every day on busy roads by trucks. An innovative solution for increasing hazardous materials transportation safety is presented in this paper. The solution integrates three systems: one mounted on the truc…
▽ More
Transportation of hazardous materials represent a high risk operation all over the world. Flammable substances such as oil, kerosene, hydrocarbons, ammonium nitrate or toxic products are shipped every day on busy roads by trucks. An innovative solution for increasing hazardous materials transportation safety is presented in this paper. The solution integrates three systems: one mounted on the truck that can alert authorities in case of an accident, one portable system for quick identification of the carried substances and intervention method and a component for real-time road monitoring. The proposed solution is based on RFID card with a special memory structure presented in this paper
△ Less
Submitted 10 September, 2019;
originally announced September 2019.
-
Real-time stock analysis for blending recipes in industrial plants
Authors:
Florin Zamfir,
Nicolae Paraschiv,
Emil Pricop
Abstract:
Many companies use Excel spreadsheets to keep stock records and to calculate process-specific data. These spreadsheets are often hard to understand and track. And if the user does not protect them, there is a risk that the user randomly changes or erase formulas. The paper focuses on the stocks of products used in a blending process with a known recipe. Developing an application that can bring thi…
▽ More
Many companies use Excel spreadsheets to keep stock records and to calculate process-specific data. These spreadsheets are often hard to understand and track. And if the user does not protect them, there is a risk that the user randomly changes or erase formulas. The paper focuses on the stocks of products used in a blending process with a known recipe. Developing an application that can bring this data in a centralized form and that can assist the operator in decide is a necessity. When a programmer implements an application that uses data from plants he needs to consider one fundamental aspect as reading real-time data from the process. The real-time stock analysis application takes into account all the above elements. The application is easy to use by an operator in the command room of installation because of the planning algorithms integrated into it. The algorithms proposed and implemented in this paper have well-defined goals: identifying the ingredients needed to achieve the blending process for required quantities, determine the quantities of the finished product that can be made with the existing ingredients and determine the optimum quantities of the finished product. The application implemented in C# intensively uses these algorithms and gives the user the ability to build the result step by step.
△ Less
Submitted 29 August, 2019;
originally announced September 2019.
-
IoT Forensic -- A digital investigation framework for IoT systems
Authors:
Snehal Sathwara,
Nitul Dutta,
Emil Pricop
Abstract:
Security issues, threats, and attacks in relation with the IoT have been identified as promising and challenging area of research. Eventually, the need for a forensics methodology for investigating IoT-related crime is therefore essential. However, the IoT poses many challenges for forensics investigators. These include the wide range and variety of information, the unclear lines of differentiatio…
▽ More
Security issues, threats, and attacks in relation with the IoT have been identified as promising and challenging area of research. Eventually, the need for a forensics methodology for investigating IoT-related crime is therefore essential. However, the IoT poses many challenges for forensics investigators. These include the wide range and variety of information, the unclear lines of differentiation between networks, for example private networks increasingly fading into public networks. Further, integration of a large number of objects in IoT forensic interest, along with the relevance of identified and collected devices makes forensic of IoT devices more complicated. The scope of this paper is to present a framework for IoT forensic. We aimed at the study and development of the link to support digital investigations of IoT devices and tackle emerging challenges in digital forensics. We emphasize on various steps for digital forensic with respect to IoT devices.
△ Less
Submitted 6 September, 2019;
originally announced September 2019.
-
Towards a reliable approach on scaling in data acquisition
Authors:
Nicolae Paraschiv,
Emil Pricop,
Jaouhar Fattahi,
Florin Zamfir
Abstract:
Data acquisition is an important process in the functioning of any control system. Usually, the acquired signal is analogic, representing a continuous physical measure, and it should be processed in a digital system based on an analog to digital converter (ADC) and a microcontroller. The ADC provides the converted value in ADC units, but the system and its operator need the value expressed in phys…
▽ More
Data acquisition is an important process in the functioning of any control system. Usually, the acquired signal is analogic, representing a continuous physical measure, and it should be processed in a digital system based on an analog to digital converter (ADC) and a microcontroller. The ADC provides the converted value in ADC units, but the system and its operator need the value expressed in physical units. In this paper we propose a novel design solution for the scaling module, which is a key component of a digital measurement system. The scaling module refers to fitting the sensor result of a variable number of bits depending on the ADC resolution into physical units. A general method for scaling is proposed and a SageMath script is presented for obtaining easily the scaling function. In the last part of the paper, the proposed method is validated in a case study, by calculus, and it is implemented on a low-cost development system in order to create a wireless sensor node.
△ Less
Submitted 29 August, 2019;
originally announced September 2019.
-
Authentication by Witness Functions
Authors:
Jaouhar Fattahi,
Mohamed Mejri,
Emil Pricop
Abstract:
Witness functions have recently been introduced in cryptographic protocols' literature as a new powerful way to prove protocol correctness with respect to secrecy. In this paper, we extend them to the property of authentication. We show how to use them safely and we run an analysis on a modified version of the Woo-Lam protocol. We show that it is correct with respect to authentication.
Witness functions have recently been introduced in cryptographic protocols' literature as a new powerful way to prove protocol correctness with respect to secrecy. In this paper, we extend them to the property of authentication. We show how to use them safely and we run an analysis on a modified version of the Woo-Lam protocol. We show that it is correct with respect to authentication.
△ Less
Submitted 13 March, 2019;
originally announced March 2019.
-
On the Security of Cryptographic Protocols Using the Little Theorem of Witness Functions
Authors:
Jaouhar Fattahi,
Mohamed Mejri,
Emil Pricop
Abstract:
In this paper, we show how practical the little theorem of witness functions is in detecting security flaws in some category of cryptographic protocols. We convey a formal analysis of the Needham-Schroeder symmetric-key protocol in the theory of witness functions. We show how it helps to teach about a security vulnerability in a given step of this protocol where the value of security of a particul…
▽ More
In this paper, we show how practical the little theorem of witness functions is in detecting security flaws in some category of cryptographic protocols. We convey a formal analysis of the Needham-Schroeder symmetric-key protocol in the theory of witness functions. We show how it helps to teach about a security vulnerability in a given step of this protocol where the value of security of a particular sensitive ticket in a sent message unexpectedly plummets compared with its value when received. This vulnerability may be exploited by an intruder to mount a replay attack as described by Denning and Sacco.
△ Less
Submitted 1 March, 2019;
originally announced March 2019.
-
Considerations regarding security issues impact on systems availability
Authors:
Emil Pricop,
Sanda Florentina Mihalache,
Nicolae Paraschiv,
Jaouhar Fattahi,
Florin Zamfir
Abstract:
Control systems behavior can be analyzed taking into account a large number of parameters: performances, reliability, availability, security. Each control system presents various security vulnerabilities that affect in lower or higher measure its functioning. In this paper the authors present a method to assess the impact of security issues on the systems availability. A fuzzy model for estimating…
▽ More
Control systems behavior can be analyzed taking into account a large number of parameters: performances, reliability, availability, security. Each control system presents various security vulnerabilities that affect in lower or higher measure its functioning. In this paper the authors present a method to assess the impact of security issues on the systems availability. A fuzzy model for estimating the availability of the system based on the security level and achieved availability coefficient (depending on MTBF and MTR) is developed and described. The results of the fuzzy inference system (FIS) are presented in the last section of the paper.
△ Less
Submitted 16 January, 2018;
originally announced January 2018.
-
Radiation Pattern Synthesis Using Hybrid Fourier- Woodward-Lawson-Neural Networks for Reliable MIMO Antenna Systems
Authors:
Elies Ghayoula,
Ridha Ghayoula,
Jaouhar Fattahi,
Emil Pricop,
Jean-Yves Chouinard,
Ammar Bouallegue
Abstract:
In this paper, we implement hybrid Woodward-Lawson-Neural Networks and weighted Fourier method to synthesize antenna arrays. The neural networks (NN) is applied here to simplify the modeling of MIMO antenna arrays by assessing phases. The main problem is obviously to find optimal weights of the linear antenna array elements giving radiation pattern with minimum sidelobe level (SLL) and hence ameli…
▽ More
In this paper, we implement hybrid Woodward-Lawson-Neural Networks and weighted Fourier method to synthesize antenna arrays. The neural networks (NN) is applied here to simplify the modeling of MIMO antenna arrays by assessing phases. The main problem is obviously to find optimal weights of the linear antenna array elements giving radiation pattern with minimum sidelobe level (SLL) and hence ameliorating the antenna array performance. To attain this purpose, an antenna array for reliable Multiple-Input Multiple-Output (MIMO) applications with frequency at 2.45 GHz is implemented. To validate the suggested method, many examples of uniformly excited array patterns with the main beam are put in the direction of the useful signal. The Woodward-Lawson-Neural Networks synthesis method permits to find out interesting analytical equations for the synthesis of an antenna array and highlights the flexibility between the system parameters in input and those in output. The performance of this hybrid optimization underlines how well the system is suitable for a wireless communication and how it participates in reducing interference, as well.
△ Less
Submitted 7 October, 2017;
originally announced October 2017.
-
Witness-Functions versus Interpretation-Functions for Secrecy in Cryptographic Protocols: What to Choose?
Authors:
Jaouhar Fattahi,
Mohamed Mejri,
Marwa Ziadia,
Takwa Omrani,
Emil Pricop
Abstract:
Proving that a cryptographic protocol is correct for secrecy is a hard task. One of the strongest strategies to reach this goal is to show that it is increasing, which means that the security level of every single atomic message exchanged in the protocol, safely evaluated, never deceases. Recently, two families of functions have been proposed to measure the security level of atomic messages. The f…
▽ More
Proving that a cryptographic protocol is correct for secrecy is a hard task. One of the strongest strategies to reach this goal is to show that it is increasing, which means that the security level of every single atomic message exchanged in the protocol, safely evaluated, never deceases. Recently, two families of functions have been proposed to measure the security level of atomic messages. The first one is the family of interpretation-functions. The second is the family of witness-functions. In this paper, we show that the witness-functions are more efficient than interpretation-functions. We give a detailed analysis of an ad-hoc protocol on which the witness-functions succeed in proving its correctness for secrecy while the interpretation-functions fail to do so.
△ Less
Submitted 27 July, 2017;
originally announced July 2017.
-
Cryptographic Protocol for Multipart Missions Involving Two Independent and Distributed Decision Levels in a Military Context
Authors:
Jaouhar Fattahi,
Mohamed Mejri,
Marwa Ziadia,
Ouejdene Samoud,
Elies Ghayoula,
Emil Pricop
Abstract:
In several critical military missions, more than one decision level are involved. These decision levels are often independent and distributed, and sensitive pieces of information making up the military mission must be kept hidden from one level to another even if all of the decision levels cooperate to accomplish the same task. Usually, a mission is negotiated through insecure networks such as the…
▽ More
In several critical military missions, more than one decision level are involved. These decision levels are often independent and distributed, and sensitive pieces of information making up the military mission must be kept hidden from one level to another even if all of the decision levels cooperate to accomplish the same task. Usually, a mission is negotiated through insecure networks such as the Internet using cryptographic protocols. In such protocols, few security properties have to be ensured. However, designing a secure cryptographic protocol that ensures several properties at once is a very challenging task. In this paper, we propose a new secure protocol for multipart military missions that involve two independent and distributed decision levels having different security levels. We show that it ensures the secrecy, authentication, and non-repudiation properties. In addition, we show that it resists against man-in-the-middle attacks.
△ Less
Submitted 27 July, 2017; v1 submitted 24 July, 2017;
originally announced July 2017.