محمدرضا عارف
دانشگاه صنعتی شریف
[ 1 ] - بررسی مقایسه ای روش کدبرداری و ارسال مدیریت شده و روش کدبرداری و ارسال معمول در سیستمهای مخابرات مشارکتی
در این مقاله نرخ خطای سمبل مدولاسیون M-PSK برای مخابرات مشارکتی با به کارگیری یک رله به صورت مدیریت شده استخراج میشود. در روش معمول، رله همواره سیگنال دریافت شده در مرحله اول را کدبرداری کرده و ارسال میکند و مقصد به منظور افزایش سیگنال به نویز در گیرنده سیگنال هر دو مرحله را به صورت MRC ترکیب می کند. در روش دیگر رله به صورت مدیریت شده در ارسال سیگنال مشارکت می کند. در این روش اگر مقصد در مرحل...
[ 2 ] - تخصیص توان در سیستم رله شناختی با کانالهای محوشونده رایلی
در این مقاله دو شبکه در نظر گرفته شده است، یک شبکه اولیه و یک شبکه ثانویه که در آن از مخابرات مشارکتی استفاده میشود. در شبکه ثانویه، یک گره رله شناختی، منبع داده را برای همزیستی با شبکه اولیه کمک میکند. کاربران ثانویه باید زیر سطح نویز شبکه اولیه فعالیت کنند تا مزاحمت کمتری برای شبکه اولیه ایجاد شود. همچنین شبکه ثانویه باید قادر باشد که فرآیند ارسال و دریافت داده را کامل انجام دهد. به این منظ...
[ 3 ] - Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version)
Impossible differential attack is a well-known mean to examine robustness of block ciphers. Using impossible differ- ential cryptanalysis, we analyze security of a family of lightweight block ciphers, named Midori, that are designed considering low energy consumption. Midori state size can be either 64 bits for Midori64 or 128 bits for Midori128; however, both vers...
[ 4 ] - On the design and security of a lattice-based threshold secret sharing scheme
In this paper, we introduce a method of threshold secret sharing scheme (TSSS) in which secret reconstruction is based on Babai's nearest plane algorithm. In order to supply secure public channels for transmitting shares to parties, we need to ensure that there are no quantum threats to these channels. A solution to this problem can be utilization of lattice-based cryptosystems for these channe...
[ 5 ] - Cryptanalysis of some first round CAESAR candidates
ΑΕS _ CMCCv₁, ΑVΑLΑNCHEv₁, CLΟCv₁, and SILCv₁ are four candidates of the first round of CAESAR. CLΟCv₁ is presented in FSE 2014 and SILCv₁ is designed upon it with the aim of optimizing the hardware implementation cost. In this paper, structural weaknesses of these candidates are studied. We present distinguishing attacks against ΑES _ CMCCv₁ with the complexity of two queries and the success ...
[ 6 ] - Enhancing privacy of recent authentication schemes for low-cost RFID systems
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
[ 7 ] - Artemia: a family of provably secure authenticated encryption schemes
Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...
[ 8 ] - Total break of Zorro using linear and differential attacks
An AES-like lightweight block cipher, namely Zorro, was proposed in CHES 2013. While it has a 16-byte state, it uses only 4 S-Boxes per round. This weak nonlinearity was widely criticized, insofar as it has been directly exploited in all the attacks on Zorro reported by now, including the weak key, reduced round, and even full round attacks. In this paper, using some properties discovered by Wa...
[ 9 ] - Toward an energy efficient PKC-based key management system for wireless sensor networks
Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...
[ 10 ] - Eigenvalues-based LSB steganalysis
So far, various components of image characteristics have been used for steganalysis, including the histogram characteristic function, adjacent colors distribution, and sample pair analysis. However, some certain steganography methods have been proposed that can thwart some analysis approaches through managing the embedding patterns. In this regard, the present paper is intended to introduce a n...
[ 11 ] - Improving the Rao-Nam secret key cryptosystem using regular EDF-QC-LDPC codes
This paper proposes an efficient joint secret key encryption-channel coding cryptosystem, based on regular Extended Difference Family Quasi-Cyclic Low-Density Parity-Check codes. The key length of the proposed cryptosystem decreases up to 85 percent using a new efficient compression algorithm. Cryptanalytic methods show that the improved cryptosystem has a significant security advantage over Ra...
[ 12 ] - Biclique Cryptanalysis of Block Ciphers LBlock and TWINE-80 with Practical Data Complexity
In the biclique attack, a shorter biclique usually results in less data complexity, but at the expense of more computational complexity. The early abort technique can be used in partial matching part of the biclique attack in order to slightly reduce the computations. In this paper, we make use of this technique, but instead of slight improvement in the computational complexity, we keep the amo...
[ 13 ] - بررسی مقایسه ای روش کدبرداری و ارسال مدیریت شده و روش کدبرداری و ارسال معمول در سیستمهای مخابرات مشارکتی
در این مقاله نرخ خطای سمبل مدولاسیون M-PSK برای مخابرات مشارکتی با به کارگیری یک رله به صورت مدیریت شده استخراج میشود. در روش معمول، رله همواره سیگنال دریافت شده در مرحله اول را کدبرداری کرده و ارسال میکند و مقصد به منظور افزایش سیگنال به نویز در گیرنده سیگنال هر دو مرحله را به صورت MRC ترکیب می کند. در روش دیگر رله به صورت مدیریت شده در ارسال سیگنال مشارکت می کند. در این روش اگر مقصد در مرحل...
[ 14 ] - تخصیص توان در سیستم رله شناختی با کانالهای محوشونده رایلی
در این مقاله دو شبکه در نظر گرفته شده است، یک شبکه اولیه و یک شبکه ثانویه که در آن از مخابرات مشارکتی استفاده میشود. در شبکه ثانویه، یک گره رله شناختی، منبع داده را برای همزیستی با شبکه اولیه کمک میکند. کاربران ثانویه باید زیر سطح نویز شبکه اولیه فعالیت کنند تا مزاحمت کمتری برای شبکه اولیه ایجاد شود. همچنین شبکه ثانویه باید قادر باشد که فرآیند ارسال و دریافت داده را کامل انجام دهد. به این منظ...
[ 15 ] - New Fixed Point Attacks on GOST2 Block Cipher
GOST block cipher designed in the 1970s and published in 1989 as the Soviet and Russian standard GOST 28147-89. In order to enhance the security of GOST block cipher after proposing various attacks on it, designers published a modified version of GOST, namely GOST2, in 2015 which has a new key schedule and explicit choice for S-boxes. In this paper, by using three exactly identical portions of ...
[ 16 ] - Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants
In this paper, we present some attacks on GAGE, InGAGE, and CiliPadi which are candidates of the first round of the NIST-LWC competition. GAGE and InGAGE are lightweight sponge based hash function and Authenticated Encryption with Associated Data (AEAD), respectively and support different sets of parameters. The length of hash, key, and tag are always 256, 128, and 128 bits, respec...
[ 17 ] - Design of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method
Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...
Co-Authors