PROPIETAS - CRYPTO

Objetivos

  1. Analizar la fortaleza criptográfica de los métodos de cifrado a nivel de enlace usados en MANETs IEEE 802.* (RC4) y Bluetooth (E0), así como de los principales métodos de autenticación (Open System Authentication, Shared Key Authentication, Closed Network, Access Control Lists).

  2. Diseñar e implementar nuevos criptosistemas de cifrado en flujo para uso extremo a extremo en MANETs

  3. Diseñar e implementar nuevos protocolos para autenticación entre enrutadores, emisores y receptores en MANETs.

  4. Colaborar con el subproyecto no. 2 en la implementación del demostrador.

Miembros

  • Carlos Bruno (PS, Comunidad Canarias)
  • Dra. Pino Caballero (TU, ULL)
  • Dra. Amparo Fúster (CT, IFA-CSIC)
  • Dra. Candelaria Hernández (ASO, ULL)
  • Dr. Slobodan Petrovic (TC, CSIC)
  • Félix Herrera (ASO, ULL)

Publicaciones

Articles in SCI JCR journals


    2006

  1. Secret sharing based on a hard-on-average problem. Linear Algebra and its Applications (LAA - Elsevier Science Publishers). 414, Is. 2-3, pp. 626-631. April 2006. (P. Caballero-Gil, C. Hern?ndez-Goya).
  2. Zero-Knowledge Hierarchical Authentication in MANETs. IEICE Transactions on Information and Systems. Letter. E-89-D, pp. 1288-1289. March 2006. (P. Caballero-Gil, C. Hern?ndez-Goya).
  3. Using Linear Hybrid Cellular Automata to Attack the Shrinking Generator. IEICE Transactions on Fundamentals of Electronics Communications and Computer. Special Section on Discrete Mathematics and Its Applications. Paper. May 2006. (P. Caballero-Gil, A. F?ster Sabater).
  4. Modelling of Complex Cryptographic Tools in Terms of Simple Cellular Automata. Lecture Notes in Computer Science, ICCS 2006, Springer-Verlag. No. 3993, pp. 337-344 (2006) (A. F?ster Sabater, P. Caballero-Gil, and M.E. Pazo-Robles).
  5. Practical Attack on the Shrinking Generator. Lecture Notes in Computer Science, ICCSA 2006, Springer-Verlag. No. 3982, pp. 1035-1043 (2006) (P. Caballero-Gil, A. F?ster Sabater).
  6. Modelling of Complex Cryptographic Systems in Terms of Simple Cellular Automata. Lecture Notes in Computer Science, ICCSA 2006, Springer-Verlag. No. 3980, pp. 577-585 (2006) (With A. F?ster Sabater, P. Caballero-Gil and M.E. Pazo-Robles).

  7. 2005

  8. Strong Identification Based on a Hard-on-Average Problem. IEICE Transactions on Fundamentals of Electronics Communications and Computer. Special Section on Discrete Mathematics and Its Applications. Paper. Vol. E88-A No.5. pp. 1117- 1121. May 2005. (P. Caballero-Gil).
  9. Zero-Knowledge Proof for the Independent Set Problem. IEICE Transactions on Fundamentals of Electronics Communications and Computer. Special Section on Discrete Mathematics and Its Applications. Letter. Vol. E88-A No.5. pp. 1301- 1302 May 2005. (P. Caballero-Gil).
  10. Improvement of the Edit Distance Attack to Clock-Controlled LFSR-Based Stream Ciphers. Lecture Notes in Computer Science, No. 3643 EUROCAST 2005, Springer-Verlag.(2005) pp. 355 -364 (P. Caballero-Gil and A. Fuster Sabater).
  11. Algorithm for Proving the Knowledge of an Independent Vertex Set. Lecture Notes in Computer Science, No. 3643 EUROCAST 2005, Springer-Verlag.(2005) pp. 346 -354 (P. Caballero-Gil and C. Hernández-Goya).
  12. Deterministic Approach to Balancedness and Run Quantification in Pseudorandom Pattern Generators. Lecture Notes in Computer Science, No. 3746 PCI'2005, Springer-Verlag.(2005) pp. 695 - 704. (A. Fuster Sabater and P. Caballero-Gil).
  13. A Simple Acceptance/Rejection Criterium for Sequence Generators in Symmetric Cryptography. Lecture Notes in Computer Science No.3482, WICS-ICCSA, Springer-Verlag.(2005) pp. 719-728. (A. Fuster Sabater and P. Caballero-Gil).

  14. 2004

  15. A Wide Family of Nonlinear Filter Functions with a Large Linear Span. Information Sciences: An International Journal. 164, Elsevier Sciences. pp. 197-207. (2004). (P. Caballero-Gil and A. F?ster Sabater).