Luoyang University of Foreign Languages

Luoyang, China

Luoyang University of Foreign Languages

Luoyang, China
SEARCH FILTERS
Time filter
Source Type

Cheng Q.,China Institute of Technology | Cheng Q.,Luoyang University of Foreign Languages | Ma C.,China Institute of Technology
Computers and Electrical Engineering | Year: 2011

In 2010, Vo et al. (2010) [7] proposed an enhancement of authenticated multiple key exchange protocol based on Lee et al.'s protocol. In this paper, we will show that Vo et al.'s multiple key exchange protocol cannot resist reflection attack. It means that their protocol fails to provide mutual authentication. Furthermore, we propose an improvement of Vo et al.'s protocol. Our proposed protocol with reflection attack resilience can really provide mutual authentication. © 2011 Elsevier Ltd. All rights reserved.


Zhang S.,Luoyang University of Foreign Languages | Cheng Q.,Luoyang University of Foreign Languages | Cheng Q.,China Institute of Technology | Wang X.,Air Defense Forces Command Academy
Proceedings - 2010 WASE International Conference on Information Engineering, ICIE 2010 | Year: 2010

In 2009, Hölbl et al. proposed two new identity-based authenticated key exchange protocols and claimed that their protocols can withstand various attacks. In this paper, we will show that Hölbl et al.'s protocols cannot resist basic impersonation attack. It also means that their protocols are vulnerable to key compromise impersonation (KCI) attacks. Furthermore, we propose improvements of their protocols with impersonation attack resilience and KCI resilience. © 2010 IEEE.


Zhang X.-Y.,Zhengzhou University | Zhang X.-Y.,State Key Laboratory of Mathematical Engineering and Advanced Computing | Zhang X.-Y.,Information Assurance | Qi Y.-H.,Zhengzhou University | And 2 more authors.
Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology | Year: 2015

Rotation-symmetric Boolean function is a class of Boolean functions with good cryptographic properties, and researches on its weight and nonlinearity cryptographic properties have good theoretical value. Different from the conventional calculation method, in this paper, these problems are converted to the evaluation of exponential sum on finite fields with a specific normal basis. Some new results about the weight and nonlinearity of some rotation-symmetric Boolean functions of degree 2 with 4 vertical bar with a slash n and n=2s are obtained. Using the proposed method, the weight and nonlinearity of almost all Rotation-symmetric Boolean functions of degree 2 can be evaluated. This new method is also interesting for studies on the other Boolean functions. © 2015, Science Press. All right reserved.


Qin Y.,State Key Laboratory of Mathematical Engineering and Advanced Computing | Qin Y.,Luoyang University of Foreign Languages | Wang Q.,State Key Laboratory of Mathematical Engineering and Advanced Computing | Zeng Y.,State Key Laboratory of Mathematical Engineering and Advanced Computing | Xi Q.,State Key Laboratory of Mathematical Engineering and Advanced Computing
IET Conference Publications | Year: 2014

To improve the efficiency of analyzing malware behaviors and increase the validity of the test data, this paper proposes a parallel target-directed analysis method for malware behaviors, which combines static analysis with concolic testing techniques. It first uses static analysis techniques to identify and locate those interactive or input points and sensitive behavior functions. Then based on the distributed platform, by combining symbolic execution and concrete dynamic execution together and taking malware sensitive behaviors as the leading target, the parallel target-directed algorithm of searching sensitive paths and the method of leading and approaching sensitive behaviors are designed. It leads to traverse the sensitive functions, obtain the sensitive paths which can reach the sensitive behavior areas by path backtracking, and generate the corresponding test data. Finally, it finishes the analysis and test of malware behaviors. Experiments show that, compared with fuzz and full paths covering and traversing technique, this method can generate test data more efficiently, reduce the number of paths to be analyzed, and improve the analysis speed and efficiency of malware behaviors.


Gao G.,Luoyang University of Foreign Languages | Gao G.,Chinese Academy of Sciences | Guo Y.,State Key Laboratory of Mathematical Engineering and Advanced Computing | Zhao Y.,State Key Laboratory of Mathematical Engineering and Advanced Computing
IEEE Transactions on Information Theory | Year: 2016

This paper focuses on the balancedness of symmetric Boolean functions. We prove a conjecture presented by Canteaut and Videau, which states that the balanced symmetric Boolean functions of fixed algebraic degree are trivially balanced when the number of variables is large enough. Denoted by σn,d, the n-variable elementary symmetric Boolean function of degree d. As an application of this result to elementary symmetric Boolean functions, we show that all the trivially balanced elementary symmetric Boolean functions are of the form σ-2t+1l-1,2t, where t and l are any positive integers. It implies that Cusick et al.'s conjecture, which claims that σ2t+1l-1,2t is the only nonlinear balanced elementary symmetric Boolean functions, is equivalent to the conjecture that all the balanced elementary symmetric Boolean functions are trivially balanced. © 1963-2012 IEEE.


Wang W.,Luoyang University of Foreign Languages | Cheng Q.,Luoyang University of Foreign Languages
Applied Mechanics and Materials | Year: 2012

In this paper, we analyze two ID-based authenticated key exchange (AKE) protocols in the eCK model. One is a two-party AKE protocol between members of distinct domains proposed by Xia et al. in 2009. The other is a dynamic group AKE protocol proposed by Xie et al. in 2010. The results of analysis show that both of them are insecure in the eCK model.


Qin Y.,National Digital Switching System Engineering Technical Researching Center | Qin Y.,Luoyang University of Foreign Languages | Wang Q.,National Digital Switching System Engineering Technical Researching Center | Zeng Y.,National Digital Switching System Engineering Technical Researching Center | Xi Q.,National Digital Switching System Engineering Technical Researching Center
Applied Mechanics and Materials | Year: 2013

Currently, the malware behavior analysis technique spends a lot of time to generate test data. To improve it, this paper proposes a method of malware behavior analysis based on approach to sensitive behavior function. And the techniques of sensitive behavior function identification, sensitive path search and approaching sensitive behavior function are discussed in this paper. This method detects and analyzes the malware behavior by combining the concrete execution and symbolic execution together. It shows that this method can improve the efficiency of malware behavior detection by comparing it with fuzz and full path traversing technique. © (2013) Trans Tech Publications, Switzerland.


Cheng Q.,Luoyang University of Foreign Languages | Cheng Q.,Information Assurance
International Journal of Network Security | Year: 2015

Recently, Isalam and Biswas proposed a new group key agreement (GKA) protocol for imbalanced mobile networks. In this letter, we will first prove that Isalam and Biswas's GKA protocol cannot provide perfect forward secrecy. Then we will point out that their GKA protocol is vulnerable to ephemeral key compromise attack.


Cheng Q.,Luoyang University of Foreign Languages
International Journal of Network Security | Year: 2014

Multiple-key exchange (MKE) protocols allow two parties to generate two or more shared session keys over insecure networks. In recent years, many MKE protocols have been proposed. However, most of them still have some security flaws. In this letter, we will analyze a new MKE protocol proposed by Farash et al. in 2012, and present two attacks against Farash et al.'s protocol.


Cheng Q.,Luoyang University of Foreign Languages | Cheng Q.,CAS Institute of Software | Tang C.,Guangzhou University
International Journal of Network Security | Year: 2015

Recently, Teng, Wu and Tang proposed a new ID-based authenticated dynamic group key agreement (DGKA) protocol. They claimed that leaving users cannot calculate subsequent group session keys and joining users cannot calculate previous group session keys. In this paper, we will show that Teng et al.'s protocol cannot provide forward confidentiality or backward confidentiality.

Loading Luoyang University of Foreign Languages collaborators
Loading Luoyang University of Foreign Languages collaborators