xix Preface Information Systems (IS) play a central part in all aspects of our world, from science, medicine, and engineering, to industry, business, law, politics, government, arts, culture, society, health, operational support in daily life, surveillance of infrastructure and environment, and homeland protection and national security. Without proper security precautions, IS are prone to unexpected and intolerable side effects, such as leakage of operational and confidential data, identity theft and unauthorized access, and possibly modification of private data, services, and systems. Security services are required in order to guarantee information security and protection of privacy, such as data confidentiality, data authentication, anonymity, entity authentication, non-repudiation of origin and receipt, access control, protection against denial of service and phishing, and secure processing and deletion of data. In a nutshell, dependable and trustworthy security solutions based on strong cryptography are needed. The collection of chapters in this book focuses on theory and the practice of cryptographic security solutions for deployment in Information Systems (IS). Given the rapid progress of tools, systems, and technologies, and the emergence of many new application areas of IS, it is essential for such solutions to be designed, implemented, tested, and verified using sound engineering approaches as they must support the core functionality of secure information systems. The theoreticians, designers, engineers, and practitioners of cryptography need to provide such cryptography solutions that balance the required level of security versus costs and risks involved in deploying those solutions in their targeted applications. Therefore, the successful deployment of cryptographic solutions requires a complete understanding of the requirements of IS at hand, their constraints and performance characteristics, the capabilities of the hardware and software platforms, and the nature of the network environments in which they operate. In some cases, especially in emerging areas, new cryptographic solutions based on new approaches and new theories may be required because off-the-shelf solutions may not work. The editors of this collection have come together to compile and present the state-of-the-art in cryptographic security solutions from theory to implementations to applications in a comprehensive and definitive collection. They have a long-standing reputation in cryptography and several other allied and complementary areas of research, and have broad and recognized experience in leading international professional media, conferences, and the organization of special issues of international journals. The seeds of this collection were in fact laid in the ongoing cooperation of the editors in the organization of a conference series called International Conference on Security of Information and Networks (SIN). The SIN series was inaugurated with SIN 2007, which was held in Gazimagusa, North Cyprus, hosted by Eastern Mediterranean University, and co-organized by İstanbul Technical University. SIN 2007 was chaired by Atilla Elçi, one of the editors of this collection, and served by an international program committee. Although the conference topics covered all areas of information and network security as intended from the outset, due to their critical importance and timeliness, several topical areas naturally emerged: xx • • • Cryptography: This area featured papers on the development, design, and analysis of new cryptographic algorithms and methods, both software and hardware implementation of such algorithms and methods, and selected applications of cryptography. Network Security: This area featured papers on authentication, authorization, access control, privacy, intrusion detection, malware detection, and mobile and personal area networks. IT Governance: This area featured papers on information security management systems, risk and threat analysis, and information security guidelines and policies. The conference main themes were supported by invited papers and talks, especially on the state-ofthe-art in cryptography, given by some of the leading international researchers. Bart Preneel, Head of Computer Security and Industrial Cryptography (COSIC) at Katholieke Universiteit Leuven, Leuven, Belgium, talked about Research Challenges in Cryptology. He highlighted the recent developments in cryptography and how advanced cryptographic techniques could contribute to address future challenges related to privacy, trusted computing, distributed trust, and ambient intelligence. Marc Joye, Thomson R&D, France, talked about White-box cryptography techniques aimed at protecting software implementations of cryptographic algorithms against key recovery. Elisabeth Oswald, Cryptography and Information Security Group, University of Bristol, Bristol, UK, talked about Power Analysis Attacks that allow extracting keys from cryptographic devices with low effort. Çetin Kaya Koç, İstanbul Commerce University, Turkey, and Oregon State University, USA, gave an overview of side-channel attacks on commodity processors, particularly for computers running as servers. Mehmet Ufuk Çağlayan, Boğaziçi University, Turkey, delivered a survey on secure routing issues in MANETs, with a summary of the current state of the art in secure routing protocols and their resistance to known attacks. Karthik Bhargawan, Microsoft Research Cambridge, UK, overviewed the recent work in verifying security properties for protocols being standardized as part of the XML Web Services framework. What was particularly notable at SIN 2007 was the participation of both the theoreticians and the practitioners who were interested in a holistic view of information and network security. In particular, the practitioners were interested in finding the latest research on information and network security and how best to benefit from that research in improving security solutions in information systems, and the theoreticians were interested in the challenges of actual security problems and how best to study and understand them so as to further foundational studies. The proceedings of the conference, co-edited by Atilla Elçi, S. Berna Örs, and Bart Preneel, was published by Trafford and sold internationally both as hardcopy and as an ebook. It was decided that the follow up conference SIN 2009 was also to be held in Gazimagusa, North Cyprus, but with an extended international cooperation that involved researchers from Eastern Mediterranean University, Macquarie University, and Southern Federal University. All of the editors joined the organization of SIN 2009 under various capacities: Atilla Elçi and Mehmet A. Orgun as conference co-chairs, Alexander Chefranov and Josef Pieprzyk as program co-chairs, and Rajan Shankaran as workshop co-chair. Huaxiong Wang joined the Program Committee of the conference and has been involved with the SIN series ever since. As in SIN 2007, the conference program was supported by invited papers and talks, given by some of the leading international researchers. Elisa Bertino, Research Director of the Center for Education and Research in Information Assurance and Security at Purdue University, USA, who graciously agreed to write a foreword to this book, talked about “Assured Information Sharing: Concepts and Research Issues.” Erdal Çayırcı, NATO JWC & University of Stavanger, Norway, talked about “Deployed Sensor Networks and Their Security Challenges in Practice.” Sorin Alexander Huss, Director CASED Research xxi Center for IT Security, Technical University of Darmstadt, Germany, talked about “Embedded Systems for IT Security Applications: Properties and Design Considerations.” In line with the international cooperation of the organizers, technical cooperation with the ACM Special Interest Group on Security, Audit, and Control (SIGSAC) was sought, and the conference proceedings was published by ACM for the first time and placed on the ACM Digital Library for perpetual access. Encouraged by the successful cooperation of the organizers at SIN 2007 and 2009 and the resounding success of the conference, the SIN Conference was intended to be an annual event from 2009 onwards. SIN 2010 was held in Taganrog, Rostov-on-Don, Russia, organized by a team of researchers from Southern Federal University, Eastern Mediterranean University, Macquarie University, and Technical University of Darmstadt. Atilla Elçi and Mehmet A. Orgun served as conference co-chairs, Alexander Chefranov as program co-chair, and Rajan Shankaran as workshop co-chair. SIN 2010 was also held in technical cooperation with the ACM Special Interest Group on Security, Audit, and Control (SIGSAC), and the conference proceedings was published by the ACM once more. The very areas that emerged at previous SIN conferences were strong as ever, and several new frontier areas were also represented, including secure ontology-based systems, security-aware software engineering, trust management and privacy, and security standards, guidelines, and certification. Microsoft Russia and Russian Foundation for Basic Research also came to the party by providing sponsorship for the conference. As usual, the conference main themes were supported by invited papers and talks. Josef Pieprzyk, Macquarie University, Australia, talked about “Evolution of Cryptographic Hashing,” and Alexander Tereshkin, Principal Researcher, Invisible Things Lab, Rostov-on-Don, Russia, talked about “Evil Maid goes after PGP Whole Disk Encryption.” As the research areas that underpin the SIN series continued to mature, it was felt that the time was ripe for a journal special issue which showcased the best and the most recent research efforts presented at SIN 2010. The authors of the papers presented at SIN 2010 were invited to submit the revised and substantially extended versions of their papers to a special issue of Security and Communication Networks (by Wiley) on the Design and Engineering of Cryptographic Solutions for Secure Information Systems. There was a strong interest in the special issue within the security and cryptography communities, and after several rounds of careful reviewing, nine high quality papers were finally accepted for publication. The special issue is scheduled to be published in early 2013. The papers which have been accepted for publication in the special issue cover several important topics in the design and engineering of cryptographic solutions for secure information systems, including hardware design, cryptographic fundamentals, auction design, protocol verification, detection of collusion attacks, and policy issues. The efforts to bring the special issue to fruition were but a prelude to a more substantial undertaking by the editors for the production of a comprehensive and up-to-date resource on cryptographic security solutions. In order to further the goals of a truly international conference, SIN 2011 was held in Sydney, Australia, in November 2011, organized jointly by Macquarie University, Süleyman Demirel University, Southern Federal University, and Technical University of Darmstadt. All the editors took active roles in the organization of SIN 2011. Atilla Elçi and Mehmet A. Orgun served as conference co-chairs; Josef Pieprzyk, Alexander Chefranov, and Rajan Shankaran as program co-chairs; and Huaxiong Wang as the Asia-Pacific liaison. The Air Force Office of Scientific Research (AFOSR), Asian Office of Aerospace Research and Development (AOARD), Army International Technology Center-Pacific (ITC-PAC), and Office of Naval Research-Global (ONRG) provided sponsorship, which contributed substantially to the success of SIN 2011. There was yet again a strong presence of the discussion of latest cryptography solutions at the conference. The conference main themes were supported by invited papers and talks. xxii Professor Vijay Varadharajan, Microsoft Chair in Innovation in Computing, Macquarie University, Sydney, Australia, talked about “Rethinking Cyber Security”; and Dr. Kevin Kwiat, Principal Computer Engineer, the Cyber Science Branch of the U.S. Air Force Research Laboratory (AFRL), Rome, New York, USA, talked about “Fault Tolerance for Fight-Through: A Basis for Strategic Survival.” The proceedings of the SIN 2011 conference was also published by the ACM and uploaded to ACM DL. Now that the research areas represented at the SIN conferences have continued to grow and flourish, the organisers of SIN 2011 have arranged two special issues around two of those areas. A special issue of Concurrency and Computation: Practice and Experience (by Wiley) focussed on the theme of Trust and Security in Wireless Sensor Networks to address the design, development, and deployment of trust management schemes and security solutions that take into account the intrinsic features of wireless sensor networks. A special issue of Networking Science (Springer-Verlag) focussed on the theme of Next Generation Network Architectures, Protocols, Theory, Systems, and Applications to address security solutions for single packet switching networks that transports all kinds of information (voice, data, multimedia) as packets. Both the special issues are under progress and scheduled to appear in late 2013. Continuing with the internationalization of the SIN series, and encouraged by the participation of a strong contingency of researchers from universities in India, SIN 2012 was held at Jaipur in India in October 2012, organized by Malaviya National Institute of Technology, Aksaray University, Southern Federal University, Macquarie University, and Indian Institute of Technology Bombay. Once again, all the editors have taken part in SIN 2012 under various but similar capacities, with a strong local participation from Indian researchers and practitioners in the organization of the conference. The strong technical program was supported by twelve invited speakers, seven of whom were from various institutions in India showcasing the fine cryptography research conducted in India as well as the latest advances in security in cloud computing. Continuing with the tradition of the past events, the proceedings of the SIN 2012 conference was also published by the ACM and uploaded to ACM DL. After the successful conclusion of SIN 2012, it was decided that every few years the SIN series would be held in the region where it originated. Having taken a new post at Aksaray University, in the Cappadocia region, Turkey, Atilla Elçi has been spearheading the organization of SIN 2013, which will be held in Aksaray, Turkey, in November 2013. All the editors are looking forward to the next stage in their fruitful cooperation and welcome cryptography and security researchers as active participants both in the organization of the conference as well as on the conference program. They also welcome back Berna Örs Yalçın, İstanbul Technical University, Turkey, as program co-chair, who was conference co-chair of SIN 2007. If the resounding success and continuing growth of the past conferences is any indication, the future of the SIN series is bright indeed. Every now and then, it is also essential to take stock of the progress in theory and practice of cryptographic security solutions, present the contributions scattered across many diverse forums such as conference proceedings and journal papers in a coherent way, and provide a broad picture of the recent achievements of the area, paving the way for future progress. Given the maturity of cryptography solutions and the recent advances in this area, these goals could not have been achieved within the time and page limitations of journal special issues, but they could be achieved in a book which would first introduce in an accessible style the nature of cryptography, then explore numerous established, advanced, and frontier topics in cryptography leading to illustrations of new frontiers in secure IS. As such, it would foster further research on the development, design, and engineering of cryptographic solutions in secure information systems ranging from theoretical to practical issues and of course to their ultimate applica- xxiii tions. It would also serve the needs of advanced learners, faculty, and graduate students alike, and should be suitable for individual learners and classroom adoption. To this end, the editors approached IGI Global in September 2011 with a view to the publication of such a book, which would primarily focus on cryptography and its use for security of IS in its broader context. It would also serve as a landmark resource for information and network security in IS, providing the reader with the state-of-the-art technologies and practices of putting cryptographic solutions to work for creating secure IS. To achieve these objectives, the book would naturally need to draw from a broader base of research efforts in cryptography solutions, not just those represented at the SIN conferences over the past few years. We were delighted when the book proposal was approved, and we had a worthwhile and timely challenge to bring it to its fruition. Under the stewardship of the editors, an editorial board of international reviewers was formed, and the call for papers was widely circulated to the participants at the SIN conferences as well as to the broader scientific community. There was a strong response to the call for papers for the collection. Researchers and practitioners were first invited to submit a 2-3 page chapter proposal by November 2011, clearly explaining the contributions of the chapter and how it would address a cryptographic solution for IS. As a result, 35 chapter proposals from researchers from all over the world were received. The submitted chapter proposals were assessed by the editors for the significance and the originality of the proposed cryptographic solutions and how they would fit with the main theme of the collection. The authors of accepted proposals were duly notified and asked to submit full chapters of about 20 pages by February 2012. All the submitted full chapters were assessed by three reviewers of international standing on a double-blind basis, and the reviews were moderated by the editors for their significance, originality, quality, timeliness, and usefulness. The authors re-submitted full chapters after updating in response to reviewers comments. Finally, after a second round of reviewing, 19 high quality chapter submissions were accepted for publication in this collection. The chapters in this collection are arranged in five sections, which can be read independently of one another. However, the natural progression of the material is from more foundational studies towards more applied ones at frontier areas such as e-voting, e-auctions, and health monitoring systems. In order to get the most out of the book and also to appreciate the holistic view of how cryptography solutions have been devised, implemented, and deployed, we strongly recommend a sampling of a few chapters from each of the sections 1-4 at the first reading, depending of course on the interests and expertise of the reader, followed by the chapters in section 5, which provide several case studies. The chapters in Section 1 focus on Cryptographic Methods Analysis. Modern cryptographic methods are based on several branches of mathematics and computer science such as algebra, number theory, finite fields, complexity theory, algorithm design, and analysis. The implementation and application of cryptographic methods naturally draws from technological advances, in both hardware and software alike, which throw new challenges to theoreticians and practitioners of cryptography, literally on an ongoing basis. Cryptographic methods are quite diverse and have different underlying assumptions and constraints; thus, their analysis helps to ascertain inherent worth of and security expectations from secure information systems. The chapters in this section set the basis to build essential understanding and appreciation of cryptographic methods. Chapter 1 proposes harmonization of tools to support the implementation of security standards in practice based on the use of ontologies. Chapter 2 discusses approaches to analysis of GOST 2814789 encryption algorithm (also known as simply GOST), which is the basis of most secure information systems in the Russian Federation. Chapter 3 describes those aspects of cryptography that are vital to a xxiv forensics investigator who is not necessarily an expert in cryptography but must understand and analyse digital evidence. Chapter 4 presents a systematic study of Search in Encrypted Data (SED), which enables a client to have third-party server(s) to perform certain search functionalities on encrypted data. The chapters in Section 2 focus on Cryptographic Systems. The rapid progress in hardware, such as the availability of multi-core processors, has had a major impact on security. It has now been possible to implement encryption algorithms in hardware aiming for faster and securer operations, while at the same time achieving better security. On the other hand, information leakage through techniques exploiting the physical properties of cryptosystems, such as measuring timing, power consumption, radiation emissions, has motivated further research towards the design of more secure hardware. On the opposite side of the coin, the wide availability of low-cost devices, such as tablets, mobile phones with weaker encryption / security mechanisms due to resource and processing constraints, has created further opportunities for attacks. Hardware related considerations of security are therefore the main concern of this section. Chapter 5 proposes a modification of Quaternion Encryption Scheme (QES) called M-QES which is resistant to the Known Plaintext-Ciphertext Attack (KPCA) due to improper choice of the frame size and the procedure of secret quaternion updating. Chapter 6 summarizes the side-channel techniques based on power consumption and elaborates the issue of the design time engineering of a secure system, through the employment of the current hardware design tools. The chapters in Section 3 focus on Cryptographic Solutions for Distributed Systems. With the advent of Mobile Ad-Hoc Networks (MANETs), Wireless Sensor Networks (WSNs), Body Area Networks (BANs) and vehicular networks, security of distributed systems operating in such networks has become a major interest to researchers and practitioners alike. Such systems usually have a dynamic, evolving topology, they are self-organizing, and often need to operate in hostile, uncertain environments. Most of the devices in such networks and systems often have severe communication, resource, and power limitations. Therefore, they present new security challenges and require new solutions, as most of the existing solutions are no longer feasible. This section provides a foundation towards understanding the security issues involved in such systems and designing and implementing cryptography solutions to address them adequately. Chapter 7 presents an efficient fully secure Attribute-Based Signature (ABS) scheme in the standard model under certain assumptions which is more practical than the generic group model used in the previous schemes. Chapter 8 evaluates the practical considerations of a SEcure Neighbor Discovery (SEND) deployment, taking a cryptographic approach as a means of securing the IPv6 local link operations. It reviews the remaining vulnerabilities, and gives some recommendations with which to facilitate SEND deployment. Chapter 9 presents three offline/online authentication and key agreement schemes and one offline/online non-repudiation scheme, all aiming at fast online computation for mobile nodes in mobile ad hoc networks. Chapter 10 surveys attacks and their defence mechanisms in Wireless Sensor Networks (WSNs) and also investigates the open research issues and emerging technologies on security in WSNs. The chapters in Section 4 focus on Cryptographic Trust Solutions. Trust plays an important role in secure IS. There is interplay between trust and cryptography towards achieving security and addressing privacy concerns. This section provides a discussion of cryptographic trust solutions in several representative areas such as Secure Multiparty Computation (SMC), Public-Key Infrastructure (PKI) trust models, and trusted computer architecture. Chapter 11 surveys the significant research that has been carried out on Secure Multiparty Computation (SMC). It discusses the critical issues and challenges and the level of adaptation achieved as well as some future research directions. Chapter 12 takes a closer look at the most prominent and widely used xxv Public-Key Infrastructure (PKI) trust models, and discusses related semantic issues. Chapter 13 provides an analysis of the Petname Model and explains how a Petname System can be effectively combined with the PKI to recognise identities and impose certainty by validating the user trust on those identities. Chapter 14 introduces the features and foundations of Trusted Computing, an architecture that exploits the low-cost TPM chip to monitor the integrity of a computing platform. Chapter 15 proposes a new secure email system based on fingerprint identification to overcome the recognition of real identity of an email sender and the receiver. The chapters in Section 5 focus on Engineering Secure Information Systems. Security considerations should not be add-ons, which can be incorporated into a functional system once it has been built and deployed. The development of secure IS requires the embedding of security considerations into the system analysis, design, implementation, and testing stages. In this way, the security requirements can be captured, analysed, and addressed in the design stage, implemented and tested together with the implementation and testing of the functional components, resulting in a more secure IS. This section presents a few representative case studies of engineering secure information systems. Chapter 16 classifies the approaches used according to the protection mechanisms provided to the email components, and it also briefly describes these approaches. It concludes by examining how the use of these approaches will work in IPv6 as compared to IPv4. Chapter 17 presents an analysis of the existing e-voting solutions in both categories of homomorphic voting and shuffling-based voting. The key security properties in these two categories are discussed, and then the existing e-voting schemes are checked against their corresponding security properties. Chapter 18 addresses the main challenge of designing an e-auction while protecting bid privacy without compromising other critical requirements and properties. Chapter 19 discusses the challenges of generic security protocols and platforms for preserving the privacy of patient records in health monitoring systems. Atilla Elçi Aksaray University, Turkey Mehmet A. Orgun Macquarie University, Australia Josef Pieprzyk Macquarie University, Australia Alexander G. Chefranov Eastern Mediterranean University, North Cyprus Huaxiong Wang Nanyang Technological University, Singapore Rajan Shankaran Macquarie University, Australia