Papers by Alberto Peinado
Visibilising women in technology: Strategies for working in Telecommunication Engineering
2022 Congreso de Tecnología, Aprendizaje y Enseñanza de la Electrónica (XV Technologies Applied to Electronics Teaching Conference)

Mathematics
A new proposal to generate pseudorandom numbers with Gaussian distribution is presented. The gene... more A new proposal to generate pseudorandom numbers with Gaussian distribution is presented. The generator is a generalization to the extended field GF(2n) of the one using cyclic rotations of linear feedback shift registers (LFSRs) originally defined in GF(2). The rotations applied to LFSRs in the binary case are no longer needed in the extended field due to the implicit rotations found in the binary equivalent model of LFSRs in GF(2n). The new proposal is aligned with the current trend in cryptography of using extended fields as a way to speed up the bitrate of the pseudorandom generators. This proposal allows the use of LFSRs in cryptography to be taken further, from the generation of the classical uniformly distributed sequences to other areas, such as quantum key distribution schemes, in which sequences with Gaussian distribution are needed. The paper contains the statistical analysis of the numbers produced and a comparison with other Gaussian generators.

Los electroencefalogramas son señales eléctricas compuestas por un número elevado de característi... more Los electroencefalogramas son señales eléctricas compuestas por un número elevado de características, por lo que el coste computacional de las tareas asociadas a esta disciplina es normalmente bastante alto. Una solución factible para este problema es el uso de metaheurísticas eficientes que proporcionen una solución adecuada para el problema en un tiempo razonable. Además, elegir un lenguaje de programación apropiado es vital ya que influirá en la eficiencia del procedimiento a implementar. A pesar de que los lenguajes de programación con una curva de aprendizaje baja como Python son muy utilizados, no son la mejor elección a la hora de lograr una gran eficiencia. En este contexto, usar lenguajes de más bajo nivel como C++ se torna en algo fundamental ya que permiten a los programadores aprovechar mejor todas las capacidades del hardware. Con esto en mente, este trabajo propone un procedimiento de selección de características multi-objetivo paralelo que ha sido implementado con C++...
Proceedings of the International Conference on RFID Security 2007
Peinado, 2008

Mathematics, 2022
Many stream ciphers employ linear feedback shift registers (LFSRs) to generate pseudorandom seque... more Many stream ciphers employ linear feedback shift registers (LFSRs) to generate pseudorandom sequences. Many recent LFSRs are defined in GF(2n) to take advantage of the n-bit processors, instead of using the classic binary field. In this way, the bit generation rate increases at the expense of a higher complexity in computations. For this reason, only certain primitive polynomials in GF(2n) are used as feedback polynomials in real ciphers. In this article, we present an efficient implementation of the LFSRs defined in GF(2n). The efficiency is achieved by using equivalent binary LFSRs in combination with binary n-bit grouped operations, n being the processor word’s length. This improvement affects the general considerations about the security of cryptographic systems that uses LFSR. The model also allows the development of a faster method to test the primitiveness of polynomials in GF(2n).
Cryptanalysis of a Key Authentication Scheme Based on the Chinese Remainder Theorem and Discrete Logarithms
International Joint Conference SOCO’16-CISIS’16-ICEUTE’16, 2016
In 2015, Kumaraswamy et al. have proposed an improvement of the key authentication scheme based o... more In 2015, Kumaraswamy et al. have proposed an improvement of the key authentication scheme based on discrete logarithms. That kind of schemes has been widely studied for many years, producing many modifications and improvements designed to overcome the weaknesses detected; most of them leading to key substitution attacks and, in some cases, allowing to recover the user’s private key. The improvement proposed by Kumaraswamy et al. is based on the Chinese remainder theorem in combination with the discrete logarithm. In this paper, several mathematical inconsistencies are revealed in the definition. Once fixed, a key substitution attack is performed.

PLOS ONE, 2021
Since the first case reported of SARS-CoV-2 the end of December 2019 in China, the number of case... more Since the first case reported of SARS-CoV-2 the end of December 2019 in China, the number of cases quickly climbed following an exponential growth trend, demonstrating that a global pandemic is possible. As of December 3, 2020, the total number of cases reported are around 65,527,000 contagions worldwide, and 1,524,000 deaths affecting 218 countries and territories. In this scenario, Spain is one of the countries that has suffered in a hard way, the ongoing epidemic caused by the novel coronavirus SARS-CoV-2, namely COVID-19 disease. In this paper, we present the utilization of phenomenological epidemic models to characterize the two first outbreak waves of COVID-19 in Spain. The study is driven using a two-step phenomenological epidemic approach. First, we use a simple generalized growth model to fit the main parameters at the early epidemic phase; later, we apply our previous finding over a logistic growth model to that characterize both waves completely. The results show that eve...
Flaws in the Application of Number Theory in Key Distribution Schemes for Multicast Networks
In this note, an interesting trend about the way in which the number theory in multicast networks... more In this note, an interesting trend about the way in which the number theory in multicast networks is often applied, is reported. Surprisingly, in recent years, some new proposals for key distribution schemes are still proposed employing very similar erroneous concepts than those applied in 1999, which were already reported by professor Munoz-Masque in 2005. Some apparently well-constructed cryptographic equations suffer from a real weakness due to a flaw in the definition of the cryptographic keys, allowing to perform an easy factorization and, as a consequence, the recovering of the user’s keys. Thirteen years later, very similar weaknesses arise.
Identifying the Interests and Trends of Telecommunication Engineering Students in Complementary Activities

EDULEARN19 Proceedings, 2019
The evaluation of the quality of teaching is a challenging task since, apart from objective learn... more The evaluation of the quality of teaching is a challenging task since, apart from objective learning results, it should takes into account the opinion of the students, and it is not easy to find a continued and easy way to know it throughout the course. Likewise, it is also difficult to work on, and particularly assess, the basic and general competences. The educational innovation project PIE17-021 funded by the Universidad de Málaga (UMA) is focused on the design and comparison of tools to evaluate the quality of university teaching. This study also includes assessment of basic and general competences of undergraduate students of the School of Telecommunications Engineering (ETSIT). The developed tools will be evaluated with the students enrolled in the different degrees of the ETSIT. With these goals, the main activities of this project are: • Designing of tools to evaluate the quality of the university teaching and the perception that students have about how basic and general com...

This work presents the evolution of the five editions of the educational activity named “Technolo... more This work presents the evolution of the five editions of the educational activity named “Technological Challenge” specially focused on the students at “Escuela Técnica Superior de Ingeniería de Telecomunicación” (ETSIT), but open to all students of the “Universidad de Málaga” (UMA). This initiative has been developed in the context of the educational innovation project PIE17-021 funded by UMA. The “Technological Challenge” consists on the formulation of specific real problems, which students must face in a competitive regime. This activity allows the reinforcement and evaluation of basic and general competences reached by the graduate students in the ETSIT. After nearly five years, this paper describes the evaluation of the results, regarding interest and participation of the students in the “Technology Challenge” along with the basic and general competences reached by the students.

14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021), 2021
Nowadays, the security threats faced by society in general, and organizations in particular, are ... more Nowadays, the security threats faced by society in general, and organizations in particular, are reaching unprecedented highs in terms of complexity and sophistication. Organizations must face up to new challenges in order to protect their assets (e.g., personnel, goods, information, or reputation, among others), so they need new solutions for the immediate future to achieve their business objectives efficiently and effectively. Right now, corporate security and cybersecurity within organizations are dependent on themselves and complementary at the same time, so the coordination of their activities is crucial. This joint action for a comprehensive security requires a training and educational process that provides necessary knowledge and skills. This article highlights the limitations of the current master's degrees in cybersecurity from the perspective of comprehensive security and proposes a new master's degree focused on it as a solution, which takes advantage of the skills of current degrees, and is aligned with the needs of the European Higher Education Area. This master's degree promotes sustainability through efficiency and rationalization on the general asset protection process, improving the security culture inside the organization, reducing the number of security incidents, and increasing the reputation and image of the organization.
Sensors, 2020
This paper presents a new proposal to generate optimal pseudorandom numbers with Gaussian distrib... more This paper presents a new proposal to generate optimal pseudorandom numbers with Gaussian distribution. The generator is especially designed for low-cost hardware implementation, although the software version is also considered. For this reason, Linear Feedback Shift Registers in conjunction with cyclic rotations are employed. The proposal presents a low implementation cost and overcomes the limitations of the previous Gaussian generators based on linear feedback shift registers by means of a less complex algorithm to find optimal configurations. As a consequence, it turns into a really usable generator. Moreover, a further improvement, based on the simulated annealing algorithm, is applied in order for the random values to be better adjusted to the normal distribution.
Lecture Notes in Computer Science, 2017
PET image classification using HHT-based features through fractal sampling A. Ortiz et al. PET im... more PET image classification using HHT-based features through fractal sampling A. Ortiz et al. PET image classification using HHT-based features through fractal sampling A. Ortiz et al. PET image classification using HHT-based features through fractal sampling A. Ortiz et al. PET image classification using HHT-based features through fractal sampling A. Ortiz et al. PET image classification using HHT-based features through fractal sampling A. Ortiz et al.
ACM Computing Surveys, 2019
Distance-bounding protocols allow a verifier to both authenticate a prover and evaluate whether t... more Distance-bounding protocols allow a verifier to both authenticate a prover and evaluate whether the latter is located in his vicinity. These protocols are of particular interest in contactless systems, e.g., electronic payment or access control systems, which are vulnerable to distance-based frauds. This survey analyzes and compares in a unified manner many existing distance-bounding protocols with respect to several key security and complexity features.
Optimal modes of operation of pseudorandom sequence generators based on DLFSRs
Logic Journal of IGPL, 2016

A SEIS Model for Propagation of Random Jamming Attacks in Wireless Sensor Networks
Advances in Intelligent Systems and Computing, 2016
This paper describes the utilization of epidemiological models, usually employed for malware prop... more This paper describes the utilization of epidemiological models, usually employed for malware propagation, to study the effects of random jamming attacks, which can affect the physical and MAC/link layers of all nodes in a wireless sensor network, regardless of the complexity and computing power of the devices. The random jamming term considers both the more classical approach of interfering signals, focusing on the physical level of the systems, and the cybersecurity approach that includes the attacks generated in upper layers, mainly in the MAC/link layer, producing the same effect on the communication channel. We propose, as a preliminary modelling task, the epidemiological mathematical model Susceptible–Exposed–Infected–Susceptible (SEIS), and analyze the basic reproductive number, the infection rate, the average incubation time and the average infection time.
Computer Communications, 2016
Sundaresan et al. proposed recently a novel ownership transfer protocol for multi-tag multi-owner... more Sundaresan et al. proposed recently a novel ownership transfer protocol for multi-tag multi-owner RFID environments that complies with the EPC Class1 Generation2 standard. The authors claim that this provides individual-owner privacy and prevents tracking attacks. We show that this protocol falls short of its security objectives, and describe attacks that allow: (a) an eavesdropper to trace a tag, (b) the previous owner to obtain the private information that the tag shares with the new owner, and (c) an adversary that has access to the data stored on a tag to link this tag to previous interrogations (violating forwardsecrecy). We analyze the security proof and show that while the first two cases can be addressed with a more careful design, strong privacy remains an open problem for lightweight RFID applications.
International Journal of Network Security, 2006
In 2004, C. Park proposed an authentication protocol to provide user anonymity and untraceability... more In 2004, C. Park proposed an authentication protocol to provide user anonymity and untraceability in wireless mobile communication systems. The real user identities are hidden and randomized by means of error-correcting codes. In this work, it is shown that Park's protocol does not provide anonymity and untraceability. More precisely, the users real identities can be obtained easily by an eavesdropper. Furthermore, the protocol is not secure since the session key established in the authentication phase can also be obtained, breaking the confidentiality of the radio link.
HB-MP: A further step in the HB-family of lightweight authentication protocols
Computer Networks, 2007
... [11] NJ Hopper and M. Blum, Secure human identification protocols, Advances in Cryptology A... more ... [11] NJ Hopper and M. Blum, Secure human identification protocols, Advances in Cryptology ASYACRYPT'2001, Lecture Notes in Computer Science vol. 2248, Springer (2001) pp. 5266. ... Tel.: +34 95 213 1305; fax: +34 95 213 2027. Vitae. Alberto Peinado Dom.
Uploads
Papers by Alberto Peinado