Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In this paper we investigate the performance of using Multiple Input Shift Registers (MISRs) for message authentication. Linear Feedback Shift Registers (LFSRs) have been shown to be an efficient mechanism for authentication. Inspired by literature in digital system testing we present the use of MISRs for authentication. Such schemes are useful in sensor networks, the smart-grid, and multimedia authentication...
We conducted an experiment in which participants were asked to annotate the crypts they see in iris images. The results were used to assess the utility of crypts in identity recognition for forensic applications. Although the inter-participant annotation consistency may be limited by crypts' noticeability and the range of genuine similarity scores obtained by the adopted matcher is correlated to the...
Techniques aimed at continuously changing a system's attack surface, usually referred to as Moving Target Defense (MTD), are emerging as powerful tools for thwarting cyber attacks. Such mechanisms increase the uncertainty, complexity, and cost for attackers, limit the exposure of vulnerabilities, and ultimately increase overall resiliency. In this paper, we propose an MTD approach for protecting resource-constrained...
Modular multiplication finds the major role in RSA Cryptography and Elliptical Curve Cryptography. Timing analysis measures the delay along the various timing paths and verifies the performance and operation of the design. We have implemented a 256-bit Modular multiplier using Montgomery Reduction Algorithm in VHDL. The output of the Montgomery multiplier is Z=X∗Y R−1 mod M. Both RSA key generation...
MD5 and SHA-1 are the two known Hash Algorithms which are widely applied in information security. They are both developed from MD4. This paper introduces their algorithm logic in detail and their realization using C Language, and compares them through software testing, forms, etc. And finally, we draw a conclusion.
Cyber threats and the field of computer cyber defense are gaining more and more an increased importance in our lives. Starting from our regular personal computers and ending with thin clients such as netbooks or smartphones we find ourselves bombarded with constant malware attacks. In this paper we will present a new and novel way in which we can detect these kind of attacks by using elements of modern...
Keccak is the new Standard Hash Algorithm (SHA-3) to complement the existing hash standard SHA-2. The hash function has been selected after five years of tough competition and continuous evaluation in various aspects. Apart from security, performance evaluation of hash function is of significant importance and has been the key criteria in its selection. In this paper, we present a software implementation...
Mobile devices are quickly becoming the most used and abundant electronics used today. The ability to positively identify a mobile device and associate it with a specific person or entity is critical to deter theft and provide enhanced security of stored data. This paper presents a novel method for providing device identification through the use of PUF technology that uniquely labels every supporting...
This article sheds light on one important aspect of the automotive industry: the AUTomotive Open System ARchitecture (AUTOSAR) concept that is the basis for development of the new modules inside of the automotive systems and represents the newest worldwide automotive trend. First part of the article presents the reasons why such a standard is needed and mandatory in the current financial and technical...
Despite the booming of cloud computing, people will be using PCs for various good reasons including connecting to the cloud server. According to a 2009 report, more than two million people in every month have had their computer affected by malware, etc. although about 95% people use antivirus software. Recent studies warn that two most terrifying facts regarding malware attacks are (i) attacks intensified...
Our objective is to build a fully functional remote e-voting system that can be used in local, state and federal elections. We have designed a secure online e-voting system that provides confidentiality, anonymity, integrity, authenticity, auditability and verifiability. Confidentiality prevents anyone else from knowing who has voted for whom except the voters themselves. Anonymity is to prevent the...
In conventional cryptography teaching, teachers pay more attention to math theory, ignore cultivating students' practical ability. Application of open source software in cryptography helps students to understand concept and algorithms. It also promotes practical skill and innovation ability. In this paper, we present the implementation process and method. After practice, we achieve an ideal result.
This technological demonstration goes over a new trust management framework which can assist in achieving secure connections in wireless networks, without necessarily implying the use of strong security associations. The demonstration is based on open-source software, and has been developed to run on OpenWRT as well as on Android.
The chips designed for security related applications must be robust, to globally resist various types of attacks. Power analysis attacks are now becoming a significant threat to the exploitation of security in many devices. These attacks proficiently disclose the secret key information without much effort. Advanced Encryption Standard (AES) is a widely used symmetric cryptographic algorithm, which...
Secure communication is often based on encryption thus hinges on (public-key) infrastructures that handle all the key-management. This inevitably requires human intervention, thus creating a rather vulnerable point in the system. So it appears desirable to automate key-management tasks to the widest possible extent. In this work, we report on a software implementation of secure multipath transmission...
Assuring system integrity to a remote communication partner through attestation is a security concept which also is very important for safety-critical systems facing security threats. Most remote attestation methods are based on integrity measurement mechanisms embedded in the underlying hardware or software (e.g. operating system). Alternatively, the application software can measure itself, whereas...
We present an approach to use techniques of model based testing (MBT) applied on security cryptographic components. This application of MBT is done in the context of a qualification testing phase made by an entity independent from designers, developers and sponsors of the cryptographic components under test. This qualification phase targets both hardware and software cryptographic components and the...
Passwords are an old-fashioned authentication mechanism that remains ubiquitous, but modern processing hardware with massive parallelism has suddenly undercut the security of the traditional eight-character password. Administrators and users need to understand the increased risks and to find ways to use and protect longer passwords.
Since 2011, it's mandatory to prescribe through an electronic system in Portugal. Several third party companies start to develop prescribing software/interfaces that act as gateways to transmit the prescription data from the practitioners to the Health Ministry. The use of those companies in this circuit weakens the Prescription System's security levels and compromises the confidentiality and privacy...
Implantable and wearable medical devices (IWMDs) are commonly used for diagnosing, monitoring, and treating various medical conditions. A general trend in IWMDs is towards increased functional complexity, software programmability, and connectivity to body area networks (BANs). However, as medical devices become more “intelligent,” they also become less trustworthy - less reliable and more vulnerable...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.