Ubiquitous Public Key Infrastracture
|
|
- Brandon Day
- 3 years ago
- Views:
From this document you will learn the answers to the following questions:
What key is needed for a public key system?
What is the purpose of PKI Issues in our Society?
For public key systems , what is the key?
Transcription
1 Ubiquitous Public Key Infrastracture TWISC at NTUST on December 27 Ken Umeno RIKEN and NICT
2 Outline PKI Issues in our Society Our Proposal towards Ubiquitous PKI Discussion for Future Studies
3 I encrypt, and you decrypt.
4 You encrypt, and I decrypt.
5 No. of Keys for Encryption in N Users Environment: N(N-1)/2 symmetric keys for one-toone secure communications. 2 N -2 symmetric keys for one-to-others secure communications. Symmetric key encryption systems are not scalable.
6 Why Public Key Infrastractures?
7 I encrypt, and you decrypt. For public key systems, I encrypt with your public key and you decrypt with your private key. A pair of your public key and private key is generated at your hand and you can distribute your public key.
8 You encrypt, and I decrypt. For public key systems, You encrypt with my public key and I decrypt with my private key. A pair of my public key and private key is generated at my hand and I can distribute my public key.
9 No. of Keys for Encryption in N Users Environment: PKI N public keys for one-to-one secure communications. N public keys for one-to-others secure communications. Public key encryption systems are scalable and suitable for large scale networks.
10 PKI and our Society PKI is a pillar of our e-society such as E-Government System, e-commerce, e-health (for protecting your medical data and Health insurance data) (USB memory used for ikey (Australia, USA)) For business, authentication server systems for ensuring server s public key as a trusted third party, called CA(Certificate Authority) is rapidly growing.
11 Current Issues of PKI: Why you don t have my public key?
12 Finland s Case National Initiative of PKI Program: 5,274,820 Population: Issues of National PKI: Extra Device (Smart Card Solution) Costs is High for installing private key and public key.
13 So far, We have seen that internet access costs had been virtually free. Cf. Free Internet Caffe at Airports like Singapore Hub airport. For users, service is vitally important. Business model for Internet was drastically changed.
14 From now on, We will see that wireless internet access will also become free and wireless internet access will be ubiquitous with communications terminals such as mobile phones, PDA, vital sensors,.e.t.c. in 5-10 years (soon).
15 Security of Ubiquitous Networks (Real Issues) For ensuring security of large scale ubiquitous networks connecting users and mobile phones and various sensors, PKI implementation is virtually unavoidable for any kind of services because of the terminal authentication mechanism of PKI. How to implement PKI for ubiquitous network environment?
16 Mobile Phone = Digital Camera Currently, most mobile phone have cameras and digital camera makers will equipe digital camera with wireless internet access. Most mobile phone with cameras can read QR code (two-dimensional code).
17 What is QR code? My QR code:
18 QR codes in Japan More than 30.6 million 3G mobile phone of NTT docomo can read QR codes. There are three operators (NTT docomo, KDDI, Softbank). Almost all mobile phone can read QR codes and they are currently used for the gateway code for wireless internet access.
19 QR Codes Specification Maximal Capacity: 2953 byte
20 Our Proposal to Implementation of Ubiquitous PKI To use two-dimensional code such as QR code which is readable by mobile phones with cameras and is printable as public key.
21 What is Merit? My public key is printable and I can distribute my public key by distributing name cards or other papers with printed public keys. Your public key can be read with my mobile phone anytime, anywhere.
22 QPKI (Quadrature PKI) card exchange= public key exchange Alice Bob
23 History of QR Code Standardization QR Code Standardization October, Approved as AIM International (Automatic 1997 Identification Manufacturers International) standard (ISS - QR Code) March, 1998 Approved as JEIDA (Japanese Electronic Industry January, 1999 June, 2000 November, 2004 Development Association) standard (JEIDA-55) Approved as JIS (Japanese Industrial Standards) standard (JIS X 0510) Approved as ISO international standard (ISO/IEC18004) Micro QR Code is Approved as JIS (Japanese Industrial Standards) standard (JIS X 0510)
24 Ubiquitous PKI Service Image C.f. (ProtoType System) Key server registration use from web application use for encryption
25 Current Issues No standard for two-dimensional bar codes except QR code and No stadard protocol between two-dimensional codes and public keys. No standard software development platform in mobile phone ( in a limited computing resource)
26 Our porposal for possible collaboration is: To set up a unique interoperable twodimensional codes system which can be readable by mobile phone in 3G by doing research and develop of codes suitable for public key storing, and to standardize it towards establishing security in our ubiquitous network society. To develope ubiquitous wireless terminals which can read the above code.
27 Thank you.
Public Key Infrastructure for a Higher Education Environment
Public Key Infrastructure for a Higher Education Environment Eric Madden and Michael Jeffers 12/13/2001 ECE 646 Agenda Architectural Design Hierarchy Certificate Authority Key Management Applications/Hardware
More informationDesign and Evaluation of Scalable Ubiquitous Discovery System
Design and Evaluation of Scalable Ubiquitous Discovery System Tomohiro NAKAGAWA Takashi YOSHIKAWA Ken OHTA Hiroshi INAMURA Shoji KURAKAKE NTT DoCoMo, Inc., Japan ASWN2004 Outline Background, Goal, Scenario
More informationEvolution of mobile broadband and T&M business LTE
Evolution of mobile broadband and T&M business LTE business July 29, 2010 Kenji Tanaka Anritsu Corporation President of T&M group Kenji Tanaka Tokyo Stock Exchange : 6754 http://www.anritsu.com/ja-jp/about-anritsu/investor-relations/
More informationNetwork Security Protocols
Network Security Protocols EE657 Parallel Processing Fall 2000 Peachawat Peachavanish Level of Implementation Internet Layer Security Ex. IP Security Protocol (IPSEC) Host-to-Host Basis, No Packets Discrimination
More informationSGFS: Secure, Flexible, and Policy-based Global File Sharing
SGFS: Secure, Flexible, and Policy-based Global File Sharing Vishal Kher Eric Seppanen Cory Leach Yongdae Kim {vkher,seppanen,leach,kyd}@cs.umn.edu University of Minnesota Motivation for Network attached
More informationDigital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
More informationArcot Systems, Inc. Securing Digital Identities. FPKI-TWG Mobility Solutions Today s Speaker Tom Wu Principal Software Engineer
Arcot Systems, Inc. Securing Digital Identities FPKI-TWG Mobility Solutions Today s Speaker Tom Wu Principal Software Engineer Today s Agenda Background Who is Arcot Systems? What is an ArcotID? Why use
More informationFrequently Asked Questions. Frequently Asked Questions: Securing the Future of Trust on the Internet
FREQUENTLY ASKED QUESTIONS: SECURING THE FUTURE OF TRUST ON THE INTERNET Frequently Asked Questions Frequently Asked Questions: Securing the Future of Trust on the Internet Securing the Future of Trust
More informationEntrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
More informationCase Study: NTT DATA and JAL ONLINE Federate Business Travel Expense Reporting
Case Study: and JAL ONLINE Federate Business Travel Expense Reporting Company is one of Japan s preeminent systems integration companies with a reputation for innovation and technology excellence. traces
More informationDevelopment of Real-Time Enterprise Communication Service for Ubiquitous Age
Development of Real-Time Enterprise Communication Service for Ubiquitous Age V Kazumasa Kuroshita V Youichi Nasuno V Katsuaki Taniguchi (Manuscript received May 31, 2006) Smart terminals such as cellular
More informationUnderstanding Digital Certificates and Secure Sockets Layer (SSL)
Understanding Digital Certificates and Secure Sockets Layer (SSL) Author: Peter Robinson January 2001 Version 1.1 Copyright 2001-2003 Entrust. All rights reserved. Digital Certificates What are they?
More informationHow To Use Pki On A Pc (For A Non-Profit)
Using PKI for PC Security Public Key Infrastructure (PKI) is an important foundation for network and information security. In essence, PKI provides an enterprise infrastructure for managing the keys necessary
More informationCommon security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon
1 Common security requirements Basic security tools Secret-key cryptography Public-key cryptography Example Online shopping with Amazon 2 Alice credit card # is xxxx Internet What could the hacker possibly
More informationA Students Attendance System Using QR Code
Vol. 5, o. 3, 2014 A Students Attendance System Using QR Code Fadi Masalha Faculty of Information Technology Applied Science University ael Hirzallah Faculty of Information Technology Applied Science University
More informationSafe payments on the Net. Chris Mitchell Information Security Group Royal Holloway, University of London http://www.isg.rhul.ac.
Safe payments on the Net Chris Mitchell Information Security Group Royal Holloway, University of London http://www.isg.rhul.ac.uk/~cjm Internet e-commerce Focus of this talk is security issues for e-commerce
More informationReport to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999
Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer February 3, 1999 Frame Relay Frame Relay is an international standard for high-speed access to public wide area data networks
More informationAuthentication in WLAN
Authentication in WLAN Flaws in WEP (Wired Equivalent Privacy) Wi-Fi Protected Access (WPA) Based on draft 3 of the IEEE 802.11i. Provides stronger data encryption and user authentication (largely missing
More informationMobile Ticket to Ride!
WHITEPAPER Mobile Ticket to Ride! This whitepaper is an extract from: Mobile Ticketing Applications & Markets Transport, Sport & Entertainment 2009-2014... information you can do business with Mobile Ticket
More informationFEDERAL LAW GAZETTE FOR THE REPUBLIC OF AUSTRIA. Year 2015 Issued on December 11, 2015 Part II
1 of 11 FEDERAL LAW GAZETTE FOR THE REPUBLIC OF AUSTRIA Year 2015 Issued on December 11, 2015 Part II 410th Regulation: Cash Register Security Regulation, [RKSV] 410th Regulation by the Federal Minister
More informationPrototype Design of NFC-Based Electronic. Coupon Ecosystem with Object Memory Model
Contemporary Engineering Sciences, Vol. 7, 2014, no. 22, 1105-1112 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.49138 Prototype Design of NFC-Based Electronic Coupon Ecosystem with
More informationAuthentication is not Authorization?! And what is a "digital signature" anyway?
Authentication is not Authorization?! And what is a "digital signature" anyway? Prepared by R. David Vernon Revised 12/01 Introduction REV 1A As part of the IT Architecture Initiative, the Office of Information
More informationQR Code for Digital Signature Online/Offline Payment. James Wu www.jrsys.com.tw 1
QR Code for Digital Signature Online/Offline Payment James Wu www.jrsys.com.tw 1 Big Risk of Online Shopping You may lost Card Number + Expiration Date + CVV Card Not Present Transaction Trojan, Sniffer,
More informationWireless LAN 802.11g USB Adapter
Wireless LAN 802.11g USB Adapter User s Guide Version 1.0 User s Guide 0 Copyright statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by
More informationFederated Authentication Mechanism with Efficient ID management
Federated Authentication Mechanism with Efficient ID management Ryu Watanabe and Toshiaki Tanaka KDDI R&D Laboratories, Inc. Ohara 2-1-15 Fujimino Saitama, Japan Email: ryu@kddilabs.jp, toshi@kddilabs.jp
More informationContents. Expertise in access control. SaaS Software as a Service, a comprehensive solution. Megaflex Officeflow
Contents Expertise in access control 3 SaaS Software as a Service, a comprehensive solution 4 Megaflex Officeflow 6 Megaflex control is always secure anytime, anywhere 8 Benefits of using Megaflex 9 Greenbox
More informationWeb Machine Interface
From Human Machine Interface to Web Machine Interface - Innovation of HMI - -1- Copyright 2014 All Rights Reserved. Web Machine Interface offers two services below: remote access service cloud data utilization
More informationSecurity Policy Revision Date: 23 April 2009
Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure
More informationA secure mobile payment system *
Jun. 2007, Volume 1, No.1 (Monthly) Computer Technology and Application, ISSN1934-7332, USA A secure mobile payment system * LI Xi, HU Han-ping (Institute of Pattern Recognition and Artificial Intelligence,
More informationCloudCycle 14: Secure and User-Friendly QR-Code Based Key Distribution
CloudCycle 14: Secure and User-Friendly QR-Code Based Key Distribution 22.09.2014, Informatik 2014, Stuttgart Kevin Körner, Thomas Walter The Initial Problem 2/17 K. Körner, T. Walter - Secure and User-Friendly
More informationInternational Journal for Research in Computer Science
TOPIC: MOBILE COMPUTING AND SECURITY ISSUES. ABSTRACT Owodele Odukale The past decade has seen a growth in the use of mobile computing. Its use can be found in areas such as social media, information exchange,
More informationLecture VII : Public Key Infrastructure (PKI)
Lecture VII : Public Key Infrastructure (PKI) Internet Security: Principles & Practices John K. Zao, PhD (Harvard) SMIEEE Computer Science Department, National Chiao Tung University 2 Problems with Public
More informationMobile OTPK Technology for Online Digital Signatures. Dec 15, 2015
Mobile OTPK Technology for Online Digital Signatures Dec 15, 2015 Presentation Agenda The presentation will cover Background Traditional PKI What are the issued faced? Alternative technology Introduction
More informationA NEW FRAMEWORK FOR BRIDGING THE GAP BETWEEN IT SERVICE MANAGEMENT AND IT GOVERNANCE FROM A SECURITY PERSPECTIVE
A NEW FRAMEWORK FOR BRIDGING THE GAP BETWEEN IT SERVICE MANAGEMENT AND IT GOVERNANCE FROM A SECURITY PERSPECTIVE E. da Cruz 1 and L. Labuschagne 2 Academy of Information Technology at the University of
More informationSoftware Assignments for a Course in Secure E-Commerce
Software Assignments for a Course in Secure E-Commerce Chris Steketee and Phillip Lock Advanced Computing Research Centre, School of Comp and Info Science University of South Australia, Mawson Lakes, SA
More informationIQS Identity and Access Management
IQS Identity and Access Management Identity Management Authentication Authorization Administration www.-center.com The next generation security solution 2003 RSA Security Conference IAM is a combination
More informationLightweight Security using Identity-Based Encryption Guido Appenzeller
Lightweight Security using Identity-Based Encryption Guido Appenzeller Chief Technology Officer Voltage Security Inc. Identity-Based Encryption (IBE) IBE is a new public key encryption algorithm A number
More informationKey Management (Distribution and Certification) (1)
Key Management (Distribution and Certification) (1) Remaining problem of the public key approach: How to ensure that the public key received is really the one of the sender? Illustration of the problem
More informationController of Certification Authorities of Mauritius
Contents Pg. Introduction 2 Public key Infrastructure Basics 2 What is Public Key Infrastructure (PKI)? 2 What are Digital Signatures? 3 Salient features of the Electronic Transactions Act 2000 (as amended)
More informationIntegration Guide. SafeNet Authentication Client. Using SAC CBA for Check Point Security Gateway
SafeNet Authentication Client Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information Document
More informationE-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption
Journal of Computer Science 6 (7): 723-727, 2010 ISSN 1549-3636 2010 Science Publications E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption Najlaa A. Abuadhmah,
More informationISO/IEC 24727 for secure mobile web applications
ISO/IEC 24727 for secure mobile web applications Jan Eichholz 1 Detlef Houdeau 2 Detlef Hühnlein 3 Manuel Bach 4 1 Giesecke & Devrient GmbH, jan.eichholz@gi-de.com 2 Infineon Technologies AG, detlef.houdeau@infineon.com
More informationBYOD Adaption in Banking
BYOD Adaption in Banking A report submitted to the Institute for Development and Reasearch in Banking Technology, Hyderabad In partial fulfillment of the summer internship of Bachelor of Technology In
More informationCONNECTING THE RASPBERRY PI TO A NETWORK
CLASSROOM CHALLENGE CONNECTING THE RASPBERRY PI TO A NETWORK In this lesson you will learn how to connect the Raspberry Pi computer to a network with both a wired and a wireless connection. To complete
More informationArchitecture and Technologies for HGW
Architecture and Technologies for HGW Authors: Masahide Nishikawa* and Shunsuke Nishio* Home information and communication technology (ICT) service systems, where household appliances and devices are linked
More informationCHAPTER 1 Introduction 1
Contents CHAPTER 1 Introduction 1 CHAPTER 2 Short-Range Communications Systems 3 2.1 Radio-Frequency Spectrum and Propagation 3 2.1.1 Theory of Electromagnetism and Maxwell s Equations 3 2.1.2 RF Propagation
More informationCPS221 Lecture: Layered Network Architecture
CPS221 Lecture: Layered Network Architecture Objectives last revised 9/10/12 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:
More informationExpert Reference Series of White Papers. Fundamentals of the PKI Infrastructure
Expert Reference Series of White Papers Fundamentals of the PKI Infrastructure 1-800-COURSES www.globalknowledge.com Fundamentals of the PKI Infrastructure Boris Gigovic, Global Knowledge Instructor, CEI,
More informationStrong Encryption for Public Key Management through SSL
Strong Encryption for Public Key Management through SSL CH.SUSHMA, D.NAVANEETHA 1,2 Assistant Professor, Information Technology, Bhoj Reddy Engineering College For Women, Hyderabad, India Abstract: Public-key
More informationBANKING AUTHEMTICATION SYSTEM USING MOBILE-OTP WITH QR-CODE
BANKING AUTHEMTICATION SYSTEM USING MOBILE-OTP WITH QR-CODE Abhishek B. Iyer G.H.Raisoni College of Engineering and Management, Wagholi, Pune, Maharashtra, India- 412 207 Rohit A. Shah G.H.Raisoni College
More informationCopyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1
Chapter 15 Key Management Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1 Symmetric-key Distribution Symmetric-key cryptography is more efficient than asymmetric-key
More informationJournal of Electronic Banking Systems
Journal of Electronic Banking Systems Vol. 2015 (2015), Article ID 614386, 44 minipages. DOI:10.5171/2015.614386 www.ibimapublishing.com Copyright 2015. Khaled Ahmed Nagaty. Distributed under Creative
More information2 Information and Telecommunications
Strategic Priority Setting in S&T 2 Information and Telecommunications Information and communication technology sparks an enormous revolution in a wide range of socio-economical activities, including realization
More informationThe SIA Standards Roadmap describes the strategies for achieving the mission and enhancing stakeholder participation.
Mission Statement The mission of the Security Industry Association (SIA) Standards Committee is to develop and promote the use of technology and application standards for the security industry; provide
More informationIBM Tivoli Access Manager and VeriSign Managed Strong Authentication Services. Combine resources for one complete online business security solution.
IBM Tivoli Access Manager and VeriSign Managed Strong Authentication Services Combine resources for one complete online business security solution. Big e-business opportunities demand security to match
More informationUnderstanding Digital Certificates and Wireless Transport Layer Security (WTLS)
Understanding Digital Certificates and Wireless Transport Layer Security (WTLS) Author: Allan Macphee January 2001 Version 1.1 Copyright 2001-2003 Entrust. All rights reserved. Digital Certificates What
More information3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol
Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Network Layer: IPSec Transport Layer: SSL/TLS Chapter 4: Security on the Application Layer Chapter 5: Security
More informationPKI Deployment Business Issues
An OASIS PKI White Paper PKI Deployment Business Issues By Amir Jafri and June Leung (FundSERV Inc.) For the Oasis PKI Member Section OASIS PKI White Paper OASIS (Organization for the Advancement of Structured
More informationMark Certificate Verification Services (Manual)
Mark Certificate Verification Services (Manual) Introduction This Department conducts the massive Board Examinations 7 lakhs for Higher Secondary 10 lakhs for S.S.L.C 50,000 candidates in Diploma in Elementary
More informationConfiguring the WT-4 for ftp (Ad-hoc Mode)
En Configuring the WT-4 for ftp (Ad-hoc Mode) Mac OS X Introduction This document provides basic instructions on configuring the WT-4 wireless transmitter and a Mac OS X (10.5.2) ftp server for transmission
More informationE-Business Technologies for the Future
E-Business Technologies for the Future Michael B. Spring Department of Information Science and Telecommunications University of Pittsburgh spring@imap.pitt.edu http://www.sis.pitt.edu/~spring Overview
More informationFirst Semester Examinations 2011/12 INTERNET PRINCIPLES
PAPER CODE NO. EXAMINER : Martin Gairing COMP211 DEPARTMENT : Computer Science Tel. No. 0151 795 4264 First Semester Examinations 2011/12 INTERNET PRINCIPLES TIME ALLOWED : Two Hours INSTRUCTIONS TO CANDIDATES
More informationConfiguring the WT-4 for Upload to a Computer (Ad-hoc Mode)
En Configuring the WT-4 for Upload to a Computer (Ad-hoc Mode) Windows XP This document provides basic instructions on configuring the WT-4 wireless transmitter and a Windows XP Professional SP2 computer
More informationSavitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
More informationEnd-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich
End-to-End Security in Wireless Sensor (WSNs) Talk by Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich Content 1. Motivation 2. Security Issues and Principles 3. Internet-of-Things and Wireless
More informationPublic Key Infrastructure
UT DALLAS Erik Jonsson School of Engineering & Computer Science Public Key Infrastructure Murat Kantarcioglu What is PKI How to ensure the authenticity of public keys How can Alice be sure that Bob s purported
More informationWireless LANs vs. Wireless WANs
White Paper Wireless LANs vs. Wireless WANs White Paper 2130273 Revision 1.0 Date 2002 November 18 Subject Supported Products Comparing Wireless LANs and Wireless WANs Wireless data cards and modules,
More informationIntroducing etoken. What is etoken?
Introducing etoken Nirit Bear September 2002 What is etoken? Small & portable reader-less Smartcard Standard USB connectivity Logical and physical protection Tamper evident (vs. tamper proof) Water resistant
More informationNokia Mobile Software Strategy
Nokia Mobile Software Strategy Pertti Korhonen Senior Vice President Nokia Mobile Software Agenda Open Mobile Architecture initiative Nokia Mobile Software strategy & Offering Developer community Summary
More informationAsymmetric cryptosystems fundamental problem: authentication of public keys
Network security Part 2: protocols and systems (a) Authentication of public keys Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015 Asymmetric cryptosystems fundamental
More informationCSE543 - Introduction to Computer and Network Security. Module: Public Key Infrastructure
CSE543 - Introduction to Computer and Network Security Module: Public Key Infrastructure Professor Trent Jaeger 1 Meeting Someone New Anywhere in the Internet 2 What is a certificate? A certificate makes
More informationSSL/TLS: The Ugly Truth
SSL/TLS: The Ugly Truth Examining the flaws in SSL/TLS protocols, and the use of certificate authorities. Adrian Hayter CNS Hut 3 Team adrian.hayter@cnsuk.co.uk Contents Introduction to SSL/TLS Cryptography
More informationBrocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, 2002. Page 1
PKI Tutorial Jim Kleinsteiber February 6, 2002 Page 1 Outline Public Key Cryptography Refresher Course Public / Private Key Pair Public-Key Is it really yours? Digital Certificate Certificate Authority
More informationM2M For industrial and automotive
M2M For industrial and automotive Content ST at a glance... 4 Where to find us... 5 The value chain... 5 Secure MCU... 6 Focus on ST33 secure microcontrollers... 6 M2M fields of application... 7 What is
More informationTrustKey Tool User Manual
TrustKey Tool User Manual 1 Table of Contents 1 Introduction... 5 2 TrustKey Product...6 2.1 TrustKey Tool... 6 2.2 TrustKey function modules...7 2.3 TrustKey using environment...7 3 TrustKey Tool Installation...
More informationParallels Business Automation 4.3
Parallels Parallels Business Automation 4.3 Advanced Security Configuration Guide Revision 1.0.04 (c) 1999-2008 ISBN: N/A Parallels 660 SW 39th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425)
More informationPKI - current and future
PKI - current and future Workshop for Japan Germany Information security Yuichi Suzuki yuich-suzuki@secom.co.jp SECOM IS Laboratory Yuichi Suzuki (SECOM IS Lab) 1 Current Status of PKI in Japan Yuichi
More informationReducing Configuration Complexity with Next Gen IoT Networks
Reducing Configuration Complexity with Next Gen IoT Networks Orama Inc. November, 2015 1 Network Lighting Controls Low Penetration - Why? Commissioning is very time-consuming & expensive Network configuration
More informationProject Chase Manhattan
T-NetSix Enon Corporation Project Chase Manhattan How T-NetSix Enon Corporation created new innovative mobile banking solution for Chase Manhattan bank Company background: T-NetSix Enon is a IT services
More informationFirewalls. Outlines: By: Arash Habibi Lashkari July 2010. Network Security 06
Firewalls Outlines: What is a firewall Why an organization ation needs a firewall Types of firewalls and technologies Deploying a firewall What is a VPN By: Arash Habibi Lashkari July 2010 1 Introduction
More informationInput and Output of ISM-Benchmark
Information Security Measures Benchmark (ISM-Benchmark) Ms. Yasuko Kanno, Chief Advisor, IT Security Center, Information-technology Promotion Agency (IPA) Japan Abstract This paper presents introduction
More informationChapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
More informationFieldservers as Real-time Monitoring Tools for Ubiquitous Sensor Networks
Fieldservers as Real-time Monitoring Tools for Ubiquitous Sensor Networks Aadit Shrestha, Rassarin Ch., HONDA Kiyoshi, Apichon Witayangkurn Asian Institute of Technology Hiroshi SHIMAMURA elab experience
More informationLongmai Mobile PKI Solution
Longmai Mobile PKI Solution A quick Solution to External and Internal fraud in Insurance Industry Putting the client at the center of modernization Contents 1. INTRODUCTION... 3 1.1 Challenges... 3 1.2
More information/ BROCHURE / CHECKLIST: PCI/ISO COMPLIANCE. By Melbourne IT Enterprise Services
/ BROCHURE / CHECKLIST: PCI/ISO COMPLIANCE By Melbourne IT Enterprise Services CHECKLIST: PCI/ISO COMPLIANCE If your business handles credit card transactions then you ve probably heard of the Payment
More informationReliable Authentication Method by Using Cellular Phones in WBT
Reliable Authentication Method by U Title Phones in WBT Author(s) Takamizawa, Hideyuki; Kaijiri, Kenj International Conference on International Conference on Citation International Conference on Issue
More informationDemonstration of Barcodes to QR Codes through Text Using Document Software
Demonstration of Barcodes to QR Codes through Text Using Document Software Dr. Neeraj Bhargava 1, Anchal kumawat 2, Dr. Ritu Bhargava 3 Associate Professor, Department of Computer Science, School of Engineering
More informationSpecial Properties of Ad-hoc Wireless Network and Security Models
Special Properties of Ad-hoc Wireless Network and Security Models Han Zhong Department of Computer Science, University of Auckland E-mail: hzho023@aucklanduni.ac.nz Abstract:There are certain amounts of
More informationSmart Meter PKI - Make or Buy?
ID WORLD Frankfurt 20.11.2014 11:15 11:45 Uhr Smart Meter PKI - Make or Buy? Dr.-Ing. Lutz Martiny achelos GmbH Paderborn Why PKI? Legal Background: Energiewirtschaftsgesetz Technical Background: Technical
More informationORDINANCE ON THE ELECTRONIC SIGNATURE CERTIFICATES IN THE. Chapter One GENERAL PROVISIONS
ADMINISTRATIONS Effective as of 13 June 2008 Adopted by Decree of the Council of Ministers No 97 of 16 May 2008 Promulgated SG, No. 48 of 23 May 2008 Chapter One GENERAL PROVISIONS Article 1. This Ordinance
More informationAGAINST OUTSIDE THREATS
SECURING CONTROL NETWORKS AGAINST OUTSIDE THREATS MARK BUCKLAND MAY 2015 2015 Echelon Corporation IzoT PLATFORM PILLARS Full Monitoring and Control over IP Legacy Co-Existence and Evolution Industrial-strength
More informationMobile Access by Axis. Wireless Access Points
Mobile Access by Axis Wireless Access Points Mobile Internet: Unleashing the Power of Bluetooth Bluetooth Access Point: Going Beyond Cables There s a revolution taking shape today that s fundamentally
More informationEarly Evaluation Center
www.winmedical.com Early Evaluation Center Early Evaluation Center - EEC is an intuitive and easy-to-use software for monitoring and evaluating a patient s clinical risk, and can acquire and process source
More informationQR-CODE BASED NON-REPUDIATION TRANSACTION VERIFICATION SYSTEM
QR-CODE BASED NON-REPUDIATION TRANSACTION VERIFICATION SYSTEM Jakub Nantl 1 1 Silesian University in Opava, School of Business Administration in Karvina, Univerzitní nám. 1934/3, 733 40 Karviná Email:
More informationThe e-payment Systems
The e-payment Systems Electronic Commerce (E-Commerce) Commerce refers to all the activities the purchase and sales of goods or services. Marketing, sales, payment, fulfillment, customer service Electronic
More informationDescription of the Technical Component:
Confirmation concerning Products for Qualified Electronic Signatures according to 15 Sec. 7 S. 1, 17 Sec. 4 German Electronic Signature Act 1 and 11 Sec. 2 and 15 German Electronic Signature Ordinance
More informationHigher National Unit Specification. General information for centres. Unit title: Enhancing Network Security and Configuring Remote Access Methods
Higher National Unit Specification General information for centres Unit code: D7JV 35 Unit purpose: This Unit is designed to enable candidates to increase network security through authentication, encryption
More informationmcard CPK Supported Solutions
mcard CPK Supported Solutions Century Longmai White Paper All rights reserved Contents 1. MTOKEN CPK CARD INTRODUCTION... 2 PRODUCT INTRODUCTION... 2 Product appearance... 3 Hardware parameters... 4 2.
More informationMobile payment systems
ARN, 12. April 2005 Mobile payment systems Agnieszka Zmijewska, Elaine Lawrence, Robert Steele Mobile payments Mobile payments (or m-payments) are payments in which at least one part of the transaction
More informationOperational Aspects (Encryption and Data Storage) in E-Prescription
Master of Science in Biomedical Engineering Exam Presentation Medical Informatics Operational Aspects (Encryption and Data Storage) in E-Prescription Thomas Gijs Roel Rynders 12/05/2014 Overview Introduction
More information