E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption
|
|
|
- Maximilian Reeves
- 9 years ago
- Views:
Transcription
1 Journal of Computer Science 6 (7): , 2010 ISSN Science Publications E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption Najlaa A. Abuadhmah, Muawya Naser and Azman Samsudin School of Computer Sciences, University Sains Malaysia, Penang, Malaysia Abstract: Problem statement: Visa is a very important travelling document, which is an essential need at the point of entry of any country we are visiting. However an important document such as visa is still handled manually which affects the accuracy and efficiency of processing the visa. Work on e- visa is almost unexplored. Approach: This study provided a detailed description of a newly proposed e-visa verification system prototyped based on RFID technology. The core technology of the proposed e-visa verification system is based on Identity Based Encryption (IBE) and Public Key Infrastructure (PKI). This research provided comparison between both methods in terms of processing time and application usability. Results: The result showed the e-visa verification system is highly flexible when implemented with IBE and on the other hand produces better processing speed when implemented with PKI. Conclusion: Therefore, it is believed that the proposed e-visa verification schemes are valuable security protocol for future study on e-visa. Key words: E-visa, Identity Based Encryption (IBE), Public Key Infrastructure (PKI), Radio Frequency Identification (RFID) INTRODUCTION In recent years, new electronic e-passport has started to replace conventional study-based passport around the world. In line with this development, a new protocol for e-visa is proposed in this study that can work hand in hand with current e-passport technology. E-visa is a very promising technology because of its wide range of applications and high security measures that can be implemented with it. The paper-based visa is very easy to clone, especially when it takes the form of an ink stamp. On the other hand, e-visa can hold more information, such as health and criminal records. In terms of legal and privacy issue, e-visa has minimal constraint, since the e-visa is created and used by the same issuing country. If e-passport is being implemented, e-visa can highly increase the security of the e-passport. In addition, the implementation of e-visa could retain the use of a paper passport if countries choose to do so. As mentioned earlier, the e-visa can be processed easily since the e-visa is being verified by the same country that issued the e-visa. Consequently, countries that wish to delay the implementation of e-passports or e-visas can now easily wait until a time of their choosing without affecting the countries that opt for the e-visa implementation. In this study the proposed e-visa verification system uses Identity Based Encryption (IBE) or Public Key Infrastructure (PKI), which contains a highly secured mechanism; as such, this technology would pose no inconvenience to any of the parties involved. Lastly, e-visas can also be deployed for other uses, such as criminal detection systems and other related applications involving border-crossings. E-visa system: So far, there has not been much research in the area of e-visa. The few existing researches on e-visa focus mainly on creating e-visa method that can strengthen the development of e-visa system. In the e-visa system, the traditional document of the visa is replaced by an electronic version of the visa, which is a chip embedded in the e-visa that contains personal information and digital biometric data of the e-visa holder. When a traveler comes to the immigration area, he/she has to insert his/her passport into a reader and place himself/herself in a biometric reading device for identification. After being confirmed as the correct individual, personal information is sent to a central computer server for further verification regarding, e.g., whether Corresponding Author: Azman Samsudin, School of Computer Sciences, University Sains Malaysia, Penang, Malaysia Tel: (+604) Fax: (+604)
2 the person is on a criminal wanted list or whether the person has any liabilities to the government. After the information is validated, the central computer will send a signal to open the gate and let the passenger pass through; otherwise, a signal will be sent to an alarm to alert the security officer. In addition, the RFID based e-visa is considered as contactless technology which allows high speed data transfer of up to 424 Kb per second. The e-visa can be implemented either as a smart label of size mm to be attached to the passport or issued in an ISO ID1 card (El-Smart, 2010). Data store technology: The existing infrastructure of each country help in determining the techniques used to transport data. RFID tag and barcode techniques are used to transport information. RFID is a generic term for technology that uses radio waves for automatic identification of entities and individual coffers. RFID technology is the next generation after barcodes in the area of identification technology. The first use of RFID technology was implemented in the 1940s. The British Air Force used RFID technology in World War II to identify whether airplanes were belonged to them. RFID theory was initially introduced by Stockman (1948). Nonetheless, according to Juels (2006), one of the main obstacles in RFID deployment is security attacks, which may threaten to manipulate the RFID technology. There are important differences between RFID and barcode technologies. Finkenzeller and Waddingtonn, (2003) compared the two technologies in terms of security, machine readability, cost, reading speed, maximum distance between data carrier, read rate and others. For e-visa, contactless chip card technology is seemed to be the optimal solution for providing information of travelers in a reliable manner. Security module (IBE and PKI): In this study, there are two different cryptographic secure modules which are proposed to access e-visa: Identity-Based Encryption (IBE) and Public Key Infrastructure (PKI). IBE is a form of public-key cryptography in which a third-party server uses a simple identifier, such as an e- mail address, to generate a public key that can be used for encrypting electronic messages. Compared to the typical public-key cryptography, this greatly reduces the complexity of the encryption process for both users and administrators. IBE technology enables us to send encrypted and signed messages without first obtaining key of the receiver. The first patent for IBE and signature schemes was filed by Shamir (1985). In 2001, an IBE scheme was developed by Boneh and Franklin (2001). An IBE scheme is specified by four algorithms: Setup, Extract, Encrypt and Decrypt. An example of IBE implementation is the work of Liang and Rong (2008). They described how the system can generate keys to the readers and tags and how the readers and tags can use these keys to protect their privacy and authenticate each other. On the other hand, PKI technology requires us to obtain a public key of the receiver from the key server before sending encrypted and signed message to the receiver. In a real life scenario, public and private keys are generated by the third party, which mean this third party cannot be completely trusted where the third party probably would have a high loyalty for certain country. At the same time, not all countries are in good relation which leads to a big obstacle to the trust mechanism needed by PKI. MATERIALS AND METHODS System architecture and settings: This research proposes a verification method to examine the authenticity of the e-visa based on PKI and IBE and identify which technology can satisfy security requirements with better performance at lower cost. Figure 1 shows the proposed mechanisms in situations in which the RFID chip is used in the inspection system at the issuance stage. Here, the hashed data R can be signed by the server private key using the PKI method or signed using a traveler s public identity under IBE. Also R, which is the traveler s visa information, is hashed and stored in the RFID tag. The same scenario occurs with barcodes if barcodes were to be used in the inspection system. Instead of storing the signed hashed data and the visa identification number in the chip, such information can be stored in two barcodes that are printed on the first page of the visa. The first barcode carries signed hashed data on all visa information and the other barcode bears the visa number identification. Once the passenger produces his/her passport at the checkpoint, the inspection system scans the RFID tag or the barcodes. Because the inspection system can retrieve the corresponding private key, the inspection system can then decrypt the signed data and compare it with the retrieved data from the RFID tag or the other barcode after hashing. This verification step is illustrated in Fig
3 Fig. 1: E-visa registration framework Note that, ICAO MRTD (Vaudenay and Vuagnoux, 2007), where PKI is used, is excessively complex. The need for cross-certification and maintaining the Certificate Revocation Lists (CRL) exacerbates the situation. The certificate-based PKI scheme of the International Civil Aviation Organization (ICAO) is subject to certain problems, especially regarding the distribution of the public key. The need to manage the private key signing, which corresponds to public key certificates and CRL, also contributes to the complexity of this problem. This research seeks to avoid these issues by proposing IBE and PKI as mechanisms to overcome the mentioned limitations. The mathematical equation that implements IBE is a special type of function called a Fig. 2: E-visa verification framework 725 bi-linear map (Galindo, 2005). It is a pairing that has the following property: Pair (a X, b Y) = Pair (b X, a Y). The PKI scheme is based on the RSA algorithm (Ron et al., 1978; Stallings, 2006). RESULTS Implementation and result: We implement a protocol to verify e-visa based on the proposal described in the previous section. The following discussion provides a proof of concept by prototyping. In addition, processing time analysis for the new protocol validates the work. Furthermore, comparisons are provided between PKI and IBE in the context of e-visa verification to highlight the strength of each method.
4 Table 1: Processing time comparison between IBE and PKI implementation of the e-vise registration IBE (µs) PKI (µs) Visa number Hash generation Decryption Total time Hash generation Decryption Total time Visa Visa Visa Visa Visa Visa Visa Visa Visa Visa Average Table 2: Processing time comparison between IBE and PKI implementation of the e-visa verification IBE (µs) PKI (µs) Visa number Key generation Hash generation Encryption Total time Key generation Hash generation Encryption Total time Visa Visa Visa Visa Visa Visa Visa Visa Visa Visa Average Processing time: To demonstrate the validity of our proposed system, the processing times of e-visa registration and verification using IBE are examined. The IBE processing time is compared with the processing times of e-visa registration and verification using PKI. As a sample, we chose 10 e-visas profiles that were randomly created. There is no variance across the visa data because visa data are processed as binary data. Table 1 illustrates the time difference between PKI and IBE in the e-visa verification system. Table 2 illustrates the time difference between the PKI-based and IBE-based visa verification systems. In the case of all 10 visas we examined, we found that the time spent using PKI was much shorter than that spent using IBE-based implementation. The average time for registration processing under PKI was µs; while the average time under IBE was µs (Table 2). The average time for verification processing under PKI was µs, while the average time for IBE implementation was µs (Table 1). In addition, the results showed that this value may vary slightly between visas. We believe that the variations shown in the Table 1 and 2 were caused by background processes running on the workstation during the prototype test. However, the fluctuation is 726 not substantial and the proof of concept shown by the prototype still holds. DISCUSSION IBE is a natural choice for managing keys. The IBE encryption keys form the only architecture that meets all six requirements of an effective key management system. First, the IBE encryption key is derived mathematically from the receiver s identity and IBE keys are always available for all recipients. On the other hand, PKI often cannot encrypt data when the recipient s certificate is not available. Second, IBE interfaces with existing authentication infrastructures and so any authentication resources that are already deployed can be reused. Third, IBE enables the sender to select a local key server, a partner s key server, or a service to protect the data, depending on the particular requirements, while PKI must publish a directory externally. Fourth, because IBE mathematically generates all keys at the server, the server can securely regenerate keys for infrastructure components as needed and thus deliver keys to trusted infrastructure components. All keys in an IBE-based system are generated from a base secret stored at the key server
5 and therefore any key can be securely regenerated, whereas the PKI maintains a key database. Furthermore, scalability without a need for databases grows over time and/or is required for pertransaction connections to the key server. IBE enables additional applications and transactions to be added with very little, if any, additional key management infrastructure. Key servers can operate independently, allowing for geographic dispersion and load balancing. However, PKI has limited scalability due to operational complexity. In summary, IBE uniquely meets all six requirements of an affective key management system, while PKI fails to fulfill some of these requirements. Security discussion: Many security threats and attacks could flood the e-visa system. In the following, some potential threats to the e-visa system are identified and we discuss how they might be resolved by this proposal. The interception of the data contained in a passport could lead to fraud, either in its original form or through modifications. The problem of protecting data integrity could be solved by using a hash function for the data. With the secure hash algorithm, once the e- visa is issued, any change to the visa data would be easily detected. Data in the e-visa chip could be subjected to changes by adversaries to ruin e-visas as well as disturb the verification system; by using a hash function, we can ensure that there is no modification in the data because any modification leads to changes in the hash value. Furthermore, signing the data by the private key owned by the issuing authority guarantees data authentication. Note that the e-visa carries two values that are stored in RFID chips, namely, the original data and the signing hash data. This method enables the proposed system to work offline securely. On top of the hashing, e-visa data is encrypted by the private key to prevent modification on the data. CONCLUSION We have proposed e-visa verification schemes that greatly increase the efficiency and security of visa processing. In the propose schemes, the e-visa is issued by the same country, who will later verify the e-visa and therefore, gives minimum legal or privacy issues implication. In addition, the propose e-visa schemes can enhance the security of paper-based passport before a fully workable e-passport program is launched. The research has also sought to avoid the e-passport problem by proposing a high-level security mechanism for e-visa verification that enables the use of IBE and PKI to form a strong security and politically safe J. Computer Sci., 6 (7): , system. Based on the performance applicability and security discussion, we found that PKI performs at a higher processing speed than IBE. However IBE provides a better solution in terms of security. Security discussion shows that our protocol is safe against security threats. Moreover, IBE and PKI scheme may exist together, which provides more implementation choices to participating countries. REFERENCES Boneh, D. and M. Franklin, Identity-based encryption from the Weil pairing. SIAM J. Comput., 32: DOI: / El-Smart, E-visa. Electronia. Finkenzeller, K. and R. Waddingtonn, RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification. 2nd Edn., John Wiley and Sons Inc., ISBN: , pp: 470. Galindo, D., Boneh-Franklin Identity Based Encryption Revisited. Springer, ISBN: , pp: Juels, A., RFID Security and privacy: A research survey. IEEE J. Select. Areas Commun., 24: DOI: /JSAC Liang, Y. and C. Rong, RFID System Security Using Identity-Based Cryptography. Springer, ISBN: , pp: Ron, R., A. Shamir and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM, 26: DOI: / Shamir, A., Identity-Based Cryptosystems and Signature Schemes. Springer, ISBN: , pp: Stallings, W., Cryptography and Network Security: Principles and Practice. 4th Edn., Prentice Hall, ISBN: , pp: Stockman, H., Communication by means of reflected power. Proceedings of the IRE, Oct. 1948, Citeulike, pp: Vaudenay, S. and M. Vuagnoux, About machinereadable travel documents. J. Phys.: Conf. Ser., 77: 1-9. DOI: / /77/1/012006
Strengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from
Preface In the last decade biometrics has emerged as a valuable means to automatically recognize people, on the base is of their either physiological or behavioral characteristics, due to several inherent
Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council
Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity
Implementation of biometrics, issues to be solved
ICAO 9th Symposium and Exhibition on MRTDs, Biometrics and Border Security, 22-24 October 2013 Implementation of biometrics, issues to be solved Eugenijus Liubenka, Chairman of the Frontiers / False Documents
Preventing fraud in epassports and eids
Preventing fraud in epassports and eids Security protocols for today and tomorrow by Markus Mösenbacher, NXP Machine-readable passports have been a reality since the 1980s, but it wasn't until after 2001,
Journal of Electronic Banking Systems
Journal of Electronic Banking Systems Vol. 2015 (2015), Article ID 614386, 44 minipages. DOI:10.5171/2015.614386 www.ibimapublishing.com Copyright 2015. Khaled Ahmed Nagaty. Distributed under Creative
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
Security by Politics - Why it will never work. Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA
Security by Politics - Why it will never work Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA Agenda Motivation Some basics Brief overview epassport (MRTD) Why cloning? How to attack the
WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES
WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES Balachandra Muniyal 1 Krishna Prakash 2 Shashank Sharma 3 1 Dept. of Information and Communication Technology, Manipal Institute of Technology, Manipal
SecureStore I.CA. User manual. Version 2.16 and higher
User manual Version 2.16 and higher Contents SecureStore I.CA 1. INTRODUCTION...3 2. ACCESS DATA FOR THE CARD...3 2.1 Card initialisation...3 3. MAIN SCREEN...4 4. DISPLAYING INFORMATION ABOUT THE PAIR
Introduction to Cryptography
Introduction to Cryptography Part 3: real world applications Jean-Sébastien Coron January 2007 Public-key encryption BOB ALICE Insecure M E C C D channel M Alice s public-key Alice s private-key Authentication
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
Biometric Authentication Platform for a Safe, Secure, and Convenient Society
472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.
An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method
An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method E.Sathiyamoorthy 1, S.S.Manivannan 2 1&2 School of Information Technology and Engineering
Paper-based Document Authentication using Digital Signature and QR Code
2012 4T International Conference on Computer Engineering and Technology (ICCET 2012) Paper-based Document Authentication using Digital Signature and QR Code Maykin Warasart and Pramote Kuacharoen Department
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
Neutralus Certification Practices Statement
Neutralus Certification Practices Statement Version 2.8 April, 2013 INDEX INDEX...1 1.0 INTRODUCTION...3 1.1 Overview...3 1.2 Policy Identification...3 1.3 Community & Applicability...3 1.4 Contact Details...3
An Introduction to Identity-based Cryptography CSEP 590TU March 2005 Carl Youngblood
An Introduction to Identity-based Cryptography CSEP 590TU March 2005 Carl Youngblood One significant impediment to the widespread adoption of public-key cryptography is its dependence on a public-key infrastructure
PKD Board ICAO PKD unclassified B-Tec/37. Procedures for the ICAO Public Key Directory
Procedures for the ICAO Public Key Directory last modification final 1/13 SECTION 1 INTRODUCTION 1.1 As part of the MRTD initiative by ICAO, the Participants will upload to and download from the PKD, their
1 Public Key Cryptography and Information Security
International Carpathian Control Conference ICCC 2002 MALENOVICE, CZECH REPUBLIC May 27-30, 2002 IMPLEMENTATION ISSUES OF PKI TECHNOLOGY Victor-Valeriu PATRICIU, Marin BICA and Ion BICA Department of Computer
Improving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
EMV-TT. Now available on Android. White Paper by
EMV-TT A virtualised payment system with the following benefits: MNO and TSM independence Full EMV terminal and backend compliance Scheme agnostic (MasterCard and VISA supported) Supports transactions
Module 7 Security CS655! 7-1!
Module 7 Security CS655! 7-1! Issues Separation of! Security policies! Precise definition of which entities in the system can take what actions! Security mechanism! Means of enforcing that policy! Distributed
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution. 1 Opening quote. 2 The topics of cryptographic key management
RFID Security. April 10, 2006. Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark
April 10, 2006 Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark 1 Outline What is RFID RFID usage Security threats Threat examples Protection Schemes for
Ciphire Mail. Abstract
Ciphire Mail Technical Introduction Abstract Ciphire Mail is cryptographic software providing email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the
CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS
70 CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS 4.1 INTRODUCTION In this research work, a new enhanced SGC-PKC has been proposed for improving the electronic commerce and
Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999
Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer February 3, 1999 Frame Relay Frame Relay is an international standard for high-speed access to public wide area data networks
Email Security - The IBE Advantage
Email Security - The IBE Advantage Overcoming the hurdles of PKI, Symmetric and Web-based Messaging Voltage Security, Inc. July 2004 Copyright 2004 Voltage Security, Inc. All rights reserved. All information
Lecture 25: Pairing-Based Cryptography
6.897 Special Topics in Cryptography Instructors: Ran Canetti and Ron Rivest May 5, 2004 Lecture 25: Pairing-Based Cryptography Scribe: Ben Adida 1 Introduction The field of Pairing-Based Cryptography
Keep Out of My Passport: Access Control Mechanisms in E-passports
Keep Out of My Passport: Access Control Mechanisms in E-passports Ivo Pooters June 15, 2008 Abstract Nowadays, over 40 different countries issue biometric passports to increase security on there borders.
Public-Key Infrastructure
Public-Key Infrastructure Technology and Concepts Abstract This paper is intended to help explain general PKI technology and concepts. For the sake of orientation, it also touches on policies and standards
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES Table of contents 1.0 SOFTWARE 1 2.0 HARDWARE 2 3.0 TECHNICAL COMPONENTS 2 3.1 KEY MANAGEMENT
Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
PKD Board ICAO PKD unclassified B-Tec/36. Regulations for the ICAO Public Key Directory
Regulations for the ICAO Public Key Directory last modification final 1/8 SECTION 1 AUTHORITY These Regulations are issued by ICAO on the basis of Paragraph 3 b) of the Memorandum of Understanding (MoU)
Certification Practice Statement
Certification Practice Statement Revision R1 2013-01-09 1 Copyright Printed: January 9, 2013 This work is the intellectual property of Salzburger Banken Software. Reproduction and distribution require
CSE543 - Introduction to Computer and Network Security. Module: Public Key Infrastructure
CSE543 - Introduction to Computer and Network Security Module: Public Key Infrastructure Professor Trent Jaeger 1 Meeting Someone New Anywhere in the Internet 2 What is a certificate? A certificate makes
Online Voting System Powered by Biometric Security using Cryptography and Stegnography
ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Online
Secure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography
Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography Liang Yan, Chunming Rong, and Gansen Zhao University of Stavanger, Norway {liang.yan,chunming.rong}@uis.no
PRIME IDENTITY MANAGEMENT CORE
PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It
Group Security Model in Wireless Sensor Network using Identity Based Cryptographic Scheme
Group Security Model in Wireless Sensor Network using Identity Based Cryptographic Scheme Asha A 1, Hussana Johar 2, Dr B R Sujatha 3 1 M.Tech Student, Department of ECE, GSSSIETW, Mysuru, Karnataka, India
Security Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007
Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions Jan 23 rd, 2007 Microsoft ILM is a comprehensive, integrated, identity and access solution within the Microsoft system architecture. It includes
Controller of Certification Authorities of Mauritius
Contents Pg. Introduction 2 Public key Infrastructure Basics 2 What is Public Key Infrastructure (PKI)? 2 What are Digital Signatures? 3 Salient features of the Electronic Transactions Act 2000 (as amended)
The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions
The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions May 3, 2004 TABLE OF CONTENTS GENERAL PKI QUESTIONS... 1 1. What is PKI?...1 2. What functionality is provided by a
Certificate Management in Ad Hoc Networks
Certificate Management in Ad Hoc Networks Matei Ciobanu Morogan, Sead Muftic Department of Computer Science, Royal Institute of Technology [matei, sead] @ dsv.su.se Abstract Various types of certificates
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Radhika G #1, K.V.V. Satyanarayana *2, Tejaswi A #3 1,2,3 Dept of CSE, K L University, Vaddeswaram-522502,
Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C
Cunsheng Ding, HKUST Lecture 06: Public-Key Infrastructure Main Topics of this Lecture 1. Digital certificate 2. Certificate authority (CA) 3. Public key infrastructure (PKI) Page 1 Part I: Digital Certificates
Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
A Study on the Security of RFID with Enhancing Privacy Protection
A Study on the Security of RFID with Enhancing Privacy Protection *Henry Ker-Chang Chang, *Li-Chih Yen and *Wen-Chi Huang *Professor and *Graduate Students Graduate Institute of Information Management
A Note on the Relay Attacks on e-passports
A Note on the Relay Attacks on e-passports The Case of Czech e-passports Martin Hlaváč 1 and Tomáš Rosa 1,2 [email protected] and [email protected] 1 Department of Algebra, Charles University
MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS Kanchupati Kondaiah 1, B.Sudhakar 2 1 M.Tech Student, Dept of CSE,
Degree Certificate Authentication using QR Code and Smartphone
Degree Certificate Authentication using and Smartphone Ankit Singhal M.Tech Computer Science Faculty of Science, Dayalbagh Educational Institute, Dayalbagh, Agra, U.P, India R.S Pavithr Assistant Professor
How To Hack An Rdi Credit Card
RFID Payment Card Vulnerabilities Technical Report Thomas S. Heydt-Benjamin 1, Daniel V. Bailey 2, Kevin Fu 1, Ari Juels 2, and Tom O'Hare 3 Abstract 1: University of Massachusetts at Amherst {tshb, kevinfu}@cs.umass.edu
Mobile Driver s License Solution
Mobile Driver s License Solution Secure, convenient and more efficient Improved identity protection through secure mobile driver s licenses The introduction of a mobile driver s license is a huge opportunity
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 20 Public-Key Cryptography and Message Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Public-Key Cryptography
A Secure RFID Ticket System For Public Transport
A Secure RFID Ticket System For Public Transport Kun Peng and Feng Bao Institute for Infocomm Research, Singapore Abstract. A secure RFID ticket system for public transport is proposed in this paper. It
CS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark
Kerberos-Based Authentication for OpenStack Cloud Infrastructure as a Service
Kerberos-Based Authentication for OpenStack Cloud Infrastructure as a Service Sazzad Masud and Ram Krishnan University of Texas at San Antonio [email protected], [email protected] Abstract Cloud
Lecture VII : Public Key Infrastructure (PKI)
Lecture VII : Public Key Infrastructure (PKI) Internet Security: Principles & Practices John K. Zao, PhD (Harvard) SMIEEE Computer Science Department, National Chiao Tung University 2 Problems with Public
Research Article. Research of network payment system based on multi-factor authentication
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):437-441 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research of network payment system based on multi-factor
Strong Encryption for Public Key Management through SSL
Strong Encryption for Public Key Management through SSL CH.SUSHMA, D.NAVANEETHA 1,2 Assistant Professor, Information Technology, Bhoj Reddy Engineering College For Women, Hyderabad, India Abstract: Public-key
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
Capture Resilient ElGamal Signature Protocols
Capture Resilient ElGamal Signature Protocols Hüseyin Acan 1, Kamer Kaya 2,, and Ali Aydın Selçuk 2 1 Bilkent University, Department of Mathematics [email protected] 2 Bilkent University, Department
Chapter 6 Electronic Mail Security
Cryptography and Network Security Chapter 6 Electronic Mail Security Lectured by Nguyễn Đức Thái Outline Pretty Good Privacy S/MIME 2 Electronic Mail Security In virtually all distributed environments,
Discover Germany s Electronic Passport
Discover Germany s Electronic Passport Starting 1 Nov. 2007 E-Passport 2nd Generation www.epass.de 1 Introducing Germany s e-passport If you want to know why there are electronic passports and how to recognize
Longmai Mobile PKI Solution
Longmai Mobile PKI Solution A quick Solution to External and Internal fraud in Insurance Industry Putting the client at the center of modernization Contents 1. INTRODUCTION... 3 1.1 Challenges... 3 1.2
Understanding and Integrating KODAK Picture Authentication Cameras
Understanding and Integrating KODAK Picture Authentication Cameras Introduction Anyone familiar with imaging software such as ADOBE PHOTOSHOP can appreciate how easy it is manipulate digital still images.
159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology
Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication
AD CS. http://technet.microsoft.com/en-us/library/cc731564.aspx
AD CS AD CS http://technet.microsoft.com/en-us/library/cc731564.aspx Active Directory Certificate Services (AD CS) is an Identity and Access Control security technology that provides customizable services
Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment
Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Chih Hung Wang Computer Science and Information Engineering National Chiayi University Chiayi City 60004,
Using etoken for Securing E-mails Using Outlook and Outlook Express
Using etoken for Securing E-mails Using Outlook and Outlook Express Lesson 15 April 2004 etoken Certification Course Securing Email Using Certificates Unprotected emails can be easily read and/or altered
Audio: This overview module contains an introduction, five lessons, and a conclusion.
Homeland Security Presidential Directive 12 (HSPD 12) Overview Audio: Welcome to the Homeland Security Presidential Directive 12 (HSPD 12) overview module, the first in a series of informational modules
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
CS 392/681 - Computer Security
CS 392/681 - Computer Security Module 3 Key Exchange Algorithms Nasir Memon Polytechnic University Course Issues HW 3 assigned. Any lab or course issues? Midterm in three weeks. 8/30/04 Module 3 - Key
Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud
Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud M.Jayanthi, Assistant Professor, Hod of MCA.E mail: [email protected] MahatmaGandhi University,Nalgonda, INDIA. B.Ranganatha
IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS
IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS Mythily V.K 1, Jesvin Veancy B 2 1 Student, ME. Embedded System Technologies, Easwari Engineering College, Ramapuram, Anna University,
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Signature Amortization Technique for Authenticating Delay Sensitive Stream
Signature Amortization Technique for Authenticating Delay Sensitive Stream M Bruntha 1, Dr J. Premalatha Ph.D. 2 1 M.E., 2 Professor, Department of Information Technology, Kongu Engineering College, Perundurai,
The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network
The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network R.Anbarasi 1, S.Gunasekaran 2 P.G. Student, Department of Computer Engineering, V.S.B Engineering College, Karur,
Lightweight Security using Identity-Based Encryption Guido Appenzeller
Lightweight Security using Identity-Based Encryption Guido Appenzeller Chief Technology Officer Voltage Security Inc. Identity-Based Encryption (IBE) IBE is a new public key encryption algorithm A number
Security Digital Certificate Manager
IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags Sarah Abughazalah, Konstantinos Markantonakis, and Keith Mayes Smart Card Centre-Information Security Group (SCC-ISG) Royal Holloway,
Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan
Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan 1 Internet of Things (IoT) CASAGRAS defined that: A global
Efficient construction of vote-tags to allow open objection to the tally in electronic elections
Information Processing Letters 75 (2000) 211 215 Efficient construction of vote-tags to allow open objection to the tally in electronic elections Andreu Riera a,,joseprifà b, Joan Borrell b a isoco, Intelligent
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt 1 Lecture 11: Network Security Reference: Chapter 8 - Computer Networks, Andrew S. Tanenbaum, 4th Edition, Prentice
CS 6262 - Network Security: Public Key Infrastructure
CS 6262 - Network Security: Public Key Infrastructure Professor Patrick Traynor 1/30/13 Meeting Someone New 2 What is a certificate? A certificate makes an association between a user identity/job/ attribute
MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s
Security Model in E-government with Biometric based on PKI
Security Model in E-government with Biometric based on PKI Jaafar.TH. Jaafar Institute of Statistical Studies and Research Department of Computer and Information Sciences Cairo, Egypt Nermin Hamza Institute
CryptoNET: Security Management Protocols
CryptoNET: Security Management Protocols ABDUL GHAFOOR ABBASI, SEAD MUFTIC CoS, School of Information and Communication Technology Royal Institute of Technology Borgarfjordsgatan 15, SE-164 40, Kista,
Apache Milagro (incubating) An Introduction ApacheCon North America
Apache Milagro (incubating) An Introduction ApacheCon North America Apache Milagro will establish a new independent security framework for the Internet A Distributed Cryptosystem Secure the Future of the
