A Certification Authority for Elliptic Curve X.509v3 Certificates
|
|
|
- Edwina Annabelle Greene
- 10 years ago
- Views:
Transcription
1 A Certification Authority for Ellitic Curve X509v3 Certificates Maria-Dolores Cano, Ruben Toledo-Valera, Fernando Cerdan Det of Information Technologies & Communications Technical University of Cartagena (UPCT) Cartagena, Sain Abstract Wireless networks are more and more common in current communications networks Nevertheless, wireless communications entail a big concern: security The use of X509v3 certificates to carry out authentication tasks is an aroach to imrove security These certificates are usually emloyed with the RSA algorithm Ellitic Curve Crytograhy (ECC) is a crytograhic technique eminently suited for small devices, like those used in wireless communications, and is gaining momentum The main advantage of ECC versus RSA is that for the same level of security it requires a much sorter key length The urose of this work is to design and imlement a free oen-source Certification Authority able to issue X509v3 certificates using ECC This research is an imlementation study on free oen-source tools to issue digital certificates using ECC Moreover, it contributes to the develoment of free oen-source tools for network security based on ECC The result of this research may assist organizations to increase their security level in wireless devices and networks, in a costless way, by including authentication techniques based on ECC digital certificates Keywords- digital certificates; ellitic curve crytograhy; security; wireless communications I INTRODUCTION Wireless networks have suffered a dramatic increase in recent years Wireless technology is more and more resent in our society and millions of wireless equiment are sold every year However, one of the major concerns about wireless communications is security RSA is the most common method emloyed in ublic key crytograhy, for instance in X509 digital certificates These certificates are oriented to verify the identity of a erson or an entity However, new concerns are rising about the security of 1024-bit RSA [1] Ellitic Curve Crytograhy (ECC) is an innovative crytograhic technique Its security resides in the same roblem as RSA or Diffie-Hellman algorithms, but instead of using integers as symbols of the alhabet to be cihered, it uses oints in a mathematical object called ellitic curve The real ECC otential is that, with a much smaller key length, it achieves the same security level as other roosals Therefore, ECC resents some key attributes truly imortant in scenarios where the following resources are limited: rocessing ower, storage sace, bandwidth and ower consumtion [2] [3] There are even some organizations working towards ECC standardization (IEEE, IETF, ISO, etc), and leading enterrises develoing new ECC roducts Nevertheless, to favor the widesread use of ECC it is also essential romoting free oensource ECC tools In this aer we introduce a free oen-source Certification Authority (CA) for ECC X509v3 digital certificates The CA we roose is able to generate its own root certificate and to issue clients certificates We also develo the software a client requires to create a certificate request This certificate request is the one that the CA should sign after some verification stes The tool we roose is mainly oriented to environments with limited resources As it will be shown in next sections, its advantages are clearly noticeable The rest of this aer is organized as follows In section 2, we give a brief overview about Ellitic Curve Crytograhy, and the ECC mechanisms we use for the new X509v3 ECC digital certificates In section 3, we exlain the design of the certification tool In section 4, we describe the ECC CA working scenario Section 5 shows and discusses the exerimental imlementation The aer ends with the most imortant concluding remarks in section 6 II OVERVIEW OF ELLIPTIC CURVE CRYPTOGRAPHY Public key (asymmetric) crytograhy uses two keys (a rivate key and a ublic key), differing from rivate key (symmetric) crytograhy, where there must be a shared secret key Ellitic Curve Crytograhy was discovered in 1985 by V Miller [4] as an alternative method for ublic key crytograhy At that time, it was very difficult to erform the necessary calculations With time, imlementations were much more efficient, what allowed the erformance of ellitic curve mathematics to take the same amount of time as imlementations of integer factoring schemes for the same number of bits This, in its turn, imlies a reduction in cost, size, and rocessing time because ellitic curves require fewer bits for the same security level An ellitic curve is described by a cube equation, similar to those used to calculate an ellitic circumference Usually, the cube equation of an ellitic curve is indicated by (1), where a, b, c, d, and e are usually real numbers that comly with some condition Then, the ellitic curve is defined by the oints (x,y) that satisfy this equation The addition oeration can be defined for an ellitic curve, together with the element oint at infinity
2 0 This addition oeration fulfills the associative and commutative roerties y + axy + by = x + cx + dx + e (1) Ellitic curves used in crytograhy are defined over two tyes of finite fields: fields of odd characteristics ( F, where is a large rime number), and fields of characteristics two ( F 2 ) For the sake of simlicity we focus on m F Observe that the field F only emloys the numbers from 0 to (-1), and all comutations end by taking the remainder on division by In articular, crytograhy is interested in ellitic curve grous over F If we chose two ositive integers, a and b, smaller than such that (2) is true, then E ( a, b) denotes the ellitic curve grou in F, whose elements (x,y) are airs of ositive integers smaller than that satisfy the ellitic curve equation (3) 3 2 4a + 27b (mod ) 0 (2) 2 3 y (mod ) = x + ax + b (mod ) (3) To create a cryto system using ellitic curves is necessary to find a difficult roblem such factorizing the roduct of two rime numbers or calculating a discrete logarithm Consider the equation P = k G, where P and G are oints belonging to E ( a, b), and k is smaller than It is quite easy to assess P given k and G, but it is very comlex to calculate k given P and G This is called the Ellitic Curve Discrete Logarithm Problem (ECDLP) In fact, the G oint is called the generator oint The criterion to select G is as follows: the smallest value of n such that n G = 0 must be a large rime number Most of the ellitic curve crytograhic methods are related to the discrete logarithm schemes, which were originally formulated for usual modular arithmetic In order to use ECC, all arties must agree on all the elements defining the ellitic curve, that is, all arties should know the domain arameters For the field F, the domain arameters are: the rime number, constants a and b, the generator oint G, and the integer n The generation of these domain arameters is not straightforward Several standards bodies ublish domain arameters of ellitic curves [5] [6] [7] Next, we briefly exlain the two ECC algorithms that we use in this work to generate the ECC X509v3 certificates: ECDSA to sign a digital certificate, and ECIES to generate the ublic key included in a digital certificate A ECIES The Ellitic Curve Integrated Encrytion Scheme (ECIES), also known as Ellitic Curve Augmented Encrytion Scheme or Ellitic Curve Encrytion Scheme, is an ECC ublic-key encrytion technique ECIES is based on the Diffie-Hellman method Let us exlain briefly how it works [6] [7] [8] First, one entity (eg A) should establish what key derivation function (KDF) to use (eg ANSI-X963-KDF with SHA-1 otion [7], IKEv2-KDF [10] or TLS-KDF [11]) A KDF is used to derive keying data from a shared secret octet string Entity A should also select: the MAC (Message Authentication Code) scheme (eg, HMAC-SHA with 160-bit keys, HMAC-SHA-1-80 with 160-bit keys, etc), the symmetric encrytion scheme (eg AES), and any otion involved in them A should decide on whether to use the standard ellitic curve Diffie-Hellman rimitive or the ellitic curve cofactor Diffie-Hellman In addition, A should establish the ellitic curve domain arameters (a, b, G, n, etc) at the desired security level Next, the other entity (eg B) should obtain in an authentic manner the selections made by A After that, A should set u an ellitic curve key air associated with the ellitic curve domain arameters determined during the setu rocedure Let s call K PA to the A s ublic key and K A to the A s rivate key K A is an integer chosen randomly in the range [1, n-1] K PA is calculated as indicated by exression (4): K PA = K A G (4) Then, entity B should obtain in an authentic way the ellitic curve ublic key selected by A, ie K PA From now on, B (A) should encryt (decryt) messages using the keys and arameters established reviously For instance, if B wants to send a cihered message to A, then B does the following actions: B generates a random number r [1, n-1] and assesses R = r G B obtains a shared secret K S = r K Note that R and PA K S are oints in the ellitic curve B uses the KDF to derive a symmetric encrytion and MAC keys, K E and K M resectively B cihers the message using K E and the symmetric encrytion scheme selected during the setu hase B comutes the tag of the cihered message using K M The decrytion rocess is straightforward knowing the Diffie-Hellman rocedure In this work, we use ECIES to generate the ublic key of an entity, which can be used for cihering in later services The legitimacy of this ublic key is guaranteed by the digital certificate ECC X509v3 that our roosed Certification Authority issues The ECIES arameters that we have selected in our imlementation are shown below in Table 1 B ECDSA Ellitic Curve Digital Signature Algorithm (ECDSA) is a variant of the Digital Signature Algorithm (DSA) that oerates with ellitic curves Signature schemes are designed to be used
3 when an entity A wants to send a message M to an entity B in an authenticated way, and B wants to verify the authenticity of M ECDSA acts as follows [7] [8] [12] First, an entity A should select what hash function to use (eg SHA) Moreover, A should establish the curve domain arameters (a, b, G, n, etc) at the desire security level Entity B should get in an authentic manner the selections made by A Next, A and B should erform a key deloyment rocedure to be reared to use ECDSA A should set u an ellitic curve key air associated with the ellitic curve domain arameters agreed on the setu rocedure to use with ECDSA Let s call K PA to the A s ublic key, as shown in (4), and K A to the A s rivate key (randomly selected in [1, n-1]) B should obtain the ellitic curve ublic key selected by A, ie K PA To sign a message M, A should roceed according to the following stes: A alies the hash function to the message, and derives an integer e from the obtained hash A selects a random integer k in the range [1, n-1], and calculates K = k G = x A, y ) ( A A assesses r = x (mod n) A A calculates s = k 1 ( e + K r)(modn) The signature is the air (r, s) To verify the signature, the entity B should roceed as follows: B checks if r and s are integers, otherwise the signature is not valid B alies the hash function to the message, and derives an integer e from the obtained hash A B calculates u 1 1 = e s (mod n) and 1 u = r s (mod ) 2 n B comutes K = ( xa, y A) = u1 G + u2 K PA The signature is valid if x A = r(mod n) In this work, the Certification Authority uses ECDSA to sign an ECC X509v3 digital certificate containing an ECIES ublic key, thus verifying the authenticity of the ublic key and its owner III ECC CERTIFICATION AUTHORITY DESIGN We choose Java as rogramming language due to its latform indeendence After a searching hase, we leaned on the oen source library BouncyCastle [13] to write the code Next, we give details about the ECC CA design Our work can be divided into three blocks: classes to create the CA, classes to create the certificate request by the client, and classes so that the CA can sign the certificate request In addition, we define three classes (included in Fig 1) that are shared by all blocks: KeyGeneration is in charge of generating an ellitic curve key air It uses the ECIES scheme secified in ANSIX963 and IEEE P1363 takes the comonent of the client data, slits it into its minimum units, and comoses it again to eliminate ossible missellings CertificateUtils generates cer certificates (certificates signed by the CA, ie, the identity of the user has been verified), and der certificates (certificates that have not been signed yet, ie a client certificate request) In the first block, classes to make the CA, we define the class CAcertEC shown in Fig 2 Its main task is to generate the X509v3 root certificate and the PKCS#12 (Public Key Crytograhy Standard, PKCS) with the corresonding CA s rivate key A root certificate is a certificate that contains the ublic key of a CA Clients can trust a CA only if a coy of the CA root certificate is in its trusted root certificate store Moreover, the CA ublic key included in the CA root certificate is needed to verify the validity of any certificate that the CA issues PKCS is a set of standard rotocols to exchange secure information on the Internet using a ublic key infrastructure PKCS#12 is a standard that secifies a ortable format for storing a user s rivate key In the second block, classes to create the certificate request by the client, we characterize the classes illustrated in Fig 3 They involve the following tasks: GrahicClient launches an alet that the client uses to fill in the data necessary for the certificate request Manager catures the alet events KeyGeneration Static KeyGeneration(int): KeyPair TABLE I Parameter a b G n ELLIPTIC CURVE DOMAIN PARAMETERS Value 0x7fffffffffffffffffffffff7fffffffffff ffffffffffc 0x6b016c3bdcf18941d0d ca71a9db 2fb27d1d c2942c0a 0x020ffa963cdca8816ccc33b8642bedf905c3d d3f27fbbd3b3cb9aaaf Static decode(string) : string CertificateUtils Static X509Certificate gencert Static createcertmaster(publickey, PrivateKey, string, int, string): X509Certificate Static createcertder(publickey, PrivateKey, string, string): PKCS10CertificateRequest Figure 1 Shared classes
4 CAcertEC nameca string deartmentca string organizationca string cityca string countryca string ostalcodeca string asswdca string ca string caissuer string sizeclave int monthdurationcacertificate int signalgorithm string keypairca KeyPair caprivkey PrivateKey capubkey PublicKey fxpath string cerpath string Public CAcertEC( ) Figure 2 Classes to create the CA CertificateUtilss KeyGeneration UserCertEC_DER generates a der certificate (a certificate request) This is a certificate without a signature, hence, not valid yet The der certificate should be sent to the CA for signing This class also generates a PKCS#12 to store the rivate key MinimumClient takes the client der certificate and sends it to the CA In the last block, classes so that the CA signs the certificate request, we create the classes included in Fig 4 The goals of these classes are: MinimumServer, the CA is listening, waiting for a client request When a client connects to the CA, the CA checks if the client is authorized to demand the service If the client is authorized then the CA signs the client certificate request using the DER2CER class Afterwards, the CA returns the signed certificate (cer), IV ready for use, back to the client The CA kees waiting for new client requests DER2CER, this class firstly edits the client certificate request (PKCS#10), and adds new data such as key length, certificate serial number, eriod of validity (valid from-to), and signature algorithm In our case, the CA uses the ECDSAwithSHA-1 (Ellitic Curve Digital Signature Algorithm with Secure Hash Algorithm 1) to sign certificates DER2CER needs to know the key (usually known as suerkey) to access the CA secret key, which is located in the file serverfx It is necessary to know the CA secret key otherwise the CA would not be able to sign the client certificate Afterwards, the client certificate (cer) is created with CertificateUtils ECC CERTIFICATION AUTHORITY PROTOCOL APPROACH In this section we exlain the general rocedure to obtain an ECC X509v3 certificate (see Fig 5) First of all, the client asks the CA to issue a certificate (ste 1) In further services, the client could be authenticated with this certificate, or the ublic key included in the certificate could be used for cihering Then, the CA sends its root certificate (servercacer) and the software needed by the client to generate the certificate request (ste 2) The client installs the CA root certificate in its trusted store Although not imlemented, the software could also be signed so that the client can trust in it The client executes the software to generate a key air and a certificate request (clientder) (ste 3) The client sends its certificate request to the CA (ste 4) The CA receives the certificate request and some information from the user to validate him/her Different aroaches can be taken to decide if a user is authorized or not to ask for an ECC X509v3 certificate and verify his/her identity For instance, if this system were used in a re-aid hotsot (eg airort, hotel, etc), the user could send a code number to be validated This code could be obtained when a re-aid card is bought In other environments, like a small comany, the user validation could be done in erson UserCertEC_DER String name String organization String city String country String asswd String X509Certificate UserCert KeyPair Keys PrivateKey PrivKey PublicKey PubKey int keysize int monthdurationusercertificate String signalgorithm String fxpath String cerpath init( ): void Manager TextField text1, text2, text3, text4, text5, text6, text8, text9 Jassw String Name String Det String Organization String City String Country String PC String wd String String athcert Public Manager(TextField, TextField, TextField, TextField, TextField, TextField, JPassword Field, TextField, TextField) PublicactionPerformed(ActionEvent): void Figure 3 Classes to generate a certificate request GrahicClient init( ): void CertificateUtils
5 DER2CER String cerpath String derpath String fxcapath String keypfxca String userparam String caparam String caissue KeyPair keypairca PrivateKey caprivkey PublicKey capubkey X509Certificate cacer String nameca String organizationca String cityca String countryca String ostalcodeca String asswdca String ca String name String deartment String organization String city String country String ostalcode String String asswd int keysize long nserie int monthdurationusercertificate String signalgorithm Public MinimumClient( ) Figure 4 Classes to sign the client certificate request Figure 5 General rocedure If the user is authorized to demand this service, and his/her identity has been confirmed, the CA rocesses the certificate request, signing it with its rivate key and sending the final X509v3 certificate (clientcer) to the client Using this certificate, the client can be authenticated for later network services Note that the entire rocess is transarent from the user side V ECC CERTIFICATION AUTHORITY IMPLEMENTATION In this section we resent the imlementation of our free oen-source ECC Certification Authority The imlementation can be downloaded from [14] For simlicity, we follow the 2 5 MinimumServer Static Main(args[]) : void CertificateUtils same nomenclature (ste 1, ste 2, etc) than we used in the revious section At first, the server is waiting for client requests In our imlementation, we assume that the client already has the software to generate the certification request (stes 1 and 2 in Fig 5) To make the rest of the rocess easier, we have included a web age where the user can introduce some of the data needed for his/her certificate (eg: name, affiliation, etc) Therefore, in the third ste the client loads the web age (Fig 6) When the form is filled in, the client clicks the send button At that time, the client software creates a key store PKCS#12, where the rivate ECC key is stored and the certificate request clientder is generated The client automatically sends the clientder certificate to the Certification Authority (ste 4 in Fig5) The CA receives the certificate request clientder, the name of the client host, and its IP address Received data belonging to clientder is shown in the screen We assume that the client has roer access to the service, so the CA should only issue the final client certificate Once the clientcer certificate is ready, the CA sends it back to the client At this moment, the client has three files: clientcer, clientder, and clientfx The file clientcer is the X509v3 ECC certificate The file clientder is the certificate request that can be deleted The file clientfx is the key store, where the client s rivate key is ket These three files are located in the directory reviously indicated in the form, in the box ath to store the certificate (Fig 6) In Fig 7 and Fig 8, we observe the details of the certificate (clientcer) The certificate is issued to Paco by the Certification Authority CA4ec and is valid from 10/12/2005 (following the date format dd/mm/yy) to 09/05/2006 We see in Fig 8 that the signature algorithm corresonds to the OID (Object Identifier) This OID matches the ECDSAwithSHA1 algorithm From Fig 8, we observe that the ublic key algorithm is ECIES, identified by the OID OIDs can be checked in [15] Regarding the certification ath, we note from Fig 7 and Fig 9 that the certificate aears as not valid (red cross in Fig 9) This is due to the fact that Windows XP oerating system does not include yet any library (or module) to use ECDSA That is, it does not understand yet the algorithms ECIES or ECDSA Consequently, it is not able to verify the integrity of the certificate VI CONCLUSIONS In this aer, we roose, design, and imlement a free oen-source Certification Authority that generates X509v3 certificates by using ellitic curve crytograhy We exlain the classes needed to create the Certification Authority, the classes needed to create a client certificate request, and the classes to sign and generate the final validated client certificate We also show a real imlementation With the use of this tye of alication, we aim to hel to sread the use of ellitic curve crytograhy Our imlementation is notably useful for small wireless devices with rocessing ower, storage sace, or ower consumtion restrictions
6 Figure 6 Client web age The user can fill in: name, surname, deartment, organization, city, country code, ostal code, secret key to access his/her rivate key, address, and the ath to store the certificate Figure 7 Certificate information Figure 8 Details of the certificate Figure 9 Certificate ath REFERENCES [1] S Vanstone, Next generation security for wireless: ellitic curve crytograhy, Comuters & Security, Vol 22, No 5, , 2003 [2] N R Potlaally, S Ravi, A Raghunathan, N K Jha, A study of the energy consumtion characteristics of crytograhic algorithms and security rotocols, IEEE Transactions on Mobile Comuting, Vol 5, No 2, , 2005 [3] W Rao, Q Gan, The erformance analysis of two digital signatures schemes based on secure charging rotocol, Proc International Conference on Wireless Communications, Networking, and Mobile Comuting, Vol 2, , Setember 2005 [4] V S Miller, Use of Ellitic Curves in Crytograhy, Proc CRYPTO 85, Sringer-Verlag, New York, , 1986 [5] National Institute of Standards FIPS-PUB Recommended Ellitic Curves for Federal Government Use, 1999 Available online <htt://csrcnistgov/crytotoolkit/dss/ecdsa/nistrecurdf> Last accessed 3 rd March 3 rd, 2006 [6] Certicom, Standards for efficient crytograhy Sec2:Recommended Ellitic Curve Domain Parameters, Released Standard Version 10, 2000 Available online <htt://wwwsecgorg> Last accessed March 3 rd, 2006 [7] ANSI X963, Public-Key Crytograhy for the Financial Services Industry, Key Agreement and Key Transort Using Ellitic Curve Crytograhy, 2001 [8] D R Brown, Standards for efficient crytograhy Sec1: Ellitic Curve Crytograhy, Released Standard Version 10 and Working Draft v15, 2005 Available online <htt://wwwsecgorg> Last accessed March 3 rd, 2006 [9] IEEE1363 Working Grou IEEE Std P1363a-2004 (Amendment to IEEE Std P ) IEEE Standard Secifications for Public-Key Crytograhy Amendment 1: Additional Techniques, 2004 [10] C Kaufman, Internet Key Exchange (IKEv2) Protocol, Internet Draft, 2005 [11] V Guta, S Blake-Wilson, B Möller, C Hawk, N Bolyard, ECC Ciher suites for TLS, Internet Draft, 2004 [12] ANSI X962 (2005) Public-Key Crytograhy for the Financial Services Industry, the Ellitic curve Digital Signature Algorithm (ECDSA) [13] The Legion of the BouncyCastle Available online <htt://wwwbouncycastleorg> Last accesed March 3 rd, 2006 [14] M D Cano, R Toledo Valera, F Cerdan corresonding author for code donwload [15] ASN1 Information Site OID Reository, 2006 Available online <htt://asn1elibeltmfr/oid/indexhtm> Last accesed March 3 rd, 2006
FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES
Document: MRM-1004-GAPCFR11 (0005) Page: 1 / 18 FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES AUDIT TRAIL ECO # Version Change Descrition MATRIX- 449 A Ga Analysis after adding controlled documents
A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm
International Journal of Comuter Theory and Engineering, Vol. 7, No. 4, August 2015 A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm Xin Lu and Zhuanzhuan Zhang Abstract This
Load Balancing Mechanism in Agent-based Grid
Communications on Advanced Comutational Science with Alications 2016 No. 1 (2016) 57-62 Available online at www.isacs.com/cacsa Volume 2016, Issue 1, Year 2016 Article ID cacsa-00042, 6 Pages doi:10.5899/2016/cacsa-00042
Free Software Development. 2. Chemical Database Management
Leonardo Electronic Journal of Practices and echnologies ISSN 1583-1078 Issue 1, July-December 2002. 69-76 Free Software Develoment. 2. Chemical Database Management Monica ŞEFU 1, Mihaela Ligia UNGUREŞAN
Enhanced Security Key Management Scheme for MANETS
Enhanced Security Key Management Scheme for MANETS EDNA ELIZABETH.N, SUBASREE.S, and S.RADHA Electronics and Communication Engineering Deartment Sri Sivasubramaniya Nadar College of Engineering Kalavakkam,
ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS
ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS Liviu Grigore Comuter Science Deartment University of Illinois at Chicago Chicago, IL, 60607 [email protected] Ugo Buy Comuter Science
Sage Timberline Office
Sage Timberline Office Get Started Document Management 9.8 NOTICE This document and the Sage Timberline Office software may be used only in accordance with the accomanying Sage Timberline Office End User
Concurrent Program Synthesis Based on Supervisory Control
010 American Control Conference Marriott Waterfront, Baltimore, MD, USA June 30-July 0, 010 ThB07.5 Concurrent Program Synthesis Based on Suervisory Control Marian V. Iordache and Panos J. Antsaklis Abstract
DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON
DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON Rosario Esínola, Javier Contreras, Francisco J. Nogales and Antonio J. Conejo E.T.S. de Ingenieros Industriales, Universidad
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies Dave Corbett Technical Product Manager Implementing Forward Secrecy 1 Agenda Part 1: Introduction Why is Forward Secrecy important?
CABRS CELLULAR AUTOMATON BASED MRI BRAIN SEGMENTATION
XI Conference "Medical Informatics & Technologies" - 2006 Rafał Henryk KARTASZYŃSKI *, Paweł MIKOŁAJCZAK ** MRI brain segmentation, CT tissue segmentation, Cellular Automaton, image rocessing, medical
SOME PROPERTIES OF EXTENSIONS OF SMALL DEGREE OVER Q. 1. Quadratic Extensions
SOME PROPERTIES OF EXTENSIONS OF SMALL DEGREE OVER Q TREVOR ARNOLD Abstract This aer demonstrates a few characteristics of finite extensions of small degree over the rational numbers Q It comrises attemts
Automatic Search for Correlated Alarms
Automatic Search for Correlated Alarms Klaus-Dieter Tuchs, Peter Tondl, Markus Radimirsch, Klaus Jobmann Institut für Allgemeine Nachrichtentechnik, Universität Hannover Aelstraße 9a, 0167 Hanover, Germany
Comparing Dissimilarity Measures for Symbolic Data Analysis
Comaring Dissimilarity Measures for Symbolic Data Analysis Donato MALERBA, Floriana ESPOSITO, Vincenzo GIOVIALE and Valentina TAMMA Diartimento di Informatica, University of Bari Via Orabona 4 76 Bari,
THE RELATIONSHIP BETWEEN EMPLOYEE PERFORMANCE AND THEIR EFFICIENCY EVALUATION SYSTEM IN THE YOTH AND SPORT OFFICES IN NORTH WEST OF IRAN
THE RELATIONSHIP BETWEEN EMPLOYEE PERFORMANCE AND THEIR EFFICIENCY EVALUATION SYSTEM IN THE YOTH AND SPORT OFFICES IN NORTH WEST OF IRAN *Akbar Abdolhosenzadeh 1, Laya Mokhtari 2, Amineh Sahranavard Gargari
COST CALCULATION IN COMPLEX TRANSPORT SYSTEMS
OST ALULATION IN OMLEX TRANSORT SYSTEMS Zoltán BOKOR 1 Introduction Determining the real oeration and service costs is essential if transort systems are to be lanned and controlled effectively. ost information
Implementation of Statistic Process Control in a Painting Sector of a Automotive Manufacturer
4 th International Conference on Industrial Engineering and Industrial Management IV Congreso de Ingeniería de Organización Donostia- an ebastián, etember 8 th - th Imlementation of tatistic Process Control
Implementation of Elliptic Curve Digital Signature Algorithm
Implementation of Elliptic Curve Digital Signature Algorithm Aqeel Khalique Kuldip Singh Sandeep Sood Department of Electronics & Computer Engineering, Indian Institute of Technology Roorkee Roorkee, India
Stochastic Derivation of an Integral Equation for Probability Generating Functions
Journal of Informatics and Mathematical Sciences Volume 5 (2013), Number 3,. 157 163 RGN Publications htt://www.rgnublications.com Stochastic Derivation of an Integral Equation for Probability Generating
Migration to Object Oriented Platforms: A State Transformation Approach
Migration to Object Oriented Platforms: A State Transformation Aroach Ying Zou, Kostas Kontogiannis Det. of Electrical & Comuter Engineering University of Waterloo Waterloo, ON, N2L 3G1, Canada {yzou,
Service Network Design with Asset Management: Formulations and Comparative Analyzes
Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT-2007-40 Service Network Design with
A Survey of the Elliptic Curve Integrated Encryption Scheme
JOURNAL OF COMPUTER SCIENCE AND ENGINEERING, VOLUME, ISSUE, AUGUST 010 A Survey of the Elliptic Curve Integrated Encryption Scheme 7 V. Gayoso Martínez, L. Hernández Encinas, and C. Sánchez Ávila Abstract
Citrix NetScaler and Citrix XenDesktop 7 Deployment Guide
Citrix NetScaler and Citrix XenDeskto 7 Deloyment Guide 2 Table of contents Executive summary and document overview 3 1. Introduction 3 1.1 Overview summary 3 2. Architectural overview 4 2.1 Physical view
Secure synthesis and activation of protocol translation agents
Home Search Collections Journals About Contact us My IOPscience Secure synthesis and activation of rotocol translation agents This content has been downloaded from IOPscience. Please scroll down to see
Sage Document Management. User's Guide Version 13.1
Sage Document Management User's Guide Version 13.1 This is a ublication of Sage Software, Inc. Version 13.1 Last udated: June 19, 2013 Coyright 2013. Sage Software, Inc. All rights reserved. Sage, the
2. Cryptography 2.4 Digital Signatures
DI-FCT-UNL Computer and Network Systems Security Segurança de Sistemas e Redes de Computadores 2010-2011 2. Cryptography 2.4 Digital Signatures 2010, Henrique J. Domingos, DI/FCT/UNL 2.4 Digital Signatures
Branch-and-Price for Service Network Design with Asset Management Constraints
Branch-and-Price for Servicee Network Design with Asset Management Constraints Jardar Andersen Roar Grønhaug Mariellee Christiansen Teodor Gabriel Crainic December 2007 CIRRELT-2007-55 Branch-and-Price
The impact of metadata implementation on webpage visibility in search engine results (Part II) q
Information Processing and Management 41 (2005) 691 715 www.elsevier.com/locate/inforoman The imact of metadata imlementation on webage visibility in search engine results (Part II) q Jin Zhang *, Alexandra
Sage Document Management. User's Guide Version 12.1
Sage Document Management User's Guide Version 12.1 NOTICE This is a ublication of Sage Software, Inc. Version 12.1. November, 2012 Coyright 2012. Sage Software, Inc. All rights reserved. Sage, the Sage
Web Application Scalability: A Model-Based Approach
Coyright 24, Software Engineering Research and Performance Engineering Services. All rights reserved. Web Alication Scalability: A Model-Based Aroach Lloyd G. Williams, Ph.D. Software Engineering Research
NUTSS: A SIP-based Approach to UDP and TCP Network Connectivity
NUTSS: A SIP-based Aroach to UDP and TCP Network Connectivity Saikat Guha Det. of Comuter Science Cornell University Ithaca, NY 14853 [email protected] Yutaka Takeda Panasonic Communications San Diego,
SEC 2: Recommended Elliptic Curve Domain Parameters
STANDARDS FOR EFFICIENT CRYPTOGRAPHY SEC 2: Recommended Elliptic Curve Domain Parameters Certicom Research Contact: [email protected] September 20, 2000 Version 1.0 c 2000 Certicom Corp. License
An inventory control system for spare parts at a refinery: An empirical comparison of different reorder point methods
An inventory control system for sare arts at a refinery: An emirical comarison of different reorder oint methods Eric Porras a*, Rommert Dekker b a Instituto Tecnológico y de Estudios Sueriores de Monterrey,
Local Connectivity Tests to Identify Wormholes in Wireless Networks
Local Connectivity Tests to Identify Wormholes in Wireless Networks Xiaomeng Ban Comuter Science Stony Brook University [email protected] Rik Sarkar Comuter Science Freie Universität Berlin [email protected]
NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES
NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES Ounasser Abid 1, Jaouad Ettanfouhi 2 and Omar Khadir 3 1,2,3 Laboratory of Mathematics, Cryptography and Mechanics, Department of Mathematics, Fstm,
STATISTICAL CHARACTERIZATION OF THE RAILROAD SATELLITE CHANNEL AT KU-BAND
STATISTICAL CHARACTERIZATION OF THE RAILROAD SATELLITE CHANNEL AT KU-BAND Giorgio Sciascia *, Sandro Scalise *, Harald Ernst * and Rodolfo Mura + * DLR (German Aerosace Centre) Institute for Communications
X How to Schedule a Cascade in an Arbitrary Graph
X How to Schedule a Cascade in an Arbitrary Grah Flavio Chierichetti, Cornell University Jon Kleinberg, Cornell University Alessandro Panconesi, Saienza University When individuals in a social network
The fast Fourier transform method for the valuation of European style options in-the-money (ITM), at-the-money (ATM) and out-of-the-money (OTM)
Comutational and Alied Mathematics Journal 15; 1(1: 1-6 Published online January, 15 (htt://www.aascit.org/ournal/cam he fast Fourier transform method for the valuation of Euroean style otions in-the-money
TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES
TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES C. Gutiérrez, S. Servigne, R. Laurini LIRIS, INSA Lyon, Bât. Blaise Pascal, 20 av. Albert Einstein 69621 Villeurbanne, France
The risk of using the Q heterogeneity estimator for software engineering experiments
Dieste, O., Fernández, E., García-Martínez, R., Juristo, N. 11. The risk of using the Q heterogeneity estimator for software engineering exeriments. The risk of using the Q heterogeneity estimator for
Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket
IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
A Modified Measure of Covert Network Performance
A Modified Measure of Covert Network Performance LYNNE L DOTY Marist College Deartment of Mathematics Poughkeesie, NY UNITED STATES lynnedoty@maristedu Abstract: In a covert network the need for secrecy
An Efficient NURBS Path Generator for a Open Source CNC
An Efficient NURBS Path Generator for a Oen Source CNC ERNESTO LO VALVO, STEFANO DRAGO Diartimento di Ingegneria Chimica, Gestionale, Informatica e Meccanica Università degli Studi di Palermo Viale delle
Buffer Capacity Allocation: A method to QoS support on MPLS networks**
Buffer Caacity Allocation: A method to QoS suort on MPLS networks** M. K. Huerta * J. J. Padilla X. Hesselbach ϒ R. Fabregat O. Ravelo Abstract This aer describes an otimized model to suort QoS by mean
The Online Freeze-tag Problem
The Online Freeze-tag Problem Mikael Hammar, Bengt J. Nilsson, and Mia Persson Atus Technologies AB, IDEON, SE-3 70 Lund, Sweden [email protected] School of Technology and Society, Malmö University,
Monitoring Frequency of Change By Li Qin
Monitoring Frequency of Change By Li Qin Abstract Control charts are widely used in rocess monitoring roblems. This aer gives a brief review of control charts for monitoring a roortion and some initial
Electronic Commerce Research and Applications
Electronic Commerce Research and Alications 12 (2013) 246 259 Contents lists available at SciVerse ScienceDirect Electronic Commerce Research and Alications journal homeage: www.elsevier.com/locate/ecra
Corporate Compliance Policy
Cororate Comliance Policy English Edition FOREWORD Dear Emloyees, The global nature of Bayer s oerations means that our activities are subject to a wide variety of statutory regulations and standards
Time-Cost Trade-Offs in Resource-Constraint Project Scheduling Problems with Overlapping Modes
Time-Cost Trade-Offs in Resource-Constraint Proect Scheduling Problems with Overlaing Modes François Berthaut Robert Pellerin Nathalie Perrier Adnène Hai February 2011 CIRRELT-2011-10 Bureaux de Montréal
A Third Generation Automated Teller Machine Using Universal Subscriber Module with Iris Recognition
A Third Generation Automated Teller Machine Using Universal Subscriber Module with Iris Recognition B.Sundar Raj Assistant rofessor, Det of CSE, Bharath University, Chennai, TN, India. ABSTRACT: This aer
An important observation in supply chain management, known as the bullwhip effect,
Quantifying the Bullwhi Effect in a Simle Suly Chain: The Imact of Forecasting, Lead Times, and Information Frank Chen Zvi Drezner Jennifer K. Ryan David Simchi-Levi Decision Sciences Deartment, National
A Java implementation of the Elliptic Curve Integrated Encryption Scheme
A Java implementation of the Elliptic Curve Integrated Encryption Scheme V. Gayoso Martínez 1, L. Hernández Encinas 1, and C. Sánchez Ávila 2 1 Department of Information Processing and Coding Institute
On Multicast Capacity and Delay in Cognitive Radio Mobile Ad-hoc Networks
On Multicast Caacity and Delay in Cognitive Radio Mobile Ad-hoc Networks Jinbei Zhang, Yixuan Li, Zhuotao Liu, Fan Wu, Feng Yang, Xinbing Wang Det of Electronic Engineering Det of Comuter Science and Engineering
Service Network Design with Asset Management: Formulations and Comparative Analyzes
Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT-2007-40 Service Network Design with
Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch
1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...
Multiperiod Portfolio Optimization with General Transaction Costs
Multieriod Portfolio Otimization with General Transaction Costs Victor DeMiguel Deartment of Management Science and Oerations, London Business School, London NW1 4SA, UK, [email protected] Xiaoling Mei
Re-Dispatch Approach for Congestion Relief in Deregulated Power Systems
Re-Disatch Aroach for Congestion Relief in Deregulated ower Systems Ch. Naga Raja Kumari #1, M. Anitha 2 #1, 2 Assistant rofessor, Det. of Electrical Engineering RVR & JC College of Engineering, Guntur-522019,
This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.
This document is downloaded from DR-NTU, Nanyang Technological University Library, Singaore. Title Automatic Robot Taing: Auto-Path Planning and Maniulation Author(s) Citation Yuan, Qilong; Lembono, Teguh
Cryptography and Network Security Chapter 10
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 10 Other Public Key Cryptosystems Amongst the tribes of Central
Synopsys RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Development FRANCE
RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Develoment FRANCE Synosys There is no doubt left about the benefit of electrication and subsequently
A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION
9 th ASCE Secialty Conference on Probabilistic Mechanics and Structural Reliability PMC2004 Abstract A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION
Analysis of Effectiveness of Web based E- Learning Through Information Technology
International Journal of Soft Comuting and Engineering (IJSCE) Analysis of Effectiveness of Web based E- Learning Through Information Technology Anand Tamrakar, Kamal K. Mehta Abstract-Advancements of
CRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS
Review of the Air Force Academy No (23) 203 CRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS Cătălin CIOACĂ Henri Coandă Air Force Academy, Braşov, Romania Abstract: The
Title: Stochastic models of resource allocation for services
Title: Stochastic models of resource allocation for services Author: Ralh Badinelli,Professor, Virginia Tech, Deartment of BIT (235), Virginia Tech, Blacksburg VA 2461, USA, [email protected] Phone : (54) 231-7688,
Static and Dynamic Properties of Small-world Connection Topologies Based on Transit-stub Networks
Static and Dynamic Proerties of Small-world Connection Toologies Based on Transit-stub Networks Carlos Aguirre Fernando Corbacho Ramón Huerta Comuter Engineering Deartment, Universidad Autónoma de Madrid,
Rummage Web Server Tuning Evaluation through Benchmark
IJCSNS International Journal of Comuter Science and Network Security, VOL.7 No.9, Setember 27 13 Rummage Web Server Tuning Evaluation through Benchmark (Case study: CLICK, and TIME Parameter) Hiyam S.
Conjunctive, Subset, and Range Queries on Encrypted Data
Conjunctive, Subset, and ange Queries on Encryted Data Dan Boneh [email protected] Brent Waters [email protected] Abstract We construct ublic-key systems that suort comarison queries (x a) on encryted
Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised)
NIST Special Publication 800-56A Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised) Elaine Barker, Don Johnson, and Miles Smid C O M P U T E R S E C
Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement
certicom application notes Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement THE PROBLEM How can vendors take advantage
Web Inv. Web Invoicing & Electronic Payments. What s Inside. Strategic Impact of AP Automation. Inefficiencies in Current State
Pay tream A D V I S O R S WHITE PAPER Web Inv Web Invoicing Strategic Imact of AP Automation What s Inside Inefficiencies in Current State Key Drivers for Automation Web Invoicing Comonents New Automation
Safety evaluation of digital post-release environment sensor data interface for distributed fuzing systems
Safety evaluation of digital ost-release environment sensor data interface for distributed fuzing systems 57 th Fuze Conference, Newark, NJ Wednesday, July 30 th, 2014 Oen Session IIIA, 3:20 PM S. Ebenhöch,
Managing specific risk in property portfolios
Managing secific risk in roerty ortfolios Andrew Baum, PhD University of Reading, UK Peter Struemell OPC, London, UK Contact author: Andrew Baum Deartment of Real Estate and Planning University of Reading
SMALL BUSINESS GRANTS PROGRAM GUIDELINES
SMALL BUSINESS GRANTS PROGRAM GUIDELINES S GARTON STREET Small Business Grants Program Suorting our community The City of Melbourne offers a wide range of grants and sonsorshi oortunities to suort the
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 20 Public-Key Cryptography and Message Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Public-Key Cryptography
Overview of Public-Key Cryptography
CS 361S Overview of Public-Key Cryptography Vitaly Shmatikov slide 1 Reading Assignment Kaufman 6.1-6 slide 2 Public-Key Cryptography public key public key? private key Alice Bob Given: Everybody knows
Design of A Knowledge Based Trouble Call System with Colored Petri Net Models
2005 IEEE/PES Transmission and Distribution Conference & Exhibition: Asia and Pacific Dalian, China Design of A Knowledge Based Trouble Call System with Colored Petri Net Models Hui-Jen Chuang, Chia-Hung
Sage HRMS I Planning Guide. The Complete Buyer s Guide for Payroll Software
I Planning Guide The Comlete Buyer s Guide for Payroll Software Table of Contents Introduction... 1 Recent Payroll Trends... 2 Payroll Automation With Emloyee Self-Service... 2 Analyzing Your Current Payroll
I N F O R M A T I O N S E C U R I T Y
NIST Special Publication 800-78-3 DRAFT Cryptographic Algorithms and Key Sizes for Personal Identity Verification W. Timothy Polk Donna F. Dodson William E. Burr Hildegard Ferraiolo David Cooper I N F
EXAM questions for the course TTM4135 - Information Security May 2013. Part 1
EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question
Dynamic Load Balance for Approximate Parallel Simulations with Consistent Hashing
Dynamic Load Balance for Aroximate Parallel Simulations with Consistent Hashing Roberto Solar Yahoo! Labs Santiago, Chile [email protected] Veronica Gil-Costa Universidad Nacional de San Luis, Argentina
CERTIFICATE AUTHORITY SCHEMES USING ELLIPTIC CURVE CRYPTOGRAPHY, RSA AND THEIR VARIANTS- SIMULATION USING NS2
American Journal of Applied Sciences 11 (2): 171-179, 2014 ISSN: 1546-9239 2014 Science Publication doi:10.3844/ajassp.2014.171.179 Published Online 11 (2) 2014 (http://www.thescipub.com/ajas.toc) CERTIFICATE
Simulink Implementation of a CDMA Smart Antenna System
Simulink Imlementation of a CDMA Smart Antenna System MOSTAFA HEFNAWI Deartment of Electrical and Comuter Engineering Royal Military College of Canada Kingston, Ontario, K7K 7B4 CANADA Abstract: - The
Index Numbers OPTIONAL - II Mathematics for Commerce, Economics and Business INDEX NUMBERS
Index Numbers OPTIONAL - II 38 INDEX NUMBERS Of the imortant statistical devices and techniques, Index Numbers have today become one of the most widely used for judging the ulse of economy, although in
A New Efficient Digital Signature Scheme Algorithm based on Block cipher
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727Volume 7, Issue 1 (Nov. - Dec. 2012), PP 47-52 A New Efficient Digital Signature Scheme Algorithm based on Block cipher 1
Conjunctive, Subset, and Range Queries on Encrypted Data
Conjunctive, Subset, and ange Queries on Encryted Data Dan Boneh [email protected] Brent Waters [email protected] Abstract We construct ublic-key systems that suort comarison queries (x a) on encryted
Capture Resilient ElGamal Signature Protocols
Capture Resilient ElGamal Signature Protocols Hüseyin Acan 1, Kamer Kaya 2,, and Ali Aydın Selçuk 2 1 Bilkent University, Department of Mathematics [email protected] 2 Bilkent University, Department
INFERRING APP DEMAND FROM PUBLICLY AVAILABLE DATA 1
RESEARCH NOTE INFERRING APP DEMAND FROM PUBLICLY AVAILABLE DATA 1 Rajiv Garg McCombs School of Business, The University of Texas at Austin, Austin, TX 78712 U.S.A. {[email protected]} Rahul
On Traffic Fairness in Data Center Fabrics
On Traffic Fairness in Data Center Fabrics Dallal Belabed, Stefano Secci, Guy Pujolle, Dee Medhi Sorbonne Universities, UPMC Univ Paris 6, UMR 766, LIP6, F-755, Paris, France. Email: [email protected]
This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and
This article aeared in a journal ublished by Elsevier. The attached coy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution
Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network
Finding a Needle in a Haystack: Pinointing Significant BGP Routing Changes in an IP Network Jian Wu, Zhuoqing Morley Mao University of Michigan Jennifer Rexford Princeton University Jia Wang AT&T Labs
