82 research outputs found

    New Classes of Binary Random Sequences for Cryptography

    Get PDF
    In the vision for the 5G wireless communications advancement that yield new security prerequisites and challenges we propose a catalog of three new classes of pseudorandom random sequence generators. This dissertation starts with a review on the requirements of 5G wireless networking systems and the most recent development of the wireless security services applied to 5G, such as private-keys generation, key protection, and flexible authentication. This dissertation proposes new complexity theory-based, number-theoretic approaches to generate lightweight pseudorandom sequences, which protect the private information using spread spectrum techniques. For the class of new pseudorandom sequences, we obtain the generalization. Authentication issues of communicating parties in the basic model of Piggy Bank cryptography is considered and a flexible authentication using a certified authority is proposed

    Secure Communication Protocols, Secret Sharing and Authentication Based on Goldbach Partitions

    Get PDF
    This thesis investigates the use of Goldbach partitions for secure communication protocols and for finding large prime numbers that are fundamental to these protocols. It is proposed that multiple third parties be employed in TLS/SSL and secure communication protocols to distribute the trust and eliminate dependency on a single third party, which decreases the probability of forging a digital certificate and enhances the overall security of the system. Two methods are presented in which the secret key is not compromised until all third parties involved in the process are compromised. A new scheme to distribute secret shares using two third parties in the piggy bank cryptographic paradigm is proposed. Conditions under which Goldbach partitions are efficient in finding large prime numbers are presented. A method is also devised to sieve prime numbers which uses less number of operations as compared to the Sieve of Eratosthenes.Electrical Engineerin

    New Classes of Random Sequences for Coding and Cryptography Applications

    Get PDF
    Cryptography is required for securing data in a digital or analog medium and there exists a variety of protocols to encode the data and decrypt them without third party interference. Random numbers must be used to generate keys so that they cannot be guessed easily. This thesis investigates new classes of random numbers, including Gopala-Hemachandra (GH) and Narayana sequences, which are variants of the well-known Fibonacci sequences. Various mathematical properties of GH and Narayana sequences modulo prime have been found including their periods. Considering GH sequences modulo prime p, the periods are shown to be either (p-1) (or a divisor) or (2p+2) (or a divisor) while the Narayana sequence for prime modulo have either p2+p+1 (or a divisor) or p2-1 (or a divisor) as their periods. New results on the use of the Narayana sequence as a universal code have been obtained.It is shown that the autocorrelation and cross correlation properties of GH and Narayana sequences justify their use as random sequences. The signal to noise ratio values are calculated based on the use of delayed sequences to carry different sets of data in wireless applications. The thesis shows that GH and Narayana sequences are suitable for many encoding and decoding applications including key generation and securing transmission of data.Electrical Engineerin

    #Blockchain4EU: Blockchain for Industrial Transformations

    Get PDF
    The project #Blockchain4EU is a forward looking exploration of existing, emerging and potential applications based on Blockchain and other DLTs for industrial / non-financial sectors. It combined Science and Technology Studies with a transdisciplinary policy lab toolbox filled with frameworks from Foresight and Horizon Scanning, Behavioural Insights, or Participatory, Critical and Speculative Design. Amid unfolding and uncertain developments of the Blockchain space, our research signals a number of crucial opportunities and challenges around a technology that could record, secure and transfer any digitised transaction or process, and thus potentially affect large parts of current industrial landscapes. This report offers key insights for its implementation and uptake by industry, businesses and SMEs, together with science for policy strategic recommendations.JRC.I.2-Foresight, Behavioural Insights and Design for Polic

    End-to-end security in active networks

    Get PDF
    Active network solutions have been proposed to many of the problems caused by the increasing heterogeneity of the Internet. These ystems allow nodes within the network to process data passing through in several ways. Allowing code from various sources to run on routers introduces numerous security concerns that have been addressed by research into safe languages, restricted execution environments, and other related areas. But little attention has been paid to an even more critical question: the effect on end-to-end security of active flow manipulation. This thesis first examines the threat model implicit in active networks. It develops a framework of security protocols in use at various layers of the networking stack, and their utility to multimedia transport and flow processing, and asks if it is reasonable to give active routers access to the plaintext of these flows. After considering the various security problem introduced, such as vulnerability to attacks on intermediaries or coercion, it concludes not. We then ask if active network systems can be built that maintain end-to-end security without seriously degrading the functionality they provide. We describe the design and analysis of three such protocols: a distributed packet filtering system that can be used to adjust multimedia bandwidth requirements and defend against denial-of-service attacks; an efficient composition of link and transport-layer reliability mechanisms that increases the performance of TCP over lossy wireless links; and a distributed watermarking servicethat can efficiently deliver media flows marked with the identity of their recipients. In all three cases, similar functionality is provided to designs that do not maintain end-to-end security. Finally, we reconsider traditional end-to-end arguments in both networking and security, and show that they have continuing importance for Internet design. Our watermarking work adds the concept of splitting trust throughout a network to that model; we suggest further applications of this idea

    Переклад англомовних текстів у галузі інформаційних банківських технологій

    Get PDF
    У навчальному посібнику використано оригінальний англомовний матеріал у галузі інформаційних банківських технологій. Висвітлено англомовну термінологію у вказаній галузі і подано зразки англомовних слів та виразів, що необхідні для подальшої роботи під час виконання вправ. Зручний до використання двомовний англо-український словник, що охоплює усі модулі, розташований у кінці книги. Система вправ є циклічною для кожного модуля і призначена для автоматичного засвоєння вміння перекладу слів та виразів, а також для навчання кваліфікованого англо-українського перекладу банківських текстів, що пов'язані з використанням інформаційних технологій. Для студентів перекладацьких відділів та фахівців з перекладу у галузі економіки та комп'ютерних технологій.The manual is built on the authentic material in English in the field of information banking technologies. It highlights the English terminology in the above field and gives examples of English words and phrases necessary for further mastering while doing the exercises. The Ukrainian-English glossary which is conveniently set at the end of the manual comprises all the modules given. The system of exercises is of a cyclic character for each module and intended for working up automatic skills of translating words and phrases, as well as for training qualified English-Ukrainian translation of banking texts based on information terminology. Compiled for translation students and experts in economic and computer-aided technologies translation

    SoK: Privacy-Enhancing Technologies in Finance

    Get PDF
    Recent years have seen the emergence of practical advanced cryptographic tools that not only protect data privacy and authenticity, but also allow for jointly processing data from different institutions without sacrificing privacy. The ability to do so has enabled implementations a number of traditional and decentralized financial applications that would have required sacrificing privacy or trusting a third party. The main catalyst of this revolution was the advent of decentralized cryptocurrencies that use public ledgers to register financial transactions, which must be verifiable by any third party, while keeping sensitive data private. Zero Knowledge (ZK) proofs rose to prominence as a solution to this challenge, allowing for the owner of sensitive data (e.g. the identities of users involved in an operation) to convince a third party verifier that a certain operation has been correctly executed without revealing said data. It quickly became clear that performing arbitrary computation on private data from multiple sources by means of secure Multiparty Computation (MPC) and related techniques allows for more powerful financial applications, also in traditional finance. In this SoK, we categorize the main traditional and decentralized financial applications that can benefit from state-of-the-art Privacy-Enhancing Technologies (PETs) and identify design patterns commonly used when applying PETs in the context of these applications. In particular, we consider the following classes of applications: 1. Identity Management, KYC & AML; and 2. Markets & Settlement; 3. Legal; and 4. Digital Asset Custody. We examine how ZK proofs, MPC and related PETs have been used to tackle the main security challenges in each of these applications. Moreover, we provide an assessment of the technological readiness of each PET in the context of different financial applications according to the availability of: theoretical feasibility results, preliminary benchmarks (in scientific papers) or benchmarks achieving real-world performance (in commercially deployed solutions). Finally, we propose future applications of PETs as Fintech solutions to currently unsolved issues. While we systematize financial applications of PETs at large, we focus mainly on those applications that require privacy preserving computation on data from multiple parties
    corecore