17,037 research outputs found
A Review on Biological Inspired Computation in Cryptology
Cryptology is a field that concerned with cryptography and cryptanalysis. Cryptography, which is a key technology in providing a secure transmission of information, is a study of designing strong cryptographic algorithms, while cryptanalysis is a study of breaking the cipher. Recently biological approaches provide inspiration in solving problems from various fields. This paper reviews major works in the application of biological inspired computational (BIC) paradigm in cryptology. The paper focuses on three BIC approaches, namely, genetic algorithm (GA), artificial neural network (ANN) and artificial immune system (AIS). The findings show that the research on applications of biological approaches in cryptology is minimal as compared to other fields. To date only ANN and GA have been used in cryptanalysis and design of cryptographic primitives and protocols. Based on similarities that AIS has with ANN and GA, this paper provides insights for potential application of AIS in cryptology for further research
Modelling and simulation of a biometric identity-based cryptography
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks. Sharing confidential and top-secret information in a secure manner among government sectors tend to be the main element that government agencies look for. Thus, developing an effective methodology is essential and it is a key factor for e-Government success. The proposed e-Government scheme in this paper is a combination of identity-based encryption and biometric technology. This new scheme can effectively improve the security in authentication systems, which provides a reliable identity with a high degree of assurance. In addition, this paper demonstrates the feasibility of using Finite-state machines as a formal method to analyse the proposed protocols
Cryptocurrency with a Conscience: Using Artificial Intelligence to Develop Money that Advances Human Ethical Values
Cryptocurrencies like Bitcoin are offering new avenues for economic empowerment
to individuals around the world. However, they also provide a powerful tool that
facilitates criminal activities such as human trafficking and illegal weapons sales
that cause great harm to individuals and communities. Cryptocurrency advocates
have argued that the ethical dimensions of cryptocurrency are not qualitatively new,
insofar as money has always been understood as a passive instrument that lacks
ethical values and can be used for good or ill purposes. In this paper, we challenge
such a presumption that money must be ‘value-neutral.’ Building on advances in
artificial intelligence, cryptography, and machine ethics, we argue that it is possible
to design artificially intelligent cryptocurrencies that are not ethically neutral but
which autonomously regulate their own use in a way that reflects the ethical values
of particular human beings – or even entire human societies. We propose a technological framework for such cryptocurrencies and then analyse the legal, ethical, and
economic implications of their use. Finally, we suggest that the development of
cryptocurrencies possessing ethical as well as monetary value can provide human
beings with a new economic means of positively influencing the ethos and values
of their societies
Analysis of security protocols using finite-state machines
This paper demonstrates a comprehensive analysis method using formal methods such as finite-state machine. First, we describe the modified version of our new protocol and briefly explain the encrypt-then-authenticate mechanism, which is regarded as more a secure mechanism than the one used in our protocol. Then, we use a finite-state verification to study the behaviour of each machine created for each phase of the protocol and examine their behaviour s together. Modelling with finite-state machines shows that the modified protocol can function correctly and behave properly even with invalid input or time delay
- …