10 research outputs found

    Covid-19: Digital Signature Impact on Higher Education Motivation Performance

    Get PDF
    At present, the process of validating documents for certain purposes cannot be done face-to-face because of the Covid-19 pandemic. Therefore, this research aims to maximize the existence of smart digital signature technology that guarantees its safety and validity without having to meet face to face. Encrypted digital signatures with RSA-SHA256 with cloud storage features that can share documents. The waterfall method for building systems, the collection of data generated for analysis by observation, and online questionnaires using Google Form.  Based on the characteristics of the system, the satisfaction factor analysis of the system with the Slovin formula processed by the SUS score resulted in a score of 95 > 70. The final result of this study is that the digital signature system has a significant impact on increasing motivation to facilitate authorization and secure documents

    Generating and Validating DSA Private Keys from Online Face Images for Digital Signatures

    Get PDF
    Signing digital documents is attracting more attention in recent years, according to the rapidly growing number of digital documents being exchanged online. The digital signature proves the authenticity of the document and the sender’s approval on the contents of the document. However, storing the private keys of users for digital signing imposes threats toward gaining unauthorized access, which can result in producing false signatures. Thus, in this paper, a novel approach is proposed to extract the private component of the key used to produce the digital signature from online face image. Hence, this private component is never stored in any database, so that, false signatures cannot be produced and the sender’s approval cannot be denied. The proposed method uses a convolutional neural network that is trained using a semi-supervised approach, so that, the values used for the training are extracted based on the predictions of the neural network. To avoid the need for training a complex neural network, the proposed neural network makes use of existing pretrained neural networks, that already have the knowledge about the distinctive features in the faces. The use of the MTCNN for face detection and Facenet for face recognition, in addition to the proposed neural network, to achieved the best performance. The performance of the proposed method is evaluated using the Colored FERET Faces Database Version 2 and has achieved robustness rate of 13.48% and uniqueness of 100%

    Sistema de cifrado basado en contexto aplicado a prevención de fuga de datos

    Full text link
    [ES] Las herramientas DLP (Data Leak Prevention) están adquiriendo un valor elevado en los últimos años debido a la importancia de proteger los datos sensibles de una organización. Muchas de las herramientas DLP se basan principalmente en la analítica de datos, ya sea un análisis de archivos almacenados o estando en tránsito por la red. La solución DLP propuesta usa el cifrado basado en contexto para evitar fugas de información. La clave de cifrado y descifrado se obtiene a partir de la ejecución de un conjunto de retos basados en el contexto de entorno y en las políticas de la empresa. En este artículo se explica la arquitectura y el diseño de la solución DLP y de los retos propuestos.Este trabajo ha sido parcialmente financiado con el apoyo del MINECO (proyecto DroneFS), con el código RTC-2015-4064-8 y del MINETUR (proyecto CiberNoid) con el código TSI-100200-2015-035.Garcia, A.; Holgado, P.; Garcia, J.; Roncero, J.; Villagrá, V.; Jalain, H. (2018). Sistema de cifrado basado en contexto aplicado a prevención de fuga de datos. En XIII Jornadas de Ingeniería telemática (JITEL 2017). Libro de actas. Editorial Universitat Politècnica de València. 93-100. https://doi.org/10.4995/JITEL2017.2017.6576OCS9310

    Identification of Clear Text Data Obfuscated Within Active File Slack

    Get PDF
    Obfuscating text on a hard drive can be done by utilizing the slack space of files. Text can be inserted into the area between the end of the file data and the New Technology File System (NTFS) cluster (the smallest drive space allocated to a file) that in which the file is stored, the data is hidden from traditional methods of viewing. If the hard drive is large, how does a digital forensics expert know where to look to find text that has been obfuscated? Searching through a large hard drive could take up a substantial amount of time that the expert possibly could not justify. If the digital forensics expert lacks the knowledge on how to properly search a hard drive for obfuscated clear text using data carving concepts, how will the obfuscated clear text be located on the drive and identified? To address this, an algorithm was proposed and tested, which resulted in the successful identification of clear text data in slack space with a percentage average of 99.31% identified. This algorithm is a reliable form of slack space analysis which can be used in conjunction with other data extraction methods to see the full scope of evidence on a drive

    Design and implementation of totally-self checking SHA-1 and SHA-256 hash functions’ architectures

    No full text
    Many cryptographic primitives that are used in cryptographic schemes and security protocols such as SET, PKI, IPSec and VPN's utilize hash functions - a special family of cryptographic algorithms. Hardware implementations of cryptographic hash functions provide high performance and increased security. However, potential faults during their normal operation cause significant problems in the authentication procedure. Hence, the on-time detection of errors is of great importance, especially when they are used in security-critical applications, such as military or space. In this paper, two Totally Self-Checking (TSC) designs are introduced for the two most-widely used hash functions: SHA-1 and SHA-256. To the best of authors’ knowledge, there is no previously published work presenting TSC hashing cores. The achieved fault coverage is 100% in the case of odd erroneous bits. The same coverage is achieved for even erroneous bits, if they are appropriately spread. Additionally, experimental results in terms of frequency, area, throughput, and power consumption are provided. Compared to the corresponding Duplicated with Checking (DWC) architectures, the proposed TSC-based designs are more efficient in terms of area, throughput/area, and power consumption. Specifically, the introduced TSC SHA-1 and SHA-256 cores are more efficient by 16.1% and 20.8% in terms of area and by 17.7% and 23.3% in terms of throughput/area, respectively. Also, compared to the corresponding DWC architectures, the proposed TSC-based designs are on average almost 20% more efficient in terms of power consumption

    Proposta de implementação dos algoritmos de hash MD5 e SHA-1 em hardware reconfigurável

    Get PDF
    This work proposes two Application Specific System Processor (ASSP), one to the MD5 algorithm and other to the SHA-1 algorithm implemented on Field Programmable Gate Array (FPGA) Xilinx Virtex 6 xc6vlx240t-1ff1156. The throughput and the occupied area were analyzed for several implementations on parallel instances of those algorithms. The results showed that the hardware proposed for MD5 achieved a better throughput than those found in published articles and it was possible to implement 320 instances of the algorithm in a single FPGA. For the SHA-1 algorithm the throughput and the area occupied by the internal circuits on the chip were also surprising when compared with other papers. Several applications such as password recovery, password validation, and high volume data integrity checking can be performed efficiently and quickly with an ASSP for MD5 and SHA-1. This work also presents a comparative analysis of the energy consumption associated with execution of the MD5 and SHA-1 algorithms for three different hardware platforms, a microprocessor (µP) of 8 bits and 32 bits and the specific application hardware designed for each algorithm. Results of consumption estimation from the processing time (measured in the laboratory) show that the use of dedicated hardware presents significant gains in energy savings.Este trabalho tem como objetivo propor dois hardwares de aplicação específica (Application Specific System Processor, ASSP), sendo um para o algoritmo MD5 e o outro para o algoritmo SHA-1, ambos implementados em um Field Programmable Gate Array (FPGA) Xilinx Virtex 6 xc6vlx240t-1ff1156. As métricas utilizadas para verificar a eficácia das implementações foram a vazão dos dados (throughput), a área de circuito ocupada, e o consumo de energia. Na qual cada uma foi analisada para várias implementações em instâncias paralelas dos algoritmos. Os resultados mostraram que o hardware proposto para o MD5 alcançou um throughput bem superior aos encontrados em artigos publicados e foi possível implementar 320 instâncias do algoritmo em um único FPGA. Para o algoritmo SHA-1 o throughput e a área ocupada pelos circuitos internos no chip também foram surpreendentes. Várias aplicações como, recuperação de senha (por meio do ataque de força bruta), validação de senha e verificação de integridade de grande volume de dados podem ser executadas de forma eficiente e rápida com um ASSP para o MD5 e para o SHA-1. A métrica do consumo de energia foi avaliada por meio de uma análise comparativa com outras três plataformas de hardware distintas, sendo um micro-processador (µP) de 8 bits, um µP de 32 bits e os hardwares de aplicação específica projetados para cada algoritmo. Os resultados de estimativa de consumo a partir do tempo de processamento (medidos em laboratório) mostram que a utilização dos hardwares dedicados apresentam ganhos significativos de economia de energia

    Entropy in Image Analysis II

    Get PDF
    Image analysis is a fundamental task for any application where extracting information from images is required. The analysis requires highly sophisticated numerical and analytical methods, particularly for those applications in medicine, security, and other fields where the results of the processing consist of data of vital importance. This fact is evident from all the articles composing the Special Issue "Entropy in Image Analysis II", in which the authors used widely tested methods to verify their results. In the process of reading the present volume, the reader will appreciate the richness of their methods and applications, in particular for medical imaging and image security, and a remarkable cross-fertilization among the proposed research areas

    XIII Jornadas de ingeniería telemática (JITEL 2017)

    Full text link
    Las Jornadas de Ingeniería Telemática (JITEL), organizadas por la Asociación de Telemática (ATEL), constituyen un foro propicio de reunión, debate y divulgación para los grupos que imparten docencia e investigan en temas relacionados con las redes y los servicios telemáticos. Con la organización de este evento se pretende fomentar, por un lado el intercambio de experiencias y resultados, además de la comunicación y cooperación entre los grupos de investigación que trabajan en temas relacionados con la telemática. En paralelo a las tradicionales sesiones que caracterizan los congresos científicos, se desea potenciar actividades más abiertas, que estimulen el intercambio de ideas entre los investigadores experimentados y los noveles, así como la creación de vínculos y puntos de encuentro entre los diferentes grupos o equipos de investigación. Para ello, además de invitar a personas relevantes en los campos correspondientes, se van a incluir sesiones de presentación y debate de las líneas y proyectos activos de los mencionados equiposLloret Mauri, J.; Casares Giner, V. (2018). XIII Jornadas de ingeniería telemática (JITEL 2017). Editorial Universitat Politècnica de València. http://hdl.handle.net/10251/97612EDITORIA
    corecore