24 research outputs found
Estudio e implementación de mecanismos de autenticación de usuarios en aplicaciones usando FIDO2 y criptografía ligera
El mundo de la ciberseguridad pasa por un momento de evolución, la frecuencia en los ataques de ingeniería social exige cambios en la autenticación, fomentando iniciativas como el estandarizado FIDO2 que busca la desaparición de las contraseñas. Por otra parte, cada vez se utilizan más sistemas empotrados con poca potencia, por lo que se necesita criptografía ligera poco exigente, en este trabajo se busca unificar ambas tecnologías, comprobando si es una alternativa viable para sistemas empotrados cada vez más frecuentes que requieran de seguridad, en el que se ha comprobado que el uso de criptografía ligera supone una mejoría notable en la eficiencia por encima de la criptografía clásica.The world of cybersecurity is going through a time of evolution, the frequency of social engineering attacks requires changes in authentication, promoting initiatives such as the standardized FIDO2 that seeks the disappearance of passwords. On the other hand, more and more embedded systems with little power are being used, so light cryptography is needed, this work seeks to unify both technologies, checking if it is a viable alternative for increasingly frequent embedded systems that require security, in which it has been found that the use of light cryptography is a significant improvement in efficiency over classic cryptography.Grado en Ingeniería de Computadore
Implementasi Metode Enkripsi Pergeseran Biner Dengan Microsoft Visual Basic 6.0
System bind on computer personal using platform of Microsoft Windows™ as machine of activator of public system because cannot prevent all hacker, cracker and attacker to enter and exploit the content from pertinent computer system for the sake of negativity. Especially at network of computer of peer to peer own the Microsoft Windows™ and public network [of] internet. So that as for how to conduct the implementation of binary method encryption shifting with Visually Basic 6.0 competent to be strived. This research aim to to prove that competent binary method encryption shifting implemented in everyday life all civil consumer for the protection of their data from acting cyber-crime, providing application program light cryptography and easy to just used by whom and for the sake of any kind of, security importance applicable to bind the static (in a stand alone computer and local of area network) and also in a community owning to bind the dinamic (mobile) such as a community in (virtual) private network and public network (internet) and also in physical delivery. The result of this research can present the data qualitative result of technical measurement and examination according to principles of software engineering so that application elegibility result of accountable engineering
Efficient and Privacy-Preserving Ride Sharing Organization for Transferable and Non-Transferable Services
Ride-sharing allows multiple persons to share their trips together in one
vehicle instead of using multiple vehicles. This can reduce the number of
vehicles in the street, which consequently can reduce air pollution, traffic
congestion and transportation cost. However, a ride-sharing organization
requires passengers to report sensitive location information about their trips
to a trip organizing server (TOS) which creates a serious privacy issue. In
addition, existing ride-sharing schemes are non-flexible, i.e., they require a
driver and a rider to have exactly the same trip to share a ride. Moreover,
they are non-scalable, i.e., inefficient if applied to large geographic areas.
In this paper, we propose two efficient privacy-preserving ride-sharing
organization schemes for Non-transferable Ride-sharing Services (NRS) and
Transferable Ride-sharing Services (TRS). In the NRS scheme, a rider can share
a ride from its source to destination with only one driver whereas, in TRS
scheme, a rider can transfer between multiple drivers while en route until he
reaches his destination. In both schemes, the ride-sharing area is divided into
a number of small geographic areas, called cells, and each cell has a unique
identifier. Each driver/rider should encrypt his trip's data and send an
encrypted ride-sharing offer/request to the TOS. In NRS scheme, Bloom filters
are used to compactly represent the trip information before encryption. Then,
the TOS can measure the similarity between the encrypted trips data to organize
shared rides without revealing either the users' identities or the location
information. In TRS scheme, drivers report their encrypted routes, an then the
TOS builds an encrypted directed graph that is passed to a modified version of
Dijkstra's shortest path algorithm to search for an optimal path of rides that
can achieve a set of preferences defined by the riders
Using physical unclonable functions for hardware authentication: a survey
Physical unclonable functions (PUFs) are drawing a crescent interest in hardware oriented security due to their special characteristics of simplicity and safety. However, their nature as well as early stage of study makes them constitute currently a diverse and non-standardized set for designers. This work tries to establish one organization of existing PUF structures, giving guidelines for their choice, conditioning, and adaptation depending on the target application. In particular, it is described how using PUFs adequately could enlighten significantly most of the security primitives, making them very suitable for authenticating constrained resource platforms.Junta de Andalucía P08-TIC-03674Comunidad Europea FP7-INFSO-ICT-248858Ministerio de Ciencia y Tecnología TEC2008-04920, DPI2008-03847 y TEC2007-6510
Physical layer security against eavesdropping in the internet of drones (IoD) based communication systems
rones or unmanned aerial vehicles (UAVs) communication technology, which has recently been
thoroughly studied and adopted by 3GPP standard (Release 15) due to its dynamic, flexible, and flying
nature, is expected to be an integral part of future wireless communications and Internet of drones
(IoD) applications. However, due to the unique transmission characteristics and nature of UAV systems
including broadcasting, dominant line of site and poor scattering, providing confidentiality for legitimate
receivers against unintended ones (eavesdroppers) appears to be a challenging goal to achieve in such
scenarios. Besides, the special features of UAVs represented by having limited power (battery-operated)
and precessing (light RAM and CPU capabilities), makes applying complex cryptography approaches
very challenging and inefficient for such systems. This motives the utilization of alternative approaches
enabled by physical layer security (PLS) concept for securing UAV-based systems. Techniques based
on PLS are deemed to be promising due to their ability to provide inherent secrecy that is complexity independent, where no matter what computational processing power the eavesdropper may have, there
is no way to decrypt the PLS algorithms. This work is dedicated to highlight and overview the latest
advances and state of art researches on the field of applying PLS to UAV systems in a unified and
structured manner. Particularity, it discusses and explains the different, possible PLS scenarios and
use cases of UAVs, which are categorized based on how the drone is utilized and employed in the
communication system setup. The main classified categories include the deployment of the flying, mobile
UAV as a 1) base station (BS), 2) user equipment (UE), 2) relay, or 4) jammer. Then, recommendations
and future open research issues are stated and discussed.No sponso
Hardware based cryptography: technological advances for applications in Colombia using embedded systems
To have totally independent systems that offer a sufficient security scheme has become a necessity in Colombia, this because of the proliferation of IoT type systems and similar; In general, it is required to make stand-alone systems totally independent and distributed to offer users a solution to this need, this work offers the analysis and comparison of two security schemes type digital signature and/or hardware security module (HSM) and its variations, made on embedded platforms type microcontroller software, which shows the strategy to provide information protection, In addition, it is analyzed how each implementation was executed, in which devices and metrics of interest, in the first application the cryptography schemes were made using a deep programming that describes the algorithms in C++ language and in the second implementation the use of the dedicated hardware that the embedded platform type microcontroller had is detailed; In both cases, solutions with an acceptable throughput were generated, allowing to obtain comparable solutions and the same style as those made in a PC or similar hardware. On the other hand, an exhaustive review of this type of solutions in the country-region was made, in order to have a reference as to the possible use of this type of applications
Design a cryptosystem using elliptic curves cryptography and Vigenère symmetry key
In this paper describes the basic idea of elliptic curve cryptography (ECC) as well as Vigenère symmetry key. Elliptic curve arithmetic can be used to develop elliptic curve coding schemes, including key exchange, encryption, and digital signature. The main attraction of elliptic curve cryptography compared to Rivest, Shamir, Adleman (RSA) is that it provides equivalent security for a smaller key size, which reduces processing costs. From the theorical basic, we proposed a cryptosystem using elliptic curves and Vigenère cryptography. We proposed and implemented our encryption algorithm in an integrated development environment named visual studio 2019 to design a safe, secure, and effective cryptosystem
IEEE 802.15.7-Compliant Ultra-low Latency Relaying VLC System for Safety-Critical ITS
The integration of Visible-Light Communications technology (VLC) in
Intelligent Transportation Systems (ITS) is a very promising platform for a
cost-effective implementation of revolutionary ITS and cooperative ITS
protocols. In this paper, we propose an infrastructure-to-vehicle-to-vehicle
(I2V2V) VLC system for ITS, implementing it through a regular LED traffic light
serving as a transmitter and a digital Active Decodeand- Relay (ADR) stage for
decoding and relaying the received information towards further incoming units.
The proposed VLC system targets the challenging and important case of ultra-low
latency ADR transmission of short packets, as this is needed for emerging
applications of automatic braking, car platooning and other critical automatic
and/or assisted driving applications. The experimental validation of the ADR
VLC chain, as well as a thorough statistical analysis of errors distribution in
the transmission, has been performed for short to medium distances, up to 50
meters. The performances of the designed system are evaluated by measuring the
packet error rate (PER) and latency in the whole ADR transmission chain. Our
analysis shows that our system attains ultra-low, sub-ms latencies at 99.9%
confidence level for PER as high as 5 x 10^-3, yet granting a latency below 10
ms even for distances of 50 m. The demonstrated system prototype is compatible
with IEEE 802.15.7 standard
Toward Polarization Encoding Measurement-Device-Independent Quantum Key Distribution in Free-Space
Quantum Key Distribution (QKD) allows two trusted parties the ability to exchange a secret cryptographic key with unconditional security guaranteed by the fundamental laws of quantum mechanics. The transmission and measurement of sequences of quantum bits, or qubits, between two parties is the underlying mechanism in QKD. Security proofs, theoretically assume ideal single-photon sources and perfect single-photon detectors.In practice, imperfections in the state preparation of qubits or those in single-photon detectors may be exploited to expose security loopholes. A relatively new protocol, Measurement-Device-Independent QKD (MDI-QKD), has been proposed which is immune to detector side-channel attacks, thus eliminating the need to have trusted single-photon detectors. However, in MDI-QKD near-perfect state preparation by the two parties is required to prove security in postprocessing.This thesis outlines a proof-of-principle demonstration of polarization-encoded MDI-QKD using attenuated weak coherent pulses and investigate imperfections to the state preparation of qubits from certain parameters