24 research outputs found

    Estudio e implementación de mecanismos de autenticación de usuarios en aplicaciones usando FIDO2 y criptografía ligera

    Get PDF
    El mundo de la ciberseguridad pasa por un momento de evolución, la frecuencia en los ataques de ingeniería social exige cambios en la autenticación, fomentando iniciativas como el estandarizado FIDO2 que busca la desaparición de las contraseñas. Por otra parte, cada vez se utilizan más sistemas empotrados con poca potencia, por lo que se necesita criptografía ligera poco exigente, en este trabajo se busca unificar ambas tecnologías, comprobando si es una alternativa viable para sistemas empotrados cada vez más frecuentes que requieran de seguridad, en el que se ha comprobado que el uso de criptografía ligera supone una mejoría notable en la eficiencia por encima de la criptografía clásica.The world of cybersecurity is going through a time of evolution, the frequency of social engineering attacks requires changes in authentication, promoting initiatives such as the standardized FIDO2 that seeks the disappearance of passwords. On the other hand, more and more embedded systems with little power are being used, so light cryptography is needed, this work seeks to unify both technologies, checking if it is a viable alternative for increasingly frequent embedded systems that require security, in which it has been found that the use of light cryptography is a significant improvement in efficiency over classic cryptography.Grado en Ingeniería de Computadore

    Implementasi Metode Enkripsi Pergeseran Biner Dengan Microsoft Visual Basic 6.0

    Get PDF
    System bind on computer personal using platform of Microsoft Windows™ as machine of activator of public system because cannot prevent all hacker, cracker and attacker to enter and exploit the content from pertinent computer system for the sake of negativity. Especially at network of computer of peer to peer own the Microsoft Windows™ and public network [of] internet. So that as for how to conduct the implementation of binary method encryption shifting with Visually Basic 6.0 competent to be strived. This research aim to to prove that competent binary method encryption shifting  implemented in everyday life all civil consumer for the protection of their data from acting cyber-crime, providing application program light cryptography and easy to just used by whom and for the sake of any kind of, security importance applicable to bind the static (in a stand alone computer and local of area network) and also in a community owning to bind the dinamic (mobile) such as a community in (virtual) private network and public network (internet) and also in physical delivery. The result of this research can present the data qualitative result of technical measurement and examination according to principles of software engineering so that application elegibility result of accountable engineering

    Efficient and Privacy-Preserving Ride Sharing Organization for Transferable and Non-Transferable Services

    Full text link
    Ride-sharing allows multiple persons to share their trips together in one vehicle instead of using multiple vehicles. This can reduce the number of vehicles in the street, which consequently can reduce air pollution, traffic congestion and transportation cost. However, a ride-sharing organization requires passengers to report sensitive location information about their trips to a trip organizing server (TOS) which creates a serious privacy issue. In addition, existing ride-sharing schemes are non-flexible, i.e., they require a driver and a rider to have exactly the same trip to share a ride. Moreover, they are non-scalable, i.e., inefficient if applied to large geographic areas. In this paper, we propose two efficient privacy-preserving ride-sharing organization schemes for Non-transferable Ride-sharing Services (NRS) and Transferable Ride-sharing Services (TRS). In the NRS scheme, a rider can share a ride from its source to destination with only one driver whereas, in TRS scheme, a rider can transfer between multiple drivers while en route until he reaches his destination. In both schemes, the ride-sharing area is divided into a number of small geographic areas, called cells, and each cell has a unique identifier. Each driver/rider should encrypt his trip's data and send an encrypted ride-sharing offer/request to the TOS. In NRS scheme, Bloom filters are used to compactly represent the trip information before encryption. Then, the TOS can measure the similarity between the encrypted trips data to organize shared rides without revealing either the users' identities or the location information. In TRS scheme, drivers report their encrypted routes, an then the TOS builds an encrypted directed graph that is passed to a modified version of Dijkstra's shortest path algorithm to search for an optimal path of rides that can achieve a set of preferences defined by the riders

    Using physical unclonable functions for hardware authentication: a survey

    Get PDF
    Physical unclonable functions (PUFs) are drawing a crescent interest in hardware oriented security due to their special characteristics of simplicity and safety. However, their nature as well as early stage of study makes them constitute currently a diverse and non-standardized set for designers. This work tries to establish one organization of existing PUF structures, giving guidelines for their choice, conditioning, and adaptation depending on the target application. In particular, it is described how using PUFs adequately could enlighten significantly most of the security primitives, making them very suitable for authenticating constrained resource platforms.Junta de Andalucía P08-TIC-03674Comunidad Europea FP7-INFSO-ICT-248858Ministerio de Ciencia y Tecnología TEC2008-04920, DPI2008-03847 y TEC2007-6510

    Physical layer security against eavesdropping in the internet of drones (IoD) based communication systems

    Get PDF
    rones or unmanned aerial vehicles (UAVs) communication technology, which has recently been thoroughly studied and adopted by 3GPP standard (Release 15) due to its dynamic, flexible, and flying nature, is expected to be an integral part of future wireless communications and Internet of drones (IoD) applications. However, due to the unique transmission characteristics and nature of UAV systems including broadcasting, dominant line of site and poor scattering, providing confidentiality for legitimate receivers against unintended ones (eavesdroppers) appears to be a challenging goal to achieve in such scenarios. Besides, the special features of UAVs represented by having limited power (battery-operated) and precessing (light RAM and CPU capabilities), makes applying complex cryptography approaches very challenging and inefficient for such systems. This motives the utilization of alternative approaches enabled by physical layer security (PLS) concept for securing UAV-based systems. Techniques based on PLS are deemed to be promising due to their ability to provide inherent secrecy that is complexity independent, where no matter what computational processing power the eavesdropper may have, there is no way to decrypt the PLS algorithms. This work is dedicated to highlight and overview the latest advances and state of art researches on the field of applying PLS to UAV systems in a unified and structured manner. Particularity, it discusses and explains the different, possible PLS scenarios and use cases of UAVs, which are categorized based on how the drone is utilized and employed in the communication system setup. The main classified categories include the deployment of the flying, mobile UAV as a 1) base station (BS), 2) user equipment (UE), 2) relay, or 4) jammer. Then, recommendations and future open research issues are stated and discussed.No sponso

    Hardware based cryptography: technological advances for applications in Colombia using embedded systems

    Get PDF
    To have totally independent systems that offer a sufficient security scheme has become a necessity in Colombia, this because of the proliferation of IoT type systems and similar; In general, it is required to make stand-alone systems totally independent and distributed to offer users a solution to this need, this work offers the analysis and comparison of two security schemes type digital signature and/or hardware security module (HSM) and its variations, made on embedded platforms type microcontroller software, which shows the strategy to provide information protection, In addition, it is analyzed how each implementation was executed, in which devices and metrics of interest, in the first application the cryptography schemes were made using a deep programming that describes the algorithms in C++ language and in the second implementation the use of the dedicated hardware that the embedded platform type microcontroller had is detailed; In both cases, solutions with an acceptable throughput were generated, allowing to obtain comparable solutions and the same style as those made in a PC or similar hardware. On the other hand, an exhaustive review of this type of solutions in the country-region was made, in order to have a reference as to the possible use of this type of applications

    Design a cryptosystem using elliptic curves cryptography and Vigenère symmetry key

    Get PDF
    In this paper describes the basic idea of elliptic curve cryptography (ECC) as well as Vigenère symmetry key. Elliptic curve arithmetic can be used to develop elliptic curve coding schemes, including key exchange, encryption, and digital signature. The main attraction of elliptic curve cryptography compared to Rivest, Shamir, Adleman (RSA) is that it provides equivalent security for a smaller key size, which reduces processing costs. From the theorical basic, we proposed a cryptosystem using elliptic curves and Vigenère cryptography. We proposed and implemented our encryption algorithm in an integrated development environment named visual studio 2019 to design a safe, secure, and effective cryptosystem

    The Study on Secure RFID Authentication and Access Control

    Get PDF

    IEEE 802.15.7-Compliant Ultra-low Latency Relaying VLC System for Safety-Critical ITS

    Get PDF
    The integration of Visible-Light Communications technology (VLC) in Intelligent Transportation Systems (ITS) is a very promising platform for a cost-effective implementation of revolutionary ITS and cooperative ITS protocols. In this paper, we propose an infrastructure-to-vehicle-to-vehicle (I2V2V) VLC system for ITS, implementing it through a regular LED traffic light serving as a transmitter and a digital Active Decodeand- Relay (ADR) stage for decoding and relaying the received information towards further incoming units. The proposed VLC system targets the challenging and important case of ultra-low latency ADR transmission of short packets, as this is needed for emerging applications of automatic braking, car platooning and other critical automatic and/or assisted driving applications. The experimental validation of the ADR VLC chain, as well as a thorough statistical analysis of errors distribution in the transmission, has been performed for short to medium distances, up to 50 meters. The performances of the designed system are evaluated by measuring the packet error rate (PER) and latency in the whole ADR transmission chain. Our analysis shows that our system attains ultra-low, sub-ms latencies at 99.9% confidence level for PER as high as 5 x 10^-3, yet granting a latency below 10 ms even for distances of 50 m. The demonstrated system prototype is compatible with IEEE 802.15.7 standard

    Toward Polarization Encoding Measurement-Device-Independent Quantum Key Distribution in Free-Space

    Get PDF
    Quantum Key Distribution (QKD) allows two trusted parties the ability to exchange a secret cryptographic key with unconditional security guaranteed by the fundamental laws of quantum mechanics. The transmission and measurement of sequences of quantum bits, or qubits, between two parties is the underlying mechanism in QKD. Security proofs, theoretically assume ideal single-photon sources and perfect single-photon detectors.In practice, imperfections in the state preparation of qubits or those in single-photon detectors may be exploited to expose security loopholes. A relatively new protocol, Measurement-Device-Independent QKD (MDI-QKD), has been proposed which is immune to detector side-channel attacks, thus eliminating the need to have trusted single-photon detectors. However, in MDI-QKD near-perfect state preparation by the two parties is required to prove security in postprocessing.This thesis outlines a proof-of-principle demonstration of polarization-encoded MDI-QKD using attenuated weak coherent pulses and investigate imperfections to the state preparation of qubits from certain parameters
    corecore