209,446 research outputs found
Digital Signature Security in Data Communication
Authenticity of access in very information are very important in the current
era of Internet-based technology, there are many ways to secure information
from irresponsible parties with various security attacks, some of technique can
use for defend attack from irresponsible parties are using steganography,
cryptography or also use digital signatures. Digital signatures could be one of
solution where the authenticity of the message will be verified to prove that
the received message is the original message without any change,
Ong-Schnorr-Shamir is the algorithm are used in this research and the
experiment are perform on the digital signature scheme and the hidden channel
scheme.Comment: 6 pages, Paper presented at the International Conference on Education
and Technology (ICEduTech2017), Novotel Hotel, Balikpapan, Indonesi
Π‘ΡΠ°Π²Π½ΠΈΡΠ΅Π»ΡΠ½ΡΠΉ Π°Π½Π°Π»ΠΈΠ· ΠΏΠΎΠΊΠ°Π·Π°ΡΠ΅Π»Π΅ΠΉ ΡΠ»ΠΎΠΆΠ½ΠΎΡΡΠΈ ΠΈ ΡΡΠΎΠΉΠΊΠΎΡΡΠΈ ΡΠΈΡΡΠΎΠ²ΡΡ ΠΏΠΎΠ΄ΠΏΠΈΡΠ΅ΠΉ ECSS ΠΈ ECDSA
ΠΠ΄ΡΠΉΡΠ½ΡΡΡΡΡΡ ΠΏΠΎΡΡΠ²Π½ΡΠ»ΡΠ½ΠΈΠΉ Π°Π½Π°Π»ΡΠ· RSA-ΠΏΠΎΠ΄ΡΠ±Π½ΠΈΡ
ΡΠΈΡΡΠ΅ΠΌ Π· ΡΠΈΡΡΠΎΠ²ΠΈΠΌΠΈ ΠΏΡΠ΄ΠΏΠΈΡΠ°ΠΌΠΈ Π½Π°
Π΅Π»ΡΠΏΡΠΈΡΠ½ΡΠΉ ΠΊΡΠΈΠ²ΡΠΉ Ρ cΠΊΡΠ½ΡΠ΅Π½Π½ΠΈΡ
ΠΏΠΎΠ»ΡΡ
. ΠΠ½Π°Π»ΡΠ·ΡΡΡΡΡΡ ΠΎΡΠ½ΠΎΠ²Π½Ρ Π°Π»Π³ΠΎΡΠΈΡΠΌΠΈ ΡΠΈΡΡΠΎΠ²ΠΈΡ
ΠΏΡΠ΄ΠΏΠΈΡΡΠ² ΠΏΠΎΠ±ΡΠ΄ΠΎΠ²Π°Π½ΠΈΡ
Π½Π° ΠΎΡΠ½ΠΎΠ²Ρ Π΅Π»ΡΠΏΡΠΈΡΠ½ΠΎΡ ΠΊΡΠΈΠ²ΠΎΡ (ECDSA Ρ ECSS). ΠΠ°ΡΡΡΡΡ ΡΠ΅ΠΊΠΎΠΌΠ΅Π½Π΄Π°ΡΡΡ Π· Π²ΠΈΠΊΠΎΡΠΈΡΡΠ°Π½Π½Ρ ΡΠΈΡΡΠΎΠ²ΠΈΡ
ΠΏΡΠ΄ΠΏΠΈΡΡΠ².Produce comparative analysis RSA β similar systems with digital signatures on elliptic curves in finite fields. Analyzed main algorithms of digital signatures on elliptic curves (ECDSA and ECSS). Given recommendations on using the digital signatures
Terrain type recognition using ERTS-1 MSS images
For the automatic recognition of earth resources from ERTS-1 digital tapes, both multispectral and spatial pattern recognition techniques are important. Recognition of terrain types is based on spatial signatures that become evident by processing small portions of an image through selected algorithms. An investigation of spatial signatures that are applicable to ERTS-1 MSS images is described. Artifacts in the spatial signatures seem to be related to the multispectral scanner. A method for suppressing such artifacts is presented. Finally, results of terrain type recognition for one ERTS-1 image are presented
Non-Repudiation in Internet Telephony
We present a concept to achieve non-repudiation for natural language
conversations over the Internet. The method rests on chained electronic
signatures applied to pieces of packet-based, digital, voice communication. It
establishes the integrity and authenticity of the bidirectional data stream and
its temporal sequence and thus the security context of a conversation. The
concept is close to the protocols for Voice over the Internet (VoIP), provides
a high level of inherent security, and extends naturally to multilateral
non-repudiation, e.g., for conferences. Signatures over conversations can
become true declarations of will in analogy to electronically signed, digital
documents. This enables binding verbal contracts, in principle between
unacquainted speakers, and in particular without witnesses. A reference
implementation of a secure VoIP archive is exhibited.Comment: Accepted full research paper at IFIP sec2007, Sandton, South Africa,
14-16 May 200
Entanglement-based quantum digital signatures over deployed campus network
The quantum digital signature protocol offers a replacement for most aspects
of public-key digital signatures ubiquitous in today's digital world. A major
advantage of a quantum digital signatures protocol is that it can have
information-theoretic security, whereas public-key cryptography cannot. Here we
demonstrate and characterize hardware to implement entanglement-based quantum
digital signatures over our campus network. Over 25 hours, we collect
measurements on our campus network, where we measure sufficiently low quantum
bit error rates (<5\% in most cases) which in principle enable quantum digital
signatures over up to 50 km as shown in rigorous simulation accompanied by a
noise model developed specifically for our implementation. These results show
quantum digital signatures can be successfully employed over deployed fiber.
While the current implementation of our entanglement-based approach has a low
signature rate, feasible upgrades would significantly increase the signature
rate. In addition, our reported method provides great flexibility in the number
of users.Comment: 16 pages, 5 figures, 1 tabl
Using LDGM Codes and Sparse Syndromes to Achieve Digital Signatures
In this paper, we address the problem of achieving efficient code-based
digital signatures with small public keys. The solution we propose exploits
sparse syndromes and randomly designed low-density generator matrix codes.
Based on our evaluations, the proposed scheme is able to outperform existing
solutions, permitting to achieve considerable security levels with very small
public keys.Comment: 16 pages. The final publication is available at springerlink.co
- β¦