4 research outputs found

    Implementation Cryptography and Access Control on IoT-Based Warehouse Inventory Management System

    Get PDF
    Warehousing is a product storage management activity to ensure product availability, so inventory management is needed to oversee the movement of logistics and equipment. Some things need to be considered in the storage process, such as the suitability of the storage location, safe from theft, and safe from physical disturbances. Vulnerabilities can occur when unauthorized users find out information from the database regarding stored goods, so a security mechanism for the warehouse database is needed. In addition, proper identification needs to be made of someone trying to access the database. In this research, a Warehouse Inventory Management System (WIMS) was created by implementing the AES-128 cryptographic algorithm, which was built using ESP32 and Raspberry Pi 3 devices. Time Password (T-OTP). The results show that the built system can overcome inventory problems in conventional warehousing management systems and implement data security using the AES-128 algorithm. The application of two-factor authentication in the form of smartcards and T-OTP shows very good results in testing its accuracy to overcome the vulnerability of unauthorized access to the system databas

    Improving Security of Crypto Wallets in Blockchain Technologies

    Get PDF
    A big challenge in blockchain and cryptocurrency is securing the private key from potential hackers. Nobody can rollback a transaction made with a stolen key once the network confirms it. The technical solution to protect private keys is the cryptocurrency wallet, software, hardware, or a combination to manage the keys. In this dissertation, we try to investigate the significant challenges in existing cryptocurrency wallets and propose innovative solutions. Firstly, almost all cryptocurrency wallets suffer from the lack of a secure and convenient backup and recovery process. We offer a new cryptographic scheme to securely back up a hardware wallet relying on the side-channel human visual verification on the hardware wallet. Another practical mechanism to protect the funds is splitting the money between two wallets with small and large amounts. We propose a new scheme to create hierarchical wallets that we call deterministic sub-wallet to achieve this goal. The user can send funds from the wallet with a large amount to a smaller one in a secure way. We propose a multilayered architecture for cryptocurrency wallets based on a Defense-in-Depth strategy to protect private keys with a balance between convenience and security. The user protects the private keys in three restricted layers with different protection mechanisms. Finally, we try to solve another challenge in cryptocurrencies, which is losing access to private keys by its user, resulting in inaccessible coins. We propose a new mechanism called lean recovery transaction to tackle this problem. We make a change in wallet key management to generate a recovery transaction when needed. We implement a proof-of-concept for all of our proposals on a resource-constraint hardware wallet with a secure element, an embedded display, and one physical button. Furthermore, we evaluate the performance of our implementation and analyze the security of our proposed mechanisms

    Improving key exchange protocols based on sender and receiver electronic identification documents

    Get PDF
    ΠŸΡ€Π΅Π΄ΠΌΠ΅Ρ‚ Ρ€Π°Π΄Π° докторскС Π΄ΠΈΡΠ΅Ρ€Ρ‚Π°Ρ†ΠΈΡ˜Π΅ јС саглСдавањС Π°ΠΊΡ‚ΡƒΠ΅Π»Π½ΠΈΡ… ΠΏΡ€ΠΎΠ±Π»Π΅ΠΌΠ° Π²Π΅Π·Π°Π½ΠΈΡ… Π·Π° појмовС Ρ€Π°Π·ΠΌΠ΅Π½Π° криптографских ΠΊΡ™ΡƒΡ‡Π΅Π²Π° ΠΈ Π°ΡƒΡ‚Π΅Π½Ρ‚ΠΈΡ„ΠΈΠΊΠ°Ρ†ΠΈΡ˜Π° корисника систСма Π·Π° Ρ‚Π°Ρ˜Π½Ρƒ ΠΊΠΎΠΌΡƒΠ½ΠΈΠΊΠ°Ρ†ΠΈΡ˜Ρƒ. Π Π°Π΄ сС Π±Π°Π²ΠΈ Π°Π½Π°Π»ΠΈΠ·ΠΎΠΌ ΠΏΠΎΡΡ‚ΠΎΡ˜Π΅Ρ›ΠΈΡ… Ρ€Π΅ΡˆΠ΅ΡšΠ° Ρƒ области ΠΈΡΡ‚Ρ€Π°ΠΆΠΈΠ²Π°ΡšΠ° ΠΈ Ρ€Π°Π·Π²ΠΈΡ˜Π°ΡšΠ΅ΠΌ сопствСног систСма Π·Π° Ρ‚Π°Ρ˜Π½Ρƒ ΠΊΠΎΠΌΡƒΠ½ΠΈΠΊΠ°Ρ†ΠΈΡ˜Ρƒ. Научни Ρ†ΠΈΡ™ Π΄ΠΈΡΠ΅Ρ€Ρ‚Π°Ρ†ΠΈΡ˜Π΅ јС ΡƒΠ½Π°ΠΏΡ€Π΅Ρ’Π΅ΡšΠ΅ ΠΏΡ€ΠΎΡ‚ΠΎΠΊΠΎΠ»Π° Π·Π° Ρ€Π°Π·ΠΌΠ΅Π½Ρƒ криптографских ΠΊΡ™ΡƒΡ‡Π΅Π²Π° Π½Π° Π±Π°Π·ΠΈ Π»ΠΈΡ‡Π½ΠΈΡ… ΠΈΠ΄Π΅Π½Ρ‚ΠΈΡ„ΠΈΠΊΠ°Ρ†ΠΈΠΎΠ½ΠΈΡ… Π΄ΠΎΠΊΡƒΠΌΠ΅Π½Π°Ρ‚Π°. Π˜Π·Π²Ρ€ΡˆΠ΅Π½Π° јС Π°Π½Π°Π»ΠΈΠ·Π° ΠΏΠΎΡΡ‚ΠΎΡ˜Π΅Ρ›ΠΈΡ… приступа Ρƒ области ΠΈΡΡ‚Ρ€Π°ΠΆΠΈΠ²Π°ΡšΠ° с Ρ†ΠΈΡ™Π΅ΠΌ Π΄Π° сС ΠΏΠΎΠ±ΠΎΡ™ΡˆΠ° Π½ΠΈΠ²ΠΎ Π·Π°ΡˆΡ‚ΠΈΡ‚Π΅ ΠΏΡ€ΠΈΠ»ΠΈΠΊΠΎΠΌ Ρ‚Π°Ρ˜Π½Π΅ ΠΊΠΎΠΌΡƒΠ½ΠΈΠΊΠ°Ρ†ΠΈΡ˜Π΅ ΠΈ добијС основа Π·Π° Ρ€Π°Π·Π²ΠΎΡ˜ сопствСног систСма. КомбиновањСм криптографских ΠΌΠ΅Ρ‚ΠΎΠ΄Π° којС ΠΎΠ±Π΅Π·Π±Π΅Ρ’ΡƒΡ˜Ρƒ повСрљивост, аутСнтичност ΠΈ ΠΈΠ½Ρ‚Π΅Π³Ρ€ΠΈΡ‚Π΅Ρ‚, ΡƒΠ· ΠΏΡ€ΠΈΠΌΠ΅Π½Ρƒ стСганографских ΠΌΠ΅Ρ‚ΠΎΠ΄Π° Π·Π° Ρ€Π°Π·ΠΌΠ΅Π½Ρƒ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΡ˜Π° Π½Π° скривСн Π½Π°Ρ‡ΠΈΠ½, корисницима ΠΏΡ€Π΅Π΄Π»ΠΎΠΆΠ΅Π½ΠΎΠ³ систСма сС ΠΏΡ€ΡƒΠΆΠ° могућност Π΄Π° Π½Π° Сфикасан ΠΈ сигуран Π½Π°Ρ‡ΠΈΠ½ Ρ€Π°Π·ΠΌΠ΅ΡšΡƒΡ˜Ρƒ Ρ‚Π°Ρ˜Π½Π΅ ΠΏΠΎΡ€ΡƒΠΊΠ΅. Анализом Ρ€Π΅Π·ΡƒΠ»Ρ‚Π°Ρ‚Π° ΠΈΡΡ‚Ρ€Π°ΠΆΠΈΠ²Π°ΡšΠ° Π·Π°ΠΊΡ™ΡƒΡ‡Π΅Π½ΠΎ јС Π΄Π° ΠΏΠΎΡΡ‚ΠΎΡ˜ΠΈ оправданост ΡƒΠΏΠΎΡ‚Ρ€Π΅Π±Π΅ Π»ΠΈΡ‡Π½ΠΈΡ… ΠΈΠ΄Π΅Π½Ρ‚ΠΈΡ„ΠΈΠΊΠ°Ρ†ΠΈΠΎΠ½ΠΈΡ… Π΄ΠΎΠΊΡƒΠΌΠ΅Π½Π°Ρ‚Π° Π·Π° Ρ€Π°Π·ΠΌΠ΅Π½Ρƒ криптографских ΠΊΡ™ΡƒΡ‡Π΅Π²Π° који сС користС Ρƒ Ρ‚Π°Ρ˜Π½ΠΎΡ˜ ΠΊΠΎΠΌΡƒΠ½ΠΈΠΊΠ°Ρ†ΠΈΡ˜ΠΈ

    Secure Smart Card Signing With Time-Based Digital Signature

    No full text
    People use their personal computers, laptops, tablets and smart phones to digitally sign documents in company\u27s websites and other online electronic applications, and one of the main cybersecurity challenges in this process is trusted digital signature. While the majority of systems use password-based authentication to secure electronic signature, some more critical systems use USB token and smart card to prevent identity theft and implement the trusted digital signing process. Even though smart card provides stronger security, any weakness in the terminal itself can compromise the security of smart card. In this paper, we investigate current smart card digital signature, and illustrate well-known basic vulnerabilities of smart card terminal with the real implementation of two possible attacks including PIN sniffing and message alteration just before signing. As we focus on second attack in this paper, we propose a novel mechanism using time-based digital signing by smart card to defend against message alteration attack. Our prototype implementation and performance analysis illustrate that our proposed mechanism is feasible and provides stronger security. Our method uses popular timestamping protocol packets and does not require any new key distribution and certificate issuance
    corecore