PKI (Cryptography) Research Papers - Academia.edu (original) (raw)

Blockchain technology has revolutionized the way people conduct transactions online. The distributed ledger technology has enabled the recording and tracking of resources and information even without a trustworthy authority as a central... more

Blockchain technology has revolutionized the way people conduct transactions online. The distributed ledger technology has enabled the recording and tracking of resources and information even without a trustworthy authority as a central figure. Users can exchange transactions that are grouped into blocks following a particular sequence. The distributed append-only ledger allows messages to be recorded without reversal making it one of the most efficient technologies to share critical information and transact resources. An additional technology that has grown to become one of the most preferred security solutions, particularly for e-commerce transactions is Public Key Infrastructure (PKI). PKIs are complex systems comprising of multiple components that require coordination and integration of an organization's business models. PKI uses two digital keys, one public, and another secret to ensure the confidentiality of a transaction, encryption, authentication, and signing of electronic data digitally. In this paper, we illustrated issues related to the PKI field, and then discussed how Blockchain technologies can fix this problem. We also illustrated the problems that occur with Blockchain being implemented.

This article explains what is a Digital Signature, why it is an important part of the Digital Identity, and how it works. Then it describes the authenticity and social problems related to the usage of the Digital Signature. It explains as... more

This article explains what is a Digital Signature, why it is an important part of the Digital Identity, and how it works. Then it describes the authenticity and social problems related to the usage of the Digital Signature. It explains as well the two authentication models, X.509 and OpenPGP, that can be used to solve these authenticity problems. Finally it makes a comparison between these two authentication models and their features and tries to explain why the OpenPGP model is better.

El trabajo presenta la arquitectura jurídica que da sustento a la implementación del sistema de gestión documental electrónica – GDE en Argentina: el derecho de fondo sumado al derecho administrativo electrónico que está naciendo.... more

El trabajo presenta la arquitectura jurídica que da sustento a la implementación del sistema de gestión documental electrónica – GDE en Argentina: el derecho de fondo sumado al derecho administrativo electrónico que está naciendo.
Quedará como un recuerdo la imagen de oficinas públicas repletas de papeles, expedientes perdidos, trámites interminables, elusión de responsabilidades y una maraña burocrática que no sólo tornaba ineficiente el accionar del Estado y lo desprestigiaba ante la sociedad sino que era fuente de la anomia boba tan bien caracterizada por Carlos Nino.

This article provides an overview of current international e-Government practices and the role of the national identity management infrastructure program in the United Arab Emirates (UAE) in supporting e-Government development. It... more

This article provides an overview of current international e-Government practices and the role of the national identity management infrastructure program in the United Arab Emirates (UAE) in supporting e-Government development. It describes the benefits of e-Government that various governments worldwide have identified, sheds light on some recent surveys on the delivery of e-Government by some countries, highlights some examples and puts the position of the United Arab Emirates into context. It then discusses the program's use of Identity Management in the strategic initiatives, explains their purpose in the facilitation of e-Government within the United Arab Emirates and describes a general roadmap for implementation.

Blockchain technology has revolutionized the way people conduct transactions online. The distributed ledger technology has enabled the recording and tracking of resources and information even without a trustworthy authority as a central... more

Blockchain technology has revolutionized the way people conduct transactions online. The distributed ledger technology has enabled the recording and tracking of resources and information even without a trustworthy authority as a central figure. Users can exchange transactions that are grouped into blocks following a particular sequence. The distributed append-only ledger allows messages to be recorded without reversal making it one of the most efficient technologies to share critical information and transact resources. An additional technology that has grown to become one of the most preferred security solutions, particularly for e-commerce transactions is Public Key Infrastructure (PKI). PKIs are complex systems comprising of multiple components that require coordination and integration of an organization's business models. PKI uses two digital keys, one public, and another secret to ensure the confidentiality of a transaction, encryption, authentication, and signing of electronic data digitally. In this paper, we illustrated issues related to the PKI field, and then discussed how Blockchain technologies can fix this problem. We also illustrated the problems that occur with Blockchain being implemented.

Sebuah partai komunis dengan basis massa terbesar di Asian Tenggara

Millions of citizens around the world have already acquired their new electronic passport. The e-passport is equipped with contactless communication capability, as well as with an Integrated Circuit Chip enabling cryptographic... more

Millions of citizens around the world have already acquired their new electronic passport. The e-passport is equipped with contactless communication capability, as well as with an Integrated Circuit Chip enabling cryptographic functionality. Countries are required to build a national Public Key Infrastructure to support digital signatures, as this is considered the basic mechanism to prove the authenticity and integrity of the Machine Readable Travel Documents. The first, large-scale, worldwide PKI is currently under construction, by means of bilateral trust relationships between Countries. In this paper, we propose a set of good practices, which are essential for the establishment of a global identification scheme based on e-passports, together with an analysis of the security and privacy issues that may arise. We argue that an e-passport may also be exploited in other applications as a globally interoperable PKI-enabled tamperproof device. The preconditions, the benefits and the drawbacks of using e-passports in everyday electronic activities are further analyzed and assessed.

Public Key Infrastructure gives security limits on the association, for instance, encryption of data, an insistence that data are done and customer affirmation, by open key encryption, etc. PKI starts to be worked as a validation base on... more

Public Key Infrastructure gives security limits on the association, for instance, encryption of data, an insistence that data are done and customer affirmation, by open key encryption, etc. PKI starts to be worked as a validation base on an organization by governments and colleges. Security is a significant worry for all organizations that move advanced data. These exchanges that might be secret, government, or private data should be shielded from falling into degenerate hands. PKI is presumably the best answer for this issue. An open gate is a client validation door framework for servers in the climate open for everyone. It has been working for managing the grounds fully unlocked organization. The Open gate API is empowered as a matter of course on all records. You don't need to successfully turn on this element. Be that as it may, API keys are utilized to control admittance to the assets through the API. At the point when an outsider application requests your API key, you can discover it on your information page by tapping the "Show your API keys" connect.

Internet of Things(IoT), allows communication among heterogeneous devices including everyday existing objects , embedded intelligent sensors, context-aware computing, traditional computing networks and smart objects that differ in their... more

Internet of Things(IoT), allows communication among heterogeneous devices including everyday existing objects , embedded intelligent sensors, context-aware computing, traditional computing networks and smart objects that differ in their design, systems, protocols, intelligence, applications, vendors, and sizes. The direct connection of these heterogeneous devices to the Internet poses security risks. Some of these devices are sometimes compromised and used in attacks such as DoS. This paper presents an orchestration framework for IoT devices based on public key infrastructure (PKI) aimed at providing logical isolation of IoT devices in situations where these devices have been compromised. We evaluate the performance of the proposed framework based on the computational time of the cryptographic algorithm, performance overhead when the framework was implemented on an IoT device and access revocation/restoration time.

The purpose of this article is to provide an overview of the PKI project initiated part of the UAE national ID card program. It primarily shows the operational model of the PKI implementation that is indented to integrate the federal... more

The purpose of this article is to provide an overview of the PKI project initiated part of the UAE national ID card program. It primarily shows the operational model of the PKI implementation that is indented to integrate the federal government identity management infrastructure with e-government initiatives owners in the country. It also explicates the agreed structure of the major components in relation to key stakeholders; represented by federal and local e-government authorities, financial institutions, and other organizations in both public and private sectors. The content of this article is believed to clarify some of the misconceptions about PKI implementation in national ID schemes, and explain how the project is envisaged to encourage the diffusion of e-government services in the United Arab Emirates. The study concludes that governments in the Middle East region have the trust in PKI technology to support their e-government services and expanding outreach and population trust, if of course accompanied by comprehensive digital laws and policies.

Despite significant investments in eGovernment, reported experiences show limited and struggling success cases. In the last 15 years, Governments’ efforts have been scattered, as agencies were mainly concerned with the development of... more

Despite significant investments in eGovernment, reported experiences show limited and struggling success cases. In the last 15 years, Governments’ efforts have been scattered, as agencies were mainly concerned with the development of informational portals and some basic online services resulting from the automation of a few traditional transactions.
In fact, Governments have been cautious in terms of their preferred eGovernment approaches and strategies. A large number of Governments’ services are still provided over the counter and requires the physical presence of citizens. This is in principle due to the fact that existing eGovernment environments lack effective methods through which they can establish trust and avail services over digital networks.
This article discusses the need for trust establishment to advance eGovernment in light of the existing and emerging realities. It looks at the evolving forms of identities, namely digital identities and the role of PKI technology in enabling such requirements.
The key contribution of this article is that it provides an overview of a large scale national PKI program which was deployed as part of a government identity management infrastructure development scheme in the United Arab Emirates. It provides an insight into the architecture and features of the PKI deployment. It presents how the UAE government planned and set up a national identity validation gateway to support both online and traditional transactions. It also includes some reflections on key management considerations and attempts to make reference to some European initiatives to highlight similarities and differences with the UAE and GCC projects.

tài liệu giới thiệu về chữ ký số ở hàn quốc

The current implementation of TLS involves your browser displaying a padlock, and a green bar, after successfully verifying the digital signature on the TLS certificate. Proposed is a solution where your browser's response to successful... more

The current implementation of TLS involves your browser displaying a padlock, and a green bar, after successfully verifying the digital signature on the TLS certificate. Proposed is a solution where your browser's response to successful verification of a TLS certificate is to display a login window. That login window displays the identity credentials from the TLS certificate, to allow the user to authenticate Bob. It also displays a 'user-browser' shared secret i.e. a specific picture from your hard disk. This is not SiteKey, the image is shared between the computer user and their browser. It is never transmitted over the internet. Since sandboxed websites cannot access your hard disk this image cannot be counterfeited by phishing websites. Basically if you view the installed software component of your browser as an actor in the cryptography protocol, then the solution to phishing attacks is classic cryptography, as documented in any cryptography textbook.

During the last decades, information security has become a major issue. Encrypting and decrypting data have recently been widely investigated and developed because there is a demand for a stronger encryption and decryption which is very... more

During the last decades, information security has become a major issue. Encrypting and decrypting data have recently been widely investigated and developed because there is a demand for a stronger encryption and decryption which is very hard to crack. Cryptography plays major roles to fulfilment these demands. Nowadays, many of researchers have proposed many of encryption and decryption algorithms such as AES, DES, RSA, and others. But most of the proposed algorithms encountered some problems such as lack of robustness and significant amount of time added to packet delay to maintain the security on the communication channel between the terminals. In this paper, the security goals were enhanced via "A New Approach for Complex Encrypting and Decrypting Data" which maintains the security on the communication channels by making it difficult for attacker to predicate a pattern as well as speed of the encryption / decryption scheme.

International Journal on Cryptography and Information Security ( IJCIS) is an open access peer reviewed journal that focuses on cutting-edge results in applied cryptography and Information security. It aims to bring together scientists,... more

International Journal on Cryptography and Information Security ( IJCIS) is an open access peer reviewed journal that focuses on cutting-edge results in applied cryptography and Information security. It aims to bring together scientists, researchers and students to exchange novel ideas and results in all aspects of cryptography, coding and Information security.

Public Key Infrastructure (PKI) provides an intensive security mechanism for securing data communication over network. Generally transferring a file over a network is not secure if the network is wireless network or it consists of hubs as... more

Public Key Infrastructure (PKI) provides an intensive security mechanism for securing data communication over network. Generally transferring a file over a network is not secure if the network is wireless network or it consists of hubs as a networking device. Because then packets are broadcasts to every other computers over the network. A hub does not remember what all devices are attached to it. It just sends the packets to all its ports. Same in case of wireless networks the data packets are broadcasted. In general scenario the data packets are received by only those clients which are supposed to receive it, but it may be happen that a third party too, called “Sniffers” capture or “sniffed” the data packets during file transaction even if they are not supposed to accept it. In this work we try to enhance the security of file transfer by merging file transfer over secure socket along with Public Key Infrastructure (PKI). If we implement file transfer along with asymmetric key crypt...

The project explores the use of digital documents as a response to the problems presented by physical documents, since they are at risk of partial or total loss. The solution is the digitalization that plays a very important role in... more

The project explores the use of digital documents as a response to the problems presented by physical documents, since they are at risk of partial or total loss. The solution is the digitalization that plays a very important role in society and the contemporary world. This helps sustainability and the preservation of natural resources. The security of the archives is a necessity that requires as solution to use the technology of public key infrastructure (PKI) to generate a digital document, besides registering the public and private keys of the personnel that has the legal power to sign them. These documents are stored on an official server and distributed among the registered hosts of the network. This certificate will help to detect changes in an unauthorized way, when comparing the document with the original. In this phase of distributed verification, the Blockchain technology will be used. Then the proposal is to build a tool to generate digital documents, in addition to managing public keys, transaction logs and records. The use of Blockchain will allow to establish and configure a Peer to Peer (P2P) network for a secure exchange. Public Key, Blockchain, Digital document Resumen En este proyecto se explora el uso de documentos digitales como respuesta a los problemas que presentan los documentos físicos ya que éstos corren el riesgo de pérdida parcial o total. La solución es la digitalización que juega un papel muy importante en la sociedad y el mundo contemporáneo. Esto debido a que ayuda a la sustentabilidad y a la preservación de los recursos naturales. La seguridad de los archivos es una necesidad que requiere como solución utilizar la tecnología de infraestructura de llave pública (PKI, por sus siglas en inglés) para generar un documento digital, además de registrar las llaves públicas y privadas del personal que tiene el poder legal de firmarlos. Estos documentos se almacenan en un servidor oficial, y se distribuirán entre los hosts registrados de la red. Este certificado ayudará a detectar cambios de forma no autorizada, al compararse el documento con el original. En esta fase de verificación distribuida se utilizará la tecnología de Blockchain. Se propone entonces la construcción de una herramienta que permita generar documentos digitales, además de administrar las llaves públicas, bitácoras de transacciones y registros. El uso de Blockchain permitirá establecer y configurar una red Peer to Peer (P2P) para un intercambio seguro.

This paper presents a simulation model of a PKI which establishes the service of secure electronic mail exchange where users of the PKI use pull method for CRL download. It describes the method of making a simulation model of PKI in... more

This paper presents a simulation model of a PKI which establishes the service of secure
electronic mail exchange where users of the PKI use pull method for CRL download. It
describes the method of making a simulation model of PKI in OPNET IT Guru Academic
Edition virtual network environment, and presents the results of the simulation. The simulation
model of the PKI is methodologically simplified, elements of the PKI are presented
with appropriate models, and their interactions are simulated using the appropriate network
applications and profiles. The analysis of simulation results points to the advantages of using
decentralized servers for distributing the CRL in a PKI

This article provides an overview of current international e-Government practices and the role of the national identity management infrastructure program in the United Arab Emirates (UAE) in supporting e-Government development. It... more

This article provides an overview of current international e-Government practices and the role of the national identity management infrastructure program in the United Arab Emirates (UAE) in supporting e-Government development. It describes the benefits of e-Government that various governments worldwide have identified, sheds light on some recent surveys on the delivery of eGovernment by some countries, highlights some examples and puts the position of the United Arab Emirates into context. It then discusses the program's use of Identity Management in the strategic initiatives, explains their purpose in the facilitation of e-Government within the United Arab Emirates and describes a general roadmap for implementation.

In this paper we are developing an algorithm to increase the security of using HMAC function (Key-Hashed Message Authentication) to insure data integrity for exchanging archival files. Hash function is a very strong tool used in... more

In this paper we are developing an algorithm to increase the security of using HMAC function (Key-Hashed Message Authentication) to insure data integrity for exchanging archival files. Hash function is a very strong tool used in information security. The algorithm we are developing is safe, quick and will allow the University of Tabuk (UT) authorities to be sure that data of archival document will not be changed or modified by unauthorized personnel through transferring in the network; it will also increase the efficiency of network in which archived files are exchanged. The basic issues of hash functions and data integrity will be presented as well. In this research: The developed algorithm is effective and easy to implement using HMAC algorithm to guarantee data integrity for archival scanned documents in the document management system.

In this paper an integrated Certificateless Public Key Infrastructure (CLPKI) that focuses on key management issues is proposed. The proposed scheme provides two-factor private key authentication to protect the private key in case of... more

In this paper an integrated Certificateless Public Key Infrastructure (CLPKI) that focuses on key management issues is proposed. The proposed scheme provides two-factor private key authentication to protect the private key in case of device theft or compromise. The private key in the proposed scheme is not stored in the device, but rather it is calculated every time the user needs it. It depends also on a user’s chosen password and then even if the device is stolen, the attacker cannot get the private key because he/she does not know the user’s secret password. The proposed model provides many other key management features like private key recovery, private key portability and private key archiving.

As communication technologies surged recently, the secrecy of shared information between communication parts has gained tremendous attention. Many Cryptographic techniques have been proposed/implemented to secure multimedia data and to... more

As communication technologies surged recently, the secrecy of shared information between communication parts has gained tremendous attention. Many Cryptographic techniques have been proposed/implemented to secure multimedia data and to allay public fears during communication. This paper expands the scope of audio data security via an enhanced genetic algorithm. Here, each individual (audio sample) is genetically engineered to produce new individuals. The enciphering process of the proposed technology acquires, conditions, and transforms each audio sample into bit strings. Bits fission, switching, mutation, fusion, and deconditioning operations are then applied to yield cipher audio signals. The original audio sample is recovered at the receiver's end through a deciphering process without the loss of any inherent message. The novelty of the proposed technique resides in the integration of fission and fusion into the traditional genetic algorithm operators and the use of a single (rather than two) individual(s) for reproduction. The effectiveness of the proposed cryptosystem is demonstrated through simulations and performance analyses.

The presence of Internet-connected navigation systems is becoming a truth that will easily lead to a significant growth in bandwidth demand by in-vehicle users like mobile user. For example the applications of vehicular communication... more

The presence of Internet-connected navigation systems is becoming a truth that will easily lead to a significant growth in bandwidth demand by in-vehicle users like mobile user. For example the applications of vehicular communication proliferate, and range from the updating of road maps to the repossession of nearby points of interest, downloading of touristic information and multimedia files. This content downloading system will induce the vehicular user to use the resource to the same extent as today's mobile customers. By this approach communication-enabled vehicles are paying attention in downloading different contents from Internet-based servers. We summarize the performance limits of such a vehicular multimedia content downloading system by modeling the content downloading process as an effective problem and developing the overall system throughput with density measurement. Results highlight the methods where the Roadside access point deployment based upon the density of vehicles, which mean that they are working at different capabilities irrespective of vehicle density, the vehicle-to-vehicle relaying. KEYWORDS Vehicular ad-hoc Network, Multimedia Content Downloading Process, Max-flow problem, Optimization, Vehicular Density measurement.

In this research work we have proposed a machine to machine model of authentication. This model is applicable where multiple electronic devices are working continuously 24 hours for monitoring and periodically need to have authentication... more

In this research work we have proposed a machine to machine model of authentication. This model is applicable where multiple electronic devices are working continuously 24 hours for monitoring and periodically need to have authentication proving their identity and to remain the member of the network . The proposed work is implemented on health care devices. These devices form the “internet of medical devices “or simply body sensor networks connected with internet backbone. The proposed security measures include implementation of Zero proof Key based authentication scheme to protect the network
from getting compromised. The efficacy of the proposed algorithm shows that the algorithm proposed is better in terms of Hardening measures.

In this paper an integrated Certificateless Public Key Infrastructure (CLPKI) that focuses on key management issues is proposed. The proposed scheme provides two-factor private key authentication to protect the private key in case of... more

In this paper an integrated Certificateless Public Key Infrastructure (CLPKI) that focuses on key management issues is proposed. The proposed scheme provides two-factor private key authentication to protect the private key in case of device theft or compromise. The private key in the proposed scheme is not stored in the device, but rather it is calculated every time the user needs it. It depends also on a user’s chosen password and then even if the device is stolen, the attacker cannot get the private key because he/she does not know the user’s secret password. The proposed model provides many other key management features like private key recovery, private key portability and private key archiving.

In this research work we have proposed a machine to machine model of authentication. This model is applicable where multiple electronic devices are working continuously 24 hours for monitoring and periodically need to have authentication... more

In this research work we have proposed a machine to machine model of authentication. This model is applicable where multiple electronic devices are working continuously 24 hours for monitoring and periodically need to have authentication proving their identity and to remain the member of the network . The proposed work is implemented on health care devices. These devices form the “internet of medical devices “or simply body sensor networks connected with internet backbone. The proposed security measures include implementation of Zero proof Key based authentication scheme to protect the network from getting compromised. The efficacy of the proposed algorithm shows that the algorithm proposed is better in terms of Hardening measures.

Nowadays public key infrastructure authentication mainly rely on certificate authorities and have to be trusted by both domain operators and domain owners. Domain Name System Security Extensions (DNSSEC) using DNS-based Authentication... more

Nowadays public key infrastructure authentication mainly rely on certificate authorities and have to be trusted by both domain operators and domain owners. Domain Name System Security Extensions (DNSSEC) using DNS-based Authentication Name Entities (DANE) DNS records types, offer additional security for authenticating data and integrity to domain name system (DNS). This method allow client via signed statements to specify which CAs are authorized to represent certificate of a domain. Another method is Certificate Authority Authorizations (CAA) developed by Internet Engineering Task Force (IETF) to provide security guarantee against rogue certificate authorities that offer fake certificate for the domain. However, all of these approaches are prone to single point of failure due to their trust attached to infrastructure like Internet Corporation for Assigned Names and Numbers (ICANN). In order to weaken the level of trust to the CAs over certificates, it is necessary to balance the dist ribution rights among the entities and improve the control of certificate issuance for the certificate owners. Recently with the emergence of Blockchain, a public and distributed ledger, several applications appeared taking advantage of this powerful technology. In this paper, we present an AuthLedger a domain authentication scheme based on blockchain technology. The proposed scheme is multi-fold. First, we proposed a domain authentication scheme to reduce the level of trust in CAs. second, we implement our system using Ethereum smart contract. Third, we evaluate security and performance of the proposed system.

Research Proposal This thesis aims at contributing to a field of End-to-End Trust Advancements in Internet communications with focusing on DNSsec. The specific research questions are: 1. Investigation of current advances in DNS and TLS... more

Research Proposal
This thesis aims at contributing to a field of End-to-End Trust Advancements in Internet communications with focusing on DNSsec. The specific research questions are:
1. Investigation of current advances in DNS and TLS cryptography impact to traditional methods of legal interception;
2. Statistical estimation of trends in developing military-grade encryption in daily use of Internet users;
3. Cyber and cryptographic resilience of DNSSEC infrastructure as the Internet “chain of trust” provider.
4. Developing recommendation on legal frameworks improvements for law enforcement and intelligence services by suggesting alternative methods of meta-data and network monitoring
5. Post-quantum cryptography as a safeguard for eTrust and BlockChain

MANET (Mobile Ad-hoc Network) is hot spot for research due to its various advantages and disadvantages. Providing safe communication between mobile nodes, recognization the position of nodes, reducing overhead, handling misbehavior and... more

MANET (Mobile Ad-hoc Network) is hot spot for research due to its various advantages and disadvantages. Providing safe communication between mobile nodes, recognization the position of nodes, reducing overhead, handling misbehavior and location updates are such a difficult issues in ad-hoc network, so providing trust schemes is an important in this network. MANET provides some basic functions like routing, communication, network management and packet forwarding etc over self organized network. Because MANET has not a fixed topology, in which mobile nodes comes and leaves the network within a random period of time. It effects energy, bandwidth and memory computations of network. Providing trust in MANET is such a crucial task because it doesn’t having centralized infrastructure. In this paper, we survey the different trust model schemes of MANET with
their unique features, merits and demerits & findings.

Research unveiled in December of 2008 [15] showed how MD5’s long-known flaws could be actively exploited to attack the real-world Certification Author-ity infrastructure. In this paper, we demonstrate two new classes of collision, which... more

Research unveiled in December of 2008 [15] showed how MD5’s long-known flaws could be actively exploited to attack the real-world Certification Author-ity infrastructure. In this paper, we demonstrate two new classes of collision, which will be somewhat trickier to address than previous attacks against X.509:

The project explores the use of digital documents as a response to the problems presented by physical documents, since they are at risk of partial or total loss.The solution is the digitalization that plays a very important role in... more

The project explores the use of digital documents as a response to the problems presented by physical documents, since they are at risk of partial or total loss.The solution is the digitalization that plays a very important role in society and the contemporary world. This helps sustainability and the preservation of natural resources.The security of the archives is a necessity that requires as solution to use the technology of public key infrastructure (PKI) to generate a digital document, besides registering the public and private keys of the personnel that has the legal power to sign them. These documents are stored on an official server and distributed among the registered hosts of the network. This certificatewill help to detect changes in an unauthorized way, when comparing the document with the original. In this phase of distributed verification, the Blockchain technology will be used.Then the proposal is to build a tool to generate digital documents, in addition to managing p...