Filters








84 Hits in 1.4 sec

Software Emulation of Quantum Resistant Trusted Platform Modules

L. Fiolhais, P. Martins, L. Sousa
2020 Zenodo  
For this reason, this paper analyses the impact of adding three Post-Quantum (PQ) algorithms to a current non- Quantum Resistant TPM through software emulation.  ...  However, should large-scale quantum computing become a reality, the type of cryptographic primitives adopted in the current standard will no longer be secure.  ...  ACKNOWLEDGEMENTS The authors would like to thank Athanasios Giannetsos and Sofianna Menesidou for their insights and for providing the TPM protocol code on Sec.6.  ... 
doi:10.5281/zenodo.3979199 fatcat:6q3os6fqh5blfhvazsxctvmtgu

Quick Boot of Trusted Execution Environment with Hardware Accelerators

Trong-Thuc Hoang, Ckristian Duran, Duc-Thinh Nguyen-Hoang, Duc-Hung Le, Akira Tsukamoto, Kuniyasu Suzaki, Cong-Kha Pham
2020 IEEE Access  
The procedure uses different algorithms such as hashes and signatures, to authenticate the application to secure.  ...  Comparing to the software approach, a 2.5-decade increment is observed in the throughput of the signature procedure using the SHA-3 acceleration for big chunks of data.  ...  The result of the hash is pushed to the Ed25519 base point multiplier for generating the public and secret pair of keys.  ... 
doi:10.1109/access.2020.2987617 fatcat:suwt3w22j5dfbifiau7fs5bdfy

G-Merkle: A Hash-Based Group Signature Scheme from Standard Assumptions [chapter]

Rachid El Bansarkhani, Rafael Misoczki
2018 Lecture Notes in Computer Science  
Hash-based signature schemes are the most promising cryptosystem candidates in a post-quantum world, but offer little structure to enable more sophisticated constructions such as group signatures.  ...  Moreover, for N group members issuing at most B signatures each, the size of a hash-based group signature is just as large as a Merkle signature with a tree composed by N · B leaf nodes.  ...  Acknowledgements We thank Andreas Hülsing for engaging in helpful discussions and the anonymous reviewers for providing detailed comments.  ... 
doi:10.1007/978-3-319-79063-3_21 fatcat:4mpqtc4nove3vaqeej2b7ubhpe

Survey on cyberspace security

HuanGuo Zhang, WenBao Han, XueJia Lai, DongDai Lin, JianFeng Ma, JianHua Li
2015 Science China Information Sciences  
Cyberspace is the collection of all information systems; it is the information environment for human survival. Therefore, it is necessary to ensure the security of cyberspace.  ...  Along with the rapid development and wide application of information technology, human society has entered the information era. In this era, people live and work in cyberspace.  ...  We would like to thank the following for their help in writing this article: FU JianMin, ZHANG LiQiang, YUAN Wei, XI Ning, LU Di, WU Jun.  ... 
doi:10.1007/s11432-015-5433-4 fatcat:b2tv6gvovngxhlz7iukug2ehiy

A Review on Software-Based and Hardware-Based Authentication Mechanisms for the Internet of Drones

Emmanouel T. Michailidis, Demosthenes Vouyioukas
2022 Drones  
Additionally, this paper provides a review of effective hardware-based solutions for the identification and authentication of network nodes within the IoD that are based on Trusted Platform Modules (TPMs  ...  Recently, the development of authentication mechanisms for the IoD has received unprecedented attention.  ...  Hash-Based Authentication Simple hash cryptographic functions were used in [30] to minimize the computation cost, and a resilient authentication protocol for IoD was proposed based on the Hash-based  ... 
doi:10.3390/drones6020041 fatcat:ye34o3pjjjhovbe7ob3ch4mswa

The Role of Non-Positional Arithmetic on Efficient Emerging Cryptographic Algorithms

Paulo Martins, Leonel Sousa
2020 IEEE Access  
Examples of the methods and algorithms herein surveyed include subquadratic modular multiplication for isogeny-based cryptography, the acceleration of Goldreich-Goldwasser-Halevi (GGH) decryption by an  ...  The main goal of this survey is to introduce the reader to key aspects of non-traditional number representations that may be exploited for public-key cryptography, without delving too much into the details  ...  cryptosystems, potentiating the diversification of security assumptions in a post-quantum world.  ... 
doi:10.1109/access.2020.2983020 fatcat:52mmprnnz5gv5et3ps2v6a6vyy

Towards security recommendations for public-key infrastructures for production environments in the post-quantum era

Sergey E. Yunakovsky, Maxim Kot, Nikolay Pozhar, Denis Nabokov, Mikhail Kudinov, Anton Guglya, Evgeniy O. Kiktenko, Ekaterina Kolycheva, Alexander Borisov, Aleksey K. Fedorov
2021 EPJ Quantum Technology  
In this paper, we discuss the impact of the quantum threat on public key infrastructures (PKIs), which are used as a part of security systems for protecting production environments.  ...  Although our primary focus is on the attacks with quantum computing, we also discuss some security issues that are not directly related to the used cryptographic algorithms but are essential for the overall  ...  Acknowledgements We thank Bosch for providing the PKI scheme. Funding This work is supported by Bosch. Abbreviations  ... 
doi:10.1140/epjqt/s40507-021-00104-z fatcat:vgnotzouqbgsze3frbd72x3ibm

Towards security recommendations for public-key infrastructures for production environments in the post-quantum era [article]

S.E. Yunakovsky, M. Kot, N.O. Pozhar, D. Nabokov, M.A. Kudinov, A. Guglya, E.O. Kiktenko, E. Kolycheva, A. Borisov, A.K. Fedorov
2021 arXiv   pre-print
In this paper, we discuss the impact of the quantum threat on public key infrastructures (PKIs), which are used as a part of security systems for protecting production environments.  ...  Although our primary focus is on the attacks with quantum computing, we also discuss some security issues that are not directly related to the used cryptographic algorithms but are essential for the overall  ...  Acknowledgements We thank Bosch for providing the PKI scheme.  ... 
arXiv:2105.01324v1 fatcat:arjw4voxbnh4tcah74bvwkshhm

Powerful authentication regime applicable to naval OFP integrated development (PARANOID): a vision for non-circumventable code signing and traceability for embedded avionics software

Joe Garcia, Russell Shannon, Aaron Jacobson, William Mosca, Michael Burger, Roberto Maldonado
2021 Journal of Defense Analytics and Logistics  
Practical implications A blockchain-based authentication approach that could be implemented at the OFP point-of-load would provide for fine-grain authentication of all OFP software components, with each  ...  For one thing, a build system does not necessarily enforce procedures in a way that is determinable from the output. Furthermore, the SSA toolchain itself could be attacked.  ...  For full post-quantum capability, for PARANOID and other blockchain-based applications, the legacy PKI signature portion of some blockchain protocols would have to be replaced by post-quantum cryptography  ... 
doi:10.1108/jdal-03-2020-0006 fatcat:664pjftsvjgqjba6d3g4fhtrva

Quo Vadis Qubit?

Dimitrios Schinianakis, Enrique Martin-Lopez
2018 Bell Labs technical journal  
Considerable research effort supported by enormous corporate and government funding is currently underway for the development of practical quantum computing systems.  ...  The existence of a quantum computer would mark a cornerstone in mankind's technological evolution.  ...  An IETF internet-draft for hash-based signatures is already available (McGrew and Curcio 2014) Scheme 1 Algorithm Encryption Signatures Keys (bytes) Remarks Lattice-based NTRUEncrypt, NTRUSign  ... 
doi:10.15325/bltj.2018.2860381 fatcat:d7v4c3oawrdezdhu4s2lznuaru

IMPOVING LEARNING OUTCOMES OF TEXTBOOK CONTENT WITH A SUPPLEMENTARY LEARNING MODULE: A CASE FOR BASIC CRYPTOLOGY

2015 Issues in Information Systems  
The paper introduces a learning module for basic cryptology following the pedagogical recommendations for information systems security training [8] , the meta-, intuition-and critical-thinking levels of  ...  Data show that with the addition of the learning module students have better learning outcomes of both the relevant textbook content and the overall course.  ...  Based on the current computation power, the requirement for key length may change.  ... 
doi:10.48009/3_iis_2015_172-182 fatcat:sgbhylarlbaond5ioyneuf7lcy

On the security of stepwise triangular systems

Christopher Wolf, An Braeken, Bart Preneel
2006 Designs, Codes and Cryptography  
The first attack is an inversion attack which computes the message/signature for given ciphertext/message in O(mn 3 Lq r + n 2 Lrq r ), the second is a structural attack which recovers an equivalent version  ...  As the legitimate user also has a workload growing with q r to recover a message/compute a signature, q r has to be small for efficient schemes and the attacks presented in this article are therefore efficient  ...  Acknowledgements We want to thank Taizo Shirai (Sony, Japan) for his help in connection with the challenge and Ludovic Perret (ENSTA, France) for pointing out the use of tensors for the case d > 2, cf  ... 
doi:10.1007/s10623-006-0015-5 fatcat:bzxm26j5qnftdpmndmwpaapmxy

Web-Cloud-based Security Services Based-on Elliptic Curves Cryptosystem

Victor OnomzaWaziri, Hakimi Danladi, John K. Alhassan, Faiza Babakano Jada
2015 International Journal of Computer Applications  
Finally, with the hype in mobile Cloud Computing, the paper discusses the security implementations how ECC is applied on Digital Signature Keywords  ...  This paper dwells theoretically on the application of Elliptic Curves Cryptography (ECC) for the web and Cloud and Cloud Computing environments.  ...  Another security model is the Trusted Platform module (TPM) suggested to be used for security on the cloud by [14] .  ... 
doi:10.5120/20290-2146 fatcat:wp7g5gxt25fkll5wzcrax7c3qu

Critical perspectives on provable security: Fifteen years of "another look" papers

Neal Koblitz, Alfred Menezes
2019 Advances in Mathematics of Communications  
We give an overview of our critiques of "proofs" of security and a guide to our papers on the subject that have appeared over the past decade and a half.  ...  for editorial corrections and comments.  ...  Acknowledgments We wish to thank Ian Blake, Sanjit Chatterjee, Sam Jaques, Paul van Oorschot, Francisco Rodríguez Henríquez, and Palash Sarkar for helpful comments on an earlier draft; and Ann Hibner Koblitz  ... 
doi:10.3934/amc.2019034 fatcat:gpftyd4hxjebfpzdqwdes345na

Entropy as a Service: Unlocking Cryptography's Full Potential

Apostol Vassilev, Robert Staples
2016 Computer  
Attacks abusing weak keys or old inputs portend challenges for the Internet.  ...  Securing the Internet requires strong cryptography, which depends on the availability of good entropy for generating unpredictable keys and accurate clocks.  ...  Usually they are based on nondeterministic physical processes such as ring oscillators or some kind of quantum behavior.  ... 
doi:10.1109/mc.2016.275 pmid:28003687 pmcid:PMC5165697 fatcat:kgsr65ras5c5hffpd2khrc3t3q
« Previous Showing results 1 — 15 out of 84 results