16,186 Hits in 2.9 sec

Establishment and Application of Cryptographic Library Model

Tie-Ming Liu, Lie-Hui Jiang, Jing Jing, Yuan-Yuan Zhang
2015 Journal of Computer and Communications  
When doing reverse analysis of program's binary codes, it is often to encounter the function of cryptographic library.  ...  algorithm and protocol, etc.  ...  Introduction The cryptographic algorithms and protocols are often used in many fields, such as protection of network data transmission, software shelling, code obfuscation and electronic commerce [1]  ... 
doi:10.4236/jcc.2015.35003 fatcat:ovnqmdgmwzhx5d7odx5aqjyxui

Automated Identification of Cryptographic Primitives in Binary Programs [chapter]

Felix Gröbert, Carsten Willems, Thorsten Holz
2011 Lecture Notes in Computer Science  
Identifying that a given binary program implements a specific cryptographic algorithm and finding out more information about the cryptographic code is an important problem.  ...  In this paper, we present several methods to identify cryptographic primitives (e.g., entire algorithms or only keys) within a given binary program in an automated way.  ...  We can recognize, even in unrolled code, that the basic blocks of cryptographic code are executed multiple times. Solely for an identification method the presence of loops is insufficient.  ... 
doi:10.1007/978-3-642-23644-0_3 fatcat:kfdvksjtc5dkvo54a5liaihuqi

Processing of Cryptographic Function Identification Based on Multi-feature Progressive Model

Wei Lin, Yuefei Zhu, Ruijie Cai
2015 Journal of Advances in Computer Networks  
Research on cryptographic function identification is of great significance in malicious code analysis, software vulnerability analysis and other fields.  ...  In order to solve this problem, we proposed an improved method of cryptographic function identification based on multi-feature progressive approach to identify cryptographic functions by using data flow  ...  The cryptographic algorithm identification of the application can play a positive role in the analysis of malicious code, network data security transmission areas.  ... 
doi:10.7763/jacn.2015.v3.163 fatcat:qfjxhdtnnffjpf4b3j2pfjloi4

Application Level Smart Card Support through Networked Mobile Devices [chapter]

Pierpaolo Baglietto, Francesco Moggia, Nicola Zingirian, Massimo Maresca
2003 Lecture Notes in Computer Science  
This paper addresses the problem of using networked mobile devices as providers of cryptographic functions.  ...  Conclusions and Future Works We have presented an architecture model based on well-defined standards that allows signing of a document remotely and in a transparent way.  ...  In our application, the PIN takes the meaning of a user identification code.  ... 
doi:10.1007/978-3-540-45184-6_14 fatcat:3ydmttcwb5cahnnxtw7t4uev4e

Verisoft – secure biometric identification system [chapter]

Georg Rock, Gunter Lassmann, Mathias Schwan, Lassaad Cheikhrouhou
2008 Digital Excellence  
Figure 2 shows the steps of the CBI protocol which corresponds to the identification scenario in the CBI system as described in the previous section.  ...  The CBI-System will be implemented in C-Code (later C0 Code) in order to verify its correctness against the formal specification. It's a cooperative work with DFKI and TU-Munich.  ... 
doi:10.1007/978-3-540-72621-0_8 fatcat:wditqcn2d5dwpoldr3lotfta2y

An improved novel key management protocol for RFID systems

Rania Baashirah, Venkata Namburi, Chakradhar Polisetty, Naresh Ravuri, Vinay Kumar Avula, Shakour Abuzneid
2018 2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT)  
In this paper, we present a novel cryptographic scheme, "Hacker Proof Authentication Protocol (HPAP)" which has been improved for "Multiple Tags" authentication at a single time process.  ...  The growing demand to organize resourceful ways of identification has made "Radio Frequency Identification (RFID)" technology universal. One of the key problems in RFID is security and privacy.  ...  HPAP Multi-Tag HPAP Java code simulation is done using Net beans IDE. We tested the protocol for three groups Group-A, Group-B, Group-C with six tags in each group that are stored in .txt files.  ... 
doi:10.1109/lisat.2018.8378023 fatcat:smqzpedfgbbnhjebnjtv47ayuq

Survey on Lightweight Primitives and Protocols for RFID in Wireless Sensor Networks

Manju Lata, Adarsh Kumar
2014 International Journal of Communication Networks and Information Security  
The use of radio frequency identification (RFID) technologies is becoming widespread in all kind of wireless network-based applications.  ...  A large number of research solutions have been proposed to implement lightweight cryptographic primitives and protocols in sensor and RFID integration based resource constraint networks.  ...  Cryptographic protocols include identification, authentication, grouping, distance bounding, ownership transfer etc.  ... 
dblp:journals/ijcnis/LataK14 fatcat:3dpqpm7lnzcbrlhb6uj2nbi7j4

Provably secure identity-based identification and signature schemes from code assumptions

Bo Song, Yiming Zhao, Kim-Kwang Raymond Choo
2017 PLoS ONE  
Meanwhile, identity-based identification and signature (IBI/IBS) schemes are two of the most fundamental cryptographic primitives, so several code-based IBI/IBS schemes have been proposed.  ...  Code-based cryptography is one of few alternatives supposed to be secure in a post-quantum world.  ...  Cryptographic identification protocol [6, 8] is designed to eliminate the security and privacy issues in traditional identification.  ... 
doi:10.1371/journal.pone.0182894 pmid:28809940 pmcid:PMC5557532 fatcat:ql6i4qdl2zc4xbtrawyzwtmzba

Soundness Conditions for Cryptographic Algorithms and Parameters Abstractions in Formal Security Protocol Models

Alfredo Pironti, Riccardo Sisto
2008 2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX  
In particular, encryption is assumed to be perfect and cryptographic algorithms and their parameters are often abstracted away.  ...  This paper states a set of constraints under which, if an abstract protocol model is secure, then a refined model, which takes into account cryptographic algorithms and parameters, is implied to be secure  ...  code of security protocols, both using the code generation approach or the model extraction approach.  ... 
doi:10.1109/depcos-relcomex.2008.34 dblp:conf/depcos/PirontiS08 fatcat:aahtt2do5ffw3fvrseat4geg2i

A Cryptographic Technique for Communication among IoT Devices using Tiger192 and Whirlpool

Bismark Tei Asare, Kester Quist-Aphetsi, Laurent Nana
2021 International Journal of Advanced Computer Science and Applications  
A cryptographic mechanism that is composed of the Tiger192 cryptographic hash and the whirlpool hash function is proposed in authenticating IoT data and validating devices in this paper.  ...  The Authors propose a cryptographic solution that uses double hashing to provide improved security for IoT node data and validating nodes in IoT system.  ...  These protocols include Bluetooth, WiFi, Satellite, Radio Frequency Identification (RFID), Near Field Communication (NFC).  ... 
doi:10.14569/ijacsa.2021.0120853 fatcat:x3fcmocszjc6flh7tynwbeh36y

Security Agility Solution Independent of the Underlaying Protocol Architecture

Valter Vasic, Miljenko Mikuc
2012 International Conference on Agreement Technologies  
This is hard because most cryptographic protocols are hard coded in applications. Applications should implement a way of negotiating cryptographic protocols used.  ...  The agile cryptographic negotiation protocol (ACNP) proposed in this paper represents a layer-agnostic, robust solution that can be deployed for providing cryptographic agility and greatly improve security  ...  A fair number of protocols (SEND [2] , GSM, CDMA) use only one hard coded version of cryptographic protocols that has been specified when the protocol was designed.  ... 
dblp:conf/at/VasicM12 fatcat:3gncxldqivhbjht5k7wqu3sawq

Multicast deflector

Antonio Pinto, Manuel Ricardo
2008 Telecommunications Systems  
In this paper we propose a new solution for supporting the broadcast of multiple video channels which can be accessed only by authorized users; besides, when a video channel is not visualized in the last  ...  the decoded Receiver identification code.  ...  The encrypted field contains a message identification sequential number, the requested channel identification code, and the Receiver identification code The channel request message confirmation (CH-ACK  ... 
doi:10.1007/s11235-008-9108-y fatcat:glk6ivu7enehjcbllk7dy446qa

Privacy and security threat analysis of the federal employee personal identity verification (PIV) program

Paul A. Karger
2006 Proceedings of the second symposium on Usable privacy and security - SOUPS '06  
When the standard is viewed in the abstract, it seems to effectively provide security and privacy, because it uses strong cryptographic algorithms.  ...  It identifies some problems with the standard, and it proposes solutions to those problems, using standardized cryptographic techniques that are based on the Internet Key Exchange (IKE) protocol [16] .  ...  In general, the cryptographic protocols used on PIV cards are stronger than the ICAO protocols.  ... 
doi:10.1145/1143120.1143135 dblp:conf/soups/Karger06 fatcat:xtp3pf6hpbehzmgrruspyi5kgq

Measurement-Device-Independent Two-Party Cryptography with Error Estimation

Zishuai Zhou, Qisheng Guang, Chaohui Gao, Dong Jiang, Lijun Chen
2020 Sensors  
We also utilize our designed protocol to construct two specific two-party cryptographic applications: Quantum bit commitment and quantum password identification.  ...  Our protocol introduces joint measurement and error estimation to improve the security of two-party cryptographic protocols.  ...  The two basic two-party cryptographic protocols mentioned in this paper could easily be extended to other two-party encryption protocols, such as 1-2 OT and quantum identification protocols.  ... 
doi:10.3390/s20216351 pmid:33171748 fatcat:emga5yv7mfcodlfahywqbod6yy

An Experiment in Interoperable Cryptographic Protocol Implementation Using Automatic Code Generation

Alfredo Pironti, Riccardo Sisto
2007 Proceedings of the IEEE Symposium on Computers and Communications  
Spi2Java is a tool that enables semi-automatic generation of cryptographic protocol implementations, starting from verified formal models.  ...  A case study on the SSH Transport Layer Protocol, along with some experiments and measures on the generated code, is also provided.  ...  Automatically generate the Java code that correctly implements the security protocol.  ... 
doi:10.1109/iscc.2007.4381508 dblp:conf/iscc/PirontiS07 fatcat:xhmychrv5vfptas7xu6qomrsxi
« Previous Showing results 1 — 15 out of 16,186 results