Filters








51 Hits in 7.7 sec

X.509-Compliant Hybrid Certificates for the Post-Quantum Transition

Nina Bindel, Johannes Braun, Luca Gladiator, Tobias Stöckert, Johannes Wirth
2019 Journal of Open Source Software  
This enables a stepwise transition to post-quantum secure and hybrid algorithms without the risk of incompatibility problems.  ...  We provide an X.509-standard-compliant Java implementation of hybrid certificates, which enable the parallel usage of two independent cryptographic schemes within public key infrastructures and related  ...  Acknowledgments This work has been co-funded by the DFG as part of project P1 within the CRC 1119 CROSS-ING.  ... 
doi:10.21105/joss.01606 fatcat:zbxrm345szfzrggdwj5gckk7ge

Transitioning to a Quantum-Resistant Public Key Infrastructure [chapter]

Nina Bindel, Udyani Herath, Matthew McKague, Douglas Stebila
2017 Lecture Notes in Computer Science  
We then turn to three real-world standards involving digital signatures and PKI: certificates (X.509), secure channels (TLS), and email (S/MIME).  ...  In addition to creating post-quantum primitives, we must also plan how to adapt the cryptographic infrastructure for the transition, especially in scenarios such as public key infrastructures (PKIs) with  ...  To construct a standards-compliant hybrid signature in S/MIME, one could put the certificate for each algorithm in the SignedData object's set of certificates (with no need for hybrid certificates from  ... 
doi:10.1007/978-3-319-59879-6_22 fatcat:ymxug5gmyzhw5fsgeehpx2no3u

Transitioning to a Hyperledger Fabric Quantum-Resistant Classical Hybrid Public Key Infrastructure

Robert Campbell
2019 The Journal of British Blockchain Association  
Hyperledger Fabric (HLF) is a permissioned, blockchain designed by IBM and uses Public Key Infrastructure (PKI), for digital signatures, and digital identities (X.509 certificates), which are critical  ...  This work also proposes that qTESLA's public keys be used to create a quantum-resistant-classical hybrid PKI near-term replacement.  ...  Its digital certificate is compliant with the X.509 standard and holds the attributes relating to the holder of the certificate.  ... 
doi:10.31585/jbba-2-2-(4)2019 fatcat:mmzq3d42bzbwhd5fw3dky5aciu

Towards security recommendations for public-key infrastructures for production environments in the post-quantum era

Sergey E. Yunakovsky, Maxim Kot, Nikolay Pozhar, Denis Nabokov, Mikhail Kudinov, Anton Guglya, Evgeniy O. Kiktenko, Ekaterina Kolycheva, Alexander Borisov, Aleksey K. Fedorov
2021 EPJ Quantum Technology  
We analyze security issues of existing models with a focus on requirements for a fast transition to post-quantum solutions.  ...  In this paper, we discuss the impact of the quantum threat on public key infrastructures (PKIs), which are used as a part of security systems for protecting production environments.  ...  Acknowledgements We thank Bosch for providing the PKI scheme. Funding This work is supported by Bosch. Abbreviations  ... 
doi:10.1140/epjqt/s40507-021-00104-z fatcat:vgnotzouqbgsze3frbd72x3ibm

Towards security recommendations for public-key infrastructures for production environments in the post-quantum era [article]

S.E. Yunakovsky, M. Kot, N.O. Pozhar, D. Nabokov, M.A. Kudinov, A. Guglya, E.O. Kiktenko, E. Kolycheva, A. Borisov, A.K. Fedorov
2021 arXiv   pre-print
We analyze security issues of existing models with a focus on requirements for a fast transition to post-quantum solutions.  ...  In this paper, we discuss the impact of the quantum threat on public key infrastructures (PKIs), which are used as a part of security systems for protecting production environments.  ...  Acknowledgements We thank Bosch for providing the PKI scheme.  ... 
arXiv:2105.01324v1 fatcat:arjw4voxbnh4tcah74bvwkshhm

A survey of Key bootstrapping protocols based on Public Key Cryptography in the Internet of Things

Manisha Malik, Maitreyee Dutta, Jorge Granjal
2019 IEEE Access  
One of the major aspects among these is how keys are bootstrapped in devices, for the purpose of supporting secure communications.  ...  We also identify and discuss the main challenges of implementing such methods in the context of IoT applications and devices, together with the main avenues for conducting further research in the area.  ...  One such scheme to compress X.509 certificates has been proposed by McGrew and Pritikin [89] , and in this work the authors defined a compact format for X.509 certificates, together with methods to translate  ... 
doi:10.1109/access.2019.2900957 fatcat:fbpg4ydg55bg5okyljo67hycqq

Flexible composition and execution of large scale applications on distributed e-infrastructures

Stefan J. Zasada, David C.W. Chang, Ali N. Haidar, Peter V. Coveney
2014 Journal of Computational Science  
We describe the performance and usability enhancements present in AHE version 3, and show how these have led to a high performance, easy to use gateway for computational scientists working in diverse application  ...  The use of diverse e-infrastructure brings with it the ability to perform distributed multiscale simulations.  ...  Previously they were funded by the EPSRC projects RealityGrid (GR/R67699), Rapid Prototyping of Usable Grid Middleware (GR/T27488/01), User-Friendly Authentication and Authorization for Grid Environments  ... 
doi:10.1016/j.jocs.2013.10.009 fatcat:jm4vnikyyjdgvpmyka5yecofgq

Full Text PDF of The JBBA, Volume 2 Issue 2, October 2019

Naseem Naqvi
2019 The Journal of British Blockchain Association  
Its digital certificate is compliant with the X.509 standard and holds the attributes relating to the holder of the certificate.  ...  HLF uses a list of self-signed (X.509) certificates to constitute the root of trust and a list of self-signed (X.509) certificates to form the root of trust.  ...  The paper will then be sent for review. Post review, there are 3 possible outcomes: • Accepted (will be allocated for publication) • Rejected • Revise and submit 4.  ... 
doi:10.31585/jbba-2-2-(full)2019 fatcat:lsnv4wnuhvhpne33puatdc4p4e

MRS 1998 Spring Meeting Encompasses Broad Spectrum of Materials Research

1998 MRS bulletin  
the twist boundary underneath makes the thin layer atomically springlike or compliant for overgrowth.  ...  where the twist boundary underneath makes the thin layer atomically springlike or compliant for overgrowth.  ...  .* Ge*, on growth and band structure of Sii_ x _y Ge^Cy and Sii_yC y , and on growth of Ge quantum dot structures were also emphasized.  ... 
doi:10.1557/s0883769400029134 fatcat:vod5ffr7bfbvdom3zn2bkase2m

Cyber security in New Space

M. Manulis, C. P. Bridges, R. Harrison, V. Sekar, A. Davis
2020 International Journal of Information Security  
Developments in technologies, attitudes and investment are transforming the space environment, achieving greater accessibility for an increasing number of parties.  ...  New and proposed constellations will increase the in-orbit satellite population by the order of thousands, expanding the threat landscape of the space industry.  ...  [117] lists the transport layer security protocol and X.509 certificates [120] as a way to implement encryption and authentication controls, though the verification of certification chains renders  ... 
doi:10.1007/s10207-020-00503-w fatcat:hmm5ixpknnhpta6zagiepkskoy

Software-Defined Networking: A Comprehensive Survey [article]

Diego Kreutz and Fernando M. V. Ramos and Paulo Verissimo and Christian Esteve Rothenberg and Siamak Azodolmolky and Steve Uhlig
2014 arXiv   pre-print
for carrier transport networks and cloud providers.  ...  We start by introducing the motivation for SDN, explain its main concepts and how it differs from traditional networking, its roots, and the standardization activities regarding this novel paradigm.  ...  Jennifer Rexford for her feedback on an early version of this work and encouragement to get it finished. Srini Seetharaman for reviewing the draft and providing inputs to alternative SDN views.  ... 
arXiv:1406.0440v3 fatcat:usdyjgdys5h3foowmq6qvih3e4

Software-Defined Networking: A Comprehensive Survey

Diego Kreutz, Fernando M. V. Ramos, Paulo Esteves Verissimo, Christian Esteve Rothenberg, Siamak Azodolmolky, Steve Uhlig
2015 Proceedings of the IEEE  
We start by introducing the motivation for SDN, explain its main concepts and how it differs from traditional networking, its roots, and the standardization activities regarding this novel paradigm.  ...  In particular, we address the design of switches and control platforms -with a focus on aspects such as resiliency, scalability, performance, security and dependability -as well as new opportunities for  ...  Jennifer Rexford for her feedback on an early version of this work and encouragement to get it finished. Srini Seetharaman for reviewing the draft and providing inputs to alternative SDN views.  ... 
doi:10.1109/jproc.2014.2371999 fatcat:azqmynutpfgl7lovrg7qxdnl2u

Current Industry 4.0 Platforms – An Overview

Sauer Christian, Eichelberger Holger, Ahmadian Amir Shayan, Dewes Andreas, Jürjens Jan
2021 Zenodo  
Based on the cross-platform analysis of the 16 topic areas, we derive challenges for future platforms and especially for our work in IIP-Ecosphere.  ...  The document describes the approach to data collection, the detailed results for individual industrial platforms, and a summarizing overview.  ...  • Secure data storage and software (encryption, authorization) • Identity management and access control • Device authentication using X.509 CA certificatesX.509 security standard in the IoT Hub  ... 
doi:10.5281/zenodo.4485756 fatcat:f4m2swkalnh3biy5vjypsix32y

D2.1 5G Security: Current Status and Future Trends

Grant Millar, Anastasios Kafchitsas, Orestis Mavrooulos, Anastasios Kourtis, George Xilouris, Maria Christopoulou, Stavros Kolometsos, Edgardo Montes De Oca, Huu Nghia Nguyen, Antonio Pastor, Sonia Fernandez, Diego Lopez (+18 others)
2020 Zenodo  
This deliverable aims to provide a basis for the identification of use cases and the development of 5G security enablers in INSPIRE-5Gplus.  ...  cases, and the elicitation of security requirements from relevant stakeholders in 5G; the current status of 5G networks, the solutions state for securing 5G systems, the standardization effort in the  ...  domain, such as the Y.3172 for Machine Learning, the X.509 standards for certificates in cybersecurity, and the video compression standard H.264/MPEG-4 AVC.  The ITU-T Focus Group on Machine Learning  ... 
doi:10.5281/zenodo.4569519 fatcat:7aersbhzyrccrn563shazvj4dq

Polarization and Index Modulations: a Theoretical and Practical Perspective [article]

Pol Henarejos
2018 arXiv   pre-print
In this context, this thesis advocates for the use of polarization as a dimension to be exploited in radiocommunications.  ...  Current communication trends advocate for simplifying and unifying different frameworks in order to increase flexibility and address future needs.  ...  The second challenge is to implement the proposed algorithm in an existent standard-compliant system.  ... 
arXiv:1803.07297v1 fatcat:ly4yswxmtzfdtixjpxrf522aqe
« Previous Showing results 1 — 15 out of 51 results