Posts

Showing posts from December, 2018

RMAC – A LIGHTWEIGHT AUTHENTICATION PROTOCOL FOR HIGHLY CONSTRAINED IOT DEVICES

Image
RMAC – A LIGHTWEIGHT AUTHENTICATION PROTOCOL FOR HIGHLY CONSTRAINED IOT DEVICES Ahmad Khoureich Ka Department of Computer Science, University of Alioune Diop de Bambey,Senegal ABSTRACT Nowadays, highly constrained IoT devices have earned an important place in our everyday lives. These devices mainly comprise RFID (Radio-Frequency Identification) or WSN (Wireless Sensor Networks) components. Their adoption is growing in areas where data security or privacy or both must be guaranteed. Therefore, it is necessary to develop appropriate security solutions for these systems. Many papers have proposed solutions for encryption or authentication. But it turns out that sometimes the proposal has security flaw or is ill-suited for the constrained IoT devices (which has very limited processing and storage capacities).In this paper, we introduce a new authentication protocol inspired by Mirror-Mac (MM) which is a generic construction of authentication protocol proposed by Mol et ...

The Game of Phishing

Joseph Kilcullen  Moylurg, Foxford Road, Ballina, Co. Mayo, F26 D9D2, Ireland.  ABSTRACT  The current implementation of TLS involves your browser displaying a padlock, and a green bar, after successfully verifying the digital signature on the TLS certificate. Proposed is a solution where your browser's response to successful verification of a TLS certificate is to display a login window. That login window displays the identity credentials from the TLS certificate, to allow the user to authenticate Bob. It also displays a 'user-browser' shared secret i.e. a specific picture from your hard disk. This is not SiteKey, the image is shared between the computer user and their browser. It is never transmitted over the internet. Since sandboxed websites cannot access your hard disk this image cannot be counterfeited by phishing websites. Basically if you view the installed software component of your browser as an actor in the cryptography protocol, then the solution to ...

PEC - An Alternate and More Efficient Public Key Cryptosystem

Rahul Krishnan  Mass Academy of Math and Science 85 Prescott Street, Worcester, MA 99999, USA  ABSTRACT  In an increasingly connected world, security is a top concern for Internet of Things (IoT). These IoT devices have to be inexpensive implying that they will be constrained in storage and computing resources. In order to secure such devices, highly efficient public key cryptosystems (PKC) are critical. Elliptic Curve Cryptography (ECC) is the most commonly implemented PKC in use today. In this paper, an alternate and a more efficient PKC, called the PEC (Pells Equation Cryptography) has been proposed based on Pells equation: x 2 − D ∗ y 2 ≡ 1 (mod p). It is shown that scalar multiplication in PEC is significantly more efficient compared to ECC. It is also shown that the Discrete Logarithm Problem - computing the private key from the public key - in PEC is at least as hard as that of ECC.  KEYWORDS Public Key Cryptography, Elliptic Curve Cryptography,...