scholarly journals Analyzing and Comparing the Performance of National Biometric eID Card in Heavy Cryptographic Applications

2018 ◽  
Vol 1 (4) ◽  
pp. 37
Author(s):  
Gazmend Krasniqi ◽  
Petrit Rama ◽  
Blerim Rexha

Today, we are witnessing increased demand for more speed and capacity in the Internet, and more processing power and storage in every end user device. Demand for greater performance is present in every system. Electronic devices and their hosted applications need to be fast, but not to lose their main security features. Authentication and encryption are the main processes in the security aspect, and are required for a secure communication. These processes can be executed in different devices, among them PCs, microprocessors, microcontrollers, biometric cards or mobile devices. Biometric identity cards are becoming increasingly popular, challenging traditional PC devices. This paper compares two processing systems, the efficiency of encryption and signatures on the data executed in national identity biometric card versus PC, known also as the match-on-card versus the match-off-card. It considers how different parameters impact the process and the role they play on the overall process. The results, executed with a predefined set of test vectors, determine which processing system to use in a certain situation. Final conclusions and recommendations are given taking into consideration the efficiency and security of the data.

2019 ◽  
Vol 8 (1) ◽  
pp. 77-86
Author(s):  
Gazmend Krasniqi ◽  
Kristaq Filipi

Abstract Recently, not only the Internet and mobile devices are changing our daily life but also the usage of national biometric card for every government electronic services. Beside citizen authentication these electronic services require users to encrypt and digitally sign their data or documents. Therefore, biometric cards are used as processing devices for cryptographic applications, whereby there are a lot of security aspects required for secure communication, authentication and encryption among them. Those aspects will be tested in different environments, platforms, devices, PCs, mobile devices and smartcards. This paper compares those two processing systems, Match off Card vs. Match on Card, and their efficiency of encryption and signatures on the data used. How different parameters, time and size of test vectors impacts the process and the role they play on the overall system. The derived results will serve us as a guide for using one processing system in certain environment, minding the efficiency of the data.


Author(s):  
Claudio Estevez

Cloud computing is consistently proving to be the dominant architecture of the future, and mobile technology is the catalyst. By having the processing power and storage remotely accessible, the main focus of the terminal is now related to connectivity and user-interface. The success of cloud-based applications greatly depends on the throughput experienced by the end user, which is why transport protocols play a key role in mobile cloud computing. This chapter discusses the main issues encountered in cloud networks that affect connection-oriented transport protocols. These issues include, but are not limited to, large delay connections, bandwidth variations, power consumption, and high segment loss rates. To reduce these adverse effects, a set of proposed solutions are presented; furthermore, the advantages and disadvantages are discussed. Finally, suggestions are made for future mobile cloud computing transport-layer designs that address different aspects of the network, such as transparency, congestion-intensity estimation, and quality-of-service integration.


Now a days internet and other electronic devices have become an non removable part of our society. Day by day we are increasing the usage of data for transmission and storage as well. But there is always a problem for our data to be in wrong hands or hacked by someone. In order to ensure our secrecy of data we use bunch of algorithms to secure it. These algorithms comes under the vast section of cryptology, which means an art of hiding the data to make it secure. But as we all know when there is a hacker he would find every possible way to bypass the security algorithms. Some of the attacks are very popular in cryptology like Brute Force Attacks which checks each possible key combination to hack the data message. Due to the arrival of quantum computers in upcoming future hacking time will be decreased about a factor of around 1000 times. Now the best possible solution for enciphering data is Advanced Encryption Standard .This algorithm consists of two basic things static Substitution Box (S-Box) and other register operation. In this paper we have introduced a new technique to ensure a secure communication by using a dynamic S-Box with avalanche value of 58.59% as well as we also improved the overall area, delay (1.227 ns) and optimized the power to possible extents. Our results also approached above the traditional AES security as our modification improves avalanche effect also


2013 ◽  
Vol 4 (1) ◽  
pp. 5-7 ◽  
Author(s):  
Dr. Vinod Kumar ◽  
Er. Gagandeep Raheja ◽  
Ms. Jyoti Sodhi

Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility (like the electricity grid) over a network (typically the internet). Cloud computing provides computation, software, data access, and storage services that do not require end-user knowledge of the physical location and configuration of the system that delivers the services. Parallel to this concept can be drawn with the electricity grid, wherein end-users consume power without needing to understand the component devices or infrastructure required to provide the service.


Author(s):  
Vikash ◽  
Lalita Mishra ◽  
Shirshu Varma

Internet of things is one of the most rapidly growing research areas. Nowadays, IoT is applicable in various diverse areas because of its basic feature i.e., anything would be available to anyone at anytime. Further, IoT aims to provide service in a pervasive environment, although different problems crop up when the researchers move towards pervasiveness. Security and Privacy are the most intense problems in the field of IoT. There are various approaches available to handle these issues: Architectural security, Database security, Secure communication, and Middleware approaches. This chapter's authors concentrate on middleware approach from the security and privacy perceptive. Middleware can provide security by separating the end user from the actual complex system. Middleware also hides the actual complexity of the system from the user. So, the user will get the seamless services with no threats to security or privacy. This chapter provides a brief overview of secure middlewares and suggests the current research gaps as future directions.


Author(s):  
Fady Esmat Fathel Samann ◽  
Adnan Mohsin Abdulazeez ◽  
Shavan Askar

<p>Internet of Things (IoT) systems usually produce massive amounts of data, while the number of devices connected to the internet might reach billions by now. Sending all this data over the internet will overhead the cloud and consume bandwidth. Fog computing's (FC) promising technology can solve the issue of computing and networking bottlenecks in large-scale IoT applications. This technology complements the cloud computing by providing processing power and storage to the edge of the network. However, it still suffers from performance and security issues. Thus, machine learning (ML) attracts attention for enabling FC to settle its issues. Lately, there has been a growing trend in utilizing ML to improve FC applications, like resource management, security, lessen latency and power usage. Also, intelligent FC was studied to address issues in industry 4.0, bioinformatics, blockchain and vehicular communication system. Due to the ML vital role in the FC paradigm, this work will shed light on recent studies utilized ML in a FC environment. Background knowledge about ML and FC also presented. This paper categorized the surveyed studies into three groups according to the aim of ML implementation. These studies were thoroughly reviewed and compared using sum-up tables. The results showed that not all studies used the same performance metric except those worked on security issues. In conclusion, the simulations of proposed ML models are not sufficient due to the heterogeneous nature of the FC paradigm.</p>


Author(s):  
Dan J. Bodoh

Abstract The growth of the Internet over the past four years provides the failure analyst with a new media for communicating his results. The new digital media offers significant advantages over analog publication of results. Digital production, distribution and storage of failure analysis results reduces copying costs and paper storage, and enhances the ability to search through old analyses. When published digitally, results reach the customer within minutes of finishing the report. Furthermore, images on the computer screen can be of significantly higher quality than images reproduced on paper. The advantages of the digital medium come at a price, however. Research has shown that employees can become less productive when replacing their analog methodologies with digital methodologies. Today's feature-filled software encourages "futzing," one cause of the productivity reduction. In addition, the quality of the images and ability to search the text can be compromised if the software or the analyst does not understand this digital medium. This paper describes a system that offers complete digital production, distribution and storage of failure analysis reports on the Internet. By design, this system reduces the futzing factor, enhances the ability to search the reports, and optimizes images for display on computer monitors. Because photographic images are so important to failure analysis, some digital image optimization theory is reviewed.


Author(s):  
Keith M. Martin

This chapter considers eight applications of cryptography. These essentially act as case studies relating to all the previous material. For each application, we identify the security requirements, the application constraints, the choice of cryptography used, and the ways that the keys are managed. We begin with the SSL/TLS protocols used to secure Internet communications. We then examine the cryptography used in W-Fi networks, showing that early cryptographic design mistakes have subsequently been corrected. We then examine the evolving cryptography used to secure mobile telecommunications. This is followed by a discussion of the cryptography that underpins the security of payment card transactions. We look at the cryptography of video broadcasting and identity cards. We then examine the cryptography behind the Tor project, which use cryptography to support anonymous communication on the Internet. Finally, we examine the clever cryptographic design of Bitcoin, showing how use of cryptography can facilitate digital currency.


Sensors ◽  
2020 ◽  
Vol 20 (22) ◽  
pp. 6546
Author(s):  
Kazi Masum Sadique ◽  
Rahim Rahmani ◽  
Paul Johannesson

The Internet of things (IoT) will accommodate several billions of devices to the Internet to enhance human society as well as to improve the quality of living. A huge number of sensors, actuators, gateways, servers, and related end-user applications will be connected to the Internet. All these entities require identities to communicate with each other. The communicating devices may have mobility and currently, the only main identity solution is IP based identity management which is not suitable for the authentication and authorization of the heterogeneous IoT devices. Sometimes devices and applications need to communicate in real-time to make decisions within very short times. Most of the recently proposed solutions for identity management are cloud-based. Those cloud-based identity management solutions are not feasible for heterogeneous IoT devices. In this paper, we have proposed an edge-fog based decentralized identity management and authentication solution for IoT devices (IoTD) and edge IoT gateways (EIoTG). We have also presented a secure communication protocol for communication between edge IoT devices and edge IoT gateways. The proposed security protocols are verified using Scyther formal verification tool, which is a popular tool for automated verification of security protocols. The proposed model is specified using the PROMELA language. SPIN model checker is used to confirm the specification of the proposed model. The results show different message flows without any error.


Sign in / Sign up

Export Citation Format

Share Document