Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

  • articleNo Access

    A STRATEGY FOR SECURING APDU TRANSMISSION

    The smart card is being used all over the world, because of its power to store data securely and execute calculations confidentially. This paper proposes an easy way to implement the strategy which can guarantee data integrity and privacy in the transmission path between the terminal application of the smart card and the smart card. This strategy consists of cryptographic functions of message and methods for transmitting APDU and managing secret keys. Some cryptographic functions of message are defined and developed for transmitting APDU confidentially. These cryptographic functions can keep the byte length of input and output messages identical. This strategy for transmitting APDU points out how to call cryptographic functions to encode or decode the data body of APDU, and how to construct a modified APDU message structure according to the original APDU message structure, which will be sent to its intended recipient instead of the original APDU message structure. With the proper secret keys, the authorized party can recover this modified APDU to its corresponding original APDU properly, without any information leakage. The transfer of secret keys to other parties is the most difficult aspect of secure APDU transmission, whereas data encryption/decryption is relatively straightforward. Two distinct strategies for managing secret keys, namely the static and the dynamic are introduced and compared. The dynamic strategy is preferred for a terminal application and smart card which do not need to authenticate each other. The implementation of this dynamic strategy has been detailed.

  • articleNo Access

    Secure Sharing of IOT Data in Cloud Environment Using Attribute-Based Encryption

    Storage of data security has emerged as a basic necessity for both large- and small-scale industries. Cloud computing is internet-based computing technology in which people can work with their application with a high level of security in Internet of Things (IoT) enhanced devices. Cloud computing also provides privilege to store data that are collected from the devices in server side. Confidentiality and integrity of data play a major issue in cloud computing while preserving the IoT data. In this paper, the security of data is achieved by performing clustering and further applying cryptographic technique to the clustered data gathered from the devices that connected to the internet. Security of data can be improved by using a prominent cryptographic technique Attribute Based Encryption (ABE). Initially, the documents are clustered using the EM algorithm and clustered results are stored in various parts of the cloud. These documents are secured and can be accessed by the user who satisfies the attributes. In some cases, if the users’ attributes are not satisfied with the documents, it cannot be accessed by the corresponding user. Thus, the data from various devices are encrypted and maintained by the owner securely.

  • articleNo Access

    A FRAMEWORK FOR A CRYPTOGRAPHIC PROTOCOL EVALUATION WORKBENCH

    Tools to evaluate Cryptographic Protocols (CPs) exploded into the literature after development of BAN Logic.2,3 Many of these were created to repair weaknesses in BAN Logic. Unfortunately, these tools are all complex and difficult to implement individually, with little or no effort available to implement multiple tools in a workbench environment. We propose a framework that allows a protocol analyst to exercise multiple CP evaluation tools in a single environment. Moreover, this environment exhibits characteristics that will enhance the effectiveness of the CP evaluation methods themselves.