2022 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA)最新文献

筛选
英文 中文
A hybrid hyperchaotic based dynamic keystream generator using perturbance process for public key infrastructure application 一种基于混合超混沌的基于扰动过程的公钥基础设施动态密钥流发生器
A. Sivapriya, D. K. Barman, K. Pandian
{"title":"A hybrid hyperchaotic based dynamic keystream generator using perturbance process for public key infrastructure application","authors":"A. Sivapriya, D. K. Barman, K. Pandian","doi":"10.1109/PKIA56009.2022.9952210","DOIUrl":"https://doi.org/10.1109/PKIA56009.2022.9952210","url":null,"abstract":"A need for secured communication under hostile condition mandated to incorporate the cryptographic methods in the PKI system. Chaos is another promising paradigm which offshoots from nonlinear dynamics where its randomness has no stochastic origin. Hence a deterministic Pseudo Random Number Generator (PRNG) plays a vital role in chaotic-cryptography. Though many PRNG based chaotic systems are proposed, the low- key space chaotic systems and the finite precision of processor deteriorates the periodic function. The paper intent to achieve larger Lyapunov exponent by the proposed system in the post quantum ecosystem. The proposed system provides an improved key spacing and randomness with a novel approach of perturbing the sequence obtained from the hyperchaotic system with Non-Linear Feedback based Self-Shrinking Generators (NLFSR-SSG). As a result, an improved Lyapunov exponents (2.94, 0.1, 0, −15.341) are obtained and also a dynamic key stream using the proposed hyperchaotic system is generated with high resistance towards cryptanalytic attacks in the post quantum enabled PKI ecosystem.","PeriodicalId":333935,"journal":{"name":"2022 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA)","volume":"165 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127535015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Public Key Cryptographic Implementation Validation: A Review 公钥加密实现验证:综述
P. Mohan, Abey Jacob, R. Patil
{"title":"Public Key Cryptographic Implementation Validation: A Review","authors":"P. Mohan, Abey Jacob, R. Patil","doi":"10.1109/PKIA56009.2022.9952350","DOIUrl":"https://doi.org/10.1109/PKIA56009.2022.9952350","url":null,"abstract":"This paper reviews the Validation procedures of Implementation in hardware, software, and firmware of Public Key Cryptographic algorithms. NIST standardized several algorithms for the present era a few years ago. Detailed test procedures for algorithm validation and Crypto module validation of implementations have been developed. In the Post-Quantum cryptography scenario, algorithm selection will take place in the coming few months, for which validation procedures need to be established by NIST. These algorithms are for KEM (Key Encapsulation Module) and Digital signatures. The symmetric encryption algorithms continue to be the same as before, using AES with a key length of 256 bits. This paper reviews the scope of validation for traditional Public key algorithms for illustration in this paper. Next, we look at a typical Post Quantum KEM and Digital signature algorithm and discuss the validation procedures to be followed.","PeriodicalId":333935,"journal":{"name":"2022 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133213192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved PKI Certificate Lifecycle Management With Centralized Device Management For Industrial IoT 改进PKI证书生命周期管理与集中设备管理工业物联网
A. Krishnan, S. Rajendran, T. K. S. Kumar
{"title":"Improved PKI Certificate Lifecycle Management With Centralized Device Management For Industrial IoT","authors":"A. Krishnan, S. Rajendran, T. K. S. Kumar","doi":"10.1109/PKIA56009.2022.9952216","DOIUrl":"https://doi.org/10.1109/PKIA56009.2022.9952216","url":null,"abstract":"The present industrial scenario requires frequent transfer of data between remote servers and on premise devices and hence the risk of attacks on these data cannot be overlooked. Such security risk is even aggravated in case of sensitive information being compromised due to inefficient security implementations. Various forms of security implementations are being discussed and experimented for the same. With the introduction of devices with better processing capabilities, Public Key Infrastructure is a very popular technique being widely implemented, wherein symmetric and asymmetric key based encryptions are used inorder to secure the data being transferred and it has proven to be an effective technique. The PKI however suffers certain drawbacks and it is evident from the attacks. A system specifically designed for scenarios such as a factory having a centralised device management system requiring multiple devices to communicate and upload data safely to server is being put forward in this paper.","PeriodicalId":333935,"journal":{"name":"2022 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125103692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evolving Role of PKI in Facilitating Trust PKI在促进信任方面不断发展的角色
Vishwas T. Patil, R. Shyamasundar
{"title":"Evolving Role of PKI in Facilitating Trust","authors":"Vishwas T. Patil, R. Shyamasundar","doi":"10.1109/PKIA56009.2022.9952249","DOIUrl":"https://doi.org/10.1109/PKIA56009.2022.9952249","url":null,"abstract":"A digital certificate is by far the most widely used artifact to establish secure electronic communication over the Internet. It certifies to its user that the public key encapsulated in it is associated with the subject of the certificate. A Public Key Infrastructure (PKI) is responsible to create, store, distribute, and revoke digital certificates. To establish a secure communication channel two unfamiliar entities rely on a common certificate issuer (a part of PKI) that vouches for both entities' certificates - thus authenticating each other via public keys listed in each other's certificates. Therefore, PKIs act as a trusted third party for two previously unfamiliar entities. Certificates are static data structures, their revocation status must be checked before usage; this step inadvertently involves a PKI for every secure channel establishment - leading to privacy violations of relying parties. As PKIs act as trust anchors for their subjects, any inadvertent event or malfeasance in PKI setup breaches the trust relationship leading to identity theft. Alternative PKI trust models, like PGP and SPKI, have been proposed but with limited deployment. With several retrofitting amendments to the prevalent X.509 standard, the standard has been serving its core objective of entity authentication but with modern requirements of contextual authentication, it is falling short to accommodate the evolving requirements. With the advent of blockchain as a trust management protocol, the time has come to rethink flexible alternatives to PKI core functionality; keeping in mind the modern-day requirements of contextual authentication-cum-authorization, weighted trust anchors, privacy-preservation, usability, and cost-efficient key management. In this paper, we assess this technology's complementary role in modern-day evolving security requirements. We discuss the feasibility of re-engineering PKIs with the help of blockchains, and identity networks.","PeriodicalId":333935,"journal":{"name":"2022 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133990317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A JSON Web Signature Based Adaptive Authentication Modality for Healthcare Applications 用于医疗保健应用的基于JSON Web签名的自适应身份验证模式
Vivin Krishnan, C. Sreeja, S. Binu, M. Misbahuddin
{"title":"A JSON Web Signature Based Adaptive Authentication Modality for Healthcare Applications","authors":"Vivin Krishnan, C. Sreeja, S. Binu, M. Misbahuddin","doi":"10.1109/PKIA56009.2022.9952258","DOIUrl":"https://doi.org/10.1109/PKIA56009.2022.9952258","url":null,"abstract":"In the era of fast internet-centric systems, the importance of security cannot be stressed more. However, stringent and multiple layers of security measures tend to be a hindrance to usability. This even prompts users to bypass multi-factor authentication schemes recommended by enterprises. The need to balance security and usability gave rise to Adaptive authentication. This system of utilizing the user's behavioral context and earlier access patterns is gaining popularity. Continuously analyzing the user's request patterns and attributes against an established contextual profile helps maintain security while challenging the user only when required. This paper proposes an Open standards based authentication modality that can seamlessly integrate with an Adaptive Authentication system. The proposed authentication modality uses JavaScript Object Notation(JSON), JSON Web Signature(JWS) and supports a means of verifying the authenticity of the requesting client. The proposed authentication modality has been formally verified using Scyther and all the claims have been validated.","PeriodicalId":333935,"journal":{"name":"2022 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132136404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Automated PKI Trust Transfer for IoT 面向物联网的PKI信任自动传输
Joel Höglund, S. Raza, Martin Furuhed
{"title":"Towards Automated PKI Trust Transfer for IoT","authors":"Joel Höglund, S. Raza, Martin Furuhed","doi":"10.1109/PKIA56009.2022.9952223","DOIUrl":"https://doi.org/10.1109/PKIA56009.2022.9952223","url":null,"abstract":"IoT deployments grow in numbers and size and questions of long time support and maintainability become increasingly important. To prevent vendor lock-in, standard compliant capabilities to transfer control of IoT devices between service providers must be offered. We propose a lightweight protocol for transfer of control, and we show that the overhead for the involved IoT devices is small and the overall required manual overhead is minimal. We analyse the fulfilment of the security requirements to verify that the stipulated requirements are satisfied.","PeriodicalId":333935,"journal":{"name":"2022 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126347635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信