Mohammed Mujeer Ulla;Preethi;Md. Sameeruddin Khan;Deepak S. Sakkari
{"title":"Implementation of Elliptic Curve Cryptosystem with Bitcoin Curves on SECP256k1, NIST256p, NIST521p, and LLL","authors":"Mohammed Mujeer Ulla;Preethi;Md. Sameeruddin Khan;Deepak S. Sakkari","doi":"10.13052/jicts2245-800X.1141","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1141","url":null,"abstract":"Very recent attacks like ladder leaks demonstrated the feasibility of recovering private keys with side-channel attacks using just one bit of secret nonce. ECDSA nonce bias can be exploited in many ways. Some attacks on ECDSA involve complicated Fourier analysis and lattice mathematics. This paper will enable cryptographers to identify efficient ways in which ECDSA can be cracked on curves NIST256p, SECP256k1, NIST521p, and weak nonce, kind of attacks that can crack ECDSA and how to protect yourself. Initially, we begin with an ECDSA signature to sign a message using the private key and validate the generated signature using the shared public key. Then we use a nonce or a random value to randomize the generated signature. Every time we sign, a new verifiable random nonce value is created, and a way in which the intruder can discover the private key if the signer leaks any one of the nonce values. Then we use Lenstra-Lenstra-Lovasz (LLL) method as a black box, we will try to attack signatures generated from bad nonce or bad random number generator (RAG) on NIST256p, SECP256k1 curves. The combination of nonce generation, post-message signing, and validation in ECDSA helps achieve Uniqueness, Authentication, Integrity, and Non-Repudiation. The analysis is performed by considering all three curves for the implementation of the Elliptic Curve Digital Signature Algorithm (ECDSA). The comparative analysis for each of the selected curves in terms of computational time is done with the leak of nonce and with the Lenstra-Lenstra-Lovasz method to crack ECDSA. The average computational costs to break ECDSA with curves NIST256p, NIST521p, and SECP256k1 are 0.016, 0.34,0.46 respectively which is almost zero depicting the strength of the algorithm. The average computational costs to break ECDSA with curves SECP256K1 and NIST256p using LLL are 2.9 and 3.4 respectively","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"11 4","pages":"329-353"},"PeriodicalIF":0.0,"publicationDate":"2023-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10326102","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138431209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine Learning Models: A Study of English Essay Text Content Feature Extraction and Automatic Scoring","authors":"Wei Shang;Huihua Men;Xiujie Du","doi":"10.13052/jicts2245-800X.1143","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1143","url":null,"abstract":"Accurate automatic scoring of English essay is beneficial for both teachers and students in English teaching. This paper briefly introduced an XGBoost-based automated scoring algorithm for English essay. To improve the accuracy of the algorithm, a long short-term memory (LSTM) semantic model was introduced to extract semantic scoring features from essays. Finally, the improved XGBoost algorithm was compared with the traditional XGBoost and LSTM algorithms in a simulation experiment using five types of essay prompts. The results indicate that the improved XGBoost algorithm has the best performance for automatic scoring of English essay and also requires the shortest scoring time.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"11 4","pages":"379-390"},"PeriodicalIF":0.0,"publicationDate":"2023-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10326100","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138431044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study on an Intelligent Algorithm for Automatic Test Paper Generation and Scoring in University English Exams","authors":"Han Yang","doi":"10.13052/jicts2245-800X.1144","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1144","url":null,"abstract":"This paper mainly studied the automatic test paper generation and scoring problems in university English exams. Firstly, an automatic test paper generation model was established. Then, an improved genetic algorithm (IGA) was designed for intelligent test paper generation, and it was also used to automatically score answers to Chinese-to-English translation questions in terms of syntax and semantics. It was found that compared with the traditional GA and particle swarm optimization algorithm, the IGA method was faster in generating test papers, with an average generation time of 25 s, and had a higher success rate (94%), suggesting higher validity, and the difficulty and differentiation degrees of the test papers were closer to the preset values. The results of automatic scoring also had a correlation of more than 0.8 with the manual scoring results. The results prove the effectiveness of the automatic test paper generation and scoring method. It can be promoted and applied in practice to enhance the security and fairness of large-scale English exams, as well as achieve objectivity and consistency in scoring.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"11 4","pages":"391-401"},"PeriodicalIF":0.0,"publicationDate":"2023-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10326101","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138431045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Elliptic Curve Cryptography & RSA","authors":"Mohammad Rafeek Khan;Kamal Upreti;Mohammad Imran Alam;Haneef Khan;Shams Tabrez Siddiqui;Mustafizul Haque;Jyoti Parashar","doi":"10.13052/jicts2245-800X.1142","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1142","url":null,"abstract":"In today's digital world, the Internet is an essential component of communication networks. It provides a platform for quickly exchanging information among communicating parties. There is a risk of unauthorized persons gaining access to our sensitive information while it is being transmitted. Cryptography is one of the most effective and efficient strategies for protecting our data and it are utilized all around the world. The efficiency of a cryptography algorithm is determined by a number of parameters, one of which is the length of the key. For cryptography, key (public/private) is an essential part. To provide robust security, RSA takes larger key size. If we use larger key size, the processing performance will be slowed. As a result, processing speed will decrease and memory consumption will increase. Due to this, cryptographic algorithms with smaller key size and higher security are becoming more popular. Out of the cryptographic algorithms, Elliptic Curve Cryptography (ECC) provides equivalent level of safety which RSA provides, but it takes smaller key size. On the basis of key size, our work focused on, studied, and compared the efficacy in terms of security among the well-known public key cryptography algorithms, namely ECC (Elliptic Curve Cryptography) and RSA (Rivets Shamir Adelman).","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"11 4","pages":"355-378"},"PeriodicalIF":0.0,"publicationDate":"2023-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10326103","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138431210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
René Lindner;Madlen Schmudde;Alicia Jiménez González;Jaime Loureiro Acuña;Knut Blind
{"title":"Analyzing the Standardization Landscape for Identity Management in Public Services - A Standards Review for the IMPULSE Project","authors":"René Lindner;Madlen Schmudde;Alicia Jiménez González;Jaime Loureiro Acuña;Knut Blind","doi":"10.13052/jicts2245-800X.1145","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1145","url":null,"abstract":"The digitalization of public services is one of the major challenges that public administrations are currently facing. Electronic identifications play a major role for a variety of these related services. Due to the impact these services will have on the daily life of citizens, organizations, and the public at large, the social dimensions must be considered equally to the technical ones. To ensure the applicability, trust, and compliance of electronic identity for access to public services, it is necessary to take into account relevant standards collected through an analysis of the state-of-the-art. In general, the literature on integrating standardization in research projects is very rare and potential impacts of standards related to electronic identification have not been assessed yet. The European project IMPULSE has integrated standardization as an essential element and assessed the relevant standardization landscape as one activity. The analysis of the standardization landscape resulted in the identification of nine formal and six de-facto standards that have high relevance for IMPULSE. The process for this analysis and the resulting dashboard will support future projects to effectively consider, analyze and use standards for their projects.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"11 4","pages":"403-430"},"PeriodicalIF":0.0,"publicationDate":"2023-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10326104","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138431211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Introducing Privacy Receipts into DLT and eIDAS","authors":"Jan Lindquist","doi":"10.13052/jicts2245-800X.1121","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1121","url":null,"abstract":"The introduction of digital identification (e.g., eIDAS) and wallet standards (e.g., EUDI wallet) require compliance with privacy principles and clear communication of the principles through privacy notice and record of consent in the form of a privacy receipt. Regulation needs standards to help set the bar for reducing the privacy infringement risk. Without a standard-based implementation, solutions will be proprietary and siloed with no concern for interoperability, like privacy labels in Google and Apple app stores. Do existing standards address the gap, or do new ones need to be introduced? This article looks at the standards and regulations in three areas to answer this question: privacy protection standards, blockchain and DLT standards, and digital identification and wallet standards.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"11 2","pages":"117-134"},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255407/10266732.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68097864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Online Impulsive Buying Behavior Using Partial Least Squares Algorithm","authors":"Dam Tri Cuong","doi":"10.13052/jicts2245-800X.1131","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1131","url":null,"abstract":"Impulsive purchasing is one of many fascinating subjects to investigate in e-commerce research. Online buying facilitates purchases and provides impulsive buyers with a venue to meet their demands. Impulse buying occurs when a client feels a sudden, overpowering need to make a purchase, which is a common practice among online shoppers. Therefore, the study's purpose is to apply the partial least square (PLS) algorithm to investigate the factors driving online impulsive buying behavior (OIBB). Besides, in this research, the stimulus organism response (SOR) model was used as the research's guiding theory; with the stimulus such as visual appeal and price attributes, the organism comprising perceived enjoyment and perceived usefulness, and response as OIBB. In addition, a non-probability sampling method was employed to collect data from 313 customers who shared their online impulsive purchase experiences through a Google Forms online survey. The collected data was analyzed using the PLS technique to assess the reliability, convergent validity, and discriminant validity of the variables, as well as test the proposed hypotheses. The findings reveal that visual appeal and price attributes were positive connections to perceived enjoyment and perceived usefulness. Likewise, perceived enjoyment and perceived usefulness also impacted positively OIBB. Additionally, the findings disclosed that visual appeal and price attributes also were associated positively with OIBB.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"11 3","pages":"217-236"},"PeriodicalIF":0.0,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255391/10255405.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68139276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Adaptive Fault Diagnosis Control System of Audio Management Component Environment of Airborne Electronic Equipment","authors":"Xiaomin Xie;Shuguo Gui;Renwei Dou;Xuanfu Du","doi":"10.13052/jicts2245-800X.1124","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1124","url":null,"abstract":"The system adopts adaptive control, and the controller of audio management component is directly applied to the controlled object. Through online calculation, the model is identified online by using the dynamic characteristics of the object, and the relationship between input and output variables is expressed. It can be corrected by entering and leaving data, which is actually to correct the controller. The initial rules of the controller are composed of default models. Through continuous self-reasoning learning, the controller is optimized to achieve data tracking, fast convergence, strong anti-interference ability and excellent performance. Combining intelligent control with adaptive technology not only expands the scope of adaptive system, but also provides an effective way for intelligent control. The environmental adaptive diagnostic control system uses adaptive technology to adjust the parameters, data and knowledge base of the controller. The system detects IO signal, AD signal and the status data sent by the sub-unit through the internal CAN bus according to the power-on self-check of the unit, and at the same time, it monitors all the status data in real time during the operation, judges the operation of each sub-component, gives an alarm in time and carries out protection control. Through the design of integrated detection module, the overall installation space of detection sensors is reduced, signal interfaces and connecting cables are reduced, and the overall adaptive diagnosis effect can be improved. Through the data recording and storage function, the system stores the operation information of each subunit, compares it with the built-in health data table, and prompts the maintenance information in time.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"11 2","pages":"175-196"},"PeriodicalIF":0.0,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255407/10255420.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68097858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Improved YOLO for Road and Vehicle Target Detection Model","authors":"Qinghe Yu;Huaiqin Liu;Qu Wu","doi":"10.13052/jicts2245-800X.1125","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1125","url":null,"abstract":"The yolo series is the prevalent algorithm for target identification at now. Nevertheless, due to the high real-time, mixed target parity, and obscured target features of vehicle target recognition, missed detection and incorrect detection are common. It enhances the yolo algorithm in order to enhance the network performance of this method while identifying vehicle targets. To properly portray the improvement impact, the yolov4 method is used as the improvement baseline. First, the structure of the DarkNet backbone network is modified, and a more efficient backbone network, FBR-DarkNet, is presented to enhance the effect of feature extraction. In order to better detect obstructed cars, a thin feature layer for focused detection of tiny objects is added to the Neck module to increase the recognition impact. The attention mechanism module CBAM is included to increase the model's precision and speed of convergence. The lightweight network replaces the MISH function with the H-SWISH function, and the improved algorithm improves by 4.76 percentage points over the original network on the BDD100K data set, with the mAP metrics improving by 8 points, 8 points, and 7 points, respectively, for the car, truck, and bus categories. Compared to other newer and better algorithms, it nevertheless maintains a pretty decent performance. It satisfies the criteria for real-time detection and significantly improves the detection accuracy.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"11 2","pages":"197-216"},"PeriodicalIF":0.0,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255407/10255428.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68097857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Blockchain-based MQTT Protocol Optimization Algorithm","authors":"Wei Gao;Lixia Zhang;Yun Ju","doi":"10.13052/jicts2245-800X.1122","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1122","url":null,"abstract":"The communication protocol is an important support to realize the communication between equipment and Internet. And it covers all aspects of the IoT (Internet of things) system. To address the security problem of forging or tampering of key data in traditional IoT protocols, this paper designs an improved MQTT (message queue telemetry transmission) protocol that uses blockchain technology to ensure the security of transmitted data in the process of data transmission. Because the information in the blockchain is not tamperable, which in turn ensures that data stored in brokers are not maliciously tampered with. Through simulation experiments, it is proved that this scheme is lightweight, efficient and easy to implement, which helps to protect the security of IoT data.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"11 2","pages":"135-156"},"PeriodicalIF":0.0,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255407/10255408.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68097863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}