WiP: Criminal Smart Contract for Private Key Theft in End to End Encrypted Applications

Author(s):  
Priyanka Pal ◽  
Sudharsana K J L ◽  
Rohith Balaji S
2020 ◽  
Author(s):  
Neelkumar Patel ◽  
Jay Sukhadiya ◽  
Jinan Fiaidhi

<div>Secure communications is when two entities communicate with each other and the communication is completely secured from a third party or the intruder. This type of communication process can be achieved using encryption and decryption mechanism. The implementation of Email encryption is performed with the intension of showing the working of encryption and decryption mechanism. This web application allows user to send an encrypted electronic-mail to any domain and it can be only decrypted using the receiver’s private key. Whereas, messaging android application was developed to replicate existing WhatsApp application to see whether, it performs end-to-end encryption or it’s not what it seems. The application allows users to securely communicate with each other via performing actual end-to-end encryption.</div>


2020 ◽  
Vol 12 (8) ◽  
pp. 134
Author(s):  
Nikolaos Kapsoulis ◽  
Alexandros Psychas ◽  
Georgios Palaiokrassas ◽  
Achilleas Marinakis ◽  
Antonios Litke ◽  
...  

Private and permissioned blockchains are conceptualized and mostly assembled for fulfilling corporations’ demands and needs in the context of their own premises. This paper presents a complete and sophisticated end-to-end permissioned blockchain application for governance and management of musical rights endorsed by smart contract development. In a music industry use case, this disclosed solution monitors and regulates conflicting musical rights of diverse entities under a popular permissioned distributed ledger technology network. The proposed implementation couples various and distinct business domains across the music industry organizations and non-profit blockchain associations.


2020 ◽  
Author(s):  
Neelkumar Patel ◽  
Jay Sukhadiya ◽  
Jinan Fiaidhi

<div>Secure communications is when two entities communicate with each other and the communication is completely secured from a third party or the intruder. This type of communication process can be achieved using encryption and decryption mechanism. The implementation of Email encryption is performed with the intension of showing the working of encryption and decryption mechanism. This web application allows user to send an encrypted electronic-mail to any domain and it can be only decrypted using the receiver’s private key. Whereas, messaging android application was developed to replicate existing WhatsApp application to see whether, it performs end-to-end encryption or it’s not what it seems. The application allows users to securely communicate with each other via performing actual end-to-end encryption.</div>


2021 ◽  
Author(s):  
Syarifah Bahiyah Rahayu ◽  
Sharmelen A/L Vasanthan ◽  
Afiqah M. Azahari ◽  
Joe Chai

Blockchain has become a powerful technology and when it comes to supply chain management, blockchain has a lot to offer which could contribute to its development and make the supply chain more effective. The same benefit could be also gained when blockchain is incorporated in the Military Supply Chain Management (MSCM). Theaim of this paper is to develop and integrate blockchain in the MSCM. The developed MSCM is focusing on three (3) main blockchain components, which are transparency, integrity and secure communication. The methodology to develop the MSCM blockchain similar to UnicalCoin. The findings show that incorporating blockchain into the MSCM enables transparency, integrity and secure communication. Thus, blockchain may reduce fraud, improve communication between parties and made end-to-end tracking transparency in MSCM. Future work is to embed a smart contract feature to automate some processes in MSCM.


2020 ◽  
Author(s):  
William R. Simpson ◽  
Kevin E. Foltz

Network defense implies a comprehensive set of software tools to preclude malicious entities from conducting nefarious activities. For most enterprises at this time, that defense builds upon a clear concept of the fortress approach. Many of the requirements are based on inspection and reporting prior to delivery of the communication to the intended target. These inspections require decryption of packets when encrypted. This decryption implies that the defensive suite has access to the private keys of the servers that are the target of communication. This is in contrast to an end-to-end paradigm where known good entities can communicate directly with each other. In an end-to-end paradigm, maintaining confidentiality through unbroken end-toend encryption, the private key resides only with the holder-of-key in the communication and on a distributed computation of inspection and reporting. This paper examines a formulation that is pertinent to the Enterprise Level Security (ELS) framework.


Author(s):  
Anushka Xavier K

In this era people are closely connected to each other using technology.Messaging services a plays a crucial role in this process.For this, WhatsApp Messenger being an exclusive cross-platform that allows to exchange text, files as well as audio and video messages.WhatsApp has 1.5 billion dynamic clients in 180 nations.However, being such a well liked application,taking care of privacy breach is very salient. It is necessary that the application protects clients confidentiality and authenticity. Thus, to give assurance and stealth to client, for the most part cryptography is utilized as a spine of the web based exchanges. WhatsApp utilizes End-to-End Encryption technique and uses various protocols (Signal protocol etc.) and keys (public key, private key etc.) along with algorithm like Curve25519.In this era people are closely connected to each other using technology.Messaging services a plays a crucial role in this process.For this, WhatsApp Messenger being an exclusive cross-platform that allows to exchange text, files as well as audio and video messages.WhatsApp has 1.5 billion dynamic clients in 180 nations.However, being such a well liked application,taking care of privacy breach is very salient. It is necessary that the application protects clients confidentiality and authenticity. Thus, to give assurance and stealth to client, for the most part cryptography is utilized as a spine of the web based exchanges. WhatsApp utilizes End-to-End Encryption technique and uses various protocols (Signal protocol etc.) and keys (public key, private key etc.) along with algorithm like Curve25519.


VASA ◽  
2016 ◽  
Vol 45 (3) ◽  
pp. 223-228 ◽  
Author(s):  
Jan Paweł Skóra ◽  
Jacek Kurcz ◽  
Krzysztof Korta ◽  
Przemysław Szyber ◽  
Tadeusz Andrzej Dorobisz ◽  
...  

Abstract. Background: We present the methods and results of the surgical management of extracranial carotid artery aneurysms (ECCA). Postoperative complications including early and late neurological events were analysed. Correlation between reconstruction techniques and morphology of ECCA was assessed in this retrospective study. Patients and methods: In total, 32 reconstructions of ECCA were performed in 31 symptomatic patients with a mean age of 59.2 (range 33 - 84) years. The causes of ECCA were divided among atherosclerosis (n = 25; 78.1 %), previous carotid endarterectomy with Dacron patch (n = 4; 12.5 %), iatrogenic injury (n = 2; 6.3 %) and infection (n = 1; 3.1 %). In 23 cases, intervention consisted of carotid bypass. Aneurysmectomy with end-to-end suture was performed in 4 cases. Aneurysmal resection with patching was done in 2 cases and aneurysmorrhaphy without patching in another 2 cases. In 1 case, ligature of the internal carotid artery (ICA) was required. Results: Technical success defined as the preservation of ICA patency was achieved in 31 cases (96.9 %). There was one perioperative death due to major stroke (3.1 %). Two cases of minor stroke occurred in the 30-day observation period (6.3 %). Three patients had a transient hypoglossal nerve palsy that subsided spontaneously (9.4 %). At a mean long-term follow-up of 68 months, there were no major or minor ipsilateral strokes or surgery-related deaths reported. In all 30 surviving patients (96.9 %), long-term clinical outcomes were free from ipsilateral neurological symptoms. Conclusions: Open surgery is a relatively safe method in the therapy of ECCA. Surgical repair of ECCAs can be associated with an acceptable major stroke rate and moderate minor stroke rate. Complication-free long-term outcomes can be achieved in as many as 96.9 % of patients. Aneurysmectomy with end-to-end anastomosis or bypass surgery can be implemented during open repair of ECCA.


Author(s):  
Ahmed Mousa ◽  
Ossama M. Zakaria ◽  
Mai A. Elkalla ◽  
Lotfy A. Abdelsattar ◽  
Hamad Al-Game'a

AbstractThis study was aimed to evaluate different management modalities for peripheral vascular trauma in children, with the aid of the Mangled Extremity Severity Score (MESS). A single-center retrospective analysis took place between 2010 and 2017 at University Hospitals, having emergencies and critical care centers. Different types of vascular repair were adopted by skillful vascular experts and highly trained pediatric surgeons. Patients were divided into three different age groups. Group I included those children between 5 and 10 years; group II involved pediatrics between 11 and 15 years; while children between 16 and 21 years participated in group III. We recruited 183 children with peripheral vascular injuries. They were 87% males and 13% females, with the mean age of 14.72 ± 04. Arteriorrhaphy was performed in 32%; end-to-end anastomosis and natural vein graft were adopted in 40.5 and 49%, respectively. On the other hand, 10.5% underwent bypass surgery. The age groups I and II are highly susceptible to penetrating trauma (p = 0.001), while patients with an extreme age (i.e., group III) are more susceptible to blunt injury (p = 0.001). The MESS has a significant correlation to both age groups I and II (p = 0.001). Vein patch angioplasty and end-to-end primary repair should be adopted as the main treatment options for the repair of extremity vascular injuries in children. Moreover, other treatment modalities, such as repair with autologous vein graft/bypass surgery, may be adopted whenever possible. They are cost-effective, reliable, and simple techniques with fewer postoperative complication, especially in poor/limited resources.


Sign in / Sign up

Export Citation Format

Share Document