Checking Compliance of X.509 Digital Certificates over IPv6 with Specifications

Author(s):  
Chao Zhang ◽  
Donggang Yang ◽  
Chu Chen ◽  
Pinghong Ren
Keyword(s):  
2017 ◽  
Vol 8 (1) ◽  
pp. 1-10
Author(s):  
Is Mardianto ◽  
Kuswandi Kuswandi

Security issues have become a major issue on the Internet. One of the security methods that are widely used today is to implement a digital certificate. Digital certificates have evolved over time, one of which is the X.509 digital certificate. Digital certificates have been widely used as authentication applications, web network authentication and other authentication systems that require digital certificates. This research is carried out by implementing an X.509 digital certificate technology as a mobile web service with its client. Secure Hash Algorithm (SHA), Diffie-Hellman, and Advanced Encryption Standard (AES) are used to secure the data exchange transaction between the web service and mobile phone. SHA algorithm will be used for user authentication, Diffie-Hellman algorithm will be used for public key exchange and AES algorithms will be used for symmetric cryptography data. The results of the application of digital certificates, the SHA algorithm, Diffie-Hellman, and AES in mobile phone applications, provide security application running on web service. Index Terms—Digital Certificate, X.509, SHA, Diffie Hellman, AES


2017 ◽  
Vol 1 (8) ◽  
Author(s):  
Cristian Fernando Cedeño Sarmiento ◽  
Alex Gregorio Mendoza Arteaga ◽  
Gregorio Isoldo Mendoza Cedeño ◽  
Enrique Javier Macías Arias

En el presente artículo se realiza un análisis de la usabilidad del Documento Nacional de Identidad electrónico en países desarrollados y su futura implementación en el Ecuador, la necesidad de tener un documento de identificación electrónico legal que permita validar la identidad de los ciudadanos al momento de acceder a los servicios electrónicos públicos y privados. Se analizan conceptos referentes a la firma electrónica, las entidades que intervienen en el proceso, los mecanismos de encriptación de un mensaje, hasta culminar con la implementación de dicha firma electrónica. Finalmente, se hace una reflexión sobre la implementación de un nuevo documento de identidad en el Ecuador el cual debería contener las características necesarias acorde a las nuevas tecnologías existentes, los estándares internacionales y sus posibles usos en los servicios informáticos disponibles en el país.  Palabras clave: Encriptación, tecnologías, servicios informáticos, identificación electrónica   Applications of electronic signatures using digital certificates: The National Electronic Identity in Ecuador   Aplicaciones electrónicas en Ecuador    Abstract  In the present article itself performs an analysis of the usability of the National Electronic Identity Document in developed countries and its future implementation in Ecuador, the need for a legal electronic identification document to validate the identity of citizens at time by accessing the electronic government and corporate services. Discusses concepts related to electronic signatures, the entities involved in the process, the mechanisms for the encryption a message, culminating with the implementation of electronic signatures. Finally, a reflection on the implementation of a new identity in Ecuador that should contain the necessary characteristics according to the new existing technologies, international standards and their possible uses and computer services available in the country. Keywords: Encriptación, tecnologías, servicios informáticos, identificación electrónica


2021 ◽  
Vol 13 (5) ◽  
pp. 2549
Author(s):  
Shahid Mahmood ◽  
Moneeb Gohar ◽  
Jin-Ghoo Choi ◽  
Seok-Joo Koh ◽  
Hani Alquhayz ◽  
...  

Smart Grid (SG) infrastructure is an energy network connected with computer networks for communication over the internet and intranets. The revolution of SGs has also introduced new avenues of security threats. Although Digital Certificates provide countermeasures, however, one of the issues that exist, is how to efficiently distribute certificate revocation information among Edge devices. The conventional mechanisms, including certificate revocation list (CRL) and online certificate status protocol (OCSP), are subjected to some limitations in energy efficient environments like SG infrastructure. To address the aforementioned challenges, this paper proposes a scheme incorporating the advantages and strengths of the fog computing. The fog node can be used for this purpose with much better resources closer to the edge. Keeping the resources closer to the edge strengthen the security aspect of smart grid networks. Similarly, a fog node can act as an intermediate Certification Authority (CA) (i.e., Fog Node as an Intermediate Certification Authority (FONICA)). Further, the proposed scheme has reduced storage, communication, processing overhead, and latency for certificate verification at edge devices. Furthermore, the proposed scheme reduces the attack surface, even if the attacker becomes a part of the network.


Author(s):  
Ronald Martinez ◽  
Alain Alejo ◽  
Paulo Portugal ◽  
Alvaro Cuno ◽  
Fernando Zapata ◽  
...  
Keyword(s):  

2021 ◽  
Vol 119 ◽  
pp. 07004
Author(s):  
Adil El Mane ◽  
Younes Chihab ◽  
Redouan Korchiyne

This report represents my researching work for a six-month internship in Lex Persona Enterprise. "The implementation of applications that sign data and files electronically using operating digital certificates" is the central theme of this research. This project brings together many applications related to compliance with well-specified programming constraints to sign files electronically. The research has the goal of signing PDF documents digitally using the hash-and-sign method. The SHA-256 function as the hash function and RSA as encryption algorithm, accompanied with PKI certificates type X.509. The link between the applications and the certificates is the cryptographic API PKCS #11. This humbled work got dedicated to smartphones and computers. The use of WebView in all applications provides a taste of consistency. This article presents several processes carried out to accomplish this work.


2020 ◽  
Vol 24 (3) ◽  
pp. 695-716
Author(s):  
Olga I. Lyutova

The article investigates the problem of content change of the concept object of taxation in the Russian tax law on the path to digital economy. The purpose of the article is to analyze the provisions of the Russian tax legislation, international norms, as well as academic literature devoted to identification of certain new goods and phenomena as possible objects of taxation, thus updating the concept of the object of taxation itself. The development of information technologies generates the following unavoidable problems related to the object of taxation concept content, which allows reviving the discussion about the content of this tax and legal category: the impossibility to assess implementation operations as potential tax objects with the help of the classical triad product, work, service; recognition in certain situations (for example, in case of electronic money payment) as the object of taxation is not one, but a set of legal facts (cause of action); the need to establish the object of taxation through the so-called tax relationship between the object and the subject of taxation. In connection with the first problem, the author proposes to unambiguously define in the Tax Code the legal nature of transactions with digital products for tax purposes, treating them as a new type of service. The conclusion is based on the experience of international regulation and suggests supplementing the provisions of the Tax Code in terms of legal regulation of the concept taxation object as well as VAT taxation. The re-search of the second problem leads to the conclusion that it is necessary to clarify the rules of the Tax Code when the counterparties carry out taxable transactions, whose settlements are made with electronic money. In this situation, the object of taxation is not single, but suggests several legal facts-actions of the potential tax-payer. On the third problem the author raises the issues of identification of the taxpayer in case of certifying the taxable transaction by the digital signature analogue. Taking into account international experience, as well as national civil law regulations, it is considered necessary to include provisions on digital certificates and digital signatures in tax legislation.


2018 ◽  
Vol 7 (3) ◽  
pp. 37 ◽  
Author(s):  
Ricardo Mühlbauer ◽  
João Kleinschmidt

The establishment of trust in vehicular ad hoc networks (VANETs) will require the application of non-conventional measures of information security, such as reputation of the participants. The system proposed in this paper uses the concept of certified reputation, in which vehicles communicate providing digital certificates that include their own reputation level. The vehicles periodically come in contact with certification and traffic control authorities to update their reputation levels, which are determined by the validation of their behavior on the network. Decision-making mechanisms in the receiver vehicles are responsible for evaluating whether the messages are true or false, based on the reputation of the communication nodes. The quantitative analysis of simulated scenarios showed the combination of the central reputation scheme with an appropriate vehicular decision mechanism achieved a total of correct decisions superior than without reputation systems. Considering the constraints of a high mobile network, the proposed system is a feasible way to reduce the risk of anomalous or malicious behavior in a vehicular network.


Author(s):  
Rubén González Crespo ◽  
Oscar Sanjuán Martínez ◽  
José Manuel Saiz Alvarez ◽  
Juan Manuel Cueva Lovelle ◽  
B. Cristina Pelayo García-Bustelo ◽  
...  

The present chapter aims to introduce the construction of a generic platform and open secure voting and multipurpose for the realm of the Internet. This platform will allow for collecting signatures and supporting multiple contexts through the use of electronic IDs and digital certificates. Potential applications of this platform are almost endless but some of the most significant may be: Voting at shareholders meetings, and votes in communities of neighbors, collect signatures, collect signatures for nominations, proposals for ILP (Popular Legislative initiatives), any activity susceptible to need a platform for reliable vote, meetings of parents, collegiate, et cetera. Currently the use of e-government for the identification of persons through digital documents is on rise, and the possibilities it presents are endless. That is why this chapter provides solutions for allowing these uses; it is of general interest for the present society.


Symmetry ◽  
2019 ◽  
Vol 11 (2) ◽  
pp. 255 ◽  
Author(s):  
Tzay-Farn Shih ◽  
Chin-Ling Chen ◽  
Bo-Yan Syu ◽  
Yong-Yuan Deng

Criminal activities have always been a part of human society, and even today, in a world of extremely advanced surveillance and policing capabilities, many different kinds of crimes are still committed in almost every social environment. However, since those who commit crimes are not representative of the majority of their community, members of these communities tend to wish to report crime when they see it; however, they are often reluctant to do so for fear of their own safety should the people they report identify them. Thus, a great deal of crime goes unreported, and investigations fail to gain key evidence from witnesses, which serves only to foster an environment in which criminal activity is more likely to occur. In order to address this problem, this paper proposes an online illegal event reporting scheme based on cloud technology, which combines digital certificates, symmetric keys, asymmetric keys, and digital signatures. The proposed scheme can process illegal activity reports from the reporting event to the issuing of a reward. The scheme not only ensures informers’ safety, anonymity and non-repudiation, but also prevents cases and reports being erased, and ensures data integrity. Furthermore, the proposed scheme is designed to be robust against abusive use, and is able to preclude false reports. Therefore, it provides a convenient and secure platform for reporting and fighting crime.


Sign in / Sign up

Export Citation Format

Share Document