scholarly journals Stateless Reassociation in WPA3 Using Paired Token

Author(s):  
Byoungcheon Lee

In WPA3 secure connection is executed in two sequential stages. Firstly, in authentication and association stage a pairwise master key (PMK) is generated. Secondly, in post-association stage a pairwise transient key (PTK) is generated from PMK using the traditional 4-way handshake protocol. To reduce the heavy computation of the first stage PMK caching can be used. If client and AP are previously authenticated and has PMK cache, client can skip the first heavy stage and reuse the cached PMK to directly execute the 4-way handshake. But PMK caching is a very primitive technology to manage shared key between client and AP and there are many limitations; AP has to manage stateful cache for multiple clients, cache lifetime is limited, etc. Paired token (PT) \cite{LZ} is a new secondary credential scheme that provides stateless pre-shared key (PSK) in client-server environment. Server issues paired token (public token and secret token) to authenticated client where public token has the role of signed identity and secret token is a kind of shared secret. Once client is equipped with PT, it can be used for many symmetric key based cryptographic applications such as authentication, authorization, key establishment, etc. In this paper we apply the PT approach to WPA3 and try to replace the PMK caching with the one-time authenticated key establishment using PT. At the end of the authentication and association stage AP securely issues PT to client. Then in reassociation stage client and AP can compute the same one-time authenticated PMK from PT in stateless way and compute PTK using the traditional 4-way handshake protocol. Using this kind of stateless reassociation technology AP can provide high performance service to huge number of clients.

Electronics ◽  
2021 ◽  
Vol 10 (2) ◽  
pp. 215
Author(s):  
Byoungcheon Lee

In Wi-Fi Protected Access 3 (WPA3), a secure connection is established in two sequential stages. Firstly, in the authentication and association stage, a pairwise master key (PMK) is generated. Secondly, in the post-association stage, a pairwise transient key (PTK) is generated from PMK using the traditional 4-way handshake protocol. To reduce the heavy load of the first stage, PMK caching can be used. If the client and AP are previously authenticated and have a PMK cache, the first heavy stage can be skipped and the cached PMK can be used to directly execute the 4-way handshake. However, PMK caching is a very primitive technology to manage shared key between a client and AP and there are many limitations; AP has to manage a stateful cache for a large number of clients, cache lifetime is limited, etc. Paired token (PT)is a new secondary credential scheme that provides stateless pre-shared key (PSK) in a client-server environment. The server issues a paired token (public token and secret token) to an authenticated client where the public token has the role of signed identity and the secret token is a kind of shared secret. Once a client is equipped with PT, it can be used for many symmetric key-based cryptographic applications such as authentication, authorization, key establishment, etc. In this paper, we apply the PT approach to WPA3 and try to replace the PMK caching with the one-time authenticated key establishment using PT. At the end of a successful full handshake, AP securely issues PT to the client. Then, in subsequent re-association requests, the client and AP can compute the same one-time authenticated PMK using PT in a stateless way. Using this kind of stateless re-association technology, AP can provide a high performance Wi-Fi service to a larger number of clients.


Organization ◽  
2021 ◽  
pp. 135050842110572
Author(s):  
Gazi Islam ◽  
Jean-Charles Pillet ◽  
Kseniya Navazhylava ◽  
Marcos Barros

The current study examines the ways in which new age organizations use digital culture to promote “holistic” visions of personal and social well-being. Concepts of holism are common in contemporary and new age management settings, but are largely undertheorized by organizational scholars; moreover, the relations between holism and techno-culture, increasingly recognized by digital sociologists, are largely missing from organizational scholarship. Using the lens of “communicative capitalism,” we carry out a case study of “HappyAppy,” a French techno-startup association concerned with well-being related applications, to understand how holistic ideas are deployed and shaped within this association. We find that that holism is marked, on the one hand, by “autarkic” fantasies, involving subjective integration and immersion, and on the other, by “relational” fantasies, involving interpersonal connection and participation. Moreover, each of these versions of holism is associated with distinct critical possibilities. We use these results to theorize the role of digital holism at the intersection of new age management and digital culture, outlining an agenda for future research.


Author(s):  
Byoungcheon Lee

Transport Layer Security (TLS) is a cryptographic protocol that provides communications security between two peers and it is widely used in many applications. To reduce the latency in TLS handshake session resumption using pre-shared key (PSK) had been used. But current methods in PSK mode handshake uses a fixed session key multiple times for the lifetime of session ticket. Reuse of fixed session key should be very careful in the point of communications security. It is vulnerable to replay attacks and there is a possibility of tracking users. Paired token (PT) is a new secondary credential scheme that provides pre-shared key in stateless way in client-server environment. Server issues paired token (public token and secret token) to authenticated client. Public token represents signed identity of client and secret token is a kind of shared secret between client and server. Once client is equipped with PT, it can be used for many symmetric key based cryptographic applications such as authentication, authorization, key establishment, etc. It was also shown that it can be used for one-time authenticated key establishment using the time-based one-time password (TOTP) approach. In this paper we apply the PT and TOTP approach to TLS to achieve stateless one-time authenticated session resumption. Server executes full handshake of TLS 1.3 and issues PT to authenticated client. Then client and server can execute one-time authenticated session resumption using PT in stateless way in server side. In every runs of session resumption distinct session keys are established that the same PT can be used safely for longer lifetime. If anonymous PT is used with renewal issuing, user privacy, untraceability and forward security can be achieved easily. It will provide a huge performance gain in large-scale distributed services.


2021 ◽  
Vol 11 (4) ◽  
pp. 208-217
Author(s):  
Ahmad Yasser Dakhel ◽  
János Lukács

Girth welds of hydro-carbon transporting pipelines play important role of the life and the lifetime, during both the construction and the operation. In consideration of the huge number of girth welds, the highlighted attention to those is worthy and necessary. The aims of the article are twofold: on the one hand, collecting the influencing factors on the failures of girth welds; on the other hand, answering the question assumed in the title of the article: how to prevent damages of transporting pipeline girth welds? The answers build upon the demonstrated influencing factors, using examples, and systematically respond to those.


Author(s):  
D. E. Newbury ◽  
R. D. Leapman

Trace constituents, which can be very loosely defined as those present at concentration levels below 1 percent, often exert influence on structure, properties, and performance far greater than what might be estimated from their proportion alone. Defining the role of trace constituents in the microstructure, or indeed even determining their location, makes great demands on the available array of microanalytical tools. These demands become increasingly more challenging as the dimensions of the volume element to be probed become smaller. For example, a cubic volume element of silicon with an edge dimension of 1 micrometer contains approximately 5×1010 atoms. High performance secondary ion mass spectrometry (SIMS) can be used to measure trace constituents to levels of hundreds of parts per billion from such a volume element (e. g., detection of at least 100 atoms to give 10% reproducibility with an overall detection efficiency of 1%, considering ionization, transmission, and counting).


2001 ◽  
Vol 17 (1) ◽  
pp. 48-55 ◽  
Author(s):  
Juan Botella ◽  
María José Contreras ◽  
Pei-Chun Shih ◽  
Víctor Rubio

Summary: Deterioration in performance associated with decreased ability to sustain attention may be found in long and tedious task sessions. The necessity for assessing a number of psychological dimensions in a single session often demands “short” tests capable of assessing individual differences in abilities such as vigilance and maintenance of high performance levels. In the present paper two tasks were selected as candidates for playing this role, the Abbreviated Vigilance Task (AVT) by Temple, Warm, Dember, LaGrange and Matthews (1996) and the Continuous Attention Test (CAT) by Tiplady (1992) . However, when applied to a sample of 829 candidates in a job-selection process for air-traffic controllers, neither of them showed discriminative capacity. In a second study, an extended version of the CAT was applied to a similar sample of 667 subjects, but also proved incapable of properly detecting individual differences. In short, at least in a selection context such as that studied here, neither of the tasks appeared appropriate for playing the role of a “short” test for discriminating individual differences in performance deterioration in sustained attention.


2013 ◽  
Vol 44 (1) ◽  
pp. 16-25 ◽  
Author(s):  
Sabrina Pierucci ◽  
Olivier Klein ◽  
Andrea Carnaghi

This article investigates the role of relational motives in the saying-is-believing effect ( Higgins & Rholes, 1978 ). Building on shared reality theory, we expected this effect to be most likely when communicators were motivated to “get along” with the audience. In the current study, participants were asked to describe an ambiguous target to an audience who either liked or disliked the target. The audience had been previously evaluated as a desirable vs. undesirable communication partner. Only participants who communicated with a desirable audience tuned their messages to suit their audience’s attitude toward the target. In line with predictions, they also displayed an audience-congruent memory bias in later recall.


1961 ◽  
Vol 6 (02) ◽  
pp. 224-234 ◽  
Author(s):  
E. T Yin ◽  
F Duckert

Summary1. The role of two clot promoting fractions isolated from either plasma or serum is studied in a purified system for the generation of intermediate product I in which the serum is replaced by factor X and the investigated fractions.2. Optimal generation of intermediate product I is possible in the purified system utilizing fractions devoid of factor IX one-stage activity. Prothrombin and thrombin are not necessary in this system.3. The fraction containing factor IX or its precursor, no measurable activity by the one-stage assay method, controls the yield of intermediate product I. No similar fraction can be isolated from haemophilia B plasma or serum.4. The Hageman factor — PTA fraction shortens the lag phase of intermediate product I formation and has no influence on the yield. This fraction can also be prepared from haemophilia B plasma or serum.


Author(s):  
Lidiya Derbenyova

The article explores the role of antropoetonyms in the reader’s “horizon of expectation” formation. As a kind of “text in the text”, antropoetonyms are concentrating a large amount of information on a minor part of the text, reflecting the main theme of the work. As a “text” this class of poetonyms performs a number of functions: transmission and storage of information, generation of new meanings, the function of “cultural memory”, which explains the readers’ “horizon of expectations”. In analyzing the context of the literary work we should consider the function of antropoetonyms in vertical context (the link between artistic and other texts, and the groundwork system of culture), as well as in the context of the horizontal one (times’ connection realized in the communication chain from the word to the text; the author’s intention). In this aspect, the role of antropoetonyms in the structure of the literary text is extremely significant because antropoetonyms convey an associative nature, generating a complex mechanism of allusions. It’s an open fact that they always transmit information about the preceding text and suggest a double decoding. On the one hand, the recipient decodes this information, on the other – accepts this as a sort of hidden, “secret” sense.


2020 ◽  
Vol 26 (2) ◽  
pp. 217-223
Author(s):  
Ioan-Gabriel Popa

AbstractIn order to understand the principles of public procurement in Romania, it is necessary to analyze, on the one hand, the European directives that regulate the actual public procurement and, on the other hand, the context in which the European directives were adopted. Even with the directives in force, the more general provisions contained in the Treaty of the European Economic Community (EEC) in Rome, hereinafter referred to as the Treaty, are applied, as well as many more general principles of law that will guide the interpretation of these directives. The Treaty was adopted in Rome, in 1957 and became applicable from January 1, 1958. It is considered that the source of the principles of public procurement is the Treaty. Even if in Treaty contained no specific provisions regarding the field of public procurement, it reflects the principles and the general framework for the functioning of the single market, a market characterized through the prism of the fundamental freedoms established by the Treaty: the free movement of goods, services, capital and persons. As the field of public procurement is closely linked to the free movement of goods, this principle is promoted and implemented in the practice of this field based on the regulations, directives and decisions of the Community institutions. The role of the free movement of goods is to harmonize the relationships involved in the process of purchasing goods, but also to ensure the homogeneity, coherence and balance of this process.


Sign in / Sign up

Export Citation Format

Share Document