scholarly journals Client Module with Multifactor Authentication for Remote Electronic Signature Generation Using Cryptography API: Next Generation

2020 ◽  
Vol 3 (1) ◽  
pp. 5-10
Author(s):  
Ionuț Cătălin Dumitru ◽  
◽  
Mihai Togan ◽  

In classic PKI systems, users resorted to cryptographic devices like smartcard or electronic-token to perform the required cryptographic operations, therefore all cryptographic operations will be done in a safe environment. Although a widely-accepted and highly-efficient method, along with the evolution of technology, it is also desirable to simplify user experience with the applications and at the same time to reduce costs. Thus, there is the problem of cryptographic devices and passwords needing to be retained and secret. To overcome all these impediments, we introduce the concept of remote signing, a concept that will simplify the signature generation process, and also increase security to the whole process while lowering costs for equipment. Therefore, by the fact that the signature generation process will be delegated to a remote service, the possibility of generating errors due to the client system is minimized, the need for a cryptographic device for users is eliminated. At the same time, the entire computational effort is also delegated to the remote service, which means an increased computing speed, and by the fact that the cryptographic devices that generate the signature are located at distance, there is also the possibility of physical securing and limiting unauthorized access.

Author(s):  
Yelyzaveta Ostrianska ◽  
Olha Mirzoieva

The paper considers the description of electronic signature scheme Rainbow, which is based on multivariate transformations. It is a generalization of the UOV structure, which provides efficient parameterization due to the additional algebraic structure. The article provides an initial analysis of known attacks on the ES Rainbow scheme. Also, algorithms for generating general system parameters for 384 and 512 security bits were developed and the results are presented in this paper. The study found that the Rainbow signature generation process consists of simple operations of linear algebra, such as multiplying matrix vectors and solving linear systems over small finite fields. Another advantage of Rainbow is that this scheme offers very small signatures of only a few hundred bits. But the main disadvantage of Rainbow is the large size of public keys.


Author(s):  
Arunabh Singh

Abstract: In this paper we attempt to explain and establish certain frameworks that can be assessed for implementing security systems against cyber-threats and cyber-criminals. We give a brief overview of electronic signature generation procedures which include its validation and efficiency for promoting cyber security for confidential documents and information stored in the cloud. We strictly avoid the mathematical modelling of the electronic signature generation process as it is beyond the scope of this paper, instead we take a theoretical approach to explain the procedures. We also model the threats posed by a malicious hacker seeking to induce disturbances in the functioning of a power transmission grid via the means of cyber-physical networks and systems. We use the strategy of a load redistribution attack, while clearly acknowledging that the hacker would form its decision policy on inadequate information. Our research indicate that inaccurate admittance values often cause moderately invasive cyber-attacks that still compromise the grid security, while inadequate capacity values result in comparatively less efficient attacks. In the end we propose a security framework for the security systems utilised by companies and corporations at global scale to conduct cyber-security related operations. Keywords: Electronic signature, Key pair, sequence modelling, hacker, power transmission grid, Threat response, framework.


Micromachines ◽  
2019 ◽  
Vol 10 (2) ◽  
pp. 94 ◽  
Author(s):  
Yanqiao Pan ◽  
Liangcai Zeng

Droplet generation process can directly affect process regulation and output performance of electrohydrodynamic jet (E-jet) printing in fabricating micro-to-nano scale functional structures. This paper proposes a numerical simulation model for whole process of droplet generation of E-jet printing based on the Taylor-Melcher leaky-dielectric model. The whole process of droplet generation is successfully simulated in one whole cycle, including Taylor cone generation, jet onset, jet break, and jet retraction. The feasibility and accuracy of the numerical simulation model is validated by a 30G stainless nozzle with inner diameter ~160 μm by E-jet printing experiments. Comparing numerical simulations and experimental results, period, velocity magnitude, four steps in an injection cycle, and shape of jet in each step are in good agreement. Further simulations are performed to reveal three design constraints against applied voltage, flow rate, and nozzle diameter, respectively. The established cone-jet numerical simulation model paves the way to investigate influences of process parameters and guide design of printheads for E-jet printing system with high performance in the future.


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Haiying Yang

The thinking course is an innovative move to implement the fundamental task of moral education and realize the whole process of education and all-round education in universities. The Apriori-TIDS algorithm proposed in this paper adopts the TID list of transaction identifiers to calculate the support count and generate the frequent item set of the Hou option set, and the whole frequency set generation process only needs to scan the transaction database once, which greatly improves the operation efficiency of the mining algorithm. The course is based on the three focus points of ideological and political education, such as “matters, times, and situations”, to explore the elements of ideological and political education hidden in the course, and to give the principles and criteria for evaluating the effectiveness of ideological and political teaching in the course, in order to make the professional degree course become the main channel to lead the ideological and political education of postgraduate courses and improve the effectiveness of the course in educating people.


2010 ◽  
Vol 113-116 ◽  
pp. 1383-1388 ◽  
Author(s):  
Feng Long ◽  
Bo Song ◽  
Xun Feng Xia ◽  
Ling Ling Xue ◽  
Qun Hui Wang

In order to conduct the integrated management in the whole process of plastics waste management, plastics waste generation should firstly be studied, especially the generation of each kind. The results of factors acting during the generation process should also be studied. Using Beijng as an example city, this paper established a predicting model for the generation and proportion of each shape and component of plastics waste, and analyzed the generation characteristics and trend of plastics waste in Beijing according to the predicting results. In terms of shape, the plastic film has the largest proportion. While in terms of component, PP and PE have the largest proportion among all the components.


Radiotekhnika ◽  
2020 ◽  
pp. 82-90
Author(s):  
D.V. Garmash ◽  
G.A. Maleeva ◽  
S.O. Kandiy

According to the results of the second stage of the international competition for research and development of standards for asymmetric cryptographic transformations of the post-quantum period, the Rainbow electronic signature (ES) mechanism received a positive assessment and recognition as a finalist. Its important advantages over other post-quantum ESs consist in less complexity of direct and inverse transformations, i.e., signature generation and verification, as well as significantly reduced signature length. At the same time, the length of its public key is quite large. Therefore, it is thought that Rainbow is not suitable as a general-purpose ES algorithm to replace the algorithms currently defined in FIPS 186-4. In particular, large public keys make certificate chains extremely large. However, there are applications that do not need to send keys too often, so this disadvantage in these cases may be insignificant. Under these conditions, the Rainbow ES mechanism can find application, including that one increasing the diversity of postquantum ESs. Also, it is significantly problematic to limit the security levels of Rainbow ES 256 bits against classical and 128 bits against quantum cryptanalysis. The subject of this article is the analysis and generalization of designs of the Oil-Vinegar public key authentication systems mechanism based on the Rainbow ES use. This is an important direction in creating secure and efficient authentication systems for practical applications using public keys, such as inexpensive smart cards, when speed is required in the production and verification of ES. A feature of such authentication mechanism is the implementation of the idea of a multilevel Oil-Vinegar system. It is believed that the ES-based authentication system should be more secure in terms of cryptographic stability and more efficient in terms of widespread use in low-power, etc. applications. The importance of solving this problem lies in the potential use of the Rainbow mechanism as a secure and highly efficient public-key authentication system based on ES.


2022 ◽  
Vol 2022 ◽  
pp. 1-12
Author(s):  
Baoliang Ma ◽  
Yuzhu Zhang ◽  
Lixing Ma

Calcium complex ferrate is an ideal binder phase in the sintered ore phase, and a detailed study of the whole process of calcium complex ferrate generation is of great significance to improve the quality of sintered ore. In this paper, we first investigated calcium ferrate containing aluminum (CFA), which is an important precursor compound for the generation of complex calcium ferrate (SFCA), followed by a series of composite calcium ferrate generation process phase XRD detections and data preprocessing of data. Data correlation and data fitting analysis were combined with composite calcium ferrite phase diagram energy spectrum analysis to obtain the effect of MgO and Al2O3 on the formation of composite calcium ferrite. Then a modified RBF neural network model using the resource allocation network algorithm (RAN) was used to predict the generation trend of complex calcium ferrate. The parameters of the neural network are optimized with the Dragonfly algorithm, compared with the traditional RBF neural network. The prediction accuracy of the improved algorithm was found to be higher, with a prediction result of 97.6%. Finally, the predicted results were based on comparative metallurgical experimental results and data analysis. The validity and accuracy of the findings in this paper were verified.


Author(s):  
J. Gjønnes ◽  
N. Bøe ◽  
K. Gjønnes

Structure information of high precision can be extracted from intentsity details in convergent beam patterns like the one reproduced in Fig 1. From low order reflections for small unit cell crystals,bonding charges, ionicities and atomic parameters can be derived, (Zuo, Spence and O’Keefe, 1988; Zuo, Spence and Høier 1989; Gjønnes, Matsuhata and Taftø, 1989) , but extension to larger unit cell ma seem difficult. The disks must then be reduced in order to avoid overlap calculations will become more complex and intensity features often less distinct Several avenues may be then explored: increased computational effort in order to handle the necessary many-parameter dynamical calculations; use of zone axis intensities at symmetry positions within the CBED disks, as in Figure 2 measurement of integrated intensity across K-line segments. In the last case measurable quantities which are well defined also from a theoretical viewpoint can be related to a two-beam like expression for the intensity profile:With as an effective Fourier potential equated to a gap at the dispersion surface, this intensity can be integrated across the line, with kinematical and dynamical limits proportional to and at low and high thickness respctively (Blackman, 1939).


2013 ◽  
Vol 3 (2) ◽  
pp. 41-43
Author(s):  
Lyn Tindall

Telepractice is an exciting addition to the arsenal of speech-language pathologists for delivering services. Efficacy data continues to emerge proving the benefit of using available technology to provide assessment and treatment for persons with a variety of communication disorders, ages, and gender. In addition to providing assessment and treatment using telepractice technology, several professional issues have arisen which must be addressed before implementation of this service delivery system. Licensure and reimbursement have been at the forefront, as well they should. However, client safety is another issue that should also be addressed. Providing speech pathology services in a safe environment is a concept which may not have been considered before technological advances made it possible to provide services to someone while not being physically present.


2019 ◽  
Vol 2 (5) ◽  
Author(s):  
Tong Wang

The compaction quality of the subgrade is directly related to the service life of the road. Effective control of the subgrade construction process is the key to ensuring the compaction quality of the subgrade. Therefore, real-time, comprehensive, rapid and accurate prediction of construction compaction quality through informatization detection method is an important guarantee for speeding up construction progress and ensuring subgrade compaction quality. Based on the function of the system, this paper puts forward the principle of system development and the development mode used in system development, and displays the development system in real-time to achieve the whole process control of subgrade construction quality.


Sign in / Sign up

Export Citation Format

Share Document