scholarly journals Strengthening Sanctions: Solutions to Curtail the Evasion of International Economic Sanctions Through the Use of Cryptocurrency

Author(s):  
Emma Macfarlane

Despite the ubiquity of cryptocurrency, no international uniform regulatory system exists. State-by-state regulation of cryptocurrencies has problematic implications for cross-border investigations and predictability in application. Moreover, this regulatory framework leaves open opportunities for actors worldwide to violate international sanctions with impunity. This Note posits that an international regulatory framework is necessary to combat the evasion of financial sanctions on practical and theoretical grounds. It further argues that the best way to structure this new framework is through the enactment of a new multilateral treaty. A formal international regulatory mechanism for cryptocurrencies would have numerous benefits, foremost among them limiting the evasion of international sanctions. An international regulatory mechanism would also promote predictability in the regulation of cryptocurrencies. This would in turn entice institutional investors to build out the field of crypto users and encourage stability in an otherwise volatile marketplace. The proposal outlined within this Note goes beyond standard legal justifications for a multilateral mechanism. It drills down into the substantive mechanisms that an effective treaty must include, such as public key cryptography; an international public key directory; prosecution guidelines; and foreign fine credits. The levels of specificity to this end are perhaps uncommon in a typical legal proposal. However, this analysis is essential to explain why a new, multilateral treaty is required. The current structures in place cannot begin to grapple with the complex underlying issues which are so crucial to the regulation of cryptocurrency. The substantive components of the proposed treaty undergird the very reason why a new multilateral treaty is necessary.

2017 ◽  
Vol 9 (1) ◽  
pp. 30-35
Author(s):  
Sunderi Pranata ◽  
Hargyo Tri Nugroho ◽  
Hirofumi Yamaki

It is known that password itself is not enough for formidable authentication method since it has a lot of vulnerabilities. Multi factor authentication (MFA) is introduced for the next generation for good authentication to address that issue. MFA combines two or more of three principles of good security, “something you know”, “something you have”, and “something you are”. Most MFA mechanisms work as one time passwords (OTP). However, they can still be vulnerable to phishing and MiTM attack. On top of that, OTP can be hard to use as it requires user to input another password given by the device (SMS, token, authenticator). Implemented in small USB U2F device, FIDO U2F delivers easier yet stronger security on authentication process which implements public key cryptography, challenge-response protocol, and phishing and MitM protection.  Index Terms— Authentication protocol, FIDO U2F, Multi factor authentication, OTP


2013 ◽  
Vol 9 (1) ◽  
Author(s):  
Willy Ristanto ◽  
Willy Sudiarto Raharjo ◽  
Antonius Rachmat Chrismanto

Cryptography is a technique for sending secret messages. This research builds an Android-based email client application which implement cryptography with Schmidt-Samoa algorithm, which is classified as a public key cryptography. The algorithm performs encryption and decryption based on exponential and modulus operation on text messages. The application use 512 and 1024 bit keys. Performance measurements is done using text messages with character number variation of 5 – 10.000 characters to obtain the time used for encryption and decryption process. As a result of this research, 99,074% data show that decryption process is faster than encryption process. In 512 bit keys, the system can perform encryption process in 520 - 18.256 miliseconds, and decryption process in 487 - 5.688 miliseconds. In 1024 bit keys, system can perform encryption process in 5626 – 52,142 miliseconds (7.388 times slower than 512 bit keys) and decryption process with time 5463 – 15,808 miliseconds or 8.290 times slower than 512 bit keys.


Author(s):  
Keith M. Martin

In this chapter, we introduce public-key encryption. We first consider the motivation behind the concept of public-key cryptography and introduce the hard problems on which popular public-key encryption schemes are based. We then discuss two of the best-known public-key cryptosystems, RSA and ElGamal. For each of these public-key cryptosystems, we discuss how to set up key pairs and perform basic encryption and decryption. We also identify the basis for security for each of these cryptosystems. We then compare RSA, ElGamal, and elliptic-curve variants of ElGamal from the perspectives of performance and security. Finally, we look at how public-key encryption is used in practice, focusing on the popular use of hybrid encryption.


Sign in / Sign up

Export Citation Format

Share Document