Cryptography-Based Authentication for Protecting Cyber Systems

Author(s):  
Xunhua Wang ◽  
Hua Lin

Entity authentication is a fundamental building block for system security and has been widely used to protect cyber systems. Nonetheless, the role of cryptography in entity authentication is not very clear, although cryptography is known for providing confidentiality, integrity, and non-repudiation. This chapter studies the roles of cryptography in three entity authentication categories: knowledge-based authentication, token-based authentication, and biometric authentication. For these three authentication categories, we discuss (1) the roles of cryptography in the generation of password verification data, in password-based challenge/response authentication protocol, and in password-authenticated key exchange protocols; (2) the roles of cryptography in both symmetric key-based and private key-based token authentications; (3) cryptographic fuzzy extractors, which can be used to enhance the security and privacy of biometric authentication. This systematic study of the roles of cryptography in entity authentication will deepen our understanding of both cryptography and entity authentication and can help us better protect cyber systems.

Cyber Crime ◽  
2013 ◽  
pp. 1778-1796
Author(s):  
Xunhua Wang ◽  
Hua Lin

Entity authentication is a fundamental building block for system security and has been widely used to protect cyber systems. Nonetheless, the role of cryptography in entity authentication is not very clear, although cryptography is known for providing confidentiality, integrity, and non-repudiation. This chapter studies the roles of cryptography in three entity authentication categories: knowledge-based authentication, token-based authentication, and biometric authentication. For these three authentication categories, we discuss (1) the roles of cryptography in the generation of password verification data, in password-based challenge/response authentication protocol, and in password-authenticated key exchange protocols; (2) the roles of cryptography in both symmetric key-based and private key-based token authentications; (3) cryptographic fuzzy extractors, which can be used to enhance the security and privacy of biometric authentication. This systematic study of the roles of cryptography in entity authentication will deepen our understanding of both cryptography and entity authentication and can help us better protect cyber systems.


2020 ◽  
Vol 8 (5) ◽  
pp. 5526-5532

Key exchange protocols play a vital role in symmetric key cryptography. The transfer of private key through the secured medium is a challenging task because every day the intruders are evolved and the attacks are increasing constantly. The existing key exchange protocols such as Diffie-Hellman, Elgamal, and MQV, etc. are the old methods and many attacks happened on those protocols. That challenges demanding new protocol or methodology of transferring secret key between the parties. The paper proposes a new, secured, less computational overhead key exchange mechanism using short message service available in the cellular networks. GSM-SMS is a highly established secured channel and the research uses this facility to transfer the key between senders to a receiver of the symmetric key cryptosystem. The private key no need to reveal to third parties or even the receiver because the sender can directly communicate to the decryption system through the mobile SMS. After the decryption process, the secret key will be destroyed immediately. There is no possible attack during the key transfer and loss and error of the communication are very less.


2015 ◽  
Vol 725-726 ◽  
pp. 996-1001
Author(s):  
Galina Tokunova ◽  
Alexander Petrov

The increased role of knowledge in the economics, the growth of the role of education and innovations caused the necessity to revise the role of the basic subjects in the market (the government, business structures, universities) and mechanisms of their interaction. The primary importance is now being shifted towards such subjects of innovations as resource centers, innovative businesses, technological platforms, the clusters capable of exerting efficient influence upon the innovations process, which, in its turn, improves the competitive ability of particular spheres of business and entire national economics. This process also influenced the construction industry. The purpose of this research is to analyze the manifestation of the phenomenon of the knowledge-based economics in the construction sphere. The tasks of this research: firstly, to highlight the evolution of the scientific discipline “knowledge-based economics”; secondly, to analyze the efficiency of the phenomenon on the example of the USA, the EC and Russia; thirdly, to analyze the innovative process in the construction sphere; fourthly, to highlight the role of various institutional structures (resource centers, innovative businesses, technological platforms, clusters) for innovative activity in the construction sphere.


2015 ◽  
Vol 19 (01) ◽  
pp. 1550001
Author(s):  
OLGA BRUYAKA ◽  
FIONA XIAOYING JI ◽  
LINDA F. TEGARDEN ◽  
DONALD E. HATFIELD ◽  
WILLIAM B. LAMB

We develop and test how business entities tap regional and corporate scientific knowledge for their innovations in a revolutionary technology. Building on the knowledge-based view of the firm, we argue that while both regional and corporate scientific knowledge may improve a business entity's innovation, it is the business entity's own accumulative research efforts that improve its ability to absorb regional scientific knowledge. In contrast, we expect and find that the longer the entity has been researching the revolutionary technology, the less likely corporate scientific knowledge will impact the focal entity's innovation. Our results support this theory regarding the moderating effect of a business entity's own accumulative research efforts with corporate scientific knowledge but not with regional knowledge. Further, we find different effects between regional scientific knowledge and innovation among single and multi-location firms.


2010 ◽  
Vol 171-172 ◽  
pp. 523-526
Author(s):  
Fu Lei Zhang

The Chinese government is pursuing e-learning policies which makes job-training with a knowledge-based society. To explain more fully the important role of the e-learning environment, this article undertakes some typical examples of the governments' job-training under e-learning environment. The main problems in servants' job-training in China are the low quantity in the servants' training, short of restriction, the uniform manner in the training and less fairness and availability of opportunities for educational training. In order to develop the e-learning system, the civil servant's job training policies are provided and the measures of the effective e-learning system are designed.


Author(s):  
Aurelija Čižauskaitė-Butkaliuk

In this century the management of the country is in a dynamic, multiplicity and controversial environment. For their competitiveness is necessary to look for the interaction between the knowledgebased economy and the sustainable development. A strong correlation between those objects.forces scientists to analyze, create new evaluation methodologies. The aim of this study – to examine the role of importance between knowledge–based economy and sustainable development, create and calculate an integrated sustainable knowledge–based economy index of Lithuania and according to the results or research, make proposes for more effective development of Lithuania’s sustainable knowledge–based economy. The index consists of Socio-economic, environmental, innovation, human resources and information and communications technology sub–indices..The calculation showed that the development of a knowledge–based economy is not sustainable, because not all the development of sub–indices.is the same. The biggest positive changes taking place in information and communication technology, and negative – socio-economic areas. The sustainable development of the knowledge–based economy in Lithuania since 2010 is growing up.


Author(s):  
Sabitha S ◽  
Binitha V Nair

Cryptography is an essential and effective method for securing information’s and data. Several symmetric and asymmetric key cryptographic algorithms are used for securing the data. Symmetric key cryptography uses the same key for both encryption and decryption. Asymmetric Key Cryptography also known as public key cryptography uses two different keys – a public key and a private key. The public key is used for encryption and the private key is used for decryption. In this paper, certain asymmetric key algorithms such as RSA, Rabin, Diffie-Hellman, ElGamal and Elliptical curve cryptosystem, their security aspects and the processes involved in design and implementation of these algorithms are examined.


Author(s):  
Howard Lee ◽  
Gregory Lee

In April 2000, soon after taking office, the Labour-Alliance coalition government announced the establishment of the Tertiary Education Advisory Commission (TEAC) with a brief to develop a strategic direction for tertiary education. After a decade of neoliberal policies of decentralisation and marketisation, this heralded a new policy direction that has been described as New Zealand’s version of the Third Way. The new direction was to take account of economic globalisation, technological change and the need for New Zealand to become a knowledge-based society. To this end, the TEAC produced four reports before completing its work at the end of 2001. This article reviews and critiques those reports and concludes that the TEAC’s proposals could produce a highly centralised and regulated system with the potential to destroy the independent role of the universities within a democratic society.


Sign in / Sign up

Export Citation Format

Share Document