The Electronic ID and the Voting Admission using a Cell Phone
|
|
- Tabitha Simon
- 5 years ago
- Views:
Transcription
1 The Electronic ID and the Voting Admission using a Cell Phone Tetsuji KOBAYASHI *, Jaewook KIM * and Norifumi MACHIDA * * Nippon Institute of Technology Department of Computer and Information Engineering Joho-Building, 4-1-1, Gakuendai, Miyashiro-machi, Saitama-ken, Japan ABSTRACT This paper proposes a personal identification method using a cell phone to improve the function of ID cards and also proposes the application to the electronic voting admission. The method is called as the electronic ID using a cell phone. The personal identification data are stored in the server. Each user receives the data from the server on each cell phone. The cell phone displays the text data (name, affiliation, etc.), face images and a two-dimensional The examiner checks the displayed information by using the examiner s terminal computer. The mechanism uses message authentication and encryption to establish the security among the server, the cell phone and the examiner s terminal. The mechanism of the proposed electronic ID can be applied to the electronic voting admission for improving the current voting admission system in the election of the national or local government. The proposed voting admission can improve the services for voters and decrease the cost for voting admission remarkably. Keywords: cell phone, personal identification, security, two-dimensional symbol, voting admission 1 INTRODUCTION Personal identification is important in various information systems. Plastic cards and smart cards are used as ID (identification) cards. In some countries including Japan, many people have color display cell phones. If a cell phone is used for personal identification, it is possible to show all of the identification information on the color display of the cell phone. Two-dimensional symbols are constructed by means of extending the functions of barcodes [1]. A twodimensional symbol has large recording capacity and error correction capability. There are various kinds of twodimensional symbols. Two-dimensional symbol can be classified as a stack type and a matrix type. The stack type symbol such as PDF417 is constructed by stacking multiple low-height barcodes. The matrix type symbol such as QR code is constructed to store a black or white pattern into a cell that corresponds to a pixel of an image. Although twodimensional symbols are used for a ticket such as an airline company, it has nothing to do with personal identification. By using the two-dimensional symbol for the personal identification system using a cell phone, the identification data can be quickly read from the two-dimensional symbol scanner attached to the examiner s terminal computer. The encryption and authentication techniques can be used for the security of the two-dimensional symbol [2]. The authors proposed a personal identification method using a cell phone for improving the function of ID cards, and the prototype was constructed and the evaluation was reported [3], [4]. There are local governments that use the electronic voting system in Japan [5]. However, the voting admission is out of scope. The mechanism of the proposed personal identification method can be applied to the voting admission for improving the current voting admission in the election of the central or local government. The electronic voting admission proposed in this paper can improve the services for the voters and can remarkably decrease the cost of the voting admission. 2 PERSONAL IDENTIFICATION 2.1 The Concept of the Electronic ID for Personal Identification The fundamental concept of the proposed personal identification method using a cell phone is summarized. (1) The personal identification data are stored in the database of a server (or a computer center). (2) Each user receives the personal identification data from the server on each cell phone. The time when the user receives the personal identification data depends on the application. It is possible for the user to request the personal identification data of the server. It is also possible that the server automatically sends the personal identification data to the cell phone at the appropriate time decided by the application. (3) The cell phone displays the personal identification data that consist of text data (name, address, etc.) and image data (face image, etc.). The examiner checks these data. (4) The cell phone additionally displays the two-dimensional symbol including the personal identification data. The purpose of the two-dimensional symbol is to read the data by the two-dimensional symbol scanner and automatically process the data at the terminal computer of the examiner. (5) The encryption and authentication techniques are used for the security of the two-dimensional symbol in the cell
2 phone. Additionally, the two-dimensional symbol can include the timestamp to limit the time interval for the personal identification data. (6) The personal identification is performed not only when the examiner s terminal can communicate with the server (i.e., on-line identification), but also when the examiner s terminal cannot communicate with the server on account of its failure (i.e., off-line identification). 2.2 Main Problems and Solutions Main problems and solutions to implement the proposed concept are described as follows. Problem-1: The transmission data from the server to the cell phone such as the ordinary compressed face image and the personal text data cannot be encrypted in many cases because most of cell phones do not have encryption and decryption functions for data. The solution for problem-1: The authentication code is generated for the ordinary compressed face image and the personal text data, and it is stored in the two-dimensional The data stored in the two-dimensional symbol are encrypted. The examiner s terminal can read the twodimensional symbol from the scanner and decrypt the data. The personal text data transmitted from the server to the cell phone without encryption are limited to the public basic personal data. The secret detailed personal data with encryption are stored in the two-dimensional Problem-2: When the examiner s terminal is unable to communicate with the server because of failures, it should perform personal authentication by only using the displayed information of the user s cell phone. The solution for problem-2: All of the data for personal identification are stored in the two-dimensional Problem-3: Since the size of the two- dimensional symbol displayed on a cell phone is small because of its display size, the ordinary compressed face image is too large to store in the two-dimension The solution for problem-3: The highly compressed face image with high compression rate is stored in the twodimensional Problem-4: The personal text data can be divided into the public basic text data (name, user ID, affiliation), and the secret detailed text data (name, user ID, affiliation, birth date, telephone number, address, etc.). (Note: The secret detailed text data include the public basic text data.) The solution for problem-4: The text data transmitted to the user's cell phone from the server by without enciphering are the public basic text data. Since the secret detailed text data include privacy information, they are enciphered and stored in the two-dimensional Problem-5: The data from the server to the examiner s terminal consist of the downloaded data from the server and the data obtained from the two-dimensional symbol displayed on the cell phone. These data can be categorized as the duplicated data and the non-duplicated data. It is necessary to certify the correctness and minimize the processing amount and the transmitted data amount. The solution for problem-5: The scheme to use multiple message authentication codes (or digital signatures) is devised. 2.3 Proposed Method for the Electronic ID The proposed electronic ID for personal identification using a cell phone is described in detail in this chapter. Main elements for the proposed method are shown in Fig. 1. (MAC: Message Authentication Code). Public basic personal text data. [Download] [Server] Ordinary compressed face image. MAC-B MAC-A (copy) Examiner s terminal. Two-dimensional symbol scanner. [ or download] Fig. 1: Main elements for the proposed method. 2.4 The Server Two-dimensional Secret detailed personal text data. Highly compressed face image. MAC-A User s cell phone. (1) The examiner produces an ordinary compressed face image and a highly compressed face image by using the face image of the user. Each of compressed face images has each compression rate. The user ID is embedded in the ordinary compressed face image by using digital watermarking to protect it from the intruder of the server. (2) The server obtains the public basic personal text data (name, user ID, and affiliation), the ordinary compressed face image, and the data for the two-dimensional The data for the two-dimensional symbol consist of the following data: the highly compressed face image and the secret detailed personal text data (name, user ID, affiliation,
3 birth date, phone number, address, creation date, expiration date, and other additional data). (3) The server creates MAC-A as the message authentication code (or digital signature) for the data of the twodimensional symbol such as the highly compressed face image and the secret detailed personal text data. (4) The server creates MAC-B as the message authentication code (or digital signature) for the transmission data to the cell phone and the examiner s terminal such as the public basic personal text data (name, user ID, and affiliation), the ordinary compressed face image, and the data for the twodimensional (5) The server encrypts the secret detailed personal text data, the highly compressed face image and MAC-A. The server stores the encrypted data in the two-dimensional (6) The server transmits the ordinary compressed face image, the public basic personal text data and the two-dimensional symbol, to the cell phone. These data are transmitted by from the server (or downloaded by the user from the Web browser of the cell phone). (7) Both of the encryption key and the authentication key are shared between the server and the examiner s terminal. The method to verify the communication among the server, the cell phone and the examiner s terminal is shown in Table 1. Table 1: The method to verify the communication. Items for verification. The method for verification by using multiple message authentication codes. The correctness of the The concordance between the two-dimensional MAC-A in the two-dimensional symbol transmitted to symbol and the MAC generated the cell phone from from the data in the twodimensional the server. The correctness of the downloaded data to the terminal from the server. The correctness between the downloaded data and the displayed data on the cell phone 2.5 The Cell Phone of the User The concordance between the MAC-B in the downloaded data and the MAC generated from the downloaded data. The concordance between the MAC-A in the two-dimensional symbol of the cell phone and the copy of MAC-A that is stored in the downloaded data. (1) The cell phone of the user receives the ordinary compressed face image, the public basic personal text data and the two-dimensional symbol from the server. (2) The user displays and shows the public basic personal text data, the ordinary compressed face image, and the twodimensional symbol on the cell phone according to the guidance of the examiner. 2.6 On-line Identification by the Examiner The on-line identification is the personal identification when the examiner s terminal computer can communicate with the server. The procedure is described as follows. (1) The examiner s terminal downloads the public basic personal text data, the secret detailed personal text data, the ordinary compressed face image, the highly compressed face image, the MAC-B and the copy of MAC-A. These data are protected by the SSL (secure sockets layer) protocol. (2) The examiner s terminal reads the two-dimensional symbol on the cell phone from the two-dimensional symbol scanner. The data in the two-dimensional symbol are decoded and stored in the examiner s terminal. (3) The examiner s terminal verifies the MAC-B by creating the new MAC-B. It also verifies the copy of MAC-A obtained from the server and the MAC-A obtained from the two-dimensional symbol obtained from the cell phone. When they are correct, this procedure continues to the next. (4) The examiner s terminal verifies the MAC-A by creating the new MAC-A from the data in the two-dimensinal (5) The examiner s terminal displays the secret detailed personal text data and the ordinary compressed face image. The examiner checks the correctness of the displayed data and the live face image of the user of the cell phone. 2.7 Off-line Identification by the Examiner The off-line identification is necessary when the examiner s terminal cannot communicate with the server on account of the failure of the server or the communication line. The procedure for the off-line identification is described as follows. The data in the two-dimensional symbol are obtained and decrypted. The MAC-A is verified by using only the data stored in the two-dimensional The secret detailed personal text data and the highly compressed face image are displayed on the examiner s terminal. The examiner checks the data, and checks the face image by looking at the live face. The result is recorded and shall be dually verified when the examiner s terminal is able to access the server. Although the on-line identification uses the ordinary compressed face image, the off-line identification uses the highly compressed face image because the two-dimensional symbol has a capacity limit such as the maximum value is about 2,000 bytes for the current cell phone and the two-dimensional symbol scanner. 2.8 Merits of the Electronic ID The proposed personal identification method using a cell phone has the following merits. As the face image displayed on the cell phone is large enough in comparison with the photograph size of the ordinary plastic ID card, the precision increases when the examiner compares the displayed face image to the live face. As the personal identification data can
4 be directly read from the two-dimensional symbol scanner, the data can be automatically processed by the examiner s terminal. The cost to produce ID cards is decreased because no ID card is used. By using the two-dimensional symbol for the ID system using a cell phone, the forgery becomes difficult and the time for checking the contents of the ID data is reduced. The attacks and counter measures with regard to the proposed electronic ID are shown in Table 2. Table 2: The attacks and counter measures with regard to the proposed electronic ID. Attacks Counter measures against the attacks The attacker may access This attack can be defended the fraudulent Web site when the correct Web site created by the attacker, and attaches the authentication the attacker may display code for the data in the the fake data on the display two-dimensional of the cell phone. The attacker displays the two-dimensional symbol that is illegally obtained from the correct person s cell phone, or copied from the display. The intruder for the server modifies the personal identification data in the database of the server. Since the face image is displayed on the cell phone, the checking person can compare the face image to the live face. It is very difficult to intrude the secure server, to modify the personal identification data, and to generate the twodimensional 3 THE ELECTRONIC VOTING ADMISSION 3.1 Problems of the Voting Admission The proposed identification method can be applied to various applications. This paper proposes a voting admission method for the elections of national or local governments. A set of voting admission tickets for each voter is mailed to each household that consists of one or more voters in the elections of Japan. Each voter goes to each specified voting place with the voting admission ticket, and the voter receives a ballot sheet to cast a vote in exchange for the voting admission ticket at the specified voting place. However, there are following problems in the current voting admission system. [Problem-A]: Since the admission ticket is mailed earlier than the day of election, there are voters who may lose the voting admission ticket. [Problem-B]: Since two or more voting places are printed on the voting admission ticket and one of them is specified for each voter (the purpose is to decrease the printing cost), there is a voter who mistakes the specified voting place. [Problem-C]: Since each staff at the voting place compares manually the name of the admission ticket to the thick list of voters, a voter may sometimes have a long waiting time. [Problem-D]: Since the number of voters is very large, the cost for printing and mailing the voting admission tickets is huge in each election. 3.2 The Electronic Voting Admission We propose the electronic voting admission by using a cell phone that coexists with the current voting admission ticket by postal mail. (1) Overview If a voter wishes to receive an electronic voting admission ticket with the cell phone, the voter registers the address to the election administration committee of the national or local government depending on the kind of election in advance. The server transmits the basic text data for voting (voting kind, voting date, voting place, voter s name), the simple map of the voting place, and the twodimensional symbol that includes the detailed text data for voting (voter s name, address, voting place, and the message authentication code (or digital signature)), to the cell phone of the voter. The voter shows the two-dimensional symbol displayed on the cell phone to the staff at the voting place. The terminal computer reads the two-dimensional symbol displayed on the cell phone from the two-dimensional symbol scanner, and checks the correctness of the voter based on the data obtained from the two-dimensional symbol and the pre-downloaded data from the server. Since the check of the facial photograph of each voter is not performed at the present election, the check of each face image is the optional function. The displayed text data of the voter on the cell phone are minimized such as the voter s name and the voting place, and the detailed voter s text data are encrypted and stored in the two-dimensional The display of the electronic voting admission ticket of the voter s cell phone is shown in Fig. 2. The feature of the electronic voting admission ticket is shown in Table 3. This table compares the basic personal identification method described in section 2 to the electronic voting admission. The basic text data of the voter. The map of the voting place. Two-dimensional symbol including the voter s data. Fig. 2: The electronic voting admission ticket.
5 Table 3: The feature of the electronic admission ticket. Methods The basic personal The electronic identification voting admission. Items method. Off-line Possible. Possible. identification. On-line Possible. identification. Identification by face image. The data included in the to the cell phone. The data stored in the twodimensional The downloading scheme from the server to the terminal. The download data from the server to the terminal of the voting place. Possible. The basic text data for personal identification, and the twodimensional The basic text data for identification, the detailed text data for identification, and the highly compressed face image. Real-time download or pre-download. The basic text data for identification, the detailed text data for identification, and the ordinary compressed face image. Option. The basic text data for the voting admission, the simple map of the voting place, and the two-dimensional The basic text data for the voting admission, the detailed text data for the voting admission, and the data of the voting place. Pre-download. The list of voters for each voting place. Accordingly, the problem-a is resolved by storing the for the electronic admission in the cell phone. The problem-b is resolved by describing only one place in the map of the voting place. The problem-c is resolved by storing the list of voters in the terminal computer, and by checking the correspondence between the data of the voting admission ticket and the list of voters in the terminal computer. The concept of the electronic voting admission is shown in Fig. 3. Server of the election administration committee. The list of voters. The data of the electronic voting admission. [Pre-download] List of voters. [Voting place] Terminal computer. Scanner. [ ] Fig. 3: The concept of the electronic voting admission. (2) The Security The attacks and countermeasures against the voting admission schemes are shown in Table 4. Table 4: Attacks and countermeasures against the voting admission. Methods The electronic voting admission by using a cell phone. Attacks or errors The erratic delivery. The attacker steals the voting admission ticket. The attacker votes more than one time. The attacker gives a true or fake voting admission ticket to the other person. The address should be managed precisely. This case does not occur. This case can be detected at the voting place. The other person can vote when the personal identification at the voting place is incomplete. (The face check is desirable.) The basic data for voting. Simple map. Two-dimensional Voter s cell phone. The present voting admission by postal mail. The erratic delivery may occur because of the mailman s mistake. The attacker may steal the voting admission ticket from the mailbox. This case can be detected at the voting place. The other person can vote when the personal identification at the voting place is incomplete. (The face check is desirable.)
6 (3) Cost In order to investigate the Problem-D, let us discuss about the cost for the voting admission. The comparison of the voting admission tickets is shown in Table 5. Table 5: The comparison of voting admission tickets. Methods Items The electronic voting admission by using the cell phone. The voting admission by postal mail. The server for the voting management. To print the voting admission tickets. To distribute the voting admission tickets. The terminal computer for checking each voter in each voting place. The number of staff to check the voting admission ticket. The voter s payment for the voting admission. The time and transportation expenses for the voter. . Relatively small. A little payment occurs when the voter receives the . Postal mail. Relatively large. According to the election administration committee in the certain large city in Japan,, the expense of the voting admission tickets for the national election of the House of Councilors in July 2004 is as follows. The total printing cost for voting admission tickets is about JPY 4,700,000 (about US$ 47,000, when US$ 1.00 is assumed to be JPY 100 (Japanese yen)). The total mailing cost for voting admission tickets is about JPY 21,500,000 (about US$ 215,000). The number of voters in the day of election is 840,947. (The number of households is 435,795 in the data of November 2004.) Therefore, we obtain the following result. The printing and mailing cost of the current voting admission ticket per voter = (4,700,000+21,500,000) / 840,947 (JPY / voter) (JPY / voter) (US$ / voter). Although the cost depends on each election region, it is appropriate to refer the result because the city is a typical big city in Japan. Let us consider the effect for all over Japan. According to the data of the Ministry of Internal Affairs and Communications, the population of Japan in the year of 2000 is about 126,140,000 and the total number of voters (20 or more years old) is about 100,910,000. Therefore, when all voters use the electronic voting admission tickets, the decreasing cost for one election = 100,910,000 (voters) (JPY / voter) = JPY 3,143,851,050 US$ 31,438,510. As for the electronic voting admission, the printing cost and the postal mail cost are zero. Therefore, the total cost for voting admission becomes remarkably decreases when the number of voters that use the electronic voting admission increases. The increasing cost is discussed as follows. The data consists of the small text data, the small linedrawing map and the two-dimensional When the optional face image is used for authentication, it can be downloaded from the server. Therefore, the amount of data of the electronic voting admission ticket that are transmitted from the server to the cell phone is small. For example, the amount of data of the electronic voting admission transmitted from the server to the cell phone is calculated as follows based on the prototype. The detailed text data of the voting admission such as the voter name, the voter address, the voter s birth date, and the voting place are 61 bytes, the size of the map is 526 bytes and the size of the twodimensional symbol is 550 bytes, the total data amount is 1,137 bytes, and these data needs 8.8 packets. The payment for 8.8 packets is very small although it depends on each cellular phone company, (e.g., about JPY 1.0 (about US$ 0.01) for a cellular company). 4 CONCLUSION An electronic ID system for personal identification using a cell phone has been proposed. The two-dimensional symbol scanner can quickly read the electronic ID data, and the security of the electronic ID data is improved. The mechanism of the proposed personal identification method can be applied to the electronic voting admission for improving the services and decreasing the cost of the present voting admission in the election of national or local governments. REFERENCES [1] [2] B. Schneier, Applied cryptography, Second Edition, John Willey & Sons, Inc., (1996). [3] J. Kim and T. Kobayashi: Personal identification using a cell phone and the security, Proceedings of the 2004 Symposium on Cryptography and Information Security (SCIS2005), pp , IEICE, Japan, (Jan. 2004),. [4] N. Machida, J. Kim, and T. Kobayashi: An Electronic ID System using a Cell Phone and Its Evaluation, Proceedings of the Second IASTED International Conference on Communication, and Computer Networks (CCN2004), USA, IASTED, ACTA press, pp , (Nov. 2004). [5]
Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1
Enhancing Security in Identity Documents Using QR Code RevathiM K 1, Annapandi P 2 and Ramya K P 3 1 Information Technology, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamilnadu628215, India
More informationAuthentication Technologies
Authentication Technologies 1 Authentication The determination of identity, usually based on a combination of something the person has (like a smart card or a radio key fob storing secret keys), something
More informationSecurity Technologies for Dynamic Collaboration
Special Issue Advanced Technologies Driving Dynamic Collaboration Featuring System Technologies Security Technologies for Dynamic Collaboration By Hiroshi MIYAUCHI,* Ayako KOMATSU, Masato KAWATSU and Masashi
More informationPrivacy Policy. Implemented on: November 2, 2017
Implemented on: November 2, 2017 Privacy Policy STH JAPAN K.K. (the "Company") will strictly control any personal information received from you (the "User(s)") via the website https://hospitality.rugbyworldcup.com/
More informationE-Voting System based on Mobile using NIC and SIM
E-Voting System based on Mobile using NIC and SIM Balaji Ghate Satish Talewar Sanket Taware J. V. Katti college of Engg. ABSTRACT Mobile is emerging technology and center of attraction for worldwide end-user.
More informationCrypto meets Web Security: Certificates and SSL/TLS
CSE 484 / CSE M 584: Computer Security and Privacy Crypto meets Web Security: Certificates and SSL/TLS Spring 2016 Franziska (Franzi) Roesner franzi@cs.washington.edu Thanks to Dan Boneh, Dieter Gollmann,
More informationBCA III Network security and Cryptography Examination-2016 Model Paper 1
Time: 3hrs BCA III Network security and Cryptography Examination-2016 Model Paper 1 M.M:50 The question paper contains 40 multiple choice questions with four choices and student will have to pick the correct
More informationApplication for anonymous registration. How do I register as an anonymous elector? Returning the form. More information
Application for anonymous registration You need to be on the electoral register to vote in elections and referendums. If the safety of you (or someone in your household) would be at risk if your name or
More informationNexStamp. Frequently Asked Questions. (click anywhere to continue) Trusted Digital Originals TM
NexStamp Trusted Digital Originals TM Frequently sked Questions (click anywhere to continue) What is a digital signature? 3 Can digital signatures appear on their corresponding documents? 4 Can a digital
More informationOverview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet. SSL ensures the secure transmission of data between a client and a server through
More informationSecure Sockets Layer (SSL) / Transport Layer Security (TLS)
Secure Sockets Layer (SSL) / Transport Layer Security (TLS) Brad Karp UCL Computer Science CS GZ03 / M030 20 th November 2017 What Problems Do SSL/TLS Solve? Two parties, client and server, not previously
More informationGUIDELINES FOR ONLINE APPLICANTS
Amrita Entrance Examination Engineering 2017 GUIDELINES FOR ONLINE APPLICANTS B.Tech. PROGRAMMES Amrita B.Tech aspirants can register for the 2017 Amrita Entrance Examination - Engineering in a few simple
More informationComputers and Security
The contents of this Supporting Material document have been prepared from the Eight units of study texts for the course M150: Date, Computing and Information, produced by The Open University, UK. Copyright
More informationSecurity Digital Certificate Manager
System i Security Digital Certificate Manager Version 6 Release 1 System i Security Digital Certificate Manager Version 6 Release 1 Note Before using this information and the product it supports, be sure
More informationThreat Assessment Summary. e-voting, Admin, and pvoting TOE s
Threat Assessment Summary e-voting, Admin, and pvoting TOE s, 2011 Page 1 of 22 Source Code, High Level Architecture Documentation and Common Criteria Documentation Copyright (C) 2010-2011 and ownership
More informationIBM. Security Digital Certificate Manager. IBM i 7.1
IBM IBM i Security Digital Certificate Manager 7.1 IBM IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in
More informationPRODUCT AUTHENTICATION USING QR-CODE THROUGH CLOUD
PRODUCT AUTHENTICATION USING QR-CODE THROUGH CLOUD Prof. Sagar Thakare Assistant Professor, ABSTRACT Mr. Vighnesh Gadekar Mr. Mandar Gharat The development of a new product or technology always comes with
More informationE-commerce security: SSL/TLS, SET and others. 4.1
E-commerce security: SSL/TLS, SET and others. 4.1 1 Electronic payment systems Purpose: facilitate the safe and secure transfer of monetary value electronically between multiple parties Participating parties:
More informationDEVELOPMENT AND EVALUATION OF A SYSTEM FOR CHECKING FOR IMPROPER SENDING OF PERSONAL INFORMATION IN ENCRYPTED
DEVELOPMENT AND EVALUATION OF A SYSTEM FOR CHECKING FOR IMPROPER SENDING OF PERSONAL INFORMATION IN ENCRYPTED E-MAIL Kenji Yasu 1, Yasuhiko Akahane 2, Masami Ozaki 1, Koji Semoto 1, Ryoichi Sasaki 1 1
More informationChapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010
Cryptography Chapter 8 Network Security Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security An Introduction
More informationOneID An architectural overview
OneID An architectural overview Jim Fenton November 1, 2012 Introduction OneID is an identity management technology that takes a fresh look at the way that users authenticate and manage their identities
More informationImplementing Security in QR Codes by using Blowfish Algorithm
Implementing Security in QR Codes by using Blowfish Algorithm Harpreet Sandhu 2, Kamesh Dubey 2 1 (Dept of Computer Science, CT Institute of Technology & Research, Jalandhar, Punjab, India) 2 (Dept of
More informationIBM i Version 7.2. Security Digital Certificate Manager IBM
IBM i Version 7.2 Security Digital Certificate Manager IBM IBM i Version 7.2 Security Digital Certificate Manager IBM Note Before using this information and the product it supports, read the information
More informationRadius, LDAP, Radius, Kerberos used in Authenticating Users
CSCD 303 Lecture 5 Fall 2018 Radius, LDAP, Radius, Kerberos used in Authenticating Users Kerberos Authentication and Authorization Previously Said that identification, authentication and authorization
More informationAbstract. 1. Introduction
Supporting Signatures in Mobile Environments Scott Campbell Department of Computer Science and Systems Analysis, Miami University scott@cc-campbell.com Abstract s, like physical s, can verify that a specific
More informationSecurity & Privacy. Web Architecture and Information Management [./] Spring 2009 INFO (CCN 42509) Contents. Erik Wilde, UC Berkeley School of
Contents Security & Privacy Contents Web Architecture and Information Management [./] Spring 2009 INFO 190-02 (CCN 42509) Erik Wilde, UC Berkeley School of Information Abstract 1 Security Concepts Identification
More informationAmrita Entrance Examination Engineering 2016
Amrita Entrance Examination Engineering 2016 GUIDELINES FOR THE B-TECH PROGRAMME APPLICANTS Amrita B.Tech aspirants can register for the 2016 Amrita Entrance Examination - Engineering in a few simple steps.
More informationImplementation of Aadhaar Based EVM
Implementation of Aadhaar Based EVM Kiran Chavan 1, Kashinath Raut 2, Ashish Bhingardive 3, Yogesh Kolape 4, D. M. Ujalambkar 5 1, 2, 3, 4, 5 Computer Department, Savitribai Phule Pune University Abstract:
More informationChapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads
Cryptography p y Chapter 8 Network Security Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security An Introduction
More information2 Electronic Passports and Identity Cards
2 Picture source: www.bundesdruckerei.de Paper based Passport Radio Frequency (RF) Chip Electronic Passport (E Pass) Biographic data Human readable Partially machine readable (optically) Conventional
More informationThe World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to
1 The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to compromises of various sorts, with a range of threats
More informationISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Biometric information protection
INTERNATIONAL STANDARD ISO/IEC 24745 First edition 2011-06-15 Information technology Security techniques Biometric information protection Technologies de l'information Techniques de sécurité Protection
More informationImplementation of Security in Cloud Systems Based using Encryption and Steganography
Implementation of Security in Cloud Systems Based using Encryption and Steganography 1 A.Mahesh Babu, 2 G.A. Ramachandra, 3 M.Suresh Babu 1,2 Department of Computer Science & Technology, Sri Krishnadevaraya
More informationBIOMETRIC BASED VOTING MACHINE
Impact Factor (SJIF): 5.301 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 5, Issue 4, April-2018 BIOMETRIC BASED VOTING MACHINE
More information903i Application Functions
NTT DoCoMo Technical Journal Vol. 8 No.4 903i Application Functions Junko Hiraishi, Ema Tohriyama, Eiji Yano and Yoshimasa Nishimura The FOMA 903i Series supports a number of new application functions,
More informationQuick Guide for Mynaportal
Quick Guide for Mynaportal Introduction of Mynaportal and About This Guide Mynaportal is an online service managed by the government of Japan. You can apply to services online related to parenting by the
More informationVETS FIRST CHOICE PRIVACY POLICY FOR PARTICIPATING VETERINARY PRACTICES
VETS FIRST CHOICE PRIVACY POLICY FOR PARTICIPATING VETERINARY PRACTICES PLEASE READ THIS PRIVACY POLICY CAREFULLY BEFORE USING THIS SITE. Last Updated: January 01, 2015 Direct Vet Marketing, Inc. (hereinafter,
More informationAutomotive Security An Overview of Standardization in AUTOSAR
Automotive Security An Overview of Standardization in AUTOSAR Dr. Marcel Wille 31. VDI/VW-Gemeinschaftstagung Automotive Security 21. Oktober 2015, Wolfsburg Hackers take over steering from smart car driver
More informationA Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques
Bashar S. Mahdi Alia K. Abdul Hassan Department of Computer Science, University of Technology, Baghdad, Iraq A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and
More informationREQUIREMENTS, DESIGN AND IMPLEMENTATION OF AN E-VOTING SYSTEM
REQUIREMENTS, DESIGN AND IMPLEMENTATION OF AN E-VOTING SYSTEM Ghassan Z. Qadah American University of Sharjah United Arab Emerites ABSTRACT The rapid advancement in database, web and wireless technologies
More informationISO/IEC Information technology Automatic identification and data capture techniques Bar code scanner and decoder performance testing
INTERNATIONAL STANDARD ISO/IEC 15423 First edition 2004-06-15 Information technology Automatic identification and data capture techniques Bar code scanner and decoder performance testing Technologies de
More informationETSI TS V6.1.0 ( )
TS 102 224 V6.1.0 (2004-12) Technical Specification Smart cards; Security mechanisms for UICC based Applications - Functional requirements (Release 6) 2 TS 102 224 V6.1.0 (2004-12) Reference RTS/SCP-R0282r1
More informationExpress Order Entry Neighbourhood Mail Generic Solution
Express Order Entry Neighbourhood Mail Generic Solution Table of Contents (revised Jan./2018) 1.0 Introduction...3 About Express Order Entry: Neighbourhood Mail Generic Solution... 3 Login to the Express
More informationAlberta Municipal Elections Guide for Returning Officers
Alberta Municipal Elections Guide for Returning Officers Every four years, on the third Monday in October, Alberta residents have the opportunity to elect their municipal representatives. Many aspects
More informationAn efficient access control method for composite multimedia content
IEICE Electronics Express, Vol.7, o.0, 534 538 An efficient access control method for composite multimedia content Shoko Imaizumi,a), Masaaki Fujiyoshi,andHitoshiKiya Industrial Research Institute of iigata
More informationSection 6. Registering a New Voter 5/11/2018
57 Section 6 Registering a New Voter Registering a New Voter 58 When a voter cannot be found after numerous voter search attempts, the voter must complete a Colorado Voter Registration Form to register
More informationAirSIMS Visuals Draft Presentation
AirSIMS Visuals Draft Presentation Felix Keng Fong Cheong Kelly Jung Scott Moura Wai Leung William Wong November 16, 2005 A System of Systems Population Movement Infectious Diseases AirSIMS Structural-Health
More informationASSEMBLY ELECTION 2018 Karnataka
ASSEMBLY ELECTION 2018 Karnataka Ver 1.2 Information and Link as on Prepared by : NIJU ABRAHAM, PSA & ADIO, NIC, KARWAR UNDER THE GUIDANCE OF DEO, UTTARA KANNADA, KARNATAKA e-postal Ballot 1 Service Voters'
More informationSSL/TLS. How to send your credit card number securely over the internet
SSL/TLS How to send your credit card number securely over the internet The security provided by SSL SSL is implemented at level 4 The transport control layer In practice, SSL uses TCP sockets The underlying
More informationETSI TS V8.0.0 ( )
TS 101 180 V8.0.0 (2000-05) Technical Specification Digital cellular telecommunications system (Phase 2+); Security mechanisms for the SIM Application Toolkit; Stage 1 (GSM 02.48 version 8.0.0 Release
More informationSystems Analysis and Design in a Changing World, Fourth Edition
Systems Analysis and Design in a Changing World, Fourth Edition Learning Objectives Discuss examples of system interfaces found in information systems Define system inputs and outputs based on the requirements
More informationNetwork Security and Cryptography. 2 September Marking Scheme
Network Security and Cryptography 2 September 2015 Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers to the questions,
More informationFirewall-Friendly VoIP Secure Gateway and VoIP Security Issues
Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues v Noriyuki Fukuyama v Shingo Fujimoto v Masahiko Takenaka (Manuscript received September 26, 2003) IP telephony services using VoIP (Voice
More informationBut where'd that extra "s" come from, and what does it mean?
SSL/TLS While browsing Internet, some URLs start with "http://" while others start with "https://"? Perhaps the extra "s" when browsing websites that require giving over sensitive information, like paying
More informationCryptography (Overview)
Cryptography (Overview) Some history Caesar cipher, rot13 substitution ciphers, etc. Enigma (Turing) Modern secret key cryptography DES, AES Public key cryptography RSA, digital signatures Cryptography
More informationHF Markets SA (Pty) Ltd Protection of Personal Information Policy
Protection of Personal Information Policy Protection of Personal Information Policy This privacy statement covers the website www.hotforex.co.za, and all its related subdomains that are registered and
More informationCost Minimization by QR Code Compression
Cost Minimization by QR Code Compression Sharu Goel #1, Ajay Kumar Singh *2 #1 M. Tech Student & CSE Deptt., Meerut Institute of Engineering and Technology, Baghpat Bypass Road, NH- 58, Meerut, UPTU, (India)
More informationECA Trusted Agent Handbook
Revision 8.0 September 4, 2015 Introduction This Trusted Agent Handbook provides instructions for individuals authorized to perform personal presence identity verification of subscribers enrolling for
More informationGSCCCA Notary Online. User Manual
GSCCCA Notary Online User Manual Created By: Richard McPhaul Last Edited: November 2, 2009 History and Overview of Notary Online The Notary Online program is a voluntary program developed by the GSCCCA
More informationElector8 Training and Instruction Document New Elector Wizard
Elector8 Training and Instruction Document New Elector Wizard Version Control Version No. Author Change Details Date 1.0.0 S Verdon Initial Version of Elector8 Manual October 2010 1.3.1 M Warner Review
More informationUse of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography
Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography K.S.Seethalakshmi (Department of Computer Science and Engineering, RVCE / VTU, INDIA) ABSTRACT : As a result of
More informationELECTRIC APP - PRIVACY POLICY
By accessing the website at http://electricchats.com ( Electric Site ) or any Electric mobile application (e.g., Electric ios, or Electric Android,) ( Electric App ) (collectively, the Electric Service
More informationBCOCA Frequently Asked Questions. Implementation Tips for Producing Bar Codes with the Bar Code Object Content Architecture
AFP Color Consortium BCOCA Frequently Asked Questions Implementation Tips for Producing Bar Codes with the Bar Code Object Content Architecture Version 1.0 Page 1 of 11 Editor: David E. Stone, IBM Corporation
More informationQR Code as Private Key on El Gamal Algorithm
QR Code as Private Key on El Gamal Algorithm Ridho Akbarisanto - 13511005 Program Studi Teknik Informatika Sekolah Teknik Elektro dan Informatika Bandung, Indonesia ridho.akbarisanto@yahoo.com Abstract
More informationAn Implementation of a Paper Based Authentication Using HC2D Barcode and Digital Signature
An Implementation of a Paper Based Authentication Using HC2D Barcode and Digital Signature Puchong Subpratatsavee, Pramote Kuacharoen To cite this version: Puchong Subpratatsavee, Pramote Kuacharoen. An
More informationReplacement Certificate/ID Request Form. Use one form per course - all sections of the form must be completed unless otherwise stated.
Replacement Certificate/ID Request Form Use one form per course - all sections of the form must be completed unless otherwise stated. PLEASE WRITE CLEARLY IN BLOCK CAPITALS AND BLACK INK 1. Authorized
More informationXenApp 5 Security Standards and Deployment Scenarios
XenApp 5 Security Standards and Deployment Scenarios 2015-03-04 20:22:07 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents XenApp 5 Security Standards
More informationNATIONAL REGISTRY OF CERTIFIED CHEMISTS 125 Rose Ann Lane, West Grove, PA (phone) / (fax) /
NATIONAL REGISTRY OF CERTIFIED CHEMISTS 125 Rose Ann Lane, West Grove, PA 19390 610-322-0657 (phone) / 800-858-6273 (fax) / rphifer@nrcc6.org (email) 1 APPLICATION FOR CERTIFICATION AS A TOXICOLOGICAL
More informationHuman-Machine Identification Using Visual Cryptography
Human-Machine Identification Using isual Cryptography Mi-Ra Kim* Ji-Hwan Park* Yuliang Zheng** * Dept of Computer Science, PuKyong National University, 599- Daeyeon-Dong, Nam-Ku, Pusan 608-737, Korea {kimmr,jhpark}@unicornpknuackr
More informationFederal Voting Assistance Program (FVAP)
16th Annual Computer Security Application Conference (ACSAC) December 2000 Federal Voting Assistance Program (FVAP) Provide Background on VOI Pilot Effort Provide High Level Technical Overview Security
More informationSankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank
Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology Question Bank Subject: Information Security (160702) Class: BE Sem. VI (CE/IT) Unit-1: Conventional
More informationOperating Systems Design Exam 3 Review: Spring Paul Krzyzanowski
Operating Systems Design Exam 3 Review: Spring 2012 Paul Krzyzanowski pxk@cs.rutgers.edu 1 Question 1 An Ethernet device driver implements the: (a) Data Link layer. (b) Network layer. (c) Transport layer.
More informationSYSTEM AND METHOD FOR FACILITATING SECURE TRANSACTIONS
FCOOK.001PR PATENT SYSTEM AND METHOD FOR FACILITATING SECURE TRANSACTIONS BRIEF DESCRIPTION OF THE DRAWINGS [0001] Embodiments of various inventive features will now be described with reference to the
More informationOutgoing Ltd Official Ticketing Agent Terms and Conditions
Outgoing Ltd Official Ticketing Agent Terms and Conditions In these terms and conditions "Outgoing" refers to Outgoing Ltd. Outgoing sells all tickets as an agent on behalf of the organisers and Outgoing
More informationComparison of Electronic Signature between Europe and Japan: Possibiltiy of Mutual Recognition
Comparison of Electronic Signature between Europe and Japan: Possibiltiy of Mutual Recognition 1 Soshi Hamaguchi, 1 Toshiyuki Kinoshita, 2 Satoru Tezuka 1 Tokyo University of Technology, Tokyo, Japan,
More informationFlexepin Cash Topup Vouchers. API based Business UAT
Flexepin Cash Topup Vouchers API based Business UAT Document History Revision Description of Change Date Author 1.0 UAT Flexepin API 10-Nov-15 GB 1.1 Minor rewording 05 Jan 2016 ED 1.2 Amended test cases
More informationPAYMENT FORM. Name of Cardholder: Service Selected: (please select one below) Signature: Domestic
Mail forwarding services can be a critical component of the successful operation of any business. For your convenience we are offering two (2) mail forwarding options. You may select the option that best
More informationMobile verification. If your Mobile Number is correct, click Get Code.
KYC Process To complete your KYC (Know Your Customer) verification, please login to your Back Office. Navigate to Support KYC- Status and the following submenus (as stated on top of every section) to perform
More informationCertificate-based authentication for data security
Technical white paper Certificate-based authentication for data security Table of Contents Introduction... 2 Analogy: A simple checking account... 2 Verifying a digital certificate... 2 Summary... 8 Important
More informationELECTRONIC POLL BOOK INSTRUCTIONS
ELECTRONIC POLL BOOK INSTRUCTIONS Clerk s Office Rochester Hills 1000 Rochester Hills Dr. Rochester Hills, MI 48309 www.rochesterhills.org Phone: 248.656.4630 Fax: 248.656.4744 Rev. 10/2017 Table of Contents
More informationUnless otherwise indicated additions are shown in blue, deletions in red strikethrough, and comments in green.
ENDL TEXAS Date: 17 January 2008 To: T10 Technical Committee From: Ralph O. Weber Subject: SA Creation corrections and clarifications Introduction Revision History r0 r1 r2 r3 Initial revision Insert correct
More informationCS3235 Seventh set of lecture slides
CS3235 Seventh set of lecture slides Hugh Anderson National University of Singapore School of Computing October, 2007 Hugh Anderson CS3235 Seventh set of lecture slides 1 Warp 9... Outline 1 Public Key
More informationINTEGRATED SECURITY SYSTEM FOR E-GOVERNMENT BASED ON SAML STANDARD
INTEGRATED SECURITY SYSTEM FOR E-GOVERNMENT BASED ON SAML STANDARD Jeffy Mwakalinga, Prof Louise Yngström Department of Computer and System Sciences Royal Institute of Technology / Stockholm University
More informationCryptology Part 1. Terminology. Basic Approaches to Cryptography. Basic Approaches to Cryptography: (1) Transposition (continued)
Cryptology Part 1 Uses of Cryptology 1. Transmission of a message with assurance that the contents will be known only by sender and recipient a) Steganography: existence of the message is hidden b) Cryptography:
More informationCristina Nita-Rotaru. CS355: Cryptography. Lecture 17: X509. PGP. Authentication protocols. Key establishment.
CS355: Cryptography Lecture 17: X509. PGP. Authentication protocols. Key establishment. Public Keys and Trust Public Key:P A Secret key: S A Public Key:P B Secret key: S B How are public keys stored How
More informationPrinciples of Information Security, Fourth Edition. Chapter 8 Cryptography
Principles of Information Security, Fourth Edition Chapter 8 Cryptography Learning Objectives Upon completion of this material, you should be able to: Chronicle the most significant events and discoveries
More informationWhat information do we collect online and how is it used?
Thirty-One Gifts LLC - Privacy Policy This Privacy Policy is intended to assist you in understanding what personal information we gather about you when you visit Thirty-One Gifts online, how we use and
More informationA QUALITY SUPPORT FOR YOUR FINAL YEAR PROJECT DEVELOPMENT & RESEARCH WORK ANDROID TOPICS RESEARCH AND CONFERENCE ORIENTED TITLES
A QUALITY SUPPORT FOR YOUR FINAL YEAR PROJECT DEVELOPMENT & RESEARCH WORK ANDROID TOPICS RESEARCH AND CONFERENCE ORIENTED TITLES We are experts in, CODING SUPPORT FOR FINAL YEAR PROJECT JOURNAL PREPARATION
More informationISO INTERNATIONAL STANDARD. Road vehicles Extended data link security. Véhicules routiers Sécurité étendue de liaison de données
INTERNATIONAL STANDARD ISO 15764 First edition 2004-08-15 Road vehicles Extended data link security Véhicules routiers Sécurité étendue de liaison de données Reference number ISO 15764:2004(E) ISO 2004
More informationISO/IEC INTERNATIONAL STANDARD. Information technology Biometric data interchange formats Part 9: Vascular image data
INTERNATIONAL STANDARD ISO/IEC 19794-9 First edition 2007-03-01 Information technology Biometric data interchange formats Part 9: Vascular image data Technologies de l'information Formats d'échange de
More informationCCST Examination Application
1. APPLICANT INFORMATION (Please print or type.) Prefix: Mr. Mrs. Ms. Miss Other Last name First name MI (you must provide your name as it appears on your photo identification) Membership IBEW UA Member
More informationPrivacy Statement of Taiwan Cooperative Bank
Privacy Statement of Taiwan Cooperative Bank Your privacy is important to us. At Taiwan Cooperative Bank we recognize the importance of personal information entrusted to us. It is one of our fundamental
More informationSECURED TRANSMISSION OF BIOMETRIC CONTENT USING VISUAL CRYPTOGRAPHY
Volume 119 No. 15 2018, 1557-1564 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ http://www.acadpubl.eu/hub/ SECURED TRANSMISSION OF BIOMETRIC CONTENT USING VISUAL CRYPTOGRAPHY S. EsaiPuvanesh
More informationA Hybrid Touch Interface for Prêt àvoter. Chris Culnane, University of Surrey Trustworthy Voting Systems Project
A Hybrid Touch Interface for Prêt àvoter Chris Culnane, University of Surrey Trustworthy Voting Systems Project Overview Brief Introduction to Prêt àvoter Motivation Hybrid Touch Concept Implementation
More informationImplementation of Secure Payment Transaction using AES encryption with extended Visual Cryptography
Implementation of Secure Payment Transaction using AES encryption with extended Visual Cryptography GRADUATE PROJECT REPORT Submitted to the Faculty of the Department of Computing Sciences Texas A&M University-Corpus
More informationCountermeasures against Mobile spam
8 July, 2004 Countermeasures against Mobile spam ~ Legislation and Self-regulation ~ Toshihiko SHIBUYA, Deputy Director Telecommunications Consumer Policy Division, Telecommunications Bureau, Ministry
More informationMinistry of Government and Consumer Services. ServiceOntario. Figure 1: Summary Status of Actions Recommended in June 2016 Committee Report
Chapter 3 Section 3.06 Ministry of Government and Consumer Services ServiceOntario Standing Committee on Public Accounts Follow-Up on Section 4.09, 2015 Annual Report In March 2016, the Committee held
More informationCertification Report
Certification Report Koji Nishigaki, Chairman Information-technology Promotion Agency, Japan Target of Evaluation Application date/id 2008-02-12 (ITC-8195) Certification No. C0189 Sponsor Panasonic Communications
More informationUSER MANUAL FOR ONLINE SUBMISSION OF APPLICATION FORM FOR NEET PG 2019
USER MANUAL FOR ONLINE SUBMISSION OF APPLICATION FORM FOR NEET PG 2019 Overview You can submit your application form for NEET PG from the NBE website www.nbe.edu.in from November 2 nd 2018 to November
More informationPERSONAL ACCOUNT-HOLDER
User Guide PERSONAL ACCOUNT-HOLDER How To Register & Verify Your Free Paxum Personal Account How To Register Your Free Paxum Personal Account Paxum accepts new accounts from individuals and businesses
More information