Tài liệu miễn phí An ninh - Bảo mật

Download Tài liệu học tập miễn phí An ninh - Bảo mật

Secure data outsourcing in presence of the inference problem: Issues and directions

This paper discuss current and emerging research on privacy and confidentiality concerns in data outsourcing and pinpoint potential issues that are still unresolved.

5/21/2021 8:35:35 PM +00:00

Evolutionary algorithms deceive humans and machines at image classification: An extended proof of concept on two scenarios

The range of applications of Neural Networks encompasses image classification. However, Neural Networks are vulnerable to attacks, and may misclassify adversarial images, leading to potentially disastrous consequences. Pursuing some of our previous work, we provide an extended proof of concept of a black-box, targeted, non-parametric attack using evolutionary algorithms to fool both Neural Networks and humans at the task of image classification. Our feasibility study is performed on VGG-16 trained on CIFAR-10.

5/21/2021 8:35:25 PM +00:00

Blind signature scheme based on discrete logarithm problem

This paper introduced the new blind signature scheme inspired from Schnorr signature scheme. The proposed signature scheme is proved to be more security than previous researches in this field by hiding the original author of a message.

5/21/2021 6:11:13 PM +00:00

Phát triển lược đồ chữ ký số mù

Bài viết tập trung phân tích điểm yếu có thể tấn công làm lộ nguồn gốc bản tin được ký của một số lược đồ chữ ký số mù đã được công bố, từ đó đề xuất xây dựng một lược đồ mới có độ an toàn cao hơn về khả năng giữ bí mật nguồn gốc của bản tin được ký có thể đáp ứng các yêu cầu mà thực tế đặt ra.

5/21/2021 6:11:07 PM +00:00

Giáo trình An toàn và bảo mật thông tin - Đại học Bách Khoa Hà Nội

Giáo trình An toàn và bảo mật thông tin gồm có 5 chương, cung cấp cho người học những kiến thức về: Tổng quan về an toàn và bảo mật thông tin, các phương pháp mã hóa cổ điển, chuẩn mã dữ liệu DES (Data Encryption Standard), mật mã công khai, Các sơ đồ chữ kí số.

5/21/2021 11:27:43 AM +00:00

Giáo trình An toàn và bảo mật thông tin – ĐH Hàng Hải

Giáo trình này dựa trên những kinh nghiệm và nghiên cứu mà tác giả đã tích lũy và thu thập trong quá trình giảng dạy môn học An toàn và Bảo mật Thông tin tại khoa Công nghệ Thông tin, Đại học Hàng hải Việt Nam. Với bảy chương được chia thành các chủ đề khác nhau từ cơ sở toán học của mật mã học cho tới các hệ mã, các giao thức mật mã, hy vọng sẽ cung cấp cho các em sinh viên, các bạn độc giả một tài liệu bổ ích. Mời các bạn cùng tham khảo.

5/21/2021 11:27:34 AM +00:00

Giáo trình An toàn bảo mật thông tin

Giáo trình An toàn bảo mật thông tin trang bị cho người học những kiến thức về: Nguy cơ đối với dữ liệu, các phương pháp đảm bảo an toàn dữ liệu; mật mã, mã hóa, và bảo mật dữ liệu (khái niệm, yêu cầu, chỉ dẫn, dịch vụ, kỹ thuật, thuật toán,...); quy trình khóa và chứng thực (khóa cơ sở dữ liệu / thư mục,chữ ký số, định danh,...); chức năng an ninh mạng, trình bày được quy trình bảo mật thư điện tử và mã hóa thông điệp; hệ thống thương mại điện tử (thanh toán tự động, đặt chỗ tự động, mô hình giao dịch mạng, bảo mật giao dịch điện tử...). Mời các bạn cùng tham khảo.

5/21/2021 11:26:58 AM +00:00

Ebook Information security and cryptography texts and monographs

Ebook Information security and cryptography texts and monographs present symmetric-key encryption, public-key cryptography, cryptographic protocols, probabilistic algorithms, one-way functions and the basic assumptions, bit security of one-way functions, one-way functions and pseudorandomness, provably secure encryption...

5/21/2021 11:26:16 AM +00:00

Algorithms and protocols and internet security

Ebook Internet security: Cryptographic principles, algorithms and protocols prsent knowledge of number theory and abstract algebra are pre-requisites for any engineer designing a secure internet-based system.

5/21/2021 11:26:06 AM +00:00

Elliptic of hyperelliptic curve cryptography

Handbook of Elliptic and hyperelliptic curve cryptography present introduction to public-key cryptography; mathematical background; algebraic background; background on p-adic numbers; background on curves and jacobians; varieties over special fields; background on pairings; background on weil descent; cohomological background on point counting...

5/21/2021 11:25:54 AM +00:00

Cryptography, elliptic curves number theory

Ebook Elliptic curves number theory and cryptography (Second edition) present Taking a basic approach to elliptic curves, this accessible book prepares readers to tackle more advanced problems in the field. It introduces elliptic curves over finite fields early in the text, before moving on to interesting applications, such as cryptography, factoring, and primality testing. The book also discusses the use of elliptic curves in Fermat’s Last Theorem. Relevant abstract algebra material on group theory and fields can be found in the appendices.

5/21/2021 11:25:42 AM +00:00

Practice and Cryptography theory

Ebook Cryptography theory and practice (Third edition) present pseudorandom bit generation in cryptography; entity authentication, including schemes built from primitives and special purpose zero-knowledge schemes; key establishment including key distribution and protocols for key agreement, both with a greater emphasis on security models and proofs; public key infrastructure, including identity-based cryptography; secret sharing schemes...

5/21/2021 11:25:15 AM +00:00

Java Security 2nd Edition

Ebook Java security, 2nd Edition present covers the security model of Java 2, Version 1.3, which is significantly different from that of Java 1.1. It has extensive coverage of the two new important security APIs: JAAS (Java Authentication and Authorization Service) and JSSE (Java Secure Sockets Extension). Java Security, 2nd Edition, will give you a clear understanding of the architecture of Java's security model and how to use that model in both programming and administration.

5/21/2021 11:24:59 AM +00:00

Introducing the sun classes and Java secrets

Ebook Java secrets present introducing java secrets ; primitive data types ; classes, strings, and arrays ; the java virtual machine ; java byte code; threads and garbage collection; controlling applets; introducing the sun classes; using the sun.applet classes to view applets; controlling audio playback with sun.audio...

5/21/2021 11:24:48 AM +00:00

Methods of public-key cryptography

Document present cryptosystems based on elementary number theory, cryptosystems based on elliptic curves, elementary number theory background, diffie-hellman key exchange, elgamal protocol, rsa cryptosystem...

5/21/2021 11:24:42 AM +00:00

Applied cryptography and Mathematical background

Handbook of applied cryptography present overview of cryptography; mathematical background; number-theoretic reference problems; public-key parameters; pseudorandom bits and sequences; stream ciphers; block ciphers; public-key encryption; hash functions and data integrity; digital signatures; key establishment protocols; key management techniques; efficient implementation; patents and standards; bibliography of papers from selected cryptographic forums....

5/21/2021 11:24:30 AM +00:00

Xây dựng lược đồ chữ ký số dựa trên tính khó của bài toán logarit rời rạc kết hợp khai căn trên zp

Bài báo đề xuất xây dựng lược đồ chữ ký số dựa trên tính khó của bài toán logarit rời rạc kết hợp khai căn trên Zp. Bài toán logarit rời rạc kết hợp khai căn được đề xuất ở đây là một dạng bài toán khó mới, thực chất bài toán khó mới này là một hệ phương trình phi tuyến thuộc lớp các bài toán chưa có cách giải về mặt toán học. Việc xây dựng lược đồ chữ ký số dựa trên tính khó của bài toán logarit rời rạc kết hợp khai căn này cho phép nâng cao độ an toàn của thuật toán.

5/21/2021 7:25:19 AM +00:00

A new digital signature scheme based on the hardness of some expanded root problems

This paper proposes a new digital signature scheme based on the difficulty of solving expanded root problems on Zp. Therefore, the safety level of the algorithms built by this method will be ensured by the difficulty of solving expanded root problems. In mathematics, this is a form of problem without solution before. Therefore, the newly proposed scheme can be used to develop a digital signature algorithm class for applications that require a high security in practice.

5/21/2021 7:25:11 AM +00:00

Developing root problem aims to create a secure digital signature scheme in data transfer

This paper presents the proposed method of building a digital signature algorithm which is based on the difficulty of solving root problem and some expanded root problems on Zp. The expanded root problem is a new form of difficult problem without the solution, also originally proposed and applied to build digital signature algorithms. This proposed method enable to build a high-security digital signature platform for practical applications.

5/21/2021 7:25:05 AM +00:00

Constructing a digital signature algorithm based on the difficulty of some expanded root problems

This paper presents the proposed method of building a digital signature algorithm which is based on the difficulty of solving root problem and some expanded root problems on Zp. The expanded root problem is a new form of difficult problem without the solution, also originally proposed and applied to build digital signature algorithms. This proposed method enable to build a high-security digital signature platform for practical applications.

5/21/2021 7:24:58 AM +00:00

A design method of digital signature scheme based on discrete logarithm problem

This paper proposes a design method of digital signature scheme based on the difficulty of the discrete logarithm problem. With the proposed method, we can develop a lot of other digital signature schemes to choose suitable for practical applications.

5/21/2021 7:24:52 AM +00:00

A new construction method of digital signature algorithms

The article presents a new construction method of digital signature algorithms based on difficulty of the discrete logarithm problem. From the proposed method, the different signature schemes can be deployed to choose suitably for applications in practice.

5/21/2021 7:24:45 AM +00:00

A new method for constructing digital signature algorithm based on a new key scheme

In this research, with the target to improve safety level of digital signature algorithms, we present the proposed method for constructing digital signature algorithms which is based on a new key scheme. This new key format is constructed using a new difficulty problem without high-efficiency solution and it can be applied to construct digital signature algorithms. According to this research, a high-security digital signature class can be construct by the proposed method in some actual situation.

5/21/2021 7:24:39 AM +00:00

Constructing digital signature algorithms based on new key schemes

The paper proposes a method of constructing digital signature algorithms based on the new key schemes. The new key schemes are difficult problems that currently have no solution. That algorithm construction method with a new key scheme is to improve the security of digital signature algorithms. The new method is showed through the construction of two specific digital signature algorithms and the generation of highly secure signature algorithms that are constructed by this method is completely possible.

5/21/2021 5:50:13 AM +00:00

Variant of OTP cipher with symmetric key solution

The paper proposes a solution to construct symmetric–key cryptographic algorithms based on OTP cipher developed based on the cipher One – Time Pad (OTP). Advantages of the algorithms built according to the proposed new solution is to have secure and efficient implementation as OTP cipher, but the establishment, management - distribution and usage of keys are exactly the same as the Symmetric key cryptosystems in practice (DES, AES,. . . ).

5/21/2021 5:50:06 AM +00:00

Một giải pháp xây dựng hệ mật khóa đối xứng

Bài viết đề xuất giải pháp xây dựng thuật toán mật mã khóa đối xứng từ việc phát triển hệ mã sử dụng khóa một lần OTP (One-Time Pad). Ưu điểm của thuật toán xây dựng theo giải pháp mới đề xuất là tính an toàn và hiệu quả thực hiện được kế thừa mật mã OTP. Đồng thời việc thiết lập, quản lý - phân phối và sử dụng khóa của thuật toán đề xuất dựa trên các hệ mã khóa đối xứng đang được ứng dụng trong thực tế (DES, AES…).

5/21/2021 5:49:59 AM +00:00

EMV issuing reference manual

Ebook PayShield 9000: Contactless & EMV issuing reference manual additional PIN block format support for PIN translations; key scheme table; contactless cards data preparation commands; EMV-based cards data preparation commands...

5/21/2021 3:24:30 AM +00:00

Host command reference manua

Ebook payShield 9000: Host command reference manual present host commands, PIN block formats, error codes, multiple LMKs, support for thales key blocks, list of host commands, pin translation commands, pin solicitation data processing commands, clear pin commands...

5/21/2021 3:24:14 AM +00:00

Security operations manual

Ebook PayShield 9000 - Security operations manual present configuration, local master keys, operating instructions, LMK management, translating encrypted data, verifying the contents of the LMK store, loading the test keys...

5/21/2021 3:24:06 AM +00:00

Installation manual of PayShield 9000

Ebook PayShield 9000 - Installation manual present installation, configuration, physical description, transparent asynchronous emulation, configuration/management interfaces, installing the HSM into a rack, power supply and fuses...

5/21/2021 3:23:56 AM +00:00