Automatic Event-Stream Notarization Using Digital Signatures
نویسندگان
چکیده
Some digital signature algorithms (such as RSA) require messages to be padded before they are signed. Secure tokens can use these padding bits as a subliminal channel to embed auditing information in their signed messages. These auditing bits simplify protecting against lost and stolen tokens, breaks of specific protocols, hash functions, and ciphers, and attacks based on defeating a token’s tamper-resistance.
منابع مشابه
Cumulative notarization for long-term preservation of digital signatures
The long-term preservation of digitally signed documents may be approached and analyzed from various perspectives, i.e. future data readability, signature validity, storage media longevity, etc. The paper focuses on technology and trust issues related to the long-term validation of a digital signature. We exploit the notarization paradigm and propose a mechanism for cumulative data notarization...
متن کاملLong-term verifiability of the electronic healthcare records' authenticity
PURPOSE To investigate whether the long-term preservation of the authenticity of electronic healthcare records (EHR) is possible. To propose a mechanism that enables the secure validation of an EHR for long periods, far beyond the lifespan of a digital signature and at least as long as the lifetime of a patient. APPROACH The study is based on the fact that although the attributes of data auth...
متن کاملتولید خودکار الگوهای نفوذ جدید با استفاده از طبقهبندهای تک کلاسی و روشهای یادگیری استقرایی
In this paper, we propose an approach for automatic generation of novel intrusion signatures. This approach can be used in the signature-based Network Intrusion Detection Systems (NIDSs) and for the automation of the process of intrusion detection in these systems. In the proposed approach, first, by using several one-class classifiers, the profile of the normal network traffic is established. ...
متن کاملSocial Security: Combating Device Theft With Community-Based Video Notarization
People increasingly rely on mobile devices for storing sensitive information and credentials for access to services. Because these devices are vulnerable to theft, security of this data is put at higher risk — once the attacker is in physical possession of the device, recovering these credentials and impersonating the owner of the phone is usually straightforward and hard to defend by purely lo...
متن کاملLong-term verifiability of healthcare records’ authenticity
The paper deals with the long-term validation of the authen-ticity of electronic healthcare records (EHR). Although the attributes of data authenticity, i.e. integrity and origin ve-ri-fi-a-bi-lity, can be pre-served by digital signatures, the necessary period for the re-ten-tion of EHR is far beyond the lifespan of a simple digital signature. This lifespan is restricted by the va-li-di-ty peri...
متن کامل