SlideShare a Scribd company logo
1 of 7
Download to read offline
Research directions
                                Security Information Technology


                                     Marius Iulian Mihailescu

                                         University of Bucharest

                                       mihmariusiulian@gmail.com



                                          June 30, 2011




Marius Iulian Mihailescu (UB)               Research directions    June 30, 2011   1/7
Primary Research Domains




 1   Biometrics and RFID Systems. Cryptanalysis of Authentication Protocols;
 2   Analysis and Design of Cryptographic Hash Functions, Block and Stream Ciphers
 3   Investigate Hiding Information Steganography and Watermarking




     Marius Iulian Mihailescu (UB)    Research directions                June 30, 2011   2/7
Biometrics and RFID Systems. Cryptanalysis of Authentication Protocols




 1   Main Research Problems for
         1   cryptanalysis of authentication protocols(ex. )
         2   communication interception between tag and reader
         3   assure security for biometrics template stored in database
 2   Develop innovative digital identity solutions, combining
         1   secure, automatic user identification thanks to electronic fingerprint authentication
         2   reliable protection of the biometrics data through advanced cryptography technology
         3   To provide assurance for
                 1   the data used for the authentication, generated from the fingerprint, cannot be used to
                     restore the original fingerprint sample
                 2   the individual will be able to create different ”pseudo-identities” for different applications
                     with the same fingerprint, whilst ensuring that these different identities (and hence the
                     related personal data) cannot be linked to each other, and
                 3   the individual is enabled to revoke an identity for a given application in case it should not be
                     used anymore




     Marius Iulian Mihailescu (UB)                  Research directions                             June 30, 2011   3/7
RFID and Biometrics Systems. Other research topics



 1   Biometrics-Based Identifiers for Digital Identity Management
         1   Design algorithms which will reliably generate biometric identifiers from a users
             biometric image which in turn is used for identity verification possibly in conjunction
             with cryptographic keys.
 2   Generating and Sharing Biometrics Based on Session Keys for Secure
     Cryptographic Applications
         1   Propose a protocol to generate and share session keys which are valid for only one
             communication session.
         2   The protocol achieves mutual authentication between the client and the server without
             the need of trusted third party certificates.
         3   The protocol facilitates easy online updating of templates. The stored templates are
             cancelable.
 3   Privacy Preserving Multi-Factor Authentication with Biometrics
         1   Create a two-phase authentication mechanism for federated identity management
             systems.
         2   The first phase consists of a two-factor biometric authentication based on zero
             knowledge proofs.




     Marius Iulian Mihailescu (UB)           Research directions                      June 30, 2011   4/7
Analysis and Design of Cryptographic Hash Functions, Block and Stream
Ciphers


 1   Formalize both the design and cryptanalysis of primitives for symmetric
     cryptography: block ciphers, hash functions, MACs, stream ciphers
 2   Differential Cryptanalysis
         1   protect hash functions from DC
         2   sparse (truncated) differential characteristics needed
 3   How not to get broken?
         1   High level scheme, confusion/diffusion elements
         2   Double or triple the number of rounds that are supposed to resist linear and differential
             cryptanalysis
 4   Ways to explore
         1   Lightweight cryptography
         2   More provable security for practical designs
         3   Efficient, large-block ciphers
         4   Finding the perfect key-schedule
         5   Intrinsically fault/leakage-resistant designs
         6   Designs resistant to reverse-engineering (white-box cryptography)




     Marius Iulian Mihailescu (UB)           Research directions                      June 30, 2011   5/7
Investigate Hiding Information. Steganography and Watermarking
 1   Detect files and registry entries associated with steganography and
     watermarking applications
         1   Create digital forensic analysis tool designed for digital forensic examinations, allowing
             the examiner to scan suspect media or forensic images of suspect media
         2   The identification of files is done by using CRC-32, MD5, SGA-1, SHA-224, SHA-256,
             SHA-384 and SHA-512 hash values stored in Steganography Application Fingerprint
             Database (SAFDB)
         3   Generate automated scanning of an entire file system, individual directories, or
             individual files on suspect media for the presence of steganography applications file
             artifacts.
         4   Mount and scan forensic images of storage media in EnCase, ISO, RAW, SMART,
             SafeBack, Paraben Forensic Replicator, and Paraben Forensic Storage formats.
 2   Detect steganography artifacts and signatures in real-time over a network
         1   Detect fingerprints of over 925 steganography applications
         2   Detect signatures of over 55 steganography applications
         3   Send real-time alerts to network security administrators
         4   Retain copies of suspect files for further analysis
 3   Detect files containing steganography and extract the hidden information
         1   Identify files that have information appended beyond a file’s end-of-file marker and
             analyze the files in a hex editor view to determine the nature of the hidden information
         2   Identify files that have information embedded using Least Significant Bit (LSB) image
             encoding and extract and rearrange the LSbs for analysis in a hex editor view to detect
             hidden information
 4   Extensive report generation in HTML, PDF format
 5   Automated logging of key events and information of potential evidentiary value
     Marius Iulian Mihailescu (UB)            Research directions                       June 30, 2011   6/7
Thank for your attention




Marius Iulian Mihailescu (UB)         Research directions   June 30, 2011   7/7

More Related Content

What's hot

2019 and 2020 dot net ieee
2019 and 2020 dot net ieee2019 and 2020 dot net ieee
2019 and 2020 dot net ieeemanjunath205
 
survey project-1
survey project-1survey project-1
survey project-1NAVIT GAUR
 
NEMZOW PATENT PORTFOLIO
NEMZOW PATENT PORTFOLIONEMZOW PATENT PORTFOLIO
NEMZOW PATENT PORTFOLIOMartin Nemzow
 
Cs9224 information security
Cs9224 information securityCs9224 information security
Cs9224 information securityrajakani
 
BIOMETRICS TECHNOLGY
BIOMETRICS TECHNOLGYBIOMETRICS TECHNOLGY
BIOMETRICS TECHNOLGYsumitgupta575
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityLeMeniz Infotech
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYShakas Technologies
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityPvrtechnologies Nellore
 
Java ieee 2020 21 projects list
Java ieee 2020 21 projects listJava ieee 2020 21 projects list
Java ieee 2020 21 projects listVenkat Projects
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYNexgen Technology
 
Aggregated proof based hierarchical authentication scheme for the internet of...
Aggregated proof based hierarchical authentication scheme for the internet of...Aggregated proof based hierarchical authentication scheme for the internet of...
Aggregated proof based hierarchical authentication scheme for the internet of...Pvrtechnologies Nellore
 
2020 and 2021 java Cloud computing
2020 and 2021 java Cloud computing2020 and 2021 java Cloud computing
2020 and 2021 java Cloud computingmanjunath205
 
Ieee project title_2013-2014
Ieee project title_2013-2014Ieee project title_2013-2014
Ieee project title_2013-2014onepointer
 

What's hot (18)

2019 and 2020 dot net ieee
2019 and 2020 dot net ieee2019 and 2020 dot net ieee
2019 and 2020 dot net ieee
 
78 81
78 8178 81
78 81
 
survey project-1
survey project-1survey project-1
survey project-1
 
NEMZOW PATENT PORTFOLIO
NEMZOW PATENT PORTFOLIONEMZOW PATENT PORTFOLIO
NEMZOW PATENT PORTFOLIO
 
Cs9224 information security
Cs9224 information securityCs9224 information security
Cs9224 information security
 
BIOMETRICS TECHNOLGY
BIOMETRICS TECHNOLGYBIOMETRICS TECHNOLGY
BIOMETRICS TECHNOLGY
 
2014 IEEE project
2014 IEEE project 2014 IEEE project
2014 IEEE project
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
 
Java ieee 2020 21 projects list
Java ieee 2020 21 projects listJava ieee 2020 21 projects list
Java ieee 2020 21 projects list
 
term 2
term 2term 2
term 2
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 
Biometrics
BiometricsBiometrics
Biometrics
 
R01754129132
R01754129132R01754129132
R01754129132
 
Aggregated proof based hierarchical authentication scheme for the internet of...
Aggregated proof based hierarchical authentication scheme for the internet of...Aggregated proof based hierarchical authentication scheme for the internet of...
Aggregated proof based hierarchical authentication scheme for the internet of...
 
2020 and 2021 java Cloud computing
2020 and 2021 java Cloud computing2020 and 2021 java Cloud computing
2020 and 2021 java Cloud computing
 
Ieee project title_2013-2014
Ieee project title_2013-2014Ieee project title_2013-2014
Ieee project title_2013-2014
 

Viewers also liked

Kelly fajack-photo-lifestyle
Kelly fajack-photo-lifestyleKelly fajack-photo-lifestyle
Kelly fajack-photo-lifestylekfajack
 
20110628 for gatracker
20110628 for gatracker20110628 for gatracker
20110628 for gatrackerKazuhiro Kida
 
Basics of scm
Basics of scmBasics of scm
Basics of scmmumer1
 
Anubhuti. Life Long Learning Experiences
Anubhuti. Life Long Learning ExperiencesAnubhuti. Life Long Learning Experiences
Anubhuti. Life Long Learning Experiencesmukesh mehta
 
Radioaficionados%20autorizados%201 t09
Radioaficionados%20autorizados%201 t09Radioaficionados%20autorizados%201 t09
Radioaficionados%20autorizados%201 t09diccymerino
 
Cell Cycle- The Basics
Cell Cycle- The BasicsCell Cycle- The Basics
Cell Cycle- The BasicsJay-ar Palec
 
Approach to Obesity
Approach to ObesityApproach to Obesity
Approach to ObesityJay-ar Palec
 
Bed Sores: Classification and Management
Bed Sores: Classification and ManagementBed Sores: Classification and Management
Bed Sores: Classification and ManagementJay-ar Palec
 
Brain Death- Updated Guidelines
Brain Death- Updated GuidelinesBrain Death- Updated Guidelines
Brain Death- Updated GuidelinesJay-ar Palec
 

Viewers also liked (15)

Ozone Widget Test
Ozone Widget TestOzone Widget Test
Ozone Widget Test
 
Kelly fajack-photo-lifestyle
Kelly fajack-photo-lifestyleKelly fajack-photo-lifestyle
Kelly fajack-photo-lifestyle
 
20110628 for gatracker
20110628 for gatracker20110628 for gatracker
20110628 for gatracker
 
Basics of scm
Basics of scmBasics of scm
Basics of scm
 
Spelling1
Spelling1Spelling1
Spelling1
 
Expectations 2007
Expectations 2007Expectations 2007
Expectations 2007
 
Anubhuti. Life Long Learning Experiences
Anubhuti. Life Long Learning ExperiencesAnubhuti. Life Long Learning Experiences
Anubhuti. Life Long Learning Experiences
 
Radioaficionados%20autorizados%201 t09
Radioaficionados%20autorizados%201 t09Radioaficionados%20autorizados%201 t09
Radioaficionados%20autorizados%201 t09
 
Pain management
Pain managementPain management
Pain management
 
Cell Cycle- The Basics
Cell Cycle- The BasicsCell Cycle- The Basics
Cell Cycle- The Basics
 
Approach to Obesity
Approach to ObesityApproach to Obesity
Approach to Obesity
 
Banyan Tree Resorts
Banyan Tree ResortsBanyan Tree Resorts
Banyan Tree Resorts
 
Bed Sores: Classification and Management
Bed Sores: Classification and ManagementBed Sores: Classification and Management
Bed Sores: Classification and Management
 
Vietnam Tourism
Vietnam TourismVietnam Tourism
Vietnam Tourism
 
Brain Death- Updated Guidelines
Brain Death- Updated GuidelinesBrain Death- Updated Guidelines
Brain Death- Updated Guidelines
 

Similar to Directii cercetare

Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemFeature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemIJMER
 
“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”iosrjce
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...Clare Nelson, CISSP, CIPP-E
 
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...CSCJournals
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptographySampat Patnaik
 
deep fake detection (1).pptx
deep fake detection (1).pptxdeep fake detection (1).pptx
deep fake detection (1).pptxssusercec41e
 
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...Editor IJCATR
 
Biometrics and Multi-Factor Authentication, The Unleashed Dragon
Biometrics and Multi-Factor Authentication, The Unleashed DragonBiometrics and Multi-Factor Authentication, The Unleashed Dragon
Biometrics and Multi-Factor Authentication, The Unleashed DragonClare Nelson, CISSP, CIPP-E
 
Behavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison studyBehavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison studyacijjournal
 
A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...
A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...
A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...suherashaik2003
 
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...Abhinav Biswas
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to BiometricsYogeshIJTSRD
 
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...CSCJournals
 

Similar to Directii cercetare (20)

Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemFeature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
 
I017335457
I017335457I017335457
I017335457
 
“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”
 
Blockchain
BlockchainBlockchain
Blockchain
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Biometrics poster
Biometrics posterBiometrics poster
Biometrics poster
 
Biometrics
BiometricsBiometrics
Biometrics
 
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...
 
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
J1802035460
J1802035460J1802035460
J1802035460
 
deep fake detection (1).pptx
deep fake detection (1).pptxdeep fake detection (1).pptx
deep fake detection (1).pptx
 
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
 
Biometrics and Multi-Factor Authentication, The Unleashed Dragon
Biometrics and Multi-Factor Authentication, The Unleashed DragonBiometrics and Multi-Factor Authentication, The Unleashed Dragon
Biometrics and Multi-Factor Authentication, The Unleashed Dragon
 
Behavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison studyBehavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison study
 
A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...
A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...
A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...
 
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...
 
Security.pptx
Security.pptxSecurity.pptx
Security.pptx
 

Recently uploaded

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Directii cercetare

  • 1. Research directions Security Information Technology Marius Iulian Mihailescu University of Bucharest mihmariusiulian@gmail.com June 30, 2011 Marius Iulian Mihailescu (UB) Research directions June 30, 2011 1/7
  • 2. Primary Research Domains 1 Biometrics and RFID Systems. Cryptanalysis of Authentication Protocols; 2 Analysis and Design of Cryptographic Hash Functions, Block and Stream Ciphers 3 Investigate Hiding Information Steganography and Watermarking Marius Iulian Mihailescu (UB) Research directions June 30, 2011 2/7
  • 3. Biometrics and RFID Systems. Cryptanalysis of Authentication Protocols 1 Main Research Problems for 1 cryptanalysis of authentication protocols(ex. ) 2 communication interception between tag and reader 3 assure security for biometrics template stored in database 2 Develop innovative digital identity solutions, combining 1 secure, automatic user identification thanks to electronic fingerprint authentication 2 reliable protection of the biometrics data through advanced cryptography technology 3 To provide assurance for 1 the data used for the authentication, generated from the fingerprint, cannot be used to restore the original fingerprint sample 2 the individual will be able to create different ”pseudo-identities” for different applications with the same fingerprint, whilst ensuring that these different identities (and hence the related personal data) cannot be linked to each other, and 3 the individual is enabled to revoke an identity for a given application in case it should not be used anymore Marius Iulian Mihailescu (UB) Research directions June 30, 2011 3/7
  • 4. RFID and Biometrics Systems. Other research topics 1 Biometrics-Based Identifiers for Digital Identity Management 1 Design algorithms which will reliably generate biometric identifiers from a users biometric image which in turn is used for identity verification possibly in conjunction with cryptographic keys. 2 Generating and Sharing Biometrics Based on Session Keys for Secure Cryptographic Applications 1 Propose a protocol to generate and share session keys which are valid for only one communication session. 2 The protocol achieves mutual authentication between the client and the server without the need of trusted third party certificates. 3 The protocol facilitates easy online updating of templates. The stored templates are cancelable. 3 Privacy Preserving Multi-Factor Authentication with Biometrics 1 Create a two-phase authentication mechanism for federated identity management systems. 2 The first phase consists of a two-factor biometric authentication based on zero knowledge proofs. Marius Iulian Mihailescu (UB) Research directions June 30, 2011 4/7
  • 5. Analysis and Design of Cryptographic Hash Functions, Block and Stream Ciphers 1 Formalize both the design and cryptanalysis of primitives for symmetric cryptography: block ciphers, hash functions, MACs, stream ciphers 2 Differential Cryptanalysis 1 protect hash functions from DC 2 sparse (truncated) differential characteristics needed 3 How not to get broken? 1 High level scheme, confusion/diffusion elements 2 Double or triple the number of rounds that are supposed to resist linear and differential cryptanalysis 4 Ways to explore 1 Lightweight cryptography 2 More provable security for practical designs 3 Efficient, large-block ciphers 4 Finding the perfect key-schedule 5 Intrinsically fault/leakage-resistant designs 6 Designs resistant to reverse-engineering (white-box cryptography) Marius Iulian Mihailescu (UB) Research directions June 30, 2011 5/7
  • 6. Investigate Hiding Information. Steganography and Watermarking 1 Detect files and registry entries associated with steganography and watermarking applications 1 Create digital forensic analysis tool designed for digital forensic examinations, allowing the examiner to scan suspect media or forensic images of suspect media 2 The identification of files is done by using CRC-32, MD5, SGA-1, SHA-224, SHA-256, SHA-384 and SHA-512 hash values stored in Steganography Application Fingerprint Database (SAFDB) 3 Generate automated scanning of an entire file system, individual directories, or individual files on suspect media for the presence of steganography applications file artifacts. 4 Mount and scan forensic images of storage media in EnCase, ISO, RAW, SMART, SafeBack, Paraben Forensic Replicator, and Paraben Forensic Storage formats. 2 Detect steganography artifacts and signatures in real-time over a network 1 Detect fingerprints of over 925 steganography applications 2 Detect signatures of over 55 steganography applications 3 Send real-time alerts to network security administrators 4 Retain copies of suspect files for further analysis 3 Detect files containing steganography and extract the hidden information 1 Identify files that have information appended beyond a file’s end-of-file marker and analyze the files in a hex editor view to determine the nature of the hidden information 2 Identify files that have information embedded using Least Significant Bit (LSB) image encoding and extract and rearrange the LSbs for analysis in a hex editor view to detect hidden information 4 Extensive report generation in HTML, PDF format 5 Automated logging of key events and information of potential evidentiary value Marius Iulian Mihailescu (UB) Research directions June 30, 2011 6/7
  • 7. Thank for your attention Marius Iulian Mihailescu (UB) Research directions June 30, 2011 7/7