Search results
Filter
9 results
Sort by:
Using the Spanish national identity card in social networks
12 páginas.- 4 figuras ; The distinctive security features of the Spanish electronic national identity card, known as Documento Nacional de Identidad electrónico, allow us to propose the usage of this cryptographic smart card in an authentication framework that can be used during the registration and login phases of internet services where the validation of the user¿s age and real identity are key elements, as it is the case for example of the so-called social networks. Using this mechanism with NFC-capable devices, the identity and age of the potential user can be determined, allowing or denying the access to the service based on that information. ; This research has been partially supported by Ministerio de Economía, Industria y Competitividad (MINECO), Agencia Estatal de Investigación (AEI) and Fondo Europeo de Desarrollo Regional (FEDER, UE) under project COPCIS, reference TIN2017-84844-C2-1-R, and by the European Union program ERASMUS+ under the project 2017-1-ESO1-KA203-038491 (Rules_Math).
BASE
Secure elliptic curves and their performance
13 páginas, 2 tablas ; Elliptic Curve Cryptography (ECC) is a branch of public-key cryptography based on the arithmetic of elliptic curves. In the short life of ECC, most standards have proposed curves defined over prime finite fields satisfying the curve equation in the short Weierstrass form. However, some researchers have started to propose as a securer alternative the use of Edwards and Montgomery elliptic curves, which could have an impact in current ECC deployments. This contribution evaluates the performance of the three types of elliptic curves using some of the examples provided by the initiative SafeCurves and a Java implementation developed by the authors, which allows us to offer some conclusions about this topic. ; This work has been partially supported by Ministerio de Econom´ıa, Industria y Competitividad (MINECO), Agencia Estatal de Investigaci´on (AEI), and Fondo Europeo de Desarrollo Regional (FEDER, UE) under project COPCIS, reference TIN2017-84844-C2-1-R, and by Comunidad de Madrid (Spain) under project CIBERDINE, reference S2013/ICE-3095-CM, also co-financed by European Union FEDER funds.
BASE
Comparing low and medium cost computer-based technologies suitable for cryptographic attacks
14 páginas, 4 figuras, 10 tablas ; Initially developed for tasks related to computer graphics, GPUs are increasingly being used for general purpose processing, including scientific and engineering applications. In this contribution, we have compared the performance of two graphics cards that belong to the parallel computing CUDA platform with two C++ and Java multi-threading implementations, using as an example of computation a brute-force attack on Hitag2, a well known remote keyless entry application. The results allow us to provide valuable information regarding the compared capabilities of the tested platforms and to confirm that such a weak encryption system could be broken in less than a day with medium cost equipment. ; This work has been partially supported by Ministerio de Econom´ıa, Industria y Competitividad (MINECO), Agencia Estatal de Investigaci´on (AEI), and Fondo Europeo de Desarrollo Regional (FEDER, UE) under project COPCIS, reference TIN2017-84844-C2-1-R, and by Comunidad de Madrid (Spain) under project CIBERDINE, reference S2013/ICE-3095-CM, also co-financed by European Union FEDER funds.
BASE
Secure elliptic curves and their performance
13 páginas, 2 tablas ; Elliptic Curve Cryptography (ECC) is a branch of public-key cryptography based on the arithmetic of elliptic curves. In the short life of ECC, most standards have proposed curves defined over prime finite fields satisfying the curve equation in the short Weierstrass form. However, some researchers have started to propose as a securer alternative the use of Edwards and Montgomery elliptic curves, which could have an impact in current ECC deployments. This contribution evaluates the performance of the three types of elliptic curves using some of the examples provided by the initiative SafeCurves and a Java implementation developed by the authors, which allows us to offer some conclusions about this topic. ; This work has been partially supported by Ministerio de Econom´ıa, Industria y Competitividad (MINECO), Agencia Estatal de Investigaci´on (AEI), and Fondo Europeo de Desarrollo Regional (FEDER, UE) under project COPCIS, reference TIN2017-84844-C2-1-R, and by Comunidad de Madrid (Spain) under project CIBERDINE, reference S2013/ICE-3095-CM, also co-financed by European Union FEDER funds.
BASE
Comparing low and medium cost computer-based technologies suitable for cryptographic attacks
14 páginas, 4 figuras, 10 tablas ; Initially developed for tasks related to computer graphics, GPUs are increasingly being used for general purpose processing, including scientific and engineering applications. In this contribution, we have compared the performance of two graphics cards that belong to the parallel computing CUDA platform with two C++ and Java multi-threading implementations, using as an example of computation a brute-force attack on Hitag2, a well known remote keyless entry application. The results allow us to provide valuable information regarding the compared capabilities of the tested platforms and to confirm that such a weak encryption system could be broken in less than a day with medium cost equipment. ; This work has been partially supported by Ministerio de Econom´ıa, Industria y Competitividad (MINECO), Agencia Estatal de Investigaci´on (AEI), and Fondo Europeo de Desarrollo Regional (FEDER, UE) under project COPCIS, reference TIN2017-84844-C2-1-R, and by Comunidad de Madrid (Spain) under project CIBERDINE, reference S2013/ICE-3095-CM, also co-financed by European Union FEDER funds.
BASE
A Virus Infected Your Laptop. Let´s Play an Escape Game
15 páginas, 9 figuras ; Have you ever thought what would happen if a ransomware infected your laptop? This type of virus kidnaps files and encrypts them, and the only way to recover the data is by paying in bitcoin or some other cryptocurrency. This situation is undoubtedly terrible. All of your work, projects, and personal files will not be available (unless you pay the ransom). The first time students watched a video that contextualizes this stressful situation, they thought that they had been attacked by a computer virus. Fortunately, the panic only lasted a few seconds. This is the way to start a game called breakout or escape room. The difference between these two words is that, in the first case, the goal is to open a padlocked box, while the objective of an escape room is to find the key that allows to get out of a room. Both games are similar, containing riddles, puzzles, problems and some clues that would help the players to find the solution. This study analyses the use of a breakout game for educational purposes, more specifically in a university context. The experiment conducted mixes game–based learning methodologies with engineering students learning Linear Algebra, Calculus or Cryptography, which has allowed us to obtain promising results about the usage of this methodology. ; This work has been supported in part by the Erasmus+ program of the European Union undergrant 2017-1-ES01-KA203-038491 (RULES_MATH), in part by Ministerio de Ciencia, Innovación y Universidades(MCIU, Spain), Agencia Estatal de Investigación (AEI, Spain), and Fondo Europeo de Desarrollo Regional(FEDER, UE) under Project COPCIS (grant number TIN2017-84844-C2-1-R) and Project MAGERAN (grant numberTIN2017-84844-C2-2-R)
BASE
A Virus Infected Your Laptop. Let's Play an Escape Game
[EN]Have you ever thought what would happen if a ransomware infected your laptop? This type of virus kidnaps files and encrypts them, and the only way to recover the data is by paying in bitcoin or some other cryptocurrency. This situation is undoubtedly terrible. All of your work, projects, and personal files will not be available (unless you pay the ransom). The first time students watched a video that contextualizes this stressful situation, they thought that they had been attacked by a computer virus. Fortunately, the panic only lasted a few seconds. This is the way to start a game called breakout or escape room. The difference between these two words is that, in the first case, the goal is to open a padlocked box, while the objective of an escape room is to find the key that allows to get out of a room. Both games are similar, containing riddles, puzzles, problems and some clues that would help the players to find the solution. This study analyses the use of a breakout game for educational purposes, more specifically in a university context. The experiment conducted mixes game–based learning methodologies with engineering students learning Linear Algebra, Calculus or Cryptography, which has allowed us to obtain promising results about the usage of this methodology. ; This work has been supported in part by the Erasmus+ program of the European Union under grant 2017-1-ES01-KA203-038491 (RULES_MATH), in part by Ministerio de Ciencia, Innovaci n y Universidades (MCIU, Spain), Agencia Estatal de Investigaci n (AEI, Spain), and Fondo Europeo de Desarrollo Regional (FEDER, UE) under Project COPCIS (grant number TIN2017-84844-C2-1-R) and Project MAGERAN (grant number TIN2017-84844-C2-2-R).
BASE
Using Freeware Mathematical Software in Calculus Classes
International Conference on Mathematics and its Applications in Science and Engineering (ICMASE 2020), on-line conference. July 9-10, 2020. 10 páginas, 10 figuras. ; Due to the Bologna Accord, the teaching of mathematics has undergone importantchanges. Some of the most visible modifications have been the need to complementthe traditional teaching-learning process with practical, real-life cases and thepossibility to reinforce the introduction and usage of key concepts throughmathematical software.Nowadays, there exist many computational packagesdealing with mathematics, some of the best-known being Mathematica and Matlab.However, although they are very complete and powerful, they demand the use ofcommercial licences, which can be a problem for some education institutions orin the cases where students desire to use the software in an unlimited number ofdevices or to access from several of them simultaneously.In this article, we show how to apply GeoGebra and WolframAlpha to the processof teaching Calculus to first-year university students.While GeoGebra is aninteractive geometry, algebra, statistics, and calculus application available both asan online resource and a native application in Windows, macOS, and Linux systems,WolframAlpha is a computational knowledge engine developed by a subsidiaryof Wolfram Research, the company behind Mathematica. However, unlike thatproduct, WolframAlpha can be accessed by any individual as a web service free ofcharge. One of the key aspects of WolframAlpha is the possibility to use naturallanguage and Mathematica syntax for requesting computations, which allows usersto benefit from a large amount of Mathematica resources.Being able to use GeoGebra and WolframAlpha as web services withoutdownloading and installing software is another important advantage, as it avoidsthe need to have adminstrator rights to use those computational engines, whichtypically represents a problem in education centres where lab computers arelocked so students cannot inadvertently install malware that can compromise theuniversity's network.As the best way to show a topic in mathematics is to provide examples,this contribution focuses on the main topics associated to a first-year Calculus class (limits, continuity, derivatives, curve interpolation and integrals), providingexamples with GeoGebra and WolframAlpha for the computations and concreteexamples used in actual Calculus classes. ; This work was supported in part by the Ministerio de Economía, Industria y Competitividad (MINECO), in part by the Agencia Estatal de Investigación (AEI), in part by the Fondo Europeo de Desarrollo Regional (FEDER, UE) under Project COPCIS, Grant TIN2017-84844-C2-1-R, and in part by the Erasmus+ program of the European Union under grant 2017-1-ES01-KA203-038491(RULES_MATH). Víctor Gayoso Martínez would like to thank CSIC Project CASP2/201850E114 for its support.
BASE