Social Icons

Showing posts with label digital security. Show all posts
Showing posts with label digital security. Show all posts

Sunday, October 27, 2024

Handwriting: A Unique Source of Randomness for Cryptography?

The Intriguing Idea

    In the realm of cryptography, randomness is a fundamental building block. From generating secure keys to encrypting sensitive data, random numbers are essential. While traditional methods like quantum random number generators (QRNGs) and true random number generators (TRNGs) have been widely used, a novel approach is emerging: leveraging the inherent randomness of human handwriting.


How it Works

    The idea is simple: human handwriting is inherently variable, even for the same individual. By analyzing the unique characteristics of a person's handwriting, such as pen pressure, stroke speed, and angle, it's possible to extract random numbers.

    Here's a breakdown of the process:

  • Capture Handwriting Data
    • Specialized hardware or software can be used to capture detailed data about the writing process, including pen pressure, stroke speed, and angle.
  • Extract Randomness
    • Advanced algorithms can analyze the captured data and extract features that exhibit randomness.
  • Generate Random Numbers
    • The extracted features can be used to generate a sequence of random numbers.


Challenges and Considerations

    While the concept is promising, several challenges need to be addressed:

  • Consistency and Bias: Human handwriting can exhibit patterns and biases, which could compromise the randomness of the generated numbers.
  • Data Quality: The quality of the captured handwriting data is crucial. Noise, interference, and inconsistencies can affect the accuracy of the extracted randomness.
  • Security Risks: Advanced AI models can potentially imitate human handwriting, raising concerns about the security of handwriting-based randomness.
  • Practicality and Scalability: Implementing handwriting-based randomness in real-world applications can be complex and resource-intensive.

The Future of Handwriting-Based Randomness

    While the potential of using handwriting as a source of randomness for cryptography is intriguing, it's important to approach this idea with caution. While it's a novel concept, established cryptographic techniques based on mathematically proven random number generation methods remain the most secure and reliable options since an AI model can mimic handwriting.

    Further research and development are needed to address the challenges and unlock the full potential of handwriting-based randomness. As technology advances, we may see innovative applications of this concept, particularly in niche use cases where high levels of security and personalization are required.

Thursday, June 22, 2017

BLOCKCHAIN and BITCOIN : A TECHNICAL OVERVIEW

Presented a talk on "Blockchain and Bitcoins : A Technical overview" for the Summer Interns at Gurgaon Commisioner of Police Office.The program was being conducted under aegis of Rakshit Tandon .

Sharing the same here that brings out the technical side involved in the awesome technology ...aka BLOCKCHAIN


Sunday, August 04, 2013

Fedora Security Labs

1.   The Fedora Security Lab provides a safe test environment to work on security auditing, forensics, system rescue and teaching security testing methodologies in universities and other organizations.

2.    The spin is maintained by a community of security testers and developers. It comes with the clean and fast LXDE Desktop Environment and a customized menu that provides all the instruments needed to follow a proper test path for security testing or to rescue a broken system. The Live image has been crafted to make it possible to install software while running, and if you are running it from a USB stick created with LiveUSB Creator using the overlay feature, you can install and update software and save your test results permanently.

3.    Download the .iso file from http://spins.fedoraproject.org/security/#downloads

Here in the video below,basic running of the lab along with inside features available inside are shown...


Wednesday, July 10, 2013

Striking the balance : Privacy & Security

1.   Over the decade, Security and Privacy issues have been striking the key notes often at high decibels and the trend is only increasing in the webosphere.I was just thinking if there will be a day when there will be 100% Privacy as well as 100% IT Security...if privacy becomes 100% ensured then how will anyone's data be monitored or will it be all algorithm based that will have a standing as well as active encryption method.

2.  At a health care event in San Jose, California some time in June 2013, President Obama had said "It's important to recognize that you can't have 100 per cent security and also then have 100 per cent privacy and zero inconvenience."(Source here)

3.  Is it actually possible in lives of the present generation ? I have my doubts!!!!!Our generation is likely to be a turning era of a new kind of civilization ie the digital age.We are part of just the beginning of the IT revolution but it will take another good time to realize a stable IT architecture.

4.  Its a mad race if we see it from top...mad race about leading from the front without realizing that to do so first the need is to plan and move.Short term gains and achievements in such a scenario of unstable internet(i mean unable to handle security and privacy) is not worth a pie.From aka India we have CMS ie the Central Monitoring System that claims to monitor each and every byte(I wonder how would it be done without any known info of set data centers in India......)....then we have PRISM...and actually each country would claim to have a sole application project on similar lines!!!

5.   Confidentiality,Integrity and Availability,the three key corner stones of a security framework....how will these fit in maintaining the privacy issues.The road map is long and lots needs to be done...

Friday, January 04, 2013

FEDORA 18 RELEASE DATE : 08 Jan 2013

Hi guys....a very HAPPY NEW YEAR 2013 to you.....and for those of you like me who are waiting to upgrade ur Beefy Miracle to Fedora 18 Spherical Cow..u need to wait a few more days till 8 January 2013... that's the release date scheduled now..hope that stands by the time!!!


Sunday, October 31, 2010

OPERATION CISCO RAIDER

1.   Counterfeiting is not new....since we were born we have been seeing dupli's and counterfiets of Reebok,nike,hmv etc...the list is actually endless....this endless list is now augmented with IT inventory....to cite you an example which has rocked the nations across is about OPERATION CISCO RAIDER.

2.    Relevant original EXTRACT FROM http://www.coastnetwork.com is produced below : 

" Cisco made a decision a decade ago to manufacture product in China as a way of cutting production costs. A great deal of Cisco manufacturing is now done overseas, specifically in China. What has happened is that many of the companies that do the outsourcing for Cisco now run an extra shift and sell the now counterfeit hardware out the back door. After all, they have the manufacturing capability, the expertise and the full blessing of Cisco. The result? More and more counterfeit Cisco hardware is now showing up on American shores. Part of the problem is that China does not have strong intellectual property protection laws. This is a situation that Cisco and many other companies are still struggling to solve and one that does not promise to be resolved soon.

Warning signs of a possible counterfeited item:

If you are getting discounts of 40-55% off the list price for brand new hardware, i.e. sealed boxes, then it is a red flag. The largest of Cisco’s customers – the Bank of Americas, Ford Motor Company, United Airlines, AT&T, etc. get these discounts. You don’t. If it is any consolation, even dealers do not get the top corporate discounts.       

While it is flattering and tempting to receive big discounts for new Cisco hardware, it is also unrealistic and should be treated with the utmost caution. 

Ask what the retail price is and compare it to the price you are being quoted. If you are getting a 15-25% discount from the list price for new/sealed hardware, then you are being quoted a fair and realistic price. Expect a reasonable discount, however; too big a discount often spells trouble.

Another sign to be aware of is the receipt of unsolicited email from unknown dealers offering you Cisco hardware at very good prices. This warning is doubly true if the email or company originates from mainland China.

Powered By Blogger