We describe an identity based signature scheme that uses biometric information to construct the public key. Such a scheme would be beneficial in a legal dispute over whether a contract had been signed or not by a user. A biometric reading provided by the alleged signer would be enough to verify the signature. We make use of Fuzzy extractors  to generate… (More)
Self-healing key distribution deals with the problem of distributing session keys for secure communication to a dynamic group of users over an unreliable, lossy network in a manner that is resistant to packet lost and collusion attacks. Self-healing property enables a user who has been off-line for some period to recover the lost session keys immediately… (More)
This paper looks at the development of a Java application programming interface (API) for performing unbounded Polynomial Arithmetic. It shows how Java can be used to perform large integer mathematical operations by using the BigInteger class. By demonstrating how the API might be used in a real application the paper shows how easy the API is to use with… (More)
Supporters of Unix claim that its benefits in programmer productivity more than offset its notoriously sluggish performance. Developers of applications with serious real-time performance requirements often feel, therefore, that they must choose between programmer productivity and the system efficiency they need. This session explores some possible… (More)
A Java implementation of a key collision attack on DES suggested by Eli Biham, , is discussed. Storage space minimization and fast searching techniques to speed up the attack are described. We also demonstrate the suitability of Java for large data cryptographic attacks and illustrate the extensive cryptographic features of the language.