Search results for: password cracking
149 Password Cracking on Graphics Processing Unit Based Systems
Authors: N. Gopalakrishna Kini, Ranjana Paleppady, Akshata K. Naik
Abstract:
Password authentication is one of the widely used methods to achieve authentication for legal users of computers and defense against attackers. There are many different ways to authenticate users of a system and there are many password cracking methods also developed. This paper proposes how best password cracking can be performed on a CPU-GPGPU based system. The main objective of this work is to project how quickly a password can be cracked with some knowledge about the computer security and password cracking if sufficient security is not incorporated to the system.Keywords: GPGPU, password cracking, secret key, user authentication.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2624148 How Efficiency of Password Attack Based on a Keyboard
Authors: Hsien-cheng Chou, Fei-pei Lai, Hung-chang Lee
Abstract:
At present, dictionary attack has been the basic tool for recovering key passwords. In order to avoid dictionary attack, users purposely choose another character strings as passwords. According to statistics, about 14% of users choose keys on a keyboard (Kkey, for short) as passwords. This paper develops a framework system to attack the password chosen from Kkeys and analyzes its efficiency. Within this system, we build up keyboard rules using the adjacent and parallel relationship among Kkeys and then use these Kkey rules to generate password databases by depth-first search method. According to the experiment results, we find the key space of databases derived from these Kkey rules that could be far smaller than the password databases generated within brute-force attack, thus effectively narrowing down the scope of attack research. Taking one general Kkey rule, the combinations in all printable characters (94 types) with Kkey adjacent and parallel relationship, as an example, the derived key space is about 240 smaller than those in brute-force attack. In addition, we demonstrate the method's practicality and value by successfully cracking the access password to UNIX and PC using the password databases createdKeywords: Brute-force attack, dictionary attack, depth-firstsearch, password attack.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3473147 Providing a Secure Hybrid Method for Graphical Password Authentication to Prevent Shoulder Surfing, Smudge and Brute Force Attack
Authors: Faraji Sepideh
Abstract:
Nowadays, purchase rate of the smart device is increasing and user authentication is one of the important issues in information security. Alphanumeric strong passwords are difficult to memorize and also owners write them down on papers or save them in a computer file. In addition, text password has its own flaws and is vulnerable to attacks. Graphical password can be used as an alternative to alphanumeric password that users choose images as a password. This type of password is easier to use and memorize and also more secure from pervious password types. In this paper we have designed a more secure graphical password system to prevent shoulder surfing, smudge and brute force attack. This scheme is a combination of two types of graphical passwords recognition based and Cued recall based. Evaluation the usability and security of our proposed scheme have been explained in conclusion part.
Keywords: Brute force attack, graphical password, shoulder surfing attack, smudge attack.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 912146 Hardware Approach to Solving Password Exposure Problem through Keyboard Sniff
Authors: Kyungroul Lee, Kwangjin Bae, Kangbin Yim
Abstract:
This paper introduces a hardware solution to password exposure problem caused by direct accesses to the keyboard hardware interfaces through which a possible attacker is able to grab user-s password even where existing countermeasures are deployed. Several researches have proposed reasonable software based solutions to the problem for years. However, recently introduced hardware vulnerability problems have neutralized the software approaches and yet proposed any effective software solution to the vulnerability. Hardware approach in this paper is expected as the only solution to the vulnerabilityKeywords: Keyboard sniff, password exposure, hardware vulnerability, privacy problem, insider security.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1577145 A New Graphical Password: Combination of Recall & Recognition Based Approach
Authors: Md. Asraful Haque, Babbar Imam
Abstract:
Information Security is the most describing problem in present times. To cop up with the security of the information, the passwords were introduced. The alphanumeric passwords are the most popular authentication method and still used up to now. However, text based passwords suffer from various drawbacks such as they are easy to crack through dictionary attacks, brute force attacks, keylogger, social engineering etc. Graphical Password is a good replacement for text password. Psychological studies say that human can remember pictures better than text. So this is the fact that graphical passwords are easy to remember. But at the same time due to this reason most of the graphical passwords are prone to shoulder surfing. In this paper, we have suggested a shoulder-surfing resistant graphical password authentication method. The system is a combination of recognition and pure recall based techniques. Proposed scheme can be useful for smart hand held devices (like smart phones i.e. PDAs, iPod, iPhone, etc) which are more handy and convenient to use than traditional desktop computer systems.
Keywords: Authentication, Graphical Password, Text Password, Information Security, Shoulder-surfing.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4145144 Graphical Password Security Evaluation by Fuzzy AHP
Authors: Arash Habibi Lashkari, Azizah Abdul Manaf, Maslin Masrom
Abstract:
In today's day and age, one of the important topics in information security is authentication. There are several alternatives to text-based authentication of which includes Graphical Password (GP) or Graphical User Authentication (GUA). These methods stems from the fact that humans recognized and remembers images better than alphanumerical text characters. This paper will focus on the security aspect of GP algorithms and what most researchers have been working on trying to define these security features and attributes. The goal of this study is to develop a fuzzy decision model that allows automatic selection of available GP algorithms by taking into considerations the subjective judgments of the decision makers who are more than 50 postgraduate students of computer science. The approach that is being proposed is based on the Fuzzy Analytic Hierarchy Process (FAHP) which determines the criteria weight as a linear formula.Keywords: Graphical Password, Authentication Security, Attack Patterns, Brute force attack, Dictionary attack, Guessing Attack, Spyware attack, Shoulder surfing attack, Social engineering Attack, Password Entropy, Password Space.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1936143 Structural Engineering Forensic Evaluation of Misdiagnosed Concrete Masonry Wall Cracking
Authors: W. C. Bracken
Abstract:
Given that concrete masonry walls are expected to experience shrinkage combined with thermal expansion and contraction, and in some cases even carbonation, throughout their service life, cracking is to be expected. However, after concrete masonry walls have been placed into service, originally anticipated and accounted for cracking is often misdiagnosed as a structural defect. Such misdiagnoses often result in or are used to support litigation. This paper begins by discussing the causes and types of anticipated cracking within concrete masonry walls followed by a discussion on the processes and analyses that exists for properly evaluating them and their significance. From here, the paper then presents a case of misdiagnosed concrete masonry cracking and the flawed logic employed to support litigation.Keywords: Concrete masonry, masonry wall cracking, structural defect, structural damage, construction defect, forensic investigation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1414142 A Study on User Authentication Method Using Haptic Actuator and Security Evaluation
Authors: YoHan Choi, HeeSuk Seo, SeungHwan Ju, SungHyu Han
Abstract:
As currently various portable devices were launched, smart business conducted using them became common. Since smart business can use company-internal resources in an exlternal remote place, user authentication that can identify authentic users is an important factor. Commonly used user authentication is a method of using user ID and Password. In the user authentication using ID and Password, the user should see and enter authentication information him or her. In this user authentication system depending on the user’s vision, there is the threat of password leaks through snooping in the process which the user enters his or her authentication information. This study designed and produced a user authentication module using an actuator to respond to the snooping threat.
Keywords: Actuator, User Authentication, Security Evaluation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1750141 A Second Look at Gesture-Based Passwords: Usability and Vulnerability to Shoulder-Surfing Attacks
Authors: Lakshmidevi Sreeramareddy, Komalpreet Kaur, Nane Pothier
Abstract:
For security purposes, it is important to detect passwords entered by unauthorized users. With traditional alphanumeric passwords, if the content of a password is acquired and correctly entered by an intruder, it is impossible to differentiate the password entered by the intruder from those entered by the authorized user because the password entries contain precisely the same character set. However, no two entries for the gesture-based passwords, even those entered by the person who created the password, will be identical. There are always variations between entries, such as the shape and length of each stroke, the location of each stroke, and the speed of drawing. It is possible that passwords entered by the unauthorized user contain higher levels of variations when compared with those entered by the authorized user (the creator). The difference in the levels of variations may provide cues to detect unauthorized entries. To test this hypothesis, we designed an empirical study, collected and analyzed the data with the help of machine-learning algorithms. The results of the study are significant.
Keywords: Authentication, gesture-based passwords, machine learning algorithms, shoulder-surfing attacks, usability.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 615140 Feedstock Effects on Selecting the Appropriate Coil Configuration for Cracking Furnaces
Authors: Ramin Karimzadeh, Nazi Rahimi, Mohammad Ghashghaee
Abstract:
In the present research, steam cracking of two types of feedstocks i.e., naphtha and ethane is simulated for Pyrocrack1-1 and 2/2 coil configurations considering two key parameters of coil outlet temperature (COT) and coil capacity using a radical based kinetic model. The computer model is confirmed using the industrial data obtained from Amirkabir Petrochemical Complex. The results are in good agreement with performance data for naphtha cracking in a wide range of severity (0.4-0.7), and for ethane cracking on various conversions (50-70). It was found that Pyrocrack2-2 coil type is an appropriate choice for steam cracking of ethane at reasonable ethylene yield while resulting in much lower tube wall temperature while Pyrocrack1-1 coil type is a proper selection for liquid feedstocks i.e. naphtha. It can be used for cracking of liquid feedstocks at optimal ethylene yield whereas not exceeding the allowable maximum tube temperature.Keywords: Coil configuration, Ethane, Naphtha, Steamcracking.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3765139 Effect of Oxygen and Micro-Cracking on the Flotation of Low Grade Nickel Sulphide Ore
Authors: Edison Muzenda, Ayo S Afolabi
Abstract:
This study investigated the effect of oxygen and micro-cracking on the flotation of low grade nickel sulphide ore. The ore treated contained serpentine minerals which have a history of being difficult to process efficiently. The use of oxygen as a bubbling gas has been noted to be effective because it increases the pulp potential. The desired effect of micro cracking the ore is that the nickel sulphide minerals will become activated and this activation will render these minerals more susceptible to react with potassium amyl xanthate collectors, resulting in a higher recovery of nickel and hinder the recovery of other undesired minerals contained in the ore. Higher nickel recoveries were obtained when pure oxygen was used as a bubbling gas rather than the conventional air. Microwave cracking favored the recovery of nickel.Keywords: Flotation, Conventional air, Oven micro-cracking, Recovery.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2197138 Hybrid Authentication Scheme for Graphical Password Using QR Code and Integrated Sound Signature
Authors: Salim Istyaq, Mohammad Sarosh Umar
Abstract:
Today, the mankind is in the stage of development, every day comes with new proposal of technology, in order to secure these types of technology, we also prepare high yielding security modules to conserve these resources. The capacity of human brain to recognize anything is far more than any species; this is all due to our developing cycle of curiosity. In this paper, we proposed a scheme based on graphical password using QR Code which provides more security to the recent online system. It also contains a supportive sound signature. In this system, authentication is done using sequence of images in QR code form. Users select one click-point per image with the help of QR scanner or recognizer. The encoded phrase in a QR code emphasizes the minimum probability of attacking via shoulder surfing or other attacks.
Keywords: Graphical password, QR code, sound signature, image authentication, cued click point.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 772137 Security Analysis of Password Hardened Multimodal Biometric Fuzzy Vault
Authors: V. S. Meenakshi, G. Padmavathi
Abstract:
Biometric techniques are gaining importance for personal authentication and identification as compared to the traditional authentication methods. Biometric templates are vulnerable to variety of attacks due to their inherent nature. When a person-s biometric is compromised his identity is lost. In contrast to password, biometric is not revocable. Therefore, providing security to the stored biometric template is very crucial. Crypto biometric systems are authentication systems, which blends the idea of cryptography and biometrics. Fuzzy vault is a proven crypto biometric construct which is used to secure the biometric templates. However fuzzy vault suffer from certain limitations like nonrevocability, cross matching. Security of the fuzzy vault is affected by the non-uniform nature of the biometric data. Fuzzy vault when hardened with password overcomes these limitations. Password provides an additional layer of security and enhances user privacy. Retina has certain advantages over other biometric traits. Retinal scans are used in high-end security applications like access control to areas or rooms in military installations, power plants, and other high risk security areas. This work applies the idea of fuzzy vault for retinal biometric template. Multimodal biometric system performance is well compared to single modal biometric systems. The proposed multi modal biometric fuzzy vault includes combined feature points from retina and fingerprint. The combined vault is hardened with user password for achieving high level of security. The security of the combined vault is measured using min-entropy. The proposed password hardened multi biometric fuzzy vault is robust towards stored biometric template attacks.Keywords: Biometric Template Security, Crypto Biometric Systems, Hardening Fuzzy Vault, Min-Entropy.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2158136 Kinetics of Palm Oil Cracking in Batch Reactor
Authors: Farouq Twaiq, Ishaq Al-Anbari, Mustafa Nasser
Abstract:
The kinetics of palm oil catalytic cracking over aluminum containing mesoporous silica Al-MCM-41 (5% Al) was investigated in a batch autoclave reactor at the temperatures range of 573 – 673 K. The catalyst was prepared by using sol-gel technique and has been characterized by nitrogen adsorption and x-ray diffraction methods. Surface area of 1276 m2/g with average pore diameter of 2.54 nm and pore volume of 0.811 cm3/g was obtained. The experimental catalytic cracking runs were conducted using 50 g of oil and 1 g of catalyst. The reaction pressure was recorded at different time intervals and the data were analyzed using Levenberg- Marquardt (LM) algorithm using polymath software. The results show that the reaction order was found to be -1.5 and activation energy of 3200 J/gmol.Keywords: Batch Reactor, Catalytic Cracking, Kinetics, Palm Oil.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2998135 Risk of Plastic Shrinkage Cracking in Recycled Aggregate Concrete
Authors: M. Eckert, M. Oliveira
Abstract:
The intensive use of natural aggregates, near cities and towns, associated to the increase of the global population, leads to its depletion and increases the transport distances. The uncontrolled deposition of construction and demolition waste in landfills and city outskirts, causes pollution and takes up space. The use of recycled aggregates in concrete preparation would contribute to mitigate the problem. However, it arises the problem that the high water absorption of recycled aggregate decreases the bleeding rate of concrete, and when this gets lower than the evaporation rate, plastic shrinkage cracking occurs. This phenomenon can be particularly problematic in hot and windy curing environments. Cracking facilitates the flow of liquid and gas into concrete which attacks the reinforcement and degrades the concrete. These factors reduce the durability of concrete structures and consequently the lifetime of buildings. A ring test was used, cured in a wind tunnel, to evaluate the plastic shrinkage cracking sensitivity of recycled aggregate concrete, in order to implement preventive means to control this phenomenon. The role of several aggregate properties on the concrete segregation and cracking mechanisms were also discussed.
Keywords: Recycled Aggregate, Plastic Shrinkage Cracking; Wind Tunnel, Durability.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1028134 Secure Secret Recovery by using Weighted Personal Entropy
Authors: Leau Y. B., Dinna Nina M. N., Habeeb S. A. H., Jetol B.
Abstract:
Authentication plays a vital role in many secure systems. Most of these systems require user to log in with his or her secret password or pass phrase before entering it. This is to ensure all the valuables information is kept confidential guaranteeing also its integrity and availability. However, to achieve this goal, users are required to memorize high entropy passwords or pass phrases. Unfortunately, this sometimes causes difficulty for user to remember meaningless strings of data. This paper presents a new scheme which assigns a weight to each personal question given to the user in revealing the encrypted secrets or password. Concentration of this scheme is to offer fault tolerance to users by allowing them to forget the specific password to a subset of questions and still recover the secret and achieve successful authentication. Comparison on level of security for weight-based and weightless secret recovery scheme is also discussed. The paper concludes with the few areas that requires more investigation in this research.Keywords: Secret Recovery, Personal Entropy, Cryptography, Secret Sharing and Key Management.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1971133 Catalytic Cracking of Butene to Propylene over Modified HZSM-5 Zeolites
Authors: Jianwen Li, Hongfang Ma, Haitao Zhang, Qiwen Sun, Weiyong Ying
Abstract:
Catalytic cracking of butene to propylene was carried out in a continuous-flow fixed-bed reactor over HZSM-5 catalysts modified by nickel and phosphorus. The structure and acidity of catalysts were measured by N2 adsorption, NH3-TPD and XPS. The results revealed that surface area and strong acid sites both decreased with increasing phosphorus loadings. The increment of phosphorus loadings reduced the butene conversion but enhanced the propylene selectivity and catalyst stability.
Keywords: Butene, catalytic cracking, HZSM-5, modification.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3183132 New Identity Management Scheme and its Formal Analysis
Authors: Jeonghoon Han, Hanjae Jeong, Dongho Won, Seungjoo Kim
Abstract:
As the Internet technology has developed rapidly, the number of identities (IDs) managed by each individual person has increased and various ID management technologies have been developed to assist users. However, most of these technologies are vulnerable to the existing hacking methods such as phishing attacks and key-logging. If the administrator-s password is exposed, an attacker can access the entire contents of the stolen user-s data files in other devices. To solve these problems, we propose here a new ID management scheme based on a Single Password Protocol. The paper presents the details of the new scheme as well as a formal analysis of the method using BAN Logic.Keywords: Anti-phishing, BAN Logic, ID management.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1525131 Torsional Rigidities of Reinforced Concrete Beams Subjected to Elastic Lateral Torsional Buckling
Authors: Ilker Kalkan, Saruhan Kartal
Abstract:
Reinforced concrete (RC) beams rarely undergo lateral-torsional buckling (LTB), since these beams possess large lateral bending and torsional rigidities owing to their stocky cross-sections, unlike steel beams. However, the problem of LTB is becoming more and more pronounced in the last decades as the span lengths of concrete beams increase and the cross-sections become more slender with the use of pre-stressed concrete. The buckling moment of a beam mainly depends on its lateral bending rigidity and torsional rigidity. The nonhomogeneous and elastic-inelastic nature of RC complicates estimation of the buckling moments of concrete beams. Furthermore, the lateral bending and torsional rigidities of RC beams and the buckling moments are affected from different forms of concrete cracking, including flexural, torsional and restrained shrinkage cracking. The present study pertains to the effects of concrete cracking on the torsional rigidities of RC beams prone to elastic LTB. A series of tests on rather slender RC beams indicated that torsional cracking does not initiate until buckling in elastic LTB, while flexural cracking associated with lateral bending takes place even at the initial stages of loading. Hence, the present study clearly indicated that the un-cracked torsional rigidity needs to be used for estimating the buckling moments of RC beams liable to elastic LTB.Keywords: Lateral stability, post-cracking torsional rigidity, uncracked torsional rigidity, critical moment.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2319130 First Cracking Moments of Hybrid Fiber Reinforced Polymer-Steel Reinforced Concrete Beams
Authors: Saruhan Kartal, Ilker Kalkan
Abstract:
The present paper reports the cracking moment estimates of a set of steel-reinforced, Fiber Reinforced Polymer (FRP)-reinforced and hybrid steel-FRP reinforced concrete beams, calculated from different analytical formulations in the codes, together with the experimental cracking load values. A total of three steel-reinforced, four FRP-reinforced, 12 hybrid FRP-steel over-reinforced and five hybrid FRP-steel under-reinforced concrete beam tests were analyzed within the scope of the study. Glass FRP (GFRP) and Basalt FRP (BFRP) bars were used in the beams as FRP bars. In under-reinforced hybrid beams, rupture of the FRP bars preceded crushing of concrete, while concrete crushing preceded FRP rupture in over-reinforced beams. In both types, steel yielding took place long before the FRP rupture and concrete crushing. The cracking moment mainly depends on two quantities, namely the moment of inertia of the section at the initiation of cracking and the flexural tensile strength of concrete, i.e. the modulus of rupture. In the present study, two different definitions of uncracked moment of inertia, i.e. the gross and the uncracked transformed moments of inertia, were adopted. Two analytical equations for the modulus of rupture (ACI 318M and Eurocode 2) were utilized in the calculations as well as the experimental tensile strength of concrete from prismatic specimen tests. The ACI 318M modulus of rupture expression produced cracking moment estimates closer to the experimental cracking moments of FRP-reinforced and hybrid FRP-steel reinforced concrete beams when used in combination with the uncracked transformed moment of inertia, yet the Eurocode 2 modulus of rupture expression gave more accurate cracking moment estimates in steel-reinforced concrete beams. All of the analytical definitions produced analytical values considerably different from the experimental cracking load values of the solely FRP-reinforced concrete beam specimens.
Keywords: Cracking moment, four-point bending, hybrid use of reinforcement, polymer reinforcement.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 812129 Experimental Analysis of Tools Used for Doxing and Proposed New Transforms to Help Organizations Protect against Doxing Attacks
Authors: Parul Khanna, Pavol Zavarsky, Dale Lindskog
Abstract:
Doxing is a term derived from documents, and hence consists of collecting information on an organization or individual through social media websites, search engines, password cracking methods, social engineering tools and other sources of publicly displayed information. The main purpose of doxing attacks is to threaten, embarrass, harass and humiliate the organization or individual. Various tools are used to perform doxing. Tools such as Maltego visualize organization’s architecture which helps in determining weak links within the organization. This paper discusses limitations of Maltego Chlorine CE 3.6.0 and suggests measures as to how organizations can use these tools to protect themselves from doxing attacks.
Keywords: Advanced Persistent Threat, FOCA, OSINT, PII.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1194128 Cryptanalysis of Chang-Chang-s EC-PAKA Protocol for Wireless Mobile Networks
Authors: Hae-Soon Ahn, Eun-Jun Yoon
Abstract:
With the rapid development of wireless mobile communication, applications for mobile devices must focus on network security. In 2008, Chang-Chang proposed security improvements on the Lu et al.-s elliptic curve authentication key agreement protocol for wireless mobile networks. However, this paper shows that Chang- Chang-s improved protocol is still vulnerable to off-line password guessing attacks unlike their claims.
Keywords: Authentication, key agreement, wireless mobile networks, elliptic curve, password guessing attacks.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1511127 Two Undetectable On-line Dictionary Attacks on Debiao et al.’s S-3PAKE Protocol
Authors: Sung-Bae Choi, Sang-Yoon Yoon, Eun-Jun Yoon
Abstract:
In 2011, Debiao et al. pointed out that S-3PAKE protocol proposed by Lu and Cao for password-authenticated key exchange in the three-party setting is vulnerable to an off-line dictionary attack. Then, they proposed some countermeasures to eliminate the security vulnerability of the S-3PAKE. Nevertheless, this paper points out their enhanced S-3PAKE protocol is still vulnerable to undetectable on-line dictionary attacks unlike their claim.
Keywords: Authentication, 3PAKE, password, three-party key exchange, network security, dictionary attacks.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1638126 Process Simulation of Ethyl tert-Butyl Ether (ETBE) Production from Naphtha Cracking Wastes
Authors: Pakorn Traiprasertpong, Apichit Svang-Ariyaskul
Abstract:
The production of ethyl tert-butyl ether (ETBE) was simulated through Aspen Plus. The objective of this work was to use the simulation results to be an alternative platform for ETBE production from naphtha cracking wastes for the industry to develop. ETBE is produced from isobutylene which is one of the wastes in naphtha cracking process. The content of isobutylene in the waste is less than 30% weight. The main part of this work was to propose a process to save the environment and to increase the product value by converting a great majority of the wastes into ETBE. Various processes were considered to determine the optimal production of ETBE. The proposed process increased ETBE production yield by 100% from conventional process with the purity of 96% weight. The results showed a great promise for developing this proposed process in an industrial scale.Keywords: ETBE, process simulation, naphtha cracking, Aspen Plus
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5433125 Thermal Cracking Approach Investigation to Improve Biodiesel Properties
Authors: Roghaieh Parvizsedghy, Seyyed Mojtaba Sadrameli
Abstract:
Biodiesel as an alternative diesel fuel is steadily gaining more attention and significance. However, there are some drawbacks while using biodiesel regarding its properties that requires it to be blended with petrol based diesel and/or additives to improve the fuel characteristics. This study analyses thermal cracking as an alternative technology to improve biodiesel characteristics in which, FAME based biodiesel produced by transesterification of castor oil is fed into a continuous thermal cracking reactor at temperatures range of 450-500°C and flowrate range of 20-40 g/hr. Experiments designed by response surface methodology and subsequent statistical studies show that temperature and feed flowrate significantly affect the products yield. Response surfaces were used to study the impact of temperature and flowrate on the product properties. After each experiment, the produced crude bio-oil was distilled and diesel cut was separated. As shorter chain molecules are produced through thermal cracking, the distillation curve of the diesel cut fitted more with petrol based diesel curve in comparison to the biodiesel. Moreover, the produced diesel cut properties adequately pose within property ranges defined by the related standard of petrol based diesel. Cold flow properties, high heating value as the main drawbacks of the biodiesel are improved by this technology. Thermal cracking decreases kinematic viscosity, Flash point and cetane number.
Keywords: Biodiesel, castor oil, fuel properties, thermal cracking.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3673124 Cryptanalysis of Yang-Li-Liao’s Simple Three-Party Key Exchange (S-3PAKE) Protocol
Authors: Hae-Soon Ahn, Eun-Jun Yoon
Abstract:
Three-party password authenticated key exchange (3PAKE) protocols are widely deployed on lots of remote user authentication system due to its simplicity and convenience of maintaining a human-memorable password at client side to achieve secure communication within a hostile network. Recently, an improvement of 3PAKE protocol by processing a built-in data attached to other party for identity authentication to individual data was proposed by some researchers. However, this paper points out that the improved 3PAKE protocol is still vulnerable to undetectable on-line dictionary attack and off-line dictionary attack.
Keywords: Three-party key exchange, 3PAKE, Passwordauthenticated key exchange, Network security, Dictionary attack
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2122123 Security Weaknesses of Dynamic ID-based Remote User Authentication Protocol
Authors: Hyoungseob Lee, Donghyun Choi, Yunho Lee, Dongho Won, Seungjoo Kim
Abstract:
Recently, with the appearance of smart cards, many user authentication protocols using smart card have been proposed to mitigate the vulnerabilities in user authentication process. In 2004, Das et al. proposed a ID-based user authentication protocol that is secure against ID-theft and replay attack using smart card. In 2009, Wang et al. showed that Das et al.-s protocol is not secure to randomly chosen password attack and impersonation attack, and proposed an improved protocol. Their protocol provided mutual authentication and efficient password management. In this paper, we analyze the security weaknesses and point out the vulnerabilities of Wang et al.-s protocol.Keywords: Message Alteration Attack, Impersonation Attack
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1772122 Butene Catalytic Cracking to Propylene over Iron and Phosphorus Modified HZSM-5
Authors: Jianwen Li, Hongfang Ma, Haitao Zhang, Qiwen Sun, Weiyong Ying
Abstract:
HZSM-5 zeolites modified by iron and phosphorus were applied in catalytic cracking of butene. N2 adsorption and NH3-TPD were employed to measure the structure and acidity of catalysts. The results indicate that increasing phosphorus loading decreased surface area, pore volume and strong acidity of catalysts. The addition of phosphorus significantly decreased butene conversion and promoted propylene selectivity. The catalytic performance of catalyst was strongly dependent on the reaction conditions. Appropriate reaction conditions could suppress side reactions and enhance propylene selectivity.Keywords: Butene catalytic cracking, HZSM-5, modification, reaction conditions.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1922121 Mechanistic Study of Composite Pavement Behavior in Heavy Duty Area
Authors: Makara Rith, Young Kyu Kim, Seung Woo Lee
Abstract:
In heavy duty areas, asphalt pavement constructed as entrance roadway may expose distresses such as cracking and rutting during service life. To mitigate these problems, composite pavement with a roller-compacted concrete base may be a good alternative; however, it should be initially investigated. Structural performances such as fatigue cracking and rut depth may be changed due to variation of some design factors. Therefore, this study focuses on the variation effect of material modulus, layer thickness and loading on composite pavement performances. Stress and strain at the critical location are determined and used as the input of transfer function for corresponding distresses to evaluate the pavement performance. Also, composite pavement satisfying the design criteria may be selected as a design section for heavy duty areas. Consequently, this investigation indicates that composite pavement has the ability to eliminate fatigue cracking in asphalt surfaces and significantly reduce rut depth. In addition, a thick or strong rigid base can significantly reduce rut depth and prolong fatigue life of this layer.
Keywords: Composite pavement, ports, cracking, rutting.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 694120 Digital Forensics for Electronic Commerce on the Web
Authors: Ryuya Uda
Abstract:
On existing online shopping on the web, SSL and password are usually used to achieve the secure trades. SSL shields communication from the third party who is not related with the trade, and indicates that the trader's web site is authenticated by one of the certification authority. Password certifies a customer as the same person who has visited the trader's web site before, and protects the customer's privacy such as what the customer has bought on the site. However, there is no forensics for the trades in those cased above. With existing methods, no one can prove what is ordered by customers, how many products are ordered and even whether customers have ordered or not. The reason is that the third party has to guess what were traded with logs that are held by traders and by customers. The logs can easily be created, deleted and forged since they are electronically stored. To enhance security with digital forensics for electronic commerce on the web, I indicate a secure method with cellular phones.Keywords: Cellular Phone, Digital Forensics, ElectronicCommerce, Information Security
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1838