2023
DOI: 10.48084/etasr.5531
|View full text |Cite
|
Sign up to set email alerts
|

Building an Application that reads Secure Information Stored on the Chip of the Citizen Identity Card in Vietnam

Abstract: Reading the information on the CIC/passport is very meaningful in serving the life activities of citizens in Vietnam and of foreign citizens visiting Vietnam. This research is based on the operating modes, such as BAC, FACE, and EAC to read the data contained in the chip put on the Citizen Identity Card (CIC) out securely. Specifically, the authors used the BAC mode to perform safe data reading from the CIC’s chip. BAC mode uses 3DES and SHA1 algorithms to encrypt data to ensure security, so when the data are … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 20 publications
0
0
0
Order By: Relevance
“…Specifically, given that the encryption technique and key are fixed and that cipher texts can be obtained for a collection of plaintexts across different topics, the goal is to develop a framework that can recognize the topic to which the ciphertext belongs. To motivate this scenario, lets consider two parties communicating through an encrypted channel on a wide range of topics [12][13]. Now, lets consider there is a listener, say a government security agency spying on the conversation for national security reasons, who is only interested in the messages related to the topic of military warfare.…”
Section: Introductionmentioning
confidence: 99%
“…Specifically, given that the encryption technique and key are fixed and that cipher texts can be obtained for a collection of plaintexts across different topics, the goal is to develop a framework that can recognize the topic to which the ciphertext belongs. To motivate this scenario, lets consider two parties communicating through an encrypted channel on a wide range of topics [12][13]. Now, lets consider there is a listener, say a government security agency spying on the conversation for national security reasons, who is only interested in the messages related to the topic of military warfare.…”
Section: Introductionmentioning
confidence: 99%
“…Crackers take advantage of vulnerabilities in internet-based services, applications, or communication networks to cause damage to those services, applications, or communications, causing outages, or even destroying or stealing data. For example, Denial of Service (DoS) and Distributed Denial of Service (DDoS) are two attacks increasingly launched [18][19][20][21], but affected users or service providers do not have any information about them because there is no investment in monitoring them.…”
Section: Introductionmentioning
confidence: 99%