Ingham County News; Mason, Mich

Total Page:16

File Type:pdf, Size:1020Kb

Ingham County News; Mason, Mich urcr. Rep. Ralph Young, East Lan· On the bonrd of directors are sing, m!lde the. dedicatory ad· K G. Brow.n, Glen Watkins, Dorr dress. Howard Seibert, president Ecl;hart, Fred L. JOrcher, Mrs. of the hospital board, presented Mary 0, Blacl> and Wilfred Jew· the hospital .to the community. ctt from the Ingl1am county Mayor Paul D. Richat•ds of Ma· board of supervisors and Hulett son accepted it on behalf of the and Otto Hartig. · community. · Hartig stepped down from the Y,oung, former coach and ath· pl·esident's job ll1ls year. · letic director at Michigan State, · Spcnny and Davis will both go ct·edited the· hospital to com· alonrr with the Mason delegation munity teamwork and sacrifice. to the, state mectii1g slated for - Detroit in .January to sign 1959! Seibert told of the devotion of - Othet· who came from afat• tri fair attractions. · hundreds of men and women who attend the dedication included 3 had a part In providing the funds men from Wyeth Laboratories and maldng and carrying out Ine: They were George Pattison, plans for the hospital. Mayor Cleveland, divisional sales man­ Richards likened the dedication of the hospital to the birth of a agel", and Robert Messetlgcr,­ Council Looks child, pointing out that 'the com· Flint, and Thomas Newburgcr, munity has an expanded respon- Toledo, district sale~ managers. , If horses do any wondering, sibillty to maintain the hospital. A, G. Benson, assistant vice­ Bonnie is probably wondering For Big Gift Earlier resldents built school president, and' Milbert Anderson;-­ about her master, Ralph Hink· houses and churches, he declared, assistant cashier, of the National ley. · ·• and now this generation has pro- Banlt of Detroit attended the Afle1· ~ stay in Mason G!!n: Postmaster Le~llc Palmer an· vlded a hospital and has the duty dedication nnd open house. They eral hospital, both old and new, to serve the sick and Infirm. were flnancial consultants in con· nounced longer Christmas hours was transferred to. IJ)gham ' Wednesday. Under lhe plan this !11~ David n'iehl was master of struction of the hospital and Chest hospltal· Thursday. In· Eleven adults and new born year the postoffice will remain 4 cm·emonies. A detachment of vet· their bank put up the:: money clications· pointed to quite a. babi~s gained free rides In . Ma· which will be repaid from open ail day on Sattirday, Decem· stay' there. · · ~ · son ·wmbulances Tuesday' night. ber 13, und .Saturday, December "' pledges. Mrs. Ivan Opdyi;e has been They had the distinction of being 20. The Sat'urday l1ours will be the first to occupy new Mason Herbert G. Ficl;es of I<etchum from 8 to 5 p. m. laidng care of Bonnie and will Court Authorizes continue until a permanent' General hospital. ' Inc., Philadelphia, attempted to F'rom December 15 through De· arrangement is made. Patients In 'old 1\fnson Gen· get to Mason for the dedication. camber 19 lila windows will rc· Hinldey is a former black· m·ul hospltnl hncl eat•ly snp· 12 More Jurors. He had to turn bacl; beca usc:: of main open until 6 every night in smith. Up into his SO's he stm pet-s Tues1lay e1•enlng nnll ice-coated roads in Ohio. l-Ie was on!m· to handle the rush of ,Ii!;es to l'ide, hut he isn't going then by ,Jewett null DtLII·Dunn. head of the Ketchum team, re­ Christmas card~. to do any l'iding !or several tained to guide the hospital fund The Christmas ca l'Ci rusli is the WCe}\S, campaign Jn the spring . of last one that. · giver .the postofficc y~ar. wori>ers the headaches, accord· ing to tllC postmas1r.n He ut·gell 1.hu~e sending l'aJ•ds (o get them in the mail eHrly. He also pointed Farmer Peck's Wife is so busy out tlwt unrlcr lhe new postal with Chri~>tmas shopping slie was rates, signed <:anls whieh arc not. unable tu write hct· column' this scaled will require :Jc postage wee I\, this year. Editorif!lH and The extcndt'<l hours do nul ap· in Section C. ply to [JlC monCj' order Windt/'\', llu your lnundry 11l nuw coin·Olll!l'• The regular hours of from !l a. nt1•d Munun lnundl')'. New uutomntlc m. to :> p. m. and !l a. m. to noun Wll~>het'ri and 4li'Yni'H, Op"n day and nhtht, Nvxl tu DunccJ' Cu. on J cl1'cJ'HOn--Mntwn. on Saturdays will still prevail. 4Uw1 · Mason school board Although the Sandhill ;;chao! Educators c·onfinue· Study ·face. a demand of the state fire was remodeled according' to the marsiJal for a furnace room sep· fire marshal's specifications only aratc from the . Sandhill school a few years ago, the new decree Of Special School Plan building. Board members presume demands a separate fi1·eproof , I , that the demand also applies to building be constructed fol' hous­ Mcmhcrs of th<! Lansing board There are now 8 counlie~ in the 19 other area schools in the ing the furnace. Optimistic esti· of aclucalion and the county !l'lichigan whieh- provide special Mason district. They estimate mates place the cost at $3,000- board Q[ education are meeting in training on a county-wide basis, that at least $60,00[) would! be re­ and there are 20 rural schools in Mason Thursday night to study said Alton J. Stroud, county 'ouired to build the additions and the Mason district which would New-,Vcekl)' nnd d»tly· rnteK ut Mn­ a spaciali;o;ed program. Under it school superintendent. malte the change. probably look like the Sandhill sou Munor mot.1ll. El~ctric lw11l. HhowcJ• special training on a county-wide Last spring the county board school to the fire marshal. n nd tub, frc~ 'l'V, muld nm·vice, f1·ee basis would he provided for men· Prodded by a complaint from motnln~ cofftm, Unt11Jl' now mnnngcmcnt. of education considered establish· The sehoul 'board Intel'· Cot'llCl' of Nat·th Ccdu1· nnd US-127. tally retarded, emotionally dis· ing a special program for hand!· 1 resident of the Sandhill school 4!1w1 t urbed and physically handi­ capped children. The board de· area, the ni·e marshal's office has JH-etec:l the compluint os ptU't caHJed children. The program cided not to tal\e 'action at that ~orne up with a long list of safety of a cold wur in the battle by would be financed by special mill· time. Under the plan then pro· precautions. \ some fot• new urea elemen· age. posed school dlst ric;ts would vote tllry schools. Lansing now operates Walnut on the special· millage required, Oddly, the complaint and . t.he Street school for. handicapped and with votes In individual districts fit•e inspection came before the disturbed children. The Lansing being counted together. The last school fire in Chicago, which school also accepts some children legislature enacted' laws to aid daimed 90 lives Monday. from outside the district. such 'schools. The board directed James Van· Although the polls closed at 8 der Ven, superintendent, tD write o'clock November 4, the decision a letter to the fire marshal ask· on annexation of most of Lan· ing that a fire inspe'ction be made sing township to Lansing re­ of every. school ln the district. mains unsettled.' A court test, The board took no action on the Sandliill situation, deciding to wait until a report on ·'the entire -district is compiled. · Mrs. Richard Traver wus elect· ed as.second:membet"of the wom­ en's committee. ·:A:rter a discussion about the duillenge ·ol: vct;tical integration to .'!arm operations, the group agreed 'that farmers should sup· port and maintain an active co· operative representing the farm· ers. •Darn Diehl of Dansville is ·ex· pected home this weelt from versity hospital, Ann Ar.boi", aft· er undergoing special treatments on his knees. He first sufiered injury w.hi!C! playing freshman 'football at Michigan State. Later he fell from the barn loft. For years he has had arthritic at· taclts in his knees. At University hcispltai doctors injected cart!· ·sane into the joints. It will' be 'severn! weelts before the Dans· vlile farmer .is able to resum-e his usual activities. Mrs. Charles Bie.bC!shelmcr is in cntical 'condition In St. rene~ hospittiJ,· .. Lansing. tBil~beshelmer is 80. She fC!ll at :her home •recently and fractured her hip. · · · .Gray Ladi_es-Auxiliary Members Students from tho fifth gJ;a~le presented 1t Clll'lstmM .. program Jll'ecelllng the pro· Serve at .HOspital Open House g'l'lllll. Jud $9.95 Dow~ Gray Ladies anrl Mason .Gen­ Mrs. C. G. Keesler, Mrs. Clarence stood ready to conduct tours and ~~~~;~;.~.~~~~ eral hospital auxiliary members Boles, Mrs. Nelson Brown, Mrs. answer questions. They were as· I have trained, helped in readying R. E. Trqxell and Mrs. 'George A. sisted by their leader, l\irs. How· Visit Ware•s the new hospital and donated Clinton. ard Seibert. In Scout uniforms theil· time to sewing. Sa,turday Petite Gray Ladles ·in their were Julie Dart, Nan·cy Barton, Toy Town anrl Sunday they shared in the trim uniforms manned the infor­ Mary Clipper, Suzanne P-hillips fanfare _\at the dedication and matloll desk Saturday. Assuming and Claudia Seibert, • GAMES open house. duty were Mrs. Winston Dancer, Several of the Girl Scouts donned pastel green nurses aide Auxiliary members, who Mrs, Dorn Diehl,· Mrs. Hubert t GUNS • DISHE~ Potter, Mrs. Harolll ·Laws, Mrs.
Recommended publications
  • Executing Large Scale Processes in a Blockchain
    The current issue and full text archive of this journal is available on Emerald Insight at: www.emeraldinsight.com/2514-4774.htm JCMS 2,2 Executing large-scale processes in a blockchain Mahalingam Ramkumar Department of Computer Science and Engineering, Mississippi State University, 106 Starkville, Mississippi, USA Received 16 May 2018 Revised 16 May 2018 Abstract Accepted 1 September 2018 Purpose – The purpose of this paper is to examine the blockchain as a trusted computing platform. Understanding the strengths and limitations of this platform is essential to execute large-scale real-world applications in blockchains. Design/methodology/approach – This paper proposes several modifications to conventional blockchain networks to improve the scale and scope of applications. Findings – Simple modifications to cryptographic protocols for constructing blockchain ledgers, and digital signatures for authentication of transactions, are sufficient to realize a scalable blockchain platform. Originality/value – The original contributions of this paper are concrete steps to overcome limitations of current blockchain networks. Keywords Cryptography, Blockchain, Scalability, Transactions, Blockchain networks Paper type Research paper 1. Introduction A blockchain broadcast network (Bozic et al., 2016; Croman et al., 2016; Nakamoto, 2008; Wood, 2014) is a mechanism for creating a distributed, tamper-proof, append-only ledger. Every participant in the broadcast network maintains a copy, or some representation, of the ledger. Ledger entries are made by consensus on the states of a process “executed” on the blockchain. As an example, in the Bitcoin (Nakamoto, 2008) process: (1) Bitcoin transactions transfer Bitcoins from a wallet to one or more other wallets. (2) Bitcoins created by “mining” are added to the miner’s wallet.
    [Show full text]
  • Keyless Signature Infrastructure for Digital India's Security
    ISSN (Online) 2456 -1304 International Journal of Science, Engineering and Management (IJSEM) Vol 4, Issue 10, October 2019 Keyless Signature Infrastructure for Digital India’s Security [1] Mridul Sharma, [2]Rupali Sharma [1][2] University Institute of Engineering, Rayat Bahra University, Mohali, Punjab, India Abstract— In the making of new Digital India there are lots of threats which are there in the path of this dream. Acts of data breach of AADHAAR and Bank Accounts due to the lack of security in our digital services are common but the world is now, moving towards digital era so to be with the world in this digital transformation we must work on our security enhancement to provide a secure platform to government organisations. To serve the three aspects of security that is confidentiality, integrity, and availability of data we need an infrastructure that ensures all these. The Blockchain-Based KSI is the new technology which will support the government of India to achieve its goal of ensuring secure digital Services. It will help the government in providing strong authentication through digital signatures, and will also give the citizens a trust that their PII data is secure and confidential so that they can use these digital services for their all daily work. On the inspiration from Estonia where all their government services are digital in a way such that every government work from issuing a birth certificate to passport verification all these tasks are done digitally. This paper is made to help India in the implementation of this powerful Infrastructure for the digital governmental services providing ease to people and bureaucrats.
    [Show full text]
  • Keyless Signatures' Infrastructure
    Keyless Signatures' Infrastructure: How to Build Global Distributed Hash-Trees Ahto Buldas1;2, Andres Kroonmaa1, and Risto Laanoja1;2 1 GuardTime AS, Tammsaare tee 60, 11316 Tallinn, Estonia. 2 Tallinn University of Technology, Raja 15, 12618 Tallinn, Estonia. Abstract. Keyless Signatures Infrastructure (KSI) is a globally dis- tributed system for providing time-stamping and server-supported digi- tal signature services. Global per-second hash trees are created and their root hash values published. We discuss some service quality issues that arise in practical implementation of the service and present solutions for avoiding single points of failure and guaranteeing a service with reason- able and stable delay. Guardtime AS has been operating a KSI Infras- tructure for 5 years. We summarize how the KSI Infrastructure is built, and the lessons learned during the operational period of the service. 1 Introduction Keyless signatures are an alternative solution to traditional PKI signatures. The word keyless does not mean that no cryptographic keys are used during the signature creation. Keys are still necessary for authentication, but the signatures can be reliably verified without assuming continued secrecy of the keys. Keyless signatures are not vulnerable to key compromise and hence provide a solution to the long-term validity of digital signatures. The traditional PKI signatures may be protected by timestamps, but as long as the time-stamping technology itself is PKI-based, the problem of key compromise is still not solved completely. Keyless signatures are a solution to this problem. In a keyless signature system, the functions of signer identification and of evidence integrity pro- tection are separated and delegated to cryptographic tools suitable for those functions.
    [Show full text]
  • Block Chain Based KSI for Delivering Governmental Services in Democratic Nations
    International Journal of Recent Engineering Research and Development (IJRERD) ISSN: 2455-8761 www.ijrerd.com || Volume 03 – Issue 07 || July 2018 || PP. 15-24 Block chain based KSI for delivering governmental services in democratic nations Vedna Sharma Junior Research Fellow Institute of Technology Management (Defense Research & Development Organization) Landour Cantt. Mussoorie Uttarakhand (India) Abstract: There are various challenges that government organizations are addressing naturally characterized by transparency and security in government records, improved confidentiality and integrity of data, secure transactions and information security. Government has to be choosing the design that best fits for balancing security and central control with the convenience and opportunity of sharing information or data between organizations and individuals. Government Organizations are also investing in digital technologies to support their goals. Significant investment in technology and efforts has yielded great progress in growth, efficiency & demand of organizations. Block chain stands out as a technology in which various organizations see potential to solve these challenges by implementing strong authentication, data encryption and digital signature. Keywords: Blockchain, Digital Signature, Hashing, public key Infrastructure, Keyless Signature Infrastructure and Governmental Services 1. Introduction Blockchain is decentralized technology that is built on the model of offering security and trust. Blockchain technology have the potential to help governments to collect taxes, deliver benefits, issue passports, record land registries, assure the supply chain of goods and generally ensure the integrity of government records and services. Blockchain technology can simplify the management of trusted information, making it easier for government agencies to access and use critical public-sector data while maintaining the security of this information.
    [Show full text]
  • Advanced Trust Services Facilitated by the Industrial-Scale Blockchain Technology
    Advanced trust services facilitated by the Industrial-Scale Blockchain technology Risto Laanoja Security Engineer Outline • Guardtime • KSI • What it does • How it works • Trust assumptions • KSI / blockchain applicability in providing eIDAS trusted services • Standardization challenges 2 Advanced trust services facilitated by the Industrial-Scale Blockchain technology 1. Company Overview 3 Advanced trust services facilitated by the Industrial-Scale Blockchain technology Introducing Guardtime Who we are: • Systems engineering company, fundamental and applied research into cryptographic applications • Founded in 2007 in Tallinn, Estonia • Offices in Amsterdam, Palo Alto, Tallinn and Tartu • 71 people 4 Advanced trust services facilitated by the Industrial-Scale Blockchain technology 2. KSI Technology An Industrial Scale Blockchain 5 Advanced trust services facilitated by the Industrial-Scale Blockchain technology Keyless Signature Infrastructure (KSI): An Industrial Scale Blockchain KSI enables real-time Scalability Settlement time massive-scale data One of the most significant In contrast to the widely distributed integrity validation. challenges with traditional crypto-currency approach, the blockchain approaches is scalability number of participants in KSI The technology – they scale at O(n) complexity i.e. blockchain distributed consensus overcomes two major they grow linearly with the number protocol is limited. By limiting the weaknesses of traditional of transactions. number of participants it becomes possible to achieve consensus In contrast the KSI blockchain blockchains: synchronously, eliminating the need scales at O(t) complexity – it grows for Proof of Work and ensuring linearly with time and independently settlement can occur within one from the number of transactions. second. 6 Advanced trust services facilitated by the Industrial-Scale Blockchain technology KSI Signature The KSI Signature is a Upon verification, KSI Signature piece of meta-data which allows to assert: enables the properties of • Signing time the data to be verified.
    [Show full text]
  • Cloud Service Provider Case
    TALLINN UNIVERSITY OF TECHNOLOGY Faculty of Information Technology Institute of Informatics Chair of Information Systems Analysis of Digital Integrity: Cloud Service Provider Case Master’s Thesis Student: Oskar Poola Student code: 132245IVGM Supervisor: prof. Ahto Buldas Tallinn 2015 I hereby declare that this thesis, which is the result of my work as an independent, are presented in Tallinn University of Technology to apply for a Master’s degree, and on that basis have not previously applied for an academic degree. Author Oskar Poola ”.....”..............2015 The work complies with the applicable requirements. Instructor Dr. Ahto Buldas ”.....”..............2015 Approved by ”.....”..............2015 1 Abstract Digital integrity in an adjective that technological solutions can create for a system. Integrity is not as understandable as we think it to be in dif- ferent cases and systems. Different scenarios will be shown and that every situation is different in terms of digital integrity. This work aims to bring to light what integrity means in a certain case such a data owner storing data in a third party cloud storage service provider. The author will provide dif- ferent models to show, what can be the most effective protocol for cloud storage in an insecure world with potentially malicious actors. 2 Abbreviations SLA Service Level Agreement NSA National Security Agency SHA Secure hash algorithm CA Certification Authority TSP Trust Service Provider ISP Internet Service Provider ISKE Estonian Security Management Standard STORK Secure idenTity
    [Show full text]
  • Improved Internet Security Protocols Using Cryptographic One-Way Hash Chains" (2014)
    University of Central Florida STARS Electronic Theses and Dissertations, 2004-2019 2014 Improved Internet Security Protocols Using Cryptographic One- Way Hash Chains Amerah Alabrah University of Central Florida Part of the Computer Sciences Commons, and the Engineering Commons Find similar works at: https://stars.library.ucf.edu/etd University of Central Florida Libraries http://library.ucf.edu This Doctoral Dissertation (Open Access) is brought to you for free and open access by STARS. It has been accepted for inclusion in Electronic Theses and Dissertations, 2004-2019 by an authorized administrator of STARS. For more information, please contact [email protected]. STARS Citation Alabrah, Amerah, "Improved Internet Security Protocols Using Cryptographic One-Way Hash Chains" (2014). Electronic Theses and Dissertations, 2004-2019. 4599. https://stars.library.ucf.edu/etd/4599 IMPROVED INTERNET SECURITY PROTOCOLS USING CRYPTOGRAPHIC ONE-WAY HASH CHAINS by AMERAH ABDULRAHMAN ALABRAH B.S. King Saud University, 2006 M.S. Colorado State University, 2008 A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Department of Electrical Engineering and Computer Science in the College of Engineering and Computer Science at the University of Central Florida Orlando, Florida Fall Term 2014 Major Professor: Mostafa Bassiouni © 2014 Amerah Alabrah ii ABSTRACT In this dissertation, new approaches that utilize the one-way cryptographic hash functions in designing improved network security protocols are investigated. The proposed approaches are designed to be scalable and easy to implement in modern technology. The first contribution explores session cookies with emphasis on the threat of session hijacking attacks resulting from session cookie theft or sniffing.
    [Show full text]
  • Enhancing the Security Through the Usage of Merkle Tree and Timestamp in Peerto Peer Messaging
    International Journal of Pure and Applied Mathematics Volume 119 No. 7 2018, 13-20 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu Special Issue ijpam.eu Enhancing the security through the usage of merkle tree and timestamp in peerto peer messaging Katyayani Sharma Dr. VairamuthuS* School of Computer Science and Engineering Associate Professor VIT University, Vellore Campus School of Computer Science and Engineering VIT Tamil Nadu, India University, Vellore Campus [email protected] Tamil Nadu, India [email protected] Abstract— One of the critical aspects of resource sharing The first distributed type of Merkle‟s authentication tree among p2p clients is security. Common security issues like trust, was Distributed Merkle Tree.This has provided authentication privacy and message integrity still extends to peers and affecting framework for decentralized systems with little trust the reliability of services over P2P. In this paper, we propose a presumptions.In order to detect the infected content peer to time stamped algorithm of merkle tree based on block chain peer streaming peer protocol (PPSPP) came into effect with concepts which provides an authentication tree that is secure against pre-image attack. The proposed algorithm is tested using the use of merkle hash tree with protection of integrity [10]. python and verified with different hash values that are generated Here we have proposed a more secure distributed merkle tree for secure messaging. hashing algorithm with the usage of timestamps to provide integrity to the data shared among the peers in messaging.The Keywords— timestamped algorithm, merkle tree , p2p clients.
    [Show full text]
  • Keyless Signature Infrastructure® (KSI™) Technology Introduction
    Guardtime Federal, LLC Proprietary Keyless Signature Infrastructure® (KSI™) Technology An Introduction to KSI Blockchain Technology and Its Benefits Executive Summary The use of blockchain technology to provide digital integrity has exploded in financial applications. Widely proliferated blockchain technology consumes significant storage, communications bandwidth and time for each transaction, whereas Guardtime-Federal, LLC provides Keyless Signature Infrastructure (KSI) that is a blockchain designed for security, scalability and speed. Through the properties of verifiable authenticity, identity of the client, and non-global positioning system-based non-spoofable time; KSI provides provenance, integrity and identity associated with digital assets. This implementation consumes far less storage and bandwidth than widely proliferated blockchain technology and can provide the above defined attributes for thousands of files a second scalable to billions. KSI cryptographically links data assets with immutable properties provided by the KSI infrastructure, and implemented in a KSI signature. KSI promises this additional integrity and authenticity in newly created or already existing data whether on the network, in embedded systems or traversing the cloud. Customers who implement KSI can prove their current and future information systems are in a truthful state and meet business and mission needs with increased security. KSI was designed with considerations for security, scalability, and speed to meet the requirements for a host of complex applications. By integrating KSI into healthcare systems, irrespective of where a digital asset is transmitted or stored, every component, configuration, and digital health record/entry generated by humans or machines can be verified independently in real-time, independent of trusted administrators. KSI provides a truth-based system wherein the need for trust can be completely eliminated.
    [Show full text]
  • Keyless Signatures' Infrastructure
    Keyless Signatures' Infrastructure: How to Build Global Distributed Hash-Trees Ahto Buldas1;2, Andres Kroonmaa1, and Risto Laanoja1;2 1 Guardtime AS, Tammsaare tee 60, 11316 Tallinn, Estonia. 2 Tallinn University of Technology, Raja 15, 12618 Tallinn, Estonia. Abstract. Keyless Signatures Infrastructure (KSI) is a globally distributed system for providing time- stamping and server-supported digital signature services. Global per-second hash trees are created and their root hash values published. We discuss some service quality issues that arise in practical implementation of the service and present solutions for avoiding single points of failure and guaranteeing a service with reasonable and stable delay. Guardtime AS has been operating a KSI Infrastructure for 5 years. We summarize how the KSI Infrastructure is built|and the lessons learned during the operational period of the service. 1 Introduction Keyless signatures are an alternative solution to traditional PKI signatures. The word keyless does not mean that no cryptographic keys are used during the signature creation. Keys are still necessary for authentication, but the signatures can be reliably verified without assuming continued secrecy of the keys. Keyless signatures are not vulnerable to key compromise and thus provide a solution to the problem of long-term validity of digital signatures. The traditional PKI signatures may be protected by timestamps, but as long as the time-stamping technology itself is PKI-based, the problem of key compromise is still not solved. In a keyless signature system, the functions of signer identification—and of evidence integrity protection| are separated and delegated to cryptographic tools suitable for those functions.
    [Show full text]
  • Efficient Quantum-Immune Keyless Signatures with Identity
    Efficient Quantum-Immune Keyless Signatures with Identity Ahto Buldas1;2, Risto Laanoja1;2, and Ahto Truu1 1 Guardtime AS, Tammsaare tee 60, 11316 Tallinn, Estonia. [email protected] 2 Tallinn University of Technology, Ehitajate tee 5, 12618 Tallinn, Estonia. Abstract. We show how to extend hash-tree based data signatures to server-assisted personal digital signature schemes. The new signature scheme does not use trapdoor functions and is based solely on cryptographic hash functions and is thereby, considering the current state of knowledge, resistant to quantum computational attacks. In the new scheme, we combine hash-tree data signature (time- stamping) solutions with hash sequence authentication mechanisms. We show how to implement such a scheme in practice. 1 Introduction Electronic signatures use secret keys to protect the integrity of data. Keys can be compromised because of technical failures, human factor, or both threats in combination. In the creation process of electronic signatures, some types of secrets (keys, passwords, etc.) seem unavoidable, because secrets are necessary for authenticating the signer. Even if one uses biometric authentication, there must be a secure channel between the biometric reader and the signature creation device, and even if the signature creation device is physically (and securely) connected to biometric reader, the signature itself must be protected against modification (the integrity of signatures) and traditional solutions use public-key cryptography for that. This means that the validity of signatures depend on assumptions that some private keys are secure. For example, the keys of Public Key Infrastruc- ture (PKI) service providers like the OCSP responders are used to sign the validity statements of public-key certificates.
    [Show full text]
  • Blockchain and PKI
    About & Beyond PKI Blockchain and PKI André Clerc Dipl. Inf.-Ing. FH, CISSP, CAS PM TEMET AG, Zürich February 9, 2017 1 Agenda • Does blockchain secure PKIs in the long- term? – Disadvantages of classic PKIs – Facts about blockchain – Implementation approaches – Advantages and disadvantages of blockchain • What can we do if post quantum cryptography (PQC) is not available yet? • What shall we do if PQC can be used? 09.02.2017 About & Beyond PKI - Blockchain and PKI 2 Blockchain and PKI Introduction • It is assumed that all current PKIs are based on cryptographic procedures which will be broken in the future by quantum computers • It’s even worse: – There are physicists who believe that the breaking of the asymmetric key is more efficient than its creation! • The question arise: – Will new technologies (e.g. blockchain) help us to solve the above mentioned fact or do we have to look for new solutions? 09.02.2017 About & Beyond PKI - Blockchain and PKI 3 Blockchain and PKI Disadvantages of classic PKIs • The identity verification process may be insufficient • An offered guarantees of identity retention may not be strong enough • A certificate authority (CA) may issue unauthorized certificates • The misbehavior of a CA may not be detected – Expect log-based PKIs 09.02.2017 About & Beyond PKI - Blockchain and PKI 4 Blockchain and PKI Disadvantages of classic PKIs • Responding to CA misbehavior takes time and requires manual effort • A CRL check can be based on a outdated list (inadequate update cycle) • A CRL or OCSP check can been disabled
    [Show full text]