Secure, Fast, and Efficient Handoff

Total Page:16

File Type:pdf, Size:1020Kb

Secure, Fast, and Efficient Handoff SECURE, FAST, AND EFFICIENT HANDOFF PROTOCOLS FOR WIRELESS MESH NETWORKS by NAIF ALAMRI B.S., Taibah University, 2005 M.S., DePaul University, 2010 A dissertation submitted to the Graduate Faculty of the University of Colorado Colorado Springs in partial fulfillment of the requirements for the degree of Doctor of Philosophy Department of Computer Science 2018 2018 NAIF ALAMRI ALL RIGHTS RESERVED This dissertation for the Doctor of Philosophy degree by NAIF ALAMRI Has been approved for the Department of Computer Science by C. Edward Chow, Chair Jonathan Ventura Sang-Yoon Chang Yanyan Zhuang Mark Wickert Date _____________04/25/2018 ii Alamri, Naif (Ph.D, Engineering) Secure, Fast, and Efficient Handoff Protocols for Wireless Mesh Networks Thesis directed by Professor C. Edward Chow ABSTRACT In 2011, the IEEE 802.11s for wireless mesh networks (WMN) was introduced to provide the specifications and necessary changes to the MAC layer protocols which extend the network capabilities in establishing multi-hop and multi-path connections between wireless nodes within the same Mesh Basic Service Set (MBSS). However, this innovative and convenient approach to wireless communications is facing many challenges, most of which are influenced by the unique characteristics of WMN. These challenges include security, routing, and QoS. In WMN, it is important to utilize fast handoff authentication protocols to guarantee a certain level of seamless roaming for the clients. However, the lack of a fast and reliable handoff protocol in the 802.11s standard is a major drawback especially in a technology designed to accommodate clients with high mobility. The use of authentication methods such as 802.1X/EAP for handoff authentication requires intensive computational power in devices with restricted resources and will cause a significant delay and QoS degradation. In this dissertation, we propose fast, and efficient handoff authentication protocols for WMN. First, a token-based authentication protocol is designed to provide localized handoff for clients with linear movement patterns. Second, a ticket-based authentication protocol is designed to provide global handoff within the boundaries of the mobility domain. We provide a performance assessment framework which is to compare our protocols to currently used protocols such as EAP-TLS and iii EAP-PEAP. Performance analysis will prove that our protocols are 250 times faster than EAP-PEAP and 500 times faster than EAP-TLS. This improvement allows our protocols to provide seamless handoff and continuous operation for real-time applications with short-delay requirements such as VoIP, video conferences, and online games. iv DEDICATION To my parents, my wife, and my family, the driving forces behind my success. Thank you for your dedication and your unconditional support throughout this tremendous journey. v ACKNOWLEDGMENT To my passionate supporter, my lovely wife Mashael. No amount of thanks can ever express my gratitude. Your patience and devotion throughout the years have been the fuel of my motivation. I would like to thank my wonderful parents for their unconditional love and encouragement. It's through the values you instilled in me that I was able to realize my potentials. This is yet another chapter of our success story. I would like to express my sincere appreciation to my advisor and my mentor, Professor Edward Chow, whom I came to know and admire since I have met him during my first semester at UCCS. His guidance, thoughtfulness, and continuous support helped me achieve my research goals. It has been an honor to work with such an innovative mind for all these years. I would like to thank the committee members, Professor Jonathan Ventura, Professor Sang-Yoon Chang, Professor Yanyan Zhuang, and Professor Mark Wickert. Their constructive feedback and valuable opinions helped shape the course of my research. I would like to thank my faithful friends Amer Aljaedi and Abdelhamid Elgzil. Their kind support has been viable to my research effort especially during the preparation of my first published paper. Finally, I would like to thank my employer, Taibah University, and the Saudi Arabian Cultural Mission (SACM) for the life-changing opportunity and the generous financial support. vi TABLE OF CONTENTS CHAPTER I. INTRODUCTION ........................................................................................................ 1 1.1 Overview of Wireless Mesh Networks ............................................................... 1 1.2 Architectures of WMN ....................................................................................... 3 1.3 Components of WMNs ....................................................................................... 7 1.4 Routing Protocols and Metrics in WMNs ........................................................... 8 1.5 Security in WMN .............................................................................................. 22 1.6 Research Motivation ......................................................................................... 24 1.7 Dissertation Contributions ................................................................................ 28 1.8 Dissertation Outline .......................................................................................... 30 II. RELATED WORK .................................................................................................... 33 2.1 Cryptographic Methods Used in Authentication .............................................. 33 2.2 Current Wireless Security Schemes .................................................................. 41 2.3 Related Wireless Mesh Networks Research ..................................................... 62 III. HALA: THE HANDOFF AUTHENTICATION LATENCY ASSESSMENT FRAMEWORK ............................................................................................................... 85 3.1 Overview ........................................................................................................... 85 3.2 Android Security System .................................................................................. 91 3.3 iOS Security System ......................................................................................... 94 3.4 Experimental Setup of The HALA Framework on Android and iOS Devices. 98 3.5 Results and Analysis ....................................................................................... 101 vii IV. UFAP: ULTRA-FAST HANDOFF AUTHENTICATION PROTOCOL........ 111 4.1 Introduction ..................................................................................................... 111 4.2 Design Principles for Handoff Protocols in WMN ......................................... 112 4.3 Handoff Protocol Design ................................................................................ 113 4.4 Implementation and Experimental Setup ........................................................ 118 4.5 Performance Analysis ..................................................................................... 121 4.6 Security Analysis ............................................................................................ 124 V. GAP: THE GLOBAL HANDOFF AUTHENTICATION PROTOCOL .......... 127 5.1 GAP Protocol Design ...................................................................................... 127 5.2 Handoff Process .............................................................................................. 129 5.3 Performance Analysis ..................................................................................... 132 VI. CONCLUSION ...................................................................................................... 136 6.1 Conclusion ...................................................................................................... 136 6.2 Future Work .................................................................................................... 138 REFERENCES .............................................................................................................. 139 APPENDIX A ................................................................................................................ 146 APPENDIX B ................................................................................................................ 164 viii LIST OF TABLES TABLE 2.1 A comparison between DES, 3DES, AES, and Blowfish........................................... 39 2.2 Equivalent security comparison by key size ............................................................... 40 3.1 List of cryptographic methods and parameters can be utilized in the HALA framework ................................................................................................................. 89 3.2 List of tested mobile devices..................................................................................... 100 4.1 A detailed list of the devices used in this experiment ............................................... 120 A.1 Execution time of 8-bytes secure random number generation on Android and iOS devices in nanoseconds ........................................................................................... 146 A.2 Execution time of 16-bytes secure random number generation on Android and iOS devices in nanoseconds ........................................................................................... 147 A.3 Execution time of 32-bytes secure random number generation on Android and iOS devices in nanoseconds ..........................................................................................
Recommended publications
  • COMPUTER Computer Is an Electronic Device That Is Designed To
    COMPUTER Computer is an electronic device that is designed to work with Information.The term computer is derived from the Latin term „computare‟, this means to calculate.Computer can not do anything without a Program.it represents the decimal numbers through a string of binary digits. The Word 'Computer'usually refers to the Center Processor Unit plus Internal memory. Computer is an advanced electronic device that takes raw data as input from the user and processes these data under the control of set of instructions (called program) and gives the result (output) and saves output for the future use. It can process both numerical and non-numerical (arithmetic and logical) calculations.The basic components of a modern digital computer are: Input Device,Output Device,Central Processor. A Typical modern computer uses LSI Chips. Charles Babbage is called the "Grand Father" of the computer.The First mechanical computer designed by charles Babbage was called Analytical Engine. It uses read-only memory in the form of punch cards. Four Functions about computer are: accepts data Input processes data Processing produces output Output stores results Storage Input (Data): Input is the raw information entered into a computer from the input devices. It is the collection of letters, numbers, images etc. Process: Process is the operation of data as per given instruction. It is totally internal process of the computer system. Output: Output is the processed data given by computer after data processing. Output is also called as Result. We can save these results in the storage devices for the future use. Modern computers based on integrated circuits are millions to billions of times more capable than the early machines, and occupy a fraction of the space.[2] Simple computers are small enough to fit into mobile devices, and mobile computers can be powered by small batteries.
    [Show full text]
  • Apple Ipad 4 Retina Display
    Apple iPad 4 Retina Display Apple iPad 4 with Retina Display Rating: Not Rated Yet Manufacturer: Apple iPad with Retina display at a glance. Breakthrough Retina display The Retina display on iPad makes everything look crisp and lifelike. Text is razor sharp. Colors are vibrant. Photos and videos are rich with detail. All thanks to its 3.1 million pixels — a million more pixels than an HDTV. Powerful A6X chip The new A6X chip inside iPad is up to twice as fast as the previous-generation A5X chip, and it delivers up to twice the graphics performance, without sacrificing battery life. Which means even the most advanced apps are smooth, responsive, and incredibly lifelike. Over 300,000 apps Apps for iPad aren’t like anything else. That’s because every app — 300,000 and counting — is designed specifically for iPad.2 And with apps in just about every category, you can do things like make a commute more entertaining, a presentation more interesting, or a school lesson more inspiring, right from your iPad. Ultrafast wireless The new iPad with Retina display features advanced Wi-Fi that’s up to twice as fast as any previous-generation iPad. And access to more cellular data networks around the world makes it fast in more ways than one, and in many more places. studio 42-J2.5 - Apple iPad 4 Retina Display 1/3 Apple iPad 4 Retina Display What’s in the box ● iPad with Retina display ● Lightning to USB Cable ● USB Power Adapter Limited warranty Every iPad comes with a one-year limited warranty and complimentary telephone technical support for 90 days from the date it was purchased.
    [Show full text]
  • Korea Tech Strategy
    November 13, 2012 The Age of Transition Korea Tech Strategy The outlook for IT from a “disruptive innovation” perspective Daewoo Securities Co., Ltd. James Song +822-768-3722 Mobile revolution: From revolution to evolution [email protected] The mobile revolution has been a history of „disruptive innovation.‰ And at the heart of Wonjae Park this remarkable shake-up lie Apple, Samsung Electronics (SEC), Google, and Amazon. +822-768-3372 Notably, the global IT industry is currently facing several major shifts and issues, [email protected] including: 1) AppleÊs „innovatorÊs dilemma‰; 2) a reshuffling of global supply chains; 3) Jonathan Hwang the return of Microsoft; and 4) the zero growth of the PC industry. How Korean IT +822-768-4140 players approach these issues will create significant implications for the memory, [email protected] display, components, and electronic materialsÊ markets in 2013 onwards. Will Cho “Apple without SEC” vs. “SEC without Apple” +822-768-4306 [email protected] Apple is now one of the most valuable corporations in the world. However, SEC sells Young Ryu more smartphones than Apple does. Unsurprisingly, global investors are paying keen +822-768-4138 attention to the competition between Apple and SEC, their innovations, and their [email protected] potential breakup. Our analysis suggests Apple is increasingly leaning toward „sustaining innovation‰ while SEC pursues a strategy of differentiation. At the same Brian Oh time, in reshuffling the global supply chain, we expect Apple could have difficulty +822-768-4135 [email protected] procuring parts supply without SECÊs contributions, while the Korean giant is likely to see very limited impacts from the absence of demand from Apple.
    [Show full text]
  • REGULAMENTO DESCONTO DIA DO CLIENTE Esta Ação
    REGULAMENTO DESCONTO DIA DO CLIENTE Esta Ação Pontual (“Ação”) será promovida pela Fast Shop S.A. (“Fast Shop”), situada na Avenida Zaki Narchi, 1664, São Paulo (SP), inscrita no CNPJ 43.708.379/0001-00, através do site www.fastshop.com.br. 1 – DA AÇÃO 1.1. A Ação trata-se de desconto de 10% de na compra de qualquer produto do site, realizadas no dia 15/09/2014, que poderá ser utilizado em sua próxima compra no site da Fast Shop, (exceto para compra de produtos da categoria Apple), sendo válido apenas para uma compra por CPF. 1.2. Período vigente em 15/09/2014 ou enquanto durarem os estoques dos produtos. 1.3 – Todos os produtos do site www.fastshop.com.br, validam a promoção. Parágrafo Único - Esta Ação é desenvolvida sem qualquer modalidade de sorte ou álea. 2– DA ELEGIBILIDADE DOS PARTICIPANTES 2.1. A Ação é valida para compras realizadas no site Fast Shop no dia 15/09/2014. 2.2. Não serão elegíveis compras realizadas nas lojas físicas, televendas ou em Listas de Casamento – presenteador e presenteado. 2.3. Desconto não cumulativo com outras promoções do site Fast Shop, Club de Benefícios Fast Shop, cupons de descontos e cupons de aniversário. 2.4. O comprador só estará elegível a promoção após a confirmação do pagamento em até 05 dias. 2.5. Todos os produtos comprados no site, no dia 15/09/2014, participam da promoção. 2.6. O cupom será válido para uso em apenas uma compra, com exceção de todos os produtos da categoria Apple, conforme listados abaixo.
    [Show full text]
  • FIPS 140-2 Non-Proprietary Security Policy
    Apple Inc. Apple iOS CoreCrypto Kernel Module, v5.0 FIPS 140-2 Non-Proprietary Security Policy Document Control Number FIPS_CORECRYPTO_IOS_KS_SECPOL_01.02 Version 01.02 June, 2015 Prepared for: Apple Inc. 1 Infinite Loop Cupertino, CA 95014 www.apple.com Prepared by: atsec information security Corp. 9130 Jollyville Road, Suite 260 Austin, TX 78759 www.atsec.com ©2015 Apple Inc. This document may be reproduced and distributed only in its original entirety without revision Table of Contents 1 INTRODUCTION ................................................................................................................ 4 1.1 PURPOSE ...........................................................................................................................4 1.2 DOCUMENT ORGANIZATION / COPYRIGHT .................................................................................4 1.3 EXTERNAL RESOURCES / REFERENCES .....................................................................................4 1.3.1 Additional References ................................................................................................4 1.4 ACRONYMS .........................................................................................................................5 2 CRYPTOGRAPHIC MODULE SPECIFICATION ........................................................................ 7 2.1 MODULE DESCRIPTION .........................................................................................................7 2.1.1 Module Validation Level.............................................................................................7
    [Show full text]
  • A Microarchitectural Study on Apple's A11 Bionic Processor
    A Microarchitectural Study on Apple’s A11 Bionic Processor Debrath Banerjee Department of Computer Science Arkansas State University Jonesboro,AR,USA debrath.banerjee@smail. astate.edu Abstract—Over the 10 years of evolution in iPhone ARM Cortex A9 CPU with ARM’s advanced SIMD extension generations, world has experienced a revolutionary advancement called NEON and a dual core Power VR SGX543MP2 GPU. in iPhone processor which was first brought into palm through According to Apple , the A5 was clocked at 1GHz on the iPad2 iPhone first generation embedded with APL0098 processor. After while it could dynamically adjust its frequency to save its a rapid progression in microarchitecture , currently iPhone battery life.A5 processor came up with two different variants of market is dominated by Apple's new A11(SoC) Bionic processor 45nm and 32nm ,where 32nm was said to provide 12% better chipped with iPhone 8 and iPhone X which is based on ARM battery life. big.LITLE architecture. Apple’s new A11 is based of two performance cores to handle heavy duty multithreaded The high performance variant of Apple A5X was introduced workloads and four efficiency cores to cover more mundane tasks when Apple launched third generation iPad. This SoC had a when the requirements arises in order to preserve power quadcore graphics unit instead of the previous dual core as well consumption. A11 sports a new heavy duty performance as quad core channel memory controller that provided a controller which allows the chip to use these six cores at same memory bandwidth of 12.8GB/sec which was about three times time which is a great departure from A10 processor.
    [Show full text]
  • A STUDY of MODERN MOBILE TABLETS by Jordan Kahtava A
    A STUDY OF MODERN MOBILE TABLETS By Jordan Kahtava A thesis submitted in partial fulfillment of the requirements for the degree Bachelor of Computer Science Algoma University Gerry Davies, Thesis Advisor April 14th, 2016 A Study of Modern Mobile Tablets - 1 Abstract Mobile tablets have begun playing a larger role in mobile computing because of their portability. To gather an understanding of what mobile computers can currently accomplish Microsoft and Apple tablets were examined. In general this topic is very broad and hard to research because of the number of mobile devices and tablets. Examining this document should provide detailed insight into mobile tablets and their hardware, operating systems, and programming environment. Any developer can use the information to develop, publish, and setup the appropriate development environments for either Apple or Microsoft. The Incremental waterfall methodology was used to develop two applications that utilize the Accelerometer, Gyroscope, and Inclinometer/Attitude sensors. In addition extensive research was conducted and combined to outline how applications can be published and the rules associated with each application store. The Apple application used Xcode and Objective-C while the Microsoft application used Visual Studio 2012, C-Sharp, and XAML. It was determined that developing for Apple is significantly easier because of the extensive documentation and examples available. In addition Apple’s IDE Xcode can be used to develop, design, test, and publish applications without the need for other programs. It is hard to find easily understandable documentation from Microsoft regarding a particular operating system. Visual Studio 2012 or later must be used to develop Microsoft Store applications.
    [Show full text]
  • Apple Presenta Ipad 4, Ipad Mini, Macbook Pro 13 Retina, Mac Mini E
    Apple presenta iPad 4, iPad Mini, MacBook Pro 13 Retina, Mac Mini e iMac - Ultima modifica: Martedì, 23 Ottobre 2012 20:33 Pubblicato: Martedì, 23 Ottobre 2012 20:01 Scritto da Laura Benedetti Apple dal California Theatre presenta il nuovo Macbook Pro 13 Retina, refresh per Mac Mini e iMac, naturalmente l'ospite più atteso, iPad Mini e a sorpresa iPad 4. Prezzi, disponibilità e caratteristiche tecniche in questo report dell'evento. Silenzio in sala. Riflettori spenti. Tim Cook sale sul palco del California Theatre ed inizia il keynote. Il CEO di Apple parte dai successi, sottolineando i più recenti: ben 5 milioni di iPhone 5 nel primo fine settimana di vendite e 3 milioni di iPod, 200 milioni di dispositivi iOS 6, 300 miliardi di messaggi spediti con iMassage (di cui 28.000 messaggi al secondo), 70 milioni di foto con Photo Stream, 160 milioni di profili su Game Center, 700 mila applicazioni in App Store (di cui 275 mila per iPad) e 35 miliardi scaricate, 1.5 milioni di ebook su iBookstore (400 milioni scaricati). MacBook Pro 13 Retina Notebook Italia - Testata giornalistica Reg. Stampa n.10/10 Trib. Trani - Tutti i marchi citati sono di proprietà dei rispettivi titolari 1 / 7 Phoca PDF Apple presenta iPad 4, iPad Mini, MacBook Pro 13 Retina, Mac Mini e iMac - Ultima modifica: Martedì, 23 Ottobre 2012 20:33 Pubblicato: Martedì, 23 Ottobre 2012 20:01 Scritto da Laura Benedetti Tim Cook lascia il posto Phil Schiller sul palco per parlarci dei nuovi Macbook Pro 13 Retina. I nuovi notebook Apple sono più sottili del 20% rispetto ai Macbook classici con un peso di 1.58Kg, possiedono porte tre USB 3.0, HDMI, connettore Lightning, un lettore lettore per schede SD tra le soluzioni per la connettività.
    [Show full text]
  • Have Ipad, Will Work!
    Have iPad, Will Work! How to fully u5lize your iPad in your clinical prac5ce Tim Ringgold, MT-BC Sonic Divinity Music Therapy Services [email protected] Slides: www.sonicdivinity.com INSIDE THE IPAD IPAD MINI IPAD 4 IPAD 3 IPAD 2 IPAD 1 Processor 1Ghz Apple A5X 1Ghz Apple A6X 1Ghz Apple A5X 1Ghz Apple A5 1Ghz Apple A4 Capacity 16/32/64GB 16/32/64/128GB 16/32/64GB 16/32/64GB 16/32/64GB Screen** 7.9 9.7 9.7 9.7 9.7 Resolution 1024x768 2048x1536 2048x1536 1024x768 1024x768 Connect- Wi-Fi, 4G LTE, Wi-Fi, 4G LTE, 3G, Wi-Fi, 4G LTE, Wi-Fi, 3G, Wi-Fi, 3G, ivity 3G, Bluetooth Bluetooth 3G, Bluetooth Bluetooth Bluetooth Carrier AT&T, Sprint, AT&T, Sprint, AT&T, Sprint, AT&T, Verizon AT&T, Verizon Verizon Verizon Verizon Model Contract No No No No No Cellular $$ $15-$50/mo. $15-$50/mo. $15-$50/mo. $15-$50/mo. $15-$50/mo. GPS 4G/3G only 4G/3G only 4G/3G only 3G only 3G only Camera 2; back: 1080p 2; back: 1080p 2; back: 1080p 2; back: 720p N/A Comparison HD video, 5 MP HD video, 5 MP HD video, 5 HD video; front: still; front: 720p still; front: 720p megapixel still; VGA video and video, 1.2 MP video, 1.2 MP front: VGA stills still still video and stills SIRI Yes Yes Yes No No Video Yes, 1080p HD Yes, 1080p HD Yes, 1080p HD Yes, 720p HD No HDMI Out Yes, with adapter Yes, with adapter Yes, with Yes, with No adapter adapter Weight 0.68-0.69 oz 1.44-1.46 oz.
    [Show full text]
  • Ilounge 2010 Buyers' Guide
    ©2012 SwitchEasy Limited, All Rights Reserved. U.S. and International Patents pending. iPhone5 is registered trademarks of Apple Computer Inc. 2013 Welcome to the Guide. IPHONE + IPOD BUYERS’ GUIDE After a slow and uneven 2011, Apple roared back in 2012, launching a wide array of significantly redesigned devices. The iPod, iPhone, and iPad families all saw major screen revisions, including two taller iPods, one elongated iPhone, and a quadrupled-resolution iPad. Then, just before the holidays, Apple debuted the 7.9” iPad mini, and replaced the 9.7” iPad again - just because it could. Going into 2013, the lineup looks almost completely different than it did a year earlier, except for three iPods that have been left largely untouched. If you’re reading this Guide, you’re probably looking for buying advice, and that’s why we’re here - to give you an impartial and honest look at the world of Apple devices, accessories, apps, and games. Following our tradition, iLounge’s editors have spent the past year testing hundreds of new products, selecting the best and most noteworthy ones for our new 2013 iPhone + iPod Buyers Guide. Independently assembled, our Guide is a sight to behold. We hope you enjoy it. The 2013 iPhone + iPod Buyers’ Guide is published by iLounge, Inc. and is Copyright © 2004-2012. All rights reserved. No part of this guide may be reproduced, sold, rented, or transmitted in any form, or by any means whatsoever, without the prior written consent of the publisher. Unauthorized sale of this guide is prohibited, and by accessing this guide, you agree not to violate these restrictions.
    [Show full text]
  • Sysdec CONDICIONES: Período: 03/2013 Al 03/2013
    Rkg. de Importadores(En Fob) SysDec CONDICIONES: Período: 03/2013 al 03/2013. Posición: 8471.30.00. [email protected] Tel/Fax (5411)4311-8007 25 de Mayo 626 4º Piso (1002) Bs.As. Los demás 34% INTCOMEX PERU S.A.C SAMSUNG ELECTRONICS PERU 19% 6% SAGA FALABELLA S A 10% GRUPO DELTRON S.A. TECH DATA PERU S.A.C. 18% 13% Importador FOB Total Part. ------------------------- --------------- ------- INTCOMEX PERU S.A.C 7472100.58 18.97% GRUPO DELTRON S.A. 7147583.30 18.15% TECH DATA PERU S.A.C. 5314126.35 13.49% SAGA FALABELLA S A 3747953.24 9.52% SAMSUNG ELECTRONICS PERU 2182981.89 5.54% Los Demás 13515714.09 34.29% Total 39380459.45 100.00% Ránking de Importadores SysDec [email protected] CONDICIONES: Período: 03/2013 al 03/2013. Posición: 8471.30.00. Tel/Fax (5411)4311-8007 25 de Mayo 626 4º Piso (1002) Bs.As. Pos Importador Items Cantidad %Cant FOB Total %FOB CIF Total %CIF 1 INTCOMEX PERU S.A.C 54 15706.00 13.01 7472100.58 18.97 7564120.37 18.85 2 GRUPO DELTRON S.A. 100 26692.00 22.11 7147583.30 18.15 7272065.58 18.12 3 TECH DATA PERU S.A.C. 104 12881.00 10.67 5314126.35 13.49 5415854.51 13.49 4 SAGA FALABELLA S A 45 7376.00 6.11 3747953.24 9.52 3792658.52 9.45 5 SAMSUNG ELECTRONICS PERU 40 6180.00 5.12 2182981.89 5.54 2210248.61 5.51 6 HEWLETT - PACKARD PERU 47 3287.00 2.72 1238065.63 3.14 1294845.62 3.23 7 ELKA RETAIL DEL PERU SAC 85 2004.00 1.66 1168497.11 2.97 1183257.17 2.95 8 TIENDAS POR DEPARTAMENTO 14 2030.00 1.68 1052208.10 2.67 1069882.69 2.67 9 TOTAL ARTEFACTOS SA 8 3736.00 3.10 989138.74 2.51 1000694.36 2.49 10 LENOVO (ASIA PACIFIC) LIMITED 199 1317.00 1.09 949140.26 2.41 980870.99 2.44 11 MAXIMA INTERNACIONAL S.A.
    [Show full text]
  • FIPS 140-2 Non-Proprietary Security Policy
    Apple Inc. Apple iOS CoreCrypto Module, v5.0 FIPS 140-2 Non-Proprietary Security Policy Document Control Number FIPS_CORECRYPTO_IOS_US_SECPOL_1.3 Version 1.3 June, 2015 Prepared for: Apple Inc. 1 Infinite Loop Cupertino, CA 95014 www.apple.com Prepared by: atsec information security Corp. 9130 Jollyville Road, Suite 260 Austin, TX 78759 www.atsec.com ©2015 Apple Inc. This document may be reproduced and distributed only in its original entirety without revision Table of Contents 1 INTRODUCTION ............................................................................................................................................... 5 1.1 PURPOSE ............................................................................................................................................................ 5 1.2 DOCUMENT ORGANIZATION / COPYRIGHT ................................................................................................................. 5 1.3 EXTERNAL RESOURCES / REFERENCES ....................................................................................................................... 5 1.3.1 Additional References.............................................................................................................................. 5 1.4 ACRONYMS ......................................................................................................................................................... 6 2 CRYPTOGRAPHIC MODULE SPECIFICATION .....................................................................................................
    [Show full text]