In this study, results from an extensive survey report college students' and senior citizens' voting concerns during the 2020 presidential election.
Read More...Browse Articles
Blockchain databases: Encrypted for efficient and secure NoSQL key-store
Although commonly associated with cryptocurrency, blockchains offer security that other databases could benefit from. These student authors tested a blockchain database framework, and by tracking runtime of four independent variables, they prove this framework is feasible for application.
Read More...LawCrypt: Secret Sharing for Attorney-Client Data in a Multi-Provider Cloud Architecture
In this study, the authors develop an architecture to implement in a cloud-based database used by law firms to ensure confidentiality, availability, and integrity of attorney documents while maintaining greater efficiency than traditional encryption algorithms. They assessed whether the architecture satisfies necessary criteria and tested the overall file sizes the architecture could process. The authors found that their system was able to handle larger file sizes and fit engineering criteria. This study presents a valuable new tool that can be used to ensure law firms have adequate security as they shift to using cloud-based storage systems for their files.
Read More...A meta-analysis on NIST post-quantum cryptographic primitive finalists
The advent of quantum computing will pose a substantial threat to the security of classical cryptographic methods, which could become vulnerable to quantum-based attacks. In response to this impending challenge, the field of post-quantum cryptography has emerged, aiming to develop algorithms that can withstand the computational power of quantum computers. This study addressed the pressing concern of classical cryptographic methods becoming vulnerable to quantum-based attacks due to the rise of quantum computing. The emergence of post-quantum cryptography has led to the development of new resistant algorithms. Our research focused on four quantum-resistant algorithms endorsed by America’s National Institute of Standards and Technology (NIST) in 2022: CRYSTALS-Kyber, CRYSTALS-Dilithium, FALCON, and SPHINCS+. This study evaluated the security, performance, and comparative attributes of the four algorithms, considering factors such as key size, encryption/decryption speed, and complexity. Comparative analyses against each other and existing quantum-resistant algorithms provided insights into the strengths and weaknesses of each program. This research explored potential applications and future directions in the realm of quantum-resistant cryptography. Our findings concluded that the NIST algorithms were substantially more effective and efficient compared to classical cryptographic algorithms. Ultimately, this work underscored the need to adapt cryptographic techniques in the face of advancing quantum computing capabilities, offering valuable insights for researchers and practitioners in the field. Implementing NIST-endorsed quantum-resistant algorithms substantially reduced the vulnerability of cryptographic systems to quantum-based attacks compared to classical cryptographic methods.
Read More...The effect of floating plant on water purification: Comparison of the water purification capability of Water Hyacinth, Duckweed, and Azolla
Clean water is a necessity for every household, yet water pollution is a serious problem in many parts of the world and plays a major role in compromising water security in the 21st century. In this paper, the authors address the utility of several plants as natural water purifiers. They estimate the effectiveness of duckweed, hyacinth, and azolla in improving the quality of water from the Mithi river in India by measuring several metrics. They conclude that all three plants are effective in improving water quality, suggesting that these plants as eco-friendly options for water treatment.
Read More...Design and implementation of a cryptographically secure electronic voting infrastructure
In this study, the authors present proposed cryptographic controls for election sites with the hypothesis that this will mitigate risk and remediate vulnerabilities.
Read More...Presoaking Seeds with Vinegar Improves Seed Development and Drought Tolerance in Maize Plants
Climate change has contributed to the increasing annual temperatures around the world and poses a grave threat to Maize crops. Two methods proven to help combat plant drought stress effects are presoaking seeds (seeds are soaked in a liquid before planting) and the application of Acetic Acid (vinegar) to soil. The purpose of this experiment was to explore if combining these two methods by presoaking seeds with a vinegar solution can improve the seed development and plant drought tolerance of Maize plants during drought conditions.
Read More...A comparative study of dynamic scoring formulas for capture-the-flag competitions
The use of gamification in cybersecurity education, particularly through capture-the-flag competitions, involves scoring challenges based on their difficulty and the number of teams that solve them. The study investigated how changing the scoring formulas affects competition outcomes, predicting that different formulas would alter score distributions.
Read More...An analysis of the feasibility of SARIMAX-GARCH through load forecasting
The authors found that SARIMAX-GARCH is more accurate than SARIMAX for load forecasting with respect to energy consumption.
Read More...A novel bioreactor system to purify contaminated runoff water
In this study, the authors engineer a cost-effective and bio-friendly water purification system using limestone, denitrifying bacteria, and sulfate-reducing bacteria. They evaluated its efficacy with samples from Eastern PA industrial sites.
Read More...