31 resultados para key escrow
Resumo:
论文对两类"强壮"的门限密钥托管方案进行了系统分析,给出多种切实可行的攻击方法,指出它们都是不安全的.首先, 主要利用"可信度"函数等方法首次奠定了对密钥托管协议的形式化分析基础.然后提出了对以上方案的两种阈下信道攻击,前者本质上属于"阴影会话密钥"攻击方法,后者则利用签名算法构造阈下信道.通过成功实施各种欺骗攻击,指出两类方案并未在真正意义上解决诸如"一次监听,永远监听" 、用户密钥碎片有效认证及鉴别恶意托管方等问题.最后分析指出两类方案的"强壮性"值得商榷,并证明一些协议组件是不必要的.
Some Key Technics of Drop Tower Experiment Device of National Microgravity Laboratory (China) (NMLC)
Resumo:
Drop tower is an important ground based facility for microgravity science experiment. The technical performances of the drop tower NMLC are advanced compared with similar facilities in the US, Germany and Japan. The main components such as drop capsule, deceleration devices, release mechanism present its advantages and creativities.
Resumo:
This paper carries out the analysis of mechanics of a grip system of three-key-board hydraulic tongs developed for offshore oil pipe lines which has been successfully used in oil fields in China. The main improvement of this system is that a lever frame structure is used in the structural design, which reduces greatly the stresses of the major components of the oil pipe tongs. Theoretical analysis and numerical calculation based on thirteen basic equations developed Show that the teeth board of the tongs is not easy to slip as frequently happens to other systems and is of higher reliability.
Resumo:
The template-directed fabrication of highly-ordered porous film is of significant importance in implementation of the photonic band gap structure. The paper reports a simple and effective method to improve the electrodeposition of metal porous film by utilizing highly-ordered polystyrene spheres (PSs) template. By surface-modification method, the hydrophobic property of the PSs template surfaces was changed into hydrophilic one. It was demonstrated that the surface modi. cation process enhanced the permeability of the electrolyte solution in the nanometer-sized voids of the colloidal template. The homogeneously deposited copper film with the highly-ordered voids in size of less than 500 nm was successfully obtained. In addition, it was found that large defects, such as microcracks in the template, strongly influenced the macroporous films quality. An obvious preferential growth in the cracked area was observed. (C) 2008 Elsevier B. V. All rights reserved.
Resumo:
Rubrifloradilactone C (4), a novel bioactive nortriterpenoid, along with four other nortriterpenoids (1-3, 5) were isolated from Schisandra rubriflora. The structure of 4 was determined by extensive NMR spectral analysis, computational evidence by using t
Resumo:
Argonaute 2 gene plays a pivotal role in RNAi in many species. Herein is the first report of the cloning and characterization of Argonaute 2 gene in fish. The full-length cDNA of Gobiocypris rarus Argonaute 2 (GrAgo2) consisted of 3073 nucleotides encoding 869 amino acid residues with a calculated molecular weight of 98.499 kDa and an estimated isoelectric point of 9.18. Analysis of the deduced amino acid sequence showed the presence of two signature domains, PAZ and Piwi. RT-PCR analysis indicated that GrAgo2 mRNA expression could be detected in widespread tissues. After infection with grass carp reovirus, GrAgo2 expression was up-regulated from 12 h post-injection (p < 0.05) and returned to control levels at 48 h post-injection (p > 0.05). These data imply that GrAgo2 is involved in antiviral defense in rare minnow. (C) 2008 Published by Elsevier Ltd.
Resumo:
Piguetiella denticulata Liang & Xie, 1997 is redescribed based on the type series collected from the type locality, Songtao River, and streams of the Zhangjiajie Mountain in southwestern China, and specimens from several tributaries of the Yangtze River. This species is characterized by a large body size, the absence of eyespots and dorsal hair chaetae, the same size and shape of dorsal and ventral chaetae, the presence of 3-4 intermediate teeth on both ventral and dorsal chaetae, and an intestinal dilation in IX-X segments. The essential characteristics used to diagnose the genus are discussed and a key to the genus is provided.
Resumo:
Proceeding from the consideration of the demands from the functional architecture of high speed, high capacity optical communication network, this paper points out that photonic integrated devices, including high speed response laser source, narrow band response photodetector high speed wavelength converter, dense wavelength multi/demultiplexer, low loss high speed response photo-switch and multi-beam coupler are the key components in the system. The, investigation progress in the laboratory will be introduced.
Resumo:
The RSA-based Password-Authenticated Key Exchange (PAKE) protocols have been proposed to realize both mutual authentication and generation of secure session keys where a client is sharing his/her password only with a server and the latter should generate its RSA public/private key pair (e, n), (d, n) every time due to the lack of PKI (Public-Key Infrastructures). One of the ways to avoid a special kind of off-line (so called e-residue) attacks in the RSA-based PAKE protocols is to deploy a challenge/response method by which a client verifies the relative primality of e and φ(n) interactively with a server. However, this kind of RSA-based PAKE protocols did not give any proof of the underlying challenge/response method and therefore could not specify the exact complexity of their protocols since there exists another security parameter, needed in the challenge/response method. In this paper, we first present an RSA-based PAKE (RSA-PAKE) protocol that can deploy two different challenge/response methods (denoted by Challenge/Response Method1 and Challenge/Response Method2). The main contributions of this work include: (1) Based on the number theory, we prove that the Challenge/Response Method1 and the Challenge/Response Method2 are secure against e-residue attacks for any odd prime e; (2) With the security parameter for the on-line attacks, we show that the RSA-PAKE protocol is provably secure in the random oracle model where all of the off-line attacks are not more efficient than on-line dictionary attacks; and (3) By considering the Hamming weight of e and its complexity in the RSA-PAKE protocol, we search for primes to be recommended for a practical use. We also compare the RSA-PAKE protocol with the previous ones mainly in terms of computation and communication complexities.