6 resultados para Hash

em Indian Institute of Science - Bangalore - Índia


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Proton second moment (M2) and spin-lattice relaxation time (T1) of Ammonium Hydrogen Bischloroacetate (ABCA) have been measured in the range 77-350 K. A value of 6.5 G2 has been observed for the second moment at room temperature, which is typical of NH4+ reorientation and also a second moment transition in the range 170-145 K indicates the freezing of NH4+ motion. The NMR signal disappears dicontinuously at 128 K. Proton spin-lattice relaxation time (T1) Vs temperature, yielded only one sharp miniumum of 1.9 msec which is again typical of NH4+ reorientation. A slope change at 250 K is also observed, prbably due to CH2 motion. Further, the FID signal disappears at 128 K. Thus the Tc appears to be 128 K (of two reported values 120 K and 128 K). Activation energies have been calculated and the mechanism of the phase transition is discussed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Aluminum-silicon alloy pins were slid against steel disks under nominally dry condition at a speed of 0.6 m s-1. Each pin was slid at a constant load for 5 min, the load being increased in suitable steps from 2 to 65 N. The results show the wear to increase almost monotonically with load, to be sensitive to the presence of silicon in the alloy, and to be insensitive to actual silicon content. The monotonic nature of wear rate-load characteristic suggests that one dominant wear mechanism prevails over the load range studied. Morphological studies of the pin surface and the debris support this contention and point to delamination as being the dominant mode of wear.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We consider a suspended elastic rod under longitudinal compression. The compression can be used to adjust potential energy for transverse displacements from the harmonic to the double well regime. The two minima in potential energy curve describe two possible buckled states. Using transition state theory (TST) we have calculated the rate of conversion from one state to other. If the strain epsilon = 4 epsilon c the simple TST rate diverges. We suggest a method to correct this divergence for quantum calculations. We also find that zero point energy contributions can be quite large so that single mode calculations can lead to large errors in the rate.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Since its induction, the selective-identity (sID) model for identity-based cryptosystems and its relationship with various other notions of security has been extensively studied. As a result, it is a general consensus that the sID model is much weaker than the full-identity (ID) model. In this paper, we study the sID model for the particular case of identity-based signatures (IBS). The main focus is on the problem of constructing an ID-secure IBS given an sID-secure IBS without using random oracles-the so-called standard model-and with reasonable security degradation. We accomplish this by devising a generic construction which uses as black-box: i) a chameleon hash function and ii) a weakly-secure public-key signature. We argue that the resulting IBS is ID-secure but with a tightness gap of O(q(s)), where q(s) is the upper bound on the number of signature queries that the adversary is allowed to make. To the best of our knowledge, this is the first attempt at such a generic construction.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

User authentication is essential for accessing computing resources, network resources, email accounts, online portals etc. To authenticate a user, system stores user credentials (user id and password pair) in system. It has been an interested field problem to discover user password from a system and similarly protecting them against any such possible attack. In this work we show that passwords are still vulnerable to hash chain based and efficient dictionary attacks. Human generated passwords use some identifiable patterns. We have analysed a sample of 19 million passwords, of different lengths, available online and studied the distribution of the symbols in the password strings. We show that the distribution of symbols in user passwords is affected by the native language of the user. From symbol distributions we can build smart and efficient dictionaries, which are smaller in size and their coverage of plausible passwords from Key-space is large. These smart dictionaries make dictionary based attacks practical.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The information-theoretic approach to security entails harnessing the correlated randomness available in nature to establish security. It uses tools from information theory and coding and yields provable security, even against an adversary with unbounded computational power. However, the feasibility of this approach in practice depends on the development of efficiently implementable schemes. In this paper, we review a special class of practical schemes for information-theoretic security that are based on 2-universal hash families. Specific cases of secret key agreement and wiretap coding are considered, and general themes are identified. The scheme presented for wiretap coding is modular and can be implemented easily by including an extra preprocessing layer over the existing transmission codes.