19 resultados para chosen-plaintext attack
em Indian Institute of Science - Bangalore - Índia
Resumo:
CTRU, a public key cryptosystem was proposed by Gaborit, Ohler and Sole. It is analogue of NTRU, the ring of integers replaced by the ring of polynomials $\mathbb{F}_2[T]$ . It attracted attention as the attacks based on either LLL algorithm or the Chinese Remainder Theorem are avoided on it, which is most common on NTRU. In this paper we presents a polynomial-time algorithm that breaks CTRU for all recommended parameter choices that were derived to make CTRU secure against popov normal form attack. The paper shows if we ascertain the constraints for perfect decryption then either plaintext or private key can be achieved by polynomial time linear algebra attack.
Resumo:
We present a technique for irreversible watermarking approach robust to affine transform attacks in camera, biomedical and satellite images stored in the form of monochrome bitmap images. The watermarking approach is based on image normalisation in which both watermark embedding and extraction are carried out with respect to an image normalised to meet a set of predefined moment criteria. The normalisation procedure is invariant to affine transform attacks. The result of watermarking scheme is suitable for public watermarking applications, where the original image is not available for watermark extraction. Here, direct-sequence code division multiple access approach is used to embed multibit text information in DCT and DWT transform domains. The proposed watermarking schemes are robust against various types of attacks such as Gaussian noise, shearing, scaling, rotation, flipping, affine transform, signal processing and JPEG compression. Performance analysis results are measured using image processing metrics.
Resumo:
Grouping and coordination tactics for ground attack missions by a heterogeneous mix of reconnaissance, enemy suppression, and attack unmanned aerial vehicles (UAVs) is presented. Dubins' paths are used to determine the optimal number of attack UAVs and their positional and heading freedoms, as functions of weapon seeker range and field of view. A generic battlefield scenario with layered defense is created and the tactics are evaluated on a Group Flyer simulation platform for both nominal and off-nominal conditions.
Resumo:
Mobile Ad hoc Networks (MANETs) having strikingly superior features also come with notable disadvantage and troubles and the most exigent amongst all being security related issues. Such an ringent network dexterously pave approach for the malicious nodes. Hence providing security is a tedious task. For such a dynamic environment, a security system which dynamically observes the attacker's plans and protect the highly sophisticated resources is in high demand. In this paper we present a method of providing security against wormhole attacks to a MANET by learning about the environment dynamically and adapting itself to avoid malicious nodes. We accomplish this with the assistance of Honeypot. Our method predicts the wormhole attack that may take place and protect the resources well-in advance. Also it cleverly deal with the attacker by using previous history and different type of messages to locate the attacker. Several experiments suggest that the system is accurate in handling wormhole attack.
Resumo:
The growing number of applications and processing units in modern Multiprocessor Systems-on-Chips (MPSoCs) come along with reduced time to market. Different IP cores can come from different vendors, and their trust levels are also different, but typically they use Network-on-Chip (NoC) as their communication infrastructure. An MPSoC can have multiple Trusted Execution Environments (TEEs). Apart from performance, power, and area research in the field of MPSoC, robust and secure system design is also gaining importance in the research community. To build a secure system, the designer must know beforehand all kinds of attack possibilities for the respective system (MPSoC). In this paper we survey the possible attack scenarios on present-day MPSoCs and investigate a new attack scenario, i.e., router attack targeted toward NoC architecture. We show the validity of this attack by analyzing different present-day NoC architectures and show that they are all vulnerable to this type of attack. By launching a router attack, an attacker can control the whole chip very easily, which makes it a very serious issue. Both routing tables and routing logic-based routers are vulnerable to such attacks. In this paper, we address attacks on routing tables. We propose different monitoring-based countermeasures against routing table-based router attack in an MPSoC having multiple TEEs. Synthesis results show that proposed countermeasures, viz. Runtime-monitor, Restart-monitor, Intermediate manager, and Auditor, occupy areas that are 26.6, 22, 0.2, and 12.2 % of a routing table-based router area. Apart from these, we propose Ejection address checker and Local monitoring module inside a router that cause 3.4 and 10.6 % increase of a router area, respectively. Simulation results are also given, which shows effectiveness of proposed monitoring-based countermeasures.
Resumo:
In this paper, we present a machine learning approach to measure the visual quality of JPEG-coded images. The features for predicting the perceived image quality are extracted by considering key human visual sensitivity (HVS) factors such as edge amplitude, edge length, background activity and background luminance. Image quality assessment involves estimating the functional relationship between HVS features and subjective test scores. The quality of the compressed images are obtained without referring to their original images ('No Reference' metric). Here, the problem of quality estimation is transformed to a classification problem and solved using extreme learning machine (ELM) algorithm. In ELM, the input weights and the bias values are randomly chosen and the output weights are analytically calculated. The generalization performance of the ELM algorithm for classification problems with imbalance in the number of samples per quality class depends critically on the input weights and the bias values. Hence, we propose two schemes, namely the k-fold selection scheme (KS-ELM) and the real-coded genetic algorithm (RCGA-ELM) to select the input weights and the bias values such that the generalization performance of the classifier is a maximum. Results indicate that the proposed schemes significantly improve the performance of ELM classifier under imbalance condition for image quality assessment. The experimental results prove that the estimated visual quality of the proposed RCGA-ELM emulates the mean opinion score very well. The experimental results are compared with the existing JPEG no-reference image quality metric and full-reference structural similarity image quality metric.
Resumo:
Test results reported on several natural sensitive soils show significant anisotropy of the yield curves, which are generally oriented along the coefficient of earth pressure at rest (K-0) axis. An attempt is made in this paper to explain the anisotropy in yielding from microstructural considerations. An elliptic pore, with particle domains aligned along the periphery of the pore, and with the major axis of the pore being oriented along the direction of the in situ major principal stress, is chosen as the unit of microstructure. An analysis of forces at the interdomain contacts around the ellipse is carried out with reference to experimentally determined yield stress conditions of one soil, and a yield criteria is defined. The analysis, with the proposed yield criteria, enables one to define the complete yield curve for any other soil from the results of only two tests (one constant eta compression test with eta close to eta(K?0), where eta is the stress ratio (= q/p) and eta(K?0) is the stress ratio corresponding to anisotropic K-0 compression, and another undrained shear test). Predicted yield curves are compared with experimental yield curves of several soils reported in the literature.
Resumo:
Glycodelin A (GdA), is a lipocalin with an immunomodulatory role, secreted by the endometrium under progesterone regulation and proposed to play a role in protecting the fetus from maternal immune attack. Glycodelin A has an inhibitory effect on the proliferation of T cells and B cells and also on the activity of natural killer cells. We have earlier demonstrated that the inhibitory effect of glycodelin A on T cell proliferation is due to apoptosis induced in these cells through the caspase-dependent intrinsic mitochondrial pathway. Studies reported until now have shown that glycodelin modulates the adaptive immune responses. We, therefore, decided to look at its effect, if any, on the innate immune system. The effect of glycodelin on monocytes was studied using human monocytic cell lines, THP1 and U937, and primary human monocytes as model systems. We demonstrated that glycodelin inhibited the proliferation of THP1 and U937 and induced apoptosis in these cells as well as in primary monocytes. We found that this signaling was caspase-independent but followed the intrinsic mitochondrial pathway of apoptosis. No effect of glycodelin was seen on the phagocytic ability of monocytes post-differentiation into macrophages. These observations suggest that, at the fetomaternal interface, glycodelin plays a protective role by deleting the monocytes that could become pro-inflammatory. Importantly, leaving the macrophages untouched to carry on with efficient clearance of the apoptotic cells.
Resumo:
In order to explore the anticancer effect associated with the thiazolidinone framework, several 2-(5-((5-(4-chlorophenyl)furan-2-yl)methylene)-4-oxo-2-thioxothiazolidin-3-yl)acetic acid derivatives 5(a-1) were synthesized. Variation in the functional group at C-terminal of the thiazolidinone led to set of compounds bearing amide moiety. Their chemical structures were confirmed by H-1 NMR, IR and Mass Spectra analysis. These thiazolidinone compounds containing furan moiety exhibits moderate to strong antiproliferative activity in a cell cycle stage-dependent and dose dependent manner in two different human leukemia cell lines. The importance of the electron donating groups on thiazolidinone moiety was confirmed by MTT and Trypan blue assays and it was concluded that the 4th position of the substituted aryl ring plays a dominant role for its anticancer property. Among the synthesized compounds, 5e and 5f have shown potent anticancer activity on both the cell lines tested. To rationalize the role of electron donating group in the induction of cytotoxicity we have chosen two molecules (5e and 5k) having different electron donating group at different positions. LDH assay, Flow cytometric analysis and DNA fragmentation suggest that 5e is more cytotoxic and able to induce the apoptosis. (C) 2009 Elsevier Ltd. All rights reserved.
Resumo:
Lifted turbulent jet diffusion flame is simulated using Conditional Moment Closure (CMC). Specifically, the burner configuration of Cabra et al. [R. Cabra, T. Myhrvold, J.Y. Chen. R.W. Dibble, A.N. Karpetis, R.S. Barlow, Proc. Combust. Inst. 29 (2002) 1881-1887] is chosen to investigate H-2/N-2 jet flame supported by a vitiated coflow of products of lean H-2/air combustion. A 2D, axisymmetric flow-model fully coupled with the scalar fields, is employed. A detailed chemical kinetic scheme is included, and first order CIVIC is applied. Simulations are carried out for different jet velocities and coflow temperatures (T-c) The predicted liftoff generally agrees with experimental data, as well as joint-PDF results. Profiles of mean scalar fluxes in the mixture fraction space, for T-c = 1025 and 1080 K reveal that (1) Inside the flame zone, the chemical term balances the molecular diffusion term, and hence the Structure is of a diffusion flamelet for both cases. (2) In the pre-flame zone, the structure depends on the coflow temperature: for the 1025 K case, the chemical term being small, the advective term balances the axial turbulent diffusion term. However, for the 1080 K case. the chemical term is large and balances the advective term, the axial turbulent diffusion term being small. It is concluded that, lift-off is controlled (a) by turbulent premixed flame propagation for low coflow temperature while (b) by autoignition for high coflow temperature. (C) 2009 The Combustion Institute. Published by Elsevier Inc. All rights reserved.
Resumo:
Turbulent mixed convection flow and heat transfer in a shallow enclosure with and without partitions and with a series of block-like heat generating components is studied numerically for a range of Reynolds and Grashof numbers with a time-dependent formulation. The flow and temperature distributions are taken to be two-dimensional. Regions with the same velocity and temperature distributions can be identified assuming repeated placement of the blocks and fluid entry and exit openings at regular distances, neglecting the end wall effects. One half of such module is chosen as the computational domain taking into account the symmetry about the vertical centreline. The mixed convection inlet velocity is treated as the sum of forced and natural convection components, with the individual components delineated based on pressure drop across the enclosure. The Reynolds number is based on forced convection velocity. Turbulence computations are performed using the standard k– model and the Launder–Sharma low-Reynolds number k– model. The results show that higher Reynolds numbers tend to create a recirculation region of increasing strength in the core region and that the effect of buoyancy becomes insignificant beyond a Reynolds number of typically 5×105. The Euler number in turbulent flows is higher by about 30 per cent than that in the laminar regime. The dimensionless inlet velocity in pure natural convection varies as Gr1/3. Results are also presented for a number of quantities of interest such as the flow and temperature distributions, Nusselt number, pressure drop and the maximum dimensionless temperature in the block, along with correlations.
Resumo:
Many wireless applications demand a fast mechanism to detect the packet from a node with the highest priority ("best node") only, while packets from nodes with lower priority are irrelevant. In this paper, we introduce an extremely fast contention-based multiple access algorithm that selects the best node and requires only local information of the priorities of the nodes. The algorithm, which we call Variable Power Multiple Access Selection (VP-MAS), uses the local channel state information from the accessing nodes to the receiver, and maps the priorities onto the receive power. It is based on a key result that shows that mapping onto a set of discrete receive power levels is optimal, when the power levels are chosen to exploit packet capture that inherently occurs in a wireless physical layer. The VP-MAS algorithm adjusts the expected number of users that contend in each step and their respective transmission powers, depending on whether previous transmission attempts resulted in capture, idle channel, or collision. We also show how reliable information regarding the total received power at the receiver can be used to improve the algorithm by enhancing the feedback mechanism. The algorithm detects the packet from the best node in 1.5 to 2.1 slots, which is considerably lower than the 2.43 slot average achieved by the best algorithm known to date.
Resumo:
The specific objective of this paper is to develop a state space model of a tubular ammonia reactor which is the heart of an ammonia plant in a fertiliser complex. A ninth order model with three control inputs and two disturbance inputs is generated from the nonlinear distributed model using linearization and lumping approximations. The lumped model is chosen such that the steady state temperature at the exit of the catalyst bed computed from the simplified state space model is close enough to the one computed from the nonlinear steady state model. The model developed in this paper is very useful for the design of continuous/discrete versions of single variable/multivariable control algorithms.
Resumo:
With the extension of the work of the preceding paper, the relativistic front form for Maxwell's equations for electromagnetism is developed and shown to be particularly suited to the description of paraxial waves. The generators of the Poincaré group in a form applicable directly to the electric and magnetic field vectors are derived. It is shown that the effect of a thin lens on a paraxial electromagnetic wave is given by a six-dimensional transformation matrix, constructed out of certain special generators of the Poincaré group. The method of construction guarantees that the free propagation of such waves as well as their transmission through ideal optical systems can be described in terms of the metaplectic group, exactly as found for scalar waves by Bacry and Cadilhac. An alternative formulation in terms of a vector potential is also constructed. It is chosen in a gauge suggested by the front form and by the requirement that the lens transformation matrix act locally in space. Pencils of light with accompanying polarization are defined for statistical states in terms of the two-point correlation function of the vector potential. Their propagation and transmission through lenses are briefly considered in the paraxial limit. This paper extends Fourier optics and completes it by formulating it for the Maxwell field. We stress that the derivations depend explicitly on the "henochromatic" idealization as well as the identification of the ideal lens with a quadratic phase shift and are heuristic to this extent.
Resumo:
This paper presents two approximate analytical expressions for nonlinear electric fields in the principal direction in axially symmetric (3D) and two dimensional (2D) ion trap mass analysers with apertures (holes in case of 3D traps and slits in case of 2D traps) on the electrodes. Considered together (3D and 2D), we present composite approximations for the principal unidirectional nonlinear electric fields in these ion traps. The composite electric field E has the form E = E-noaperture + E-aperture. where E-noaperture is the field within an imagined trap which is identical to the practical trap except that the apertures are missing and E-aperture is the field contribution due to apertures on the two trap electrodes. The field along the principal axis, of the trap can in this way be well approximated for any aperture that is not too large. To derive E-aperture. classical results of electrostatics have been extended to electrodes with finite thickness and different aperture shapes.E-noaperture is a modified truncated multipole expansion for the imagined trap with no aperture. The first several terms in the multipole expansion are in principle exact(though numerically determined using the BEM), while the last term is chosen to match the field at the electrode. This expansion, once Computed, works with any aperture in the practical trap. The composite field approximation for axially symmetric (3D) traps is checked for three geometries: the Paul trap, the cylindrical ion trap (CIT) and an arbitrary other trap. The approximation for 2D traps is verified using two geometries: the linear ion trap (LIT) and the rectilinear ion trap (RIT). In each case, for two aperture sizes (10% and 50% of the trap dimension), highly satisfactory fits are obtained. These composite approximations may be used in more detailed nonlinear ion dynamics Studies than have been hitherto attempted. (C) 2009 Elsevier B.V. All rights reserved.