260 resultados para Sulfate Attack
Resumo:
Existing algebraic analyses of the ZUC cipher indicate that the cipher should be secure against algebraic attacks. In this paper, we present an alternative algebraic analysis method for the ZUC stream cipher, where a combiner is used to represent the nonlinear function and to derive equations representing the cipher. Using this approach, the initial states of ZUC can be recovered from 2^97 observed words of keystream, with a complexity of 2^282 operations. This method is more successful when applied to a modified version of ZUC, where the number of output words per clock is increased. If the cipher outputs 120 bits of keystream per clock, the attack can succeed with 219 observed keystream bits and 2^47 operations. Therefore, the security of ZUC against algebraic attack could be significantly reduced if its throughput was to be increased for efficiency.
Resumo:
Both the SSS and SOBER-t32 stream cipher designs use a single word-based shift register and a nonlinear filter function to produce keystream. In this paper we show that the algebraic attack method previously applied to SOBER-t32 is prevented from succeeding on SSS by the use of the key dependent substitution box (SBox) in the nonlinear filter of SSS. Additional assumptions and modifications to the SSS cipher in an attempt to enable algebraic analysis result in other difficulties that also render the algebraic attack infeasible. Based on these results, we conclude that a well chosen key-dependent substitution box used in the nonlinear filter of the stream cipher provides resistance against such algebraic attacks.
Resumo:
Blooms of the toxic cyanobacterium majuscula Lyngbya in the coastal waters of southeast Queensland have caused adverse impacts on both environmental health and human health, and on local economies such as fishing and tourism. A number of studies have confirmed that the main limiting nutrients (“nutrients of concern”) that contribute to these blooms area Fe, DOC, N, P and also pH. This study is conducted to establish the distribution of these parameters in a typical southeast Queensland coastal setting. The study maps the geochemistry of shallow groundwater in the mainland Pumicestone catchment with an emphasis on the nutrients of concern to understand how these nutrients relate to aquifer materials, landuse and anthropogenic activities. The results of the study form a GIS information layer which will be incorporated into a larger GIS model being produced by Queensland Department of Environment and Resource Management (DERM) to support landuse management to avoid/minimize blooms of Lyngbya in Moreton Bay, southeast Queensland, and other similar settings. A total of 38 boreholes were established in the mainland Pumicestone region and four sampling rounds of groundwater carried out in both dry and wet conditions. These groundwater samples were measured in the field for physico-chemical parameters, and in the laboratory analyses for the nutrients of concern, and other major and minor ions. Aquifer materials were confirmed using the Geological Survey of Queensland digital geology map, and geomaterials were assigned to seven categories which are A (sands), B (silts, sandy silts), C (estuarine mud, silts), D (humid soils), E (alluvium), F (sandstone) and G (other bedrock). The results of the water chemistry were examined by use of the software package AquaChem/AqQA, and divided into six groundwater groups, based on groundwater chemical types and location of boreholes. The type of aquifer material and location, and proximity to waterways was found to be important because they affected physico-chemical properties and concentrations of nutrients of concern and dissolved ions. The analytical results showed that iron concentrations of shallow groundwaters were high due to acid sulfate soils, and also mud and silt, but were lower in sand materials. DOC concentrations of these shallow groundwaters in the sand material were high probably due to rapid infiltration. In addition, DOC concentrations in some boreholes were high because they were installed in organic rich wetlands. The pH values of boreholes were from acidic to near neutral; some boreholes with pH values were low (< 4), showing acid sulfate soils in these boreholes. Concentrations of total nitrogen and total phosphorus of groundwaters were generally low, and the main causes of elevated concentrations of total nitrogen and total phosphorus are largely due to animal and human wastes and tend to be found in localized source areas. Comparison of the relative percentage of nitrogen species (NH3/NH4< Org-N, NO3-N and NO2-N) demonstrated that they could be related to sources such as animal waste, residential and agricultural fertilizers, forest and vegetation, mixed residents and farms, and variable setting and vegetation covers. Total concentrations of dissolved ions in sampling round 3 (dry period) were higher than those in sampling round 2 (wet period) due to both evaporation of groundwater in the dry period and the dilution of rainfall in the wet period. This showed that the highest concentrations of nutrients of concern were due to acid sulfate soils, aquifer materials, landuse and anthropogenic activities and were typically in aquifer materials of E (alluvium) and C (estuarine muds) and locations of Burpengary, Caboolture, and Glass Mountain catchments.
Resumo:
A self-escrowed public key infrastructure (SE-PKI) combines the usual functionality of a public-key infrastructure with the ability to recover private keys given some trap-door information. We present an additively homomorphic variant of an existing SE-PKI for ElGamal encryption. We also propose a new efficient SE-PKI based on the ElGamal and Okamoto-Uchiyama cryptosystems that is more efficient than the previous SE-PKI. This is the first SE-PKI that does not suffer from a key doubling problem of previous SE-PKI proposals. Additionally, we present the first self-escrowed encryption schemes secure against chosen-ciphertext attack in the standard model. These schemes are also quite efficient and are based on the Cramer-Shoup cryptosystem, and the Kurosawa-Desmedt hybrid variant in different groups.
Resumo:
The photocatalytic disinfection of Enterobacter cloacae and Enterobacter coli using microwave (MW), convection hydrothermal (HT) and Degussa P25 titania was investigated in suspension and immobilized reactors. In suspension reactors, MW-treated TiO(2) was the most efficient catalyst (per unit weight of catalyst) for the disinfection of E. cloacae. However, HT-treated TiO(2) was approximately 10 times more efficient than MW or P25 titania for the disinfection of E. coli suspensions in surface water using the immobilized reactor. In immobilized experiments, using surface water a significant amount of photolysis was observed using the MW- and HT-treated films; however, disinfection on P25 films was primarily attributed to photocatalysis. Competitive action of inorganic ions and humic substances for hydroxyl radicals during photocatalytic experiments, as well as humic substances physically screening the cells from UV and hydroxyl radical attack resulted in low rates of disinfection. A decrease in colony size (from 1.5 to 0.3 mm) was noted during photocatalytic experiments. The smaller than average colonies were thought to occur during sublethal (•) OH and O(2) (•-) attack. Catalyst fouling was observed following experiments in surface water and the ability to regenerate the surface was demonstrated using photocatalytic degradation of oxalic acid as a model test system
Resumo:
Blends of lignin and poly(hydroxybutyrate) (PHB) were obtained by melt extrusion. They were buried in a garden soil for up to 12 months, and the extent and mechanism of degradation were investigated by gravimetric analysis, thermogravimetric analysis (TGA), differential scanning calorimetry (DSC), X-ray photoelectron spectroscopy (XPS), scanning electron microscopy (SEM) and Fourier transform infra-red spectroscopy (FTIR) over the entire range of compositions. The PHB films were disintegrated and lost 45 wt% of mass within 12 months. This value dropped to 12 wt% of mass when only 10 wt% of lignin was present, suggesting that lignin both inhibited and slowed down the rate of PHB degradation. TGA and DSC indicated structural changes, within the lignin/PHB matrix, with burial time, while FTIR results confirmed the fragmentation of the PHB polymer. XPS revealed an accumulation of biofilms on the surface of buried samples, providing evidence of a biodegradation mechanism. Significant surface roughness was observed with PHB films due to microbial attack caused by both loosely and strongly associated micro-organisms. The presence of lignin in the blends may have inhibited the colonisation of the micro-organisms and caused the blends to be more resistant to microbial attack. Analysis suggested that lignin formed strong hydrogen bonds with PHB in the buried samples and it is likely that the rate of breakdown of PHB is reduced, preventing rapid degradation of the blends.
Resumo:
Non-state insurgent actors are too weak to compel powerful adversaries to their will, so they use violence to coerce. A principal objective is to grow and sustain violent resistance to the point that it either militarily challenges the state, or more commonly, generates unacceptable political costs. To survive, insurgents must shift popular support away from the state and to grow they must secure it. State actor policies and actions perceived as illegitimate and oppressive by the insurgent constituency can generate these shifts. A promising insurgent strategy is to attack states in ways that lead angry publics and leaders to discount the historically established risks and take flawed but popular decisions to use repressive measures. Such decisions may be enabled by a visceral belief in the power of coercion and selective use of examples of where robust measures have indeed suppressed resistance. To avoid such counterproductive behaviours the cases of apparent 'successful repression' must be understood. This thesis tests whether robust state action is correlated with reduced support for insurgents, analyses the causal mechanisms of such shifts and examines whether such reduction is because of compulsion or coercion? The approach is founded on prior research by the RAND Corporation which analysed the 30 insurgencies most recently resolved worldwide to determine factors of counterinsurgent success. This new study first re-analyses their data at a finer resolution with new queries that investigate the relationship between repression and insurgent active support. Having determined that, in general, repression does not correlate with decreased insurgent support, this study then analyses two cases in which the data suggests repression seems likely to be reducing insurgent support: the PKK in Turkey and the insurgency against the Vietnamese-sponsored regime after their ousting of the Khmer Rouge. It applies 'structured-focused' case analysis with questions partly built from the insurgency model of Leites and Wolf, who are associated with the advocacy of US robust means in Vietnam. This is thus a test of 'most difficult' cases using a 'least likely' test model. Nevertheless, the findings refute the deterrence argument of 'iron fist' advocates. Robust approaches may physically prevent effective support of insurgents but they do not coercively deter people from being willing to actively support the insurgency.
Resumo:
Layered doubly hydroxides (LDHs) also known as hydrotalcites or anionic clays are a group of clay minerals that have shown promise for the removal of toxic anions from water through both anion exchange and a process known as the reformation effect. This project has involved the preparation and characterisation of LDH materials as well as the investigation of their ability to remove selected anions from aqueous solutions by the reformation effect. The LDH materials were successfully prepared from magnesium, aluminium, zinc and chromium chloride salts using the co-precipitation method. Samples were characterised using powder X-ray diffraction (XRD) and thermogravimetry (TG) to confirm the presence of LDHs. Powder XRD revealed a characteristic LDH structure for all LDH samples. Thermal Analysis showed decomposition usual occurred through a three or four step process as expected for LDHs. Preliminary investigations of the removal of sulfate, nitrate and fluoride by an Mg/Al LDH were carried out, and the products were characterised using XRD and TG which showed that an LDH material similar to the original hydrotalcite was formed after reformation. A Zn/Al LDH was investigated as a potential sorbent material for the removal of iodine and iodide from water. It was found that the LDH was a suitable adsorbent which is able to remove almost all of the iodine present in the test solutions. Again, the products were characterised by XRD, TG and evolved gas mass spectrometry (EGMS) in an attempt to better understand the iodine removal process. Powder XRD showed successful reformation of the LDH structure and TG/EGMS showed that only a small amount of iodine species were lost during thermal decomposition. Finally, the mineral stichtite a Mg/Cr LDH was successfully synthesised and investigated using XRD, TG and EGMS. Unfortunately, due to lack of time it was not possible to identify any new uses for the mineral stichtite in the current project.
Resumo:
This paper presents a model for generating a MAC tag with a stream cipher using the input message indirectly. Several recent proposals represent instances of this model with slightly different options. We investigate the security of this model for different options, and identify cases which permit forgery attacks. Based on this, we present a new forgery attack on version 1.4 of 128-EIA3. Design recommendations to enhance the security of proposals following this general model are given.
Resumo:
12.1 Drugs for hypertension 12.1.1 Epidemiology and pathophysiology 12.1.2 Diuretics for hypertension 12.2.3 Vasodilators for hypertension 12.4.4 β-Adrenoceptor blockers for hypertension 12.2. Drugs for angina 12.2.1 Typical angina 12.2.2 Drugs to treat an attack of typical angina 12,2.3 Drugs to prevent an attack of typical angina 12.2.4 Atypical angina 12.3 Drugs for heart failure 12.3.1 The heart failure epidemic 12.3.2 Compensatory changes in heart failure 12.3.3 Diuretics for heart failure 12.3.4 ACE inhibitors and AT1-receptor antagonists 12.3.5 β-adrenoceptor antagonists 12.3.6 Digoxin
Resumo:
Sampling of the El Chichón stratospheric cloud in early May and in late July, 1982, showed that a significant proportion of the cloud consisted of solid particles between 2 μm and 40 μm size. In addition, many particles may have been part of larger aggregates or clusters that ranged in size from < 10 μm to > 50 μm. The majority of individual grains were angular aluminosilicate glass shards with various amounts of smaller, adhering particles. Surface features on individual grains include sulfuric acid droplets and larger (0.5 μm to 1 μm) sulfate gel droplets with various amounts of Na, Mg, Ca and Fe. The sulfate gels probably formed by the interaction of sulfur-rich gases and solid particles within the cloud soon after eruption. Ca-sulfate laths may have formed by condensation within the plume during eruption, or alternatively, at a later stage by the reaction of sulfuric acid aerosols with ash fragments within the stratospheric cloud. A Wilson-Huang formulation for the settling rate of individual particles qualitatively agrees with the observed particle-size distribution for a period at least four months after injection of material into the stratosphere. This result emphasizes the importance of particle shape in controlling the settling rate of volcanic ash from the stratosphere.
Resumo:
Authigenic illite-smectite and chlorite in reservoir sandstones from several Pacific rim sedimentary basins in Australia and New Zealand have been examined using an Electroscan Environmental Scanning Electron Microscope (ESEM) before, during, and after treatment with fresh water and HCl, respectively. These dynamic experiments are possible in the ESEM because, unlike conventional SEMs that require a high vacuum in the sample chamber (10-6 torr), the ESEM will operate at high pressures up to 20 torr. This means that materials and processes can be examined at high magnifications in their natural states, wet or dry, and over a range of temperatures (-20 to 1000 degrees C) and pressures. Sandstones containing the illite-smectite (60-70% illite interlayers) were flushed with fresh water for periods of up to 12 hours. Close examination of the same illite-smectite lines or filled pores, both before and after freshwater treatments, showed that the morphology of the illite-smectite was not changed by prolonged freshwater treatment. Chlorite-bearing sandstones (Fe-rich chlorite) were reacted with 1M to 10M HCl at temperatures of up to 80 degrees C and for periods of up to 48 hours. Before treatment the chlorites showed typically platy morphologies. After HCl treatment the chlorite grains were coated with an amorphous gel composed of Ca, Cl, and possibly amorphous Si, as determined by EDS analyses on the freshly treated rock surface. Brief washing in water removed this surface coating and revealed apparently unchanged chlorite showing no signs of dissolution or acid attack. However, although the chlorite showed no morphological changes, elemental analysis only detected silicon and oxygen.
Resumo:
NeSSi (network security simulator) is a novel network simulation tool which incorporates a variety of features relevant to network security distinguishing it from general-purpose network simulators. Its capabilities such as profile-based automated attack generation, traffic analysis and support for detection algorithm plug-ins allow it to be used for security research and evaluation purposes. NeSSi has been successfully used for testing intrusion detection algorithms, conducting network security analysis and developing overlay security frameworks. NeSSi is built upon the agent framework JIAC, resulting in a distributed and extensible architecture. In this paper, we provide an overview of the NeSSi architecture as well as its distinguishing features and briefly demonstrate its application to current security research projects.
Resumo:
Sfinks is a shift register based stream cipher designed for hardware implementation and submitted to the eSTREAM project. In this paper, we analyse the initialisation process of Sfinks. We demonstrate a slid property of the loaded state of the Sfinks cipher, where multiple key-IV pairs may produce phase shifted keystream sequences. The state update functions of both the initialisation process and keystream generation and also the pattern of the padding affect generation of the slid pairs.
Resumo:
The effect of HCl on authigenic chlorite in three different sandstones has been examined uisng an Environmental Scanning Electron Microscope (ESEM), together with conventional analytical techniques. The ESEM enabled chlorites to be directly observed in situ at high magnifications during HCl treatment, and was particularly effective in allowing the same chlorite areas to be closely compared before and after acid treatment. Chlorites were reacted with 1M to 10M HCl at temperatures up to 80°C and for periods up to five months. After all treatments, chlorites show extensive leaching of iron, magnesium and aluminum, and their crystalline structure is destroyed. However, despite these major compositional and structural changes, chlorites show little or no visible evidence of acid attack, with precise morphological detail of individual plates preserved in all samples following acid treatments. Chlorite dissolution, sensu stricto, did not occur as a result of acidization of the host sandstones. Acid-treated chlorides are likely to exits in a structurally weakened state that may make them susceptible to physical disintegration during fluid flow. Accordingly, fines migration may be a significant engineering problem associated with the acidization of chlorite-bearing sandstones. © 1993.