5 resultados para Cryptographic Protocols, Provable Security, ID-Based Cryptography
em Biblioteca Digital da Produção Intelectual da Universidade de São Paulo
Resumo:
Three-party password-authenticated key exchange (3PAKE) protocols allow entities to negotiate a secret session key with the aid of a trusted server with whom they share a human-memorable password. Recently, Lou and Huang proposed a simple 3PAKE protocol based on elliptic curve cryptography, which is claimed to be secure and to provide superior efficiency when compared with similar-purpose solutions. In this paper, however, we show that the solution is vulnerable to key-compromise impersonation and offline password guessing attacks from system insiders or outsiders, which indicates that the empirical approach used to evaluate the scheme's security is flawed. These results highlight the need of employing provable security approaches when designing and analyzing PAKE schemes. Copyright (c) 2011 John Wiley & Sons, Ltd.
Resumo:
A JME-compliant cryptographic library for mobile application development is introduced in this paper. The library allows cryptographic protocols implementation over elliptic curves with different security levels and offers symmetric and asymmetric bilinear pairings operations, as Tate, Weil, and Ate pairings.
Resumo:
The ALRED construction is a lightweight strategy for constructing message authentication algorithms from an underlying iterated block cipher. Even though this construction's original analyses show that it is secure against some attacks, the absence of formal security proofs in a strong security model still brings uncertainty on its robustness. In this paper, aiming to give a better understanding of the security level provided by different authentication algorithms based on this design strategy, we formally analyze two ALRED variants-the MARVIN message authentication code and the LETTERSOUP authenticated-encryption scheme,-bounding their security as a function of the attacker's resources and of the underlying cipher's characteristics.
Resumo:
The aim of the present study was to evaluate the efficacy of QMiX, SmearClear, and 17% EDTA for the debris and smear layer removal from the root canal and its effects on the push-out bond strength of an epoxy-based sealer by scanning electron microscopy (SEM). Forty extracted human canines (n = 10) were assigned to the following final rinse protocols: G1-distilled water (control), G2–17% EDTA, G3-SmearClear, and G4-QMiX. The specimens were submitted to a SEM analysis to evaluate the presence of debris and smear layer, respectively, in the apical or cervical segments. In sequence, forty extracted human maxillary canines with the root canals instrumented were divided into four groups (n = 10) similar to the SEM analysis study. After the filling with AH Plus, the roots were transversally sectioned to obtain dentinal slices. The specimens were submitted to a push-out bond strength test using an electromechanical testing machine. The statistical analysis for the SEM and push-out bond strength studies were performed using the Kruskal–Wallis and Dunn tests (α = 5%). There was no difference among the G2, G3, and G4 efficacy in removing the debris and smear layer (P > 0.05). The efficacy of these groups was superior to the control group. The push-out bond strength values of G2, G3, and G4 were superior to the control group. The ability to remove the debris and smear layer by SmearClear and QMiX was as effective as the 17% EDTA. The final rinse with these solutions promoted similar push-out bond strength values.
Resumo:
The aim of the present study was to evaluate the effects of the PGF2˛treatment givenat the onset of a synchronization of ovulation protocol using a norgestomet (NORG) earimplant on ovarian follicular dynamics (Experiment 1) and pregnancy per AI (P/AI; Exper-iment 2) in cyclic (CL present) Bos indicus heifers. In Experiment 1, a total of 46 heiferswere presynchronized using two consecutive doses of PGF2˛12 days apart. At first dayof the synchronization protocol the heifers received implants containing 3 mg of NORGand 2 mg of estradiol benzoate (EB). At the same time, heifers were randomly assignedto receive 150 mg of d-cloprostenol (n = 23; PGF2˛) or no additional treatment (n = 23;Control). When the ear implants were removed 8 days later, all heifers received a PGF2˛treatment and 1 mg of EB was given 24 h later. The follicular diameter and interval toovulation were determined by transrectal ultrasonography. No effects of PGF2˛treat-ment on the diameter of the largest follicle present were observed at implant removal(PGF2˛= 9.8 ± 0.4 vs. Control = 10.0 ± 0.3 mm; P = 0.73) or after 24 h (PGF2˛= 11.1 ± 0.4 vs.Control = 11.0 ± 0.4 mm; P = 0.83). No differences in the time of ovulation after ear implantremoval (PGF2˛= 70.8 ± 1.2 vs. Control = 73.3 ± 0.9 h; P = 0.10) or in the ovulation rate(PGF2˛= 87.0 vs. Control = 82.6%; P = 0.64) between treatments were observed. In Experi-ment 2, 280 cyclic heifers were synchronized using the same experimental design describedabove (PGF2˛; n = 143 and Control; n = 137), at random day of the estrous cycle. All heifersreceived 300 IU of equine chorionic gonadotropin (eCG) and 0.5 mg of estradiol cypionate(as ovulatory stimulus) when the NORG ear implants were removed. Timed artificial insem-ination (TAI) was performed 48 h after implant removal and the pregnancy diagnosis wasconducted 30 days later. No effects on the P/AI due to PGF2˛treatment were observed(PGF2˛= 51.7 vs. Control = 57.7%; P = 0.29). In conclusion, PGF2˛treatment at the onset ofNORG-based protocols for the synchronization of ovulation did not alter the ovarian follic-ular responses or the P/AI in cyclic Bos indicus beef heifers synchronized for TAI.