7 resultados para Self-Shrinking P-ADIC Cryptographic Generator

em CORA - Cork Open Research Archive - University College Cork - Ireland


Relevância:

40.00% 40.00%

Publicador:

Resumo:

With the rapid growth of the Internet and digital communications, the volume of sensitive electronic transactions being transferred and stored over and on insecure media has increased dramatically in recent years. The growing demand for cryptographic systems to secure this data, across a multitude of platforms, ranging from large servers to small mobile devices and smart cards, has necessitated research into low cost, flexible and secure solutions. As constraints on architectures such as area, speed and power become key factors in choosing a cryptosystem, methods for speeding up the development and evaluation process are necessary. This thesis investigates flexible hardware architectures for the main components of a cryptographic system. Dedicated hardware accelerators can provide significant performance improvements when compared to implementations on general purpose processors. Each of the designs proposed are analysed in terms of speed, area, power, energy and efficiency. Field Programmable Gate Arrays (FPGAs) are chosen as the development platform due to their fast development time and reconfigurable nature. Firstly, a reconfigurable architecture for performing elliptic curve point scalar multiplication on an FPGA is presented. Elliptic curve cryptography is one such method to secure data, offering similar security levels to traditional systems, such as RSA, but with smaller key sizes, translating into lower memory and bandwidth requirements. The architecture is implemented using different underlying algorithms and coordinates for dedicated Double-and-Add algorithms, twisted Edwards algorithms and SPA secure algorithms, and its power consumption and energy on an FPGA measured. Hardware implementation results for these new algorithms are compared against their software counterparts and the best choices for minimum area-time and area-energy circuits are then identified and examined for larger key and field sizes. Secondly, implementation methods for another component of a cryptographic system, namely hash functions, developed in the recently concluded SHA-3 hash competition are presented. Various designs from the three rounds of the NIST run competition are implemented on FPGA along with an interface to allow fair comparison of the different hash functions when operating in a standardised and constrained environment. Different methods of implementation for the designs and their subsequent performance is examined in terms of throughput, area and energy costs using various constraint metrics. Comparing many different implementation methods and algorithms is nontrivial. Another aim of this thesis is the development of generic interfaces used both to reduce implementation and test time and also to enable fair baseline comparisons of different algorithms when operating in a standardised and constrained environment. Finally, a hardware-software co-design cryptographic architecture is presented. This architecture is capable of supporting multiple types of cryptographic algorithms and is described through an application for performing public key cryptography, namely the Elliptic Curve Digital Signature Algorithm (ECDSA). This architecture makes use of the elliptic curve architecture and the hash functions described previously. These components, along with a random number generator, provide hardware acceleration for a Microblaze based cryptographic system. The trade-off in terms of performance for flexibility is discussed using dedicated software, and hardware-software co-design implementations of the elliptic curve point scalar multiplication block. Results are then presented in terms of the overall cryptographic system.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

In the field of embedded systems design, coprocessors play an important role as a component to increase performance. Many embedded systems are built around a small General Purpose Processor (GPP). If the GPP cannot meet the performance requirements for a certain operation, a coprocessor can be included in the design. The GPP can then offload the computationally intensive operation to the coprocessor; thus increasing the performance of the overall system. A common application of coprocessors is the acceleration of cryptographic algorithms. The work presented in this thesis discusses coprocessor architectures for various cryptographic algorithms that are found in many cryptographic protocols. Their performance is then analysed on a Field Programmable Gate Array (FPGA) platform. Firstly, the acceleration of Elliptic Curve Cryptography (ECC) algorithms is investigated through the use of instruction set extension of a GPP. The performance of these algorithms in a full hardware implementation is then investigated, and an architecture for the acceleration the ECC based digital signature algorithm is developed. Hash functions are also an important component of a cryptographic system. The FPGA implementation of recent hash function designs from the SHA-3 competition are discussed and a fair comparison methodology for hash functions presented. Many cryptographic protocols involve the generation of random data, for keys or nonces. This requires a True Random Number Generator (TRNG) to be present in the system. Various TRNG designs are discussed and a secure implementation, including post-processing and failure detection, is introduced. Finally, a coprocessor for the acceleration of operations at the protocol level will be discussed, where, a novel aspect of the design is the secure method in which private-key data is handled

Relevância:

30.00% 30.00%

Publicador:

Resumo:

To investigate women’s help seeking behavior (HSB) following self discovery of a breast symptom and determine the associated influencing factors. A descriptive correlation design was used to ascertain the help seeking behavior (HSB) and the associated influencing factors of a sample of women (n = 449) with self discovered breast symptoms. The study was guided by the ‘Help Seeking Behaviour and Influencing Factors” conceptual framework (Facione et al., 2002; Meechan et al., 2003, 2002; Leventhal, Brissette and Leventhal, 2003 and O’Mahony and Hegarty, 2009b). Data was collected using a researcher developed multi-scale questionnaire package to ascertain women’s help seeking behavior on self discovery of a breast symptom and determine the factors most associated with HSB. Factors examined include: socio-demographics, knowledge and beliefs (regarding breast symptom; breast changes associated with breast cancer; use of alternative help seeking behaviours and presence or absence of a family history of breast cancer),emotional responses, social factors, health seeking habits and health service system utilization and help seeking behavior. A convenience sample (n = 449 was obtained by the researcher from amongst women attending the breast clinics of two large urban hospitals within the Republic of Ireland. All participants had self-discovered breast symptoms and no previous history of breast cancer. The study identified that while the majority of women (69.9%; n=314) sought help within one month, 30.1% (n=135) delayed help seeking for more than one month following self discovery of their breast symptom. The factors most significantly associated with HSB were the presenting symptom of ‘nipple indrawn/changes’ (p = 0.005), ‘ignoring the symptom and hoping it would go away’ (p < 0.001), the emotional response of being ‘afraid@ on symptom discovery (p = 0.005) and the perception/belief in longer symptom duration (p = 0.023). It was found that women who presented with an indrawn/changed nipple were more likely to delay (OR = 4.81) as were women who ‘ignored the symptoms and hoped it would go away’ (OR = 10.717). Additionally, the longer women perceived that their symptom would last, they more likely they were to delay (OR = 1.18). Conversely, being afraid following symptom discovery was associated with less delay (OR = 0.37; p=0.005). This study provides further insight into the HSB of women who self discovered breast symptoms. It highlights the complexity of the help seeking process, indicating that is not a linear event but is influenced by multiple factors which can have a significant impact on the outcomes in terms of whether women delay or seek help promptly. The study further demonstrates that delayed HSB persists amongst women with self discovered breast symptoms. This has important implications for continued emphasis on the promotion of breast awareness, prompt help seeking for self discovered breast symptoms and early detection and treatment of breast cancer, amongst women of all ages.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Traditionally, attacks on cryptographic algorithms looked for mathematical weaknesses in the underlying structure of a cipher. Side-channel attacks, however, look to extract secret key information based on the leakage from the device on which the cipher is implemented, be it smart-card, microprocessor, dedicated hardware or personal computer. Attacks based on the power consumption, electromagnetic emanations and execution time have all been practically demonstrated on a range of devices to reveal partial secret-key information from which the full key can be reconstructed. The focus of this thesis is power analysis, more specifically a class of attacks known as profiling attacks. These attacks assume a potential attacker has access to, or can control, an identical device to that which is under attack, which allows him to profile the power consumption of operations or data flow during encryption. This assumes a stronger adversary than traditional non-profiling attacks such as differential or correlation power analysis, however the ability to model a device allows templates to be used post-profiling to extract key information from many different target devices using the power consumption of very few encryptions. This allows an adversary to overcome protocols intended to prevent secret key recovery by restricting the number of available traces. In this thesis a detailed investigation of template attacks is conducted, along with how the selection of various attack parameters practically affect the efficiency of the secret key recovery, as well as examining the underlying assumption of profiling attacks in that the power consumption of one device can be used to extract secret keys from another. Trace only attacks, where the corresponding plaintext or ciphertext data is unavailable, are then investigated against both symmetric and asymmetric algorithms with the goal of key recovery from a single trace. This allows an adversary to bypass many of the currently proposed countermeasures, particularly in the asymmetric domain. An investigation into machine-learning methods for side-channel analysis as an alternative to template or stochastic methods is also conducted, with support vector machines, logistic regression and neural networks investigated from a side-channel viewpoint. Both binary and multi-class classification attack scenarios are examined in order to explore the relative strengths of each algorithm. Finally these machine-learning based alternatives are empirically compared with template attacks, with their respective merits examined with regards to attack efficiency.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Background: Cancer related fatigue (CRF) is considered the most severe, debilitating and under-managed symptom of cancer. Patients receiving chemotherapy experience high levels of CRF which profoundly impacts on their lives. Aim: 1). To explore and measure CRF and determine the most effective self-care strategies used to combat CRF in a cohort of patients with a diagnosis of cancer (breast cancer, colorectal cancer, Hodgkin’s and Non-Hodgkin’s lymphoma) 2). To explore self-care agency and its relationship to CRF. Method: A mixed methods study which incorporated a descriptive, comparative, correlational design and qualitative descriptions of patients’ (n=362) experiences gleaned through open ended questions and use of a diary. The study utilised The Revised Pipers Fatigue Scale, the Appraisal of Self-Care Agency and a researcher developed Fatigue Visual Analogue Scale, Fatigue Self-Care Survey, and Diary. Findings: Having breast cancer, Hodgkin’s lymphoma, non-Hodgkin’s lymphoma; using the strategies of counselling, taking a 20–30 minute nap, resting and sleeping, self-monitoring and complementary therapies were all associated with increased odds of developing fatigue. Increased self-care agency; being in the divorced / separated cohort; being widowed; increased length of time since commencement of chemotherapy; engagement in exercise, and socializing were associated with a reduced risk of developing fatigue. Females had 20% higher fatigue levels than males (p=<.001). Receiving support was the strategy used most frequently and rated most effective. Fatigue was very problematic and distressing, four key qualitative categories emerged: the behavioural impact, affective impact, the sensory impact, and the cognitive impact. Keeping a diary was considered very beneficial and cathartic. Conclusions: Fatigue severely impacted on the daily lives of patients undergoing chemotherapy. There are a range of self-care strategies that patients should be encouraged to use e.g. exercise, socializing, and enhancement of psychological well-being. The enhancement of self-care agency and use of diaries should also be considered.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Background: Self-management education may help patients with cystic fibrosis and their families to choose, monitor and adjust treatment requirements for their illness, and also to manage the effects of illness on their lives. Although self-management education interventions have been developed for cystic fibrosis, no previous systematic review of the evidence of effectiveness of these interventions has been conducted. Objectives: To assess the effects of self-management education interventions on improving health outcomes for patients with cystic fibrosis and their caregivers. Search methods: We searched the Cochrane Cystic Fibrosis and Genetic Disorders Group Trials Register (date of the last search: 22 August 2013). We also searched databases through EBSCO (CINAHL; Psychological and Behavioural Sciences Collection; PsychInfo; SocINDEX) and Elsevier (Embase) and handsearched relevant journals and conference proceedings (date of the last searches: 01 February 2014 ). Selection criteria: Randomised controlled trials, quasi-randomised controlled trials or controlled clinical trials comparing different types of self-management education for cystic fibrosis or comparing self-management education with standard care or no intervention. Data collection and analysis: Two authors assessed trial eligibility and risk of bias. Three authors extracted data. Main results: Four trials (involving a total of 269 participants) were included. The participants were children with cystic fibrosis and their parents or caregivers in three trials and adults with cystic fibrosis in one trial. The trials compared four different self-management education interventions versus standard treatment: (1) a training programme for managing cystic fibrosis in general; (2) education specific to aerosol and airway clearance treatments; (3) disease-specific nutrition education; and (4) general and disease-specific nutrition education. Training children to manage cystic fibrosis in general had no statistically significant effects on weight after six to eight weeks, mean difference -7.74 lb (i.e. 3.51 kg) (95% confidence interval -35.18 to 19.70). General and disease-specific nutrition education for adults had no statistically significant effects on: pulmonary function (forced expiratory volume at one second), mean difference -5.00 % (95% confidence interval -18.10 to 8.10) at six months and mean difference -5.50 % (95% confidence interval -18.46 to 7.46) at 12 months; or weight, mean difference - 0.70 kg (95% confidence interval -6.58 to 5.18) at six months and mean difference -0.70 kg (95% confidence interval -6.62 to 5.22) at 12 months; or dietary fat intake scores, mean difference 1.60 (85% confidence interval -2.90 to 6.10) at six months and mean difference 0.20 (95% confidence interval -4.08 to 4.48) at 12 months. There is some limited evidence to suggest that self-management education may improve knowledge in patients with cystic fibrosis but not in parents or caregivers. There is also some limited evidence to suggest that self-management education may result in positively changing a small number of behaviours in both patients and caregivers. Authors' conclusions: The available evidence from this review is of insufficient quantity and quality to draw any firm conclusions about the effects of self-management education for cystic fibrosis. Further trials are needed to investigate the effects of self-management education on a range of clinical and behavioural outcomes in children, adolescents and adults with cystic fibrosis and their caregivers.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Self-neglect is a worldwide and serious public health issue that can have serious adverse outcomes and is more common in older people. Cases can vary in presentation but typically present as poor self-care, poor care of the environment and service refusal. Community nurses frequently encounter self-neglect cases and health and social care professionals play a key role in the identification, management and prevention of self-neglect. Self-neglect cases can give rise to ethical, personal and professional challenges. The aim of this article is to create a greater understanding of the concept of self-neglect among community nurses.