2 resultados para KEYS
em Cochin University of Science
Resumo:
Even though Bergey '5 Manual has been recognized globally as the guide to bacterial systematics, it has to be emphasized that descriptions given to a large extent are based on studies made with temperate isolates This leads one to conclude that any attempt to identify the tropical isolates with identification keys and tables generated from this information may lead to erroneous conclusions. And there is every possibility of the existence of genotypic and phenotypic variants or even nev. species in this part ofthe aquatic ecosystem. Applications ofa polythetic scheme of classification based on the principles of Numerical Taxonomy opens up exciting avenues for bringing to light, this possibility which otherwise would have been masked by the unidirectional approach as in monothetic schemes. Another added advantage of clustering a ‘natural’ bacterial population by numerical taxonomy, is the ease by which genotypic characterization could be performed on the clusters by selecting a representative from each cluster This helps overcome the practical impossibility of analyzing all the isolates in a pani:'_lar cluster. The genotypic characteizarion would either be mole °/o G-'rC. DNA-D.\_-X hybridization, DNA-RNA hybridization or DNA fingerprinting. Considering the requirement creating a broad base in the understanding of the family Vibrionaceae associated with the larvae ofM rosenbergii, the present work was undertaken to channelize every new information generated for developing appropriate managerial measures to protect the larvae from vibriosis during the unusually prolonged larval phase.
Resumo:
In symmetric block ciphers, substitution and diffusion operations are performed in multiple rounds using sub-keys generated from a key generation procedure called key schedule. The key schedule plays a very important role in deciding the security of block ciphers. In this paper we propose a complex key generation procedure, based on matrix manipulations, which could be introduced in symmetric ciphers. The proposed key generation procedure offers two advantages. First, the procedure is simple to implement and has complexity in determining the sub-keys through crypt analysis. Secondly, the procedure produces a strong avalanche effect making many bits in the output block of a cipher to undergo changes with one bit change in the secret key. As a case study, matrix based key generation procedure has been introduced in Advanced Encryption Standard (AES) by replacing the existing key schedule of AES. The key avalanche and differential key propagation produced in AES have been observed. The paper describes the matrix based key generation procedure and the enhanced key avalanche and differential key propagation produced in AES. It has been shown that, the key avalanche effect and differential key propagation characteristics of AES have improved by replacing the AES key schedule with the Matrix based key generation procedure