33 resultados para RSA public-key cryptography
Resumo:
We employ the methods of statistical physics to study the performance of Gallager type error-correcting codes. In this approach, the transmitted codeword comprises Boolean sums of the original message bits selected by two randomly-constructed sparse matrices. We show that a broad range of these codes potentially saturate Shannon's bound but are limited due to the decoding dynamics used. Other codes show sub-optimal performance but are not restricted by the decoding dynamics. We show how these codes may also be employed as a practical public-key cryptosystem and are of competitive performance to modern cyptographical methods.
Resumo:
Security and reliability of LDPC based public-key cryptosystems are discussed and analysed. We study attacks on the cryptosystem when partial knowledge of one or more of the private key components and/or of the plaintext have been acquired.
Resumo:
The security and reliability of a class of public-key cryptosystems against attacks by unauthorized parties, who had acquired partial knowledge of one or more of the private key components and/or of the message, were discussed. The standard statistical mechanical methods of dealing with diluted spin systems with replica symmetric considerations were analyzed. The dynamical transition which defined decryption success in practical situation was studied. The phase diagrams which showed the dynamical threshold as a function of the partial acquired knowledge of the private key were also presented.
Resumo:
Partial information leakage in deterministic public-key cryptosystems refers to a problem that arises when information about either the plaintext or the key is leaked in subtle ways. Quite a common case is where there are a small number of possible messages that may be sent. An attacker may be able to crack the scheme simply by enumerating all the possible ciphertexts. Two methods are proposed for facing the partial information leakage problem in RSA that incorporate a random element into the encrypted message to increase the number of possible ciphertexts. The resulting scheme is, effectively, an RSA-like cryptosystem which exhibits probabilistic encryption. The first method involves encrypting several similar messages with RSA and then using the Quadratic Residuosity Problem (QRP) to mark the intended one. In this way, an adversary who has correctly guessed two or more of the ciphertexts is still in doubt about which message is the intended one. The cryptographic strength of the combined system is equal to the computational difficulty of factorising a large integer; ideally, this should be feasible. The second scheme uses error-correcting codes for accommodating the random component. The plaintext is processed with an error-correcting code and deliberately corrupted before encryption. The introduced corruption lies within the error-correcting ability of the code, so as to enable the recovery of the original message. The random corruption offers a vast number of possible ciphertexts corresponding to a given plaintext; hence an attacker cannot deduce any useful information from it. The proposed systems are compared to other cryptosystems sharing similar characteristics, in terms of execution time and ciphertext size, so as to determine their practical utility. Finally, parameters which determine the characteristics of the proposed schemes are also examined.
Resumo:
The advent of personal communication systems within the last decade has depended upon the utilization of advanced digital schemes for source and channel coding and for modulation. The inherent digital nature of the communications processing has allowed the convenient incorporation of cryptographic techniques to implement security in these communications systems. There are various security requirements, of both the service provider and the mobile subscriber, which may be provided for in a personal communications system. Such security provisions include the privacy of user data, the authentication of communicating parties, the provision for data integrity, and the provision for both location confidentiality and party anonymity. This thesis is concerned with an investigation of the private-key and public-key cryptographic techniques pertinent to the security requirements of personal communication systems and an analysis of the security provisions of Second-Generation personal communication systems is presented. Particular attention has been paid to the properties of the cryptographic protocols which have been employed in current Second-Generation systems. It has been found that certain security-related protocols implemented in the Second-Generation systems have specific weaknesses. A theoretical evaluation of these protocols has been performed using formal analysis techniques and certain assumptions made during the development of the systems are shown to contribute to the security weaknesses. Various attack scenarios which exploit these protocol weaknesses are presented. The Fiat-Sharmir zero-knowledge cryptosystem is presented as an example of how asymmetric algorithm cryptography may be employed as part of an improved security solution. Various modifications to this cryptosystem have been evaluated and their critical parameters are shown to be capable of being optimized to suit a particular applications. The implementation of such a system using current smart card technology has been evaluated.
Resumo:
Most advanced economies offer publicly financed advice services to start-up firms and SMEs. In England, local or regional Business Links organisations have provided these services, and divided their support into nonintensive one-off contacts providing information or advice and more intensive support involving a diagnostic process and repeated interaction with firms. A key choice for Business Link managers is how to shape their intervention strategies, balancing resources between intensive and nonintensive support. Drawing on resource dependency theory, we develop a typology of intervention strategies for Business Links in England which reflects differences in the breadth and depth of the support provided. We then test the impacts of these alternative intervention models on client companies using both subjective assessments by firms and econometric treatment models that allow for selection bias. Our key empirical result is that Business Links’ choice of intervention strategy has a significant effect both on actual and on perceived business outcomes, with our results emphasising the value of depth over breadth. The implication is that where additional resources are available for business support these should be used to deepen the assistance provided rather than extend assistance to a wider group of firms.
Resumo:
Public policy becomes managerial practice through a process of implementation. There is an established literature within Implementation Studies which explains the variables and some of the processes involved in implementation, but less attention has been focused upon how public service managers convert new policy initiatives into practice. The research proposes that managers and their organisations have to go through a process of learning in order to achieve the implementation of public policy. Data was collected over a five year period from four case studies of capital investment appraisal in the British National Health Service. Further data was collected from taped interviews by key actors within the case studies. The findings suggest that managers do learn to implement policy and four factors are important in this learning process. These are; (i) the nature of bureaucratic responsibility; (ii) the motivation of actors towards learning; (iii) the passage of time which allows for the development of competence and (iv) the use of project team structures. The research has demonstrated that the conversion of policy into practice occurs through the operationalisation of solutions to policy problems via job tasks. As such it suggests that in understanding how policy is implemented, technical learning is more important than cultural learning, in this context. In conclusion, a "Model of Learned Implementation" is presented, together with a discussion of some of the implications of the research. These are the possible use of more pilot projects for new policy initiatives and the more systematic diffusion of knowledge about implementation solutions.
Resumo:
This study compares human resource management (HRM) practices in Indian public- and private-sector organizations. The investigation is based on a questionnaire survey of 137 large manufacturing firms (public sector = 81: private sector = 56). The key areas of analysis include the structure of human resource (HR) department, the role of HR function in corporate change, recruitment and selection, pay and benefits, training and development, employee relations and emphasis on key HRM strategies. Internal labour markets (ILMs) are used to make the comparative analysis. The statistical results show a number of similarities and differences in the HRM systems of Indian public-and private-sector organizations. Against the established notion, the results of this study reveal that the gap between Indian private- and public-sector HRM practices is not very significant. Moreover, in a few HR functional areas (for example, compensation and training and development), Indian private-sector firms have adopted a more rational approach than their public-sector counterparts. © 2004 Taylor and Francis Ltd.
Resumo:
This article presents an innovative approach to estimating the additionality of financial assistance awarded to firms by an Irish regional development agency. The 'self assessment approach' is used to derive estimates of deadweight and displacement for firms in the Shannon region of Ireland. Irish studies have derived high estimates of deadweight by international standards. In light of this, and the fact that successive Irish governments have placed emphasis on Foreign Direct Investment as an engine for growth, the primary objective here is to address the question of whether the type of firm ownership matters with respect to resulting deadweight and/or displacement estimates. The latter question is addressed using logistic regression analysis to test whether, ceteris paribus, firm ownership is a key-determining factor for estimates of deadweight and/or displacement. The results show that ownership does not matter in the case of deadweight, but regarding displacement there are differences between indigenous and foreign-owned firms albeit at very low levels. More precisely, as expected, indigenously owned firms are more likely to lead to higher estimates of displacement.
Resumo:
To readers of the popular press, the words ‘positive psychology’ may conjure up images of happiness gurus and people having their feet massaged, their heads resting peacefully on pink, fluffy clouds. But in this article, our aim is to demonstrate how the new science of positive psychology speaks powerfully to - and has much to contribute to - the development of leadership and the practices and processes of organisations, whether in the public or private sectors. Much of our work is concerned with the applications of this new field, and particularly with building strengths-based organisations. A key pillar of this work is around enabling strengths-based leadership, and provides our focus for this article.
Resumo:
Community pharmacy in the UK is often described as the most accessible of all primary healthcare providers, situated on the 'high street' and requiring no appointment. But what does the new public health movement mean for pharmacy, and where is pharmacy in terms of the new public health agenda? In this paper, the authors provide a critical assessment of pharmacy's response to this agenda through a review of key pharmacy relevant policy documents. In particular, in the context of pharmacy's re-professionalization agenda, they assess the contribution of pharmacy to public health from a micro- and macro-level framework. The aim is to provide a critical context in light of current proposals for the profession to develop a public health strategy.
Resumo:
Gay and lesbian prides and marches are of crucial relevance to the way in which non-heterosexual lives are imagined internationally despite regional and national differences. Quite often, these events are connected not only with increased activist mobilisation, but also with great controversy, which is the case of Poland, where gay and lesbian marches have been attacked by right-wing protesters and cancelled by right-wing city authorities on a number of occasions. Overall, the scholars analysing these events have largely focused on the macro-context of the marches, paying less attention to the movement actors behind these events. The contribution of this thesis lies not only in filling a gap when it comes to research on sexual minorities in Eastern Europe/Poland, but also in its focus on micro-level movement processes and engagement with theories of collective identity and citizenship. Furthermore, this thesis challenges the inscription of Eastern European/Polish movements into the narrative of victimhood and delayed development when compared to LGBT movements in the Global North. This thesis is grounded in qualitative research including participant observation of public activist events as well as forty semi-structured interviews with the key organisers of gay and lesbian marches in Warsaw, Poznan and Krakow between 2001 and 2007, and five of these interviews were further accompanied by photo-elicitation (self-directed photography) methods. Starting from the processes whereby from 2001 onwards, marches, pride parades and demonstrations became the most visible and contested activity of the Polish lesbian and gay movement, this thesis examines how the activists redefined the meanings of citizenship in the post-transformation context, by incorporating the theme of sexual minorities' rights. Using Bernstein's (1997, 2002, 2005, 2008) concept of identity deployment, I show how and when movement actors use identity tactically, depending on their goals. Specifically, in the context of movement-media interactions, I examine the ways in which the activists use marches to challenge the negative representations of sexual minorities in Poland. I also broaden Bernstein's framework to include the discussion of emotion work as relevant to public LGBT activism in Poland. Later, I discuss how the emotions of protests allowed the activists to inscribe their efforts into the "revolutionary" narrative of the Polish Solidarity movement and by extension, the frame of citizenship. Finally, this thesis engages with the dilemmas of identity deployment strategies, and seeks to problematise the dichotomy between identity-based gay and lesbian assimilationist strategies and the anti-identity queer politics.
Resumo:
The aim of this thesis is to examine the experience of time of four professional occupational groups working in public sector organisations and the factors affecting this experience. The literature on time and work is examined to delineate the key parameters of research in this area. A broad organisation behaviour approach to the experience of time and work is developed in which individual, occupational, organisational and socio-political factors are inter-related. The experience of secondary school teachers, further education lecturers, general medical practitioners and hosoital consultants is then examined. Multiple methods of data collection are used: open-ended interviews, a questionnaire survey and the analysis of key documents relating to the institutional settings in which the four groups work. The research aims to develop our knowledge of working time by considering the dimensions of the experience of time at work, the contexts in wlhich this experience is generated and the constraints these contexts give rIse to. By developing our understanding of time as a key feature of work experience we also extend our knowledge of organisation behaviour in general. In conclusion a model of the factors relating the experience of time to the negotiation of time at work is presented.