12 resultados para bare public-key model

em Aston University Research Archive


Relevância:

100.00% 100.00%

Publicador:

Resumo:

We employ the methods of statistical physics to study the performance of Gallager type error-correcting codes. In this approach, the transmitted codeword comprises Boolean sums of the original message bits selected by two randomly-constructed sparse matrices. We show that a broad range of these codes potentially saturate Shannon's bound but are limited due to the decoding dynamics used. Other codes show sub-optimal performance but are not restricted by the decoding dynamics. We show how these codes may also be employed as a practical public-key cryptosystem and are of competitive performance to modern cyptographical methods.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Security and reliability of LDPC based public-key cryptosystems are discussed and analysed. We study attacks on the cryptosystem when partial knowledge of one or more of the private key components and/or of the plaintext have been acquired.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The security and reliability of a class of public-key cryptosystems against attacks by unauthorized parties, who had acquired partial knowledge of one or more of the private key components and/or of the message, were discussed. The standard statistical mechanical methods of dealing with diluted spin systems with replica symmetric considerations were analyzed. The dynamical transition which defined decryption success in practical situation was studied. The phase diagrams which showed the dynamical threshold as a function of the partial acquired knowledge of the private key were also presented.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The advent of personal communication systems within the last decade has depended upon the utilization of advanced digital schemes for source and channel coding and for modulation. The inherent digital nature of the communications processing has allowed the convenient incorporation of cryptographic techniques to implement security in these communications systems. There are various security requirements, of both the service provider and the mobile subscriber, which may be provided for in a personal communications system. Such security provisions include the privacy of user data, the authentication of communicating parties, the provision for data integrity, and the provision for both location confidentiality and party anonymity. This thesis is concerned with an investigation of the private-key and public-key cryptographic techniques pertinent to the security requirements of personal communication systems and an analysis of the security provisions of Second-Generation personal communication systems is presented. Particular attention has been paid to the properties of the cryptographic protocols which have been employed in current Second-Generation systems. It has been found that certain security-related protocols implemented in the Second-Generation systems have specific weaknesses. A theoretical evaluation of these protocols has been performed using formal analysis techniques and certain assumptions made during the development of the systems are shown to contribute to the security weaknesses. Various attack scenarios which exploit these protocol weaknesses are presented. The Fiat-Sharmir zero-knowledge cryptosystem is presented as an example of how asymmetric algorithm cryptography may be employed as part of an improved security solution. Various modifications to this cryptosystem have been evaluated and their critical parameters are shown to be capable of being optimized to suit a particular applications. The implementation of such a system using current smart card technology has been evaluated.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Partial information leakage in deterministic public-key cryptosystems refers to a problem that arises when information about either the plaintext or the key is leaked in subtle ways. Quite a common case is where there are a small number of possible messages that may be sent. An attacker may be able to crack the scheme simply by enumerating all the possible ciphertexts. Two methods are proposed for facing the partial information leakage problem in RSA that incorporate a random element into the encrypted message to increase the number of possible ciphertexts. The resulting scheme is, effectively, an RSA-like cryptosystem which exhibits probabilistic encryption. The first method involves encrypting several similar messages with RSA and then using the Quadratic Residuosity Problem (QRP) to mark the intended one. In this way, an adversary who has correctly guessed two or more of the ciphertexts is still in doubt about which message is the intended one. The cryptographic strength of the combined system is equal to the computational difficulty of factorising a large integer; ideally, this should be feasible. The second scheme uses error-correcting codes for accommodating the random component. The plaintext is processed with an error-correcting code and deliberately corrupted before encryption. The introduced corruption lies within the error-correcting ability of the code, so as to enable the recovery of the original message. The random corruption offers a vast number of possible ciphertexts corresponding to a given plaintext; hence an attacker cannot deduce any useful information from it. The proposed systems are compared to other cryptosystems sharing similar characteristics, in terms of execution time and ciphertext size, so as to determine their practical utility. Finally, parameters which determine the characteristics of the proposed schemes are also examined.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Fluctuation-induced escape (FIE) from a metastable state with probability controlled by external force is a process inherent in many physical phenomena such as diffusion in crystals, protein folding, activated chemical reactions etc. [1-3]. In this work we present a novel example of FIE problem, considering a very practical nonlinear system recently emerged in the area of fibre telecommunications. Unlike the standard FIE problems where noise is time-dependent, in fibre Raman amplifier (FRA) the role of noise is played by frozen fluctuations of parameters (random birefringence) along the fibre span which result from the breaking of cylindrical symmetry during the fibre drawing [4-6]. The role of periodic forcing in this problem is played by the periodic fibre spinning, leading to key model that is formally similar to the time-domain equations for periodically forced escape [1-3]. © 2011 IEEE.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Public policy becomes managerial practice through a process of implementation. There is an established literature within Implementation Studies which explains the variables and some of the processes involved in implementation, but less attention has been focused upon how public service managers convert new policy initiatives into practice. The research proposes that managers and their organisations have to go through a process of learning in order to achieve the implementation of public policy. Data was collected over a five year period from four case studies of capital investment appraisal in the British National Health Service. Further data was collected from taped interviews by key actors within the case studies. The findings suggest that managers do learn to implement policy and four factors are important in this learning process. These are; (i) the nature of bureaucratic responsibility; (ii) the motivation of actors towards learning; (iii) the passage of time which allows for the development of competence and (iv) the use of project team structures. The research has demonstrated that the conversion of policy into practice occurs through the operationalisation of solutions to policy problems via job tasks. As such it suggests that in understanding how policy is implemented, technical learning is more important than cultural learning, in this context. In conclusion, a "Model of Learned Implementation" is presented, together with a discussion of some of the implications of the research. These are the possible use of more pilot projects for new policy initiatives and the more systematic diffusion of knowledge about implementation solutions.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The aim of this thesis is to examine the experience of time of four professional occupational groups working in public sector organisations and the factors affecting this experience. The literature on time and work is examined to delineate the key parameters of research in this area. A broad organisation behaviour approach to the experience of time and work is developed in which individual, occupational, organisational and socio-political factors are inter-related. The experience of secondary school teachers, further education lecturers, general medical practitioners and hosoital consultants is then examined. Multiple methods of data collection are used: open-ended interviews, a questionnaire survey and the analysis of key documents relating to the institutional settings in which the four groups work. The research aims to develop our knowledge of working time by considering the dimensions of the experience of time at work, the contexts in wlhich this experience is generated and the constraints these contexts give rIse to. By developing our understanding of time as a key feature of work experience we also extend our knowledge of organisation behaviour in general. In conclusion a model of the factors relating the experience of time to the negotiation of time at work is presented.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Korea has increasingly adopted design-build for public construction projects in the last few years. There is a much greater awareness of the need to change a system based on ‘Value for Money’ which is high on the government's agenda. A whole life performance bid evaluation model is proposed to aid decision makers in the selection of a design-builder. This is based on the integration of a framework using an analytic hierarchy process as the bid awarding system is being changed from one based on lowest price, to one based on best value over the life-cycle. Key criteria like whole life cost, service life planning and design quality are important through the key stages of evaluation process. The model uses a systematic and holistic approach which enables a public sector to make better decisions in design-builder selection, which will deliver whole life benefits, based on long term cost-effectiveness and whole life.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

With no tangible evidence of widespread public engagement in the UK on matters relating to the environment, this article assesses the benefits of adopting the principles of key theoretical models on learning (e.g., Kolb's Experiential Model) in environmental campaigns. In addition, in order to facilitate the transition from environmental knowledge/awareness, to the adoption of proenvironmental behavior, the article reviews some of the key internal and external drivers to achieving sustained behavioral change.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Queuing is a key efficiency criterion in any service industry, including Healthcare. Almost all queue management studies are dedicated to improving an existing Appointment System. In developing countries such as Pakistan, there are no Appointment Systems for outpatients, resulting in excessive wait times. Additionally, excessive overloading, limited resources and cumbersome procedures lead to over-whelming queues. Despite numerous Healthcare applications, Data Envelopment Analysis (DEA) has not been applied for queue assessment. The current study aims to extend DEA modelling and demonstrate its usefulness by evaluating the queue system of a busy public hospital in a developing country, Pakistan, where all outpatients are walk-in; along with construction of a dynamic framework dedicated towards the implementation of the model. The inadequate allocation of doctors/personnel was observed as the most critical issue for long queues. Hence, the Queuing-DEA model has been developed such that it determines the ‘required’ number of doctors/personnel. The results indicated that given extensive wait times or length of queue, or both, led to high target values for doctors/personnel. Hence, this crucial information allows the administrators to ensure optimal staff utilization and controlling the queue pre-emptively, minimizing wait times. The dynamic framework constructed, specifically targets practical implementation of the Queuing-DEA model in resource-poor public hospitals of developing countries such as Pakistan; to continuously monitor rapidly changing queue situation and display latest required personnel. Consequently, the wait times of subsequent patients can be minimized, along with dynamic staff scheduling in the absence of appointments. This dynamic framework has been designed in Excel, requiring minimal training and work for users and automatic update features, with complex technical aspects running in the background. The proposed model and the dynamic framework has the potential to be applied in similar public hospitals, even in other developing countries, where appointment systems for outpatients are non-existent.