814 resultados para Symmetric key.


Relevância:

100.00% 100.00%

Publicador:

Resumo:

n the recent years protection of information in digital form is becoming more important. Image and video encryption has applications in various fields including Internet communications, multimedia systems, medical imaging, Tele-medicine and military communications. During storage as well as in transmission, the multimedia information is being exposed to unauthorized entities unless otherwise adequate security measures are built around the information system. There are many kinds of security threats during the transmission of vital classified information through insecure communication channels. Various encryption schemes are available today to deal with information security issues. Data encryption is widely used to protect sensitive data against the security threat in the form of “attack on confidentiality”. Secure transmission of information through insecure communication channels also requires encryption at the sending side and decryption at the receiving side. Encryption of large text message and image takes time before they can be transmitted, causing considerable delay in successive transmission of information in real-time. In order to minimize the latency, efficient encryption algorithms are needed. An encryption procedure with adequate security and high throughput is sought in multimedia encryption applications. Traditional symmetric key block ciphers like Data Encryption Standard (DES), Advanced Encryption Standard (AES) and Escrowed Encryption Standard (EES) are not efficient when the data size is large. With the availability of fast computing tools and communication networks at relatively lower costs today, these encryption standards appear to be not as fast as one would like. High throughput encryption and decryption are becoming increasingly important in the area of high-speed networking. Fast encryption algorithms are needed in these days for high-speed secure communication of multimedia data. It has been shown that public key algorithms are not a substitute for symmetric-key algorithms. Public key algorithms are slow, whereas symmetric key algorithms generally run much faster. Also, public key systems are vulnerable to chosen plaintext attack. In this research work, a fast symmetric key encryption scheme, entitled “Matrix Array Symmetric Key (MASK) encryption” based on matrix and array manipulations has been conceived and developed. Fast conversion has been achieved with the use of matrix table look-up substitution, array based transposition and circular shift operations that are performed in the algorithm. MASK encryption is a new concept in symmetric key cryptography. It employs matrix and array manipulation technique using secret information and data values. It is a block cipher operated on plain text message (or image) blocks of 128 bits using a secret key of size 128 bits producing cipher text message (or cipher image) blocks of the same size. This cipher has two advantages over traditional ciphers. First, the encryption and decryption procedures are much simpler, and consequently, much faster. Second, the key avalanche effect produced in the ciphertext output is better than that of AES.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

A novel and fast technique for cryptographic applications is designed and developed using the symmetric key algorithm “MAJE4” and the popular asymmetric key algorithm “RSA”. The MAJE4 algorithm is used for encryption / decryption of files since it is much faster and occupies less memory than RSA. The RSA algorithm is used to solve the problem of key exchange as well as to accomplish scalability and message authentication. The focus is to develop a new hybrid system called MARS4 by combining the two cryptographic methods with an aim to get the advantages of both. The performance evaluation of MARS4 is done in comparison with MAJE4 and RSA.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In symmetric block ciphers, substitution and diffusion operations are performed in multiple rounds using sub-keys generated from a key generation procedure called key schedule. The key schedule plays a very important role in deciding the security of block ciphers. In this paper we propose a complex key generation procedure, based on matrix manipulations, which could be introduced in symmetric ciphers. The proposed key generation procedure offers two advantages. First, the procedure is simple to implement and has complexity in determining the sub-keys through crypt analysis. Secondly, the procedure produces a strong avalanche effect making many bits in the output block of a cipher to undergo changes with one bit change in the secret key. As a case study, matrix based key generation procedure has been introduced in Advanced Encryption Standard (AES) by replacing the existing key schedule of AES. The key avalanche and differential key propagation produced in AES have been observed. The paper describes the matrix based key generation procedure and the enhanced key avalanche and differential key propagation produced in AES. It has been shown that, the key avalanche effect and differential key propagation characteristics of AES have improved by replacing the AES key schedule with the Matrix based key generation procedure

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. There are many transmission media to transfer the data to destination like e-mails; at the same time it is may be easier to modify and misuse the valuable information through hacking. So, in order to transfer the data securely to the destination without any modifications, there are many approaches like cryptography and steganography. This paper deals with the image steganography as well as with the different security issues, general overview of cryptography, steganography and digital watermarking approaches.  The problem of copyright violation of multimedia data has increased due to the enormous growth of computer networks that provides fast and error free transmission of any unauthorized duplicate and possibly manipulated copy of multimedia information. In order to be effective for copyright protection, digital watermark must be robust which are difficult to remove from the object in which they are embedded despite a variety of possible attacks. The message to be send safe and secure, we use watermarking. We use invisible watermarking to embed the message using LSB (Least Significant Bit) steganographic technique. The standard LSB technique embed the message in every pixel, but my contribution for this proposed watermarking, works with the hint for embedding the message only on the image edges alone. If the hacker knows that the system uses LSB technique also, it cannot decrypt correct message. To make my system robust and secure, we added cryptography algorithm as Vigenere square. Whereas the message is transmitted in cipher text and its added advantage to the proposed system. The standard Vigenere square algorithm works with either lower case or upper case. The proposed cryptography algorithm is Vigenere square with extension of numbers also. We can keep the crypto key with combination of characters and numbers. So by using these modifications and updating in this existing algorithm and combination of cryptography and steganography method we develop a secure and strong watermarking method. Performance of this watermarking scheme has been analyzed by evaluating the robustness of the algorithm with PSNR (Peak Signal to Noise Ratio) and MSE (Mean Square Error) against the quality of the image for large amount of data. While coming to see results of the proposed encryption, higher value of 89dB of PSNR with small value of MSE is 0.0017. Then it seems the proposed watermarking system is secure and robust for hiding secure information in any digital system, because this system collect the properties of both steganography and cryptography sciences.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This thesis presents the versatile synthesis and self-organization of C3-symmetric discotic nanographene molecules as well as their potential applications as materials in molecular electronics. The details can be described as follows: 1) A novel synthetic strategy towards properly designed C3 symmetric 1,3,5-tris-2’arylbenzene precursors has been developed. After the final planarization by treatment with FeCl3 under mild conditions, for the first time, it became possible to access a variety of new C3-symmetric hexa-peri-hexabenzocoronenes (HBCs) and a series of triangle-shaped nanographenes. D3 symmetric HBC with three alkyl substituents and C2 symmetric HBC with two alkyl substituents were synthesized and found to show the surprising decrease of isotropic points., the self-assembly at the liquid-solid interface displayed a unique zigzag and flower patterns. 2) Triangle-shaped discotics revealed a unique self-assembly behavior in solution, solid state as well as at the solution-substrate interface. A mesophase stability over the broad temperature range with helical supramoelcular arrangement were observed in the bulk state. The honeycomb pattern as the result of novel self-assembly was presented. Triangle-shaped discotics with swallow alkyl tails were fabricated into photovoltaic devices, the supramolecular arrangement upon thermal treatment was found to play a key role in the improvement of solar efficiency. 3) A novel class of C3 symmetric HBCs with alternating polar/apolar substituents was synthesized. Their peculiar self-assembly in solution, in the bulk and on the surface were investigated by NMR techniques, X-ray diffraction as well as different electron microscope techniques. 4) A novel concept for manipulating the intracolumnar stacking of discotics and thus for controlling the helical pitch was presented. A unique staggered stacking in the column was achieved for the first time. Theoretical simulations confirmed this self-organization and predicted that this packing should show the highest charge carrier mobility for all discotics.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We consider in this thesis the problem of information reconciliation in the context of secret key distillation between two legitimate parties. In some scenarios of interest this problem can be advantageously solved with low density parity check (LDPC) codes optimized for the binary symmetric channel. In particular, we demonstrate that our method leads to a significant efficiency improvement, with respect to earlier interactive reconciliation methods. We propose a protocol based on LDPC codes that can be adapted to changes in the communication channel extending the original source. The efficiency of our protocol is only limited by the quality of the code and, while transmitting more information than needed to reconcile Alice’s and Bob’s sequences, it does not reveal any more information on the original source than an ad-hoc code would have revealed.---ABSTRACT---En esta tesis estudiamos el problema de la reconciliación de información en el contexto de la destilación de secreto entre dos partes. En algunos escenarios de interés, códigos de baja densidad de ecuaciones de paridad (LDPC) adaptados al canal binario simétrico ofrecen una buena solución al problema estudiado. Demostramos que nuestro método mejora significativamente la eficiencia de la reconciliación. Proponemos un protocolo basado en códigos LDPC que puede ser adaptado a cambios en el canal de comunicaciones mediante una extensión de la fuente original. La eficiencia de nuestro protocolo está limitada exclusivamente por el código utilizado y no revela información adicional sobre la fuente original que la que un código con la tasa de información adaptada habría revelado.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The security and reliability of a class of public-key cryptosystems against attacks by unauthorized parties, who had acquired partial knowledge of one or more of the private key components and/or of the message, were discussed. The standard statistical mechanical methods of dealing with diluted spin systems with replica symmetric considerations were analyzed. The dynamical transition which defined decryption success in practical situation was studied. The phase diagrams which showed the dynamical threshold as a function of the partial acquired knowledge of the private key were also presented.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Nowadays, information security is a very important topic. In particular, wireless networks are experiencing an ongoing widespread diffusion, also thanks the increasing number of Internet Of Things devices, which generate and transmit a lot of data: protecting wireless communications is of fundamental importance, possibly through an easy but secure method. Physical Layer Security is an umbrella of techniques that leverages the characteristic of the wireless channel to generate security for the transmission. In particular, the Physical Layer based-Key generation aims at allowing two users to generate a random symmetric keys in an autonomous way, hence without the aid of a trusted third entity. Physical Layer based-Key generation relies on observations of the wireless channel, from which harvesting entropy: however, an attacker might possesses a channel simulator, for example a Ray Tracing simulator, to replicate the channel between the legitimate users, in order to guess the secret key and break the security of the communication. This thesis work is focused on the possibility to carry out a so called Ray Tracing attack: the method utilized for the assessment consist of a set of channel measurements, in different channel conditions, that are then compared with the simulated channel from the ray tracing, to compute the mutual information between the measurements and simulations. Furthermore, it is also presented the possibility of using the Ray Tracing as a tool to evaluate the impact of channel parameters (e.g. the bandwidth or the directivity of the antenna) on the Physical Layer based-Key generation. The measurements have been carried out at the Barkhausen Institut gGmbH in Dresden (GE), in the framework of the existing cooperation agreement between BI and the Dept. of Electrical, Electronics and Information Engineering "G. Marconi" (DEI) at the University of Bologna.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

IKK epsilon (IKKε) is induced by the activation of nuclear factor-κB (NF-κB). Whole-body IKKε knockout mice on a high-fat diet (HFD) were protected from insulin resistance and showed altered energy balance. We demonstrate that IKKε is expressed in neurons and is upregulated in the hypothalamus of obese mice, contributing to insulin and leptin resistance. Blocking IKKε in the hypothalamus of obese mice with CAYMAN10576 or small interfering RNA decreased NF-κB activation in this tissue, relieving the inflammatory environment. Inhibition of IKKε activity, but not TBK1, reduced IRS-1(Ser307) phosphorylation and insulin and leptin resistance by an improvement of the IR/IRS-1/Akt and JAK2/STAT3 pathways in the hypothalamus. These improvements were independent of body weight and food intake. Increased insulin and leptin action/signaling in the hypothalamus may contribute to a decrease in adiposity and hypophagia and an enhancement of energy expenditure accompanied by lower NPY and increased POMC mRNA levels. Improvement of hypothalamic insulin action decreases fasting glycemia, glycemia after pyruvate injection, and PEPCK protein expression in the liver of HFD-fed and db/db mice, suggesting a reduction in hepatic glucose production. We suggest that IKKε may be a key inflammatory mediator in the hypothalamus of obese mice, and its hypothalamic inhibition improves energy and glucose metabolism.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Abstract In this paper, we address the problem of picking a subset of bids in a general combinatorial auction so as to maximize the overall profit using the first-price model. This winner determination problem assumes that a single bidding round is held to determine both the winners and prices to be paid. We introduce six variants of biased random-key genetic algorithms for this problem. Three of them use a novel initialization technique that makes use of solutions of intermediate linear programming relaxations of an exact mixed integer-linear programming model as initial chromosomes of the population. An experimental evaluation compares the effectiveness of the proposed algorithms with the standard mixed linear integer programming formulation, a specialized exact algorithm, and the best-performing heuristics proposed for this problem. The proposed algorithms are competitive and offer strong results, mainly for large-scale auctions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

12 Suppl 1

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As hypoxia-induced inflammatory angiogenesis may contribute to sickle cell disease manifestations, we compared the angiogenic molecular profiles of plasma from sickle cell disease individuals and correlated these with in vitro endothelial cell-mediated angiogenesis-stimulating activity and in vivo neovascularization. Bioplex demonstrated that plasma from steady-state sickle cell anemia patients presented elevated concentrations of pro-angiogenic factors (Angiopoietin-1, basic fibroblast growth factor, vascular endothelial growth factor, vascular endothelial growth factor-D and placental growth factor) and displayed potent pro-angiogenic activity, significantly augmenting endothelial cell proliferation, migration and capillary-like structure formation. In vivo neovascularization of Matrigel plugs was significantly greater in sickle cell disease mice, compared with non-sickle cell disease mice, consistent with an upregulation of angiogenesis in the disease. In plasma from patients with hemoglobin SC disease without proliferative retinopathy, anti-angiogenic endostatin and thrombospondin-2 were significantly elevated. In contrast, plasma from hemoglobin SC individuals with proliferative retinopathy displayed a pro-angiogenic profile and had more significant effects on endothelial cell proliferation and capillary formation than plasma of patients without retinopathy. Hydroxyurea therapy was associated with significant reductions in plasma angiogenic factor profile, in association with an inhibition of endothelial cell-mediated angiogenic mechanisms and neovascularization. Thus, sickle cell anemia and retinopathic hemoglobin SC individuals present a highly angiogenic circulating milieu, capable of stimulating key endothelial cell-mediated angiogenic mechanisms. Combination anti-angiogenic therapy for preventing progression of unregulated neovascularization and associated manifestations in sickle cell disease, such as pulmonary hypertension, may be indicated; furthermore, the benefits and drawbacks of the potent anti-angiogenic effects of hydroxyurea should be clarified.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cancer is a multistep process that begins with the transformation of normal epithelial cells and continues with tumor growth, stromal invasion and metastasis. The remodeling of the peritumoral environment is decisive for the onset of tumor invasiveness. This event is dependent on epithelial-stromal interactions, degradation of extracellular matrix components and reorganization of fibrillar components. Our research group has studied in a new proposed rodent model the participation of cellular and molecular components in the prostate microenvironment that contributes to cancer progression. Our group adopted the gerbil Meriones unguiculatus as an alternative experimental model for prostate cancer study. This model has presented significant responses to hormonal treatments and to development of spontaneous and induced neoplasias. The data obtained indicate reorganization of type I collagen fibers and reticular fibers, synthesis of new components such as tenascin and proteoglycans, degradation of basement membrane components and elastic fibers and increased expression of metalloproteinases. Fibroblasts that border the region, apparently participate in the stromal reaction. The roles of each of these events, as well as some signaling molecules, participants of neoplastic progression and factors that promote genetic reprogramming during epithelial-stromal transition are also discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

535

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the first paper of this series (Albuquerque & Brandão, 2004) we revised the Vezenyii species group of the exclusively Neotropical solenopsidine (Myrmicinae) ant genus Oxyepoecus. In this closing paper we update distribution information on the Vezenyii group species and revise the other Oxyepoecus species-group (Rastratus). We describe two species (Oxyepoecus myops n. sp. and O. rosai n. sp.) and redescribe previously known species of the group [O. daguerrei (Santschi, 1933), O. mandibularis (Emery, 1913), O. plaumanni Kempf, 1974, O. rastratus Mayr, 1887, and O. reticulatus Kempf, 1974], adding locality records and comments on the meagre biological data of these species. We also present an identification key to Oxyepoecus species based on workers.