927 resultados para block ciphers
Resumo:
n the recent years protection of information in digital form is becoming more important. Image and video encryption has applications in various fields including Internet communications, multimedia systems, medical imaging, Tele-medicine and military communications. During storage as well as in transmission, the multimedia information is being exposed to unauthorized entities unless otherwise adequate security measures are built around the information system. There are many kinds of security threats during the transmission of vital classified information through insecure communication channels. Various encryption schemes are available today to deal with information security issues. Data encryption is widely used to protect sensitive data against the security threat in the form of “attack on confidentiality”. Secure transmission of information through insecure communication channels also requires encryption at the sending side and decryption at the receiving side. Encryption of large text message and image takes time before they can be transmitted, causing considerable delay in successive transmission of information in real-time. In order to minimize the latency, efficient encryption algorithms are needed. An encryption procedure with adequate security and high throughput is sought in multimedia encryption applications. Traditional symmetric key block ciphers like Data Encryption Standard (DES), Advanced Encryption Standard (AES) and Escrowed Encryption Standard (EES) are not efficient when the data size is large. With the availability of fast computing tools and communication networks at relatively lower costs today, these encryption standards appear to be not as fast as one would like. High throughput encryption and decryption are becoming increasingly important in the area of high-speed networking. Fast encryption algorithms are needed in these days for high-speed secure communication of multimedia data. It has been shown that public key algorithms are not a substitute for symmetric-key algorithms. Public key algorithms are slow, whereas symmetric key algorithms generally run much faster. Also, public key systems are vulnerable to chosen plaintext attack. In this research work, a fast symmetric key encryption scheme, entitled “Matrix Array Symmetric Key (MASK) encryption” based on matrix and array manipulations has been conceived and developed. Fast conversion has been achieved with the use of matrix table look-up substitution, array based transposition and circular shift operations that are performed in the algorithm. MASK encryption is a new concept in symmetric key cryptography. It employs matrix and array manipulation technique using secret information and data values. It is a block cipher operated on plain text message (or image) blocks of 128 bits using a secret key of size 128 bits producing cipher text message (or cipher image) blocks of the same size. This cipher has two advantages over traditional ciphers. First, the encryption and decryption procedures are much simpler, and consequently, much faster. Second, the key avalanche effect produced in the ciphertext output is better than that of AES.
Resumo:
In symmetric block ciphers, substitution and diffusion operations are performed in multiple rounds using sub-keys generated from a key generation procedure called key schedule. The key schedule plays a very important role in deciding the security of block ciphers. In this paper we propose a complex key generation procedure, based on matrix manipulations, which could be introduced in symmetric ciphers. The proposed key generation procedure offers two advantages. First, the procedure is simple to implement and has complexity in determining the sub-keys through crypt analysis. Secondly, the procedure produces a strong avalanche effect making many bits in the output block of a cipher to undergo changes with one bit change in the secret key. As a case study, matrix based key generation procedure has been introduced in Advanced Encryption Standard (AES) by replacing the existing key schedule of AES. The key avalanche and differential key propagation produced in AES have been observed. The paper describes the matrix based key generation procedure and the enhanced key avalanche and differential key propagation produced in AES. It has been shown that, the key avalanche effect and differential key propagation characteristics of AES have improved by replacing the AES key schedule with the Matrix based key generation procedure
Resumo:
In this work will applied the technique of Differential Cryptanalysis, introduced in 1990 by Biham and Shamir, on Papílio s cryptosystem, developed by Karla Ramos, to test and most importantly, to prove its relevance to other block ciphers such as DES, Blowfish and FEAL-N (X). This technique is based on the analysis of differences between plaintext and theirs respective ciphertext, in search of patterns that will assist in the discovery of the subkeys and consequently in the discovery of master key. These differences are obtained by XOR operations. Through this analysis, in addition to obtaining patterns of Pap´ılio, it search to obtain also the main characteristics and behavior of Papilio throughout theirs 16 rounds, identifying and replacing when necessary factors that can be improved in accordance with pre-established definitions of the same, thus providing greater security in the use of his algoritm
Resumo:
Esta tesis establece los fundamentos teóricos y diseña una colección abierta de clases C++ denominada VBF (Vector Boolean Functions) para analizar funciones booleanas vectoriales (funciones que asocian un vector booleano a otro vector booleano) desde una perspectiva criptográfica. Esta nueva implementación emplea la librería NTL de Victor Shoup, incorporando nuevos módulos que complementan a las funciones de NTL, adecuándolas para el análisis criptográfico. La clase fundamental que representa una función booleana vectorial se puede inicializar de manera muy flexible mediante diferentes estructuras de datas tales como la Tabla de verdad, la Representación de traza y la Forma algebraica normal entre otras. De esta manera VBF permite evaluar los criterios criptográficos más relevantes de los algoritmos de cifra en bloque y de stream, así como funciones hash: por ejemplo, proporciona la no-linealidad, la distancia lineal, el grado algebraico, las estructuras lineales, la distribución de frecuencias de los valores absolutos del espectro Walsh o del espectro de autocorrelación, entre otros criterios. Adicionalmente, VBF puede llevar a cabo operaciones entre funciones booleanas vectoriales tales como la comprobación de igualdad, la composición, la inversión, la suma, la suma directa, el bricklayering (aplicación paralela de funciones booleanas vectoriales como la empleada en el algoritmo de cifra Rijndael), y la adición de funciones coordenada. La tesis también muestra el empleo de la librería VBF en dos aplicaciones prácticas. Por un lado, se han analizado las características más relevantes de los sistemas de cifra en bloque. Por otro lado, combinando VBF con algoritmos de optimización, se han diseñado funciones booleanas cuyas propiedades criptográficas son las mejores conocidas hasta la fecha. ABSTRACT This thesis develops the theoretical foundations and designs an open collection of C++ classes, called VBF, designed for analyzing vector Boolean functions (functions that map a Boolean vector to another Boolean vector) from a cryptographic perspective. This new implementation uses the NTL library from Victor Shoup, adding new modules which complement the existing ones making VBF better suited for cryptography. The fundamental class representing a vector Boolean function can be initialized in a flexible way via several alternative types of data structures such as Truth Table, Trace Representation, Algebraic Normal Form (ANF) among others. This way, VBF allows the evaluation of the most relevant cryptographic criteria for block and stream ciphers as well as for hash functions: for instance, it provides the nonlinearity, the linearity distance, the algebraic degree, the linear structures, the frequency distribution of the absolute values of the Walsh Spectrum or the Autocorrelation Spectrum, among others. In addition, VBF can perform operations such as equality testing, composition, inversion, sum, direct sum, bricklayering (parallel application of vector Boolean functions as employed in Rijndael cipher), and adding coordinate functions of two vector Boolean functions. This thesis also illustrates the use of VBF in two practical applications. On the one hand, the most relevant properties of the existing block ciphers have been analysed. On the other hand, by combining VBF with optimization algorithms, new Boolean functions have been designed which have the best known cryptographic properties up-to-date.
Resumo:
A method is proposed to offer privacy in computer communications, using symmetric product block ciphers. The security protocol involved a cipher negotiation stage, in which two communicating parties select privately a cipher from a public cipher space. The cipher negotiation process includes an on-line cipher evaluation stage, in which the cryptographic strength of the proposed cipher is estimated. The cryptographic strength of the ciphers is measured by confusion and diffusion. A method is proposed to describe quantitatively these two properties. For the calculation of confusion and diffusion a number of parameters are defined, such as the confusion and diffusion matrices and the marginal diffusion. These parameters involve computationally intensive calculations that are performed off-line, before any communication takes place. Once they are calculated, they are used to obtain estimation equations, which are used for on-line, fast evaluation of the confusion and diffusion of the negotiated cipher. A technique proposed in this thesis describes how to calculate the parameters and how to use the results for fast estimation of confusion and diffusion for any cipher instance within the defined cipher space.
Resumo:
We describe an approach for recovering the plaintext in block ciphers having a design structure similar to the Data Encryption Standard but with improperly constructed S-boxes. The experiments with a backtracking search algorithm performing this kind of attack against modified DES/Triple-DES in ECB mode show that the unknown plaintext can be recovered with a small amount of uncertainty and this algorithm is highly efficient both in time and memory costs for plaintext sources with relatively low entropy. Our investigations demonstrate once again that modifications resulting to S-boxes which still satisfy some design criteria may lead to very weak ciphers. ACM Computing Classification System (1998): E.3, I.2.7, I.2.8.
Resumo:
Isosorbide succinate moieties were incorporated into poly(L-lactide) (PLLA) backbone in order to obtain a new class of biodegradable polymer with enhanced properties. This paper describes the synthesis and characterization of four types of low molecular weight copolymers. Copolymer I was obtained from monomer mixtures of L-lactide, isosorbide, and succinic anhydride; II from oligo(L-lactide) (PLLA), isosorbide, and succinic anhydride; III from oligo(isosorbide succinate) (PIS) and L-lactide; and IV from transesterification reactions between PLLA and PIS. MALDI-TOFMS and 13C-NMR analyses gave evidence that co-oligomerization was successfully attained in all cases. The data suggested that the product I is a random co-oligomer and the products II-IV are block co-oligomers.
Resumo:
We calculate the entanglement entropy of blocks of size x embedded in a larger system of size L, by means of a combination of analytical and numerical techniques. The complete entanglement entropy in this case is a sum of three terms. One is a universal x- and L-dependent term, first predicted by Calabrese and Cardy, the second is a nonuniversal term arising from the thermodynamic limit, and the third is a finite size correction. We give an explicit expression for the second, nonuniversal, term for the one-dimensional Hubbard model, and numerically assess the importance of all three contributions by comparing to the entropy obtained from fully numerical diagonalization of the many-body Hamiltonian. We find that finite-size corrections are very small. The universal Calabrese-Cardy term is equally small for small blocks, but becomes larger for x > 1. In all investigated situations, however, the by far dominating contribution is the nonuniversal term stemming from the thermodynamic limit.
Resumo:
A series of new phenyl-based conjugated copolymers has been synthesized and investigated by vibrational and photoluminescence spectroscopy (PL). The materials are: poly( 1,4-phenylene-alt-3,6-pyridazine) (COP-PIR), poly(9,9-dioctylfluorene)-co-quaterphenylene (COP-PPP) and poly[(1,4-phenylene-alt-3,6-pyridazine)-co-(1,4-phenylene-alt-9,9-dioctylfluorene)] (COP-PIR-FLUOR), with 3.5% of fluorene. COP-PPP and COP-PIR-FLUOR have high fluorescence quantum yields in solution. Infrared and Raman spectra were used to check the chemical structure of the compounds. The copolymers exhibit blue emission ranging front 2.8 to 3.6 eV when excited at E(exc)=4.13 eV. Stokes-shift Values were estimated on pristine samples in their condensed state from steady-state PL-emission and PL-excitation spectra. They suggest a difference in the torsional angle between the molecular configuration of the polymer blocks at the absorption and PL transitions and also in the photoexcitation diffusion. Additionally, the time-resolved PL of these materials has been investigated by using 100 fs laser pulses at E(exc)=4.64 eV and a streak camera. Results show very fast biexponential kinetics for the two fluorene-based polymers with decay times below 300 ps indicating both intramolecular, fast radiative recombination and migration of photogenerated electron-hole pairs. By contrast, the PL of COP-PIR is less intense and longer lived, indicating that excitons are confined to the chains in this polymer. (C) 2008 Elsevier B.V. All rights reserved.
Resumo:
In this work, the rheological behavior of block copolymers with different morphologies (lamellar, cylindrical, spherical, and disordered) and their clay-containing nanocomposites was studied using small amplitude oscillatory shear. The copolymers studied were one asymmetric starblock styrene-butadiene-styrene copolymer and four styrene-ethylene/butylenes-styrene copolymers with different molecular architectures, one of them being modified with maleic anhydride. The nanocomposites of those copolymers were prepared by adding organophilic clay using three different preparation techniques: melt mixing, solution casting, and a hybrid melt mixing-solution technique. The nanocomposites were characterized by X-ray diffraction and transmission electron microscopy, and their viscoelastic properties were evaluated and compared to the ones of the pure copolymers. The influence of copolymer morphology and presence of clay on the storage modulus (G`) curves was studied by the evaluation of the changes in the low frequency slope of log G` x log omega (omega: frequency) curves upon variation of temperature and clay addition. This slope may be related to the degree of liquid- or solid-like behavior of a material. It was observed that at temperatures corresponding to the ordered state, the rheological behavior of the nanocomposites depended mainly on the viscoelasticity of each type of ordered phase and the variation of the slope due to the addition of clay was small. For temperatures corresponding to the disordered state, however, the rheological behavior of the copolymer nanocomposites was dictated mostly by the degree of clay dispersion: When the clay was well dispersed, a strong solid-like behavior corresponding to large G` slope variations was observed.
Resumo:
The water activity of aqueous solutions of EO-PO block copolymers of six different molar masses and EO/PO ratios and of maltodextrins of three different molar masses was determined at 298.15 K. The results showed that these aqueous solutions present a negative deviation from Raoult`s law. The Flory-Huggins and UNIFAC excess Gibbs energy models were employed to model the experimental data. While a good agreement was obtained with the Flory-Huggins equation, discrepancies were observed when predicting the experimental behavior with the UNIFAC model. The water activities of ternary systems formed by a synthetic polymer, maltodextrin and water were also measured and used to test the predictive capability of both models.
Resumo:
This paper presents the possible alternative removal options for the development of safe drinking water supply in the trace elements affected areas. Arsenic and chromium are two of the most toxic pollutants, introduced into natural waters from a variety of sources and causes various adverse effects on living bodies. Performance of three filter bed method was evaluated in the laboratory. Experiments have been conducted to investigate the sorption of arsenic and chromium on carbon steel and removal of trace elements from drinking water with a household filtration process. The affinity of the arsenic and chromium species for Fe/Fe(3)C (iron/iron carbide) sites is the key factor controlling the removal of the elements. The method is based on the use of powdered block carbon (PBC), powder carbon steel and ball ceramic in the ion-sorption columns as a cleaning process. The PBC modified is a satisfactory and practical sorbent for trace elements (arsenite and chromate) dissolved in water.
Resumo:
Inorganic elements analyses of Carapicuiba lake reveal that As, Cr, Pb and Mn are above the recommended drinking water standards. The mean total concentrations of toxic elements in surface water decrease in the order Mn > Cr > Pb > As. At elevated concentrations, toxic elements like Cr can accumulate in soils and enter the food chain, leading to serious health hazards and threatening the long-term sustainability of the local ecosystem. Absorbing materials has often been used to improve water quality. In this investigation three types of material were studied: the natural zeolite (mordenite); synthetic goethite and the powdered block carbon modified. The adsorption of Pb(2+) and Mn(2+) onto natural zeolite as a function of their concentrations was studied at 24 degrees C by varying the metal concentration from 100 to 400 mg L(-1) while keeping all other parameters constant. The low-cost zeolites removed Pb from water without any pretreatment at pH values <6. The maximum adsorption attained was as follows: Pb(2+) 78.7% and Mn(2+) 19.6%. The modified powdered block carbon effectively removed As(V) and Cr(VI) while goethite removed more chromate than arsenate in the pH range 5-6. Results of this study will be used to evaluate the application these materials for the treatment of the Carapicuiba lake`s water.
Resumo:
Block copolymers containing isosorbide succinate and L-lactic acid repeating units with different mass compositions were synthesized in two steps: bulk ring-opening copolymerization from L-lactide and poli(isosorbide succinate) (PIS) preoligomer, in the presence of tin(II) 2-ethylhexanoate as catalyst. followed by chain extension in solution by using hexamethylene diisocyanate. Poly(L-lactide) (PLLA) and a chain extension product from PIS were also obtained, for comparison. SEC, (1)H and (13)C NMR, MALDI-TOFMS, WAXD, DSC, TG, and contact angle measurements were used in their characterization. The incorporation of isosorbide succinate into PLLA main backbone had minor effect on the thermal stability and the T(g) of the products. However, it reduced the crystallinity and increased the surface energy in relation to PLLA. Nonwoven mats of the block copolymers and PLLA obtained by electrospinning technique were submitted to fibroblasts 3T3-L1 cell culture. The copolymers presented enhanced cell adhesion and proliferation rate as revealed by MTT assay and SEM images. (C) 2009 Elsevier Ltd. All rights reserved.
Resumo:
In this paper necessary and sufficient conditions for a vector to be the fine structure of a balanced ternary design with block size 3, index 3 and rho(2) = 1 and 2 are determined with one unresolved case.