946 resultados para asymmetric cryptography
Resumo:
A novel and fast technique for cryptographic applications is designed and developed using the symmetric key algorithm “MAJE4” and the popular asymmetric key algorithm “RSA”. The MAJE4 algorithm is used for encryption / decryption of files since it is much faster and occupies less memory than RSA. The RSA algorithm is used to solve the problem of key exchange as well as to accomplish scalability and message authentication. The focus is to develop a new hybrid system called MARS4 by combining the two cryptographic methods with an aim to get the advantages of both. The performance evaluation of MARS4 is done in comparison with MAJE4 and RSA.
Resumo:
Bildbasierte Authentifizierung und Verschlüsselung: Identitätsbasierte Kryptographie (oft auch identity Based Encryption, IBE) ist eine Variation der asymmetrischen Schlüsselverfahren, bei der der öffentliche Schlüssel des Anwenders eine beliebig wählbare Zeichenfolge sein darf, die dem Besitzer offensichtlich zugeordnet werden kann. Adi Shamir stellte 1984 zunächst ein solches Signatursystem vor. In der Literatur wird dabei als öffentlicher Schlüssel meist die Email-Adresse oder eine Sozialversicherungsnummer genannt. Der Preis für die freie Schlüsselwahl ist die Einbeziehung eines vertrauenswürdigen Dritten, genannt Private Key Generator, der mit seinem privaten Generalschlüssel den privaten Schlüssel des Antragstellers generiert. Mit der Arbeit von Boneh und Franklin 2001 zum Einsatz der Weil-Paarbildung über elliptischen Kurven wurde IBE auf eine sichere und praktikable Grundlage gestellt. In dieser Arbeit wird nach einer allgemeinen Übersicht über Probleme und Lösungsmöglichkeiten für Authentifizierungsaufgaben im zweiten Teil als neue Idee der Einsatz eines Bildes des Anwenders als öffentlicher Schlüssel vorgeschlagen. Dazu wird der Ablauf der Schlüsselausgabe, die Bestellung einer Dienstleistung, z. B. die Ausstellung einer personengebundenen Fahrkarte, sowie deren Kontrolle dargestellt. Letztere kann offline auf dem Gerät des Kontrolleurs erfolgen, wobei Ticket und Bild auf dem Handy des Kunden bereitliegen. Insgesamt eröffnet sich dadurch die Möglichkeit einer Authentifizierung ohne weitere Preisgabe einer Identität, wenn man davon ausgeht, dass das Bild einer Person angesichts allgegenwärtiger Kameras sowieso öffentlich ist. Die Praktikabilität wird mit einer Implementierung auf der Basis des IBE-JCA Providers der National University of Ireland in Maynooth demonstriert und liefert auch Aufschluss auf das in der Praxis zu erwartende Laufzeitverhalten.
Resumo:
The objective of traffic engineering is to optimize network resource utilization. Although several works have been published about minimizing network resource utilization, few works have focused on LSR (label switched router) label space. This paper proposes an algorithm that takes advantage of the MPLS label stack features in order to reduce the number of labels used in LSPs. Some tunnelling methods and their MPLS implementation drawbacks are also discussed. The described algorithm sets up NHLFE (next hop label forwarding entry) tables in each LSR, creating asymmetric tunnels when possible. Experimental results show that the described algorithm achieves a great reduction factor in the label space. The presented works apply for both types of connections: P2MP (point-to-multipoint) and P2P (point-to-point)
Resumo:
The aim of traffic engineering is to optimise network resource utilization. Although several works on minimizing network resource utilization have been published, few works have focused on LSR label space. This paper proposes an algorithm that uses MPLS label stack features in order to reduce the number of labels used in LSPs forwarding. Some tunnelling methods and their MPLS implementation drawbacks are also discussed. The algorithm described sets up the NHLFE tables in each LSR, creating asymmetric tunnels when possible. Experimental results show that the algorithm achieves a large reduction factor in the label space. The work presented here applies for both types of connections: P2MP and P2P
Resumo:
Traffic Engineering objective is to optimize network resource utilization. Although several works have been published about minimizing network resource utilization in MPLS networks, few of them have been focused in LSR label space reduction. This letter studies Asymmetric Merged Tunneling (AMT) as a new method for reducing the label space in MPLS network. The proposed method may be regarded as a combination of label merging (proposed in the MPLS architecture) and asymmetric tunneling (proposed recently in our previous works). Finally, simulation results are performed by comparing AMT with both ancestors. They show a great improvement in the label space reduction factor
Resumo:
Loans are illiquid assets that can be sold in a secondary market even that buyers have no certainty about their quality. I study a model in which a lender has access to new investment opportunities when all her assets are illiquid. To raise funds, the lender may either borrow using her assets as collateral, or she can sell them in a secondary market. Given asymmetric information about assets quality, the lender cannot recover the total value of her assets. There is then a role for the government to correct the information problem using fiscal tools.
Resumo:
Matheron's usual variogram estimator can result in unreliable variograms when data are strongly asymmetric or skewed. Asymmetry in a distribution can arise from a long tail of values in the underlying process or from outliers that belong to another population that contaminate the primary process. This paper examines the effects of underlying asymmetry on the variogram and on the accuracy of prediction, and the second one examines the effects arising from outliers. Standard geostatistical texts suggest ways of dealing with underlying asymmetry; however, this is based on informed intuition rather than detailed investigation. To determine whether the methods generally used to deal with underlying asymmetry are appropriate, the effects of different coefficients of skewness on the shape of the experimental variogram and on the model parameters were investigated. Simulated annealing was used to create normally distributed random fields of different size from variograms with different nugget:sill ratios. These data were then modified to give different degrees of asymmetry and the experimental variogram was computed in each case. The effects of standard data transformations on the form of the variogram were also investigated. Cross-validation was used to assess quantitatively the performance of the different variogram models for kriging. The results showed that the shape of the variogram was affected by the degree of asymmetry, and that the effect increased as the size of data set decreased. Transformations of the data were more effective in reducing the skewness coefficient in the larger sets of data. Cross-validation confirmed that variogram models from transformed data were more suitable for kriging than were those from the raw asymmetric data. The results of this study have implications for the 'standard best practice' in dealing with asymmetry in data for geostatistical analyses. (C) 2007 Elsevier Ltd. All rights reserved.
Resumo:
Asymmetry in a distribution can arise from a long tail of values in the underlying process or from outliers that belong to another population that contaminate the primary process. The first paper of this series examined the effects of the former on the variogram and this paper examines the effects of asymmetry arising from outliers. Simulated annealing was used to create normally distributed random fields of different size that are realizations of known processes described by variograms with different nugget:sill ratios. These primary data sets were then contaminated with randomly located and spatially aggregated outliers from a secondary process to produce different degrees of asymmetry. Experimental variograms were computed from these data by Matheron's estimator and by three robust estimators. The effects of standard data transformations on the coefficient of skewness and on the variogram were also investigated. Cross-validation was used to assess the performance of models fitted to experimental variograms computed from a range of data contaminated by outliers for kriging. The results showed that where skewness was caused by outliers the variograms retained their general shape, but showed an increase in the nugget and sill variances and nugget:sill ratios. This effect was only slightly more for the smallest data set than for the two larger data sets and there was little difference between the results for the latter. Overall, the effect of size of data set was small for all analyses. The nugget:sill ratio showed a consistent decrease after transformation to both square roots and logarithms; the decrease was generally larger for the latter, however. Aggregated outliers had different effects on the variogram shape from those that were randomly located, and this also depended on whether they were aggregated near to the edge or the centre of the field. The results of cross-validation showed that the robust estimators and the removal of outliers were the most effective ways of dealing with outliers for variogram estimation and kriging. (C) 2007 Elsevier Ltd. All rights reserved.
Resumo:
Chiral N-heterocyclic carbene–borane complexes have been synthesised, and have been shown to reduce ketones with Lewis acid promotion. Chiral N-heterocyclic carbene–borane and –diorganoborane complexes can reduce ketones with enantioselectivities up to 75% and 85% ee, respectively.
Resumo:
Maculalactones A, B and C from the marine cyanobacterium Kyrtuthrix maculans are amongst the only compounds based on the tribenzylbutyrolactone skeleton known in nature and (+) maculalactone A from the natural source possesses significant biological activity against various marine herbivores and marine settlers. We now report a concise synthesis of racemic maculalactone A in five steps from inexpensive starting materials. Maculalactones B and C were synthesized by a minor modification to this procedure, and the synthetic design also permitted an asymmetric synthesis of maculalactone A to be achieved in around 85% ee. The (+) and (-) enantiomers of maculalactone A were assigned, respectively, to the S and R configurations on the basis of the chiral selectivity expected for catecholborane reduction of an unsymmetrical ketone in the presence of Corey's oxazoborolidine catalyst. Surprisingly, it appeared that natural (+) maculalactone A was biosynthesized in K. maculans in a partially racemic form, comprising ca. 90-95% of the (S) enantiomer and 5-10% of its (R) enantiomer. Coincidentally therefore, the percentage enantiomeric excess of the product obtained from asymmetric synthesis almost exactly matched that found in nature. (C) 2004 Elsevier Ltd. All rights reserved.
Resumo:
Conjugate addition of lithium dibenzylamide to tert-butyl (+/-)-3-methylcyclopentene-1-carboxylate occurs with high levels of stereocontrol, with preferential addition of lithium dibenzylamide to the face of the cyclic alpha,beta-unsaturated acceptor anti- to the 3-methyl substituent. High levels of enantiorecognition are observed between tert-butyl (+/-)-3-methylcyclopentene-1-carboxylate and an excess of lithium (+/-)-N-benzyl-N-alpha-methylbenzylamide (10 eq.) (E > 140) in their mutual kinetic resolution, while the kinetic resolution of tert-butyl (+/-)-3-methylcyclopentene-1-carboxylate with lithium (S)-N-benzyl-N-alpha-methylbenzylamide proceeds to give, at 51% conversion, tert-butyl (1R, 2S, 3R,alphaS)-3-methyl-2-N-benzyl-N-alpha-methylbenzylaminocyclopentane-1-c arboxylate consistent with E > 130, and in 39% yield and 99 +/- 0.5% de after purification. Subsequent deprotection by hydrogenolysis and ester hydrolysis gives (1R, 2S, 3R)-3-methylcispentacin in > 98% de and 98 +/- 1% ee. Selective epimerisation of tert-butyl (1R, 2S, 3R, alphaS)-3-methyl-2-N- benzyl-N-alpha-methylbenzylaminocyclopentane-1-carboxylate by treatment with (KOBu)-Bu-t in (BuOH)-Bu-t gives tert-butyl (1S, 2S, 3R, alphaS)-3-methyl-2-N-benzyl-N-alpha-methylbenzylaminocyclopentane-1-carb oxylate in quantitative yield and in > 98% de, with subsequent deprotection by hydrogenolysis and ester hydrolysis giving (1S, 2S, 3R)-3-methyltranspentacin hydrochloride in > 98% de and 97 +/- 1% ee.
Resumo:
Asymmetric synthesis of densely functionalized bicyclic frameworks for entry into bacillariolides I/III and ent-bacillariolide II is reported. The key features are ring-closing metathesis of a pair of diastereomerically related dienes obtained through a stereodivergent route from a R-(+)-glyceraldehyde derivative, transformation of a nonstereoselective cyclopentene ester enolate alkylation process to a completely stereoselective one through alkylation of a bulky ester enolate with a bulky electrophile, and a remote silyloxymethyl group directed epoxidation.
Resumo:
(R)-3-Arylalanines may be prepared in high enantiomeric purity from N-dpp imines by a four-step reaction sequence involving asymmetric aza-Darzens reaction, dephosphinylation, hydrogenolysis and hydrolysis. The amino acids thus obtained were of >95% enantiomeric purity.