958 resultados para bare public-key model


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper discusses the hardware foundations of the cryptosystem employed by the Xbox(TM) video game console from Microsoft. A secret boot block overlay is buried within a system ASIC. This secret boot block decrypts and verifies portions of an external FLASH-type ROM. The presence of the secret boot block is camouflaged by a decoy boot block in the external ROM. The code contained within the secret boot block is transferred to the CPU in the clear over a set of high-speed busses where it can be extracted using simple custom hardware. The paper concludes with recommendations for improving the Xbox security system. One lesson of this study is that the use of a high-performance bus alone is not a sufficient security measure, given the advent of inexpensive, fast rapid prototyping services and high-performance FPGAs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Memories in Adaptive Resonance Theory (ART) networks are based on matched patterns that focus attention on those portions of bottom-up inputs that match active top-down expectations. While this learning strategy has proved successful for both brain models and applications, computational examples show that attention to early critical features may later distort memory representations during online fast learning. For supervised learning, biased ARTMAP (bARTMAP) solves the problem of over-emphasis on early critical features by directing attention away from previously attended features after the system makes a predictive error. Small-scale, hand-computed analog and binary examples illustrate key model dynamics. Twodimensional simulation examples demonstrate the evolution of bARTMAP memories as they are learned online. Benchmark simulations show that featural biasing also improves performance on large-scale examples. One example, which predicts movie genres and is based, in part, on the Netflix Prize database, was developed for this project. Both first principles and consistent performance improvements on all simulation studies suggest that featural biasing should be incorporated by default in all ARTMAP systems. Benchmark datasets and bARTMAP code are available from the CNS Technology Lab Website: http://techlab.bu.edu/bART/.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

1) A large body of behavioral data conceming animal and human gaits and gait transitions is simulated as emergent properties of a central pattern generator (CPG) model. The CPG model incorporates neurons obeying Hodgkin-Huxley type dynamics that interact via an on-center off-surround anatomy whose excitatory signals operate on a faster time scale than their inhibitory signals. A descending cornmand or arousal signal called a GO signal activates the gaits and controL their transitions. The GO signal and the CPG model are compared with neural data from globus pallidus and spinal cord, among other brain structures. 2) Data from human bimanual finger coordination tasks are simulated in which anti-phase oscillations at low frequencies spontaneously switch to in-phase oscillations at high frequencies, in-phase oscillations can be performed both at low and high frequencies, phase fluctuations occur at the anti-phase in-phase transition, and a "seagull effect" of larger errors occurs at intermediate phases. When driven by environmental patterns with intermediate phase relationships, the model's output exhibits a tendency to slip toward purely in-phase and anti-phase relationships as observed in humans subjects. 3) Quadruped vertebrate gaits, including the amble, the walk, all three pairwise gaits (trot, pace, and gallop) and the pronk are simulated. Rapid gait transitions are simulated in the order--walk, trot, pace, and gallop--that occurs in the cat, along with the observed increase in oscillation frequency. 4) Precise control of quadruped gait switching is achieved in the model by using GO-dependent modulation of the model's inhibitory interactions. This generates a different functional connectivity in a single CPG at different arousal levels. Such task-specific modulation of functional connectivity in neural pattern generators has been experimentally reported in invertebrates. Phase-dependent modulation of reflex gain has been observed in cats. A role for state-dependent modulation is herein predicted to occur in vertebrates for precise control of phase transitions from one gait to another. 5) The primary human gaits (the walk and the run) and elephant gaits (the amble and the walk) are sirnulated. Although these two gaits are qualitatively different, they both have the same limb order and may exhibit oscillation frequencies that overlap. The CPG model simulates the walk and the run by generating oscillations which exhibit the same phase relationships. but qualitatively different waveform shapes, at different GO signal levels. The fraction of each cycle that activity is above threshold quantitatively distinguishes the two gaits, much as the duty cycles of the feet are longer in the walk than in the run. 6) A key model properly concerns the ability of a single model CPG, that obeys a fixed set of opponent processing equations to generate both in-phase and anti-phase oscillations at different arousal levels. Phase transitions from either in-phase to anti-phase oscillations, or from anti-phase to in-phase oscillations, can occur in different parameter ranges, as the GO signal increases.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

With the rapid growth of the Internet and digital communications, the volume of sensitive electronic transactions being transferred and stored over and on insecure media has increased dramatically in recent years. The growing demand for cryptographic systems to secure this data, across a multitude of platforms, ranging from large servers to small mobile devices and smart cards, has necessitated research into low cost, flexible and secure solutions. As constraints on architectures such as area, speed and power become key factors in choosing a cryptosystem, methods for speeding up the development and evaluation process are necessary. This thesis investigates flexible hardware architectures for the main components of a cryptographic system. Dedicated hardware accelerators can provide significant performance improvements when compared to implementations on general purpose processors. Each of the designs proposed are analysed in terms of speed, area, power, energy and efficiency. Field Programmable Gate Arrays (FPGAs) are chosen as the development platform due to their fast development time and reconfigurable nature. Firstly, a reconfigurable architecture for performing elliptic curve point scalar multiplication on an FPGA is presented. Elliptic curve cryptography is one such method to secure data, offering similar security levels to traditional systems, such as RSA, but with smaller key sizes, translating into lower memory and bandwidth requirements. The architecture is implemented using different underlying algorithms and coordinates for dedicated Double-and-Add algorithms, twisted Edwards algorithms and SPA secure algorithms, and its power consumption and energy on an FPGA measured. Hardware implementation results for these new algorithms are compared against their software counterparts and the best choices for minimum area-time and area-energy circuits are then identified and examined for larger key and field sizes. Secondly, implementation methods for another component of a cryptographic system, namely hash functions, developed in the recently concluded SHA-3 hash competition are presented. Various designs from the three rounds of the NIST run competition are implemented on FPGA along with an interface to allow fair comparison of the different hash functions when operating in a standardised and constrained environment. Different methods of implementation for the designs and their subsequent performance is examined in terms of throughput, area and energy costs using various constraint metrics. Comparing many different implementation methods and algorithms is nontrivial. Another aim of this thesis is the development of generic interfaces used both to reduce implementation and test time and also to enable fair baseline comparisons of different algorithms when operating in a standardised and constrained environment. Finally, a hardware-software co-design cryptographic architecture is presented. This architecture is capable of supporting multiple types of cryptographic algorithms and is described through an application for performing public key cryptography, namely the Elliptic Curve Digital Signature Algorithm (ECDSA). This architecture makes use of the elliptic curve architecture and the hash functions described previously. These components, along with a random number generator, provide hardware acceleration for a Microblaze based cryptographic system. The trade-off in terms of performance for flexibility is discussed using dedicated software, and hardware-software co-design implementations of the elliptic curve point scalar multiplication block. Results are then presented in terms of the overall cryptographic system.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper a novel scalable public-key processor architecture is presented that supports modular exponentiation and Elliptic Curve Cryptography over both prime GF(p) and binary GF(2) extension fields. This is achieved by a high performance instruction set that provides a comprehensive range of integer and polynomial basis field arithmetic. The instruction set and associated hardware are generic in nature and do not specifically support any cryptographic algorithms or protocols. Firmware within the device is used to efficiently implement complex and data intensive arithmetic. A firmware library has been developed in order to demonstrate support for numerous exponentiation and ECC approaches, such as different coordinate systems and integer recoding methods. The processor has been developed as a high-performance asymmetric cryptography platform in the form of a scalable Verilog RTL core. Various features of the processor may be scaled, such as the pipeline width and local memory subsystem, in order to suit area, speed and power requirements. The processor is evaluated and compares favourably with previous work in terms of performance while offering an unparalleled degree of flexibility. © 2006 IEEE.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Increasingly countries are turning to nonprofit organisations to provide health and social care, particularly for people with disabilities. Alongside this change, debates continue about how states should manage the relationship with such organisations. Should features of the old-style "welfare" model be retained? Should aspects of the "new public management" model be chosen to measure the impact of the work? Yet others argue that grassroots organisations should form the basis of a service provision system. In the context of these debates, Ireland serves as an interesting case study of the system of care that can emerge when the state operates a "relaxed control" approach. This paper takes the perspectives of users themselves: family carers who are accessing services for a disabled adult child, to examine the effects of this approach on the ground. We show how geography played a central role in shaping these experiences, and discuss how we can learn from the Irish context. Rather than arguing for narrowly defined contractual measures, we conclude by proposing a renewed focus on relationship building with the aim of effective system operation, in the future of care services. © 2010 Elsevier Ltd.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Lattice-based cryptography has gained credence recently as a replacement for current public-key cryptosystems, due to its quantum-resilience, versatility, and relatively low key sizes. To date, encryption based on the learning with errors (LWE) problem has only been investigated from an ideal lattice standpoint, due to its computation and size efficiencies. However, a thorough investigation of standard lattices in practice has yet to be considered. Standard lattices may be preferred to ideal lattices due to their stronger security assumptions and less restrictive parameter selection process. In this paper, an area-optimised hardware architecture of a standard lattice-based cryptographic scheme is proposed. The design is implemented on a FPGA and it is found that both encryption and decryption fit comfortably on a Spartan-6 FPGA. This is the first hardware architecture for standard lattice-based cryptography reported in the literature to date, and thus is a benchmark for future implementations.
Additionally, a revised discrete Gaussian sampler is proposed which is the fastest of its type to date, and also is the first to investigate the cost savings of implementing with lamda_2-bits of precision. Performance results are promising in comparison to the hardware designs of the equivalent ring-LWE scheme, which in addition to providing a stronger security proof; generate 1272 encryptions per second and 4395 decryptions per second.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Os estuários são ambientes complexos, biologicamente diversos e muito importantes no que respeita à produtividade primária. As zonas intertidais destes ecossistemas são ocupadas por organismos que possuem uma elevada capacidade de sobrevivência e adaptação face às variadas e rápidas alterações nos factores ambientais (tais como temperatura, salinidade, conteúdo hídrico, etc.). As cadeias tróficas com origem no ecossistema estuarino bentónico são essencialmente herbívoras, regulando o fluxo de energia desde o fundo sedimentar e através do ecossistema. Nas áreas estuarinas intertidais a produção primária é essencialmente suportada pelo microfitobentos (MPB). Estas comunidades de microalgas bênticas constituem uma importante fonte de matéria orgânica e são por si só a principal fonte alimentar para as populações de Hydrobia. Neste contexto, a interacção MPB - Hydrobia é um modelo-chave na investigação da cadeia trófica estuarina de origem bentónica, actuando como um importante canal de transporte de energia para os níveis tróficos superiores, especialmente se considerarmos que Hydrobia é uma importante presa para peixes, aves e caranguejos. O presente estudo tem por objectivos gerais: i) a investigação do controlo ambiental (particularmente da luz e do teor em água do sedimento) e endógeno na migração vertical do MPB e ii) a identificação e potencial utilização de marcadores tróficos (pigmentos e ácidos gordos) úteis à investigação da interacção MPB – Hydrobia em laboratório e em condições naturais, considerando a existência de uma elevada plasticidade trófica por parte da Hydrobia e a elevada densidade populacional que estes organismos podem apresentar. A primeira fase de investigação resultou na comparação do papel dos estímulos ambientais e do controlo endógeno nos padrões de comportamento migratório vertical do microfitobentos, demonstrando a existência de um controlo essencialmente endógeno na formação e desintegração do biofilme superficial. A regulação e manutenção da biomassa à superfície do sedimento são claramente controladas pela variação dos factores ambientais, em especial da luz, cuja presença é essencial à formação total do biofilme microalgal à superfície do sedimento intertidal. Foi proposta uma nova abordagem metodológica com vista à estimativa nãodestrutiva do teor de água de sedimentos intertidais vasosos , possibilitando o estudo da influência da acção do vento no conteúdo hídrico dos sedimentos e o consequente impacto da dessecação na comunidade microfitobêntica. Observou-se que a dessecação provoca efeitos limitantes não só na biomassa superficial mas também na actividade fotossintética dos biofilmes microfitobênticos, conduzindo à diminuição da produtividade primária. No que respeita à dinâmica trófica da interacção MPB - Hydrobia foi estabelecido o uso do pigmento feoforbide a, quantificado nas partículas fecais da fauna, como marcador trófico que permite estimar a quantidade de biomassa de microalgas (clorofila a) incorporada pelos organismos animais.Para tal foi investigada e comprovada a existência de uma relação significativa entre a concentração de feopigmentos excretados e a concentração de clorofila a ingerida. Estes estudos foram desenvolvidos numa primeira fase à escala diária, considerando os efeitos dos ciclos sazonais, dia-noite e maré, e depois com a validação em condições naturais, numa escala mensal. A taxa de ingestão média de indivíduos de H. ulvae varia ao longo do dia, com o máximo em torno dos períodos diurnos de maré baixa, o que pode estar relacionado com a disponibilidade de MPB. As taxas de ingestão (TI) de H. ulvae variam ainda em função da estação do ano (TI verão > TI primavera) e em função da densidade de indivíduos (> densidade, < ingestão). Verificou-se um efeito negativo na concentração de clorofila disponível após herbívoria independentemente da densidade de indivíduos. Finalmente, a comparação dos perfis de ácidos gordos de H. ulvae provenientes de diferentes habitats com os perfis de potenciais fontes alimentares permitiu demonstrar que os ácidos gordos são ferramentas úteis na identificação do habitat ocupado por estes organismos. No entanto, apesar da ocupação de diferentes habitats e da integração de múltiplas fontes de produção primária na sua dieta foram sempre observados significativos níveis de ácidos gordos específicos de microalgas (em particular diatomáceas), reforçando o papel importante das comunidades de microalgas bênticas na dieta das populações de H. ulvae.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

RESUMO - A gestão empresarial dos hospitais é uma velha aspiração do sistema e dos profissionais da saúde em Portugal. Já o Estatuto Hospitalar de 1968 previa a organização e a gestão dos hospitais «em termos de gestão empresarial». A Lei de Bases da Saúde, de 1990, relembrava que a administração das unidades de saúde deveria obedecer a «regras de gestão empresarial». O Hospital Fernando da Fonseca, criado desde 1991, foi objecto de concessão de gestão por contrato, precedendo concurso público, a uma entidade privada, em 1995. Em 1997, o relatório do Grupo de Trabalho sobre o Estatuto Jurídico do Hospital recomendava a adopção da figura de instituto público com natureza empresarial, adequada autonomia de gestão e forte responsabilidade, podendo regular-se, em alguns domínios, por normas de direito privado. Em 1998 foi criado o Hospital de São Sebastião, em Santa Maria da Feira, com formas inovadoras de gestão, utilizando meios de gestão maleáveis. Em 1999 foi criada a Unidade Local de Saúde de Matosinhos, englobando não apenas o Hospital de Pedro Hispano, naquela cidade, mas também os quatro centros de saúde da sua área de atracção. Em 2001 foi criado o Hospital do Barlavento Algarvio, em moldes semelhantes aos do Hospital de São Sebastião. Os restantes hospitais públicos mantiveram a estrutura e regras de funcionamento convencionais. Observa-se que o modelo de gestão convencional do hospital público tem hoje consequências desfavoráveis para os cidadãos, para os profissionais que nele trabalham e também para o sistema de saúde no seu conjunto. Em 2002, uma nova lei alterou disposições da Lei de Bases da Saúde de 1990 e aprovou um novo regime jurídico de gestão hospitalar. De acordo com ele, a rede de prestação de cuidados de saúde passou a integrar vários modelos de hospitais: hospitais SPA, hospitais EPE, hospitais SA, clínicas privadas com ou sem nome de hospital, instituições e serviços geridos por entidades públicas ou privadas, mediante contrato de gestão e hospitais PPP. Analisam-se os ganhos introduzidos pelo modelo inovador de hospital SA, no que respeita ao estatuto, dotação de capital, poderes especiais, regras de controlo financeiro, regimes laborais, órgãos sociais, instrumentos de gestão e direcção técnica. Finalmente, antecipa-se um quadro analítico de oportunidades e riscos sobre este modelo. As críticas têm-se concentrado sobre a estratégia de mudança e sobre o mecanismo de escolha dos dirigentes e das respectivas chefias intermédias. Em relação à estratégia, conclui-se ser a questão mais empírica do que conceptual. Em relação à forma de identificação dos dirigentes, recomenda-se o acompanhamento crítico da experiência, salientando-se, a par do que ela pode trazer de positivo, os riscos de partidarização e instabilidade.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Dissertação de Mestrado em Gestão e Políticas Públicas

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Communication is the process of transmitting data across channel. Whenever data is transmitted across a channel, errors are likely to occur. Coding theory is a stream of science that deals with finding efficient ways to encode and decode data, so that any likely errors can be detected and corrected. There are many methods to achieve coding and decoding. One among them is Algebraic Geometric Codes that can be constructed from curves. Cryptography is the science ol‘ security of transmitting messages from a sender to a receiver. The objective is to encrypt message in such a way that an eavesdropper would not be able to read it. A eryptosystem is a set of algorithms for encrypting and decrypting for the purpose of the process of encryption and decryption. Public key eryptosystem such as RSA and DSS are traditionally being prel‘en‘ec| for the purpose of secure communication through the channel. llowever Elliptic Curve eryptosystem have become a viable altemative since they provide greater security and also because of their usage of key of smaller length compared to other existing crypto systems. Elliptic curve cryptography is based on group of points on an elliptic curve over a finite field. This thesis deals with Algebraic Geometric codes and their relation to Cryptography using elliptic curves. Here Goppa codes are used and the curves used are elliptic curve over a finite field. We are relating Algebraic Geometric code to Cryptography by developing a cryptographic algorithm, which includes the process of encryption and decryption of messages. We are making use of fundamental properties of Elliptic curve cryptography for generating the algorithm and is used here to relate both.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The present study described about the interaction of a two level atom and squeezed field with time varying frequency. By applying a sinusoidal variation in the frequency of the field, the randomness in population inversion is reduced and the collapses and periodic revivals are regained. Quantum optics is an emerging field in physics which mainly deals with the interaction of atoms with quantised electromagnetic fields. Jaynes-Cummings Model (JCM) is a key model among them, which describes the interaction between a two level atom and a single mode radiation field. Here the study begins with a brief history of light, atom and their interactions. Also discussed the interaction between atoms and electromagnetic fields. The study suggest a method to manipulate the population inversion due to interaction and control the randomness in it, by applying a time dependence on the frequency of the interacting squeezed field.The change in behaviour of the population inversion due to the presence of a phase factor in the applied frequency variation is explained here.This study also describes the interaction between two level atom and electromagnetic field in nonlinear Kerr medium. It deals with atomic and field state evolution in a coupled cavity system. Our results suggest a new method to control and manipulate the population of states in two level atom radiation interaction,which is very essential for quantum information processing.We have also studied the variation of atomic population inversion with time, when a two level atom interacts with light field, where the light field has a sinusoidal frequency variation with a constant phase. In both coherent field and squeezed field cases, the population inversion variation is completely different from the phase zero frequency modulation case. It is observed that in the presence of a non zero phase φ, the population inversion oscillates sinusoidally.Also the collapses and revivals gradually disappears when φ increases from 0 to π/2. When φ = π/2 the evolution of population inversion is identical to the case when a two level atom interacts with a Fock state. Thus, by applying a phase shifted frequency modulation one can induce sinusoidal oscillations of atomic inversion in linear medium, those normally observed in Kerr medium. We noticed that the entanglement between the atom and field can be controlled by varying the period of the field frequency fluctuations. The system has been solved numerically and the behaviour of it for different initial conditions and different susceptibility values are analysed. It is observed that, for weak cavity coupling the effect of susceptibility is minimal. In cases of strong cavity coupling, susceptibility factor modifies the nature in which the probability oscillates with time. Effect of susceptibility on probability of states is closely related to the initial state of the system.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Bildbasierte Authentifizierung und Verschlüsselung: Identitätsbasierte Kryptographie (oft auch identity Based Encryption, IBE) ist eine Variation der asymmetrischen Schlüsselverfahren, bei der der öffentliche Schlüssel des Anwenders eine beliebig wählbare Zeichenfolge sein darf, die dem Besitzer offensichtlich zugeordnet werden kann. Adi Shamir stellte 1984 zunächst ein solches Signatursystem vor. In der Literatur wird dabei als öffentlicher Schlüssel meist die Email-Adresse oder eine Sozialversicherungsnummer genannt. Der Preis für die freie Schlüsselwahl ist die Einbeziehung eines vertrauenswürdigen Dritten, genannt Private Key Generator, der mit seinem privaten Generalschlüssel den privaten Schlüssel des Antragstellers generiert. Mit der Arbeit von Boneh und Franklin 2001 zum Einsatz der Weil-Paarbildung über elliptischen Kurven wurde IBE auf eine sichere und praktikable Grundlage gestellt. In dieser Arbeit wird nach einer allgemeinen Übersicht über Probleme und Lösungsmöglichkeiten für Authentifizierungsaufgaben im zweiten Teil als neue Idee der Einsatz eines Bildes des Anwenders als öffentlicher Schlüssel vorgeschlagen. Dazu wird der Ablauf der Schlüsselausgabe, die Bestellung einer Dienstleistung, z. B. die Ausstellung einer personengebundenen Fahrkarte, sowie deren Kontrolle dargestellt. Letztere kann offline auf dem Gerät des Kontrolleurs erfolgen, wobei Ticket und Bild auf dem Handy des Kunden bereitliegen. Insgesamt eröffnet sich dadurch die Möglichkeit einer Authentifizierung ohne weitere Preisgabe einer Identität, wenn man davon ausgeht, dass das Bild einer Person angesichts allgegenwärtiger Kameras sowieso öffentlich ist. Die Praktikabilität wird mit einer Implementierung auf der Basis des IBE-JCA Providers der National University of Ireland in Maynooth demonstriert und liefert auch Aufschluss auf das in der Praxis zu erwartende Laufzeitverhalten.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Resource and flyer produced for INFO2009 12/13. An animation on public-key encryption related to cybercrime and cybersecurity. Target audience is undergraduates, but the resource does not assume prior knowledge of the topics, or any in-depth knowledge of IT.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

La Ley 527 de 1999 regula lo relativo al Comercio Electrónico en Colombia. Esta ley sigue de cerca la Ley Modelo que sobre la materia preparó la Comisión de las Naciones Unidas para el Derecho Mercantil Internacional