936 resultados para Cryptographic Protocols, Provable Security, ID-Based Cryptography
Resumo:
A Universal Serial Bus (USB) Mass Storage Device (MSD), often termed a USB flash drive, is ubiquitously used to store important information in unencrypted binary format. This low cost consumer device is incredibly popular due to its size, large storage capacity and relatively high transfer speed. However, if the device is lost or stolen an unauthorized person can easily retrieve all the information. Therefore, it is advantageous in many applications to provide security protection so that only authorized users can access the stored information. In order to provide security protection for a USB MSD, this paper proposes a session key agreement protocol after secure user authentication. The main aim of this protocol is to establish session key negotiation through which all the information retrieved, stored and transferred to the USB MSD is encrypted. This paper not only contributes an efficient protocol, but also does not suffer from the forgery attack and the password guessing attack as compared to other protocols in the literature. This paper analyses the security of the proposed protocol through a formal analysis which proves that the information is stored confidentially and is protected offering strong resilience to relevant security attacks. The computational cost and communication cost of the proposed scheme is analyzed and compared to related work to show that the proposed scheme has an improved tradeoff for computational cost, communication cost and security.
Resumo:
Wireless Sensor Networks (WSNs) have been an exciting topic in recent years. The services offered by a WSN can be classified into three major categories: monitoring, alerting, and information on demand. WSNs have been used for a variety of applications related to the environment (agriculture, water and forest fire detection), the military, buildings, health (elderly people and home monitoring), disaster relief, and area or industrial monitoring. In most WSNs tasks like processing the sensed data, making decisions and generating emergency messages are carried out by a remote server, hence the need for efficient means of transferring data across the network. Because of the range of applications and types of WSN there is a need for different kinds of MAC and routing protocols in order to guarantee delivery of data from the source nodes to the server (or sink). In order to minimize energy consumption and increase performance in areas such as reliability of data delivery, extensive research has been conducted and documented in the literature on designing energy efficient protocols for each individual layer. The most common way to conserve energy in WSNs involves using the MAC layer to put the transceiver and the processor of the sensor node into a low power, sleep state when they are not being used. Hence the energy wasted due to collisions, overhearing and idle listening is reduced. As a result of this strategy for saving energy, the routing protocols need new solutions that take into account the sleep state of some nodes, and which also enable the lifetime of the entire network to be increased by distributing energy usage between nodes over time. This could mean that a combined MAC and routing protocol could significantly improve WSNs because the interaction between the MAC and network layers lets nodes be active at the same time in order to deal with data transmission. In the research presented in this thesis, a cross-layer protocol based on MAC and routing protocols was designed in order to improve the capability of WSNs for a range of different applications. Simulation results, based on a range of realistic scenarios, show that these new protocols improve WSNs by reducing their energy consumption as well as enabling them to support mobile nodes, where necessary. A number of conference and journal papers have been published to disseminate these results for a range of applications.
Resumo:
Security administrators face the challenge of designing, deploying and maintaining a variety of configuration files related to security systems, especially in large-scale networks. These files have heterogeneous syntaxes and follow differing semantic concepts. Nevertheless, they are interdependent due to security services having to cooperate and their configuration to be consistent with each other, so that global security policies are completely and correctly enforced. To tackle this problem, our approach supports a comfortable definition of an abstract high-level security policy and provides an automated derivation of the desired configuration files. It is an extension of policy-based management and policy hierarchies, combining model-based management (MBM) with system modularization. MBM employs an object-oriented model of the managed system to obtain the details needed for automated policy refinement. The modularization into abstract subsystems (ASs) segment the system-and the model-into units which more closely encapsulate related system components and provide focused abstract views. As a result, scalability is achieved and even comprehensive IT systems can be modelled in a unified manner. The associated tool MoBaSeC (Model-Based-Service-Configuration) supports interactive graphical modelling, automated model analysis and policy refinement with the derivation of configuration files. We describe the MBM and AS approaches, outline the tool functions and exemplify their applications and results obtained. Copyright (C) 2010 John Wiley & Sons, Ltd.
Resumo:
A novel cryptography method based on the Lorenz`s attractor chaotic system is presented. The proposed algorithm is secure and fast, making it practical for general use. We introduce the chaotic operation mode, which provides an interaction among the password, message and a chaotic system. It ensures that the algorithm yields a secure codification, even if the nature of the chaotic system is known. The algorithm has been implemented in two versions: one sequential and slow and the other, parallel and fast. Our algorithm assures the integrity of the ciphertext (we know if it has been altered, which is not assured by traditional algorithms) and consequently its authenticity. Numerical experiments are presented, discussed and show the behavior of the method in terms of security and performance. The fast version of the algorithm has a performance comparable to AES, a popular cryptography program used commercially nowadays, but it is more secure, which makes it immediately suitable for general purpose cryptography applications. An internet page has been set up, which enables the readers to test the algorithm and also to try to break into the cipher.
Resumo:
Recent work has begun exploring the characterization and utilization of provenance in systems based on the Service Oriented Architecture (such as Web Services and Grid based environments). One of the salient issues related to provenance use within any given system is its security. In a broad sense, security requirements arise within any data archival and retrieval system, however provenance presents unique requirements of its own. These requirements are additionally dependent on the architectural and environmental context that a provenance system operates in. We seek to analyze the security considerations pertaining to a Service Oriented Architecture based provenance system. Towards this end, we describe the components of such a system and illustrate the security considerations that arise within it. Concurrently, we outline possible approaches to address them.
Resumo:
The research aimed to understand the challenges for the implementation of the proposed integration between the Civil Police and the Military Police in Rio Grande do Norte to the proposals of the SUSP. This study aimed to explore the gap with regard to the deepening of the possible causes that may hinder the implementation of integrated working between the police in public security, through a specific analysis on the state of Rio Grande do Norte. Was based on a theoretical framework that includes policies: general concepts, the steps of a public policy, the implementation stage , public security : conceptual definitions, policies on security in Brazil, the structure of public security in Brazil and systems police, Military Police x Civil Police: Roles and conflicts , integrating public security: the challenges to be overcome, the Unified public Safety (SUSP) and the main difficulties in the integration of the police. Being classified as to the purposes as an exploratory research on how to approach ranks as qualitative. The research unit was the Center for Integrated Operations Public Safety (CIOSP) through three subjects who were the chief CIOSP, the representative of the military police acting with the CIOSP, and representative civil police also active with the CIOSP. These subjects were chosen because of the understanding that individuals occupying senior positions would have more ability to respond to questions that guide the research problem. Data were collected through a set of interviews, qualitative data analysis was performed based content analysis, based on the definition of categories of analysis, gated time cross. With the results, it was revealed that the main problems of integration between the state police are treatment protocols, lack of political will and lack of infrastructure. The relationship between the Military Police and Civil Police in Rio Grande do Norte has differing cultural aspect, but can be considered as good value, professionalism and integrated operations. The implementation of CIOSP-RN followed the characteristics of the top-down model, the main difficulties in implementing the proposals of the SUSP, lack of own resources, the lack of standardization in public safety and the lack of professional training of public safety. It was concluded that with respect to the challenges to the implementation of the proposed integration between the Civil Police and the Military Police in Rio Grande do Norte to the proposals of the SUSP, the actions follow the characteristics of the top-down model, with no autonomy of administrators public to say in decisions, which restricts the view of the public safety of the state
Resumo:
T'his dissertation proposes alternative models to allow the interconnectioin of the data communication networks of COSERN Companhia Energética do Rio Grande do Norte. These networks comprise the oorporative data network, based on TCP/IP architecture, and the automation system linking remote electric energy distribution substations to the main Operatin Centre, based on digital radio links and using the IEC 60870-5-101 protoco1s. The envisaged interconnection aims to provide automation data originated from substations with a contingent route to the Operation Center, in moments of failure or maintenance of the digital radio links. Among the presented models, the one chosen for development consists of a computational prototype based on a standard personal computer, working under LINUX operational system and running na application, developesd in C language, wich functions as a Gateway between the protocols of the TCP/IP stack and the IEC 60870-5-101 suite. So, it is described this model analysis, implementation and tests of functionality and performance. During the test phase it was basically verified the delay introduced by the TCP/IP network when transporting automation data, in order to guarantee that it was cionsistent with the time periods present on the automation network. Besides , additional modules are suggested to the prototype, in order to handle other issues such as security and prioriz\ation of the automation system data, whenever they are travesing the TCP/IP network. Finally, a study hás been done aiming to integrate, in more complete way, the two considered networks. It uses IP platform as a solution of convergence to the communication subsystem of na unified network, as the most recente market tendencies for supervisory and other automation systems indicate
Resumo:
RFID (Radio Frequency Identification) identifies object by using the radio frequency which is a non-contact automatic identification technique. This technology has shown its powerful practical value and potential in the field of manufacturing, retailing, logistics and hospital automation. Unfortunately, the key problem that impacts the application of RFID system is the security of the information. Recently, researchers have demonstrated solutions to security threats in RFID technology. Among these solutions are several key management protocols. This master dissertations presents a performance evaluation of Neural Cryptography and Diffie-Hellman protocols in RFID systems. For this, we measure the processing time inherent in these protocols. The tests was developed on FPGA (Field-Programmable Gate Array) platform with Nios IIr embedded processor. The research methodology is based on the aggregation of knowledge to development of new RFID systems through a comparative analysis between these two protocols. The main contributions of this work are: performance evaluation of protocols (Diffie-Hellman encryption and Neural) on embedded platform and a survey on RFID security threats. According to the results the Diffie-Hellman key agreement protocol is more suitable for RFID systems
Resumo:
In Experiment 1, effects of an intravaginal progesterone insert (CIDR) for synchronization of estrus in non-suckled cycling primiparous Bos indicus beef cows were evaluated. Cows received either no treatment (Control), prostaglandin F(2 alpha) (PGF), or CIDR (6 d)+prostaglandin F(2 alpha) (CIDR+PGF). There were greater (P<0.05) percentages of cows inseminated and pregnant in 4 d of breeding season in CIDR+PGF (81.6%; 48.7%) than in PGF (53.8%; 32.5%) and Control cows (14.6%; 8.5%). In Experiment 2, efficacy of a treatment with CIDR (6 d)+prostaglandin F(2 alpha)+48 h temporary weaning (CIDR+PGF+TW) associated or not with equine chorionic gonadotropin (eCG) for synchronization of estrus in suckled primiparous B. indicus beef cows was evaluated. Cows were assigned to receive either no treatment (Control), CIDR+PGF+TW, CIDR+PGF+TW+200 IU of eCG, or CIDR+PGF+IW+400 IU of eCG. There were greater (P<0.05) percentages of insemination and pregnancy in 4 d of breeding season in treatment groups (47.0%; 27.5%) than in Control cows(4.5%; 3.0%) and in cows treated with eCG (50.9%; 29.4%) than in cows treated only with CIDR+PGF+TW (39.4%: 23.7%). No effects of eCG dosage were detected. The percentage of cows inseminated and pregnant in a 30 d breeding season were greater (P<0.05) in cows assigned to synchronization treatments (53.3%; 37.2%) than in Control cows (35.3%; 21.4%). In the beginning of the BS, non-suckled primiparous cows treated with CIDR+PGF with estrous cycles having been initiated following calving had greater estrous detection and pregnancy rates than PGF and Control cows, and suckled primiparous cows had improved estrous detection and pregnancy rates when eCG was associated with CIDR+PGF+TW. (C) 2009 Elsevier B.V. All rights reserved.
Resumo:
The objective was to compare two protocols for synchronizing ovulation in lactating Holstein cows submitted to timed AI (TAI) or timed ET (TET). Within each farm (n = 8), cows (n = 883; mean +/- SEM 166.24 +/- 3.27 d postpartum, yielding 36.8 +/- 0.34 kg of milk/d) were randomly assigned to receive either: 1) an intravaginal progesterone insert (CIDR (R)) with 1.9 g of progesterone + GnRH on Day -10, CIDR (R) withdrawal + PGF2 alpha on Day -3, and 1 mg estradiol cypionate on Day -2 (treatment GP-P-E; n(TAI) = 180; n(TET) = 260); or 2) a CIDR (R) insert + 2 mg estradiol benzoate on Day -10, PGF2 alpha on Day -3, CIDR (R) withdrawal + 1 mg estradiol cypionate on Day -2 (treatment EP-P-E; n(TAI) = 174; n(TET) = 269). Cows were subsequently randomly assigned to receive either TAT on Day 0 or TET on Day 7. Serum progesterone concentration on Day -3 was greater in GP-P-E than in EP-P-E (2.89 +/- 0.15 vs 2.29 +/- 0.15 ng/mL; P < 0.01), with no significant effect of group on serum progesterone on Day 7. Compared to cows submitted to TAI, those submitted to TET had greater pregnancy rates on Day 28 (44.0% [233/5291 vs 29.7% [105/354]; p < 0.001) and on Day 60 (37.6% [199/529] vs 26.5 [94/354]; P < 0.001). However, there were no effects of treatments (GP-P-E vs EP-P-E; P > 0.10) on synchronization (87.0% [383/440] vs 85.3% [378/443]), conception (TAI: 35.3% [55/156] vs 33.8% [50/148]; TET: 50.7% [115/227] vs 51.3% [118/230]) and pregnancy rates on Days 28 (TAT: 30.5% [55/180] vs 28.7% 150/174]; TET: 44.2% [115/260] vs 43.9% [118/2691) and 60 (TAI: 27.2% [49/80] vs 25.9% [45/174]; TET: 38.8% [101/260] vs 36.4% [98/269]). In conclusion, GP-P-E increased serum progesterone concentrations on Day -3, but rates of synchronization, conception, and pregnancy were not significantly different between cows submitted to GP-P-E and EP-P-E protocols, regardless of whether they were inseminated or received an embryo. (c) 2011 Elsevier B.V. All rights reserved.
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
The aim of this study was to evaluate the persistence of methacrylate-based cement residues on the dentin, after dentin surface cleaning with ethanol or acetone, with or without previous application of a dentin adhesive. Forty bovine crown fragments were obtained and the dentin surface was washed with 1.0 mL of 2.5% sodium hypochlorite (NaOCl), followed by 0.1 mL of 17% ethylenediaminetetraacetic acid application for 3 min, and final irrigation with 2.5% NaOCl. The specimens were air dried and resin-based cement was rubbed onto the dentine surface with a microbrush applicator. In 20 specimens, previously to cement, a dentin adhesive was applied in all surfaces. After 15 min, the surface was scrubbed with a cotton pellet and moistened with ethanol or acetone, compounding the following groups: G199.5% ethanol and G2acetone, without previous use of dentin adhesive; G399.5% ethanol and G4acetone, with previous use of dentin adhesive. The dentin surface was scrubbed until the cement residues could not be visually detected. Sections were then processed for scanning electron microscopy and evaluated at 500x magnification and scores were attributed to each image according to the area covered by residual sealer, and data were subjected to KruskalWallis at 5% significance. The lower residue presence was observed in G3 (P = 0.005). All surface presented cement residues when acetone was used as cleaning solution (P = 0.0005). The cleaning solutions were unable to completely remove the cement residues from both surfaces. The ethanol used after previous application of the dentin adhesive promoted the lower presence of residues.
Resumo:
This paper presents an improved and updated taxonomy for Time Warp based distributed synchronization protocols. This taxonomy aims to allow the grouping of several optmistic distributed simulation synchronization protocols, with the objective to facilitate the task to decide which protocol is better for a specific simulation.
Resumo:
The objectives of the present study were to evaluate factors associated with estrous synchronization responses and pregnancy per insemination (P/AI) in Bos indicus beef cows submitted to progesterone-based fixed-time artificial insemination (FTAI) protocols. A total of 2388 cows (1869 Nellore and 519 crossbred Nellore x Angus) from 10 commercial farms were evaluated to determine the relationships among breed, body condition score (BCS) on the first day of the FTAI protocol, the occurrence of estrus between progesterone device removal and FTAI and diameter of largest ovarian follicle (LF) at FTAI on estrous synchronization responses and P/AI. Cows (n=412 primiparous; 1976 multiparous) received an intravaginal device containing progesterone or an ear implant containing norgestomet (a progestin), and an injection of estradiol at the beginning of the estrous synchronization protocol. Body condition was scored using a 1-5 scale on the first day of the FTAI protocol and at 30-60 days postpartum. Females received 300IU of equine chorionic gonadotropin (eCG) and PGF(2 alpha) on the day the progesterone device/implant was removed and were inseminated 48-60h later. At insemination, cows (n=2388) were submitted to an ultrasonographic exam to determine the diameter of the LF. Follicles were classified into four categories based on mean and standard deviation (SD) of the LF (LF1 = two SD below the mean; LF2 = mean minus one SD; LF3 = mean plus one SD; LF4 = two SD above the mean). Ovulation rate was determined in a subset of cows (n=813) by three consecutive ultrasonographic exams: (1) at time of progesterone device/implant removal, (2) at time of FTAI and (3) 48 h after FTAI. Ovulation was defined as the disappearance of a large follicle (>= 8.0 mm) that was previously recorded. Estrus was determined in a subset of the cows (n = 445) by the activation of a detection of estrous patch placed on the tail head on the day of progesterone device/implant removal. Pregnancy was diagnosed 30 days after FTAI. Pregnancy was influenced (P = 0.001) by follicle diameter [LF1 = 27.5% (81/295), LF2 = 46.6% (328/705), LF3 = 57.9% (647/1118), LF4 = 63.3% (171/270)] and the occurrence of estrus [estrus = 67.7% (174/257) and no estrus = 36.2% (68/188)]. Follicle diameter at FTAI influenced ovulation rate [LF1 = 42.5% (34/80), LF2 = 73.9% (161/218), LF3 = 95.8% (407/425), LF4 = 97.8% (88/90)], the occurrence of estrus [LF1 = 54.8% (51/93), LF2 = 33.6% (43/128), LF3 = 68.9% (126/183), LF4 = 90.2% (37/41)] and P/AI among cows that had ovulations [LF1 =32.4% (11/34), LF2 = 50.3% (81/161), LF3 = 60.0% (244/407), LF4 = 68.2% (60/88)]. Improving estrous responses between progesterone device withdrawal and FTAI and increasing the diameter of the LF at FTAI may be important aspects to achieve improved estrous synchronization responses and P/AI following progesterone/progestin and estradiol based FTAI protocols in suckled Bos indicus cows. (C) 2010 Elsevier B.V. All rights reserved.
Resumo:
Cryptographic systems are safe. However, the management of cryptographic keys of these systems is a tough task. They are usually protected by the use of password-based authentication mechanisms, which is a weak link on conventional cryptographic systems, as the passwords can be easily copied or stolen. The usage of a biometric approach for releasing the keys is an alternative to the password-based mechanisms. But just like passwords, we need mechanisms to keep the biometrical signal safe. One approach for such mechanism is to use biometrical key cryptography. The cryptographic systems based on the use of biometric characteristics as keys are called biometrical cryptographic systems. This article presents the implementation of Fuzzy Vault, a biometrical cryptographic system written in Java, along with its performance evaluation. Fuzzy Vault was tested on a real application using smartcards.