117 resultados para Authenticated cipher


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Presented by Mr. Heyburn. Ordered to be printed, August 5, 1911.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A method is proposed to offer privacy in computer communications, using symmetric product block ciphers. The security protocol involved a cipher negotiation stage, in which two communicating parties select privately a cipher from a public cipher space. The cipher negotiation process includes an on-line cipher evaluation stage, in which the cryptographic strength of the proposed cipher is estimated. The cryptographic strength of the ciphers is measured by confusion and diffusion. A method is proposed to describe quantitatively these two properties. For the calculation of confusion and diffusion a number of parameters are defined, such as the confusion and diffusion matrices and the marginal diffusion. These parameters involve computationally intensive calculations that are performed off-line, before any communication takes place. Once they are calculated, they are used to obtain estimation equations, which are used for on-line, fast evaluation of the confusion and diffusion of the negotiated cipher. A technique proposed in this thesis describes how to calculate the parameters and how to use the results for fast estimation of confusion and diffusion for any cipher instance within the defined cipher space.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this article we discuss a possibility to use genetic algorithms in cryptanalysis. We developed and described the genetic algorithm for finding the secret key of a block permutation cipher. In this case key is a permutation of some first natural numbers. Our algorithm finds the exact key’s length and the key with controlled accuracy. Evaluation of conducted experiment’s results shows that the almost automatic cryptanalysis is possible.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The asymmetric cipher protocol based on decomposition problem in matrix semiring M over semiring of natural numbers N is presented. The security parameters are defined and preliminary security analysis is presented.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of the research is to investigate the emerging data security methodologies that will work with most suitable applications in the academic, industrial and commercial environments. Of several methodologies considered for Advanced Encryption Standard (AES), MARS (block cipher) developed by IBM, has been selected. Its design takes advantage of the powerful capabilities of modern computers to allow a much higher level of performance than can be obtained from less optimized algorithms such as Data Encryption Standards (DES). MARS is unique in combining virtually every design technique known to cryptographers in one algorithm. The thesis presents the performance of 128-bit cipher flexibility, which is a scaled down version of the algorithm MARS. The cryptosystem used showed equally comparable performance in speed, flexibility and security, with that of the original algorithm. The algorithm is considered to be very secure and robust and is expected to be implemented for most of the applications.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a novel algorithm to successfully achieve viable integrity and authenticity addition and verification of n-frame DICOM medical images using cryptographic mechanisms. The aim of this work is the enhancement of DICOM security measures, especially for multiframe images. Current approaches have limitations that should be properly addressed for improved security. The algorithm proposed in this work uses data encryption to provide integrity and authenticity, along with digital signature. Relevant header data and digital signature are used as inputs to cipher the image. Therefore, one can only retrieve the original data if and only if the images and the inputs are correct. The encryption process itself is a cascading scheme, where a frame is ciphered with data related to the previous frames, generating also additional data on image integrity and authenticity. Decryption is similar to encryption, featuring also the standard security verification of the image. The implementation was done in JAVA, and a performance evaluation was carried out comparing the speed of the algorithm with other existing approaches. The evaluation showed a good performance of the algorithm, which is an encouraging result to use it in a real environment.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we describe the Vannotea system - an application designed to enable collaborating groups to discuss and annotate collections of high quality images, video, audio or 3D objects. The system has been designed specifically to capture and share scholarly discourse and annotations about multimedia research data by teams of trusted colleagues within a research or academic environment. As such, it provides: authenticated access to a web browser search interface for discovering and retrieving media objects; a media replay window that can incorporate a variety of embedded plug-ins to render different scientific media formats; an annotation authoring, editing, searching and browsing tool; and session logging and replay capabilities. Annotations are personal remarks, interpretations, questions or references that can be attached to whole files, segments or regions. Vannotea enables annotations to be attached either synchronously (using jabber message passing and audio/video conferencing) or asynchronously and stand-alone. The annotations are stored on an Annotea server, extended for multimedia content. Their access, retrieval and re-use is controlled via Shibboleth identity management and XACML access policies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Hoje em dia, há cada vez mais informação audiovisual e as transmissões ou ficheiros multimédia podem ser partilhadas com facilidade e eficiência. No entanto, a adulteração de conteúdos vídeo, como informação financeira, notícias ou sessões de videoconferência utilizadas num tribunal, pode ter graves consequências devido à importância desse tipo de informação. Surge então, a necessidade de assegurar a autenticidade e a integridade da informação audiovisual. Nesta dissertação é proposto um sistema de autenticação de vídeo H.264/Advanced Video Coding (AVC), denominado Autenticação de Fluxos utilizando Projecções Aleatórias (AFPA), cujos procedimentos de autenticação, são realizados ao nível de cada imagem do vídeo. Este esquema permite um tipo de autenticação mais flexível, pois permite definir um limite máximo de modificações entre duas imagens. Para efectuar autenticação é utilizada uma nova técnica de autenticação de imagens, que combina a utilização de projecções aleatórias com um mecanismo de correcção de erros nos dados. Assim é possível autenticar cada imagem do vídeo, com um conjunto reduzido de bits de paridade da respectiva projecção aleatória. Como a informação de vídeo é tipicamente, transportada por protocolos não fiáveis pode sofrer perdas de pacotes. De forma a reduzir o efeito das perdas de pacotes, na qualidade do vídeo e na taxa de autenticação, é utilizada Unequal Error Protection (UEP). Para validação e comparação dos resultados implementou-se um sistema clássico que autentica fluxos de vídeo de forma típica, ou seja, recorrendo a assinaturas digitais e códigos de hash. Ambos os esquemas foram avaliados, relativamente ao overhead introduzido e da taxa de autenticação. Os resultados mostram que o sistema AFPA, utilizando um vídeo com qualidade elevada, reduz o overhead de autenticação em quatro vezes relativamente ao esquema que utiliza assinaturas digitais e códigos de hash.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Introdução – Numa era em que os tratamentos de Radioterapia Externa (RTE) exigem cada vez mais precisão, a utilização de imagem médica permitirá medir, quantificar e avaliar o impacto do erro provocado pela execução do tratamento ou pelos movimentos dos órgãos. Objetivo – Analisar os dados existentes na literatura acerca de desvios de posicionamento (DP) em patologias de cabeça e pescoço (CP) e próstata, medidos com Cone Beam Computed Tomography (CBCT) ou Electronic Portal Image Device (EPID). Metodologia – Para esta revisão da literatura foram pesquisados artigos recorrendo às bases de dados MEDLINE/PubMed e b-on. Foram incluídos artigos que reportassem DP em patologias CP e próstata medidos através de CBCT e EPID. Seguidamente foram aplicados critérios de validação, que permitiram a seleção dos estudos. Resultados – Após a análise de 35 artigos foram incluídos 13 estudos e validados 9 estudos. Para tumores CP, a média (μ) dos DP encontra-se entre 0,0 e 1,2mm, com um desvio padrão (σ) máximo de 1,3mm. Para patologias de próstata observa-se μDP compreendido entre 0,0 e 7,1mm, com σ máximo de 7,5mm. Discussão/Conclusão – Os DP em patologias CP são atribuídos, maioritariamente, aos efeitos secundários da RTE, como mucosite e dor, que afetam a deglutição e conduzem ao emagrecimento, contribuindo para a instabilidade da posição do doente durante o tratamento, aumentando as incertezas de posicionamento. Os movimentos da próstata devem-se principalmente às variações de preenchimento vesical, retal e gás intestinal. O desconhecimento dos DP afeta negativamente a precisão da RTE. É importante detetá-los e quantificá-los para calcular margens adequadas e a magnitude dos erros, aumentando a precisão da administração de RTE, incluindo o aumento da segurança do doente. - ABSTRACT - Background and Purpose – In an era where precision is an increasing necessity in external radiotherapy (RT), modern medical imaging techniques provide means for measuring, quantifying and evaluating the impact of treatment execution and movement error. The aim of this paper is to review the current literature on the quantification of setup deviations (SD) in patients with head and neck (H&N) or prostate tumors, using Cone Beam Computed Tomography (CBCT) or Electronic Portal Image Device (EPID). Methods – According to the study protocol, MEDLINE/PubMed and b-on databases were searched for trials, which were analyzed using selection criteria based on the quality of the articles. Results – After assessment of 35 papers, 13 studies were included in this analysis and nine were authenticated (6 for prostate and 3 for H&N tumors). The SD in the treatment of H&N cancer patients is in the interval of 0.1 to 1.2mm, whereas in prostate cancer this interval is 0.0 to 7.1mm. Discussion – The reproducibility of patient positioning is the biggest barrier for higher precision in RT, which is affected by geometrical uncertainty, positioning errors and inter or intra-fraction organ movement. There are random and systematic errors associated to patient positioning, introduced since the treatment planning phase or through physiological organ movement. Conclusion – The H&N SD are mostly assigned to the Radiotherapy adverse effects, like mucositis and pain, which affect swallowing and decrease secretions, contributing for the instability of patient positioning during RT treatment and increasing positioning uncertainties. Prostate motion is mainly related to the variation in bladder and rectal filling. Ignoring SD affects negatively the accuracy of RT. Therefore, detection and quantification of SD is crucial in order to calculate appropriate margins, the magnitude of error and to improve accuracy in RTE and patient safety.