180 resultados para CRYPTOGRAPHIC PAIRINGS
Resumo:
Modern Field Programmable Gate Arrays (FPGAs) are power packed with features to facilitate designers. Availability of features like huge block memory (BRAM), Digital Signal Processing (DSP) cores, embedded CPU makes the design strategy of FPGAs quite different from ASICs. FPGA are also widely used in security-critical application where protection against known attacks is of prime importance. We focus ourselves on physical attacks which target physical implementations. To design countermeasures against such attacks, the strategy for FPGA designers should also be different from that in ASIC. The available features should be exploited to design compact and strong countermeasures. In this paper, we propose methods to exploit the BRAMs in FPGAs for designing compact countermeasures. BRAM can be used to optimize intrinsic countermeasures like masking and dual-rail logic, which otherwise have significant overhead (at least 2X). The optimizations are applied on a real AES-128 co-processor and tested for area overhead and resistance on Xilinx Virtex-5 chips. The presented masking countermeasure has an overhead of only 16% when applied on AES. Moreover Dual-rail Precharge Logic (DPL) countermeasure has been optimized to pack the whole sequential part in the BRAM, hence enhancing the security. Proper robustness evaluations are conducted to analyze the optimization for area and security.
Resumo:
The advent of personal communication systems within the last decade has depended upon the utilization of advanced digital schemes for source and channel coding and for modulation. The inherent digital nature of the communications processing has allowed the convenient incorporation of cryptographic techniques to implement security in these communications systems. There are various security requirements, of both the service provider and the mobile subscriber, which may be provided for in a personal communications system. Such security provisions include the privacy of user data, the authentication of communicating parties, the provision for data integrity, and the provision for both location confidentiality and party anonymity. This thesis is concerned with an investigation of the private-key and public-key cryptographic techniques pertinent to the security requirements of personal communication systems and an analysis of the security provisions of Second-Generation personal communication systems is presented. Particular attention has been paid to the properties of the cryptographic protocols which have been employed in current Second-Generation systems. It has been found that certain security-related protocols implemented in the Second-Generation systems have specific weaknesses. A theoretical evaluation of these protocols has been performed using formal analysis techniques and certain assumptions made during the development of the systems are shown to contribute to the security weaknesses. Various attack scenarios which exploit these protocol weaknesses are presented. The Fiat-Sharmir zero-knowledge cryptosystem is presented as an example of how asymmetric algorithm cryptography may be employed as part of an improved security solution. Various modifications to this cryptosystem have been evaluated and their critical parameters are shown to be capable of being optimized to suit a particular applications. The implementation of such a system using current smart card technology has been evaluated.
Resumo:
The Self-shrinking p-adic cryptographic generator (SSPCG) is a fast software stream cipher. Improved cryptoanalysis of the SSPCG is introduced. This cryptoanalysis makes more precise the length of the period of the generator. The linear complexity and the cryptography resistance against most recently used attacks are invesigated. Then we discuss how such attacks can be avoided. The results show that the sequence generated by a SSPCG has a large period, large linear complexity and is stable against the cryptographic attacks. This gives the reason to consider the SSPSG as suitable for critical cryptographic applications in stream cipher encryption algorithms.
Resumo:
AMS Subj. Classification: Primary 20N05, Secondary 94A60
Resumo:
International audience
Resumo:
Chamber music with piano comprises some of the greatest masterpieces in the Western canon. The works range from duo sonatas with various instruments through septets. In regard to duo sonatas, the violin is the instrument most frequently paired with the piano. Of all the chamber works for larger ensembles, the most popular is the quintet. In this dissertation, I will be exploring the similarities and differences between the duo sonatas and quintets of a given composer. I will be surveying Robert Schumann’s Piano Quintet in E-flat Major, Op. 44 along with his Violin and Piano Sonata in A Minor, Op. 105. The next pairing will be Johannes Brahms’ Piano Quintet in F Minor, Op. 34 and his Piano and Violin Sonata in D Minor, Op. 108. Dmitri Shostakovich’s Piano Quintet in G Minor, Op. 57 and his Cello and Piano Sonata in D Minor, Op. 40 will be the last two works examined in this dissertation. This dissertation project consisted of three recitals, presented in the Gildenhorn Recital Hall at the Clarice Smith Performing Arts Center of the University of Maryland. The recitals featured works by Johannes Brahms, Robert Schumann and Dmitri Shostakovich and took place on March 14, 2014, February 13, 2015 and November 22, 2015. All three recitals were recorded on compact discs, which can be accessed at the Digital Repository at the University of Maryland (DRUM) and at the University of Maryland Hornbake Library.
Resumo:
Background: Material wear testing is an important technique in the development and evaluation of materials for use in implant for total knee arthroplasty. Since a knee joint induces a complex rolling-gliding movement, standardised material wear testing devices such as Pin-on-Disc or Ring-on-Disc testers are suitable to only a limited extent because they generate pure gliding motion only.Methods: A rolling-gliding wear simulator was thus designed, constructed and implemented, which simulates and reproduces the rolling-gliding movement and loading of the knee joint on specimens of simplified geometry. The technical concept was to run a base-plate, representing the tibia plateau, against a pivoted cylindrical counter-body, representing one femur condyle under an axial load. A rolling movement occurs as a result of the friction and pure gliding is induced by limiting the rotation of the cylindrical counter-body. The set up also enables simplified specimens handling and removal for gravimetrical wear measurements. Long-term wear tests and gravimetrical wear measurements were carried out on the well known material pairings: cobalt chrome-polyethylene, ceramic-polyethylene and ceramic-ceramic, over three million motion cycles to allow material comparisons to be made.Results: The observed differences in wear rates between cobalt-chrome on polyethylene and ceramic on polyethylene pairings were similar to the differences of published data for existing material-pairings. Test results on ceramic-ceramic pairings of different frontal-plane geometry and surface roughness displayed low wear rates and no fracture failures.Conclusions: The presented set up is able to simulate the rolling-gliding movement of the knee joint, is easy to use, and requires a minimum of user intervention or monitoring. It is suitable for long-term testing, and therefore a useful tool for the investigation of new and promising materials which are of interest for application in knee joint replacement implants. © 2010 Richter et al; licensee BioMed Central Ltd.
Resumo:
Bilinear pairings can be used to construct cryptographic systems with very desirable properties. A pairing performs a mapping on members of groups on elliptic and genus 2 hyperelliptic curves to an extension of the finite field on which the curves are defined. The finite fields must, however, be large to ensure adequate security. The complicated group structure of the curves and the expensive field operations result in time consuming computations that are an impediment to the practicality of pairing-based systems. The Tate pairing can be computed efficiently using the ɳT method. Hardware architectures can be used to accelerate the required operations by exploiting the parallelism inherent to the algorithmic and finite field calculations. The Tate pairing can be performed on elliptic curves of characteristic 2 and 3 and on genus 2 hyperelliptic curves of characteristic 2. Curve selection is dependent on several factors including desired computational speed, the area constraints of the target device and the required security level. In this thesis, custom hardware processors for the acceleration of the Tate pairing are presented and implemented on an FPGA. The underlying hardware architectures are designed with care to exploit available parallelism while ensuring resource efficiency. The characteristic 2 elliptic curve processor contains novel units that return a pairing result in a very low number of clock cycles. Despite the more complicated computational algorithm, the speed of the genus 2 processor is comparable. Pairing computation on each of these curves can be appealing in applications with various attributes. A flexible processor that can perform pairing computation on elliptic curves of characteristic 2 and 3 has also been designed. An integrated hardware/software design and verification environment has been developed. This system automates the procedures required for robust processor creation and enables the rapid provision of solutions for a wide range of cryptographic applications.
Resumo:
The increasing adoption of information systems in healthcare has led to a scenario where patient information security is more and more being regarded as a critical issue. Allowing patient information to be in jeopardy may lead to irreparable damage, physically, morally, and socially to the patient, potentially shaking the credibility of the healthcare institution. Medical images play a crucial role in such context, given their importance in diagnosis, treatment, and research. Therefore, it is vital to take measures in order to prevent tampering and determine their provenance. This demands adoption of security mechanisms to assure information integrity and authenticity. There are a number of works done in this field, based on two major approaches: use of metadata and use of watermarking. However, there still are limitations for both approaches that must be properly addressed. This paper presents a new method using cryptographic means to improve trustworthiness of medical images, providing a stronger link between the image and the information on its integrity and authenticity, without compromising image quality to the end user. Use of Digital Imaging and Communications in Medicine structures is also an advantage for ease of development and deployment.
Resumo:
This paper presents a novel algorithm to successfully achieve viable integrity and authenticity addition and verification of n-frame DICOM medical images using cryptographic mechanisms. The aim of this work is the enhancement of DICOM security measures, especially for multiframe images. Current approaches have limitations that should be properly addressed for improved security. The algorithm proposed in this work uses data encryption to provide integrity and authenticity, along with digital signature. Relevant header data and digital signature are used as inputs to cipher the image. Therefore, one can only retrieve the original data if and only if the images and the inputs are correct. The encryption process itself is a cascading scheme, where a frame is ciphered with data related to the previous frames, generating also additional data on image integrity and authenticity. Decryption is similar to encryption, featuring also the standard security verification of the image. The implementation was done in JAVA, and a performance evaluation was carried out comparing the speed of the algorithm with other existing approaches. The evaluation showed a good performance of the algorithm, which is an encouraging result to use it in a real environment.
Resumo:
We describe in this paper a new genus and species of cricetid rodent from the Atlantic Forest of Brazil, one of the most endangered eco-regions of the world. The new form displays some but not all synapomorphies of the tribe Oryzomyini, but a suite of unique characteristics is also observed. This new forest rat possesses anatomical characteristics of arboreal taxa, such as very developed plantar pads, but was collected almost exclusively in pitfall traps. Phylogenetic analyses of morphological (integument, soft tissue, cranial, and dental characters) and molecular [nuclear - Interphotoreceptor retinoid binding protein (Irbp) - and mitochondrial - cytochrome b - genes] datasets using maximum likelihood and cladistic parsimony approaches corroborate the inclusion of the new taxon within oryzomyines. The analyses also place the new form as sister species to Eremoryzomys polius, an Andean rat endemic to the Maranon valley. This biogeographical pattern is unusual amongst small terrestrial vertebrates, as a review of the literature points to few other similar examples of Andean-Atlantic Forest pairings, in hylid frogs, Pionus parrots, and other sigmodontine rodents. (C) 2011 The Linnean Society of London, Zoological Journal of the Linnean Society, 2011, 161, 357-390. doi:10.1111/j.1096-3642.2010.00643.x
Resumo:
Prepulse inhibition and facilitation of the blink reflex are said to reflect different responses elicited by the lead stimulus, transient detection and orienting response respectively. Two experiments investigated the effects of trial repetition and lead stimulus change on blink modification. It was hypothesized that these manipulations will affect orienting and thus blink facilitation to a greater extent than they will affect transient detection and thus blink inhibition. In Experiment 1 (N = 64), subjects were trained with a sequence of 12 lead stimulus and 12 blink stimulus alone presentations, and 24 lead stimulus-blink stimulus pairings. Lead interval was 120 ms for 12 of the trials and 2000 ms for the other 12. For half the subjects this sequence was followed by a change in pitch of the lead stimulus. In Experiment 2 (N = 64), subjects were trained with a sequence of 36 blink alone stimuli and 36 lead stimulus-blink stimulus pairings. The lead interval was 120 ms for half the subjects and 2000 ms for the other half. The pitch of the lead stimulus on prestimulus trials 31-33 was changed for half the subjects in each group. In both experiments, the amount of blink inhibition decreased during training whereas the amount of blink facilitation remained unchanged. Lead stimulus change had no effect on blink modification in either experiment although it resulted in enhanced skin conductance responses and greater heart rate deceleration in Experiment 2. The present results are not consistent with the notion that blink facilitation is linked to orienting whereas blink inhibition reflects a transient detection mechanism. (C) 1998 Elsevier Science B.V.
Resumo:
The magnitude of a startle reflex is inhibited if the reflex-eliciting stimuli is preceded by a prepulse stimulus at a short lead interval. Previous research in humans has shown that the extent of prepulse inhibition decreases over repeated presentations of reflex stimuli and prepulse-reflex stimulus pairings. The present study (N=70) investigated the effect of repeated presentations of prepulse stimuli, reflex stimuli, or prepulse-reflex stimulus pairings on prepulse inhibition. Five groups of subjects were presented during habituation training with either (a) reflex stimuli, (b) prepulse-reflex stimulus pairings, (c) a random sequence of prepulse and reflex stimuli, (d) prepulse stimuli, or (e) experimentally irrelevant light stimuli. Prepulse inhibition was reduced if startle stimuli were presented during habituation ((a), (b), (c)), but not after repeated presentation of the prepulse or the light stimulus ((d), (e)). The reduction in prepulse inhibition was abolished after dishabituation of the startle reflex. The present results indicate that habituation of the startle reflex can result in a reduction of prepulse inhibition. (C) 1998 Elsevier Science B.V.
Resumo:
The present study aimed to demonstrate conditioned inhibition of Pavlovian conditioning of autonomic responses in humans. Subjects (N = 21) were presented initially with four geometric shapes (A, B, C and D). An electric shock served as the unconditioned stimulus (US) during acquisition. Conditional stimuli lasted for 8 s and US onset coincided with CS offset. Subjects were trained with A-US, C-US, and AC-US pairings and AB alone and B alone presentations. The subsequent summation test consisted of C-US pairings and CB alone and CD alone presentations. Conditioning was evident in self-reported US expectancy and first and second interval electrodermal responses. Evidence for conditioned inhibition during the summation test was found in US expectancy and second interval electrodermal responses. (C) 1997 Elsevier Science B.V.