994 resultados para key replacement attack


Relevância:

30.00% 30.00%

Publicador:

Resumo:

We present a text watermarking scheme that embeds a bitstream watermark Wi in a text document P preserving the meaning, context, and flow of the document. The document is viewed as a set of paragraphs, each paragraph being a set of sentences. The sequence of paragraphs and sentences used to embed watermark bits is permuted using a secret key. Then, English language sentence transformations are used to modify sentence lengths, thus embedding watermarking bits in the Least Significant Bits (LSB) of the sentences’ cardinalities. The embedding and extracting algorithms are public, while the secrecy and security of the watermark depends on a secret key K. The probability of False Positives is extremely small, hence avoiding incidental occurrences of our watermark in random text documents. Majority voting provides security against text addition, deletion, and swapping attacks, further reducing the probability of False Positives. The scheme is secure against the general attacks on text watermarks such as reproduction (photocopying, FAX), reformatting, synonym substitution, text addition, text deletion, text swapping, paragraph shuffling and collusion attacks.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A well-known attack on RSA with low secret-exponent d was given by Wiener about 15 years ago. Wiener showed that using continued fractions, one can efficiently recover the secret-exponent d from the public key (N,e) as long as d < N 1/4. Interestingly, Wiener stated that his attack may sometimes also work when d is slightly larger than N 1/4. This raises the question of how much larger d can be: could the attack work with non-negligible probability for d=N 1/4 + ρ for some constant ρ > 0? We answer this question in the negative by proving a converse to Wiener’s result. Our result shows that, for any fixed ε > 0 and all sufficiently large modulus lengths, Wiener’s attack succeeds with negligible probability over a random choice of d < N δ (in an interval of size Ω(N δ )) as soon as δ > 1/4 + ε. Thus Wiener’s success bound dattack, which are guaranteed to succeed even when δ > 1/4. The known attacks in this class (by Verheul and Van Tilborg and Dujella) run in exponential time, so it is natural to ask whether there exists an attack in this class with subexponential run-time. Our second converse result answers this question also in the negative.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

NLS is one of the stream ciphers submitted to the eSTREAM project. We present a distinguishing attack on NLS by Crossword Puzzle (CP) attack method which is introduced in this paper. We build the distinguisher by using linear approximations of both the non-linear feedback shift register (NFSR) and the nonlinear filter function (NLF). Since the bias of the distinguisher depends on the Konst value, which is a key-dependent word, we present the graph showing how the bias of distinguisher vary with Konst. In result, we estimate the bias of the distinguisher to be around O(2^−30). Therefore, we claim that NLS is distinguishable from truly random cipher after observing O(2^60) keystream words. The experiments also show that our distinguishing attack is successful on 90.3% of Konst among 2^32 possible values. We extend the CP attack to NLSv2 which is a tweaked version of NLS. In result, we build a distinguisher which has the bias of around 2− 48. Even though this attack is below the eSTREAM criteria (2^−40), the security margin of NLSv2 seems to be too low.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A parallel authentication and public-key encryption is introduced and exemplified on joint encryption and signing which compares favorably with sequential Encrypt-then-Sign (ɛtS) or Sign-then-Encrypt (Stɛ) schemes as far as both efficiency and security are concerned. A security model for signcryption, and thus joint encryption and signing, has been recently defined which considers possible attacks and security goals. Such a scheme is considered secure if the encryption part guarantees indistinguishability and the signature part prevents existential forgeries, for outsider but also insider adversaries. We propose two schemes of parallel signcryption, which are efficient alternative to Commit-then-Sign-and- Encrypt (Ct&G3&S). They are both provably secure in the random oracle model. The first one, called generic parallel encrypt and sign, is secure if the encryption scheme is semantically secure against chosen-ciphertext attacks and the signature scheme prevents existential forgeries against random-message attacks. The second scheme, called optimal parallel encrypt. and sign, applies random oracles similar to the OAEP technique in order to achieve security using encryption and signature components with very weak security requirements — encryption is expected to be one-way under chosen-plaintext attacks while signature needs to be secure against universal forgeries under random-plaintext attack, that is actually the case for both the plain-RSA encryption and signature under the usual RSA assumption. Both proposals are generic in the sense that any suitable encryption and signature schemes (i.e. which simply achieve required security) can be used. Furthermore they allow both parallel encryption and signing, as well as parallel decryption and verification. Properties of parallel encrypt and sign schemes are considered and a new security standard for parallel signcryption is proposed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Multi-party key agreement protocols indirectly assume that each principal equally contributes to the final form of the key. In this paper we consider three malleability attacks on multi-party key agreement protocols. The first attack, called strong key control allows a dishonest principal (or a group of principals) to fix the key to a pre-set value. The second attack is weak key control in which the key is still random, but the set from which the key is drawn is much smaller than expected. The third attack is named selective key control in which a dishonest principal (or a group of dishonest principals) is able to remove a contribution of honest principals to the group key. The paper discusses the above three attacks on several key agreement protocols, including DH (Diffie-Hellman), BD (Burmester-Desmedt) and JV (Just-Vaudenay). We show that dishonest principals in all three protocols can weakly control the key, and the only protocol which does not allow for strong key control is the DH protocol. The BD and JV protocols permit to modify the group key by any pair of neighboring principals. This modification remains undetected by honest principals.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Background: Rupture of vulnerable atheromatous plaque in the carotid and coronary arteries often leads to stroke and heart attack respectively. The role of calcium deposition and its contribution to plaque stability is controversial. This study uses both an idealized and a patient-specific model to evaluate the effect of a calcium deposit on the stress distribution within an atheromatous plaque. Methods: Using a finite-element method, structural analysis was performed on an idealized plaque model and the location of a calcium deposit within it was varied. In addition to the idealized model, in vivo high-resolution MR imaging was performed on 3 patients with carotid atheroma and stress distributions were generated. The individual plaques were chosen as they had calcium at varying locations with respect to the lumen and the fibrous cap. Results: The predicted maximum stress was increased by 47.5% when the calcium deposit was located in the thin fibrous cap in the model when compared with that in a model without a deposit. The result of adding a calcium deposit either to the lipid core or remote from the lumen resulted in almost no increase in maximal stress. Conclusion: Calcification at the thin fibrous cap may result in high stress concentrations, ultimately increasing the risk of plaque rupture. Assessing the location of calcification may, in the future, aid in the risk stratification of patients with carotid stenosis.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Although the principle of equal access to medically justified treatment has been promoted by official health policies in many Western health care systems, practices do not completely meet policy targets. Waiting times for elective surgery vary between patient groups and regions, and growing problems in the availability of services threaten equal access to treatment. Waiting times have come to the attention of decision-makers, and several policy initiatives have been introduced to ensure the availability of care within a reasonable time. In Finland, for example, the treatment guarantee came into force in 2005. However, no consensus exists on optimal waiting time for different patient groups. The purpose of this multi-centre randomized controlled trial was to analyse health-related quality of life, pain and physical function in total hip or knee replacement patients during the waiting time and to evaluate whether the waiting time is associated with patients health outcomes at admission. This study also assessed whether the length of waiting time is associated with social and health services utilization in patients awaiting total hip or knee replacement. In addition, patients health-related quality of life was compared with that of the general population. Consecutive patients with a need for a primary total hip or knee replacement due to osteoarthritis were placed on the waiting list between August 2002 and November 2003. Patients were randomly assigned to a short waiting time (maximum 3 months) or a non-fixed waiting time (waiting time not fixed in advance, instead the patient followed the hospitals routine practice). Patients health-related quality of life was measured upon being placed on the waiting list and again at hospital admission using the generic 15D instrument. Pain and physical function were evaluated using the self-report Harris Hip Score for hip patients and a scale modified from the Knee Society Clinical Rating System for knee patients. Utilization measures were the use of home health care, rehabilitation and social services, physician visits and inpatient care. Health and social services use was low in both waiting time groups. The most common services used while waiting were rehabilitation services and informal care, including unpaid care provided by relatives, neighbours and volunteers. Although patients suffered from clear restrictions in usual activities and physical functioning, they seemed primarily to lean on informal care and personal networks instead of professional care. While longer waiting time did not result in poorer health-related quality of life at admission and use of services during the waiting time was similar to that at the time of placement on the list, there is likely to be higher costs of waiting by people who wait longer simply because they are using services for a longer period. In economic terms, this would represent a negative impact of waiting. Only a few reports have been published of the health-related quality of life of patients awaiting total hip or knee replacement. These findings demonstrate that, in addition to physical dimensions of health, patients suffered from restrictions in psychological well-being such as depression, distress and reduced vitality. This raises the question of how to support patients who suffer from psychological distress during the waiting time and how to develop strategies to improve patients initiatives to reduce symptoms and the burden of waiting. Key words: waiting time, total hip replacement, total knee replacement, health-related quality of life, randomized controlled trial, outcome assessment, social service, utilization of health services

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The metabolism of phenylalanine by a strain of Aspergillus niger, isolated from the soil by enrichment culture has been studied. Analyses of the culture filtrates and replacement studies with various metabolites have revealed the operation of a degradative pathway involving p-hydroxymandelate as a key intermediate in this organism, p-Hydroxymandelate has been isolated from the cultural filtrates and its identity established by UV, IR and chromatographic techniques. A scheme for the degradation of phenylalanine in this organism has been proposed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Public key authentication is the verification of the identity-public key binding, and is foundational to the security of any network. The contribution of this thesis has been to provide public key authentication for a decentralised and resource challenged network such as an autonomous Delay Tolerant Network (DTN). It has resulted in the development and evaluation of a combined co-localisation trust system and key distribution scheme evaluated on a realistic large geographic scale mobility model. The thesis also addresses the problem of unplanned key revocation and replacement without any central authority.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Oxidative stress is caused by an imbalance between the production of reactive oxygen species (ROS) and the biological system's ability to detoxify these reactive intermediates. Mammalian cells have elaborate antioxidant defense mechanisms to control the damaging effects of ROS. Glutathione peroxidase (GPx), a selenoenzyme, plays a key role in protecting the organism from oxidative damage by catalyzing the reduction of harmful hydroperoxides with thiol a ``catalytic triad'' with tryptophan and glutamine, which cofactors. The selenocysteine residue at the active site forms activates the selenium moiety for an efficient reduction of peroxides. After the discovery that ebselen, a synthetic organoselenium compound, mimics the catalytic activity of GPx both in vitro and in vivo, several research groups developed a number of small-molecule selenium compounds as functional mimics of GPx, either by modifying the basic structure of ebselen or by incorporating some structural features of the native enzyme. The synthetic mimics reported in the literature can be classified in three major categories: (i) cyclic selenenyl amides having a Se-N bond, (ii) diaryl diselenides, and (iii) aromatic or aliphatic monoselenides. Recent studies show that ebselen exhibits very poor GPx activity when aryl or benzylic thiols such as PhSH or BnSH are used as cosubstrates. Because the catalytic activity of each GPx mimic largely depends on the thiol cosubstrates used, the difference in the thiols causes the discrepancies observed in different studies. In this Account, we demonstrate the effect of amide and amine substituents on the GPx activity of various organoselenium compounds. The existence of strong Se ... O/N interactions in the selenenyl sulfide intermediates significantly reduces the GPx activity. These interactions facilitate an attack of thiol at selenium rather than at sulfur, leading to thiol exchange reactions that hamper the formation of catalytically active selenol. Therefore, any substituent capable of enhancing the nucleophilic attack of thiol at sulfur in the selenenyl sulfide state would enhance the antioxidant potency of organoselenium compounds. Interestingly, replacement of the sec-amide substituent by a tert-amide group leads to a weakening of Se ... 0 interactions in the selenenyl sulfide intermediates. This modification results in 10- to 20-fold enhancements in the catalytic activities. Another strategy involving the replacement of tert-amide moieties by tert-amino substituents further increases the activity by 3- to 4-fold. The most effective modification so far in benzylamine-based GPx mimics appears to be either the replacement of a tert-amino substituent by a sec-amino group or the introduction of an additional 6-methoxy group in the phenyl ring. These strategies can contribute to a remarkable enhancement in the GPx activity. In addition to enhancing catalytic activity, a change in the substituents near the selenium moiety alters the catalytic mechanisms. The mechanistic investigations of functional mimics are useful not only for understanding the complex chemistry at the active site of GPx but also for designing and synthesizing novel antioxidants and anti-inflammatory agents.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

IEEE Computer Society

Relevância:

30.00% 30.00%

Publicador:

Resumo:

OBJECTIVE: To investigate the impact of tooth replacement on the nutritional status of partially dentate older patients, and, to compare two different tooth replacement strategies; conventional treatment using removable partial dentures and functionally orientated treatment based on the shortened dental arch.

BACKGROUND: Amongst older patients, diet plays a key role in disease prevention, as poor diets have been linked to numerous illnesses. Poor oral health and loss of teeth can have very significant negative effects on dietary intake and nutritional status for elderly patients. There is evidence that good oral health generally, has positive effects on the nutritional intake of older adults.

MATERIALS AND METHODS: A randomised, controlled clinical trial was designed to investigate the impact of tooth replacement on the nutritional status of partially dentate elders. Forty-four patients aged over 65 years completed the trial, with 21 allocated to conventional treatment and 23 allocated to functionally orientated treatment. Nutritional status was accessed at baseline and after treatment using the Mini Nutritional Assessment (MNA) and a range of haematological markers.

RESULTS: At baseline, relationships were observed between the number of occluding tooth contacts and some measures of nutritional status. As the number of contacts increased, MNA scores (R = 0.16), in addition to vitamin B12 (R = 0.21), serum folate (R = 0.32) and total lymphocyte count (R = 0.35), also increased. After treatment intervention, the only measure of nutritional status that showed a statistically significant improvement for both treatment groups was MNA score (p = 0.03). No significant between group differences were observed from analysis of the haematological data.

CONCLUSION: In this study, prosthodontic rehabilitation with both conventional treatment and functionally orientated treatment resulted in an improvement in MNA score. Haematological markers did not illustrate a clear picture of improvement in nutritional status for either treatment group.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Masked implementations of cryptographic algorithms are often used in commercial embedded cryptographic devices to increase their resistance to side channel attacks. In this work we show how neural networks can be used to both identify the mask value, and to subsequently identify the secret key value with a single attack trace with high probability. We propose the use of a pre-processing step using principal component analysis (PCA) to significantly increase the success of the attack. We have developed a classifier that can correctly identify the mask for each trace, hence removing the security provided by that mask and reducing the attack to being equivalent to an attack against an unprotected implementation. The attack is performed on the freely available differential power analysis (DPA) contest data set to allow our work to be easily reproducible. We show that neural networks allow for a robust and efficient classification in the context of side-channel attacks.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The replacement of the European Union (EU) Clinical Trials Directive by the new Clinical Trials Regulation (CTR), which entered into force on 16 June 2014 but will not apply before 28 May 2016, provides an opportunity to review the legal and political context within which this important aspect of research law and policy sits and to reflect on the implications for public health. My aim in this article is to relate the context to the key purposes and aims of EU law and policy on clinical trials in order to explain and clarify its orientation. On that basis, I argue that the CTR and the changes it introduces to the law on clinical trials are part of the EU's continued focus on market optimisation. It is this focus that orients and directs the wider pharmaceutical development pipeline, but that undermines the achievement of key public health objectives.