920 resultados para block ciphers
Resumo:
We have analyzed the performance of a PET demonstrator formed by two sectors of four monolithic detector blocks placed face-to-face. Both front-end and read-out electronics have been evaluated by means of coincidence measurements using a rotating 22Na source placed at the center of the sectors in order to emulate the behavior of a complete full ring. A continuous training method based on neural network (NN) algorithms has been carried out to determine the entrance points over the surface of the detectors. Reconstructed images from 1 MBq 22Na point source and 22Na Derenzo phantom have been obtained using both filtered back projection (FBP) analytic methods and the OSEM 3D iterative algorithm available in the STIR software package [1]. Preliminary data on image reconstruction from a 22Na point source with Ø = 0.25 mm show spatial resolutions from 1.7 to 2.1 mm FWHM in the transverse plane. The results confirm the viability of this design for the development of a full-ring brain PET scanner compatible with magnetic resonance imaging for human studies.
Resumo:
Modern Field Programmable Gate Arrays (FPGAs) are power packed with features to facilitate designers. Availability of features like huge block memory (BRAM), Digital Signal Processing (DSP) cores, embedded CPU makes the design strategy of FPGAs quite different from ASICs. FPGA are also widely used in security-critical application where protection against known attacks is of prime importance. We focus ourselves on physical attacks which target physical implementations. To design countermeasures against such attacks, the strategy for FPGA designers should also be different from that in ASIC. The available features should be exploited to design compact and strong countermeasures. In this paper, we propose methods to exploit the BRAMs in FPGAs for designing compact countermeasures. BRAM can be used to optimize intrinsic countermeasures like masking and dual-rail logic, which otherwise have significant overhead (at least 2X). The optimizations are applied on a real AES-128 co-processor and tested for area overhead and resistance on Xilinx Virtex-5 chips. The presented masking countermeasure has an overhead of only 16% when applied on AES. Moreover Dual-rail Precharge Logic (DPL) countermeasure has been optimized to pack the whole sequential part in the BRAM, hence enhancing the security. Proper robustness evaluations are conducted to analyze the optimization for area and security.
Resumo:
The Barriga Dam (Burgos, Spain) is a unique case study because its trapezoid spillway is located on the dam body and is composed of wedge-shaped concrete blocks (WSB) that include certain relevant improvements. This note summarizes the main features of the studies, the key aspects of the final design of the WSB and their placement on the dam, and important details of the spillway design. The design team concluded the study by showing the suitability of this enhanced technology for application to small dams and ponds in the short term, even with unit flows above 5 m2/s.
Resumo:
This paper presents results of the validity study of the use of MATLAB/Simulink synchronous-machine block for power-system stability studies. Firstly, the waveforms of the theoretical synchronous-generator short-circuit currents are described. Thereafter, the comparison between the currents obtained through the simulation model in the sudden short-circuit test, are compared to the theoretical ones. Finally, the factory tests of two commercial generating units are compared to the response of the synchronous generator simulation block during sudden short-circuit, set with the same real data, with satisfactory results. This results show the validity of the use of this generator block for power plant simulation.
Resumo:
The fracture behavior of rock block contacts has been studied for many years. Unfortunately, up to now, there is not a rigorous formulation or a solid theoretical foundation to support it. A mathematical development to represent the failure mechanism which occurs in the contacts between rock blocks is presented to evaluate the performance of breaking mechanism of such blocks relating it to the morphology of the contact and mechanical parameters of the material. The examined framework includes the evaluation of the surface roughness of first order in the failure mechanism of the granular particles of large size and the development of a theoretical model describing the morphology of the contact between rock blocks.
Resumo:
Los algoritmos basados en registros de desplazamiento con realimentación (en inglés FSR) se han utilizado como generadores de flujos pseudoaleatorios en aplicaciones con recursos limitados como los sistemas de apertura sin llave. Se considera canal primario a aquel que se utiliza para realizar una transmisión de información. La aparición de los ataques de canal auxiliar (en inglés SCA), que explotan información filtrada inintencionadamente a través de canales laterales como el consumo, las emisiones electromagnéticas o el tiempo empleado, supone una grave amenaza para estas aplicaciones, dado que los dispositivos son accesibles por un atacante. El objetivo de esta tesis es proporcionar un conjunto de protecciones que se puedan aplicar de forma automática y que utilicen recursos ya disponibles, evitando un incremento sustancial en los costes y alargando la vida útil de aplicaciones que puedan estar desplegadas. Explotamos el paralelismo existente en algoritmos FSR, ya que sólo hay 1 bit de diferencia entre estados de rondas consecutivas. Realizamos aportaciones en tres niveles: a nivel de sistema, utilizando un coprocesador reconfigurable, a través del compilador y a nivel de bit, aprovechando los recursos disponibles en el procesador. Proponemos un marco de trabajo que nos permite evaluar implementaciones de un algoritmo incluyendo los efectos introducidos por el compilador considerando que el atacante es experto. En el campo de los ataques, hemos propuesto un nuevo ataque diferencial que se adapta mejor a las condiciones de las implementaciones software de FSR, en las que el consumo entre rondas es muy similar. SORU2 es un co-procesador vectorial reconfigurable propuesto para reducir el consumo energético en aplicaciones con paralelismo y basadas en el uso de bucles. Proponemos el uso de SORU2, además, para ejecutar algoritmos basados en FSR de forma segura. Al ser reconfigurable, no supone un sobrecoste en recursos, ya que no está dedicado en exclusiva al algoritmo de cifrado. Proponemos una configuración que ejecuta múltiples algoritmos de cifrado similares de forma simultánea, con distintas implementaciones y claves. A partir de una implementación sin protecciones, que demostramos que es completamente vulnerable ante SCA, obtenemos una implementación segura a los ataques que hemos realizado. A nivel de compilador, proponemos un mecanismo para evaluar los efectos de las secuencias de optimización del compilador sobre una implementación. El número de posibles secuencias de optimizaciones de compilador es extremadamente alto. El marco de trabajo propuesto incluye un algoritmo para la selección de las secuencias de optimización a considerar. Debido a que las optimizaciones del compilador transforman las implementaciones, se pueden generar automáticamente implementaciones diferentes combinamos para incrementar la seguridad ante SCA. Proponemos 2 mecanismos de aplicación de estas contramedidas, que aumentan la seguridad de la implementación original sin poder considerarse seguras. Finalmente hemos propuesto la ejecución paralela a nivel de bit del algoritmo en un procesador. Utilizamos la forma algebraica normal del algoritmo, que automáticamente se paraleliza. La implementación sobre el algoritmo evaluado mejora en rendimiento y evita que se filtre información por una ejecución dependiente de datos. Sin embargo, es más vulnerable ante ataques diferenciales que la implementación original. Proponemos una modificación del algoritmo para obtener una implementación segura, descartando parcialmente ejecuciones del algoritmo, de forma aleatoria. Esta implementación no introduce una sobrecarga en rendimiento comparada con las implementaciones originales. En definitiva, hemos propuesto varios mecanismos originales a distintos niveles para introducir aleatoridad en implementaciones de algoritmos FSR sin incrementar sustancialmente los recursos necesarios. ABSTRACT Feedback Shift Registers (FSR) have been traditionally used to implement pseudorandom sequence generators. These generators are used in Stream ciphers in systems with tight resource constraints, such as Remote Keyless Entry. When communicating electronic devices, the primary channel is the one used to transmit the information. Side-Channel Attack (SCA) use additional information leaking from the actual implementation, including power consumption, electromagnetic emissions or timing information. Side-Channel Attacks (SCA) are a serious threat to FSR-based applications, as an attacker usually has physical access to the devices. The main objective of this Ph.D. thesis is to provide a set of countermeasures that can be applied automatically using the available resources, avoiding a significant cost overhead and extending the useful life of deployed systems. If possible, we propose to take advantage of the inherent parallelism of FSR-based algorithms, as the state of a FSR differs from previous values only in 1-bit. We have contributed in three different levels: architecture (using a reconfigurable co-processor), using compiler optimizations, and at bit level, making the most of the resources available at the processor. We have developed a framework to evaluate implementations of an algorithm including the effects introduced by the compiler. We consider the presence of an expert attacker with great knowledge on the application and the device. Regarding SCA, we have presented a new differential SCA that performs better than traditional SCA on software FSR-based algorithms, where the leaked values are similar between rounds. SORU2 is a reconfigurable vector co-processor. It has been developed to reduce energy consumption in loop-based applications with parallelism. In addition, we propose its use for secure implementations of FSR-based algorithms. The cost overhead is discarded as the co-processor is not exclusively dedicated to the encryption algorithm. We present a co-processor configuration that executes multiple simultaneous encryptions, using different implementations and keys. From a basic implementation, which is proved to be vulnerable to SCA, we obtain an implementation where the SCA applied were unsuccessful. At compiler level, we use the framework to evaluate the effect of sequences of compiler optimization passes on a software implementation. There are many optimization passes available. The optimization sequences are combinations of the available passes. The amount of sequences is extremely high. The framework includes an algorithm for the selection of interesting sequences that require detailed evaluation. As existing compiler optimizations transform the software implementation, using different optimization sequences we can automatically generate different implementations. We propose to randomly switch between the generated implementations to increase the resistance against SCA.We propose two countermeasures. The results show that, although they increase the resistance against SCA, the resulting implementations are not secure. At bit level, we propose to exploit bit level parallelism of FSR-based implementations using pseudo bitslice implementation in a wireless node processor. The bitslice implementation is automatically obtained from the Algebraic Normal Form of the algorithm. The results show a performance improvement, avoiding timing information leakage, but increasing the vulnerability against differential SCA.We provide a secure version of the algorithm by randomly discarding part of the data obtained. The overhead in performance is negligible when compared to the original implementations. To summarize, we have proposed a set of original countermeasures at different levels that introduce randomness in FSR-based algorithms avoiding a heavy overhead on the resources required.
Resumo:
A chimeric retroviral vector (33E67) containing a CD33-specific single-chain antibody was generated in an attempt to target cells displaying the CD33 surface antigen. The chimeric envelope protein was translated, processed, and incorporated into viral particles as efficiently as wild-type envelope protein. The viral particles carrying the 33E67 envelope protein could bind efficiently to the CD33 receptor on target cells and were internalized, but no gene transfer occurred. A unique experimental approach was used to examine the basis for this postbinding block. Our data indicate that the chimeric envelope protein itself cannot participate in the fusion process, the most reasonable explanation being that this chimeric protein cannot undergo the appropriate conformational change that is thought to be triggered by receptor binding, a suggested prerequisite to subsequent fusion and core entry. These results indicate that the block to gene transfer in this system, and probably in most of the current chimeric retroviral vectors to date, is the inability of the chimeric envelope protein to undergo this obligatory conformational change.
Resumo:
Calcium ion transiently blocks Na+ channels, and it shortens the time course for closing of their activation gates. We examined the relation between block and closing kinetics by using the Na+ channels natively expressed in GH3 cells, a clonal line of rat pituitary cells. To simplify analysis, inactivation of the Na+ channels was destroyed by including papain in the internal medium. All divalent cations tested, and trivalent La3+, blocked a progressively larger fraction of the channels as their concentration increased, and they accelerated the closing of the Na+ channel activation gate. For calcium, the most extensively studied cation, there is an approximately linear relation between the fraction of the channels that are calcium-blocked and the closing rate. Extrapolation of the data to very low calcium suggests that closing rate is near zero when there is no block. Analysis shows that, almost with certainty, the channels can close when occupied by calcium. The analysis further suggests that the channels close preferentially or exclusively from the calcium-blocked state.
Resumo:
Unmethylated CpG dinucleotides in particular base contexts (CpG-S motifs) are relatively common in bacterial DNA but are rare in vertebrate DNA. B cells and monocytes have the ability to detect such CpG-S motifs that trigger innate immune defenses with production of Th1-like cytokines. Despite comparable levels of unmethylated CpG dinucleotides, DNA from serotype 12 adenovirus is immune-stimulatory, but serotype 2 is nonstimulatory and can even inhibit activation by bacterial DNA. In type 12 genomes, the distribution of CpG-flanking bases is similar to that predicted by chance. However, in type 2 adenoviral DNA the immune stimulatory CpG-S motifs are outnumbered by a 15- to 30-fold excess of CpG dinucleotides in clusters of direct repeats or with a C on the 5′ side or a G on the 3′ side. Synthetic oligodeoxynucleotides containing these putative neutralizing (CpG-N) motifs block immune activation by CpG-S motifs in vitro and in vivo. Eliminating 52 of the 134 CpG-N motifs present in a DNA vaccine markedly enhanced its Th1-like function in vivo, which was increased further by the addition of CpG-S motifs. Thus, depending on the CpG motif, prokaryotic DNA can be either immune-stimulatory or neutralizing. These results have important implications for understanding microbial pathogenesis and molecular evolution and for the clinical development of DNA vaccines and gene therapy vectors.
Resumo:
In the cycling human endometrium, the expression of interstitial collagenase (MMP-1) and of several related matrix metalloproteinases (MMPs) follows the late-secretory fall in sex steroid plasma concentrations and is thought to be a critical step leading to menstruation. The rapid and extensive lysis of interstitial matrix that precedes menstrual shedding requires a strict control of these proteinases. However, the mechanism by which ovarian steroids regulate endometrial MMPs remains unclear. We report here that, in the absence of ovarian steroids, MMP-1 expression in endometrial fibroblasts is markedly stimulated by medium conditioned by endometrial epithelial cells. This stimulation can be prevented by antibodies directed against interleukin 1α (IL-1α) but not against several other cytokines. Ovarian steroids inhibit the release of IL-1α and repress MMP-1 production by IL-1α-stimulated fibroblasts. In short-term cultures of endometrial explants obtained throughout the menstrual cycle, the release of both IL-1α and MMP-1 is essentially limited to the perimenstrual phase. We conclude that epithelium-derived IL-1α is the key paracrine inducer of MMP-1 in endometrial fibroblasts. However, MMP-1 production in the human endometrium is ultimately blocked by ovarian steroids, which act both upstream and downstream of IL-1α, thereby exerting an effective control via a “double-block” mechanism.
Resumo:
The ATP-sensitive K+-channel (KATP channel) plays a key role in insulin secretion from pancreatic β cells. It is closed both by glucose metabolism and the sulfonylurea drugs that are used in the treatment of noninsulin-dependent diabetes mellitus, thereby initiating a membrane depolarization that activates voltage-dependent Ca2+ entry and insulin release. The β cell KATP channel is a complex of two proteins: Kir6.2 and SUR1. The former is an ATP-sensitive K+-selective pore, whereas SUR1 is a channel regulator that endows Kir6.2 with sensitivity to sulfonylureas. A number of drugs containing an imidazoline moiety, such as phentolamine, also act as potent stimulators of insulin secretion, but their mechanism of action is unknown. We have used a truncated form of Kir6.2, which expresses independently of SUR1, to show that phentolamine does not inhibit KATP channels by interacting with SUR1. Instead, our results argue that phentolamine may interact directly with Kir6.2 to produce a voltage-independent reduction in channel activity. The single-channel conductance is unaffected. Although the ATP molecule also contains an imidazoline group, the site at which phentolamine blocks is not identical to the ATP-inhibitory site, because phentolamine block of an ATP-insensitive mutant (K185Q) is normal. KATP channels also are found in the heart where they are involved in the response to cardiac ischemia: they also are blocked by phentolamine. Our results suggest that this may be because Kir6.2, which is expressed in the heart, forms the pore of the cardiac KATP channel.
Resumo:
Solar UV irradiation is the causal factor for the increasing incidence of human skin carcinomas. The activation of the transcription factor activator protein-1 (AP-1) has been shown to be responsible for the tumor promoter action of UV light in mammalian cells. We demonstrate that proteinase inhibitor I (Inh I) and II (Inh II) from potato tubers, when applied to mouse epidermal JB6 cells, block UV-induced AP-1 activation. The inhibition appears to be specific for UV-induced signal transduction for AP-1 activation, because these inhibitors did not block UV-induced p53 activation nor did they exhibit any significant influence on epidermal growth factor-induced AP-1 transactivation. Furthermore, the inhibition of UV-induced AP-1 activity occurs through a pathway that is independent of extracellular signal-regulated kinases and c-Jun N-terminal kinases as well as P38 kinases. Considering the important role of AP-1 in tumor promotion, it is possible that blocking UV-induced AP-1 activity by Inh I or Inh II may be functionally linked to irradiation-induced cell transformation.
Resumo:
The role of channel inactivation in the molecular mechanism of calcium (Ca2+) channel block by phenylalkylamines (PAA) was analyzed by designing mutant Ca2+ channels that carry the high affinity determinants of the PAA receptor site [Hockerman, G. H., Johnson, B. D., Scheuer, T., and Catterall, W. A. (1995) J. Biol. Chem. 270, 22119–22122] but inactivate at different rates. Use-dependent block by PAAs was studied after expressing the mutant Ca2+ channels in Xenopus oocytes. Substitution of single putative pore-orientated amino acids in segment IIIS6 by alanine (F-1499-A, F-1500-A, F-1510-A, I-1514-A, and F-1515-A) gradually slowed channel inactivation and simultaneously reduced inhibition of barium currents (IBa) by (−)D600 upon depolarization by 100 ms steps at 0.1 Hz. This apparent reduction in drug sensitivity was only evident if test pulses were applied at a low frequency of 0.1 Hz and almost disappeared at the frequency of 1 Hz. (−)D600 slowed IBa recovery after maintained membrane depolarization (1–3 sec) to a comparable extent in all channel constructs. A drug-induced delay in the onset of IBa recovery from inactivation suggests that PAAs promote the transition to a deep inactivated channel conformation. These findings indicate that apparent PAA sensitivity of Ca2+ channels is not only defined by drug interaction with its receptor site but also crucially dependent on intrinsic gating properties of the channel molecule. A molecular model for PAA-Ca2+ channel interaction that accounts for the relationship between drug induced inactivation and channel block by PAA is proposed.
Resumo:
Block of the channel of N-methyl-d-aspartate (NMDA) receptors by external Mg2+ (Mgo2+) has broad implications for the many physiological and pathological processes that depend on NMDA receptor activation. An essential property of channel block by Mgo2+ is its powerful voltage dependence. A widely cited explanation for the strength of the voltage dependence of block is that the Mgo2+-binding site is located deep in the channel of NMDA receptors; Mgo2+ then would sense most of the membrane potential field during block. However, recent electrophysiological and mutagenesis studies suggest that the blocking site cannot be deep enough to account for the voltage dependence of Mgo2+ block. Here we describe the basis for this discrepancy: the magnitude and voltage dependence of channel block by Mgo2+ are strongly regulated by external and internal permeant monovalent cations. Our data support a model in which access to the channel by Mgo2+ is prevented when permeant ion-binding sites at the external entrance to the channel are occupied. Mgo2+ can block the channel only when the permeant ion-binding sites are unoccupied and then can either unblock back to the external solution or permeate the channel. Unblock to the external solution is prevented if external permeant ions bind while Mg2+ blocks the channel, although permeation is still permitted. The model provides an explanation for the strength of the voltage dependence of Mgo2+ block and quantifies the interdependence of permanent and blocking ion binding to NMDA receptors.
Resumo:
Electrophysiological, morphological, and biochemical approaches were combined to study the effect of the presynaptic injection of the light chain of botulinum toxin C1 into the squid giant synapse. Presynaptic injection was accompanied by synaptic block that occurred progressively as the toxin filled the presynaptic terminal. Neither the presynaptic action potential nor the Ca2+ currents in the presynaptic terminal were affected by the toxin. Biochemical analysis of syntaxin moiety in squid indicates that the light chain of botulinum toxin C1 lyses syntaxin in vitro, suggesting that this was the mechanism responsible for synaptic block. Ultrastructure of the injected synapses demonstrates an enormous increase in the number of presynaptic vesicles, suggesting that the release rather than the docking of vesicles is affected by biochemical lysing of the syntaxin molecule.