830 resultados para Password-based key derivation
Resumo:
User authentication is essential for accessing computing resources, network resources, email accounts, online portals etc. To authenticate a user, system stores user credentials (user id and password pair) in system. It has been an interested field problem to discover user password from a system and similarly protecting them against any such possible attack. In this work we show that passwords are still vulnerable to hash chain based and efficient dictionary attacks. Human generated passwords use some identifiable patterns. We have analysed a sample of 19 million passwords, of different lengths, available online and studied the distribution of the symbols in the password strings. We show that the distribution of symbols in user passwords is affected by the native language of the user. From symbol distributions we can build smart and efficient dictionaries, which are smaller in size and their coverage of plausible passwords from Key-space is large. These smart dictionaries make dictionary based attacks practical.
Resumo:
Larval and juvenile rockfishes (Sebastes spp.) are difficult to identify using morphological characters. We developed a key based on sizes of restriction endonuclease fragments of the NADH dehydrogenase-3 and -4 (ND3/ND4) and 12S and 16S ribosomal RNA (12S/16S) mitochondrial regions. The key makes use of variation in the ND3/ND4 region. Restriction endonuclease Dde I variation can corroborate identifications, as can 12S/16S variation. The key, based on 71 species, includes most North American taxa, several Asian species, and Sebastolobus alascanus and Helicolenus hilgendorfi that are closely related to rockfishes. Fifty-eight of 71 rockfish species in our database can be distinguished unequivocally, using one to five restriction enzymes; identities of the remaining species are narrowed to small groups: 1) S. polyspinis, S. crameri, and S. ciliatus or variabilis (the two species could not be distinguished and were considered as a single species) ; 2) S. chlorostictus, S. eos, and S. rosenblatti; 3) S. entomelas and S. mystinus; 4)S. emphaeus, S. variegatus, and S. wilsoni; and 5) S. carnatus and S. chrysomelas.
Resumo:
In this article we call for a new approach to patient safety improvement, one based on the emerging field of evidence-based healthcare risk management (EBHRM). We explore EBHRM in the broader context of the evidence-based healthcare movement, assess the benefits and challenges that might arise in adopting an evidence-based approach, and make recommendations for meeting those challenges and realizing the benefits of a more scientific approach.
Resumo:
Password authentication has been adopted as one of the most commonly used solutions in network environment to protect resources from unauthorized access. Recently, Lee–Kim–Yoo [S.W. Lee, H.S. Kim, K.Y. Yoo, Improvement of Chien et al.'s remote user authentication scheme using smart cards, Computer Standards & Interfaces 27 (2) (2005) 181–183] and Lee-Chiu [N.Y. Lee, Y.C. Chiu, Improved remote authentication scheme with smart card, Computer Standards & Interfaces 27 (2) (2005) 177–180] respectively proposed a smart card based password authentication scheme. We show that these two schemes are both subject to forgery attacks provided that the information stored in the smart card is disclosed by the adversary. We also propose an improved scheme with formal security proof.
Resumo:
It is anticipated that constrained devices in the Internet of Things (IoT) will often operate in groups to achieve collective monitoring or management tasks. For sensitive and mission-critical sensing tasks, securing multicast applications is therefore highly desirable. To secure group communications, several group key management protocols have been introduced. However, the majority of the proposed solutions are not adapted to the IoT and its strong processing, storage, and energy constraints. In this context, we introduce a novel decentralized and batch-based group key management protocol to secure multicast communications. Our protocol is simple and it reduces the rekeying overhead triggered by membership changes in dynamic and mobile groups and guarantees both backward and forward secrecy. To assess our protocol, we conduct a detailed analysis with respect to its communcation and storage costs. This analysis is validated through simulation to highlight energy gains. The obtained results show that our protocol outperforms its peers with respect to keying overhead and the mobility of members.
Resumo:
Along with the growing demand for cryptosystems in systems ranging from large servers to mobile devices, suitable cryptogrophic protocols for use under certain constraints are becoming more and more important. Constraints such as calculation time, area, efficiency and security, must be considered by the designer. Elliptic curves, since their introduction to public key cryptography in 1985 have challenged established public key and signature generation schemes such as RSA, offering more security per bit. Amongst Elliptic curve based systems, pairing based cryptographies are thoroughly researched and can be used in many public key protocols such as identity based schemes. For hardware implementions of pairing based protocols, all components which calculate operations over Elliptic curves can be considered. Designers of the pairing algorithms must choose calculation blocks and arrange the basic operations carefully so that the implementation can meet the constraints of time and hardware resource area. This thesis deals with different hardware architectures to accelerate the pairing based cryptosystems in the field of characteristic two. Using different top-level architectures the hardware efficiency of operations that run at different times is first considered in this thesis. Security is another important aspect of pairing based cryptography to be considered in practically Side Channel Analysis (SCA) attacks. The naively implemented hardware accelerators for pairing based cryptographies can be vulnerable when taking the physical analysis attacks into consideration. This thesis considered the weaknesses in pairing based public key cryptography and addresses the particular calculations in the systems that are insecure. In this case, countermeasures should be applied to protect the weak link of the implementation to improve and perfect the pairing based algorithms. Some important rules that the designers must obey to improve the security of the cryptosystems are proposed. According to these rules, three countermeasures that protect the pairing based cryptosystems against SCA attacks are applied. The implementations of the countermeasures are presented and their performances are investigated.
Resumo:
The genus Bursaphelenchus includes B. xylophilus (Steiner et Buhrer, 1934) Nickle, 1981, which is of world economic and quarantine importance. Distinction among several species of the pinewood nematodes species complex (PWNSC) is often difficult. Besides standard morphology, morphometrics and molecular biology, new tools are welcome to better understand this group. The computerized (or e-) key of this genus, presented in this communication, includes 74 species (complete list of valid species of the world fauna) and 35 characters, that were used by the taxonomic experts of this group, in the original descriptions. Morphology of sex organs (male spicules and female vulval region) was digitized and classified to distinguish alternative types. Several qualitative characters with overlapping character states (expressions) were transformed into the morphometric indices with the discontinuous ranges (characters of ratios of the spicule dimensions). Characters and their states (expressions) were illustrated in detail and supplied by brief user-friendly comments. E-key was created in the BIKEY identification system (Dianov & Lobanov, 1996-2004). The system has built-algorithm ranging characters depending on their diagnostic values at each step of identification. Matrix of species and the character states (structural part of the e-key database) may be easily transformed using statistical packages into the dendrograms of general phenetic similarities (UPGMA, standard distance: mean character difference). It may be useful in the detailed analysis of taxonomy and evolution of the genus and in its splitting to the species groups based on morphology. The verification of the dendrogram using the information on the species links with insect vectors and their associated plants, provided an opportunity to recognize the five clusters (xylophilus, hunti, eremus sensu stricto, tusciae and piniperdae sensu stricto), which seem to be the natural species groups. The hypothesis about the origin and the first stages of the genus evolution is proposed. A general review of the genus Bursaphelenchus is presented.
Resumo:
Induced pluripotent stem cells (iPSc) have great potential for applications in regenerative medicine, disease modeling and basic research. Several methods have been developed for their derivation. The original method of Takahashi and Yamanaka involved the use of retroviral vectors which result in insertional mutagenesis, presence in the genome of potential oncogenes and effects of residual transgene expression on differentiation bias of each particular iPSc line. Other methods have been developed, using different viral vectors (adenovirus and Sendai virus), transient plasmid transfection, mRNA transduction, protein transduction and use of small molecules. However, these methods suffer from low efficiencies; can be extremely labor intensive, or both. An additional method makes use of the piggybac transposon, which has the advantage of inserting its payload into the host genome and being perfectly excised upon re-expression of the transposon transposase. Briefly, a policistronic cassette expressing Oct4, Sox2, Klf4 and C-Myc flanked by piggybac terminal repeats is delivered to the cells along with a plasmid transiently expressing piggybac transposase. Once reprogramming occurs, the cells are re-transfected with transposase and subclones free of tranposon integrations screened for. The procedure is therefore very labor intensive, requiring multiple manipulations and successive rounds of cloning and screening. The original method for reprogramming with the the PiggyBac transposon was created by Woltjen et al in 2009 (schematized here) and describes a process with which it is possible to obtain insert-free iPSc. Insert-free iPSc enables the establishment of better cellular models of iPS and adds a new level of security to the use of these cells in regenerative medicine. Due to the fact that it was based on several low efficiency steps, the overall efficiency of the method is very low (<1%). Moreover, the stochastic transfection, integration, excision and the inexistence of an active way of selection leaves this method in need of extensive characterization and screening of the final clones. In this work we aime to develop a non-integrative iPSc derivation system in which integration and excision of the transgenes can be controlled by simple media manipulations, avoiding labor intensive and potentially mutagenic procedures. To reach our goal we developed a two vector system which is simultaneously delivered to original population of fibroblasts. The first vector, Remo I, carries the reprogramming cassette and GFP under the regulation of a constitutive promoter (CAG). The second vector, Eneas, carries the piggybac transposase associated with an estrogen receptor fragment (ERT2), regulated in a TET-OFF fashion, and its equivalent reverse trans-activator associated with a positive-negative selection cassette under a constitutive promoter. We tested its functionality in HEK 293T cells. The protocol is divided in two the following steps: 1) Obtaining acceptable transfection efficiency into human fibroblasts. 2) Testing the functionality of the construct 3) Determining the ideal concentration of DOX for repressing mPB-ERT2 expression 4) Determining the ideal concentration of TM for transposition into the genome 5) Determining the ideal Windows of no DOX/TM pulse for transposition into the genome 6) 3, 4 and 5) for transposition out of the genome 7) Determination of the ideal concentration of GCV for negative selection We successfully demonstrated that ENEAS behaved as expected in terms of DOX regulation of the expression of mPB-ERT2. We also demonstrated that by delivering the plasmid into 293T HEK cells and manipulating the levels of DOX and TM in the medium, we could obtain puromycin resistant lines. The number of puromycin resistant colonies obtained was significantly higher when DOX as absent, suggesting that the colonies resulted from transposition events. Presence of TM added an extra layer of regulation, albeit weaker. Our PCR analysis, while not a clean as would be desired, suggested that transposition was indeed occurring, although a background level of random integration could not be ruled out. Finally, our attempt to determine whether we could use GVC to select clones that had successfully mobilized PB out of the genome was unsuccessful. Unexpectedly, 293T HEK cells that had been transfected with ENEAS and selected for puromycin resistance were insensitive to GCV.