992 resultados para Pairing-based cryptography


Relevância:

30.00% 30.00%

Publicador:

Resumo:

A chaotic encryption algorithm is proposed based on the "Life-like" cellular automata (CA), which acts as a pseudo-random generator (PRNG). The paper main focus is to use chaos theory to cryptography. Thus, CA was explored to look for this "chaos" property. This way, the manuscript is more concerning on tests like: Lyapunov exponent, Entropy and Hamming distance to measure the chaos in CA, as well as statistic analysis like DIEHARD and ENT suites. Our results achieved higher randomness quality than others ciphers in literature. These results reinforce the supposition of a strong relationship between chaos and the randomness quality. Thus, the "chaos" property of CA is a good reason to be employed in cryptography, furthermore, for its simplicity, low cost of implementation and respectable encryption power. (C) 2012 Elsevier Ltd. All rights reserved.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this work, new promising proton conducting fuel cell membrane materials were characterized in terms of their structure and dynamic properties using solid-state nuclear magnetic resonance (NMR) spectroscopy and X-ray diffraction. Structurally different, phosphonic acid (PA) containing materials were systematically evaluated for possible high-temperature operation (e.g. at T>100°C). Notably, 1H, 2H and 31P magic angle spinning (MAS) NMR provided insight into local connectivities and dynamics of the hydrogen bonded network, while packing arrangements were identified by means of heteronuclear dipolar recoupling techniques.rnThe first part of this work introduced rather crystalline, low molecular weight ionomers for proton conducting membranes, where six different geometries such as line, triangle, screw, tetrahedron, square and hexagon, were investigated. The hexagon was identified as the most promising geometry with high-temperature bulk proton conductivities in the range of 10-3 Scm-1 at a relative humidity of 50%. However, 2H NMR and TGA-MS data suggest that the bulk proton transport is mainly due to the presence of crystal water. Single crystal X-ray data revealed that in the tetrahedron phosphonic acids form tetrameric clusters isolating the mobile protons while the phosphonic acids in the hexagon form zigzag-type pathways through the sample.rnThe second part of this work demonstrates how acid-base pairing and the choice of appropriate spacers may influence proton conduction. Different ratios of statistical copolymers of poly (vinylphosphonic acid) and poly (4-vinylpyridine) were measured to derive information about the local structure and chemical changes. Though anhydrous proton conductivities of all statistical copolymers are rather poor, the conductivity increases to 10-2 S cm-1 when exposing the sample to relative humidity of 80%. In contrast to PVPA, anhydride formation of phosphonic acids in the copolymer is not reversible even when exposing the sample to a relative humidity of 100%.rnIn addition, the influence of both spacers and degree of backbone crystallinity on bulk proton conductivity was investigated. Unlike in systems such as poly benzimidazole (PBI), spacers were inserted between the protogenic groups along the backbone. It was found that dilution of the protogenic groups decreases the conductivity, but compared to PVPA, similar apparent activation energies for local motions were obtained from both variable temperature 1H NMR and impedance spectroscopy data. These observations suggest the formation of phosphonic acid clusters with high degrees of local proton motion, where only a fraction of motions contribute to the observable bulk proton conductivity. Additionally, it was shown that gradual changes of the spacer length lead to different morphologies.rnIn summary, applying advanced solid-state NMR and X-ray analysis, structural and dynamic phenomena in proton conducting materials were identified on a molecular level. The results were discussed with respect to different proton conduction mechanisms and may contribute to a more rational design or improvement of proton conducting membranes.rn

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Three fundamental types of suppressor additives for copper electroplating could be identified by means of potential Transient measurements. These suppressor additives differ in their synergistic and antagonistic interplay with anions that are chemisorbed on the metallic copper surface during electrodeposition. In addition these suppressor chemistries reveal different barrier properties with respect to cupric ions and plating additives (Cl, SPS). While the type-I suppressor selectively forms efficient barriers for copper inter-diffusion on chloride-terminated electrode surfaces we identified a type-II suppressor that interacts non-selectively with any kind of anions chemisorbed on copper (chloride, sulfate, sulfonate). Type-I suppressors are vital for the superconformal copper growth mode in Damascene processing and show an antagonistic interaction with SPS (Bis-Sodium-Sulfopropyl-Disulfide) which involves the deactivation of this suppressor chemistry. This suppressor deactivation is rationalized in terms of compositional changes in the layer of the chemisorbed anions due to the competition of chloride and MPS (Mercaptopropane Sulfonic Acid) for adsorption sites on the metallic copper surface. MPS is the product of the dissociative SPS adsorption within the preexisting chloride matrix on the copper surface. The non-selectivity in the adsorption behavior of the type-II suppressor is rationalized in terms of anion/cation pairing effects of the poly-cationic suppressor and the anion-modified copper substrate. Atomic-scale insights into the competitive Cl/MPS adsorption are gained from in situ STM (Scanning Tunneling Microscopy) using single crystalline copper surfaces as model substrates. Type-III suppressors are a third class of suppressors. In case of type-land type-II suppressor chemistries the resulting steady-state deposition conditions are completely independent on the particular succession of additive adsorption. In contrast to that a strong dependence of the suppressing capabilities on the sequence of additive adsorption ("first comes, first serves" principle) is observed for the type-IIIsuppressor. This behavior:is explained by a suppressor barrier that impedes not only the copper inter-diffusion but also the transport of other additives (e.g. SPS) to the copper surface. (C) 2011 Elsevier Ltd. All rights reserved.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Three-dimensional flow visualization plays an essential role in many areas of science and engineering, such as aero- and hydro-dynamical systems which dominate various physical and natural phenomena. For popular methods such as the streamline visualization to be effective, they should capture the underlying flow features while facilitating user observation and understanding of the flow field in a clear manner. My research mainly focuses on the analysis and visualization of flow fields using various techniques, e.g. information-theoretic techniques and graph-based representations. Since the streamline visualization is a popular technique in flow field visualization, how to select good streamlines to capture flow patterns and how to pick good viewpoints to observe flow fields become critical. We treat streamline selection and viewpoint selection as symmetric problems and solve them simultaneously using the dual information channel [81]. To the best of my knowledge, this is the first attempt in flow visualization to combine these two selection problems in a unified approach. This work selects streamline in a view-independent manner and the selected streamlines will not change for all viewpoints. My another work [56] uses an information-theoretic approach to evaluate the importance of each streamline under various sample viewpoints and presents a solution for view-dependent streamline selection that guarantees coherent streamline update when the view changes gradually. When projecting 3D streamlines to 2D images for viewing, occlusion and clutter become inevitable. To address this challenge, we design FlowGraph [57, 58], a novel compound graph representation that organizes field line clusters and spatiotemporal regions hierarchically for occlusion-free and controllable visual exploration. We enable observation and exploration of the relationships among field line clusters, spatiotemporal regions and their interconnection in the transformed space. Most viewpoint selection methods only consider the external viewpoints outside of the flow field. This will not convey a clear observation when the flow field is clutter on the boundary side. Therefore, we propose a new way to explore flow fields by selecting several internal viewpoints around the flow features inside of the flow field and then generating a B-Spline curve path traversing these viewpoints to provide users with closeup views of the flow field for detailed observation of hidden or occluded internal flow features [54]. This work is also extended to deal with unsteady flow fields. Besides flow field visualization, some other topics relevant to visualization also attract my attention. In iGraph [31], we leverage a distributed system along with a tiled display wall to provide users with high-resolution visual analytics of big image and text collections in real time. Developing pedagogical visualization tools forms my other research focus. Since most cryptography algorithms use sophisticated mathematics, it is difficult for beginners to understand both what the algorithm does and how the algorithm does that. Therefore, we develop a set of visualization tools to provide users with an intuitive way to learn and understand these algorithms.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We have developed an assay for single strand DNA or RNA detection which is based on the homo-DNA templated Staudinger reduction of the profluorophore rhodamine-azide. The assay is based on a three component system, consisting of a homo-DNA/DNA hybrid probe, a set of homo-DNA reporter strands and the target DNA or RNA. We present two different formats of the assay (Omega probe and linear probe) in which the linear probe was found to perform best with catalytic turnover of the reporter strands (TON: 8) and a match/mismatch discrimination of up to 19. The advantage of this system is that the reporting (homo-DNA) and sensing (DNA) domain are decoupled from each other since the two pairing systems are bioorthogonal. This allows independent optimization of either domain which may lead to higher selectivity in in vivo imaging.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The design, synthesis and base-pairing properties of bicyclo[3.2.1]amide-(bca)DNA, a novel phosphodiester based DNA analogue, is reported. This analogue consists of a conformationally constrained backbone entity which emulates a B-DNA geometry, to which the nucleobases were attached via an extended, acyclic amide linker. Homobasic adenine-containing bca-decamers form duplexes with complementary oligonucleotides containing the bca-, the DNA the RNA and, surprisingly, also the L-RNA backbone. UV- and CD-spectroscopic investigations revealed the duplexes with D- or L-complement to be of similar stability and enantiomorphic in structure. Bca-oligonucleotides containing all four bases form strictly antiparallel, left-handed complementary duplexes with itself and complementary DNA but not with RNA. Base-mismatch discrimination is comparable to that of DNA while the overall thermal stabilities of bca-oligonucleotide duplexes are inferior relative to that of DNA or RNA. A detailed molecular modeling study of left- and right-handed bca-DNA containing duplexes showed only minor changes in the backbone structure and revealed a structural switch around the base-linker unit to be responsible for the generation of enantiomorphic duplex structures. The obtained data are discussed with respect to the structural and energetic role of the ribofuranose entities in DNA and RNA association

Relevância:

30.00% 30.00%

Publicador:

Resumo:

10.1002/hlca.19950780816.abs A conformational analysis of the (3′S,5′R)-2′-deoxy-3′,5′-ethano-α-D-ribonucleosides (a-D-bicyclodeoxynucleosides) based on the X-ray analysis of N4-benzoyl-α-D-(bicyclodeoxycytidine) 6 and on 1H-NMR analysis of the α-D-bicyclodeoxynucleoside derivatives 1-7 reveals a rigid sugar structure with the furanose units in the l′-exo/2′-endo conformation and the secondary OH groups on the carbocyclic ring in the pseudoequatorial orientation. Oligonucleotides consisting of α-D-bicyclothymidine and α-D-bicyclodeoxyadenosine were successfully synthesized from the corresponding nucleosides by phosphoramidite methodology on a DNA synthesizer. An evaluation of their pairing properties with complementary natural RNA and DNA by means of UV/melting curves and CD spectroscopy show the following characteristics: i) α-bcd(A10) and α-bcd(T10) (α = short form of α-D)efficiently form complexes with complementary natural DNA and RNA. The stability of these hybrids is comparable or slightly lower as those with natural β-d(A10) or β-d(T10)( β = short form ofβ-D). ii) The strand orientation in α-bicyclo-DNA/β-DNA duplexes is parallel as was deduced from UV/melting curves of decamers with nonsymmetric base sequences. iii) CD Spectroscopy shows significant structural differences between α-bicyclo-DNA/β-DNA duplexes compared to α-DNA/β-DNA duplexes. Furthermore, α-bicyclo-DNA is ca. 100-fold more resistant to the enzyme snake-venom phosphodiesterase with respect to β-DNA and about equally resistant as α-DNA.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

One of the main obstacles to the widespread adoption of quantum cryptography has been the difficulty of integration into standard optical networks, largely due to the tremendous difference in power of classical signals compared with the single quantum used for quantum key distribution. This makes the technology expensive and hard to deploy. In this letter, we show an easy and straightforward integration method of quantum cryptography into optical access networks. In particular, we analyze how a quantum key distribution system can be seamlessly integrated in a standard access network based on the passive optical and time division multiplexing paradigms. The novelty of this proposal is based on the selective post-processing that allows for the distillation of secret keys avoiding the noise produced by other network users. Importantly, the proposal does not require the modification of the quantum or classical hardware specifications neither the use of any synchronization mechanism between the network and quantum cryptography devices.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The postprocessing or secret-key distillation process in quantum key distribution (QKD) mainly involves two well-known procedures: information reconciliation and privacy amplification. Information or key reconciliation has been customarily studied in terms of efficiency. During this, some information needs to be disclosed for reconciling discrepancies in the exchanged keys. The leakage of information is lower bounded by a theoretical limit, and is usually parameterized by the reconciliation efficiency (or inefficiency), i.e. the ratio of additional information disclosed over the Shannon limit. Most techniques for reconciling errors in QKD try to optimize this parameter. For instance, the well-known Cascade (probably the most widely used procedure for reconciling errors in QKD) was recently shown to have an average efficiency of 1.05 at the cost of a high interactivity (number of exchanged messages). Modern coding techniques, such as rate-adaptive low-density parity-check (LDPC) codes were also shown to achieve similar efficiency values exchanging only one message, or even better values with few interactivity and shorter block-length codes.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We study how to use quantum key distribution (QKD) in common optical network infrastructures and propose a method to overcome its distance limitations. QKD is the first technology offering information theoretic secret-key distribution that relies only on the fundamental principles of quantum physics. Point-to-point QKD devices have reached a mature industrial state; however, these devices are severely limited in distance, since signals at the quantum level (e.g. single photons) are highly affected by the losses in the communication channel and intermediate devices. To overcome this limitation, intermediate nodes (i.e. repeaters) are used. Both, quantum-regime and trusted, classical, repeaters have been proposed in the QKD literature, but only the latter can be implemented in practice. As a novelty, we propose here a new QKD network model based on the use of not fully trusted intermediate nodes, referred as weakly trusted repeaters. This approach forces the attacker to simultaneously break several paths to get access to the exchanged key, thus improving significantly the security of the network. We formalize the model using network codes and provide real scenarios that allow users to exchange secure keys over metropolitan optical networks using only passive components.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

RecA is a 38-kDa protein from Escherichia coli that polymerizes on single-stranded DNA, forming a nucleoprotein filament that pairs with homologous duplex DNA and carries out strand exchange in vitro. To observe the effects of mismatches on the kinetics of the RecA-catalyzed recombination reaction, we used assays based upon fluorescence energy transfer that can differentiate between the pairing and strand displacement phases. Oligonucleotide sequences that produced 2–14% mismatches in the heteroduplex product of strand exchange were tested, as well as completely homologous and heterologous sequences. The equilibrium constant for pairing decreased as the number of mismatches increased, which appeared to result from both a decrease in the rate of formation and an increase in the rate of dissociation of the intermediates. In addition, the rate of strand displacement decreased with increasing numbers of mismatches, roughly in proportion to the number of mismatches. The equilibrium constant for pairing and the rate constant for strand displacement both decreased 6-fold as the heterology increased to 14%. These results suggest that discrimination of homology from heterology occurs during both pairing and strand exchange.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We propose a public key cryptosystem based on block upper triangular matrices. This system is a variant of the Discrete Logarithm Problem with elements in a finite group, capable of increasing the difficulty of the problem while maintaining the key size. We also propose a key exchange protocol that guarantees that both parties share a secret element of this group and a digital signature scheme that provides data authenticity and integrity.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Pseudorandom generators are a basic foundation of many cryptographic services and information security protocols. We propose a modification of a previously published matricial pseudorandom generator that significantly improves performance and security. The resulting generator is successfully compared to world class standards.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

To provide more efficient and flexible alternatives for the applications of secret sharing schemes, this paper describes a threshold sharing scheme based on exponentiation of matrices in Galois fields. A significant characteristic of the proposed scheme is that each participant has to keep only one master secret share which can be used to reconstruct different group secrets according to the number of threshold values.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

It is technically feasible for mobile social software such as pairing or ‘matchmaking’ systems to introduce people to others and assist information exchange. However, little is known about the social structure of many mobile communities or why they would want such pairing systems. While engaged in other work determining requirements for a mobile travel assistant we saw a potentially useful application for a pairing system to facilitate the exchange of travel information between backpackers. To explore this area, we designed two studies involving usage of a low-fidelity role prototype of a social pairing system for backpackers. Backpackers rated the utility of different pairing types, and provided feedback on the social implications of being paired based on travel histories. Practical usage of the social network pairing activity and the implications of broader societal usage are discussed.