685 resultados para broadcast encryption
Resumo:
Transmitting sensitive data over non-secret channels has always required encryption technologies to ensure that the data arrives without exposure to eavesdroppers. The Internet has made it possible to transmit vast volumes of data more rapidly and cheaply and to a wider audience than ever before. At the same time, strong encryption makes it possible to send data securely, to digitally sign it, to prove it was sent or received, and to guarantee its integrity. The Internet and encryption make bulk transmission of data a commercially viable proposition. However, there are implementation challenges to solve before commercial bulk transmission becomes mainstream. Powerful have a performance cost, and may affect quality of service. Without encryption, intercepted data may be illicitly duplicated and re-sold, or its commercial value diminished because its secrecy is lost. Performance degradation and potential for commercial loss discourage the bulk transmission of data over the Internet in any commercial application. This paper outlines technical solutions to these problems. We develop new technologies and combine existing ones in new and powerful ways to minimise commercial loss without compromising performance or inflating overheads.
Resumo:
Secure transmission of bulk data is of interest to many content providers. A commercially-viable distribution of content requires technology to prevent unauthorised access. Encryption tools are powerful, but have a performance cost. Without encryption, intercepted data may be illicitly duplicated and re-sold, or its commercial value diminished because its secrecy is lost. Two technical solutions make it possible to perform bulk transmissions while retaining security without too high a performance overhead. These are: 1. a) hierarchical encryption - the stronger the encryption, the harder it is to break but also the more computationally expensive it is. A hierarchical approach to key exchange means that simple and relatively weak encryption and keys are used to encrypt small chunks of data, for example 10 seconds of video. Each chunk has its own key. New keys for this bottom-level encryption are exchanged using a slightly stronger encryption, for example a whole-video key could govern the exchange of the 10-second chunk keys. At a higher level again, there could be daily or weekly keys, securing the exchange of whole-video keys, and at a yet higher level, a subscriber key could govern the exchange of weekly keys. At higher levels, the encryption becomes stronger but is used less frequently, so that the overall computational cost is minimal. The main observation is that the value of each encrypted item determines the strength of the key used to secure it. 2. b) non-symbolic fragmentation with signal diversity - communications are usually assumed to be sent over a single communications medium, and the data to have been encrypted and/or partitioned in whole-symbol packets. Network and path diversity break up a file or data stream into fragments which are then sent over many different channels, either in the same network or different networks. For example, a message could be transmitted partly over the phone network and partly via satellite. While TCP/IP does a similar thing in sending different packets over different paths, this is done for load-balancing purposes and is invisible to the end application. Network and path diversity deliberately introduce the same principle as a secure communications mechanism - an eavesdropper would need to intercept not just one transmission path but all paths used. Non-symbolic fragmentation of data is also introduced to further confuse any intercepted stream of data. This involves breaking up data into bit strings which are subsequently disordered prior to transmission. Even if all transmissions were intercepted, the cryptanalyst still needs to determine fragment boundaries and correctly order them. These two solutions depart from the usual idea of data encryption. Hierarchical encryption is an extension of the combined encryption of systems such as PGP but with the distinction that the strength of encryption at each level is determined by the "value" of the data being transmitted. Non- symbolic fragmentation suppresses or destroys bit patterns in the transmitted data in what is essentially a bit-level transposition cipher but with unpredictable irregularly-sized fragments. Both technologies have applications outside the commercial and can be used in conjunction with other forms of encryption, being functionally orthogonal.
Resumo:
Homomorphic encryption is a particular type of encryption method that enables computing over encrypted data. This has a wide range of real world ramifications such as being able to blindly compute a search result sent to a remote server without revealing its content. In the first part of this thesis, we discuss how database search queries can be made secure using a homomorphic encryption scheme based on the ideas of Gahi et al. Gahi’s method is based on the integer-based fully homomorphic encryption scheme proposed by Dijk et al. We propose a new database search scheme called the Homomorphic Query Processing Scheme, which can be used with the ring-based fully homomorphic encryption scheme proposed by Braserski. In the second part of this thesis, we discuss the cybersecurity of the smart electric grid. Specifically, we use the Homomorphic Query Processing scheme to construct a keyword search technique in the smart grid. Our work is based on the Public Key Encryption with Keyword Search (PEKS) method introduced by Boneh et al. and a Multi-Key Homomorphic Encryption scheme proposed by L´opez-Alt et al. A summary of the results of this thesis (specifically the Homomorphic Query Processing Scheme) is published at the 14th Canadian Workshop on Information Theory (CWIT).
Resumo:
Universidade Estadual de Campinas . Faculdade de Educação Física
Resumo:
During the first half of 2006 the city of Sao Paulo suffered three series of violent attacks against the security forces, civilians, and the government. The violent campaign also included a massive rebellion in prisons and culminated in the kidnapping of a journalist and the broadcast of a manifesto from the criminal organization PCC threatening the police and the government. Right after, the main device used to contain organized crime in the prisons was declared unconstitutional. This episode represents a prototypical example of the use of media-focused terrorism by organized crime for projection into the political communication arena.
Resumo:
This paper presents a novel algorithm to successfully achieve viable integrity and authenticity addition and verification of n-frame DICOM medical images using cryptographic mechanisms. The aim of this work is the enhancement of DICOM security measures, especially for multiframe images. Current approaches have limitations that should be properly addressed for improved security. The algorithm proposed in this work uses data encryption to provide integrity and authenticity, along with digital signature. Relevant header data and digital signature are used as inputs to cipher the image. Therefore, one can only retrieve the original data if and only if the images and the inputs are correct. The encryption process itself is a cascading scheme, where a frame is ciphered with data related to the previous frames, generating also additional data on image integrity and authenticity. Decryption is similar to encryption, featuring also the standard security verification of the image. The implementation was done in JAVA, and a performance evaluation was carried out comparing the speed of the algorithm with other existing approaches. The evaluation showed a good performance of the algorithm, which is an encouraging result to use it in a real environment.
Resumo:
No-till (NT) system with crop rotation is one of the most effective strategies to improve agricultural sustainability in tropical and subtropical regions. To control soil acidity in NT, lime is broadcast on the surface without incorporation. The increase in soil pH due to surface liming may decrease zinc (Zn) availability and its uptake by crops. A field experiment was performed in Parana State, Brazil, on a loamy, kaolinitic, thermic Typic Hapludox to evaluate Zn bioavailability in a NT system after surface liming and re-liming. Dolomitic lime was surface applied on the main plots in July 1993 at the rates of 0, 2, 4, and 6 Mg ha-1. In June 2000, the main plots were divided in two subplots to study of the effect of surface re-liming at the rates of 0 and 3 Mg ha-1. The cropping sequence was soybean [Glycine max (L.) Merrill] (2001-2 and 2002-3), wheat (Triticum aestivum L.) (2003), soybean (2003-4), corn (Zea mays L.) (2004-5), and soybean (2005-6). Soil samples were collected at the following depths: 0-0.05, 0.05-0.10, and 0.10-0.20m, 10 years after surface liming and 3 years after surface re-liming. Soil Zn levels were extracted by four extractants: (i) 0.005molL-1 diethylenetriaminepentaacetic acid (DTPA) + 0.1molL-1 triethanolamine (TEA) + 0.01molL-1 calcium chloride (CaCl2) solution at pH7.3 (DTPA-TEA), (ii) 0.1molL-1 hydrochloric acid (HCl) solution, (iii) Mehlich 1 solution, and (iv) Mehlich 3 solution. Zinc concentrations in leaves and grains of soybean, wheat, and corn were also determined. Soil pH (0.01molL-1 CaCl2 suspension) varied from 4.4 to 6.1, at the 0- to 0.05-m depth, from 4.2 to 5.3 at the 0.05- to 0.10-m depth, and from 4.2 to 4.8 at the 0.10- to 0.20-m depth, after liming and re-liming. Zinc concentrations evaluated by DTPA-TEA, 0.1molL-1 HCl, Mehlich 1, and Mehlich 3 solutions were not changed as a result of lime rate application. Re-liming increased Zn concentrations extracted by 0.1molL-1 HCl at 0-0.05m deep and by DTPA-TEA at 0.05-0.10m deep. Surface-applied lime promoted a decrease in Zn concentrations of the crops, mainly in grains, because of increased soil pH at the surface layers. Regardless of the liming treatments, levels of Zn were sufficient to soybean, wheat, and corn nutrition under NT.
Resumo:
Potassium (K) plays an important role in many physiological and biochemical processes in plants and its adequate use is an important issue for sustainable economic crop production. Soil test-based K fertilizer recommendations are very limited for lowland rice (Oryza sativa L.) grown on Inceptisols. The objective of this study was to calibrate K soil testing for the response of lowland rice (cv. Ipagri 109) to added K. A field experiment was conducted in the farmers` field in the municipality of Lagoa da Confusao, State of Tocantins, central Brazil. The K rates used were 0, 125, 250, 375, 500, and 625 kg K ha-1 applied as broadcast and incorporated during sowing of the first rice crop. Rice responded significantly to K fertilization during 2 years of experimentation. Maximum grain yield of about 6,000 kg ha-1 was obtained with 57 mg K kg-1 soil in the first year and with 30 mg K kg-1 in the second year. This indicated that at low levels of K in the soil, nonexchangeable K was available for plant growth. Potassium use efficiency designated as agronomic efficiency (kg grain produced/kg K applied) decreased significantly in a quadratic fashion with increasing K level in the soil. Agronomic efficiency had a significantly linear association with grain yield. Hence, improving agronomic efficiency with management practices can improve rice yield.
Resumo:
The rocky intertidal zone has the potential to be one of the harshest environments for free-spawning organisms, but empirical data on fertilization success are scarce. Here, I report on an intertidal, solitary ascidian, Pyura stolonifera, which was observed to spawn at low tide. At a scale likely to be most important to gametes (metres, duration of tide), approximately 30% of individuals in the population were spawning synchronously. Spawned gametes remained in a viscous matrix and this appeared to minimise their dilution. Fertilization success varied greatly among individuals (0 to 92%) and was related to the distance to the nearest neighbouring spawner. Occasional wave wash facilitated the movement of sperm between spawners. Fertilization success in some individuals was limited by the scarcity of sperm whilst the experimental addition of sperm did not increase success in others.
Resumo:
There has been growing interest in the effects of variation in larval quality on the post-larval performance of adult marine invertebrates. Variation in egg/larval size is an obvious source of variation in larval quality but sources of variation have received little attention. For broadcast spawners, larval size may vary according to the local sperm environment but the generality of this result is unclear. Here, we show that, for a solitary ascidian, a polychaete and an echinoid, larval size is affected by the concentration of sperm present during fertilization. Larvae that are produced at high sperm concentrations are smaller than larvae that are produced from eggs exposed to low sperm concentrations. We also show that for three ascidians and an asteroid, egg size increases with maternal body size. These differences in larval size are likely to affect larval and subsequent adult performance in the field. Given that sperm concentrations in the field can fluctuate widely, it is likely that larval quality in free-spawning marine invertebrates will also vary widely.
Resumo:
Dissertação para obtenção do grau de Mestre em Engenharia de Electrónica e Telecomunicações
Resumo:
As teachers, we are challenged everyday to solve pedagogical problems and we have to fight for our students’ attention in a media rich world. I will talk about how we use ICT in Initial Teacher Training and give you some insight on what we are doing. The most important benefit of using ICT in education is that it makes us reflect on our practice. There is no doubt that our classrooms need to be updated, but we need to be critical about every peace of hardware, software or service that we bring into them. It is not only because our budgets are short, but also because e‐learning is primarily about learning, not technology. Therefore, we need to have the knowledge and skills required to act in different situations, and choose the best tool for the job. Not all subjects are suitable for e‐learning, nor do all students have the skills to organize themselves their own study times. Also not all teachers want to spend time programming or learning about instructional design and metadata. The promised land of easy use of authoring tools (e.g. eXe and Reload) that will lead to all teachers become Learning Objects authors and share these LO in Repositories, all this failed, like previously HyperCard, Toolbook and others. We need to know a little bit of many different technologies so we can mobilize this knowledge when a situation requires it: integrate e‐learning technologies in the classroom, not a flipped classroom, just simple tools. Lecture capture, mobile phones and smartphones, pocket size camcorders, VoIP, VLE, live video broadcast, screen sharing, free services for collaborative work, save, share and sync your files. Do not feel stressed to use everything, every time. Just because we have a whiteboard does not mean we have to make it the centre of the classroom. Start from where you are, with your preferred subject and the tools you master. Them go slowly and try some new tool in a non‐formal situation and with just one or two students. And you don’t need to be alone: subscribe a mailing list and share your thoughts with other teachers in a dedicated forum, even better if both are part of a community of practice, and share resources. We did that for music teachers and it was a success, in two years arriving at 1.000 members. Just do it.
Resumo:
Although we have many electric devices at home, there are just few systems to evaluate, monitor and control them. Sometimes users go out and leave their electric devices turned on what can cause energy wasting and dangerous situations. Therefore most of the users may want to know the using states of their electrical appliances through their mobile devices in a pervasive way. In this paper, we propose an Intelligent Supervisory Control System to evaluate, monitor and control the use of electric devices in home, from outside. Because of the transferring data to evaluate, monitor and control user's location and state of home (ex. nobody at home) may be opened to attacks leading to dangerous situations. In our model we include a location privacy module and encryption module to provide security to user location and data. Intelligent Supervising Control System gives to the user the ability to manage electricity loads by means of a multi-agent system involving evaluation, monitoring, control and energy resource agents.
Resumo:
It is difficult to get the decision about an opinion after many users get the meeting in same place. It used to spend too much time in order to find solve some problem because of the various opinions of each other. TAmI (Group Decision Making Toolkit) is the System to Group Decision in Ambient Intelligence [1]. This program was composed with IGATA [2], WebMeeting and the related Database system. But, because it is sent without any encryption in IP / Password, it can be opened to attacker. They can use the IP / Password to the bad purpose. As the result, although they make the wrong result, the joined member can’t know them. Therefore, in this paper, we studied the applying method of user’s authentication into TAmI.