13 resultados para HMAC
Resumo:
Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-commerce has created a huge demand for information security. The Secure Socket Layer (SSL) protocol is the most widely used security protocol in the Internet which meets this demand. It provides protection against eaves droppings, tampering and forgery. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL. But recent attacks against RC4 and HMAC have raised questions in the confidence on these algorithms. Hence two novel cryptographic algorithms MAJE4 and MACJER-320 have been proposed as substitutes for them. The focus of this work is to demonstrate the performance of these new algorithms and suggest them as dependable alternatives to satisfy the need of security services in SSL. The performance evaluation has been done by using practical implementation method.
Resumo:
Internet today has become a vital part of day to day life, owing to the revolutionary changes it has brought about in various fields. Dependence on the Internet as an information highway and knowledge bank is exponentially increasing so that a going back is beyond imagination. Transfer of critical information is also being carried out through the Internet. This widespread use of the Internet coupled with the tremendous growth in e-commerce and m-commerce has created a vital need for infonnation security.Internet has also become an active field of crackers and intruders. The whole development in this area can become null and void if fool-proof security of the data is not ensured without a chance of being adulterated. It is, hence a challenge before the professional community to develop systems to ensure security of the data sent through the Internet.Stream ciphers, hash functions and message authentication codes play vital roles in providing security services like confidentiality, integrity and authentication of the data sent through the Internet. There are several ·such popular and dependable techniques, which have been in use widely, for quite a long time. This long term exposure makes them vulnerable to successful or near successful attempts for attacks. Hence it is the need of the hour to develop new algorithms with better security.Hence studies were conducted on various types of algorithms being used in this area. Focus was given to identify the properties imparting security at this stage. By making use of a perception derived from these studies, new algorithms were designed. Performances of these algorithms were then studied followed by necessary modifications to yield an improved system consisting of a new stream cipher algorithm MAJE4, a new hash code JERIM- 320 and a new message authentication code MACJER-320. Detailed analysis and comparison with the existing popular schemes were also carried out to establish the security levels.The Secure Socket Layer (SSL) I Transport Layer Security (TLS) protocol is one of the most widely used security protocols in Internet. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL I TLS. But recent attacks on RC4 and HMAC have raised questions about the reliability of these algorithms. Hence MAJE4 and MACJER-320 have been proposed as substitutes for them. Detailed studies on the performance of these new algorithms were carried out; it has been observed that they are dependable alternatives.
Resumo:
Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-commerce has created a huge demand for information security. The Secure Socket Layer (SSL) protocol is the most widely used security protocol in the Internet which meets this demand. It provides protection against eaves droppings, tampering and forgery. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL. But recent attacks against RC4 and HMAC have raised questions in the confidence on these algorithms. Hence two novel cryptographic algorithms MAJE4 and MACJER-320 have been proposed as substitutes for them. The focus of this work is to demonstrate the performance of these new algorithms and suggest them as dependable alternatives to satisfy the need of security services in SSL. The performance evaluation has been done by using practical implementation method.
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Resumo:
To our knowledge, no current software development methodology explicitly describes how to transit from the analysis model to the software architecture of the application. This paper presents a method to derive the software architecture of a system from its analysis model. To do this, we are going to use MDA. Both the analysis model and the architectural model are PIMs described with UML 2. The model type mapping designed consists of several rules (expressed using OCL and natural language) that, when applied to the analysis artifacts, generate the software architecture of the application. Specifically the rules act on elements of the UML 2 metamodel (metamodel mapping). We have developed a tool (using Smalltalk) that permits the automatic application of these rules to an analysis model defined in RoseTM to generate the application architecture expressed in the architectural style C2.
Resumo:
Being overweight is associated with both higher systolic blood pressure (SBP) and diastolic blood pressure (DBP) during pregnancy and increased risk of gestational hypertensive disorders. The objective of this study was to determine and quantify the effect of body mass index (BMI) on mean arterial pressure (MAP) at several time points throughout pregnancy in normotensive (NT) and chronic hypertensive pregnant (HT) women.
Resumo:
The pharmacological management of early pregnancy loss reduced substantially the need for dilation and curettage. However, prognostic markers of successful outcome were not established. Thus the major purpose of this study was to determine the sensitivity and specificity of the uterine artery pulsatility (PI) and resistance (RI) indices to detect early pregnancy loss patients requiring dilation and curettage after unsuccessful management.
Resumo:
BACKGROUND: Hemicrania continua is a strictly unilateral, continuous headache, typically mild to moderate in severity, with severe exacerbations commonly accompanied by cranial autonomic features and migrainous symptoms. It is exquisitely responsive to Indomethacin. However, some patients cannot tolerate treatment, often due to gastrointestinal side effects. Therapeutic alternatives are limited and controlled evidence lacking. METHODS: We present our experience of nine patients treated with OnabotulinumtoxinA for hemicrania continua. All patients were injected using the PREEMPT (Phase 3 REsearch Evaluating Migraine Prophylaxis Therapy) protocol for migraine. RESULTS: Five of nine patients demonstrated a 50% or more reduction in moderate to severe headache days with OnabotulinumtoxinA with a median reduction in moderate to severe headache days of 80%. Patient estimate of response was 80% or more in five subjects. The median and mean duration of response in the five responders was 11 and 12 weeks (range 6-20 weeks). Improvements were also seen in headache-associated disability CONCLUSIONS: OnabotulinumtoxinA adds a potential option to the limited therapeutic alternatives available in hemicrania continua.
Resumo:
BACKGROUND: Transthyretin-mediated amyloidosis is an inherited, progressively debilitating disease caused by mutations in the transthyretin gene. This study evaluated the safety, tolerability, pharmacokinetics, and pharmacodynamics of multiple doses of patisiran (ALN-TTR02), a small interfering RNA encapsulated within lipid nanoparticles, in patients with transthyretin-mediated familial amyloid polyneuropathy (FAP).
Resumo:
INTRODUCTION: Invasive aspergillosis (IA) is a fungal infection that particularly affects immunocompromised hosts. Recently, several studies have indicated a high incidence of IA in intensive care unit (ICU) patients. However, few data are available on the epidemiology and outcome of patients with IA in this setting.