912 resultados para Message integrity
Resumo:
The focus of this work is to provide authentication and confidentiality of messages in a swift and cost effective manner to suit the fast growing Internet applications. A nested hash function with lower computational and storage demands is designed with a view to providing authentication as also to encrypt the message as well as the hash code using a fast stream cipher MAJE4 with a variable key size of 128-bit or 256-bit for achieving confidentiality. Both nested Hash function and MAJE4 stream cipher algorithm use primitive computational operators commonly found in microprocessors; this makes the method simple and fast to implement both in hardware and software. Since the memory requirement is less, it can be used for handheld devices for security purposes.
Resumo:
This paper describes JERIM-320, a new 320-bit hash function used for ensuring message integrity and details a comparison with popular hash functions of similar design. JERIM-320 and FORK -256 operate on four parallel lines of message processing while RIPEMD-320 operates on two parallel lines. Popular hash functions like MD5 and SHA-1 use serial successive iteration for designing compression functions and hence are less secure. The parallel branches help JERIM-320 to achieve higher level of security using multiple iterations and processing on the message blocks. The focus of this work is to prove the ability of JERIM 320 in ensuring the integrity of messages to a higher degree to suit the fast growing internet applications
Resumo:
Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-commerce has created a huge demand for information security. The Secure Socket Layer (SSL) protocol is the most widely used security protocol in the Internet which meets this demand. It provides protection against eaves droppings, tampering and forgery. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL. But recent attacks against RC4 and HMAC have raised questions in the confidence on these algorithms. Hence two novel cryptographic algorithms MAJE4 and MACJER-320 have been proposed as substitutes for them. The focus of this work is to demonstrate the performance of these new algorithms and suggest them as dependable alternatives to satisfy the need of security services in SSL. The performance evaluation has been done by using practical implementation method.
Resumo:
Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-commerce has created a huge demand for information security. The Secure Socket Layer (SSL) protocol is the most widely used security protocol in the Internet which meets this demand. It provides protection against eaves droppings, tampering and forgery. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL. But recent attacks against RC4 and HMAC have raised questions in the confidence on these algorithms. Hence two novel cryptographic algorithms MAJE4 and MACJER-320 have been proposed as substitutes for them. The focus of this work is to demonstrate the performance of these new algorithms and suggest them as dependable alternatives to satisfy the need of security services in SSL. The performance evaluation has been done by using practical implementation method.
Resumo:
Unattended Wireless Sensor Networks (UWSNs) operate in autonomous or disconnected mode: sensed data is collected periodically by an itinerant sink. Between successive sink visits, sensor-collected data is subject to some unique vulnerabilities. In particular, while the network is unattended, a mobile adversary (capable of subverting up to a fraction of sensors at a time) can migrate between compromised sets of sensors and inject fraudulent data. In this paper, we provide two collaborative authentication techniques that allow an UWSN to maintain integrity and authenticity of sensor data-in the presence of a mobile adversary-until the next sink visit. Proposed schemes use simple, standard, and inexpensive symmetric cryptographic primitives, coupled with key evolution and few message exchanges. We study their security and effectiveness, both analytically and via simulations. We also assess their robustness and show how to achieve the desired trade-off between performance and security.
Resumo:
The purpose of this paper was to study the main effects of the turning in the superficial integrity of the duplex stainless steel ASTM A890-6A. The tests were conducted on a turning centre with carbide tools and the main entrances variables were: tool material class, feed rate, cutting depth, cutting speed and cutting fluid utilisation. The answers were analysed: microstructural analysis by optical microscopy and x-ray diffraction, cutting forces measurements by a piezoelectric dynamometer, surface roughness, residual stress by x-ray diffraction technique and the microhardness measurements. The results do not show any changes in the microstructural of the material, even when the greater cutting parameters were used. The smaller feed rate (0.1 mm/v), smaller cutting speed (110 m/min) and the greater cutting depth (0.5 mm) provided the smaller values for the tensile residual stress, the smaller surface roughness and the greater microhardness.
Resumo:
The increasing adoption of information systems in healthcare has led to a scenario where patient information security is more and more being regarded as a critical issue. Allowing patient information to be in jeopardy may lead to irreparable damage, physically, morally, and socially to the patient, potentially shaking the credibility of the healthcare institution. Medical images play a crucial role in such context, given their importance in diagnosis, treatment, and research. Therefore, it is vital to take measures in order to prevent tampering and determine their provenance. This demands adoption of security mechanisms to assure information integrity and authenticity. There are a number of works done in this field, based on two major approaches: use of metadata and use of watermarking. However, there still are limitations for both approaches that must be properly addressed. This paper presents a new method using cryptographic means to improve trustworthiness of medical images, providing a stronger link between the image and the information on its integrity and authenticity, without compromising image quality to the end user. Use of Digital Imaging and Communications in Medicine structures is also an advantage for ease of development and deployment.
Resumo:
This paper presents a novel algorithm to successfully achieve viable integrity and authenticity addition and verification of n-frame DICOM medical images using cryptographic mechanisms. The aim of this work is the enhancement of DICOM security measures, especially for multiframe images. Current approaches have limitations that should be properly addressed for improved security. The algorithm proposed in this work uses data encryption to provide integrity and authenticity, along with digital signature. Relevant header data and digital signature are used as inputs to cipher the image. Therefore, one can only retrieve the original data if and only if the images and the inputs are correct. The encryption process itself is a cascading scheme, where a frame is ciphered with data related to the previous frames, generating also additional data on image integrity and authenticity. Decryption is similar to encryption, featuring also the standard security verification of the image. The implementation was done in JAVA, and a performance evaluation was carried out comparing the speed of the algorithm with other existing approaches. The evaluation showed a good performance of the algorithm, which is an encouraging result to use it in a real environment.
Resumo:
Background/Aims: It is a challenge to adapt traditional in vitro diffusion experiments to ocular tissue. Thus, the aim of this work was to present experimental evidence on the integrity of the porcine cornea, barrier function and maintenance of electrical properties for 6 h of experiment when the tissue is mounted on an inexpensive and easy-to-use in vitro model for ocular iontophoresis. Methods: A modified Franz diffusion cell containing two ports for the insertion of the electrodes and a receiving compartment that does not need gassing with carbogen was used in the studies. Corneal electron transmission microscopy images were obtained, and diffusion experiments with fluorescent markers were performed to examine the integrity of the barrier function. The preservation of the negatively charged corneal epithelium was verified by the determination of the electro-osmotic flow of a hydrophilic and non-ionized molecule. Results: The diffusion cell was able to maintain the temperature, homogenization, porcine epithelial corneal structure integrity, barrier function and electrical characteristics throughout the 6 h of permeation experiment, without requiring CO(2) gassing when the receiving chamber was filled with 25 m M of HEPES buffer solution. Conclusion: The system described here is inexpensive, easy to handle and reliable as an in vitro model for iontophoretic ocular delivery studies. Copyright (C) 2010 S. Karger AG, Basel
Resumo:
Seven cysteine-rich repeats form the ligand-binding region of the low-density lipoprotein (LDL) receptor. Each of these repeats is assumed to bind a calcium ion, which is needed for association of the receptor with its ligands, LDL and beta-VLDL. The effects of metal ions on the folding of the reduced N-terminal cysteine-rich repeat have been examined by using reverse-phase high-performance liquid chromatography to follow the formation of fully oxidized isomers with different disulfide connectivities. in the absence of calcium many of the 15 possible isomers formed on oxidation, whereas in its presence the predominant product at equilibrium had the native disulfide bond connectivities. Other metals were far less effective at directing disulfide bond formation: Mn2+ partly mimicked the action of Ca2+, but Ba2+, Sr2+, and Mg2+ had little effect. This metal-ion specificity was also observed in two-dimensional H-1 NMR spectral studies: only Ca2+ induced the native three-dimensional fold. The two paramagnetic ions, Gd3+ and Mn2+, and Cd2+ did not promote adoption of a well-defined structure, and the two paramagnetic ions did not displace calcium ions. The location of calcium ion binding sites in the repeat was also explored by NMR spectroscopy. The absence of chemical shift changes for the side chain proton resonances of Asp26, Asp36, and Glu37 from pH 3.9 to 6.8 in the presence of calcium ions and their proximal location in the NMR structures implicated these side chains as calcium ligands. Deuterium exchange NMR experiments also revealed a network of hydrogen bonds that stabilizes the putative calcium-binding loop.
Resumo:
In this paper, a theory of charismatic relationships is examined with reference to the follower's personal characteristics. It is argued that a leader's charismatic message and personal charisma occupy different roles for individuals who vary in national culture and level of self-monitoring. In an empirical test of the theory, 387 undergraduates of Chinese and Australian cultural backgrounds completed self-monitoring and charismatic leadership instruments. High self-monitors placed more importance on personal charisma than the charismatic message. Chinese participants relied more than the Australians on the charismatic message, although this preference depended on self-monitoring orientation. These results indicate the influence of both individual-and cultural-level variables on leader-member relationships, and the need to consider these effects in future developments of a theory of charismatic leadership.
Resumo:
A novel MRI method-diffusion tensor imaging-was used to compare the integrity of several white matter fibre tracts in patients with probable Alzheimer's disease. Relative to normal controls, patients with probable Alzheimer's disease showed a highly significant reduction in the integrity of the association white matter fibre tracts, such as the splenium of the corpus callosum, superior longitudinal fasciculus, and cingulum. By contrast, pyramidal tract integrity seemed unchanged. This novel finding is consistent with the clinical presentation of probable Alzheimer's disease, in which global cognitive decline is a more prominent feature than motor disturbance.
Resumo:
Cryopreservation of parathyroid tissue is used in the surgical treatment of secondary hyperparathyroidism. After surgical resection, the tissue is temporarily maintained in a cell culture solution until it arrives at the specialized laboratory where the cryopreservation process will take place. The present study evaluates the time that the human hyperplastic parathyroid gland tissue can wait before cryopreservation, based on parathyroid cell ultrastructural integrity. This prospective study included 11 patients who underwent total parathyroidectomy with heterotopic autotransplantation and cryopreservation of parathyroid tissue fragments. Part of the tissue was kept in cell culture solution at 4A degrees C. Five time periods between 2 and 24 h were defined, and parathyroid fragments were kept in the solution for that length of time. At the end of each period, the fragments were removed from the transport solution, fixed, and prepared for ultrathin sections. Of the 11 cases studied, 10 showed ultrastructural findings consistent with cellular viability in tissue fragments that remained in the transport solution up to 12 h. Electron microscopy revealed that cell adhesion and the integrity of plasma membranes, nuclei, and mitochondria were preserved in one case for up to 24 h. Changes in mitochondrial structure represented the most constant ultrastructural damage seen in the cases studied, in addition to the presence of edema and cell vacuoles. Analysis of the ultrastructure of hyperplastic parathyroid gland tissue showed that ultrastructural integrity was in most cases properly maintained in fragments stored up to 12 h in a cell culture solution at 4A degrees C.
Resumo:
Chloramphenicol acetyl transferase (CAT) protein and mRNA levels in E. coli were determined following induction of a tac::cat construct by isopropyl-beta-thiogalactopyranoside (IPTG). High cat mRNA levels did not directly reflect CAT protein levels, in either shakeflask experiments or fermentations. Furthermore, concentrations of IPTG resulting in the highest levels of expression of cat mRNA, were different to those resulting in highest levels of CAT protein. The data suggest that high transcriptional activities lead to limitations at the translational level.