877 resultados para Secure Socket Layer (SSL)
Resumo:
Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-commerce has created a huge demand for information security. The Secure Socket Layer (SSL) protocol is the most widely used security protocol in the Internet which meets this demand. It provides protection against eaves droppings, tampering and forgery. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL. But recent attacks against RC4 and HMAC have raised questions in the confidence on these algorithms. Hence two novel cryptographic algorithms MAJE4 and MACJER-320 have been proposed as substitutes for them. The focus of this work is to demonstrate the performance of these new algorithms and suggest them as dependable alternatives to satisfy the need of security services in SSL. The performance evaluation has been done by using practical implementation method.
Resumo:
Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-commerce has created a huge demand for information security. The Secure Socket Layer (SSL) protocol is the most widely used security protocol in the Internet which meets this demand. It provides protection against eaves droppings, tampering and forgery. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL. But recent attacks against RC4 and HMAC have raised questions in the confidence on these algorithms. Hence two novel cryptographic algorithms MAJE4 and MACJER-320 have been proposed as substitutes for them. The focus of this work is to demonstrate the performance of these new algorithms and suggest them as dependable alternatives to satisfy the need of security services in SSL. The performance evaluation has been done by using practical implementation method.
Resumo:
Internet today has become a vital part of day to day life, owing to the revolutionary changes it has brought about in various fields. Dependence on the Internet as an information highway and knowledge bank is exponentially increasing so that a going back is beyond imagination. Transfer of critical information is also being carried out through the Internet. This widespread use of the Internet coupled with the tremendous growth in e-commerce and m-commerce has created a vital need for infonnation security.Internet has also become an active field of crackers and intruders. The whole development in this area can become null and void if fool-proof security of the data is not ensured without a chance of being adulterated. It is, hence a challenge before the professional community to develop systems to ensure security of the data sent through the Internet.Stream ciphers, hash functions and message authentication codes play vital roles in providing security services like confidentiality, integrity and authentication of the data sent through the Internet. There are several ·such popular and dependable techniques, which have been in use widely, for quite a long time. This long term exposure makes them vulnerable to successful or near successful attempts for attacks. Hence it is the need of the hour to develop new algorithms with better security.Hence studies were conducted on various types of algorithms being used in this area. Focus was given to identify the properties imparting security at this stage. By making use of a perception derived from these studies, new algorithms were designed. Performances of these algorithms were then studied followed by necessary modifications to yield an improved system consisting of a new stream cipher algorithm MAJE4, a new hash code JERIM- 320 and a new message authentication code MACJER-320. Detailed analysis and comparison with the existing popular schemes were also carried out to establish the security levels.The Secure Socket Layer (SSL) I Transport Layer Security (TLS) protocol is one of the most widely used security protocols in Internet. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL I TLS. But recent attacks on RC4 and HMAC have raised questions about the reliability of these algorithms. Hence MAJE4 and MACJER-320 have been proposed as substitutes for them. Detailed studies on the performance of these new algorithms were carried out; it has been observed that they are dependable alternatives.
Resumo:
Dissertação apresentada na Faculdade de Ciências e Tecnologia da Universidade Nova de Lisboa para obtenção do Grau de Mestre em Engenharia Electrotécnica e de Computadores
Resumo:
Se ha creado un grupo interdisciplinar de profesores de la Universidad de Valladolid de los Departamentos de Física de la Materia Condensada, Didáctica de las Ciencias Experimentales, Ingeniería Energética e Informática con el fin de desarrollar una plataforma telemática como soporte a la docencia universitaria para las materias troncales que imparten sus respectivos departamentos. El objetivo de este proyecto ha sido la optimización y ampliación de dos proyectos anteriores elaborados por los Departamentos de Física de la Materia Condensada e Informática bajo Internet, para ello, se ha necesitado rediseñar la base de datos existente, con este fin se ha trabajado en el gestor de la base de datos y del servidor web para acceder a la información contenida en la base de datos. Se ha creado una unidad didáctica sobre energía solar para ser introducida en el servidor desarrollado. Con estos objetivos se ha diseñado un nuevo servidor cuya dirección es: http://cervantes.eis.uva.es. Una de las principales mejoras conseguidas ha sido el desarrollo de un nuevo gestor de la base de datos, esto se ha debido a la necesidad de poder manejar e introducir datos desde cualquier ordenador conectado a Internet, sin necesidad de tener que hacerlo desde el servidor del departamento como sucedía hasta el momento. Esa conexión al gestor de la base de datos se realiza de una manera segura mediante SSL (Security Socket Layer). También se ha introducido un tablón de anuncios en el que tanto los profesores como los alumnos puedan introducir sus propios mensajes y ser respondidos por cualquier persona que acceda al sistema de consultas de la base de datos a través de Internet. Además se ha ampliado y mejorado la gestión y la estructura de los exámenes que los alumnos pueden realizar a través de Internet, así como las posibilidades para su utilización como instrumento de autorregulación del aprendizaje por parte de los alumnos. Otra mejora importante ha sido la construcción de un Conversor de Unidades cuya gestión va incorporada en la base de datos. Las necesidades de instalación son: sistema operativo Windows 2000 server, Internet Information server 5.0 y SQL Server 7. El material dsarrollado se encuentra en la web.
Resumo:
This paper presents models of parameters of Sea Surface Layer (SSL), such as chlorophyll-a, sea surface temperature (SST), Primary Productivity (PP) and Total Suspended Matter (TSM) for the region adjacent to the continental shelf of Rio Grande do Norte (RN), Brazil. Concentrations of these parameters measured in situ were compared in time quasi-synchronous with images AQUA-MODIS between the years 2003 to 2011. Determination coefficients between samples in situ and bands reflectance sensor AQUA-MODIS were representative. From that, concentrations of SSL parameters were acquired for the continental shelf of the RN (eastern and northern) analyzing the geographic distribution of variation of these parameters between the years 2009-2012. Geographical and seasonal variations mainly influenced by global climate phenomena such as El Niño and La Niña, were found through the analysis of AQUA-MODIS images by Principal Components Analysis (PCA). Images show qualitatively the variance and availability of TSM in the regions, as well as their relationship with coastal erosion hotspots, monitored along the coast of the RN. In one of the areas identified as being of limited availability of TSM, we developed a methodology for assessment and evaluation of Digital Elevation Models (DEM) of beach surfaces (emerged and submerged sections) from the integration of topographic and bathymetric data measured in situ and accurately georeferenced compatible to studies of geomorphology and coastal dynamics of short duration. The methodology consisted of surveys with GNSS positioning operated in cinematic relative mode involved in topographic and bathymetric executed in relation to the stations of the geodetic network of the study area, which provided geodetic link to the Brazilian Geodetic System (GBS), univocal , fixed, and relatively stable over time. In this study Ponta Negra Beach, Natal / RN, was identified as a region with low variance and availability of MPS in the region off, as characterized by intense human occupation and intense coastal erosion in recent decades, which presents potential of the proposed methodology for accuracy and productivity, and the progress achieved in relation to the classical methods of surveying beach profiles
Resumo:
In this article, physical layer awareness in access, core, and metro networks is addressed, and a Physical Layer Aware Network Architecture Framework for the Future Internet is presented and discussed, as proposed within the framework of the European ICT Project 4WARD. Current limitations and shortcomings of the Internet architecture are driving research trends at a global scale toward a novel, secure, and flexible architecture. This Future Internet architecture must allow for the co-existence and cooperation of multiple networks on common platforms, through the virtualization of network resources. Possible solutions embrace a full range of technologies, from fiber backbones to wireless access networks. The virtualization of physical networking resources will enhance the possibility of handling different profiles, while providing the impression of mutual isolation. This abstraction strategy implies the use of well elaborated mechanisms in order to deal with channel impairments and requirements, in both wireless (access) and optical (core) environments.
Resumo:
Dissertação para obtenção do Grau de Mestre em Engenharia Electrotécnica e de Computadores
Resumo:
Spectrum is an essential resource for the provision of mobile services. In order to control and delimit its use, governmental agencies set up regulatory policies. Unfortunately, such policies have led to a deficiency of spectrum as only few frequency bands are left unlicensed, and these are used for the majority of new emerging wireless applications. One promising way to alleviate the spectrum shortage problem is adopting a spectrum sharing paradigm in which frequency bands are used opportunistically. Cognitive radio is the key technology to enable this shift of paradigm.Cognitive radio networks are self-organized systems in which devices cooperate to use those spectrum ranges that are not occupied by licensed users. They carry out spectrum sensing in order to detect vacant channels that can be used for communication. Even though spectrum sensing is an active area of research, an important issue remains unsolved: the secure authentication of sensing reports. Not providing security enables the input of false data in the system thus empowering false results. This paper presents a distributed protocol based on wireless physical layer security, symmetric cryptography and one-way functions that allows determining a final sensing decision from multiple sources in a quick and secure way, as well as it preserves users¿ privacy.
Resumo:
Työssä kehitettin läpinäkyvä Internet Small Computer Systems Interface-verkkolevyä (iSCSI) käyttävä varmistusjärjestelmä. Verkkolevyn sisältö suojattiin asiakaspään salauskerroksella (dm-crypt). Järjestely mahdollisti sen, että verkkolevylle tallennetut varmuuskopiot pysyivät luottamuksellisina, vaikka levypalvelinta tarjoava taho oli joko epäluotettava tai suorastaan vihamielinen. Järjestelmän hyötykäyttöä varten kehitettiin helppokäyttöinen prototyyppisovellus. Järjestelmän riskit ja haavoittuvuudet käytiin läpi ja analysoitiin. Järjestelmälle tehtiin myös karkea kryptoanalyysi sen teknistenominaisuuksien pohjalta. Suorituskykymittaukset tehtiin sekä salatulle että salaamattomalle iSCSI-liikenteelle. Näistä todettiin, että salauksen vaikutus suorituskykyyn oli häviävän pieni jopa 100 megabittiä sekunnissa siirtävillä verkkonopeuksilla. Lisäksi pohdittiin teknologian muita sovelluskohteita ja tulevia tutkimusalueita.
Resumo:
The current study discusses new opportunities for secure ground to satellite communications using shaped femtosecond pulses that induce spatial hole burning in the atmosphere for efficient communications with data encoded within super-continua generated by femtosecond pulses. Refractive index variation across the different layers in the atmosphere may be modelled using assumptions that the upper strata of the atmosphere and troposphere behaving as layered composite amorphous dielectric networks composed of resistors and capacitors with different time constants across each layer. Input-output expressions of the dynamics of the networks in the frequency domain provide the transmission characteristics of the propagation medium. Femtosecond pulse shaping may be used to optimize the pulse phase-front and spectral composition across the different layers in the atmosphere. A generic procedure based on evolutionary algorithms to perform the pulse shaping is proposed. In contrast to alternative procedures that would require ab initio modelling and calculations of the propagation constant for the pulse through the atmosphere, the proposed approach is adaptive, compensating for refractive index variations along the column of air between the transmitter and receiver.
Resumo:
The Helsinki Urban Boundary-Layer Atmosphere Network (UrBAN: http://urban.fmi.fi) is a dedicated research-grade observational network where the physical processes in the atmosphere above the city are studied. Helsinki UrBAN is the most poleward intensive urban research observation network in the world and thus will allow studying some unique features such as strong seasonality. The network's key purpose is for the understanding of the physical processes in the urban boundary layer and associated fluxes of heat, momentum, moisture, and other gases. A further purpose is to secure a research-grade database, which can be used internationally to validate and develop numerical models of air quality and weather prediction. Scintillometers, a scanning Doppler lidar, ceilometers, a sodar, eddy-covariance stations, and radiometers are used. This equipment is supplemented by auxiliary measurements, which were primarily set up for general weather and/or air-quality mandatory purposes, such as vertical soundings and the operational Doppler radar network. Examples are presented as a testimony to the potential of the network for urban studies, such as (i) evidence of a stable boundary layer possibly coupled to an urban surface, (ii) the comparison of scintillometer data with sonic anemometry above an urban surface, (iii) the application of scanning lidar over a city, and (iv) combination of sodar and lidar to give a fuller range of sampling heights for boundary layer profiling.
Resumo:
Background:Bone graft procedures have been used commonly in buco-maxillo-facial surgery. For this reason, many researchers have evaluated the bone substitutes.Purpose:The present study evaluated soft and hard tissue reactions to two different hydroxyapatites HAs (synthetic HA and natural HA) and bioactive glass implanted into the sockets immediately after extraction.Materials and Methods:First and third upper and lower premolars, on both sides, were extracted from six female dogs. The alveolar sockets were randomly assigned to four groups: Group 1 - control (unfilled), Group 2 - filled with synthetic hydroxyapatite, Group 3 - filled with bovine bone mineral (natural HA), and Group 4 - filled with bioactive glass. The animals were euthanized at 4 weeks (n = 2), 8 weeks (n = 2), and 28 weeks (n = 2) after extraction. The mandible and maxilla of each animal were removed for histological analysis to determine soft tissue reactions, newly formed bone, bone characteristics, and presence or absence of implanted materials.Results:Most particles of synthetic hydroxyapatite had bone formation on their surface, although some particles showed a layer of fibrous connective tissue. The bovine bone mineral group exhibited particles partially replaced with bone formation. The bioactive glass group showed particles with a thin layer of calcified tissue, but was absent in some specimens, suggesting complete resorption.Conclusion:All biomaterials had similar behavior. Bovine bone mineral, compared to synthetic hydroxyapatite and bioactive glass, showed a larger number of particles covered with osseous tissue. All biomaterials interfered with the socket repair process.
Resumo:
One of the obstacles to improved security of the Internet is ad hoc development of technologies with different design goals and different security goals. This paper proposes reconceptualizing the Internet as a secure distributed system, focusing specifically on the application layer. The notion is to redesign specific functionality, based on principles discovered in research on distributed systems in the decades since the initial development of the Internet. Because of the problems in retrofitting new technology across millions of clients and servers, any options with prospects of success must support backward compatibility. This paper outlines a possible new architecture for internet-based mail which would replace existing protocols by a more secure framework. To maintain backward compatibility, initial implementation could offer a web browser-based front end but the longer-term approach would be to implement the system using appropriate models of replication. (C) 2005 Elsevier Ltd. All rights reserved.
Resumo:
The Three-Layer distributed mediation architecture, designed by Secure System Architecture laboratory, employed a layered framework of presence, integration, and homogenization mediators. The architecture does not have any central component that may affect the system reliability. A distributed search technique was adapted in the system to increase its reliability. An Enhanced Chord-like algorithm (E-Chord) was designed and deployed in the integration layer. The E-Chord is a skip-list algorithm based on Distributed Hash Table (DHT) which is a distributed but structured architecture. DHT is distributed in the sense that no central unit is required to maintain indexes, and it is structured in the sense that indexes are distributed over the nodes in a systematic manner. Each node maintains three kind of routing information: a frequency list, a successor/predecessor list, and a finger table. None of the nodes in the system maintains all indexes, and each node knows about some other nodes in the system. These nodes, also called composer mediators, were connected in a P2P fashion. ^ A special composer mediator called a global mediator initiates the keyword-based matching decomposition of the request using the E-Chord. It generates an Integrated Data Structure Graph (IDSG) on the fly, creates association and dependency relations between nodes in the IDSG, and then generates a Global IDSG (GIDSG). The GIDSG graph is a plan which guides the global mediator how to integrate data. It is also used to stream data from the mediators in the homogenization layer which connected to the data sources. The connectors start sending the data to the global mediator just after the global mediator creates the GIDSG and just before the global mediator sends the answer to the presence mediator. Using the E-Chord and GIDSG made the mediation system more scalable than using a central global schema repository since all the composers in the integration layer are capable of handling and routing requests. Also, when a composer fails, it would only minimally affect the entire mediation system. ^