954 resultados para implementation issues


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Dragon is a word-based stream cipher. It was submitted to the eSTREAM project in 2005 and has advanced to Phase 3 of the software profile. This paper discusses the Dragon cipher from three perspectives: design, security analysis and implementation. The design of the cipher incorporates a single word-based non-linear feedback shift register and a non-linear filter function with memory. This state is initialized with 128- or 256-bit key-IV pairs. Each clock of the stream cipher produces 64 bits of keystream, using simple operations on 32-bit words. This provides the cipher with a high degree of efficiency in a wide variety of environments, making it highly competitive relative to other symmetric ciphers. The components of Dragon were designed to resist all known attacks. Although the design has been open to public scrutiny for several years, the only published attacks to date are distinguishing attacks which require keystream lengths greatly exceeding the stated 264 bit maximum permitted keystream length for a single key-IV pair.

Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Nth-Dimensional Truncated Polynomial Ring (NTRU) is a lattice-based public-key cryptosystem that offers encryption and digital signature solutions. It was designed by Silverman, Hoffstein and Pipher. The NTRU cryptosystem was patented by NTRU Cryptosystems Inc. (which was later acquired by Security Innovations) and available as IEEE 1363.1 and X9.98 standards. NTRU is resistant to attacks based on Quantum computing, to which the standard RSA and ECC public-key cryptosystems are vulnerable to. In addition, NTRU has higher performance advantages over these cryptosystems. Considering this importance of NTRU, it is highly recommended to adopt NTRU as part of a cipher suite along with widely used cryptosystems for internet security protocols and applications. In this paper, we present our analytical study on the implementation of NTRU encryption scheme which serves as a guideline for security practitioners who are novice to lattice-based cryptography or even cryptography. In particular, we show some non-trivial issues that should be considered towards a secure and efficient NTRU implementation.

Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper we continue our investigation into the development of computational-science software based on the identification and formal specification of Abstract Data Types (ADTs) and their implementation in Fortran 90. In particular, we consider the consequences of using pointers when implementing a formally specified ADT in Fortran 90. Our aim is to highlight the resulting conflict between the goal of information hiding, which is central to the ADT methodology, and the space efficiency of the implementation. We show that the issue of storage recovery cannot be avoided by the ADT user, and present a range of implementations of a simple ADT to illustrate various approaches towards satisfactory storage management. Finally, we propose a set of guidelines for implementing ADTs using pointers in Fortran 90. These guidelines offer a way gracefully to provide disposal operations in Fortran 90. Such an approach is desirable since Fortran 90 does not provide automatic garbage collection which is offered by many object-oriented languages including Eiffel, Java, Smalltalk, and Simula.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper presents a new architecture for the MASCEM, a multi-agent electricity market simulator. This is implemented in a Prolog which is integrated in the JAVA program by using the LPA Win-Prolog Intelligence Server (IS) provides a DLL interface between Win-Prolog and other applications. This paper mainly focus on the MASCEM ability to provide the means to model and simulate Virtual Power Producers (VPP). VPPs are represented as a coalition of agents, with specific characteristics and goals. VPPs can reinforce the importance of these generation technologies making them valuable in electricity markets.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Armed with the ‘equity’ and ‘conservation’ arguments that have a deep resonance with farming communities, developing countries are crafting a range of measures designed to protect farmers’ access to innovations, reward their contributions to the conservation and enhancement of plant genetic resources and provide incentives for sustained on-farm conservation. These measures range from the commericialization of farmers’ varieties to the conferment of a set of legally enforceable rights on farming communities – the exercise of which is expected to provide economic rewards to those responsible for on-farm conservation and innovation. The rights-based approach has been the cornerstone of legislative provision for implementing farmers’ rights in most developing countries. In drawing up these measures, developing countries do not appear to have systematically examined or provided for the substantial institutional capacity required for the effective implementation of farmers’ rights provisions. The lack of institutional capacity threatens to undermine any prospect of serious implementation of these provisions. More importantly, the expectation that significant incentives for on-farm conservation and innovation will flow from these ‘rights’ may be based on a flawed understanding of the economics of intellectual property rights. While farmers’ rights may provide only limited rewards for conservation, they may still have the effect of diluting the incentives for innovative institutional breeding programs – with the private sector increasingly relying on non-IPR instruments to profit from innovation. The focus on a rights-based approach may also draw attention away from alternative stewardship-based approaches to the realization of farmers’ rights objectives.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

"Publication no. FHWA-PL-93-008"--P. 4 of cover.