WorldWideScience

Sample records for cryptographic key material

  1. Cryptographic Key Management System

    Energy Technology Data Exchange (ETDEWEB)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  2. Quantum walks public key cryptographic system

    OpenAIRE

    Vlachou, C; Rodrigues, J.; Mateus, P.; Paunković, N.; Souto, A.

    2016-01-01

    Quantum Cryptography is a rapidly developing field of research that benefits from the properties of Quantum Mechanics in performing cryptographic tasks. Quantum walks are a powerful model for quantum computation and very promising for quantum information processing. In this paper, we present a quantum public-key cryptographic system based on quantum walks. In particular, in the proposed protocol the public key is given by a quantum state generated by performing a quantum walk. We show that th...

  3. Quantum walk public-key cryptographic system

    Science.gov (United States)

    Vlachou, C.; Rodrigues, J.; Mateus, P.; Paunković, N.; Souto, A.

    2015-12-01

    Quantum Cryptography is a rapidly developing field of research that benefits from the properties of Quantum Mechanics in performing cryptographic tasks. Quantum walks are a powerful model for quantum computation and very promising for quantum information processing. In this paper, we present a quantum public-key cryptographic system based on quantum walks. In particular, in the proposed protocol the public-key is given by a quantum state generated by performing a quantum walk. We show that the protocol is secure and analyze the complexity of public key generation and encryption/decryption procedures.

  4. Cryptographic Key Management and Critical Risk Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Abercrombie, Robert K [ORNL

    2014-05-01

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) CyberSecurity for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing CyberSecurity for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system

  5. Secured Cryptographic Key Generation From Multimodal Biometrics Feature Level Fusion Of Fingerprint And Iris

    CERN Document Server

    Jagadeesan, A

    2010-01-01

    Human users have a tough time remembering long cryptographic keys. Hence, researchers, for so long, have been examining ways to utilize biometric features of the user instead of a memorable password or passphrase, in an effort to generate strong and repeatable cryptographic keys. Our objective is to incorporate the volatility of the users biometric features into the generated key, so as to make the key unguessable to an attacker lacking significant knowledge of the users biometrics. We go one step further trying to incorporate multiple biometric modalities into cryptographic key generation so as to provide better security. In this article, we propose an efficient approach based on multimodal biometrics (Iris and fingerprint) for generation of secure cryptographic key. The proposed approach is composed of three modules namely, 1) Feature extraction, 2) Multimodal biometric template generation and 3) Cryptographic key generation. Initially, the features, minutiae points and texture properties are extracted from...

  6. Secured Cryptographic Key Generation From Multimodal Biometrics: Feature Level Fusion of Fingerprint and Iris

    CERN Document Server

    Jagadeesan, A

    2010-01-01

    Human users have a tough time remembering long cryptographic keys. Hence, researchers, for so long, have been examining ways to utilize biometric features of the user instead of a memorable password or passphrase, in an effort to generate strong and repeatable cryptographic keys. Our objective is to incorporate the volatility of the user's biometric features into the generated key, so as to make the key unguessable to an attacker lacking significant knowledge of the user's biometrics. We go one step further trying to incorporate multiple biometric modalities into cryptographic key generation so as to provide better security. In this article, we propose an efficient approach based on multimodal biometrics (Iris and fingerprint) for generation of secure cryptographic key. The proposed approach is composed of three modules namely, 1) Feature extraction, 2) Multimodal biometric template generation and 3) Cryptographic key generation. Initially, the features, minutiae points and texture properties are extracted fr...

  7. Deciding security properties for cryptographic protocols. Application to key cycles

    CERN Document Server

    Comon-Lundh, Hubert; Zalinescu, Eugen

    2007-01-01

    There has been a growing interest in applying formal methods for validating cryptographic protocols and many results have been obtained. In this paper, we re-investigate and extend the NP-complete decision procedure for a bounded number of sessions of Rusinowitch and Turuani. In this setting, constraint systems are now a standard for modeling security protocols. We provide a generic approach to decide general security properties by showing that any constraint system can be transformed in (possibly several) much simpler constraint systems that are called \\emph{solved forms}. As a consequence, we prove that deciding the existence of key cycles is NP-complete for a bounded number of sessions. Indeed, many recent results are concerned with interpreting proofs of security done in symbolic models in the more detailed models of computational cryptography. In the case of symmetric encryption, these results stringently demand that no key cycle (e.g. $\\{k\\}_k$) can be produced during the execution of protocols. We show...

  8. Secure Cryptographic Key Management System (CKMS) Considerations for Smart Grid Devices

    Energy Technology Data Exchange (ETDEWEB)

    Abercrombie, Robert K [ORNL; Sheldon, Frederick T [ORNL; Aldridge, Hal [ORNL; Duren, Mike [Sypris Electronics, LLC; Ricci, Tracy [Sypris Electronics, LLC; Bertino, Elisa [ORNL; Kulatunga, Athula [Purdue University; Navaratne, Uditha Sudheera [Purdue University

    2011-01-01

    In this paper, we examine some unique challenges associated with key management in the Smart Grid and concomitant research initiatives: 1) effectively model security requirements and their implementations, and 2) manage keys and key distribution for very large scale deployments such as Smart Meters over a long period of performance. This will set the stage to: 3) develop innovative, low cost methods to protect keying material, and 4) provide high assurance authentication services. We will present our perspective on key management and will discuss some key issues within the life cycle of a cryptographic key designed to achieve the following: 1) control systems designed, installed, operated, and maintained to survive an intentional cyber assault with no loss of critical function, and 2) widespread implementation of methods for secure communication between remote access devices and control centers that are scalable and cost-effective to deploy.

  9. K-Medoids-Based Random Biometric Pattern for Cryptographic Key Generation

    Science.gov (United States)

    Garcia-Baleon, H. A.; Alarcon-Aquino, V.; Starostenko, O.

    In this paper we report an approach for cryptographic key generation based on keystroke dynamics and the k-medoids algorithm. The stages that comprise the approach are training-enrollment and user verification. The proposed approach is able to verify the identity of individuals off-line avoiding the use of a centralized database. The performance of the proposed approach is assessed using 20 samples of keystroke dynamics from 20 different users. Simulation results show a false acceptance rate (FAR) of 5.26% and a false rejection rate (FRR) of 10%. The cryptographic key released by the proposed approach may be used in several encryption algorithms.

  10. SIMPL Systems, or: Can We Design Cryptographic Hardware without Secret Key Information?

    Science.gov (United States)

    Rührmair, Ulrich

    This paper discusses a new cryptographic primitive termed SIMPL system. Roughly speaking, a SIMPL system is a special type of Physical Unclonable Function (PUF) which possesses a binary description that allows its (slow) public simulation and prediction. Besides this public key like functionality, SIMPL systems have another advantage: No secret information is, or needs to be, contained in SIMPL systems in order to enable cryptographic protocols - neither in the form of a standard binary key, nor as secret information hidden in random, analog features, as it is the case for PUFs. The cryptographic security of SIMPLs instead rests on (i) a physical assumption on their unclonability, and (ii) a computational assumption regarding the complexity of simulating their output. This novel property makes SIMPL systems potentially immune against many known hardware and software attacks, including malware, side channel, invasive, or modeling attacks.

  11. Revoke and Let Live: A Secure Key Revocation API for Cryptographic Devices

    OpenAIRE

    Cortier, Véronique; Steel,Graham; Wiedling, Cyrille

    2012-01-01

    While extensive research addresses the problem of establishing session keys through cryptographic protocols, relatively little work has appeared addressing the problem of revocation and update of long term keys. We present an API for symmetric key management on embedded devices that supports revocation and prove security properties design in the symbolic model of cryptography. Our API supports two modes of revocation: a passive mode where keys have an expiration time, and an active mode where...

  12. The generation of shared cryptographic keys through channel impulse response estimation at 60 GHz.

    Energy Technology Data Exchange (ETDEWEB)

    Young, Derek P.; Forman, Michael A.; Dowdle, Donald Ryan

    2010-09-01

    Methods to generate private keys based on wireless channel characteristics have been proposed as an alternative to standard key-management schemes. In this work, we discuss past work in the field and offer a generalized scheme for the generation of private keys using uncorrelated channels in multiple domains. Proposed cognitive enhancements measure channel characteristics, to dynamically change transmission and reception parameters as well as estimate private key randomness and expiration times. Finally, results are presented on the implementation of a system for the generation of private keys for cryptographic communications using channel impulse-response estimation at 60 GHz. The testbed is composed of commercial millimeter-wave VubIQ transceivers, laboratory equipment, and software implemented in MATLAB. Novel cognitive enhancements are demonstrated, using channel estimation to dynamically change system parameters and estimate cryptographic key strength. We show for a complex channel that secret key generation can be accomplished on the order of 100 kb/s.

  13. Quality of Service Enhancement of Wireless Sensor Network Using Symmetric Key Cryptographic Schemes

    Directory of Open Access Journals (Sweden)

    Er. Gurjot Singh

    2014-07-01

    Full Text Available A Wireless Sensor Network is a combination of spatially distributed independent nodes deployed in dense environment, communicating wirelessly over limited bandwidth and frequency. Security and Qos is the major concern in wireless sensor network due to its wireless communication nature and constraints like low computation capability, less memory, bounded energy resources, susceptibility to physical capture or damages and the use of insecure wireless communication channels. These constraints make security along with the QoS, a challenge in wireless sensor network. The cryptographic schemes increases the level of security and make it secure against critical attacks but also has a significant impact on the QoS of wireless sensor network. In this paper, the different cryptographic schemes based on asymmetric key and symmetric key cryptography are evaluated. The symmetric key cryptography schemes require less time for processing, less power and also require less storage space as compared to asymmetric key cryptographic schemes, results in less impact on the QoS of wireless sensor network. In this paper, the QoS of wireless sensor network along with cryptographic schemes will be evaluated on the basis of metrics like throughput, jitter, end-to-end delay, total packet received and energy consumption.

  14. Apparatus, system and method for providing cryptographic key information with physically unclonable function circuitry

    Energy Technology Data Exchange (ETDEWEB)

    Areno, Matthew

    2015-12-08

    Techniques and mechanisms for providing a value from physically unclonable function (PUF) circuitry for a cryptographic operation of a security module. In an embodiment, a cryptographic engine receives a value from PUF circuitry and based on the value, outputs a result of a cryptographic operation to a bus of the security module. The bus couples the cryptographic engine to control logic or interface logic of the security module. In another embodiment, the value is provided to the cryptographic engine from the PUF circuitry via a signal line which is distinct from the bus, where any exchange of the value by either of the cryptographic engine and the PUF circuitry is for communication of the first value independent of the bus.

  15. Novel Authentication of Monitoring Data Through the use of Secret and Public Cryptographic Keys

    Energy Technology Data Exchange (ETDEWEB)

    Benz, Jacob M.; Tolk, Keith; Tanner, Jennifer E.

    2014-07-21

    The Office of Nuclear Verification (ONV) is supporting the development of a piece of equipment to provide data authentication and protection for a suite of monitoring sensors as part of a larger effort to create an arms control technology toolkit. This device, currently called the Red Box, leverages the strengths of both secret and public cryptographic keys to authenticate, digitally sign, and pass along monitoring data to allow for host review, and redaction if necessary, without the loss of confidence in the authenticity of the data by the monitoring party. The design of the Red Box will allow for the addition and removal of monitoring equipment and can also verify that the data was collected by authentic monitoring equipment prior to signing the data and sending it to the host and for review. The host will then forward the data to the monitor for review and inspection. This paper will highlight the progress to date of the Red Box development, and will explain the novel method of leveraging both symmetric and asymmetric (secret and public key) cryptography to authenticate data within a warhead monitoring regime.

  16. A Cryptographic SoC for Robust Protection of Secret Keys in IPTV DRM Systems

    Science.gov (United States)

    Lee, Sanghan; Yang, Hae-Yong; Yeom, Yongjin; Park, Jongsik

    The security level of an internet protocol television (IPTV) digital right management (DRM) system ultimately relies on protection of secret keys. Well known devices for the key protection include smartcards and battery backup SRAMs (BB-SRAMs); however, these devices could be vulnerable to various physical attacks. In this paper, we propose a secure and cost-effective design of a cryptographic system on chip (SoC) that integrates the BB-SRAM with a cell-based design technique. The proposed SoC provides robust safeguard against the physical attacks, and satisfies high-speed and low-price requirements of IPTV set-top boxes. Our implementation results show that the maximum encryption rate of the SoC is 633Mb/s. In order to verify the data retention capabilities, we made a prototype chip using 0.18µm standard cell technology. The experimental results show that the integrated BB-SRAM can reliably retain data with a 1.4µA leakage current.

  17. Protocol based on compressed sensing for high-speed authentication and cryptographic key distribution over a multiparty optical network

    CERN Document Server

    Yu, Wen-Kai; Yao, Xu-Ri; Liu, Xue-Feng; Wu, Ling-An; Zhai, Guang-Jie

    2013-01-01

    We present a protocol for the amplification and distribution of a one-time-pad cryptographic key over a point-to-multipoint optical network based on computational ghost imaging (GI) and compressed sensing (CS). It is shown experimentally that CS imaging can perform faster authentication and increase the key generation rate by an order of magnitude compared with the scheme using computational GI alone. The protocol is applicable for any number of legitimate user, thus, the scheme could be used in real intercity networks where high speed and high security are crucial.

  18. Centralized Cryptographic Key Management and Critical Risk Assessment - CRADA Final Report For CRADA Number NFE-11-03562

    Energy Technology Data Exchange (ETDEWEB)

    Abercrombie, R. K. [ORNL; Peters, Scott [Sypris Electronics, LLC

    2014-05-28

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) Cyber Security for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing Cyber Security for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system

  19. Cryptographic Applications using FPGA Technology

    Directory of Open Access Journals (Sweden)

    Alexandru Coman

    2011-03-01

    Full Text Available Cryptographic systems have become a part of our daily life through the need of security of many common activities such as communication, payments, data transfers etc. The best support in design and implementation of cryptographic applications is offered by embedded systems such as ASICs and FPGAs. In the past few years, the increase in performance of FPGAs has made them key components in implementing cryptographic systems. One of the most important parts of the cryptographic systems is the random number generator used. Combinations of PRNG and TRNG are commonly used. A good and efficient TRNG implementation is very important and can be achieved through FPGA technology.

  20. Cryptographic Hash Functions

    DEFF Research Database (Denmark)

    Thomsen, Søren Steffen

    2009-01-01

    Cryptographic hash functions are commonly used in many different areas of cryptography: in digital signatures and in public-key cryptography, for password protection and message authentication, in key derivation functions, in pseudo-random number generators, etc. Recently, cryptographic hash...... well-known designs, and also some design and cryptanalysis in which the author took part. The latter includes a construction method for hash functions and four designs, of which one was submitted to the SHA-3 hash function competition, initiated by the U.S. standardisation body NIST. It also includes...

  1. Security Requirements for Cryptographic Modules

    Science.gov (United States)

    1999-01-01

    module interfaces; roles, services, and authentication; finite state machine model ; physical security; operating system security; cryptographic key...15 4.4 Finite State Machine Model .......................................................................................................... 17...These areas include cryptographic module specification; module interfaces; roles, services, and authentication; finite state machine model ; physical

  2. Cryptographic Boolean functions and applications

    CERN Document Server

    Cusick, Thomas W

    2009-01-01

    Boolean functions are the building blocks of symmetric cryptographic systems. Symmetrical cryptographic algorithms are fundamental tools in the design of all types of digital security systems (i.e. communications, financial and e-commerce).Cryptographic Boolean Functions and Applications is a concise reference that shows how Boolean functions are used in cryptography. Currently, practitioners who need to apply Boolean functions in the design of cryptographic algorithms and protocols need to patch together needed information from a variety of resources (books, journal articles and other sources). This book compiles the key essential information in one easy to use, step-by-step reference. Beginning with the basics of the necessary theory the book goes on to examine more technical topics, some of which are at the frontier of current research.-Serves as a complete resource for the successful design or implementation of cryptographic algorithms or protocols using Boolean functions -Provides engineers and scient...

  3. CRYPTOGRAPHIC STEGANOGRAPHY

    Directory of Open Access Journals (Sweden)

    Vikas Yadav

    2014-08-01

    Full Text Available In the cryptographic steganography system, the message will first be converted into unreadable cipher and then this cipher will be embedded into an image file. Hence this type of system will provide more security by achieving both data encoding as well as data hiding. In this paper we propose an advanced steganocryptic system that combines the features of cryptography and steganography. In this proposed steganocryptic system we will encrypt the message into cipher1 by using Kunal Secure Astro-Encryption and we again encrypt this cipher to cipher2 by using grid cipher technique. Advantage of Kunal Secure Astro-Encryption is that it generates random useless points in between, thus fixed size messages can be generated providing more security compared to other cryptographic algorithms as the number of characters in original message cannot be found from encrypted message without the knowing the black holes. Now we will embed this cipher2 into image file by using visual steganography .In this proposed steganocryptic system we will use modified bit insertion technique to achieve visual steganography. This proposed system will be more secure than cryptography or steganography techniques[digital steganography] alone and also as compared to steganography and cryptography combined systems.

  4. Multiparty Quantum Cryptographic Protocol

    Institute of Scientific and Technical Information of China (English)

    M. Ramzan; M. K. Khan

    2008-01-01

    We propose a multiparty quantum cryptographic protocol. Unitary operators applied by Bob and Charlie, on their respective qubits of a tripartite entangled state encoding a classical symbol that can be decoded at Alice's end with the help of a decoding matrix. Eve's presence can be detected by the disturbance of the decoding matrix. Our protocol is secure against intercept-resend attacks. Furthermore, it is efficient and deterministic in the sense that two classical bits can be transferred per entangled pair of qubits. It is worth mentioning that in this protocol, the same symbol can be used for key distribution and Eve's detection that enhances the effciency of the protocol.

  5. Critical analysis of the Bennett-Riedel attack on secure cryptographic key distributions via the Kirchhoff-Law-Johnson-noise scheme.

    Directory of Open Access Journals (Sweden)

    Laszlo B Kish

    Full Text Available Recently, Bennett and Riedel (BR (http://arxiv.org/abs/1303.7435v1 argued that thermodynamics is not essential in the Kirchhoff-law-Johnson-noise (KLJN classical physical cryptographic exchange method in an effort to disprove the security of the KLJN scheme. They attempted to demonstrate this by introducing a dissipation-free deterministic key exchange method with two batteries and two switches. In the present paper, we first show that BR's scheme is unphysical and that some elements of its assumptions violate basic protocols of secure communication. All our analyses are based on a technically unlimited Eve with infinitely accurate and fast measurements limited only by the laws of physics and statistics. For non-ideal situations and at active (invasive attacks, the uncertainly principle between measurement duration and statistical errors makes it impossible for Eve to extract the key regardless of the accuracy or speed of her measurements. To show that thermodynamics and noise are essential for the security, we crack the BR system with 100% success via passive attacks, in ten different ways, and demonstrate that the same cracking methods do not function for the KLJN scheme that employs Johnson noise to provide security underpinned by the Second Law of Thermodynamics. We also present a critical analysis of some other claims by BR; for example, we prove that their equations for describing zero security do not apply to the KLJN scheme. Finally we give mathematical security proofs for each BR-attack against the KLJN scheme and conclude that the information theoretic (unconditional security of the KLJN method has not been successfully challenged.

  6. Critical analysis of the Bennett-Riedel attack on secure cryptographic key distributions via the Kirchhoff-Law-Johnson-noise scheme.

    Science.gov (United States)

    Kish, Laszlo B; Abbott, Derek; Granqvist, Claes G

    2013-01-01

    Recently, Bennett and Riedel (BR) (http://arxiv.org/abs/1303.7435v1) argued that thermodynamics is not essential in the Kirchhoff-law-Johnson-noise (KLJN) classical physical cryptographic exchange method in an effort to disprove the security of the KLJN scheme. They attempted to demonstrate this by introducing a dissipation-free deterministic key exchange method with two batteries and two switches. In the present paper, we first show that BR's scheme is unphysical and that some elements of its assumptions violate basic protocols of secure communication. All our analyses are based on a technically unlimited Eve with infinitely accurate and fast measurements limited only by the laws of physics and statistics. For non-ideal situations and at active (invasive) attacks, the uncertainly principle between measurement duration and statistical errors makes it impossible for Eve to extract the key regardless of the accuracy or speed of her measurements. To show that thermodynamics and noise are essential for the security, we crack the BR system with 100% success via passive attacks, in ten different ways, and demonstrate that the same cracking methods do not function for the KLJN scheme that employs Johnson noise to provide security underpinned by the Second Law of Thermodynamics. We also present a critical analysis of some other claims by BR; for example, we prove that their equations for describing zero security do not apply to the KLJN scheme. Finally we give mathematical security proofs for each BR-attack against the KLJN scheme and conclude that the information theoretic (unconditional) security of the KLJN method has not been successfully challenged.

  7. New Cryptosystem Using Multiple Cryptographic Assumptions

    Directory of Open Access Journals (Sweden)

    E. S. Ismail

    2011-01-01

    Full Text Available Problem statement: A cryptosystem is a way for a sender and a receiver to communicate digitally by which the sender can send receiver any confidential or private message by first encrypting it using the receiver’s public key. Upon receiving the encrypted message, the receiver can confirm the originality of the message’s contents using his own secret key. Up to now, most of the existing cryptosystems were developed based on a single cryptographic assumption like factoring, discrete logarithms, quadratic residue or elliptic curve discrete logarithm. Although these schemes remain secure today, one day in a near future they may be broken if one finds a polynomial algorithm that can efficiently solve the underlying cryptographic assumption. Approach: By this motivation, we designed a new cryptosystem based on two cryptographic assumptions; quadratic residue and discrete logarithms. We integrated these two assumptions in our encrypting and decrypting equations so that the former depends on one public key whereas the latter depends on one corresponding secret key and two secret numbers. Each of public and secret keys in our scheme determines the assumptions we use. Results: The newly developed cryptosystem is shown secure against the three common considering algebraic attacks using a heuristic security technique. The efficiency performance of our scheme requires 2Texp+2Tmul +Thash time complexity for encryption and Texp+2Tmul+Tsrt time complexity for decryption and this magnitude of complexity is considered minimal for multiple cryptographic assumptions-like cryptosystems. Conclusion: The new cryptosystem based on multiple cryptographic assumptions offers a greater security level than that schemes based on a single cryptographic assumption. The adversary has to solve the two assumptions simultaneously to recover the original message from the received corresponding encrypted message but this is very unlikely to happen.

  8. Mathematical Background of Public Key Cryptography

    DEFF Research Database (Denmark)

    Frey, Gerhard; Lange, Tanja

    2005-01-01

    The two main systems used for public key cryptography are RSA and protocols based on the discrete logarithm problem in some cyclic group. We focus on the latter problem and state cryptographic protocols and mathematical background material.......The two main systems used for public key cryptography are RSA and protocols based on the discrete logarithm problem in some cyclic group. We focus on the latter problem and state cryptographic protocols and mathematical background material....

  9. Cryptographic Cloud Storage

    Science.gov (United States)

    Kamara, Seny; Lauter, Kristin

    We consider the problem of building a secure cloud storage service on top of a public cloud infrastructure where the service provider is not completely trusted by the customer. We describe, at a high level, several architectures that combine recent and non-standard cryptographic primitives in order to achieve our goal. We survey the benefits such an architecture would provide to both customers and service providers and give an overview of recent advances in cryptography motivated specifically by cloud storage.

  10. Algorithms for improved performance in cryptographic protocols.

    Energy Technology Data Exchange (ETDEWEB)

    Schroeppel, Richard Crabtree; Beaver, Cheryl Lynn

    2003-11-01

    Public key cryptographic algorithms provide data authentication and non-repudiation for electronic transmissions. The mathematical nature of the algorithms, however, means they require a significant amount of computation, and encrypted messages and digital signatures possess high bandwidth. Accordingly, there are many environments (e.g. wireless, ad-hoc, remote sensing networks) where public-key requirements are prohibitive and cannot be used. The use of elliptic curves in public-key computations has provided a means by which computations and bandwidth can be somewhat reduced. We report here on the research conducted in an LDRD aimed to find even more efficient algorithms and to make public-key cryptography available to a wider range of computing environments. We improved upon several algorithms, including one for which a patent has been applied. Further we discovered some new problems and relations on which future cryptographic algorithms may be based.

  11. New Eavesdropper Detection Method in Quantum Cryptograph

    Directory of Open Access Journals (Sweden)

    Cătălin Anghel

    2011-12-01

    Full Text Available ecurity of quantum cryptographic algorithms is one of the main research directions in quantum cryptography. Security growth of the quantum key distribution systems can be realized by detecting the eavesdropper quickly, precisely and without letting any secret information in the hands of the enemy. This paper proposes a new method, named QBTT, to detect the enemy who try to tap the communication channel. The QBTT method can be implemented in every type of quantum key distribution scheme.

  12. CRYPTOGRAPHIC PROTOCOL DEPENDING ON BIOMETRIC AUTHENTICATION

    Directory of Open Access Journals (Sweden)

    SANJUKTA PAL

    2013-02-01

    Full Text Available In modern age, security is the most challenging issue for using the secure data used by computer. This cryptographic protocol on biometric authentication is nothing but the combination of cryptography and biometric authentication. Here the same idea of cryptography is working (i.e. using key, conversion of plain textinto cipher text called encryption and the reverse, means cipher text to plain text called decryption. Here the most promising method fingerprint geometry of biometric authentication is used as the key for encryption and decryption. Here this cryptographic protocol is just an algorithm for matching the key means matching of stored fingerprint images say DB Images with further given fingerprint image say Final Image. For matching purpose we used binary conversion of images. This algorithm is suitable for any type of data (means text data, multimedia data etc.

  13. Cryptographic Hash functions - a review

    Directory of Open Access Journals (Sweden)

    Rajeev Sobti

    2012-03-01

    Full Text Available Cryptographic Hash functions are used to achieve a number of security objectives. In this paper, we bring out the importance of hash functions, its various structures, design techniques, attacks and the progressive recent development in this field.

  14. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security...

  15. Wireless Secured Data Transmission using Cryptographic Techniques through FPGA

    Directory of Open Access Journals (Sweden)

    I.Rama Satya Nageswara Rao

    2016-02-01

    Full Text Available The need to protect the data disturbances and unauthorized access in communication has led to development of several cryptographic algorithms. Current issue in modern world as popularity of internet, e-commerce and communication technologies has emerging and they became the medium to security threats. Due to advancement in cryptographic techniques the DNA technique is a new crypto algorithm to encrypt and decrypt data. It consists of two stage encryption based on DNA sequence enhances the data security compared to conventional methods. In encryption process the former stage will encrypt the data (plain text with a random key generated by random DNA sequence generator. Latter and final stage the encrypted data is re-encrypted with DNA translation to generate cipher. The cryptographic techniques (symmetric algorithm is designed and simulated using Xilinx ISE and targeted on Spartan-3E FPGA interfaced with ZigBee for wireless communication.

  16. Pythagorean Triples and Cryptographic Coding

    CERN Document Server

    Kak, Subhash

    2010-01-01

    This paper summarizes basic properties of PPTs and shows that each PPT belongs to one of six different classes. Mapping an ordered sequence of PPTs into a corresponding sequence of these six classes makes it possible to use them in cryptography. We pose problems whose solution would facilitate such cryptographic application.

  17. Cryptographically enforced search pattern hiding

    NARCIS (Netherlands)

    Bösch, Christoph Tobias

    2015-01-01

    Searchable encryption is a cryptographic primitive that allows a client to out- source encrypted data to an untrusted storage provider, while still being able to query the data without decrypting. To allow the server to perform the search on the encrypted data, a so-called trapdoor is generated by t

  18. Probability Distributions over Cryptographic Protocols

    Science.gov (United States)

    2009-06-01

    exception. Cryptyc integrates use of pattern- matching in the spi calculus framework , which in turn allows the specification of nested cryptographic...programs too: the metaheuristic search for security protocols,” Information and Software Technology, vol. 43, pp. 891– 904, December 2001. 131 [9] X

  19. Cryptographic Hash Functions

    DEFF Research Database (Denmark)

    Gauravaram, Praveen; Knudsen, Lars Ramkilde

    2010-01-01

    value should not serve as an image for two distinct input messages and it should be difficult to find the input message from a given hash value. Secure hash functions serve data integrity, non-repudiation and authenticity of the source in conjunction with the digital signature schemes. Keyed hash...

  20. Rationality in the Cryptographic Model

    DEFF Research Database (Denmark)

    Hubacek, Pavel

    This thesis presents results in the field of rational cryptography. In the first part we study the use of cryptographic protocols to avoid mediation and binding commitment when implementing game theoretic equilibrium concepts. First, we concentrate on the limits of cryptographic cheap talk....... The second part presents a study of the problem of verifiable delegation of computation in the rational setting. We define rational arguments, an extension of the recent concept of rational proofs into the computational setting, and give a single round delegation scheme for the class NC1, of search problems...... computable by log-space uniform circuits of logarithmic depth, with a sub-linear time verifier. While our approach provides a weaker (yet arguably meaningful) guarantee of soundness, it compares favorably with each of the known delegation schemes in at least one aspect. Our protocols are simple, rely...

  1. A secured Cryptographic Hashing Algorithm

    CERN Document Server

    Mohanty, Rakesh; Bishi, Sukant kumar

    2010-01-01

    Cryptographic hash functions for calculating the message digest of a message has been in practical use as an effective measure to maintain message integrity since a few decades. This message digest is unique, irreversible and avoids all types of collisions for any given input string. The message digest calculated from this algorithm is propagated in the communication medium along with the original message from the sender side and on the receiver side integrity of the message can be verified by recalculating the message digest of the received message and comparing the two digest values. In this paper we have designed and developed a new algorithm for calculating the message digest of any message and implemented t using a high level programming language. An experimental analysis and comparison with the existing MD5 hashing algorithm, which is predominantly being used as a cryptographic hashing tool, shows this algorithm to provide more randomness and greater strength from intrusion attacks. In this algorithm th...

  2. Key Aspects for Developing Your Instructional Materials

    Directory of Open Access Journals (Sweden)

    Núñez Pardo Astrid

    2004-08-01

    Full Text Available This article describes crucial aspects that EFL teachers must consider for the elaboration of materials to support the instructional design component of their classes. It also emphasizes that language educators should not only maintain a balance between theory and practice when developing their didactic resources, but they also should keep themselves updated in terms of the latest research in the language education field. The article also addresses key questions teachers should formulate before beginning the process of design, and provides useful ideas to develop dynamic, content enriching, and visually attractive materials. Key words: Course Design, Material Design, Motivational Design, Content Enriching Materials, Attractive Layouts, Teachers’ Creativity Este artículo describe aspectos cruciales que los docentes de inglés como lengua extranjera deben tener en cuenta para la elaboración de materiales de apoyo del componente de instrucción de sus clases. También enfatiza que los docentes de lengua extranjera no solamente deben mantener un balance entre la teoría y la práctica al desarrollar sus ayudas didácticas, sino que también deben mantenerse actualizados en términos de los más recientes avances de la investigación en el campo de la educación en lenguas. El artículo discute preguntas claves que los maestros deben formular antes de comenzar el proceso de diseño y brinda ideas útiles para el desarrollo de materiales con contenidos enriquecedores y que resulten dinámicos y atractivos visualmente. Palabras claves: Diseño de Cursos, Diseño de Materiales, Contenidos Enriquecedores, Esquemas Llamativos, Creatividad Docente

  3. Raptor Codes and Cryptographic Issues

    CERN Document Server

    Malinen, Mikko

    2008-01-01

    In this paper two cryptographic methods are introduced. In the first method the presence of a certain size subgroup of persons can be checked for an action to take place. For this we use fragments of Raptor codes delivered to the group members. In the other method a selection of a subset of objects can be made secret. Also, it can be proven afterwards, what the original selection was.

  4. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  5. Cryptographic Hash Functions

    DEFF Research Database (Denmark)

    Gauravaram, Praveen; Knudsen, Lars Ramkilde

    2010-01-01

    value should not serve as an image for two distinct input messages and it should be difficult to find the input message from a given hash value. Secure hash functions serve data integrity, non-repudiation and authenticity of the source in conjunction with the digital signature schemes. Keyed hash...... important applications has also been analysed. This successful cryptanalysis of the standard hash functions has made National Institute of Standards and Technology (NIST), USA to initiate an international public competition to select the most secure and efficient hash function as the future hash function...... based MACs are reported. The goals of NIST's SHA-3 competition and its current progress are outlined....

  6. Physically unclonable cryptographic primitives using self-assembled carbon nanotubes

    Science.gov (United States)

    Hu, Zhaoying; Comeras, Jose Miguel M. Lobez; Park, Hongsik; Tang, Jianshi; Afzali, Ali; Tulevski, George S.; Hannon, James B.; Liehr, Michael; Han, Shu-Jen

    2016-06-01

    Information security underpins many aspects of modern society. However, silicon chips are vulnerable to hazards such as counterfeiting, tampering and information leakage through side-channel attacks (for example, by measuring power consumption, timing or electromagnetic radiation). Single-walled carbon nanotubes are a potential replacement for silicon as the channel material of transistors due to their superb electrical properties and intrinsic ultrathin body, but problems such as limited semiconducting purity and non-ideal assembly still need to be addressed before they can deliver high-performance electronics. Here, we show that by using these inherent imperfections, an unclonable electronic random structure can be constructed at low cost from carbon nanotubes. The nanotubes are self-assembled into patterned HfO2 trenches using ion-exchange chemistry, and the width of the trench is optimized to maximize the randomness of the nanotube placement. With this approach, two-dimensional (2D) random bit arrays are created that can offer ternary-bit architecture by determining the connection yield and switching type of the nanotube devices. As a result, our cryptographic keys provide a significantly higher level of security than conventional binary-bit architecture with the same key size.

  7. Summary Report on Rational Cryptographic Protocols

    DEFF Research Database (Denmark)

    Alwen, Joël; Cachin, Christian; Pereira, Olivier

    This report gives an overview of some of the models and techniques in rational cryptography, an emerging research area which in particular uses the methodologies and techniques of game theory to analyze cryptographic protocols and which uses cryptographic protocol theory to implement game theoretic...

  8. Cryptographer

    Science.gov (United States)

    Sullivan, Megan

    2005-01-01

    For the general public, the field of cryptography has recently become famous as the method used to uncover secrets in Dan Brown's fictional bestseller, The Da Vinci Code. But the science of cryptography has been popular for centuries--secret hieroglyphics discovered in Egypt suggest that code-making dates back almost 4,000 years. In today's…

  9. The Laws of Physics and Cryptographic Security

    CERN Document Server

    Rudolph, T

    2002-01-01

    This paper consists of musings that originate mainly from conversations with other physicists, as together we've tried to learn some cryptography, but also from conversations with a couple of classical cryptographers. The main thrust of the paper is an attempt to explore the ramifications for cryptographic security of incorporating physics into our thinking at every level. I begin by discussing two fundamental cryptographic principles, namely that security must not rely on secrecy of the protocol and that our local environment must be secure, from a physical perspective. I go on to explain why by definition a particular cryptographic task, oblivious transfer, is inconsistent with a belief in the validity of quantum mechanics. More precisely, oblivious transfer defines states and operations that do not exist in any (complex) Hilbert space. I go on to argue the fallaciousness of a "black box" approach to quantum cryptography, in which classical cryptographers just trust physicists to provide them with secure qu...

  10. Hybrid Cryptographic Processor for Secure Communication Using FPGA

    OpenAIRE

    Savitha Raj.S; Merlin Sharmila.A; Poorinima Beneta.P

    2013-01-01

    Cryptographic hash functions are mainly used for the purpose of authentication and for integrity of messages. In this paper, we investigate high-speed, efficient hardware algorithm which is a combination of both RSA and BLAKE for providing privacy and security in data networks including encryption/decryption. Hash function- BLAKE is a new standard candidate algorithm; it is one of the finalists in the SHA-3 competition by NIST. RSA is the asymmetric public key cryptography system. Since this ...

  11. Cryptographic Protocols under Quantum Attacks

    CERN Document Server

    Lunemann, Carolin

    2011-01-01

    The realm of this thesis is cryptographic protocol theory in the quantum world. We study the security of quantum and classical protocols against adversaries that are assumed to exploit quantum effects to their advantage. Security in the quantum world means that quantum computation does not jeopardize the assumption, underlying the protocol construction. But moreover, we encounter additional setbacks in the security proofs, which are mostly due to the fact that some well-known classical proof techniques are forbidden by certain properties of a quantum environment. Interestingly, we can exploit some of the very same properties to the benefit of quantum cryptography. Thus, this work lies right at the heart of the conflict between highly potential effects but likewise rather demanding conditions in the quantum world.

  12. Key micromechanics issues in integrated material design

    Science.gov (United States)

    Bennoura, M.; Aboutajeddine, A.

    2017-03-01

    Nowadays the acceleration of material discovery is essential more than ever to hold the fast evolving requirements of innovative products. This acceleration depends on our ability to set up a material design process for tailoring materials from targeted engineering performances. One of the important building block passages, in the material design journey, is the bridging of micro-scale to meso-scale through micromechanical models. Unfortunately, these models include a lot of uncertainties resulting from their inbuilt ad-hoc assumptions, which inevitably impacts the material design process performance. In the present paper, robust design methods are reviewed and subsequently applied to quantify uncertainty in micromechanical models and mitigate its impact on material design performances. This includes examining principles for evaluating the level degree of uncertainty on material design process, and their use in micromechanical models. Also, developing robust design approaches to alleviate uncertainty effects and improve the quality of the design performance. Ultimately, the limitations of these approaches are discussed and the research opportunities, to overcome the shortness of actual approaches in respect to micromechanical models, are clarified.

  13. A Rational Approach to Cryptographic Protocols

    CERN Document Server

    Caballero-Gil, P; Bruno-Castañeda, C; 10.1016/j.mcm.2006.12.013

    2010-01-01

    This work initiates an analysis of several cryptographic protocols from a rational point of view using a game-theoretical approach, which allows us to represent not only the protocols but also possible misbehaviours of parties. Concretely, several concepts of two-person games and of two-party cryptographic protocols are here combined in order to model the latters as the formers. One of the main advantages of analysing a cryptographic protocol in the game-theory setting is the possibility of describing improved and stronger cryptographic solutions because possible adversarial behaviours may be taken into account directly. With those tools, protocols can be studied in a malicious model in order to find equilibrium conditions that make possible to protect honest parties against all possible strategies of adversaries.

  14. Construction and analysis of cryptographic functions

    CERN Document Server

    Budaghyan, Lilya

    2015-01-01

    This book covers novel research on construction and analysis of optimal cryptographic functions such as almost perfect nonlinear (APN), almost bent (AB), planar and bent functions. These functions have optimal resistance to linear and/or differential attacks, which are the two most powerful attacks on symmetric cryptosystems. Besides cryptographic applications, these functions are significant in many branches of mathematics and information theory including coding theory, combinatorics, commutative algebra, finite geometry, sequence design and quantum information theory. The author analyzes equ

  15. William Friedman, Geneticist Turned Cryptographer.

    Science.gov (United States)

    Goldman, Irwin L

    2017-05-01

    William Friedman (1891-1969), trained as a plant geneticist at Cornell University, was employed at Riverbank Laboratories by the eccentric millionaire George Fabyan to work on wheat breeding. Friedman, however, soon became intrigued by and started working on a pet project of Fabyan's involving the conjecture that Francis Bacon, a polymath known for the study of ciphers, was the real author of Shakespeare's plays. Thus, beginning in ∼1916, Friedman turned his attention to the so called "Baconian cipher," and developed decryption techniques that bore similarity to approaches for solving problems in population genetics. His most significant, indeed pathbreaking, work used ideas from genetics and statistics, focusing on analysis of the frequencies of letters in language use. Although he had transitioned from being a geneticist to a cryptographer, his earlier work had resonance in his later pursuits. He soon began working directly for the United States government and produced solutions used to solve complex military ciphers, in particular to break the Japanese Purple code during World War II. Another important legacy of his work was the establishment of the Signal Intelligence Service and eventually the National Security Agency. Copyright © 2017 by the Genetics Society of America.

  16. Chaotic cryptographic scheme and its randomness evaluation

    Science.gov (United States)

    Stoyanov, B. P.

    2012-10-01

    We propose a new cryptographic scheme based on the Lorenz chaos attractor and 32 bit bent Boolean function. We evaluated the keystream generated by the scheme with batteries of the NIST statistical tests. We also applied a number of statistical analysis techniques, such as calculating histograms, correlations between two adjacent pixels, information entropy, and differential resistance, all refer to images encrypted by the proposed system. The results of the analysis show that the new cryptographic scheme ensures a secure way for sending digital data with potential applications in real-time image encryption.

  17. PROPERTIES AND APPROACH OF CRYPTOGRAPHIC HASH ALGORITHMS

    Directory of Open Access Journals (Sweden)

    T.LALITHA

    2010-06-01

    Full Text Available The importance of hash functions for protecting the authenticity of information is demonstrated. Applications include integrity protection, conventional message authentication and digital signatures. An overview is given of the study of basic building blocks of cryptographic hash functions leads to the study of the cryptographic properties of Boolean functions and the information theoretic approach to authentication is described. An overview is given of the complexity theoretic definitions and constructions .New criteria are defined and functions satisfying new and existing criteria are studied.

  18. Cryptographic primitives based on cellular transformations

    Directory of Open Access Journals (Sweden)

    B.V. Izotov

    2003-11-01

    Full Text Available Design of cryptographic primitives based on the concept of cellular automata (CA is likely to be a promising trend in cryptography. In this paper, the improved method performing data transformations by using invertible cyclic CAs (CCA is considered. Besides, the cellular operations (CO as a novel CAs application in the block ciphers are introduced. Proposed CCAs and COs, integrated under the name of cellular transformations (CT, suit well to be used in cryptographic algorithms oriented to fast software and cheap hardware implementation.

  19. A Partially Non-Cryptographic Security Routing Protocol in Mobile Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    CHEN Jing; CUI Guohua

    2006-01-01

    In this paper, we propose a partially non-cryptographic security routing protocol(PNCSR ) that protects both routing and data forwarding operations through the same reactive approach. PNCSR only apply public-key cryptographic system in managing token, but it doesn't utilize any cryptographic primitives on the routing messages. In PNCSR, each node is fair. Local neighboring nodes collaboratively monitor each other and sustain each other. It also uses a novel credit strategy which additively increases the token lifetime each time a node renews its token. We also analyze the storage, computation, and communication overhead of PNCSR, and provide a simple yet meaningful overhead comparison. Finally, the simulation results show the effectiveness of PNCSR in various situations.

  20. A Verifiable Language for Cryptographic Protocols

    DEFF Research Database (Denmark)

    Nielsen, Christoffer Rosenkilde

    We develop a formal language for specifying cryptographic protocols in a structured and clear manner, which allows verification of many interesting properties; in particular confidentiality and integrity. The study sheds new light on the problem of creating intuitive and human readable languages...

  1. Some Attacks On Quantum-based Cryptographic Protocols

    CERN Document Server

    Lo, H K; Lo, Hoi-Kwong; Ko, Tsz-Mei

    2003-01-01

    Quantum-based cryptographic protocols are often said to enjoy security guaranteed by the fundamental laws of physics. However, subtle attacks that are outside the original design of the protocols may allow eavesdroppers to break those protocols. As an example, we will give a peeking attack against a quantum key distribution scheme based on quantum memory. Moreover, if technological assumptions are made in the design of a quantum-based cryptographic protocol, then the actual security of the protocol may fall short of expectations. This is because it is often hard to quantify those technological assumptions in a precise manner. Here, we give an attack against a recently proposed ``secure communication using coherent state scheme''. Our attack requires only beamsplitters and the replacement of a lossy channel by a lossless one. It is successful provided that the original loss in the channel is so big that Eve can obtain 2^k copies of what Bob receives, where k is the length of the seed key pre-shared by Alice an...

  2. Appliance of Neuron Networks in Cryptographic Systems

    Directory of Open Access Journals (Sweden)

    Mohammed Al-Maitah

    2014-01-01

    Full Text Available This study is dedicated to the examination of a problem of postquantum encryption algorithms which are connected with a potential crisis in modern cryptography that is caused by appearance of quantum computers. General problem formulation is given as well as an example of danger from the quantum algorithms against classical cryptosystems. Existing postquantum systems are analyzed and the complication of their realization and cryptosecurity are estimated. Among the others algorithms on the basis of neural networks are chosen as a starting point. The study demonstrates neuro cryptographic protocol based on a three-level neural network of the direct propagation. There was evaluated it’s cryptosecurity and analyzed three types of this algorithm attack to show the reality of the hypothesis that neuro cryptography is currently one of the most promising post quantum cryptographic systems.

  3. Symmetric cryptographic protocols for extended millionaires' problem

    Institute of Scientific and Technical Information of China (English)

    LI ShunDong; WANG DaoShun; DAI YiQi

    2009-01-01

    Yao's millionaires' problem is a fundamental problem in secure multiparty computation, and its solutions have become building blocks of many secure multiparty computation solutions. Unfortunately,most protocols for millionaires' problem are constructed based on public cryptography, and thus are inefficient. Furthermore, all protocols are designed to solve the basic millionaires' problem, that is,to privately determine which of two natural numbers is greater. If the numbers are real, existing solutions do not directly work. These features limit the extensive application of the existing protocols. This study introduces and refines the first symmetric cryptographic protocol for the basic millionaires' problem, and then extends the symmetric cryptographic protocol to privately determining which of two real numbers is greater, which are called the extended millionaires' problem, and proposes corresponding Constructed based on symmetric cryptography, these protocols are very efficient.

  4. Cryptographic Protocols Based on Root Extracting

    DEFF Research Database (Denmark)

    Koprowski, Maciej

    In this thesis we design new cryptographic protocols, whose security is based on the hardness of root extracting or more speci cally the RSA problem. First we study the problem of root extraction in nite Abelian groups, where the group order is unknown. This is a natural generalization of the...... complexity of root extraction, even if the algorithm can choose the "public exponent'' itself. In other words, both the standard and the strong RSA assumption are provably true w.r.t. generic algorithms. The results hold for arbitrary groups, so security w.r.t. generic attacks follows for any cryptographic...... construction based on root extracting. As an example of this, we modify Cramer-Shoup signature scheme such that it becomes a genericm algorithm. We discuss then implementing it in RSA groups without the original restriction that the modulus must be a product of safe primes. It can also be implemented in class...

  5. Algebra model and security analysis for cryptographic protocols

    Institute of Scientific and Technical Information of China (English)

    HUAI Jinpeng; LI Xianxian

    2004-01-01

    More and more cryptographic protocols have been used to achieve various security requirements of distributed systems in the open network environment. However cryptographic protocols are very difficult to design and analyze due to the complexity of the cryptographic protocol execution, and a large number of problems are unsolved that range from the theory framework to the concrete analysis technique. In this paper, we build a new algebra called cryptographic protocol algebra (CPA) for describing the message operations with many cryptographic primitives, and proposed a new algebra model for cryptographic protocols based on the CPA. In the model, expanding processes of the participant's knowledge on the protocol runs are characterized with some algebraic notions such as subalgebra, free generator and polynomial algebra, and attack processes are modeled with a new notion similar to that of the exact sequence used in homological algebra. Then we develope a mathematical approach to the cryptographic protocol security analysis. By using algebraic techniques, we have shown that for those cryptographic protocols with some symmetric properties, the execution space generated by an arbitrary number of participants may boil down to a smaller space generated by several honest participants and attackers. Furthermore we discuss the composability problem of cryptographic protocols and give a sufficient condition under which the protocol composed of two correct cryptographic protocols is still correct, and we finally offer a counterexample to show that the statement may not be true when the condition is not met.

  6. Cryptographic hash functions. Trends and challenges

    Directory of Open Access Journals (Sweden)

    Rodica Tirtea

    2009-10-01

    Full Text Available Hash functions are important in cryptography due to their use in data integrity and message authentication. Different cryptographicimplementations rely on the performance and strength of hash functions to answer the need for integrity and authentication. This paper gives an overview of cryptographic hash functions used or evaluated today. Hash functions selected in NESSIE and CRYPTREC projects are shortly presented. SHA-3 selection initiative is alsointroduced.

  7. PACE: Proactively Secure Accumulo with Cryptographic Enforcement

    Science.gov (United States)

    2017-05-27

    modify data using digital signatures . The contributions of our work include: • Cryptographic enforcement of access control. The PACE library allows...the impact of encryption and signatures on operation throughput. I. INTRODUCTION Over the last several years, many companies have moved their...second). This evaluation demonstrates that while encryp- tion and signatures have an impact on throughput, the impact is small enough to be

  8. CRYPTOGRAPHIC PROTOCOLS SPECIFICATION AND VERIFICATION TOOLS - A SURVEY

    Directory of Open Access Journals (Sweden)

    Amol H Shinde

    2017-06-01

    Full Text Available Cryptographic protocols cannot guarantee the secure operations by merely using state-of-the-art cryptographic mechanisms. Validation of such protocols is done by using formal methods. Various specialized tools have been developed for this purpose and are being used to validate real life cryptographic protocols. These tools give feedback to the designers of protocols in terms of loops and attacks in protocols to improve security. In this paper, we discuss the brief history of formal methods and tools that are useful for the formal verification of the cryptographic protocols.

  9. Formalizing the Relationship Between Commitment and Basic Cryptographic Primitives

    Directory of Open Access Journals (Sweden)

    S. Sree Vivek

    2016-11-01

    Full Text Available Signcryption is a cryptographic primitive which offers the functionality of both digital signature and encryption with lower combined computational cost. On the other hand, commitment scheme allows an entity to commit to a value, where the entity reveals the committed value later during a decommit phase. In this paper, we explore the connection between commitment schemes, public key encryption, digital signatures and signcryption. We establish formal relationship between commitment and the other primitives. Our main result is that we show signcryption can be used as a commitment scheme with appropriate security notions. We show that if the underlying signcryption scheme is IND-CCA2 secure, then the hiding property of the commitment scheme is satisfied. Similarly, we show that if the underlying signcryption scheme is unforgeable, then the relaxed biding property of the commitment scheme is satisfied. Moreover, we prove that if the underlying signcryption scheme is NM-CCA2, then the commitment scheme is non-malleable.

  10. 基于公开密钥算法的移动位置隐私保护%Protecting mobile location privacy based on public-key cryptographic algorithm

    Institute of Scientific and Technical Information of China (English)

    陈渝文; 李晓宇

    2016-01-01

    为保证位置信息查询服务的安全性和保密性,提出基于公开密钥算法的移动位置隐私保护方法.引入混淆服务器,用地理位置信息服务器的公有密钥加密用户发出的查询,经过混淆服务器转发给地理位置信息服务器.由于查询经过加密,所以混淆服务器不知道用户查询的内容和当前的位置信息,地理位置信息服务器知道有用户查询,但不知道用户的实体信息.实验结果表明,该方法能够以很小代价更好地保护用户的位置隐私.%To ensure the security and confidentiality of location based services,a mobile location privacy protection method based on public-key cryptography was presented.A confusion server was introduced.Queries issued by the users were encrypted with the public key of location information server,which were forwarded by the confusion server to location information server.The method can protect user's location privacy,because the query is encrypted,the confusion server does not know the contents of the user's query and the current location information.Location information server only knows the query,but does not know user's entity information.The experimental results show that the method can protect the user's location privacy better with marginal cost.

  11. Ant-Crypto, a Cryptographer for Data Encryption Standard

    Directory of Open Access Journals (Sweden)

    Salabat Khan

    2013-01-01

    Full Text Available Swarm Intelligence and Evolutionary Techniques are attracting the cryptanalysts in the field of cryptography. This paper presents a novel swarm based attack called Ant-Crypto (Ant-Cryptographer for the cryptanalysis of Data Encryption Standard (DES. Ant-Crypto is based on Binary Ant Colony Optimization (BACO i.e. a binary search space based directed graph is modeled for efficiently searching the optimum result (an original encryption key, in our case. The reason that why evolutionary techniques are becoming attractive is because of the inapplicability of traditional techniques and brute force attacks against feistel ciphers due to their inherent structure based on high nonlinearity and low autocorrelation. Ant-Crypto uses a known-plaintext attack to recover the secret key of DES which is required to break/ decipher the secret messages. Ant-Crypto iteratively searches for the secret key while generating several candidate optimum keys that are guessed across different runs on the basis of routes completed by ants. These optimum keys are then used to find each individual bit of the 56 bit secret key used during encryption by DES. Ant-Crypto is compared with some other state of the art evolutionary based attacks i.e. Genetic Algorithm and Comprehensive Binary Particle Swarm Optimization. The experimental results show that Ant-Crypto is an effective evolutionary attack against DES and can deduce large number of valuable bits as compared to other evolutionary algorithms; both in terms of time and space complexity.

  12. An Efficient Cryptographic Hash Algorithm (BSA)

    CERN Document Server

    Mukherjee, Subhabrata; Laha, Anirban

    2012-01-01

    Recent cryptanalytic attacks have exposed the vulnerabilities of some widely used cryptographic hash functions like MD5 and SHA-1. Attacks in the line of differential attacks have been used to expose the weaknesses of several other hash functions like RIPEMD, HAVAL. In this paper we propose a new efficient hash algorithm that provides a near random hash output and overcomes some of the earlier weaknesses. Extensive simulations and comparisons with some existing hash functions have been done to prove the effectiveness of the BSA, which is an acronym for the name of the 3 authors.

  13. Cryptographic Combinatorial Clock-Proxy Auctions

    Science.gov (United States)

    Parkes, David C.; Rabin, Michael O.; Thorpe, Christopher

    We present a cryptographic protocol for conducting efficient, provably correct and secrecy-preserving combinatorial clock-proxy auctions. The “clock phase” functions as a trusted auction despite price discovery: bidders submit encrypted bids, and prove for themselves that they meet activity rules, and can compute total demand and thus verify price increases without revealing any information about individual demands. In the sealed-bid “proxy phase”, all bids are revealed the auctioneer via time-lapse cryptography and a branch-and-bound algorithm is used to solve the winner-determination problem. Homomorphic encryption is used to prove the correctness of the solution, and establishes the correctness of the solution to any interested party. Still an NP-hard optimization problem, the use of homomorphic encryption imposes additional computational time on winner-determination that is linear in the size of the branch-and-bound search tree, and thus roughly linear in the original (search-based) computational time. The result is a solution that avoids, in the usual case, the exponential complexity of previous cryptographically-secure combinatorial auctions.

  14. SD-REE: A Cryptographic Method to Exclude Repetition from a Message

    CERN Document Server

    Dey, Somdip

    2012-01-01

    In this paper, the author presents a new cryptographic technique, SD-REE, to exclude the repetitive terms in a message, when it is to be encrypted, so that it becomes almost impossible for a person to retrieve or predict the original message from the encrypted message. In modern world, cryptography hackers try to break a code or cryptographic algorithm [1,2] or retrieve the key, used for encryption, by inserting repetitive bytes / characters in the message and encrypt the message or by analyzing repetitions in the encrypted message, to find out the encryption algorithm or retrieve the key used for the encryption. But in SD-REE method the repetitive bytes / characters are removed and there is no trace of any repetition in the message, which was encrypted.

  15. Protecting Cryptographic Keys and Functions from Malware Attacks

    Science.gov (United States)

    2010-12-01

    and values in each of various stages in the scrambling process. The possible attack routes are explained in Section 2.4 and analyzed in Section 2.5...February 2011, pp 28-43). 4. X. Li, P. Parker, and S. Xu. A Probabilistic Characterization of A Fault-Tolerant Gossiping Algorithm. Journal of Systems...4856, pp. 228-246, Springer, 2007. 7. Xiaohu Li, T. Paul Parker, and Shouhuai Xu. A Stochastic Characterization of a Fault-Tolerant Gossip Algorithm

  16. Cryptographic keys from noisy data, theory and applications

    NARCIS (Netherlands)

    Buhan, I.R.

    2008-01-01

    Biometric security systems that verify a person's identity by scanning fingers, hands, eye or face are becoming more and more common. As a result biometrics is one of the fastest growing industries. Applications for biometrics range from homeland security physical access to various facilities and

  17. Cryptographic keys from noisy data, theory and applications

    NARCIS (Netherlands)

    Buhan, Ileana Rozalia

    2008-01-01

    Biometric security systems that verify a person's identity by scanning fingers, hands, eye or face are becoming more and more common. As a result biometrics is one of the fastest growing industries. Applications for biometrics range from homeland security physical access to various facilities and he

  18. Public key cryptography from weaker assumptions

    DEFF Research Database (Denmark)

    Zottarel, Angela

    This dissertation is focused on the construction of public key cryptographic primitives and on the relative security analysis in a meaningful theoretic model. This work takes two orthogonal directions. In the first part, we study cryptographic constructions preserving their security properties also...

  19. Physical cryptographic verification of nuclear warheads

    Science.gov (United States)

    Kemp, R. Scott; Danagoulian, Areg; Macdonald, Ruaridh R.; Vavrek, Jayson R.

    2016-08-01

    How does one prove a claim about a highly sensitive object such as a nuclear weapon without revealing information about the object? This paradox has challenged nuclear arms control for more than five decades. We present a mechanism in the form of an interactive proof system that can validate the structure and composition of an object, such as a nuclear warhead, to arbitrary precision without revealing either its structure or composition. We introduce a tomographic method that simultaneously resolves both the geometric and isotopic makeup of an object. We also introduce a method of protecting information using a provably secure cryptographic hash that does not rely on electronics or software. These techniques, when combined with a suitable protocol, constitute an interactive proof system that could reject hoax items and clear authentic warheads with excellent sensitivity in reasonably short measurement times.

  20. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  1. Cryptographic Protocols Based on Root Extracting

    DEFF Research Database (Denmark)

    Koprowski, Maciej

    In this thesis we design new cryptographic protocols, whose security is based on the hardness of root extracting or more speci cally the RSA problem. First we study the problem of root extraction in nite Abelian groups, where the group order is unknown. This is a natural generalization of the...... construction based on root extracting. As an example of this, we modify Cramer-Shoup signature scheme such that it becomes a genericm algorithm. We discuss then implementing it in RSA groups without the original restriction that the modulus must be a product of safe primes. It can also be implemented in class......,  providing a currently acceptable level of security. This allows us to propose the rst practical blind signature scheme provably secure, without relying on heuristics called random oracle model (ROM). We obtain the protocol for issuing blind signatures by implementing our modi ed Fischlin's signing algorithm...

  2. Evaluation of Information Leakage from Cryptographic Hardware via Common-Mode Current

    Science.gov (United States)

    Hayashi, Yu-Ichi; Homma, Naofumi; Mizuki, Takaaki; Sugawara, Takeshi; Kayano, Yoshiki; Aoki, Takafumi; Minegishi, Shigeki; Satoh, Akashi; Sone, Hideaki; Inoue, Hiroshi

    This paper presents a possibility of Electromagnetic (EM) analysis against cryptographic modules outside their security boundaries. The mechanism behind the information leakage is explained from the view point of Electromagnetic Compatibility: electric fluctuation released from cryptographic modules can conduct to peripheral circuits based on ground bounce, resulting in radiation. We demonstrate the consequence of the mechanism through experiments where the ISO/IEC standard block cipher AES (Advanced Encryption Standard) is implemented on an FPGA board and EM radiations from power and communication cables are measured. Correlation Electromagnetic Analysis (CEMA) is conducted in order to evaluate the information leakage. The experimental results show that secret keys are revealed even though there are various disturbing factors such as voltage regulators and AC/DC converters between the target module and the measurement points. We also discuss information-suppression techniques as electrical-level countermeasures against such CEMAs.

  3. Evolution of Electronic Passport Scheme using Cryptographic Protocol along with Biometrics Authentication System

    Directory of Open Access Journals (Sweden)

    V.K. Narendira Kumar

    2012-03-01

    Full Text Available Millions of citizens around the world have already acquired their new electronic passport. The e-passport is equipped with contactless chip which stores personal data of the passport holder, information about the passport and the issuing institution, as well as with a multiple biometrics enabling cryptographic functionality. Countries are required to build a Public Key Infrastructure, biometric and Radio Frequency Identification to support various cryptographic, as this is considered the basic tools to prove the authenticity and integrity of the Machine Readable Travel Documents. The large-scale worldwide PKI is construction, by means of bilateral trust relationships between Countries. Investigate the good practices, which are essential for the establishment of a global identification scheme based on e-passports. The paper explores the privacy and security implications of this impending worldwide experiment in biometrics authentication technology.

  4. Cryptographic applications of analytic number theory complexity lower bounds and pseudorandomness

    CERN Document Server

    2003-01-01

    The book introduces new ways of using analytic number theory in cryptography and related areas, such as complexity theory and pseudorandom number generation. Key topics and features: - various lower bounds on the complexity of some number theoretic and cryptographic problems, associated with classical schemes such as RSA, Diffie-Hellman, DSA as well as with relatively new schemes like XTR and NTRU - a series of very recent results about certain important characteristics (period, distribution, linear complexity) of several commonly used pseudorandom number generators, such as the RSA generator, Blum-Blum-Shub generator, Naor-Reingold generator, inversive generator, and others - one of the principal tools is bounds of exponential sums, which are combined with other number theoretic methods such as lattice reduction and sieving - a number of open problems of different level of difficulty and proposals for further research - an extensive and up-to-date bibliography Cryptographers and number theorists will find th...

  5. Research of the Kernel Operator Library Based on Cryptographic Algorithm

    Institute of Scientific and Technical Information of China (English)

    王以刚; 钱力; 黄素梅

    2001-01-01

    The variety of encryption mechanism and algorithms which were conventionally used have some limitations.The kernel operator library based on Cryptographic algorithm is put forward. Owing to the impenetrability of algorithm, the data transfer system with the cryptographic algorithm library has many remarkable advantages in algorithm rebuilding and optimization,easily adding and deleting algorithm, and improving the security power over the traditional algorithm. The user can choose any one in all algorithms with the method against any attack because the cryptographic algorithm library is extensible.

  6. Cryptographic Trust Management Requirements Specification: Version 1.1

    Energy Technology Data Exchange (ETDEWEB)

    Edgar, Thomas W.

    2009-09-30

    The Cryptographic Trust Management (CTM) Project is being developed for Department of Energy, OE-10 by the Pacific Northwest National Laboratory (PNNL). It is a component project of the NSTB Control Systems Security R&D Program.

  7. Cryptographic Technique Used Lower and Upper Triangular Decomposition Method

    Directory of Open Access Journals (Sweden)

    B. KumaraswamyAchary,

    2016-02-01

    Full Text Available In this paper, the main cryptographic technique we will use affine cipher used for encryption and also decryption by using one of the linear algebra technique lower and upper triangular technique

  8. Attack on and Improvement of the Running Mode of the Two-Party Cryptographic Protocols%对两个双方密码协议运行模式的攻击及改进

    Institute of Scientific and Technical Information of China (English)

    姬东耀; 冯登国

    2003-01-01

    In this paper,the running modes of the two-party cryptographic protocols are used to analyze the two authentication and key agreenment protocols,and attack on the protocols is discovered. Finally,two improved protocols are given.

  9. Cryptographic protocol security analysis based on bounded constructing algorithm

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    An efficient approach to analyzing cryptographic protocols is to develop automatic analysis tools based on formal methods. However, the approach has encountered the high computational complexity problem due to reasons that participants of protocols are arbitrary, their message structures are complex and their executions are concurrent. We propose an efficient automatic verifying algorithm for analyzing cryptographic protocols based on the Cryptographic Protocol Algebra (CPA) model proposed recently, in which algebraic techniques are used to simplify the description of cryptographic protocols and their executions. Redundant states generated in the analysis processes are much reduced by introducing a new algebraic technique called Universal Polynomial Equation and the algorithm can be used to verify the correctness of protocols in the infinite states space. We have implemented an efficient automatic analysis tool for cryptographic protocols, called ACT-SPA, based on this algorithm, and used the tool to check more than 20 cryptographic protocols. The analysis results show that this tool is more efficient, and an attack instance not offered previously is checked by using this tool.

  10. Using Animation in Active Learning Tool to Detect Possible Attacks in Cryptographic Protocols

    Science.gov (United States)

    Ali Mayouf, Mabroka; Shukur, Zarina

    Interactive Visualization tools for active learning of generic cryptographic protocols are very few. Although these tools provide the possibility to engage the learner by asking him to describe a cryptographic protocol using a simple visual metaphor to represent the abstraction of the concepts being visualized, the problem is that some cryptographic operations are not visualized or animated and hidden from the learner's perspective such as encryption/decryption actions. Other operations are not supported by these tools such as timestamp and freshness. So, it's difficult to cover all possible attack that the intruder might employ with such operations are missing. The purpose of this research is to provide an interactive visualization tool for teaching undergraduate students security protocols concepts especially key distribution, multiple operations such as encryption/decryption and signed/unsigned operations, and possible protocol attacks. By designing a high quality graphical user interface and simple visual metaphor, learners will be able to specify the protocols and consider the possible attack at each step of protocol demonstration.

  11. A Novel Visual Cryptographic Method for Color Images

    Directory of Open Access Journals (Sweden)

    Amarjot Singh

    2013-05-01

    Full Text Available Visual cryptography is considered to be a vital technique for hiding visual data from intruders. Because of its importance, it finds applications in various sectors such as E-voting system, financial documents and copyright protections etc. A number of methods have been proposed in past for encrypting color images such as color decomposition, contrast manipulation, polynomial method, using the difference in color intensity values in a color image etc. The major flaws with most of the earlier proposed methods is the complexity encountered during the implementation of the methods on a wide scale basis, the problem of random pixilation and insertion of noise in encrypted images. This paper presents a simple and highly resistant algorithm for visual cryptography to be performed on color images. The main advantage of the proposed cryptographic algorithm is the robustness and low computational cost with structure simplicity. The proposed algorithm outperformed the conventional methods when tested over sample images proven using key analysis, SSIM and histogram analysis tests. In addition, the proposed method overshadows the standard method in terms of the signal to noise ratio obtained for the encrypted image, which is much better than the SNR value obtained using the standard method. The paper also makes a worst case analysis for the SNR values for both the methods.

  12. Quantum Key Distribution Protocol with Private-Public Key

    OpenAIRE

    Serna, Eduin H.

    2009-01-01

    A quantum cryptographic protocol based in public key cryptography combinations and private key cryptography is presented. Unlike the BB84 protocol [1] and its many variants [2,3] two quantum channels are used. The present research does not make reconciliation mechanisms of information to derive the key. A three related system of key distribution are described.

  13. Transparency and dialogue: the keys of radioactive material transportation

    Energy Technology Data Exchange (ETDEWEB)

    Neau, H.J.; Hartenstein, M. [COGEMA Logistics (AREVA Group) (France)

    2004-07-01

    Today, public opinion, local actors, organizations and associations are expecting a transparent information on nuclear activities. The fact is, a great number already has daily instant access to information and is able to share it very quickly, thanks to new technologies. Public opinion's sensitiveness is a key element, as risk remains at the center of public concerns. The discrepancy between objectively assessed risks and perceived risks is a permanent challenge for acceptance of nuclear energy. The opponents are also using it, to build their misleading strategy. When anti-nuclear groups claim for an increasing involvement in the decision-making processes, they also get there the most efficient means to hamper our activities, namely operational information on the nuclear transport activities. In order to tackle this challenging issue, COGEMA and its parent company AREVA are engaged in improving their information policy. It has been extended to international and national transports commissioned by COGEMA LOGISTICS. Regarding the most recent transport operations, specific information policy has been implemented at the national and local level through media, information committees, trade unions. But, on the one hand, this policy is facing limits: transparency and openness stop where sensitivity and confidentiality start. On the other hand, opponents are building a challenging process, which is ''more and more''. Whatever the industry efforts are, opponents will remain unsatisfied as they cannot afford otherwise.Consequently, we need to assume a proactive policy in the field of the information on safety of radioactive material transportation. But above all, this policy must be dedicated to the public opinion. It must not be a way to answer to opponent's attacks. The industry's transparency and information must support public opinion's understanding of the important issues which are on progress: global access to the energy

  14. A New Approach in Cryptographic Systems Using Fractal Image Coding

    Directory of Open Access Journals (Sweden)

    Nadia M.G. Al-Saidi

    2009-01-01

    Full Text Available Problem statement: With the rapid development in the communications and information transmissions there is a growing demand for new approaches that increase the security of cryptographic systems. Approach: Therefore some emerging theories, such as fractals, can be adopted to provide a contribution toward this goal. In this study we proposed a new cryptographic system utilizing fractal theories; this approach exploited the main feature of fractals generated by IFS techniques. Results: Double enciphering and double deciphering methods performed to enhance the security of the system. The encrypted date represented the attractor generated by the IFS transformation, collage theorem was used to find the IFSM for decrypting data. Conclusion/Recommendations: The proposed method gave the possibility to hide maximum amount of data in an image that represent the attractor of the IFS without degrading its quality and to make the hidden data robust enough to withstand known cryptographic attacks and image processing techniques which did not change the appearance of image.

  15. Limits on the Power of Cryptographic Cheap Talk

    DEFF Research Database (Denmark)

    Hubacek, Pavel; Nielsen, Jesper Buus; Rosen, Alon

    2013-01-01

    We revisit the question of whether cryptographic protocols can replace correlated equilibria mediators in two-player strategic games. This problem was first addressed by Dodis, Halevi and Rabin (CRYPTO 2000), who suggested replacing the mediator with a secure protocol and proved that their solution...... is stable in the Nash equilibrium (NE) sense, provided that the players are computationally bounded. We show that there exist two-player games for which no cryptographic protocol can implement the mediator in a sequentially rational way; that is, without introducing empty threats. This explains why all...... and sufficient cryptographic assumptions for implementing a mediator that allows to achieve a given utility profile of a correlated equilibrium. The picture that emerges is somewhat different than the one arising in semi-honest secure two-party computation. Specifically, while in the latter case every...

  16. VOCs and odors: key factors in selecting `green` building materials?

    Energy Technology Data Exchange (ETDEWEB)

    Coombs, C. [Steven Winter Associates Inc., Norwalk, CT and Washington DC (United States)

    1998-12-01

    The current state of knowledge available for selecting building materials on the basis of emissions of volatile organic compounds (VOCs) and odors is reviewed. The significance of VOCs and odors in building materials is related to their role in influencing indoor air quality. As far as toxicity is concerned, many of the VOCs detected in indoor air are relatively inert when considered singly. They are not however, unimportant because in actual fact they are invariably found in mixtures some of which can be toxic. Although knowledge of VOCs is incomplete, it is important to specify ozone-resistant polymeric building products, i.e. those that are chemically stable and inert to oxidation. In addition to VOCs, attention should also be focused on semi-volatile organic compounds (SVOCs) since they are even more persistent than VOCs and tend to offgas for prolonged periods of time. Similarly, it is reasonable to specify low-odor materials. Inclusion of issues related to complex indoor chemistry, less volatile emissions, in addition to VOCs and odor, should in time result in expanded choices of building materials that promote indoor air quality. 16 refs.,2 tabs.

  17. Composition of key offensive odorants released from fresh food materials

    Science.gov (United States)

    Kim, Ki-Hyun; Kim, Yong-Hyun

    2014-06-01

    A refrigerator loaded with a variety of foods without sealed packaging can create quite an olfactory nuisance, and it may come as a surprise that fresh foods emit unpleasant odorants just as those that are decaying. To learn more about nuisance sources in our daily lives, we measured a list of 22 compounds designated as the key offensive odorants (e.g., reduced sulfur, nitrogenous, volatile fatty acid (VFA), and carbonyls) from nine types of common food items consumed in S. Korea: raw beef, raw fish, spam, yolks and albumin of boiled eggs (analyzed separately), milk, cheese, onions, and strawberries. The odor intensity (OI) of each food item was computed initially with the aid of previously used empirical equations. This indicates that the malodor properties of target foods tend to be governed by a few key odorants such as VFA, S, and N compounds. The extent of odorant mixing of a given food was then evaluated by exploring the correlation between the human olfaction (e.g., dilution-to-threshold (D/T) ratio) and the odor potential determined indirectly (instrumentally) such as odor activity value (OAV) or sum of odor intensity (SOI). The overall results of our study confirm the existence of malodorant compounds released from common food items and their contribution to their odor characteristics to a certain degree.

  18. Feasibility and Completeness of Cryptographic Tasks in the Quantum World

    NARCIS (Netherlands)

    Fehr, S.; Katz, J.; Song, F.; Zhou, H.S.; Zikas, V.; Sahai, A.

    2013-01-01

    It is known that cryptographic feasibility results can change by moving from the classical to the quantum world. With this in mind, we study the feasibility of realizing functionalities in the framework of universal composability, with respect to both computational and information-theoretic security

  19. Cryptographic Path Hardening: Hiding Vulnerabilities in Software through Cryptography

    CERN Document Server

    Ganesh, Vijay; Rinard, Martin

    2012-01-01

    We propose a novel approach to improving software security called Cryptographic Path Hardening, which is aimed at hiding security vulnerabilities in software from attackers through the use of provably secure and obfuscated cryptographic devices to harden paths in programs. By "harden" we mean that certain error-checking if-conditionals in a given program P are replaced by equivalent" we mean that adversaries cannot use semi-automatic program analysis techniques to reason about the hardened program paths and thus cannot discover as-yet-unknown errors along those paths, except perhaps through black-box dictionary attacks or random testing (which we can never prevent). Other than these unpreventable attack methods, we can make program analysis aimed at error-finding "provably hard" for a resource-bounded attacker, in the same sense that cryptographic schemes are hard to break. Unlike security-through-obscurity, in Cryptographic Path Hardening we use provably-secure crypto devices to hide errors and our mathemati...

  20. Cryptographic protocol verification using tractable classes of horn clauses

    DEFF Research Database (Denmark)

    Seidl, Helmut; Neeraj Verma, Kumar

    2007-01-01

    We consider secrecy problems for cryptographic protocols modeled using Horn clauses and present general classes of Horn clauses which can be efficiently decided. Besides simplifying the methods for the class of flat and onevariable clauses introduced for modeling of protocols with single blind...

  1. SPONGENT: The Design Space of Lightweight Cryptographic Hashing

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Knezevic, Miroslav; Leander, Gregor

    2013-01-01

    The design of secure yet efficiently implementable cryptographic algorithms is a fundamental problem of cryptography. Lately, lightweight cryptography--optimizing the algorithms to fit the most constrained environments--has received a great deal of attention, the recent research being mainly...

  2. On fairness in simulatability-based cryptographic systems

    NARCIS (Netherlands)

    Backes, M.; Hofheinz, D.; Müller-Quade, J.; Unruh, D.

    2005-01-01

    Simulatability constitutes the cryptographic notion of a secure refinement and has asserted its position as one of the fundamental concepts of modern cryptography. Although simulatability carefully captures that a distributed protocol does not behave any worse than an ideal specification, it however

  3. On another two cryptographic identities in universal Osborn loops

    Directory of Open Access Journals (Sweden)

    T. G. Jaiyéolá

    2010-03-01

    Full Text Available In this study, by establishing an identity for universal Osborn loops, two other identities (of degrees 4 and 6 are deduced from it and they are recognized and recommended for cryptography in a similar spirit in which the cross inverse property (of degree 2 has been used by Keedwell following the fact that it was observed that universal Osborn loops that do not have the 3-power associative property or weaker forms of; inverse property, power associativity and diassociativity to mention a few, will have cycles (even long ones. These identities are found to be cryptographic in nature for universal Osborn loops and thereby called cryptographic identities. They were also found applicable to security patterns, arrangements and networks which the CIP may not be applicable to.

  4. AN INTERACTIVE VISUALIZATION TOOL FOR ANIMATING BEHAVIOR OF CRYPTOGRAPHIC PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Mabroka Maeref

    2015-03-01

    Full Text Available Cryptography and Network Security is a difficult subject to understand, mainly because of the complexity of security protocols and the mathematical rigour required to understand encryption algorithms. Realizing the need for an interactive visualization tool to facilitate the understanding of cryptographic concepts and protocols, several tools had been developed. However, these tools cannot be easily adapted to animate different protocols. The aim of this paper is to propose an interactive visualization tool, called the Cryptographic Protocol Animator (CPAnim. The tool enables a student to specify a protocol and gain knowledge about the impact of its behavior. The protocol is specified by using a scenario-based approach and it is demonstrated as a number of scenes displaying a complete scenario. The effectiveness of this tool was tested using an empirical evaluation method. The results show that this tool was effective in meeting its learning objectives.

  5. Corrosion investigation of material combinations in a mobile phone dome-key pad system

    DEFF Research Database (Denmark)

    Ambat, Rajan; Møller, Per

    2007-01-01

    Mobile phone dome-key pad system is the device that connects the phone keys to the printed circuit board (PCB). The material combination for a typical dome-key pad system is Ag/AISI 202 steel for the dome and Au/Ni/Cu for the key pad. Under humid conditions dome-key pad system is susceptible...... microstructural studies, polarization measurements using microelectrochemical technique, salt spray testing, and corrosion morphology analysis. The immersion Au layer on pads showed pores, and rolled bonded silver layer on dome had cracks and kinks. The difference in electrochemical behaviour of the metallic...

  6. Algebraic Construction and Cryptographic Properties of Rijndael Substitution Box

    Directory of Open Access Journals (Sweden)

    Shristi Deva Sinha

    2012-01-01

    Full Text Available Rijndael algorithm was selected as the advanced encryption standard in 2001 after five year long security evaluation; it is well proven in terms of its strength and efficiency. The substitution box is the back bone of the cipher and its strength lies in the simplicity of its algebraic construction. The present paper is a study of the construction of Rijndael Substitution box and the effect of varying the design components on its cryptographic properties.

  7. Key Lab.of Electromagnetic Processing of Materials,Ministry of Education,Northeastern University

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    @@ The Key Lab.of Electromagnetic Processing of Materials, Ministry of Education,Northeastern University (Lab.of EPM)is established on the base of United Researching Centre of Shanghai Baosteel Group Corporation (Baosteel)-Northeasten University.

  8. IMPLEMENTATION OF NEURAL - CRYPTOGRAPHIC SYSTEM USING FPGA

    Directory of Open Access Journals (Sweden)

    KARAM M. Z. OTHMAN

    2011-08-01

    Full Text Available Modern cryptography techniques are virtually unbreakable. As the Internet and other forms of electronic communication become more prevalent, electronic security is becoming increasingly important. Cryptography is used to protect e-mail messages, credit card information, and corporate data. The design of the cryptography system is a conventional cryptography that uses one key for encryption and decryption process. The chosen cryptography algorithm is stream cipher algorithm that encrypt one bit at a time. The central problem in the stream-cipher cryptography is the difficulty of generating a long unpredictable sequence of binary signals from short and random key. Pseudo random number generators (PRNG have been widely used to construct this key sequence. The pseudo random number generator was designed using the Artificial Neural Networks (ANN. The Artificial Neural Networks (ANN providing the required nonlinearity properties that increases the randomness statistical properties of the pseudo random generator. The learning algorithm of this neural network is backpropagation learning algorithm. The learning process was done by software program in Matlab (software implementation to get the efficient weights. Then, the learned neural network was implemented using field programmable gate array (FPGA.

  9. Shandong University Key Lab of Liquid Structure and Heredity of Materials, Ministry of Education of China

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    @@ In 1995, the Key Lab of Liquid Structure and Heredity of Metals was set up by the approval of Shandong province, but the research work on the liquid structure and heredity of materials started in the last three decades. In 2000, combining the lab of engineering ceramic and the institute of joining technology in Shandong University, the lab was established as Key Lab of Liquid Structure and Heredity of Materials, by the approval of the Ministry of Education.

  10. Public-key cryptography based on bounded quantum reference frames

    OpenAIRE

    Ioannou, Lawrence M.; Mosca, Michele

    2009-01-01

    We demonstrate that the framework of bounded quantum reference frames has application to building quantum-public-key cryptographic protocols and proving their security. Thus, the framework we introduce can be seen as a public-key analogue of the framework of Bartlett et al. (Phys. Rev. A 70, 032307), where a private shared reference frame is shown to have cryptographic application. The protocol we present in this paper is an identification scheme, which, like a digital signature scheme, is a ...

  11. Sustainable Materials Management (SMM) - Materials and Waste Management in the United States Key Facts and Figures

    Data.gov (United States)

    U.S. Environmental Protection Agency — Each year EPA produces a report called Advancing Sustainable Materials Management: Facts and Figures. It includes information on municipal solid waste (MSW)...

  12. Asymmetric Unification: A New Unification Paradigm for Cryptographic Protocol Analysis

    OpenAIRE

    2013-01-01

    The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-642-38574-2_16 We present a new paradigm for unification arising out of a technique commonly used in cryptographic protocol analysis tools that employ unification modulo equational theories. This paradigm relies on: (i) a decomposition of an equational theory into (R,E) where R is confluent, terminating, and coherent modulo E, and (ii) on reducing unification problems to a set of problems s=?ts=?t under the ...

  13. Cryptographically Blinded Games: Leveraging Players' Limitations for Equilibria and Profit

    DEFF Research Database (Denmark)

    Hubacek, Pavel; Park, Sunoo

    2014-01-01

    In this work we apply methods from cryptography to enable mutually distrusting players to implement broad classes of mediated equilibria of strategic games without trusted mediation. Our implementation uses a pre-play 'cheap talk' phase, consisting of non- binding communication between players pr...... prior to play in the original game. In the cheap talk phase, the players run a secure multi-party computation protocol to sample from an equilibrium of a "cryptographically blinded" version of the game, in which actions are encrypted...

  14. Algebraic Construction and Cryptographic Properties of Rijndael Substitution Box

    Directory of Open Access Journals (Sweden)

    Shristi Deva Sinha

    2012-01-01

    Full Text Available Rijndael algorithm was selected as the advanced encryption standard in 2001 after five year long security evaluation; it is well proven in terms of its strength and efficiency. The substitution box is the back bone of the cipher and its strength lies in the simplicity of its algebraic construction. The present paper is a study of the construction of Rijndael Substitution box and the effect of varying the design components on its cryptographic properties.Defence Science Journal, 2012, 62(1, pp.32-37, DOI:http://dx.doi.org/10.14429/dsj.62.1439

  15. Research of Cryptographic Algorithms Applied in Electronic Commerce

    Directory of Open Access Journals (Sweden)

    Cheng Zengping

    2014-02-01

    Full Text Available With the developments of network communication, electronic commerce plays a more and more role in the trade business and industry structure. The requirement for the electronic commerce turns to be higher. In this study, we study current status about the cryptographic algorithms exploited in electronic commerce. We discuss the advantages and disadvantages about the symmetric and asymmetric algorithms and improve them. Then we give a new scheme that combines the improved symmetric algorithm and asymmetric algorithm. We give sound reasons to explain why our scheme is more secure. Finally, we carry the experiments to show the security of our scheme.

  16. A brief history of cryptology and cryptographic algorithms

    CERN Document Server

    Dooley, John F

    2013-01-01

    The science of cryptology is made up of two halves. Cryptography is the study of how to create secure systems for communications. Cryptanalysis is the study of how to break those systems. The conflict between these two halves of cryptology is the story of secret writing. For over 2,000 years, the desire to communicate securely and secretly has resulted in the creation of numerous and increasingly complicated systems to protect one's messages. Yet for every system there is a cryptanalyst creating a new technique to break that system. With the advent of computers the cryptographer seems to final

  17. IFMIF (International Fusion Materials Irradiation Facility) key element technology phase interim report

    Energy Technology Data Exchange (ETDEWEB)

    Nakamura, Hiroo; Ida, Mizuho; Sugimoto, Masayoshi; Takeuchi, Hiroshi; Yutani, Toshiaki (eds.) [Japan Atomic Energy Research Inst., Tokai, Ibaraki (Japan). Tokai Research Establishment

    2002-03-01

    Activities of International Fusion Materials Irradiation Facility (IFMIF) have been performed under an IEA collaboration since 1995. IFMIF is an accelerator-based deuteron (D{sup +})-lithium (Li) neutron source designed to produce an intense neutron field (2 MW/m{sup 2}, 20 dpa/year for Fe) in a volume of 500 cm{sup 3} for testing candidate fusion materials. In 2000, a 3 year Key Element technology Phase (KEP) of IFMIF was started to reduce the key technology risk factors. This interim report summarizes the KEP activities until mid 2001 in the major project work-breakdown areas of accelerator, target, test facilities and design integration. (author)

  18. Secure management of biomedical data with cryptographic hardware.

    Science.gov (United States)

    Canim, Mustafa; Kantarcioglu, Murat; Malin, Bradley

    2012-01-01

    The biomedical community is increasingly migrating toward research endeavors that are dependent on large quantities of genomic and clinical data. At the same time, various regulations require that such data be shared beyond the initial collecting organization (e.g., an academic medical center). It is of critical importance to ensure that when such data are shared, as well as managed, it is done so in a manner that upholds the privacy of the corresponding individuals and the overall security of the system. In general, organizations have attempted to achieve these goals through deidentification methods that remove explicitly, and potentially, identifying features (e.g., names, dates, and geocodes). However, a growing number of studies demonstrate that deidentified data can be reidentified to named individuals using simple automated methods. As an alternative, it was shown that biomedical data could be shared, managed, and analyzed through practical cryptographic protocols without revealing the contents of any particular record. Yet, such protocols required the inclusion of multiple third parties, which may not always be feasible in the context of trust or bandwidth constraints. Thus, in this paper, we introduce a framework that removes the need for multiple third parties by collocating services to store and to process sensitive biomedical data through the integration of cryptographic hardware. Within this framework, we define a secure protocol to process genomic data and perform a series of experiments to demonstrate that such an approach can be run in an efficient manner for typical biomedical investigations.

  19. Keying Results on the CELT-Structure Test to U.S. Grade Level Instructional Materials

    Science.gov (United States)

    Moran, Ross T.

    1978-01-01

    It would be beneficial for ESL instructors to know the U.S. grade equivalent English ability of their students for placement purposes, especially if their instructional materials are keyed for U.S. classrooms. For this purpose, the Stanford Intermediate Level I Reading Comprehension Test was compared with the CELT-Structure Test. (Author/RM)

  20. Atmospheric Quantum Key Distribution in Daylight

    Science.gov (United States)

    Buttler, William; Hughes, Richard; Morgan, George; Nordholt, Jane; Peterson, Charles

    2001-05-01

    In quantum key distribution (QKD) single-photon transmissions generate the shared, secret random number sequences, known as cryptographic keys, that are used to encrypt and decrypt secret communications. Because the security of QKD is based on principles of quantum physics an adversary can neither successfully tap the key transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). We have developed an experimental QKD system that uses the four-state “BB84” protocol with non-orthogonal photon polarization states and lowest-order adaptive optics to generate shared key material over multi-kilometer atmospheric, line-of-sight paths. We will present results of a daylight demonstration of this system. Key material is built up using the transmission of a photon-pulse per bit of an initial secret random sequence. We will describe the design and operation of the system, present an analysis of the system's security, efficiency and error rate, and describe the prospects for longer-distance applications of free-space QKD.

  1. Quantum key management

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  2. Quantum key management

    Science.gov (United States)

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  3. A Review of Cryptographic Algorithms in Network Security

    Directory of Open Access Journals (Sweden)

    B.Nithya

    2016-02-01

    Full Text Available In the excellent growth of internet environment, there is a challenge to send data in secure. Security means sending information without any modification or hacking done by unauthorized users. The network security has the component of cryptography technique which acts like guard to the information. The general concept of cryptography is encryption and decryption. There are many cryptographic algorithms are used to send the information as cipher text which cannot be understand by the intruders. So experts have taken the existing algorithms to provide security over the network and they want to apply the benefits of those algorithms in the suitable places. First step of getting the help from algorithm is to be studied and compared their parameters. This paper presents a review that comparative study of algorithms taken by many authors.

  4. A Compendium Over Cloud Computing Cryptographic Algorithms and Security Issues

    Directory of Open Access Journals (Sweden)

    Neha Mishra

    2015-01-01

    Full Text Available Cloud computing is an emerging and revolutionary approach towards the computing and becoming more risk prone than ever before. It is an evolutionary approach of using resources and services on demand and as per need of consumers. Cloud computing providing a platform rose on the Internet for usage of IT services and flexible infrastructure to the consumers and business. Deployment and management of services or resources are maintained by the third party. Whereas there are innumerable advantages to approaching the cloud computing, it also contains various issues such as confidentiality, Integrity, Authenticity and Privacy. One of the prominent barrier to adopt the cloud computing is security. This paper comprises the elaborated study on various security issues allied to cloud computing are presented by consolidating literature reviews on cryptographic algorithms used for data security.

  5. Implimentation of Cryptographic Algorithm for GSM and UMTS Systems.

    Directory of Open Access Journals (Sweden)

    Alpesh R. Sankaliya

    2011-12-01

    Full Text Available Due to extremely high demand of mobile phones among people, over the years there has been a great demand for the support of various applications and security services. Cryptographic algorithms used by Mobile Subscribers to protect the privacy of their cellular voice and data communication. Ciphering provides the mean to regain control over privacy and authentication. A5/x are the encryption algorithms used in order to ensure privacy of conversations on mobile phones. A5/3 encryption algorithm used for 3G and GEA3 encryption algorithm used for GPRS. f8 is confidentiality algorithms developed by 3GPP used in UMTS System. The following paper is based on simulation of A5/3 and f8 algorithms.

  6. Analysis and Implementation of Cryptographic Hash Functions in Programmable Logic Devices

    Directory of Open Access Journals (Sweden)

    Tautvydas Brukštus

    2016-06-01

    Full Text Available In this day’s world, more and more focused on data pro-tection. For data protection using cryptographic science. It is also important for the safe storage of passwords for this uses a cryp-tographic hash function. In this article has been selected the SHA-256 cryptographic hash function to implement and explore, based on fact that it is now a popular and safe. SHA-256 cryp-tographic function did not find any theoretical gaps or conflict situations. Also SHA-256 cryptographic hash function used cryptographic currencies. Currently cryptographic currency is popular and their value is high. For the measurements have been chosen programmable logic integrated circuits as they less effi-ciency then ASIC. We chose Altera Corporation produced prog-rammable logic integrated circuits. Counting speed will be inves-tigated by three programmable logic integrated circuit. We will use programmable logic integrated circuits belong to the same family, but different generations. Each programmable logic integ-rated circuit made using different dimension technology. Choo-sing these programmable logic integrated circuits: EP3C16, EP4CE115 and 5CSEMA5F31. To compare calculations perfor-mances parameters are provided in the tables and graphs. Re-search show the calculation speed and stability of different prog-rammable logic circuits.

  7. Computational Comminution and Its Key Technologies Applied to Materials Processing Procedure

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    A new concept named computational comminution is proposed in this paper, which is different from the traditional studies on materials processing procedure such as the study based on theoretic models, the study based on experiment models, which is based on information models. Some key technologies applied to materials processing procedure such as artificial neural networks, fuzzy sets, genetic algorithms and visualization technology are also presented, and a fusing methodology of these new technologies is studied. Application in the cement grinding process of Horomill shows that results in this paper are efficient.

  8. IFMIF-KEP. International fusion materials irradiation facility key element technology phase report

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2003-03-01

    The International Fusion Materials Irradiation Facility (IFMIF) is an accelerator-based D-Li neutron source designed to produce an intense neutron field that will simulate the neutron environment of a D-T fusion reactor. IFMIF will provide a neutron flux equivalent to 2 MW/m{sup 2}, 20 dpa/y in Fe, in a volume of 500 cm{sup 3} and will be used in the development and qualification of materials for fusion systems. The design activities of IFMIF are performed under an IEA collaboration which began in 1995. In 2000, a three-year Key Element Technology Phase (KEP) of IFMIF was undertaken to reduce the key technology risk factors. This KEP report describes the results of the three-year KEP activities in the major project areas of accelerator, target, test facilities and design integration. (author)

  9. Materials R and D for a timely DEMO: Key findings and recommendations of the EU Roadmap Materials Assessment Group

    Energy Technology Data Exchange (ETDEWEB)

    Stork, Derek, E-mail: derek.stork@ccfe.ac.uk [EFDA Power Plant Physics and Technology, Boltzmannstr. 2, Garching, 85748 Germany (Germany); Agostini, Pietro [ENEA, Brasimone Research Centre, 40032, Camugnano, Bologna (Italy); Boutard, Jean-Louis [CEA, cab HC, Saclay, F-91191, Gif-sur-Yvette (France); Buckthorpe, Derek [AMEC, Booths Park, Chelford Road, Knutsford, Cheshire, WA16 8QZ (United Kingdom); Diegele, Eberhard [Karlsruhe Institute for Technology, IMF-I, D-7602, Karlsruhe (Germany); Dudarev, Sergei L. [Euratom-CCFE Association, Culham Science Centre, Abingdon, OX14 3DB (United Kingdom); English, Colin [National Nuclear Laboratory, 5th Floor, Chadwick House, Warrington Road, Birchwood Park, WA3 6AE (United Kingdom); Federici, Gianfranco [EFDA Power Plant Physics and Technology, Boltzmannstr. 2, Garching, 85748 Germany (Germany); Gilbert, Mark R. [Euratom-CCFE Association, Culham Science Centre, Abingdon, OX14 3DB (United Kingdom); Gonzalez, Sehila [EFDA Power Plant Physics and Technology, Boltzmannstr. 2, Garching, 85748 Germany (Germany); Ibarra, Angel [CIEMAT, Avda. Complutense 40, Madrid (Spain); Linsmeier, Christian [Forschungszentrum Jülich GmbH, Institut für Energie- und Klimaforschung–Plasmaphysik, EURATOM Association, 52425 Jülich (Germany); Puma, Antonella Li [CEA, DEN, Saclay, DM2S, SERMA, F-91191, Gif-sur-Yvette (France); Marbach, Gabriel [CEA, cab HC, Saclay, F-91191, Gif-sur-Yvette (France); Packer, Lee W. [Euratom-CCFE Association, Culham Science Centre, Abingdon, OX14 3DB (United Kingdom); Raj, Baldev [Indian National Academy of Engineering, Shaheed Jeet Singh Marg, New Delhi 110016 (India); Rieth, Michael [Karlsruhe Institute for Technology, IMF-I, D-7602, Karlsruhe (Germany); Tran, Min Quang [Ecole Polytechnique Federale de Lausanne—CRPP, Association Euratom-Switzerland, 1015 Lausanne (Switzerland); and others

    2014-10-15

    The findings of the EU Fusion Programme's ‘Materials Assessment Group’ (MAG), assessing readiness of Structural, Plasma Facing (PF) and High Heat Flux (HHF) materials for DEMO, are discussed. These are incorporated into the EU Fusion Power Roadmap [1], with a decision to construct DEMO in the early 2030s. The methodology uses project-based and systems-engineering approaches, the concept of Technology Readiness Levels, and considers lessons learned from Fission reactor material development. ‘Baseline’ materials are identified for each DEMO role, and the DEMO mission risks analysed from the known limitations, or unknown properties, associated with each baseline material. R and D programmes to address these risks are developed. The DEMO assessed has a phase I with a ‘starter blanket’: the blanket must withstand ≥2 MW yr m{sup −2} fusion neutron flux (equivalent to ∼20 dpa front-wall steel damage). The baseline materials all have significant associated risks, so development of ‘Risk Mitigation Materials’ (RMM) is recommended. The R and D programme has parallel development of the baseline and RMM, up to ‘down-selection’ points to align with decisions on the DEMO blanket and divertor engineering definition. ITER licensing experience is used to refine the issues for materials nuclear testing, and arguments are developed to optimise scope of materials tests with fusion neutron (‘14 MeV’) spectra before DEMO design finalisation. Some 14 MeV testing is still essential, and the Roadmap requires deployment of a ≥30 dpa (steels) testing capability by 2026. Programme optimisation by the pre-testing with fission neutrons on isotopically- or chemically-doped steels and with ion-beams is discussed along with the minimum 14 MeV testing programme, and the key role which fundamental and mission-oriented modelling can play in orienting the research.

  10. Biomimetic characterisation of key surface parameters for the development of fouling resistant materials.

    Science.gov (United States)

    Scardino, A J; Hudleston, D; Peng, Z; Paul, N A; de Nys, R

    2009-01-01

    Material science provides a direct route to developing a new generation of non-toxic, surface effect-based antifouling technologies with applications ranging from biomedical science to marine transport. The surface topography of materials directly affects fouling resistance and fouling removal, the two key mechanisms for antifouling technologies. However, the field is hindered by the lack of quantified surface characteristics to guide the development of new antifouling materials. Using a biomimetic approach, key surface parameters are defined and quantified and correlated with fouling resistance and fouling removal from the shells of marine molluscs. Laser scanning confocal microscopy was used to acquire images for quantitative surface characterisation using three-dimensional surface parameters, and field assays correlated these with fouling resistance and fouling release. Principle component analysis produced a major component (explaining 54% of total variation between shell surfaces) that correlated with fouling resistance. The five surface parameters positively correlated to increased fouling resistance were, in order of importance, low fractal dimension, high skewness of both the roughness and waviness profiles, higher values of isotropy and lower values of mean surface roughness. The second component (accounting for 20% of variation between shells) positively correlated to fouling release, for which higher values of mean waviness almost exclusively dictated this relationship. This study provides quantified surface parameters to guide the development of new materials with surface properties that confer fouling resistance and release.

  11. Key technologies for manufacturing and processing sheet materials: A global perspective

    Science.gov (United States)

    Demeri, Mahmoud Y.

    2001-02-01

    Modern industrial technologies continue to seek new materials and processes to produce products that meet design and functional requirements. Sheet materials made from ferrous and non-ferrous metals, laminates, composites, and reinforced plastics constitute a large percentage of today’s products, components, and systems. Major manufacturers of sheet products include automotive, aerospace, appliance, and food-packaging industries. The Second Global Symposium on Innovations in Materials Processing & Manufacturing: Sheet Materials is organized to provide a forum for presenting advances in sheet processing and manufacturing by worldwide researchers and engineers from industrial, research, and academic centers. The symposium, sponsored by the TMS Materials Processing & Manufacturing Division (MPMD), was planned for the 2001 TMS Annual Meeting, New Orleans, Louisiana, February 11 15, 2001. This article is a review of key papers submitted for publication in the concurrent volume. The selected papers present significant developments in the rapidly expanding areas of advanced sheet materials, innovative forming methods, industrial applications, primary and secondary processing, composite processing, and numerical modeling of manufacturing processes.

  12. Security of Cooperative Intelligent Transport Systems: Standards, Threats Analysis and Cryptographic Countermeasures

    Directory of Open Access Journals (Sweden)

    Elyes Ben Hamida

    2015-07-01

    Full Text Available Due to the growing number of vehicles on the roads worldwide, road traffic accidents are currently recognized as a major public safety problem. In this context, connected vehicles are considered as the key enabling technology to improve road safety and to foster the emergence of next generation cooperative intelligent transport systems (ITS. Through the use of wireless communication technologies, the deployment of ITS will enable vehicles to autonomously communicate with other nearby vehicles and roadside infrastructures and will open the door for a wide range of novel road safety and driver assistive applications. However, connecting wireless-enabled vehicles to external entities can make ITS applications vulnerable to various security threats, thus impacting the safety of drivers. This article reviews the current research challenges and opportunities related to the development of secure and safe ITS applications. It first explores the architecture and main characteristics of ITS systems and surveys the key enabling standards and projects. Then, various ITS security threats are analyzed and classified, along with their corresponding cryptographic countermeasures. Finally, a detailed ITS safety application case study is analyzed and evaluated in light of the European ETSI TC ITS standard. An experimental test-bed is presented, and several elliptic curve digital signature algorithms (ECDSA are benchmarked for signing and verifying ITS safety messages. To conclude, lessons learned, open research challenges and opportunities are discussed.

  13. CRYPTOGRAPHIC MEANS OF INFORMATION PROTECTION AND PSYCHOLOGICAL COMFORT OF THE USERS OF COMPUTER INFORMATIONAL SYSTEMS

    Directory of Open Access Journals (Sweden)

    Yurii A. Kotsiuk

    2010-09-01

    Full Text Available The article checks up the existence of functional relation between the level of psychological comfort of the users of computer informational systems and their awareness/skills to use cryptographic means of information protection.

  14. Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSN)

    CERN Document Server

    Rehman, Sadaqat Ur; Ahmad, Basharat; Yahya, Khawaja Muhammad; Ullah, Anees; Rehman, Obaid Ur

    2012-01-01

    Wireless Sensor Networks (WSN) are becoming popular day by day, however one of the main issue in WSN is its limited resources. We have to look to the resources to create Message Authentication Code (MAC) keeping in mind the feasibility of technique used for the sensor network at hand. This research work investigates different cryptographic techniques such as symmetric key cryptography and asymmetric key cryptography. Furthermore, it compares different encryption techniques such as stream cipher (RC4), block cipher (RC2, RC5, RC6 etc) and hashing techniques (MD2, MD4, MD5, SHA, SHA1 etc). The result of our work provides efficient techniques for communicating device, by selecting different comparison matrices i.e. energy consumption, processing time, memory and expenses that satisfies both the security and restricted resources in WSN environment to create MAC.

  15. Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC in Wireless Sensor Networks (WSN

    Directory of Open Access Journals (Sweden)

    Sadaqat Ur Rehman

    2012-01-01

    Full Text Available Wireless Sensor Networks (WSN are becoming popular day by day, however one of the main issue in WSN is its limited resources. We have to look to the resources to create Message Authentication Code (MAC and need to choose a technique which is feasible for sensor networks. This research work investigates different cryptographic techniques such as symmetric key cryptography and asymmetric key cryptography, furthermore it compares different encryption techniques such as stream cipher (RC4, block cipher (RC2, RC5, RC6 etc and hashing techniques (MD2, MD4, MD5, SHA, SHA1 etc. The result of our work provides efficient techniques for communicator, by selecting different comparison matrices i.e. energy consumption, processing time, memory and expenses that satisfies both the security and restricted resources in WSN environment to create MAC

  16. SHAMROCK: A Synthesizable High Assurance Cryptography and Key Management Coprocessor

    Science.gov (United States)

    2016-11-01

    cryptography; key management ; synthesizable. I. INTRODUCTION Modern cryptographic algorithms are designed with Kerckhoffs’ Principle in mind – that...LOCKMA supports good cryptography and key management practices . However, in general a software only solution is insufficient to guarantee the...1 SHAMROCK: A Synthesizable High Assurance Cryptography and Key Management Coprocessor David Whelihan, Michael Vai, Dan Utin, Roger Khazan, Karen

  17. Neutron scattering—The key characterization tool for nanostructured magnetic materials

    Energy Technology Data Exchange (ETDEWEB)

    Fitzsimmons, M.R., E-mail: fitz@lanl.gov [Los Alamos National Laboratory (United States); Schuller, Ivan K. [University of California, San Diego (United States)

    2014-01-15

    between intrinsic vs. extrinsic origins of unusual behavior which invariably plague novel materials. Key to realizing these opportunities will be the development of sample environment capabilities especially tailored to test the origins of novel phenomena, and techniques to collect, analyze and correlate neutron event detection with time dependent perturbations to the sample's environment. - Highlights: • We discuss applications of neutron scattering to studies of magnetic materials with nanometer structure. • We describe a variety of emerging sample environment capabilities that enable studies of magnetic films as functions of pressure, temperature and magnetic field. • We give examples of the complementarity between neutron and resonant x-ray scattering. • We demonstrate how neutron scattering can clarify the distinction between intrinsic and extrinsic origins of novel behavior in magnetic films and interfaces.

  18. Quantum cryptography beyond quantum key distribution

    NARCIS (Netherlands)

    A. Broadbent (Anne); C. Schaffner (Christian)

    2016-01-01

    textabstractQuantum cryptography is the art and science of exploiting quantum mechanical effects in order to perform cryptographic tasks. While the most well-known example of this discipline is quantum key distribution (QKD), there exist many other applications such as quantum money, randomness

  19. Quantum cryptography beyond quantum key distribution

    NARCIS (Netherlands)

    Broadbent, A.; Schaffner, C.

    2016-01-01

    Quantum cryptography is the art and science of exploiting quantum mechanical effects in order to perform cryptographic tasks. While the most well-known example of this discipline is quantum key distribution (QKD), there exist many other applications such as quantum money, randomness generation,

  20. Quantum cryptography beyond quantum key distribution

    NARCIS (Netherlands)

    Broadbent, A.; Schaffner, C.

    2016-01-01

    Quantum cryptography is the art and science of exploiting quantum mechanical effects in order to perform cryptographic tasks. While the most well-known example of this discipline is quantum key distribution (QKD), there exist many other applications such as quantum money, randomness generation, secu

  1. Number Theory and Public-Key Cryptography.

    Science.gov (United States)

    Lefton, Phyllis

    1991-01-01

    Described are activities in the study of techniques used to conceal the meanings of messages and data. Some background information and two BASIC programs that illustrate the algorithms used in a new cryptographic system called "public-key cryptography" are included. (CW)

  2. The Homomorphic Key Agreement

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    There are various challenges that are faced in group communication, so it is necessary to ensure session key. Key agreement is the fundamental cryptographic primitive for establishing a secure communication. It is a process of computing a shared secret contributed by two or more entities such that no single node can predetermine the resulting value. An authenticated key agreement is attained by combining the key agreement protocol with digital signatures. After a brief introduction to existing key agreement in group communication, Making use of the additive-multiplicative homomorphism in the integer ring defined by Sander and Tschudin: A new protocols, called the homomorphism key agreement, was designed, which can be self-contributory, robust, scalable and applicable in group communication.

  3. Cryptographically supported NFC tags in medication for better inpatient safety.

    Science.gov (United States)

    Özcanhan, Mehmet Hilal; Dalkılıç, Gökhan; Utku, Semih

    2014-08-01

    Reliable sources report that errors in drug administration are increasing the number of harmed or killed inpatients, during healthcare. This development is in contradiction to patient safety norms. A correctly designed hospital-wide ubiquitous system, using advanced inpatient identification and matching techniques, should provide correct medicine and dosage at the right time. Researchers are still making grouping proof protocol proposals based on the EPC Global Class 1 Generation 2 ver. 1.2 standard tags, for drug administration. Analyses show that such protocols make medication unsecure and hence fail to guarantee inpatient safety. Thus, the original goal of patient safety still remains. In this paper, a very recent proposal (EKATE) upgraded by a cryptographic function is shown to fall short of expectations. Then, an alternative proposal IMS-NFC which uses a more suitable and newer technology; namely Near Field Communication (NFC), is described. The proposed protocol has the additional support of stronger security primitives and it is compliant to ISO communication and security standards. Unlike previous works, the proposal is a complete ubiquitous system that guarantees full patient safety; and it is based on off-the-shelf, new technology products available in every corner of the world. To prove the claims the performance, cost, security and scope of IMS-NFC are compared with previous proposals. Evaluation shows that the proposed system has stronger security, increased patient safety and equal efficiency, at little extra cost.

  4. Preventing Real-Time Packet Classification Using Cryptographic Primitives

    Directory of Open Access Journals (Sweden)

    N.Vasumathi

    2014-03-01

    Full Text Available Jamming attacks are especially harmful when ensuring the dependability of wireless communication. Typically, jamming has been addressed under an external threat model. Adversaries with internal knowledge of protocol specifications and network secrets can launch low-effort jamming attacks that are difficult to detect and counter. The problem of selective jamming attacks in wireless networks is addressed in this work. In these attacks, the adversary is active only for a short period of time, specifically targeting messages of high importance. The advantages of selective jamming in terms of network performance degradation and adversary effort is illustrated by presenting two case studies; one is selective attack on TCP and another is on routing. The selective jamming attacks can be launched by performing real-time packet classification at the physical layer. To avoid these attacks, four schemes are developed such as All Or Nothing Transformation-Hiding Scheme (AONT-HS - pseudo message is added with message before transformation and encryption, Strong Hiding Commitment Scheme(SHCS - off-the-shelf symmetric encryption is done, Puzzle Based Hiding Scheme(PBHS- time lock and hash puzzle and Nonce based Authenticated Encryption Scheme(N-AES-Nonce is used for encryption, that prevent real-time packet classification by combining cryptographic primitives with physical-layer attributes.

  5. The extraordinary joint material of an articulated coralline alga. I. Mechanical characterization of a key adaptation.

    Science.gov (United States)

    Denny, Mark W; King, Felicia A

    2016-06-15

    Flexibility is key to survival for seaweeds exposed to the extreme hydrodynamic environment of wave-washed rocky shores. This poses a problem for coralline algae, whose calcified cell walls make them rigid. Through the course of evolution, erect coralline algae have solved this problem by incorporating joints (genicula) into their morphology, allowing their fronds to be as flexible as those of uncalcified seaweeds. To provide the flexibility required by this structural innovation, the joint material of Calliarthron cheilosporioides, a representative articulated coralline alga, relies on an extraordinary tissue that is stronger, more extensible and more fatigue resistant than the tissue of other algal fronds. Here, we report on experiments that reveal the viscoelastic properties of this material. On the one hand, its compliance is independent of the rate of deformation across a wide range of deformation rates, a characteristic of elastic solids. This deformation rate independence allows joints to maintain their flexibility when loaded by the unpredictable - and often rapidly imposed - hydrodynamic force of breaking waves. On the other hand, the genicular material has viscous characteristics that similarly augment its function. The genicular material dissipates much of the energy absorbed as a joint is deformed during cyclic wave loading, which potentially reduces the chance of failure by fatigue, and the material accrues a limited amount of deformation through time. This limited creep increases the flexibility of the joints while preventing them from gradually stretching to the point of failure. These new findings provide the basis for understanding how the microscale architecture of genicular cell walls results in the adaptive mechanical properties of coralline algal joints.

  6. Materials analysis: A key to unlocking the mystery of the Columbia tragedy

    Science.gov (United States)

    Mayeaux, Brian M.; Collins, Thomas E.; Jerman, Gregory A.; McDanels, Steven J.; Piascik, Robert S.; Russell, Richard W.; Shah, Sandeep R.

    2004-02-01

    Materials analyses of key forensic evidence helped unlock the mystery of the loss of space shuttle Columbia that disintegrated February 1, 2003 while returning from a 16-day research mission. Following an intensive four-month recovery effort by federal, state, and local emergency management and law officials, Columbia debris was collected, catalogued, and reassembled at the Kennedy Space Center. Engineers and scientists from the Materials and Processes (M&P) team formed by NASA supported Columbia reconstruction efforts, provided factual data through analysis, and conducted experiments to validate the root cause of the accident. Fracture surfaces and thermal effects of selected airframe debris were assessed, and process flows for both nondestructive and destructive sampling and evaluation of debris were developed. The team also assessed left hand (LH) airframe components that were believed to be associated with a structural breach of Columbia. Analytical data collected by the M&P team showed that a significant thermal event occurred at the left wing leading edge in the proximity of LH reinforced carbon carbon (RCC) panels 8 and 9. The analysis also showed exposure to temperatures in excess of 1,649°C, which would severely degrade the support structure, tiles, and RCC panel materials. The integrated failure analysis of wing leading edge debris and deposits strongly supported the hypothesis that a breach occurred at LH RCC panel 8.

  7. ELT Materials: The Key to Fostering Effective Teaching and Learning Settings

    Directory of Open Access Journals (Sweden)

    Núñez Pardo Astrid

    2009-11-01

    Full Text Available Our article aims at providing teachers with an overview for materials development, taking into account the experience gained by two teachers in the English Programme of the School of Education at Universidad Externado de Colombia in Bogotá. This experience has helped us achieve better teaching and learning conditions for our university students in their quest to learn a foreign language. This paper addresses the issue of the role of teachers as textbook developers, and how they can meet materials development demands by integrating a clear conceptualisation and set of principles as well as their essential components. Key words: Materials development, text developers, materials development demands, effective teaching and learning settings Este artículo brinda a los profesores de inglés un panorama del desarrollo de materiales con base en nuestra experiencia como profesoras del Programa de Inglés de la Facultad de Educación de la Universidad Externado de Colombia, en Bogotá. Esta experiencia ha permitido mejorar las condiciones de aprendizaje de nuestros estudiantes de inglés como lengua extrajera. El documento se centra en el papel de los profesores como diseñadores de textos para cursos de inglés, y cómo ellos pueden satisfacer las exigencias que demanda el desarrollo de materiales, integrando una clara conceptualización, sus principios y sus componentes esenciales. Palabras clave: Diseño de materiales, diseñadores de textos, requisitos para el desarrollo de materiales, ambientes efectivos de enseñanza-aprendizaje

  8. Miniaturized supercapacitors: key materials and structures towards autonomous and sustainable devices and systems

    Science.gov (United States)

    Soavi, Francesca; Bettini, Luca Giacomo; Piseri, Paolo; Milani, Paolo; Santoro, Carlo; Atanassov, Plamen; Arbizzani, Catia

    2016-09-01

    Supercapacitors (SCs) are playing a key role for the development of self-powered and self-sustaining integrated systems for different fields ranging from remote sensing, robotics and medical devices. SC miniaturization and integration into more complex systems that include energy harvesters and functional devices are valuable strategies that address system autonomy. Here, we discuss about novel SC fabrication and integration approaches. Specifically, we report about the results of interdisciplinary activities on the development of thin, flexible SCs by an additive technology based on Supersonic Cluster Beam Deposition (SCBD) to be implemented into supercapacitive electrolyte gated transistors and supercapacitive microbial fuel cells. Such systems integrate at materials level the specific functions of devices, like electric switch or energy harvesting with the reversible energy storage capability. These studies might open new frontiers for the development and application of new multifunction-energy storage elements.

  9. IFMIF (International Fusion Materials Irradiation Facility) key element technology phase task description

    Energy Technology Data Exchange (ETDEWEB)

    Ida, M.; Nakamura, H.; Sugimoto, M.; Yutani, T.; Takeuchi, H. [eds.] [Japan Atomic Energy Research Inst., Tokai Research Establishment, Fusion Neutron Laboratory, Tokai, Ibaraki (Japan)

    2000-08-01

    In 2000, a 3 year Key Element technology Phase (KEP) of the International Fusion Materials Irradiation Facility (IFMIF) has been initiated to reduce the key technology risk factors needed to achieve continuous wave (CW) beam with the desired current and energy and to reach the corresponding power handling capabilities in the liquid lithium target system. In the KEP, the IFMIF team (EU, Japan, Russian Federation, US) will perform required tasks. The contents of the tasks are described in the task description sheet. As the KEP tasks, the IFMIF team have proposed 27 tasks for Test Facilities, 12 tasks for Target, 26 tasks for Accelerator and 18 tasks for Design Integration. The task description by RF is not yet available. The task items and task descriptions may be added or revised with the progress of KEP activities. These task description sheets have been compiled in this report. After 3 years KEP, the results of the KEP tasks will be reviewed. Following the KEP, 3 years Engineering Validation Phase (EVP) will continue for IFMIF construction. (author)

  10. Key Management Building Blocks for Wireless Sensor Networks

    NARCIS (Netherlands)

    Law, Y.W.; Doumen, J.M.; Palaniswami, M.

    2007-01-01

    Cryptography is the means to ensure data confidentiality, integrity and authentication in wireless sensor networks (WSNs). To use cryptography effectively however, the cryptographic keys need to be managed properly. First of all, the necessary keys need to be distributed to the nodes before the node

  11. Key Management Building Blocks for Wireless Sensor Networks

    NARCIS (Netherlands)

    Law, Y.W.; Doumen, J.M.; Palaniswami, M

    2007-01-01

    Cryptography is the means to ensure data confidentiality, integrity and authentication in wireless sensor networks (WSNs). To use cryptography effectively however, the cryptographic keys need to be managed properly. First of all, the necessary keys need to be distributed to the nodes before the

  12. METHOD OF GENERATING COMMON CRYPTOGRAPHIC KEYS FOR LOOSLY COINCIDENT BINARY SEQUENCES

    Directory of Open Access Journals (Sweden)

    V. L. Pivovarov

    2016-01-01

    Full Text Available The method of forming a common secret binary sequence between using an open communication channel is considered. The method is not based on common unidirectional functions and results in iterative elimination of distinct bits in the initial binary sequences with a certain percentage of mismatches, intentionally made by subscribers themselves. The cryptanalysis technique of this method based on the use of the deviation of aprior distribution of probabilities of inverting bits in the original binary sequences of subscribers from uniform distribution is proposed. Part of the bits in the final secret sequence can be identified accurately enough.

  13. Automatic Inference of Cryptographic Key Length Based on Analysis of Proof Tightness

    Science.gov (United States)

    2016-06-01

    the general number field sieve (GNFS) algorithm [23]. 16 CHAPTER 4: Concept of Operations and Design In this chapter we discuss concept of operations...maintaining and automatically reasoning about these expanded attack trees. We provide a software tool that utilizes machine -readable proof and attack metadata...for maintaining and automatically reasoning about these expanded attack trees. We provide a software tool that utilizes machine -readable proof and

  14. Abstraction for Epistemic Model Checking of Dining Cryptographers-based Protocols

    CERN Document Server

    Al-Bataineh, Omar I

    2010-01-01

    The paper describes an abstraction for protocols that are based on multiple rounds of Chaum's Dining Cryptographers protocol. It is proved that the abstraction preserves a rich class of specifications in the logic of knowledge, including specifications describing what an agent knows about other agents' knowledge. This result can be used to optimize model checking of Dining Cryptographers-based protocols, and applied within a methodology for knowledge-based program implementation and verification. Some case studies of such an application are given, for a protocol that uses the Dining Cryptographers protocol as a primitive in an anonymous broadcast system. Performance results are given for model checking knowledge-based specifications in the concrete and abstract models of this protocol, and some new conclusions about the protocol are derived.

  15. The Evaluation of Vehicle Mass Reduction and Material Choice in Life Cycle Assessments: Key Factors and Dynamic Industries

    Science.gov (United States)

    Developments in the realm of lightweight materials for automotive use continue to be announced by the industry and by academia. This session will provide new and updated information on new generation of materials. Additionally, this session will focus on the key topics involved i...

  16. Performance Impacts of Lower-Layer Cryptographic Methods in Mobile Wireless Ad Hoc Networks

    Energy Technology Data Exchange (ETDEWEB)

    VAN LEEUWEN, BRIAN P.; TORGERSON, MARK D.

    2002-10-01

    In high consequence systems, all layers of the protocol stack need security features. If network and data-link layer control messages are not secured, a network may be open to adversarial manipulation. The open nature of the wireless channel makes mobile wireless mobile ad hoc networks (MANETs) especially vulnerable to control plane manipulation. The objective of this research is to investigate MANET performance issues when cryptographic processing delays are applied at the data-link layer. The results of analysis are combined with modeling and simulation experiments to show that network performance in MANETs is highly sensitive to the cryptographic overhead.

  17. Negative thermal expansion materials: technological key for control of thermal expansion

    OpenAIRE

    Koshi Takenaka

    2012-01-01

    Most materials expand upon heating. However, although rare, some materials contract upon heating. Such negative thermal expansion (NTE) materials have enormous industrial merit because they can control the thermal expansion of materials. Recent progress in materials research enables us to obtain materials exhibiting negative coefficients of linear thermal expansion over −30 ppm K−1. Such giant NTE is opening a new phase of control of thermal expansion in composites. Specifically examining pra...

  18. Negative thermal expansion materials: technological key for control of thermal expansion.

    Science.gov (United States)

    Takenaka, Koshi

    2012-02-01

    Most materials expand upon heating. However, although rare, some materials contract upon heating. Such negative thermal expansion (NTE) materials have enormous industrial merit because they can control the thermal expansion of materials. Recent progress in materials research enables us to obtain materials exhibiting negative coefficients of linear thermal expansion over -30 ppm K(-1). Such giant NTE is opening a new phase of control of thermal expansion in composites. Specifically examining practical aspects, this review briefly summarizes materials and mechanisms of NTE as well as composites containing NTE materials, based mainly on activities of the last decade.

  19. Training on Transport Security of Nuclear/Radioactive Materials for Key Audiences

    Energy Technology Data Exchange (ETDEWEB)

    Pope, Ronald; Liu, Yung; Shuler, J.M.

    2016-01-01

    development of the relevant teaching materials for the course have largely been completed, tailoring the course for targeted audiences becomes a relatively easy task, requiring less effort and providing more flexibility for both the lecturers and future participants. One-day or two-day courses with focus specifically on the U.S. transport security requirements can be delivered, at locations away from Argonne, by one or two principal lecturers to targeted audiences such as regulators, shippers, carriers, state and local law enforcement personnel, and emergency responders. This paper will highlight the lessons learned in hosting previous one-week courses and discuss the development of options for detailed and/or customized courses/workshops for targeted key audiences.

  20. A Novel Method for Generating Encryption Keys

    Directory of Open Access Journals (Sweden)

    Dascalescu Ana Cristina

    2009-12-01

    Full Text Available The development of the informational society, which has led to an impressive growth of the information volume circulating in the computer networks, has accelerated the evolution and especially the use of modern cryptography instruments. Today, the commercial products use standard cryptographic libraries that implement certified and tested cryptographic algorithms. Instead, the fragility ofencryption algorithms is given by compositional operations like key handling or key generation. In this sense, the article proposes an innovative method to generate pseudorandom numbers which can be used for the construction of secure stream encryption keys. The proposed method is based on the mathematical complements based on the algebra of the finite fields and uses a particularized structure of the linear feedback shift registers.

  1. Status and key issues of reduced activation ferritic/martensitic steels as the structural material for a DEMO blanket

    Science.gov (United States)

    Tanigawa, H.; Shiba, K.; Möslang, A.; Stoller, R. E.; Lindau, R.; Sokolov, M. A.; Odette, G. R.; Kurtz, R. J.; Jitsukawa, S.

    2011-10-01

    The status and key issues of reduced activation ferritic/martensitic (RAFM) steels R&D are reviewed as the primary candidate structural material for fusion energy demonstration reactor blankets. This includes manufacturing technology, the as-fabricated and irradiates material database and joining technologies. The review indicated that the manufacturing technology, joining technology and database accumulation including irradiation data are ready for initial design activity, and also identifies various issues that remain to be solved for engineering design activity and qualification of the material for international fusion material irradiation facility (IFMIF) irradiation experiments that will validate the data base.

  2. Status and key issues of reduced activation ferritic/martensitic steels as the structural material for a DEMO blanket

    Energy Technology Data Exchange (ETDEWEB)

    Tanigawa, Hiroyasu [ORNL; Stoller, Roger E [ORNL; Sokolov, Mikhail A [ORNL; Odette, G.R. [University of California, Santa Barbara; Jitsukawa, Shiro [Japan Atomic Energy Agency (JAEA); Shiba, K. [Japan Atomic Energy Agency (JAEA); Kurtz, Richard [Pacific Northwest National Laboratory (PNNL); Moeslang, A. [Forschungszentrum Karlsruhe, Karlsruhe, Germany; Lindau, R. [Forschungszentrum Karlsruhe, Karlsruhe, Germany

    2011-01-01

    The status and key issues of reduced activation ferritic/martensitic (RAFM) steels R&D are reviewed as the primary candidate structural material for fusion energy demonstration reactor blankets. This includes manufacturing technology, the as-fabricated and irradiates material database and joining technologies. The review indicated that the manufacturing technology, joining technology and database accumulation including irradiation data are ready for initial design activity, and also identifies various issues that remain to be solved for engineering design activity and qualification of the material for international fusion material irradiation facility (IFMIF) irradiation experiments that will validate the data base.

  3. Analysis of cryptographic mechanisms used in ransomware CryptXXX v3

    Directory of Open Access Journals (Sweden)

    Michał Glet

    2016-12-01

    Full Text Available The main purpose of this paper was to analysis how malicious software is using cryptographic mechanisms. Reverse engineering were applied in order to discover mechanisms used in ransomware CryptXXX v3. At the end were given some useful advices how to improve CryptXXX.[b]Keyword:[/b] ransomware, software engineering, reverse engineering, RC4, RSA, malicious software

  4. Type-Based Automated Verification of Authenticity in Asymmetric Cryptographic Protocols

    DEFF Research Database (Denmark)

    Dahl, Morten; Kobayashi, Naoki; Sun, Yunde

    2011-01-01

    Gordon and Jeffrey developed a type system for verification of asymmetric and symmetric cryptographic protocols. We propose a modified version of Gordon and Jeffrey's type system and develop a type inference algorithm for it, so that protocols can be verified automatically as they are, without any...

  5. Construction of cryptographic information protection in automated control systems for rapid reaction military forces

    Directory of Open Access Journals (Sweden)

    Sergey Petrovich Evseev

    2012-04-01

    Full Text Available New approaches to realizations of military operations are analyzed. The main factors that directly affect the construction and operation of information security subsystems in prospective automated command and control military systems are described. Possible ways of the construction of cryptographic subsystems of information protection in automated operation management systems for united military force groups are investigated.

  6. Analysis of cryptographic mechanisms used in ransomware CryptXXX v3

    OpenAIRE

    Michał Glet

    2016-01-01

    The main purpose of this paper was to analysis how malicious software is using cryptographic mechanisms. Reverse engineering were applied in order to discover mechanisms used in ransomware CryptXXX v3. At the end were given some useful advices how to improve CryptXXX.[b]Keyword:[/b] ransomware, software engineering, reverse engineering, RC4, RSA, malicious software

  7. Generation of Biometric key for use in DES

    Directory of Open Access Journals (Sweden)

    Rupam Kumar Sharma

    2012-11-01

    Full Text Available Cryptography is an important field in the area of data encryption. There are different cryptographic techniques available varying from the simplest to complex. One of the complex symmetric key cryptography techniques is using Data Encryption Standard Algorithm. This paper explores a unique approach to generation of key using fingerprint. The generated key is used as an input key to the DES Algorithm

  8. Resilience Analysis of Key Update Strategies for Resource-Constrained Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2011-01-01

    Severe resource limitations in certain types of networks lead to various open issues in security. Since such networks usually operate in unattended or hostile environments, revoking the cryptographic keys and establishing (also distributing) new keys – which we refer to as key update – is a criti...

  9. Resilience Analysis of Key Update Strategies for Resource-Constrained Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2011-01-01

    Severe resource limitations in certain types of networks lead to various open issues in security. Since such networks usually operate in unattended or hostile environments, revoking the cryptographic keys and establishing (also distributing) new keys – which we refer to as key update – is a criti...

  10. A Multi-Threaded Cryptographic Pseudorandom Number Generator Test Suite

    Science.gov (United States)

    2016-09-01

    be a practical attack on the key. More recently, improper initialization of the PRNG led to android digital wallets being hijacked [4]. For military...a practical attack on the key. More 3 recently, improper initialization of a PRNG led to android digital wallets being hijacked [4]. Adopting the...appears to exist differentiating it from random, however, is both intuitive and natural. As a result, statistical test suites have been developed which

  11. Materializing Heart Regeneration: Biomimicry of Key Observations in Cell Transplantation Therapies and Natural Cardiac Regeneration

    Science.gov (United States)

    Kong, Yen P.; Jongpaiboonkit, Leena

    2016-07-01

    New regenerative paradigms are needed to address the growing global problem of heart failure as existing interventions are unsatisfactory. Outcomes from the current paradigm of cell transplantation have not been stellar but the mechanistic knowledge learned from them is instructive in the development of future paradigms. An emerging biomaterial-based approach incorporating key mechanisms and additional ones scrutinized from the process of natural heart regeneration in zebrafish may become the next evolution in cardiac repair. We highlight, with examples, tested key concepts and pivotal ones that may be integrated into a successful therapy.

  12. Autonomous open-source hardware apparatus for quantum key distribution

    Directory of Open Access Journals (Sweden)

    Ignacio H. López Grande

    2016-01-01

    Full Text Available We describe an autonomous, fully functional implementation of the BB84 quantum key distribution protocol using open source hardware microcontrollers for the synchronization, communication, key sifting and real-time key generation diagnostics. The quantum bits are prepared in the polarization of weak optical pulses generated with light emitting diodes, and detected using a sole single-photon counter and a temporally multiplexed scheme. The system generates a shared cryptographic key at a rate of 365 bps, with a raw quantum bit error rate of 2.7%. A detailed description of the peripheral electronics for control, driving and communication between stages is released as supplementary material. The device can be built using simple and reliable hardware and it is presented as an alternative for a practical realization of sophisticated, yet accessible quantum key distribution systems. Received: 11 Novembre 2015, Accepted: 7 January 2016; Edited by: O. Martínez; DOI: http://dx.doi.org/10.4279/PIP.080002 Cite as: I H López Grande, C T Schmiegelow, M A Larotonda, Papers in Physics 8, 080002 (2016

  13. Synthesis of Key Intermediate for a New Nanoseparation Material HOPO-SAMMS

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    <正>During the process of radioactive waste treatment and disposal, waste minimization is recognized as a challenging issue. New nanoseparation materials provide a broad prospect for preparing compounds

  14. Study on the Key Success Factors of the Operation of a Regional Military Logistic Food Material Center

    Directory of Open Access Journals (Sweden)

    Fu-Jin Wang

    2010-01-01

    Full Text Available Problem statement: In order to establish an integrated supply system of the military food material, the study was to discuss the key success factors of operation of the military regional food material logistic center in Taiwan. Approach: The Delphi method, questionnaires and telephone interviews were used to collect and integrate the opinions of experts and scholars. Simultaneously, the Analytic Hierarchy Process (AHP was applied to confirm the evaluative factors of each level, i.e., one goal (to construct key success factors of the operation of a regional military logistic food material center for the first level, two analytical aspects (the external and internal environments for the second level, six evaluative facets (the safety design, strategic management, administrative effect, policy, service and internal and external integration for the third level and 19 evaluative criteria for the fourth level. Results: The 350 questionnaires from the second phase which were sent out to four kinds of respondents, 319 valid ones were returned. Conclusion: After AHP analysis, the results of this study could suggest an evaluation table for the key success factors of operation of the military regional food material logistic center in Taiwan.

  15. Total neutron scattering: The key to the local and medium range structure of complex materials

    Indian Academy of Sciences (India)

    Th Proffen

    2008-10-01

    Structural characterization is mainly based on the measurement of Bragg intensities and yields the average structure of crystalline materials. The total scattering pattern, however, contains structural information over all length scales, and it can be used to obtain a complete structural picture of complex materials. Suddenly one has access to a new parameter, the real-space range of the refinement and structures can be analysed as a function of length scale straightforwardly.

  16. Clinical translation of biomedical materials and the key factors towards product registration

    Directory of Open Access Journals (Sweden)

    Yuan Yuan

    2014-04-01

    Full Text Available Biomedical materials have been developed for facilitating tissue regeneration and healing enhancement. Although research on biomedical materials has made great progress in material innovation and preclinical testing, the bottleneck is their translation from research and development to clinical applications; that is, the current rate of product registration and industrialization is low, which directly affects their clinical applications. In this paper, we introduce the basic features of biomedical materials towards the making of medical products and the experiences of our group in research and clinical translation of biomaterials for bone-tissue regeneration in the last few years. Based on our experience, we propose that the translational medicine platform (TMP is an effective route to facilitate the progress of biomedical materials from bench to bedside. Moreover, from the viewpoints of scientific technology and management, the functions of TMP were also addressed. Relationships among TMP, research institution, enterprise, and government were also explored from the viewpoints of technological innovation, chemical engineering integration, fund raising, and management. This paper provides a theoretical and practical reference for clinical translation of biomedical materials.

  17. Security Notions for Quantum Public-Key Cryptography

    OpenAIRE

    Koshiba, Takeshi

    2007-01-01

    It is well known that Shor's quantum algorithm for integer factorization can break down the RSA public-key cryptosystem, which is widely used in many cryptographic applications. Thus, public-key cryptosystems in the quantum computational setting are longed for cryptology. In order to define the security notions of public-key cryptosystems, we have to model the power of the sender, receiver, adversary and channel. While we may consider a setting where quantum computers are available only to ad...

  18. On the construction of cryptographically strong Boolean functions with desirable trade-off

    Institute of Scientific and Technical Information of China (English)

    REN Kui; PARK Jaemin; KIM Kwangjo

    2005-01-01

    This paper proposes a practical algorithm for systematically generating strong Boolean functions (f:GF(2)n→GF(2))with cryptographic meaning. This algorithm takes bent function as input and directly outputs the resulted Boolean function in terms of truth table sequence. This algorithm was used to develop two classes of balanced Boolean functions, one of which has very good cryptographic properties: nl(f)=22k-1-2k+2k-2 (n=2k), with the sum-of-squares avalanche characteristic off satisfying σf=24k+23k+2+23k+23k-2 and the absolute avalanche characteristic of △f satisfying △f=2k+1. This is the best result up to now compared to existing ones. Instead of bent sequences, starting from random Boolean functions was also tested in the algorithm. Experimental results showed that starting from bent sequences is highly superior to starting from random Boolean functions.

  19. Characterization of the Key Material for Elimination of PM2.5 Particles in the Atmosphere

    Directory of Open Access Journals (Sweden)

    Bo Qiu

    2015-01-01

    Full Text Available In recent years, with the gradual deterioration of air quality and with the more and more frequency of haze weather phenomenon, it intrudes into the human body and brings great harm to human health when people are unprepared. The basic theory that anion could purify air and eliminate positive ion explains that anion balata modified bitumen could reduce PM2.5, and the number of anion pavement release relates to the air purification. At the same time, building materials plaza and pavement materials with many functions were designed which can release negative ions, eliminate PM2.5 particles, and decompose harmful components of fuel vehicle exhaust.

  20. Advancement of Systems Designs and Key Engineering Technologies for Materials Based Hydrogen Storage

    Energy Technology Data Exchange (ETDEWEB)

    van Hassel, Bart A. [United Technologies Research Center, East Hartford, CT (United States)

    2015-09-18

    UTRC lead the development of the Simulink Framework model that enables a comparison of different hydrogen storage systems on a common basis. The Simulink Framework model was disseminated on the www.HSECoE.org website that is hosted by NREL. UTRC contributed to a better understanding of the safety aspects of the proposed hydrogen storage systems. UTRC also participated in the Failure Mode and Effect Analysis of both the chemical- and the adsorbent-based hydrogen storage system during Phase 2 of the Hydrogen Storage Engineering Center of Excellence. UTRC designed a hydrogen storage system with a reversible metal hydride material in a compacted form for light-duty vehicles with a 5.6 kg H2 storage capacity, giving it a 300 miles range. It contains a heat exchanger that enables efficient cooling of the metal hydride material during hydrogen absorption in order to meet the 3.3 minute refueling time target. It has been shown through computation that the kinetics of hydrogen absorption of Ti-catalyzed NaAlH4 was ultimately limiting the rate of hydrogen absorption to 85% of the material capacity in 3.3 minutes. An inverse analysis was performed in order to determine the material property requirements in order for a metal hydride based hydrogen storage system to meet the DOE targets. Work on metal hydride storage systems was halted after the Phase 1 to Phase 2 review due to the lack of metal hydride materials with the required material properties. UTRC contributed to the design of a chemical hydrogen storage system by developing an adsorbent for removing the impurity ammonia from the hydrogen gas, by developing a system to meter the transport of Ammonia Borane (AB) powder to a thermolysis reactor, and by developing a gas-liquid-separator (GLS) for the separation of hydrogen gas from AB slurry in silicone oil. Stripping impurities from hydrogen gas is essential for a long life of the fuel cell system on board of a vehicle. Work on solid transport of AB was halted after the

  1. A Real-Time Performance Analysis Model for Cryptographic Protocols

    Directory of Open Access Journals (Sweden)

    Amos Olagunju

    2012-12-01

    Full Text Available Several encryption algorithms exist today for securing data in storage and transmission over network systems. The choice of encryption algorithms must weigh performance requirements against the call for protection of sensitive data. This research investigated the processing times of alternative encryption algorithms under specific conditions. The paper presents the architecture of a model multiplatform tool for the evaluation of candidate encryption algorithms based on different data and key sizes. The model software was used to appraise the real-time performance of DES, AES, 3DES, MD5, SHA1, and SHA2 encryption algorithms.

  2. Efficient Big Integer Multiplication and Squaring Algorithms for Cryptographic Applications

    Directory of Open Access Journals (Sweden)

    Shahram Jahani

    2014-01-01

    Full Text Available Public-key cryptosystems are broadly employed to provide security for digital information. Improving the efficiency of public-key cryptosystem through speeding up calculation and using fewer resources are among the main goals of cryptography research. In this paper, we introduce new symbols extracted from binary representation of integers called Big-ones. We present a modified version of the classical multiplication and squaring algorithms based on the Big-ones to improve the efficiency of big integer multiplication and squaring in number theory based cryptosystems. Compared to the adopted classical and Karatsuba multiplication algorithms for squaring, the proposed squaring algorithm is 2 to 3.7 and 7.9 to 2.5 times faster for squaring 32-bit and 8-Kbit numbers, respectively. The proposed multiplication algorithm is also 2.3 to 3.9 and 7 to 2.4 times faster for multiplying 32-bit and 8-Kbit numbers, respectively. The number theory based cryptosystems, which are operating in the range of 1-Kbit to 4-Kbit integers, are directly benefited from the proposed method since multiplication and squaring are the main operations in most of these systems.

  3. A novel key management scheme using biometrics

    Science.gov (United States)

    Sui, Yan; Yang, Kai; Du, Yingzi; Orr, Scott; Zou, Xukai

    2010-04-01

    Key management is one of the most important issues in cryptographic systems. Several important challenges in such a context are represented by secure and efficient key generation, key distribution, as well as key revocation. Addressing such challenges requires a comprehensive solution which is robust, secure and efficient. Compared to traditional key management schemes, key management using biometrics requires the presence of the user, which can reduce fraud and protect the key better. In this paper, we propose a novel key management scheme using iris based biometrics. Our newly proposed scheme outperforms traditional key management schemes as well as some existing key-binding biometric schemes in terms of security, diversity and/or efficiency.

  4. Security issues of quantum cryptographic systems with imperfect detectors

    Science.gov (United States)

    Burenkov, Viacheslav

    The laws of quantum physics can be used to secure communications between two distant parties in a scheme called quantum key distribution (QKD), even against a technologically unlimited eavesdropper. While the theoretical security of QKD has been proved rigorously, current implementations of QKD are generally insecure. In particular, mathematical models of devices, such as detectors, do not accurately describe their real-life behaviour. Such seemingly insignificant discrepancies can compromise the security of the entire scheme, especially as novel detector technologies are being developed with little regard for potential vulnerabilities. In this thesis, we study how detector imperfections can impact the security of QKD and how to overcome such technological limitations. We first analyze the security of a high-speed QKD system with finite detector dead time tau. We show that the previously reported sifting approaches are not guaranteed to be secure in this regime. More specifically, Eve can induce a basis-dependent detection efficiency at the receiver's end. Modified key sifting schemes that are basis-independent, and thus secure in the presence of dead time and an active eavesdropper, are discussed and compared. It is shown that the maximum key generation rate is 1/(2tau) for passive basis selection, and 1/tau for active basis selection. The security analysis is also extended to the decoy state BB84 protocol. We then study a relatively new type of single-photon detector called the superconducting nanowire single-photon detector (SNSPD), and discover some unexpected behaviour. We report an afterpulsing effect present when the SNSPD is operated in the high bias current regime. In our standard set-up, the afterpulsing is most likely to occur at around 180 ns following a detection event, for both real counts and dark counts. We characterize the afterpulsing behaviour and speculate that it is not due to the SNSPD itself but rather the associated read-out circuit. We also

  5. Multipartite Gaussian steering: monogamy constraints and cryptographical applications

    CERN Document Server

    Xiang, Yu; Adesso, Gerardo; He, Qiongyi

    2016-01-01

    We derive laws for the distribution of quantum steering among different parties in multipartite Gaussian states under Gaussian measurements. We prove that a monogamy relation akin to the generalized Coffman-Kundu-Wootters inequality holds quantitatively for a recently introduced measure of Gaussian steering. We then define the residual Gaussian steering, stemming from the monogamy inequality, as an indicator of collective steering-type correlations. For pure three-mode Gaussian states, the residual acts a quantifier of genuine multipartite steering, and is interpreted operationally in terms of the guaranteed key rate in the task of secure quantum secret sharing. Optimal resource states for the latter protocol are identified, and their possible experimental implementation discussed. Our results pin down the role of multipartite steering for quantum communication.

  6. High-Purity Semiconducting Single-Walled Carbon Nanotubes: A Key Enabling Material in Emerging Electronics.

    Science.gov (United States)

    Lefebvre, Jacques; Ding, Jianfu; Li, Zhao; Finnie, Paul; Lopinski, Gregory; Malenfant, Patrick R L

    2017-09-13

    Semiconducting single-walled carbon nanotubes (sc-SWCNTs) are emerging as a promising material for high-performance, high-density devices as well as low-cost, large-area macroelectronics produced via additive manufacturing methods such as roll-to-roll printing. Proof-of-concept demonstrations have indicated the potential of sc-SWCNTs for digital electronics, radiofrequency circuits, radiation hard memory, improved sensors, and flexible, stretchable, conformable electronics. Advances toward commercial applications bring numerous opportunities in SWCNT materials development and characterization as well as fabrication processes and printing technologies. Commercialization in electronics will require large quantities of sc-SWCNTs, and the challenge for materials science is the development of scalable synthesis, purification, and enrichment methods. While a few synthesis routes have shown promising results in making near-monochiral SWCNTs, gram quantities are available only for small-diameter sc-SWCNTs, which underperform in transistors. Most synthesis routes yield mixtures of SWCNTs, typically 30% metallic and 70% semiconducting, necessitating the extraction of sc-SWCNTs from their metallic counterparts in high purity using scalable postsynthetic methods. Numerous routes to obtain high-purity sc-SWCNTs from raw soot have been developed, including density-gradient ultracentrifugation, chromatography, aqueous two-phase extraction, and selective DNA or polymer wrapping. By these methods (termed sorting or enrichment), >99% sc-SWCNT content can be achieved. Currently, all of these approaches have drawbacks and limitations with respect to electronics applications, such as excessive dilution, expensive consumables, and high ionic impurity content. Excess amount of dispersant is a common challenge that hinders direct inclusion of sc-SWCNTs into electronic devices. At present, conjugated polymer extraction may represent the most practical route to sc-SWCNTs. By the use of

  7. Calcium Phosphate as a Key Material for Socially Responsible Tissue Engineering

    Directory of Open Access Journals (Sweden)

    Vuk Uskoković

    2016-06-01

    Full Text Available Socially responsible technologies are designed while taking into consideration the socioeconomic, geopolitical and environmental limitations of regions in which they will be implemented. In the medical context, this involves making therapeutic platforms more accessible and affordable to patients in poor regions of the world wherein a given disease is endemic. This often necessitates going against the reigning trend of making therapeutic nanoparticles ever more structurally complex and expensive. However, studies aimed at simplifying materials and formulations while maintaining the functionality and therapeutic response of their more complex counterparts seldom provoke a significant interest in the scientific community. In this review we demonstrate that such compositional simplifications are meaningful when it comes to the design of a solution for osteomyelitis, a disease that is in its natural, non-postoperative form particularly prevalent in the underdeveloped parts of the world wherein poverty, poor sanitary conditions, and chronically compromised defense lines of the immune system are the norm. We show that calcium phosphate nanoparticles, which are inexpensive to make, could be chemically designed to possess the same functionality as a hypothetic mixture additionally composed of: (a a bone growth factor; (b an antibiotic for prophylactic or anti-infective purposes; (c a bisphosphonate as an antiresorptive compound; (d a viral vector to enable the intracellular delivery of therapeutics; (e a luminescent dye; (f a radiographic component; (g an imaging contrast agent; (h a magnetic domain; and (i polymers as viscous components enabling the injectability of the material and acting as carriers for the sustained release of a drug. In particular, calcium phosphates could: (a produce tunable drug release profiles; (b take the form of viscous and injectable, self-setting pastes; (c be naturally osteo-inductive and inhibitory for osteoclastogenesis

  8. The key numbers of the mineral raw materials; Les chiffres cles des matieres premieres minerales

    Energy Technology Data Exchange (ETDEWEB)

    Mandil, C. [Directeur General de l`Energie et des Matieres Premieres, France (France)]|[Ministere de l`Industrie, des Postes et Telecommunications et du Commerce Exterieur, 75 - Paris (France)

    1996-12-31

    Mineral raw materials come from fossil reserves or ores resulting from the geologic and climatic history of the Earth. The access to economic development for 80% of the worldwide population and the high rate of demographic growth (probably 8 billions of inhabitants in 2025) are important factors that can greatly multiply the worldwide consumption of ores. In parallel, environmental concerns and the increasing need for a better equilibrium between wildlife preservation and the supply of economic needs, lead to a more reasonable and mastered use of natural resources. The aim of this book is to shade light and give global elements of thoughts on mineral resources, and for the main of those (about 30 metals and mineral substances), to review the most useful data and references about their production and consumption. For each question, chapters are devoted to the situation of France in its worldwide context. One chapter concerns the uranium ores (reserves, production, prices evolution, consumption, economic flux and companies involved). (J.S.).

  9. Investigation of Key Parameters of Rock Cracking Using the Expansion of Vermiculite Materials

    Science.gov (United States)

    Ahn, Chi-Hyung; Hu, Jong Wan

    2015-01-01

    The demand for the development of underground spaces has been sharply increased in lieu of saturated ground spaces because the residents of cities have steadily increased since the 1980s. The traditional widely used excavation methods (i.e., explosion and shield) have caused many problems, such as noise, vibration, extended schedule, and increased costs. The vibration-free (and explosion-free) excavation method has currently attracted attention in the construction site because of the advantage of definitively solving these issues. For such reason, a new excavation method that utilizes the expansion of vermiculite with relatively fewer defects is proposed in this study. In general, vermiculite materials are rapidly expanded in volume when they receive thermal energy. Expansion pressure can be produced by thermal expansion of vermiculite in a steel tube, and measured by laboratory tests. The experimental tests are performed with various influencing parameters in an effort to seek the optimal condition to effectively increase expansion pressure at the same temperature. Then, calibrated expansion pressure is estimated, and compared to each model. After analyzing test results for expansion pressure, it is verified that vermiculite expanded by heat can provide enough internal pressure to break hard rock during tunneling work. PMID:28793610

  10. Optimal Cryptographic Technique to increase the Data Security

    Directory of Open Access Journals (Sweden)

    K Laxmi Narayan

    2013-03-01

    Full Text Available There are many aspects to security ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of secret key Cryptography. It is the automated method in which security goals are accomplished. It includes the process of encryption that converts plain-text into cipher-text. The process of decryption reconverts the cipher-text into plain-text. Secure communication is the prime requirement of every organization. To achieve this, one can use many techniques or algorithms available for Cryptography. In this context, we analyze and implement extremely protected cryptography scheme using the properties of quaternion which is the extension of the complex numbers and Farey fractions, Farey sequence of order n is the sequence of completely reduced fractions between 0 and 1. The proposed techniques in this paper can help in increasing the accurateness and wholeness of network topology discovery and can control existing protocol and hardware features, and also can be implemented easily.

  11. A Class of Key Predistribution Schemes Based on Orthogonal Arrays

    Institute of Scientific and Technical Information of China (English)

    Jun-Wu Dong; Ding-Yi Pei; Xue-Li Wang

    2008-01-01

    Pairwise key establishment is a fundamental security service in sensor networks; it enables sensor nodes to communicate securely with each other using cryptographic techniques. In order to ensure this security, many approaches have been proposed recently. One of them is to use key predistribution schemes for distributed sensor networks. The secure connectivity and resilience of the resulting sensor network are analyzed. This KPS constructed in our paper has some better properties than those of the existing schemes.

  12. Recent Progress on the Key Materials and Components for Proton Exchange Membrane Fuel Cells in Vehicle Applications

    Directory of Open Access Journals (Sweden)

    Cheng Wang

    2016-07-01

    Full Text Available Fuel cells are the most clean and efficient power source for vehicles. In particular, proton exchange membrane fuel cells (PEMFCs are the most promising candidate for automobile applications due to their rapid start-up and low-temperature operation. Through extensive global research efforts in the latest decade, the performance of PEMFCs, including energy efficiency, volumetric and mass power density, and low temperature startup ability, have achieved significant breakthroughs. In 2014, fuel cell powered vehicles were introduced into the market by several prominent vehicle companies. However, the low durability and high cost of PEMFC systems are still the main obstacles for large-scale industrialization of this technology. The key materials and components used in PEMFCs greatly affect their durability and cost. In this review, the technical progress of key materials and components for PEMFCs has been summarized and critically discussed, including topics such as the membrane, catalyst layer, gas diffusion layer, and bipolar plate. The development of high-durability processing technologies is also introduced. Finally, this review is concluded with personal perspectives on the future research directions of this area.

  13. Efficient cryptographic substitution box design using travelling salesman problem and chaos

    Directory of Open Access Journals (Sweden)

    Musheer Ahmad

    2016-09-01

    Full Text Available Symmetric encryption has been a standout amongst the most reliable option by which security is accomplished. In modern block symmetric cyphers, the substitution-boxes have been playing a critical role of nonlinear components that drives the actual security of cyphers. In this paper, the travelling salesman problem and piece-wise linear chaotic map are explored to synthesize an efficient configuration of 8 × 8 substitution-box. The proposed anticipated design has the consistency which is justified by the standard performance indexes. The statistical results manifest that the prospective substitution-box is cryptographically more impressive as compared to some recent investigations.

  14. Anonymous One-Time Broadcast Using Non-interactive Dining Cryptographer Nets with Applications to Voting

    Science.gov (United States)

    van de Graaf, Jeroen

    All voting protocols proposed so far, with the exception of a few, have the property that the privacy of the ballot is only computational. In this paper we outline a new and conceptually simple approach allowing us to construct a protocol in which the privacy of the ballot is unconditional. Our basic idea is to modify the protocol of Fujioka, Okamoto and Ohta[1], which uses blind signatures so that the voter can obtain a valid ballot. However, instead of using a MIX net, we use a new broadcast protocol for anonymously publishing the vote, a Non-Interactive variation of the Dining Cryptographer Net.

  15. MEANING OF THE BITCOIN CRYPTOGRAPHIC CURRENCY AS A MEDIUM OF EXCHANGE

    Directory of Open Access Journals (Sweden)

    Łukasz Dopierała

    2014-06-01

    Full Text Available This article presents one of the new elements of virtual reality, which is the Bitcoin cryptocurrency. This thesis focuses on the condition and perspectives on development of the trading function of this instrument. The authors discuss the legal aspects of functioning of the Bitcoin, conduct a SWOT analysis of this cryptocurrency as a medium of exchange, and examin the scale of use of Bitcoin in transaction purposes. As of March 1, 2014 the trading system gradually develops and the strengths of this cryptographic currency outweigh its weaknesses, but the future of Bitcoin as a medium of exchange is difficult to determine.

  16. The FPGA realization of the general cellular automata based cryptographic hash functions: Performance and effectiveness

    Directory of Open Access Journals (Sweden)

    P. G. Klyucharev

    2014-01-01

    Full Text Available In the paper the author considers hardware implementation of the GRACE-H family general cellular automata based cryptographic hash functions. VHDL is used as a language and Altera FPGA as a platform for hardware implementation. Performance and effectiveness of the FPGA implementations of GRACE-H hash functions were compared with Keccak (SHA-3, SHA-256, BLAKE, Groestl, JH, Skein hash functions. According to the performed tests, performance of the hardware implementation of GRACE-H family hash functions significantly (up to 12 times exceeded performance of the hardware implementation of previously known hash functions, and effectiveness of that hardware implementation was also better (up to 4 times.

  17. SECOQC White Paper on Quantum Key Distribution and Cryptography

    CERN Document Server

    Alleaume, R; Branciard, C; Debuisschert, T; Dianati, M; Gisin, N; Godfrey, M; Grangier, P; Langer, T; Leverrier, A; Lütkenhaus, N; Painchault, P; Peev, M; Poppe, A; Pornin, T; Rarity, J; Renner, R; Ribordy, G; Riguidel, M; Salvail, L; Shields, A; Weinfurter, H; Zeilinger, A; Alleaume, Romain; Bouda, Jan; Branciard, Cyril; Debuisschert, Thierry; Dianati, Mehrdad; Gisin, Nicolas; Godfrey, Mark; Grangier, Philippe; Langer, Thomas; Leverrier, Anthony; Lutkenhaus, Norbert; Painchault, Philippe; Peev, Momtchil; Poppe, Andreas; Pornin, Thomas; Rarity, John; Renner, Renato; Ribordy, Gregoire; Riguidel, Michel; Salvail, Louis; Shields, Andrew; Weinfurter, Harald; Zeilinger, Anton

    2007-01-01

    The SECOQC White Paper on Quantum Key Distribution and Cryptography is the outcome on a thorough consultation and discussion among the participants of the European project SECOQC (www.secoqc.net). This paper is a review article that attempts to position Quantum Key Distribution (QKD) in terms of cryptographic applications. A detailed comparison of QKD with the solutions currently in use to solve the key distribution problem, based on classical cryptography, is provided. We also detail how the work on QKD networks lead within SECOQC will allow the deployment of long-distance secure communication infrastructures based on quantum cryptography. The purpose of the White Paper is finally to promote closer collaboration between classical and quantum cryptographers. We believe that very fruitful research, involving both communities, could emerge in the future years and try to sketch what may be the next challenges in this direction.

  18. Unique Physically Anchored Cryptographic Theoretical Calculation of the Fine-Structure Constant {\\alpha} Matching both the g/2 and Interferometric High-Precision Measurements

    CERN Document Server

    Rhodes, Charles Kirkham

    2010-01-01

    The fine-structure constant {\\alpha}, the dimensionless number that represents the strength of electromagnetic coupling in the limit of sufficiently low energy interactions, is the crucial fundamental physical parameter that governs a nearly limitless range of phenomena involving the interaction of radiation with materials. Ideally, the apparatus of physical theory should be competent to provide a calculational procedure that yields a quantitatively correct value for {\\alpha} and the physical basis for its computation. This study presents the first demonstration of an observationally anchored theoretical procedure that predicts a unique value for {\\alpha} that stands in full agreement with the best (~370 ppt) high-precision experimental determinations. In a directly connected cryptographic computation, the method that gives these results also yields the magnitude of the cosmological constant {\\Omega}{\\Lambda} in conformance with the observational data and the condition of perfect flatness ({\\Omega}{\\Lambda} +...

  19. A new class of codes for Boolean masking of cryptographic computations

    CERN Document Server

    Carlet, Claude; Kim, Jon-Lark; Solé, Patrick

    2011-01-01

    We introduce a new class of rate one half binary codes: complementary information set codes. A binary linear code of length 2n and dimension n is called a complementary information set code (CIS code for short) if it has two disjoint information sets. This class of codes contains self-dual codes as a subclass. It is connected to graph correlation immune Boolean functions of use in the security of hardware implementations of cryptographic primitives. Such codes permit to improve the cost of masking cryptographic algorithms against side channel attacks. In this paper we investigate this new class of codes: we give optimal or best known CIS codes of length < 132. We derive general constructions based on cyclic codes and on double circulant codes. We derive a Varshamov-Gilbert bound for long CIS codes, and show that they can all be classified in small lengths \\leq 12 by the building up construction. Some nonlinear S-boxes are constructed by using Z4-codes, based on the notion of dual distance of an unrestricte...

  20. Anonymous-key quantum cryptography and unconditionally secure quantum bit commitment

    CERN Document Server

    Yuen, H P

    2000-01-01

    A new cryptographic tool, anonymous quantum key technique, is introduced that leads to unconditionally secure key distribution and encryption schemes that can be readily implemented experimentally in a realistic environment. If quantum memory is available, the technique would have many features of public-key cryptography; an identification protocol that does not require a shared secret key is provided as an illustration. The possibility is also indicated for obtaining unconditionally secure quantum bit commitment protocols with this technique.

  1. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    The art of keeping messages secret is ancient. It must have been invented only shortly after the invention of the messages themselves. Merchants and generals have always had a need to exchange critical messages while keeping them secret from the prying eyes of competitors or the enemy. Classical...... framework. We call this framework VIFF, short for Virtual Ideal Functionality Framework. VIFF implements a UC functionality for general multiparty computation on asynchronous networks. We give a formal definition of the functionality in Chapter 3. There we also describe how we implemented the functionality...

  2. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    framework. We call this framework VIFF, short for Virtual Ideal Functionality Framework. VIFF implements a UC functionality for general multiparty computation on asynchronous networks. We give a formal definition of the functionality in Chapter 3. There we also describe how we implemented the functionality...

  3. A NOVEL APPROACH FOR INFORMATION SECURITY IN AD HOC NETWORKS THROUGH SECURE KEY MANAGEMENT

    Directory of Open Access Journals (Sweden)

    S. Suma Christal Mary

    2013-01-01

    Full Text Available Ad hoc networks provide flexible and adaptive networks with no fixed infrastructure and dynamic topology. Owe to the vulnerability nature of ad hoc network, there are lots of security threats that diminish the development of ad hoc networks. Therefore, to provide security for information of users and to preserve their privacy, it becomes mandatory to use cryptographic techniques to set up secure mobile ad hoc network. Earlier cryptographic method based on computational complexity ruins with the advent of fast computing computers. In this proposal, we proposed Secure Key Management (SKM framework. We make use of McEliece algorithm embedded with Dispense Key designed for key generation and for the key distribution and it is highly scalable with respect to memory. The experimental result shows that our framework provides a high-performance platform to execute key generation, key distribution scenarios. SKM framework reduces execution time of encryption and decryption by minimizing the number of keys.

  4. Error tolerance of two-basis quantum key-distribution protocols using qudits and two-way classical communication

    CERN Document Server

    Nikolopoulos, G M; Ranade, K S; Alber, Gernot; Nikolopoulos, Georgios M.; Ranade, Kedar S.

    2006-01-01

    We investigate the error tolerance of quantum cryptographic protocols using $d$-level systems. In particular, we focus on prepare-and-measure schemes that use two mutually unbiased bases and a key-distillation procedure with two-way classical communication. For arbitrary quantum channels, we obtain a sufficient condition for secret-key distillation which, in the case of isotropic quantum channels, yields an analytic expression for the maximally tolerable error rate of the cryptographic protocols under consideration. The difference between the tolerable error rate and its theoretical upper bound tends slowly to zero for sufficiently large dimensions of the information carriers.

  5. FINGERPRINT-BASED KEY BINDING/RECOVERING SCHEME BASED ON FUZZY VAULT

    Institute of Scientific and Technical Information of China (English)

    Feng Quan; Su Fei; Cai Anni

    2008-01-01

    This letter proposes fingerprint-based key binding/recovering with fuzzy vault. Fingerprint minutiae data and the cryptographic key are merged together by a multivariable linear function. First,the minutiae data are bound by a set of random data through the linear function. The number of the function's variables is determined by the required number of matched minutiae. Then, a new key derived from the random data is used to encrypt the cryptographic key. Lastly, the binding data are protected using fuzzy vault scheme. The proposed scheme provides the system with the flexibility to use changeable number of minutiae to bind/recover the protected key and a unified method regardless of the length of the key.

  6. MiMC: Efficient encryption and cryptographic hashing with minimal multiplicative complexity

    DEFF Research Database (Denmark)

    Albrecht, Martin; Grassi, Lorenzo; Rechberger, Christian;

    2016-01-01

    We explore cryptographic primitives with low multiplicative complexity. This is motivated by recent progress in practical applications of secure multi-party computation (MPC), fully homomorphic encryption (FHE), and zero-knowledge proofs (ZK) where primitives from symmetric cryptography are needed...... and where linear computations are, compared to non-linear operations, essentially “free”. Starting with the cipher design strategy “LowMC” from Eurocrypt 2015, a number of bitoriented proposals have been put forward, focusing on applications where the multiplicative depth of the circuit describing...... a new attack vector that outperforms others in relevant settings. Due to its very low number of multiplications, the design lends itself well to a large class of applications, especially when the depth does not matter but the total number of multiplications in the circuit dominates all aspects...

  7. The SAT solving method as applied to cryptographic analysis of asymmetric ciphers

    CERN Document Server

    Faizullin, R T; Dylkeyt, V I

    2009-01-01

    The one of the most interesting problem of discrete mathematics is the SAT (satisfiability) problem. Good way in SAT solver developing is to transform the SAT problem to the problem of continuous search of global minimums of the functional associated with the CNF. This article proves the special construction of the functional and offers to solve the system of non-linear algebraic equation that determines functional stationary points via modified method of consecutive approximation. The article describes parallel versions of the method. Also gives the schema of using the method to important problems of cryptographic analysis of asymmetric ciphers, including determining concrete bits of multipliers (in binary form) in large factorization problems and concrete bits of exponent of discrete logarithm problem.

  8. Efficient Implementation of Electronic Passport Scheme Using Cryptographic Security Along With Multiple Biometrics

    Directory of Open Access Journals (Sweden)

    V.K. NARENDIRA KUMAR

    2012-02-01

    Full Text Available Electronic passports have known a wide and fast deployment all around the world since the International Civil Aviation Organization the world has adopted standards whereby passports can store biometric identifiers. The use of biometrics for identification has the potential to make the lives easier, and the world people live in a safer place. The purpose of biometric passports is to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. The paper analyses the face, fingerprint, palm print and iris biometric e-passport design. The paper also provides a cryptographic security analysis of the e-passport using face fingerprint, palm print and iris biometric that are intended to provide improved security in protecting biometric information of the e-passport bearer.

  9. Key Management in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ismail Mansour

    2015-09-01

    Full Text Available Wireless sensor networks are a challenging field of research when it comes to security issues. Using low cost sensor nodes with limited resources makes it difficult for cryptographic algorithms to function without impacting energy consumption and latency. In this paper, we focus on key management issues in multi-hop wireless sensor networks. These networks are easy to attack due to the open nature of the wireless medium. Intruders could try to penetrate the network, capture nodes or take control over particular nodes. In this context, it is important to revoke and renew keys that might be learned by malicious nodes. We propose several secure protocols for key revocation and key renewal based on symmetric encryption and elliptic curve cryptography. All protocols are secure, but have different security levels. Each proposed protocol is formally proven and analyzed using Scyther, an automatic verification tool for cryptographic protocols. For efficiency comparison sake, we implemented all protocols on real testbeds using TelosB motes and discussed their performances.

  10. Confirming the key role of Ar+ ion bombardment in growth feature of nanostructured carbon materials by PECVD.

    Science.gov (United States)

    Liu, Yulin; Lin, Jinghuang; Jia, Henan; Chen, Shulin; Qi, J; Qu, Chaoqun; Cao, Jian; Feng, Jicai; Fei, Weidong

    2017-09-20

    In order to confirm the key role of plasma etching in growth feature of nanostructured carbon materials (NCMs), here we reported a novel strategy to in-situ create different states of plasma etching conditions in plasma enhanced chemical vapor deposition (PECVD) by separating catalyst film from substrate. Different plasma-related environments on either side of the catalyst film were created simultaneously for achieving multi-layered structural NCMs. Results showed that plasma etching is observed crucial and complex for the growth of NCMs. The effect of plasma etching has both positive and negative sides on carbon nanotubes (CNTs). On one hand, plasma etching can break up the structure of CNTs and thus thin CNTs cannot be obtained. On the other hand, plasma etching can remove the redundant carbon on surface of large catalyst particles, contributing to catalyzing thick CNTs. As a result, the diameter of CNTs depends on the state of plasma etching. For vertically oriented few-layer graphene (VFG), plasma etching is an essential asset and strong plasma etching can even change the CNTs into VFG. Therefore, specific multi-layered structural NCMs can be obtained by PECVD combining plasma etching with catalyst separation method, which is promising in many fields. © 2017 IOP Publishing Ltd.

  11. Embedded Platform for Automatic Testing and Optimizing of FPGA Based Cryptographic True Random Number Generators

    Directory of Open Access Journals (Sweden)

    M. Varchola

    2009-12-01

    Full Text Available This paper deals with an evaluation platform for cryptographic True Random Number Generators (TRNGs based on the hardware implementation of statistical tests for FPGAs. It was developed in order to provide an automatic tool that helps to speed up the TRNG design process and can provide new insights on the TRNG behavior as it will be shown on a particular example in the paper. It enables to test sufficient statistical properties of various TRNG designs under various working conditions on the fly. Moreover, the tests are suitable to be embedded into cryptographic hardware products in order to recognize TRNG output of weak quality and thus increase its robustness and reliability. Tests are fully compatible with the FIPS 140 standard and are implemented by the VHDL language as an IP-Core for vendor independent FPGAs. A recent Flash based Actel Fusion FPGA was chosen for preliminary experiments. The Actel version of the tests possesses an interface to the Actel’s CoreMP7 softcore processor that is fully compatible with the industry standard ARM7TDMI. Moreover, identical tests suite was implemented to the Xilinx Virtex 2 and 5 in order to compare the performance of the proposed solution with the performance of already published one based on the same FPGAs. It was achieved 25% and 65% greater clock frequency respectively while consuming almost equal resources of the Xilinx FPGAs. On the top of it, the proposed FIPS 140 architecture is capable of processing one random bit per one clock cycle which results in 311.5 Mbps throughput for Virtex 5 FPGA.

  12. Applications of single-qubit rotations in quantum public-key cryptography

    OpenAIRE

    Nikolopoulos, Georgios M.

    2008-01-01

    We discuss cryptographic applications of single-qubit rotations from the perspective of trapdoor one-way functions and public-key encryption. In particular, we present an asymmetric cryptosystem whose security relies on fundamental principles of quantum physics. A quantum public key is used for the encryption of messages while decryption is possible by means of a classical private key only. The trapdoor one-way function underlying the proposed cryptosystem maps integer numbers to quantum stat...

  13. Quantum cryptography using coherent states: Randomized encryption and key generation

    Science.gov (United States)

    Corndorf, Eric

    With the advent of the global optical-telecommunications infrastructure, an increasing number of individuals, companies, and agencies communicate information with one another over public networks or physically-insecure private networks. While the majority of the traffic flowing through these networks requires little or no assurance of secrecy, the same cannot be said for certain communications between banks, between government agencies, within the military, and between corporations. In these arenas, the need to specify some level of secrecy in communications is a high priority. While the current approaches to securing sensitive information (namely the public-key-cryptography infrastructure and deterministic private-key ciphers like AES and 3DES) seem to be cryptographically strong based on empirical evidence, there exist no mathematical proofs of secrecy for any widely deployed cryptosystem. As an example, the ubiquitous public-key cryptosystems infer all of their secrecy from the assumption that factoring of the product of two large primes is necessarily time consuming---something which has not, and perhaps cannot, be proven. Since the 1980s, the possibility of using quantum-mechanical features of light as a physical mechanism for satisfying particular cryptographic objectives has been explored. This research has been fueled by the hopes that cryptosystems based on quantum systems may provide provable levels of secrecy which are at least as valid as quantum mechanics itself. Unfortunately, the most widely considered quantum-cryptographic protocols (BB84 and the Ekert protocol) have serious implementation problems. Specifically, they require quantum-mechanical states which are not readily available, and they rely on unproven relations between intrusion-level detection and the information available to an attacker. As a result, the secrecy level provided by these experimental implementations is entirely unspecified. In an effort to provably satisfy the cryptographic

  14. Secure SCADA communication by using a modified key management scheme.

    Science.gov (United States)

    Rezai, Abdalhossein; Keshavarzi, Parviz; Moravej, Zahra

    2013-07-01

    This paper presents and evaluates a new cryptographic key management scheme which increases the efficiency and security of the Supervisory Control And Data Acquisition (SCADA) communication. In the proposed key management scheme, two key update phases are used: session key update and master key update. In the session key update phase, session keys are generated in the master station. In the master key update phase, the Elliptic Curve Diffie-Hellman (ECDH) protocol is used. The Poisson process is also used to model the Security Index (SI) and Quality of Service (QoS). Our analysis shows that the proposed key management not only supports the required speed in the MODBUS implementation but also has several advantages compared to other key management schemes for secure communication in SCADA networks.

  15. Modified Novel Quantum Key Exchange using BB84 Algorithm

    Directory of Open Access Journals (Sweden)

    N.Vivek Chetty

    2013-06-01

    Full Text Available With the increasing number of eavesdroppers on communication channels, securing the reliability of digital communication has become a herculean task. For any communication and information exchange the most important step of securing the data is encryption and decryption (cryptography. The primary step involved in any efficient cryptographic system is Key Distribution. The paper deals with an efficient Key Distribution Technique based on Quantum Mechanics. The concept of Heisenberg’s Uncertainty Principle and quantum indeterminacy property are used to detect the presence of eavesdropper and secure the process of Key Distribution.

  16. In situ study of key material and process reliability issues in the chemical vapor deposition of copper

    Science.gov (United States)

    Lou, Ishing

    With the limitations of current aluminum based metallization schemes used in microelectronics, the development of a manufacturable chemical vapor deposition (CVD) process for copper metallization schemes is crucial to meet the stringent requirements of sub-quarter micron device technology and beyond. The work presented herein focused on investigating key material and process reliability issues pertaining to Cu CVD processing. In particular, a unique combination of in-situ gas phase Fourier transform infrared (FTIR) and quadrupole mass spectrometry (QMS) was employed to study the role of hydrogen in thermal CVD of copper using (tmvs)Cusp{I}(hfac). These studies showed that hydrogen provides significant enhancement in the deposition rate of copper interconnects. Based on the QMS and FTIR data, this enhancement could be attributed to the role of hydrogen in assisting in the removal of tmvs from (tmvs)Cusp{I}(hfac), thus enhancing the conversion of Cusp{I}(hfac) intermediates to Cusp{o} and Cusp{II}(hfac)sb2 and providing a wider process window with higher conversion efficiency. In addition, in-situ real time QMS studies were performed of the gas phase evolution and decomposition pathways of (tmvs)Cusp{I}(hfac) during thermal CVD of copper. The QMS investigations focused on determining the ionization efficiency curves and appearance potentials of (tmvs)Cusp{I}(hfac) under real CVD processing conditions. The resulting curves and associated potentials were then employed to identify the most likely precursor decomposition pathways and examine relevant implications for thermal CVD of copper from (tmvs)Cusp{I}(hfac). Finally, a hydrogen-plasma assisted CVD (PACVD) process was developed for the growth of device quality gold for incorporation as dopant in emerging Cu CVD based metallization interconnects. In particular, it was demonstrated that the PACVD gold process window identified can maintain very low gold deposition rates (gold is a promising in-situ Cu doping technique

  17. Dynamic DNS update security, based on cryptographically generated addresses and ID-based cryptography, in an IPv6 autoconfiguration context

    OpenAIRE

    Combes, Jean-Michel; Arfaoui, Ghada; LAURENT, Maryline

    2012-01-01

    International audience; This paper proposes a new security method for protecting signalling for Domain Name System (DNS) architecture. That is, it makes secure DNS update messages for binding a Fully Qualified Domain Name (FQDN) of an IPv6 node and the IPv6 address of the node owning this FQDN. This method is based on the use of Cryptographically Generated Addresses (CGA) and IDBased Cryptography (IBC). Combination of these two techniques allows DNS server to check the ownership of the IPv6 a...

  18. About the Key Escrow Properties of Identity Based Encryption Schemes

    Directory of Open Access Journals (Sweden)

    Ruxandra Olimid

    2012-09-01

    Full Text Available IBE (Identity Based Encryption represents a type of public key encryption that allows a party to encrypt a message using the recipient’s identity as public key. The private keys needed for decryption are generated and distributed to each party by a KGC (Key Generation Center. The existence of such an entity in an IBE scheme allows access to the encrypted information for other parties other than the intended recipient by construction: the KGC or any other entity that receives the cryptographic keys from the KGC may perform decryption. A system that permits other parties to have access to the private keys of the users is said to have key escrow abilities. The paper performs a brief analysis of the key escrow properties of IBE schemes and gives a practical example of communication protocol that improves the key escrow capabilities.

  19. An Experimental Study of Cryptography Capability using Chained Key Exchange Scheme for Embedded Devices

    OpenAIRE

    2014-01-01

    After 38 years of birthday Diffie-Hellman Key Exchange (DHKE), there are many proposed improvements in the DHKE protocol to encounter modern security issues. This protocol seems quite simple to be implemented, but it can be vulnerable to many types of attacks. In this work, we propose the Chained Key Exchange scheme as a case study to explore cryptographic computation capability of embedded microcontroller. We choose ARM RaspberryPi board as hardware platform for experimental setup. To enable...

  20. Design and Analysis of Optimization Algorithms to Minimize Cryptographic Processing in BGP Security Protocols.

    Science.gov (United States)

    Sriram, Vinay K; Montgomery, Doug

    2017-07-01

    The Internet is subject to attacks due to vulnerabilities in its routing protocols. One proposed approach to attain greater security is to cryptographically protect network reachability announcements exchanged between Border Gateway Protocol (BGP) routers. This study proposes and evaluates the performance and efficiency of various optimization algorithms for validation of digitally signed BGP updates. In particular, this investigation focuses on the BGPSEC (BGP with SECurity extensions) protocol, currently under consideration for standardization in the Internet Engineering Task Force. We analyze three basic BGPSEC update processing algorithms: Unoptimized, Cache Common Segments (CCS) optimization, and Best Path Only (BPO) optimization. We further propose and study cache management schemes to be used in conjunction with the CCS and BPO algorithms. The performance metrics used in the analyses are: (1) routing table convergence time after BGPSEC peering reset or router reboot events and (2) peak-second signature verification workload. Both analytical modeling and detailed trace-driven simulation were performed. Results show that the BPO algorithm is 330% to 628% faster than the unoptimized algorithm for routing table convergence in a typical Internet core-facing provider edge router.

  1. A secure and efficient cryptographic hash function based on NewFORK-256

    Directory of Open Access Journals (Sweden)

    Harshvardhan Tiwari

    2012-11-01

    Full Text Available Cryptographic hash functions serve as a fundamental building block of information security and are used in numerous security applications and protocols such as digital signature schemes, construction of MAC and random number generation, for ensuring data integrity and data origin authentication. Researchers have noticed serious security flaws and vulnerabilities in most widely used MD and SHA family hash functions. As a result hash functions from FORK family with longer digest value were considered as good alternatives for MD5 and SHA-1, but recent attacks against these hash functions have highlighted their weaknesses. In this paper we propose a dedicated hash function MNF-256 based on the design principle of NewFORK-256. It takes 512 bit message blocks and generates 256 bit hash value. A random sequence is added as an additional input to the compression function of MNF-256. Three branch parallel structure and secure compression function make MNF-256 an efficient, fast and secure hash function. Various simulation results indicate that MNF-256 is immune to common cryptanalytic attacks and faster than NewFORK-256.

  2. Experimental quantum key distribution with source flaws

    Science.gov (United States)

    Xu, Feihu; Wei, Kejin; Sajeed, Shihan; Kaiser, Sarah; Sun, Shihai; Tang, Zhiyuan; Qian, Li; Makarov, Vadim; Lo, Hoi-Kwong

    2015-09-01

    Decoy-state quantum key distribution (QKD) is a standard technique in current quantum cryptographic implementations. Unfortunately, existing experiments have two important drawbacks: the state preparation is assumed to be perfect without errors and the employed security proofs do not fully consider the finite-key effects for general attacks. These two drawbacks mean that existing experiments are not guaranteed to be proven to be secure in practice. Here, we perform an experiment that shows secure QKD with imperfect state preparations over long distances and achieves rigorous finite-key security bounds for decoy-state QKD against coherent attacks in the universally composable framework. We quantify the source flaws experimentally and demonstrate a QKD implementation that is tolerant to channel loss despite the source flaws. Our implementation considers more real-world problems than most previous experiments, and our theory can be applied to general discrete-variable QKD systems. These features constitute a step towards secure QKD with imperfect devices.

  3. An alternative approach to synthesis of 2--butyl-5-nitrobenzofuran derivative: A key starting material for dronedarone hydrochloride

    Indian Academy of Sciences (India)

    P Raja Gopal; E R R Chandrashekar; M Saravanan; B Vijaya Bhaskar; P Veera Somaiah

    2012-09-01

    A practical synthesis of (2-butyl-5-nitrobenzofuran-3-yl)(4-hydroxyphenyl)methanone, a key intermediate in the preparation of anti arrhythmic drug, is described. The commercially available 4-nitrophenol (3) is converted in five steps to 2-butyl-5-nitrobenzofuran (9) which upon Friedel-Crafts acylation with 4-methoxybenzoyl chloride followed by deprotection of methyl group gives (2).

  4. Assessing recycling versus incineration of key materials in municipal waste: The importance of efficient energy recovery and transport distances

    DEFF Research Database (Denmark)

    Merrild, Hanna; Larsen, Anna W.; Christensen, Thomas H.

    2012-01-01

    Recycling of materials from municipal solid waste is commonly considered to be superior to any other waste treatment alternative. For the material fractions with a significant energy content this might not be the case if the treatment alternative is a waste-to-energy plant with high energy recovery...... rates. The environmental impacts from recycling and from incineration of six material fractions in household waste have been compared through life cycle assessment assuming high-performance technologies for material recycling as well as for waste incineration. The results showed......, the environmental impact potentials from collection, pre-treatment and transport was compared to the environmental benefit from recycling and this showed that with the right means of transport, recyclables can in most cases be transported long distances. However, the results also showed that recycling of some...

  5. New Public Key Cryptosystems from Combinatorial Group Theory

    Institute of Scientific and Technical Information of China (English)

    TANG Xueming; WANG Xiaofei; HONG Fan; CUI Guohua

    2006-01-01

    External direct product of some low layer groups such as braid groups and general Artin groups, with a kind of special group action on it, provides a secure cryptographic computation platform, which can keep secure in the quantum computing epoch. Three hard problems on this new platform, Subgroup Root Problem, Multi-variant Subgroup Root Problem and Subgroup Action Problem are presented and well analyzed, which all have no relations with conjugacy. New secure public key encryption system and key agreement protocol are designed based on these hard problems. The new cryptosystems can be implemented in a general group environment other than in braid or Artin groups.

  6. Assessing recycling versus incineration of key materials in municipal waste: The importance of efficient energy recovery and transport distances.

    Science.gov (United States)

    Merrild, Hanna; Larsen, Anna W; Christensen, Thomas H

    2012-05-01

    Recycling of materials from municipal solid waste is commonly considered to be superior to any other waste treatment alternative. For the material fractions with a significant energy content this might not be the case if the treatment alternative is a waste-to-energy plant with high energy recovery rates. The environmental impacts from recycling and from incineration of six material fractions in household waste have been compared through life cycle assessment assuming high-performance technologies for material recycling as well as for waste incineration. The results showed that there are environmental benefits when recycling paper, glass, steel and aluminium instead of incinerating it. For cardboard and plastic the results were more unclear, depending on the level of energy recovery at the incineration plant, the system boundaries chosen and which impact category was in focus. Further, the environmental impact potentials from collection, pre-treatment and transport was compared to the environmental benefit from recycling and this showed that with the right means of transport, recyclables can in most cases be transported long distances. However, the results also showed that recycling of some of the material fractions can only contribute marginally in improving the overall waste management system taking into consideration their limited content in average Danish household waste.

  7. Leightweight construction, a key technology for materials saving, energy efficiency and climate protection. Proceedings of the colloquium; Leichtbau, eine Schluesseltechnologie fuer Material-, Energieeffizienz und Klimaschutz. Tagungsband zum Colloquium

    Energy Technology Data Exchange (ETDEWEB)

    Huber, Otto; Bicker, Marc (eds.)

    2009-07-01

    At the fourth Landshut colloquium on lightweight construction, 24 papers were presented by experts of science and practice on the following subjects: 1. Composite structures; 2. Surface technology and coatings; 3. Foamed aluminium and magnesium; 4. Aluminium and foamed aluminium; 5. Joining techniques; 4. Bolted joints; 6. Metal composites and foamed materials; 7. Core materials for sandwich structures; 8. Fabrication technologies of fibre-reinforced composites; 9. Forming and efficient use of materials; 10. Aluminium moulds; 11. Simulation and optimisation; 12. Lightweight construction in aircraft and vehicle engineering. [German] Im vierten Landshuter Leichtbau-Colloquium-Band werden insgesamt 24 Beitraege von Experten aus Wissenschaft und Praxis aus folgenden Themengebieten vorgestellt: 1. Werkstoffverbundstrukturen, 2. Oberflaechentechnik und -beschichtungen, 3. Aluminiumschaeume und Magnesium, 4. Aluminium und Aluminiumschaeume, 5. Verbindungstechnik, 5. Schraubverbindungen, 6. Metallische Verbundwerkstoffe und Schaeume, 7. Kernmaterialien fuer Sandwichstrukturen, 8. Fertigungstechnologien Faserverbundstrukturen, 9. Umformen / Effizienter Materialeinsatz, 10. Urformen mit Aluminium, 11. Simulation und Optimierung und 12. Leichtbau im Luftfahrzeug- und Fahrzeugbau.

  8. Qualitative Assessment of Key Messages about Nutrition and Weight Gain in Pregnancy in Printed Educational Materials in Alberta.

    Science.gov (United States)

    Forbes, Laura; Baarda, Janis; Mayan, Maria; Bell, Rhonda C

    2017-05-24

    Printed educational materials are a common source of health information, although their effectiveness in improving women's knowledge or self-care in pregnancy has been questioned. This study describes the information in printed educational materials that address healthy eating during pregnancy and gestational weight gain (GWG) that are currently used in Alberta, Canada. Content of 6 resources was analyzed using a constant comparison qualitative approach. Resources emphasized healthy eating, prenatal supplements, folate supplementation, and healthy weight gain. More resources discussed the importance of "eating enough" than provided guidance on avoiding excessive GWG. Themes identified were: "everything is important" meaning that all healthy behaviours are important, making prioritization difficult; "more is more" emphasized eating more over moderation; "everyone is individual" suggests women seek individualized care through the care provider; and "contradictions" describes differences in content and recommendations within and between resources. New or revised versions of resources should provide congruent information with up-to-date recommendations that are easily prioritized. Care providers should be aware of contradictory information or information that does not align with current recommendations within printed educational materials and be ready to help women address the areas important for her personal behaviour change.

  9. Laser Shock Processing of Metallic Materials: Coupling of Laser-Plasma Interaction and Material Behaviour Models for the Assessment of Key Process Issues

    Science.gov (United States)

    Ocaña, J. L.; Morales, M.; Molpeceres, C.; Porro, J. A.

    2010-10-01

    Profiting by the increasing availability of laser sources delivering intensities above 109 W/cm2 with pulse energies in the range of several Joules and pulse widths in the range of nanoseconds, laser shock processing (LSP) is consolidating as an effective technology for the improvement of surface mechanical and corrosion resistance properties of metals. The main advantage of the laser shock processing technique consists on its capability of inducing a relatively deep compression residual stresses field into metallic alloy pieces allowing an improved mechanical behaviour, explicitly, the life improvement of the treated specimens against wear, crack growth and stress corrosion cracking. Although significant work from the experimental side has been contributed to explore the optimum conditions of application of the treatments and to assess their ultimate capability to provide enhanced mechanical behaviour to work-pieces of typical materials, only limited attempts have been developed in the way of full comprehension and predictive assessment of the characteristic physical processes and material transformations with a specific consideration of real material properties. In the present paper, a review on the physical issues dominating the development of LSP processes from a high intensity laser-matter interaction point of view is presented along with the theoretical and computational methods developed by the authors for their predictive assessment and practical results at laboratory scale on the application of the technique to different materials.

  10. SolarSyngas: Results from a virtual institute developing materials and key components for solar thermochemical fuel production

    Science.gov (United States)

    Roeb, Martin; Steinfeld, Aldo; Borchardt, Günter; Feldmann, Claus; Schmücker, Martin; Sattler, Christian; Pitz-Paal, Robert

    2016-05-01

    The Helmholtz Virtual Institute (VI) SolarSynGas brings together expertise from solar energy research and materials science to develop metal oxide based redox materials and to integrate them in a suitable way into related process technologies for two-step thermochemical production of hydrogen and carbon monoxide from water and CO2. One of the foci of experimental investigation was exploring the impact of doping on the feasibility of ceria-based materials - mainly by Zr-doping. The results indicate that a certain Zr-content enhances the reducibility and therefore the splitting performance. Increasing the Zr-content to x = 0.15 improved the specific CO2-splitting performance by 50% compared to pure ceria. This finding agrees with theoretical studies attributing the improvements to lattice modification caused by the introduction of Zr4+. Thermogravimetric relaxation experiments and equilibrium oxygen isotope exchange experiments with subsequent depth profiling analysis were carried out on ceria. As a result the reduction reaction of even dense samples of pure ceria with a grain size of about 20 µm is surface reaction controlled. The structure of the derived expression for the apparent activation energy suggests that the chemical surface exchange coefficient should show only a very weak dependence on temperature for ceria doped with lower valence cations. A solar receiver reactor exhibiting a foam-type reticulated porous ceramics made of ceria was tested. It could be shown that applying dual-scale porosity to those foams with mm-size pores for effective radiative heat transfer during reduction and μm-size pores within its struts for enhanced kinetics during oxidation allows enhancing the performance of the reactor significantly. Also a particle process concept applying solid-solid heat recovery from redox particles in a high temperature solar thermochemical process was analysed that uses ceramic spheres as solid heat transfer medium. This concept can be implemented

  11. Microcrystals and Amorphous Material in Comets and Primitive Meteorites: Keys to Understanding Processes in the Early Solar System

    Science.gov (United States)

    Nuth, J. A.; Brearley, A. J.; Scott, E. R. D.

    2004-01-01

    Comets, fine-grained matrices of chondrites, and chondritic interplanetary dust particles (IDPs) are each composed of both crystalline and amorphous silicates. The primitive solar nebula, in which comets and asteroids accreted, was formed from the collapsed core of a Giant Molecular Cloud, that, in turn, condensed from materials present in the interstellar medium (ISM). Despite observations that reveal the presence of crystalline magnesium silicate minerals in the shells of very high mass-loss-rate stars [1,2], typical silicate grains in the ISM are most likely to be amorphous, given their relatively long residence time in such a high radiation environment. An upper limit of 3% crystalline grains can be derived from their non-detection in spectra of ISM solids [3]. If the vast majority of grains that enter the primitive solar nebula are amorphous, then the observation of crystalline dust in comets and primitive chondrite matrices indicates the action of specific processes required to transform the amorphous starting materials into the crystals that are observed.

  12. JHR Project: a future Material Testing Reactor working as an International user Facility: The key-role of instrumentation in support to the development of modern experimental capacity

    Energy Technology Data Exchange (ETDEWEB)

    Bignan, G. [CEA, DEN, DER, JHR user Facility Interface Manager' , Cadarache, F-13108 St-Paul-Lez-Durance (France); Gonnier, C. [CEA, DEN, DER, SRJH Jules Horowitz Reactor Service, Cadarache, F-13108 St-Paul-Lez-Durance (France); Lyoussi, A.; Villard, J.F.; Destouches, C. [CEA, DEN, DER, Instrumentation Sensors and Dosimetry Laboratory, Cadarache, F-13108 St-Paul-Lez-Durance (France); Chauvin, J.P. [CEA,DEN, DER, SPEX, Experimental Physics Service, Cadarache, F-13108 St-Paul-Lez-Durance (France); Maugard, B. [CEA, DEN, DER, Reactor Department Studies, Cadarache, F-13108 St-Paul-Lez-Durance (France)

    2015-07-01

    Research and development on fuel and material behaviour under irradiation is a key issue for sustainable nuclear energy in order to meet specific needs by keeping the best level of safety. These needs mainly deal with a constant improvement of performances and safety in order to optimize the fuel cycle and hence to reach nuclear energy sustainable objectives. A sustainable nuclear energy requires a high level of performances in order to meet specific needs such as: - Pursuing improvement of the performances and safety of present and coming water cooled reactor technologies. This will require a continuous R and D support following a long-term trend driven by the plant life management, safety demonstration, flexibility and economics improvement. Experimental irradiations of structure materials are necessary to anticipate these material behaviours and will contribute to their optimisation. - Upgrading continuously nuclear fuel technology in present and future nuclear power plants to achieve better performances and to optimise the fuel cycle keeping the best level of safety. Fuel evolution for generation II, III and III+ is a key stake requiring developments, qualification tests and safety experiments to ensure the competitiveness and safety: experimental tests exploring the full range of fuel behaviour determine fuel stability limits and safety margins, as a major input for the fuel reliability analysis. To perform such accurate and innovative progress and developments, specific and ad hoc instrumentation, irradiation devices, measurement methods are necessary to be set up inside or beside the material testing reactor (MTR) core. These experiments require beforehand in situ and on line sophisticated measurements to accurately determine different key parameters such as thermal and fast neutron fluxes and nuclear heating in order to precisely monitor and control the conducted assays. The new Material Testing Reactor JHR (Jules Horowitz Reactor) currently under

  13. 电子选举中的安全协议%Cryptographic Protocols for Electronic Voting

    Institute of Scientific and Technical Information of China (English)

    孟江涛; 冯登国; 胡振宇

    2002-01-01

    Electronic Voting has begun to move into the mainstream, with small online votes taking place on the Internet. Electronic Voting investigates how to conduct large-scale electronic Voting securely including various modes of voting. In this paper we will discuss the characteristics of a good Electronic Voting system and explore cryptographic Protocols that can be used to build actual implementations with these characteristics. We mainly study the Electronic Voting protocols as opposed to the Electronic Voting systems. We propose some new taxonomy of the security protocols proposed for Electronic Voting procedures and examine their advantages and shortcomings. The goal of the paper is to impose some order into the multitude of Electronic Voting mechanisms that would lead to a better understanding of challenges in the Electronic Voting field. In the end, we give some advices on Electronic Voting system design.%随着因特网上出现的一些小范围的电子选举,电子选举开始引起人们的关注.而电子选举中的关键技术之一是电子选举协议的设计,特别是在多种投票方式下大规模电子选举协议的安全性问题.讨论了优秀的电子投票系统应该具备的特点,及如何通过密码协议来实现这些特点;对电子选举协议提出了新的分类方法,并考察了其优缺点;并对已有的许多电子选举协议进行了分类整理,有助于人们更好地理解这一领域内所面临的挑战和问题;同时对电子选举系统的设计也给出了一些建议.

  14. Linking Material Flow Analysis with Resilience Using Rice: A Case Study in Global, Visual MFA of a Key Food Product

    Directory of Open Access Journals (Sweden)

    Michal Monit

    2016-01-01

    Full Text Available This article uses the rice price crisis of 2007–2008 to show how material flow analysis (MFA can be combined with resilience research. After presentation of fundamental information and methods, resilience-related concepts are illustrated using graphical methods and MFA data. Herfindahl-Hirschman Index (HHI and node-link diagrams are used to highlight potential vulnerability hotspots and show response to, recovery from disturbance and adaptation following a disruption of the global rice market. The methods presented are especially useful in rapid screening for potential impact of supply-side disruptions, such as export restrictions or poor harvests. The article concludes by discussing other potential applications of the chosen approach and stressing the importance of visual communication in dissemination of results and cross-pollination between disciplines. All the data used in this study is available online, as interactive visualizations, at: http://ricestudyvis.weebly.com.

  15. Hybrid cryptography key management.

    Energy Technology Data Exchange (ETDEWEB)

    Draelos, Timothy John; Torgerson, Mark Dolan; Neumann, William Douglas; Gallup, Donald R.; Collins, Michael Joseph; Beaver, Cheryl Lynn

    2003-11-01

    Wireless communication networks are highly resource-constrained; thus many security protocols which work in other settings may not be efficient enough for use in wireless environments. This report considers a variety of cryptographic techniques which enable secure, authenticated communication when resources such as processor speed, battery power, memory, and bandwidth are tightly limited.

  16. Hybrid cryptography key management.

    Energy Technology Data Exchange (ETDEWEB)

    Draelos, Timothy John; Torgerson, Mark Dolan; Neumann, William Douglas; Gallup, Donald R.; Collins, Michael Joseph; Beaver, Cheryl Lynn

    2003-11-01

    Wireless communication networks are highly resource-constrained; thus many security protocols which work in other settings may not be efficient enough for use in wireless environments. This report considers a variety of cryptographic techniques which enable secure, authenticated communication when resources such as processor speed, battery power, memory, and bandwidth are tightly limited.

  17. Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks

    OpenAIRE

    Yang Lu; Jiguo Li

    2014-01-01

    Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. We show that an existing certific...

  18. Pairing-Free ID-Based Key-Insulated Signature Scheme

    Institute of Scientific and Technical Information of China (English)

    Guo-Bin Zhu; Hu Xiong; Zhi-Guang Qin

    2015-01-01

    Abstract⎯Without the assumption that the private keys are kept secure perfectly, cryptographic primitives cannot be deployed in the insecure environments where the key leakage is inevitable. In order to reduce the damage caused by the key exposure in the identity-based (ID-based) signature scenarios efficiently, we propose an ID-based key-insulated signature scheme in this paper, which eliminates the expensive bilinear pairing operations. Compared with the previous work, our scheme minimizes the computation cost without any extra cost. Under the discrete logarithm (DL) assumption, a security proof of our scheme in the random oracle model has also been given.

  19. Secure Biometric Key Generation Scheme for Cryptography using Combined Biometric Features of Fingerprint and Iris

    Directory of Open Access Journals (Sweden)

    Mr.P.Balakumar

    2011-09-01

    Full Text Available Exact and automatic recognition and authentication of users are a essential difficulty in all systems. Shared secrets like Personal Identification Numbers or Passwords and key devices such as Smart cards are not presently sufficient in few situations. What is required is a system that could authenticate that the person is actually the person. The biometrics is improving the capability to recognize the persons. The usage of biometrics system permits the recognition of a living person according to the physiological features or behavioral features to be recognized without human involvement. This leads to the world wide usage of biometrics to secure the system. The various biometrics used in securing system are fingerprint, iris, retina, etc. The construction of cryptographic key from biometrics is used generally to secure the system. The efficiency and the flexibility of the cryptographic make it suitable for securing purpose. In some times, biometrics can be stolen; this makes the attackers to access the system for any time. This problem is diminished in this paper by using two biometrics features. The biometrics used in this paper is fingerprint and iris. These two features are combined with the help of fusion algorithm. From the combined features, cryptographic key is generated. The experimental result shows that the proposed techniques results in better security than the existing techniques.

  20. 木塑复合材料的关键原材料概况%Overview of Key Raw Materials of Wood/Plastic Composites

    Institute of Scientific and Technical Information of China (English)

    高华; 黄海兵; 吕蕾; 高鹏

    2015-01-01

    介绍了木塑复合材料关键原料植物纤维、塑料和相容剂的概况及特性,在此基础上阐述了国内外近年来各类木塑复合材料的发展现状。%The brief information and features of the key raw materials of wood/plastic composites,i.e. plant fiber,plastics and compatibilizer,are introduced,based on which,the development status of various kinds of wood/plastic composites at home and abroad is summarized.

  1. Sustainable Sourcing of Global Agricultural Raw Materials: Assessing Gaps in Key Impact and Vulnerability Issues and Indicators.

    Science.gov (United States)

    Springer, Nathaniel P; Garbach, Kelly; Guillozet, Kathleen; Haden, Van R; Hedao, Prashant; Hollander, Allan D; Huber, Patrick R; Ingersoll, Christina; Langner, Megan; Lipari, Genevieve; Mohammadi, Yaser; Musker, Ruthie; Piatto, Marina; Riggle, Courtney; Schweisguth, Melissa; Sin, Emily; Snider, Sara; Vidic, Nataša; White, Aubrey; Brodt, Sonja; Quinn, James F; Tomich, Thomas P

    2015-01-01

    Understanding how to source agricultural raw materials sustainably is challenging in today's globalized food system given the variety of issues to be considered and the multitude of suggested indicators for representing these issues. Furthermore, stakeholders in the global food system both impact these issues and are themselves vulnerable to these issues, an important duality that is often implied but not explicitly described. The attention given to these issues and conceptual frameworks varies greatly--depending largely on the stakeholder perspective--as does the set of indicators developed to measure them. To better structure these complex relationships and assess any gaps, we collate a comprehensive list of sustainability issues and a database of sustainability indicators to represent them. To assure a breadth of inclusion, the issues are pulled from the following three perspectives: major global sustainability assessments, sustainability communications from global food companies, and conceptual frameworks of sustainable livelihoods from academic publications. These terms are integrated across perspectives using a common vocabulary, classified by their relevance to impacts and vulnerabilities, and categorized into groups by economic, environmental, physical, human, social, and political characteristics. These issues are then associated with over 2,000 sustainability indicators gathered from existing sources. A gap analysis is then performed to determine if particular issues and issue groups are over or underrepresented. This process results in 44 "integrated" issues--24 impact issues and 36 vulnerability issues--that are composed of 318 "component" issues. The gap analysis shows that although every integrated issue is mentioned at least 40% of the time across perspectives, no issue is mentioned more than 70% of the time. A few issues infrequently mentioned across perspectives also have relatively few indicators available to fully represent them. Issues in the

  2. Sustainable Sourcing of Global Agricultural Raw Materials: Assessing Gaps in Key Impact and Vulnerability Issues and Indicators.

    Directory of Open Access Journals (Sweden)

    Nathaniel P Springer

    Full Text Available Understanding how to source agricultural raw materials sustainably is challenging in today's globalized food system given the variety of issues to be considered and the multitude of suggested indicators for representing these issues. Furthermore, stakeholders in the global food system both impact these issues and are themselves vulnerable to these issues, an important duality that is often implied but not explicitly described. The attention given to these issues and conceptual frameworks varies greatly--depending largely on the stakeholder perspective--as does the set of indicators developed to measure them. To better structure these complex relationships and assess any gaps, we collate a comprehensive list of sustainability issues and a database of sustainability indicators to represent them. To assure a breadth of inclusion, the issues are pulled from the following three perspectives: major global sustainability assessments, sustainability communications from global food companies, and conceptual frameworks of sustainable livelihoods from academic publications. These terms are integrated across perspectives using a common vocabulary, classified by their relevance to impacts and vulnerabilities, and categorized into groups by economic, environmental, physical, human, social, and political characteristics. These issues are then associated with over 2,000 sustainability indicators gathered from existing sources. A gap analysis is then performed to determine if particular issues and issue groups are over or underrepresented. This process results in 44 "integrated" issues--24 impact issues and 36 vulnerability issues--that are composed of 318 "component" issues. The gap analysis shows that although every integrated issue is mentioned at least 40% of the time across perspectives, no issue is mentioned more than 70% of the time. A few issues infrequently mentioned across perspectives also have relatively few indicators available to fully represent

  3. Security Notions for Quantum Public-Key Cryptography

    CERN Document Server

    Koshiba, T

    2007-01-01

    It is well known that Shor's quantum algorithm for integer factorization can break down the RSA public-key cryptosystem, which is widely used in many cryptographic applications. Thus, public-key cryptosystems in the quantum computational setting are longed for cryptology. In order to define the security notions of public-key cryptosystems, we have to model the power of the sender, receiver, adversary and channel. While we may consider a setting where quantum computers are available only to adversaries, we generally discuss what are the right security notions for (quantum) public-key cryptosystems in the quantum computational setting. Moreover, we consider the security of quantum public-key cryptosystems known so far.

  4. Key distribution in PKC through Quantas

    CERN Document Server

    Goel, Aditya

    2010-01-01

    Cryptography literally means "The art & science of secret writing & sending a message between two parties in such a way that its contents cannot be understood by someone other than the intended recipient". and Quantum word is related with "Light". Thus, Quantum Cryptography is a way of descripting any information in the form of quantum particles. There are no classical cryptographic systems which are perfectly secure. In contrast to Classical cryptography which depends upon Mathematics, Quantum Cryptography utilizes the concepts of Quantum Physics which provides us the security against the cleverest marauders of the present age. In the view of increasing need of Network and Information Security, we do require methods to overcome the Molecular Computing technologies (A future technology) and other techniques of the various codebrakers. Both the parts i.e. Quantum Key distribution and Information transference from Sender to Receiver are much efficient and secure. It is based upon BB84 protocol. It can b...

  5. Low-Power Public Key Cryptography

    Energy Technology Data Exchange (ETDEWEB)

    BEAVER,CHERYL L.; DRAELOS,TIMOTHY J.; HAMILTON,VICTORIA A.; SCHROEPPEL,RICHARD C.; GONZALES,RITA A.; MILLER,RUSSELL D.; THOMAS,EDWARD V.

    2000-11-01

    This report presents research on public key, digital signature algorithms for cryptographic authentication in low-powered, low-computation environments. We assessed algorithms for suitability based on their signature size, and computation and storage requirements. We evaluated a variety of general purpose and special purpose computing platforms to address issues such as memory, voltage requirements, and special functionality for low-powered applications. In addition, we examined custom design platforms. We found that a custom design offers the most flexibility and can be optimized for specific algorithms. Furthermore, the entire platform can exist on a single Application Specific Integrated Circuit (ASIC) or can be integrated with commercially available components to produce the desired computing platform.

  6. Key handling in wireless sensor networks

    Energy Technology Data Exchange (ETDEWEB)

    Li, Y; Newe, T [Optical Fibre Sensors Research Centre, Department of Electronic and Computer Engineering, University of Limerick, Limerick (Ireland)

    2007-07-15

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided.

  7. A Novel Enhancement Technique of the Hill Cipher for Effective Cryptographic Purposes

    Directory of Open Access Journals (Sweden)

    A. F.A. Abidin

    2011-01-01

    Full Text Available Problem statement: The Hill cipher is the first polygraph cipher which has a few advantages in data encryption. However, it is vulnerable to known plaintext attack. Besides, an invertible key matrix is needed for decryption. It may become problematic since an invertible key matrix does not always exist. Approach: In this study, a robust Hill algorithm (Hill++ has been proposed. The algorithm is an extension of Affine Hill cipher. A random matrix key, RMK is introduced as an extra key for encryption. An algorithm proposed for involutory key matrix generation is also implemented in the proposed algorithm. Results: A comparative study has been made between the proposed algorithm and the existing algorithms. The encryption quality of the proposed algorithm is also measured by using the maximum deviation factor and correlation coefficient factor. Conclusion/Recommendations: The proposed algorithm introduced a random matrix key which is computed based on the previous ciphertext blocks and a multiplying factor. A modified of Hill Cipher is free from the all-zero plaintext blocks vulnerability. Usage of involutory key for encryption and decryption managed to solve the non invertible key matrix problem. It also simplify the computational complexity in term of generating the inverse key matrix.

  8. Design of an Efficient Neural Key Distribution Centre

    CERN Document Server

    Bisalapur, Sahana S

    2011-01-01

    The goal of any cryptographic system is the exchange of information among the intended users without any leakage of information to others who may have unauthorized access to it. A common secret key could be created over a public channel accessible to any opponent. Neural networks can be used to generate common secret key. In case of neural cryptography, both the communicating networks receive an identical input vector, generate an output bit and are trained based on the output bit. The two networks and their weight vectors exhibit a novel phenomenon, where the networks synchronize to a state with identical time-dependent weights. The generated secret key over a public channel is used for encrypting and decrypting the information being sent on the channel. This secret key is distributed to the other vendor efficiently by using an agent based approach.

  9. Applications of single-qubit rotations in quantum public-key cryptography

    Science.gov (United States)

    Nikolopoulos, Georgios M.

    2008-03-01

    We discuss cryptographic applications of single-qubit rotations from the perspective of trapdoor one-way functions and public-key encryption. In particular, we present an asymmetric cryptosystem whose security relies on fundamental principles of quantum physics. A quantum public key is used for the encryption of messages while decryption is possible by means of a classical private key only. The trapdoor one-way function underlying the proposed cryptosystem maps integer numbers to quantum states of a qubit and its inversion can be infeasible by virtue of the Holevo’s theorem.

  10. Methods of Generating Key Sequences Based on Parameters of Handwritten Passwords and Signatures

    Directory of Open Access Journals (Sweden)

    Pavel Lozhnikov

    2016-10-01

    Full Text Available The modern encryption methods are reliable if strong keys (passwords are used, but the human factor issue cannot be solved by cryptographic methods. The best variant is binding all authenticators (passwords, encryption keys, and others to the identities. When a user is authenticated by biometrical characteristics, the problem of protecting a biometrical template stored on a remote server becomes a concern. The paper proposes several methods of generating keys (passwords by means of the fuzzy extractors method based on signature parameters without storing templates in an open way.

  11. Quantum key distribution system in standard telecommunications fiber using a short wavelength single-photon source

    CERN Document Server

    Collins, R J; Fernandez, V; Gordon, K J; Makhonin, M N; Timpson, J A; Tahraoui, A; Hopkinson, M; Fox, A M; Skolnick, M S; Buller, G S; 10.1063/1.3327427

    2010-01-01

    A demonstration of the principles of quantum key distribution is performed using a single-photon source in a proof of concept test-bed over a distance of 2 km in standard telecommunications optical fiber. The single-photon source was an optically-pumped quantum dot in a microcavity emitting at a wavelength of 895 nm. Characterization of the quantum key distribution parameters was performed at a range of different optical excitation powers. An investigation of the effect of varying the optical excitation power of the quantum dot microcavity on the quantum bit error rate and cryptographic key exchange rate of the system are presented.

  12. 设计密码协议的若干原则与方法%SEVERAL PRINCIPLES AND METHODS FOR DESIGNING CRYPTOGRAPHIC PROTOCOLS

    Institute of Scientific and Technical Information of China (English)

    赵华伟; 刘月

    2011-01-01

    传统的密码协议设计主要考虑理想环境下运行的安全性.为了设计实用安全的密码协议,首先对理想环境下密码协议中存在的主要攻击进行研究和总结,提出四条协议设计原则,以避免常见的设计缺陷;然后通过对消息完整性的研究,提出一种协议转换算法,可将理想环境下安全的密码协议转换为现实环境下安全的密码协议,并证明算法的安全性.该转换算法的提出,有助于设计在现实环境下运行安全的密码协议.%Traditional cryptographic protocol design focuses mainly on the security issue in a perfect environment. In order to design practical and secure cryptographic protocols, at first the primary attacks upon cryptographic protocols in a perfect environment is studied and summarized, so that four principles for protocol design is proposed in order to avoid common design defects; next, through studying message integrity, a protocol transformation algorithm is proposed which can turn secure cryptographic protocols in a perfect environment into ones in a real environment; the security of the algorithm is validated. The proposal of the transformation algorithm is helpful to design a secure cryptographic protocol to operate in a real environment.

  13. 基于Swarm平台的理性密码协议建模与仿真%Modeling and Simulation of Rational Cryptographic Protocols based on Swarm

    Institute of Scientific and Technical Information of China (English)

    杨雪君; 陈宁江

    2014-01-01

    Aiming at the question of number of strategies were chosen by participants in real world when the rational cryptographic protocols running, a model and the algorithm of solving this problem is designed, which simulated the rational actions on the Swarm platform of intelligent agents. Firstly, payoff matrix was deifned in this article, and then, the state-copy formulation of participants is listed up;3 Nash Equilibrium values discovered by solving the formulation, i.e., the different value which all the participants were used to honest strategy, tactics and non honesty mixed strategy, and game algorithm is designed according to the different values; at last, each object is deifned in the main game needed on the Swarm, however, the basic object function can not fully meet rational cryptographic protocols on the Swarm, so the transformation of the Swarm platform part of the main object function given the key code transformation, the game of interaction in the whole swarm is implemented on the Swarm. As the result shows, rational participants will be dififcult to reach Nash Equilibrium through rounds of game when the pay off function is constant. However, by using incentives to encourage the proifts of honest participants, rational participants will be easy to Nash Equilibrium with less rounds of game, and the proportion of the honest participants is at least half the list. There are some reference values by using the algorithmic game theory that presents the methods which simulated on the Swarm platform for researching rational cryptographic protocols in this article.%针对现实世界中理性密码协议的参与者博弈过程不易观察和预测的问题,文章在多智能主体的仿真平台Swarm上对理性密码协议中参与者的诚实策略和非诚实策略行为进行了建模和仿真。文章首先定义了主体的收益矩阵,进一步根据收益矩阵建立了参与者在整个博弈过程中的状态复制方程;然后求解出该方程

  14. All-optical cryptography of M-QAM formats by using two-dimensional spectrally sliced keys.

    Science.gov (United States)

    Abbade, Marcelo L F; Cvijetic, Milorad; Messani, Carlos A; Alves, Cleiton J; Tenenbaum, Stefan

    2015-05-10

    There has been an increased interest in enhancing the security of optical communications systems and networks. All-optical cryptography methods have been considered as an alternative to electronic data encryption. In this paper we propose and verify the use of a novel all-optical scheme based on cryptographic keys applied on the spectral signal for encryption of the M-QAM modulated data with bit rates of up to 200 gigabits per second.

  15. A Council-based Distributed Key Management Scheme for MANETs

    Directory of Open Access Journals (Sweden)

    Mohammed ELKOUTBI

    2010-09-01

    Full Text Available Abstract—Mobile ad hoc networks (MAETs have beenproposed as an extremely flexible technology for establishingwireless communications. In comparison with fixed networks,some new security issues have arisen with the introduction ofMAETs. Secure routing, in particular, is an important andcomplicated issue. Clustering is commonly used in order to limitthe amount of secure routing information. In this work, wepropose an enhanced solution for ad hoc key management basedon a cauterized architecture. This solution uses clusters as aframework to manage cryptographic keys in a distributed way.This paper sheds light on the key management algorithm for theOLSR protocol standard. Our algorithm takes into account thenode mobility and engenders major improvements regarding thenumber of elected cluster heads to create a PKI council. Ourobjective is to distribute the certification authority functions for areduced and less mobile cluster heads that will serve for keysexchange.

  16. Quantum key distribution with an entangled light emitting diode

    Energy Technology Data Exchange (ETDEWEB)

    Dzurnak, B.; Stevenson, R. M.; Nilsson, J.; Dynes, J. F.; Yuan, Z. L.; Skiba-Szymanska, J.; Shields, A. J. [Toshiba Research Europe Limited, 208 Science Park, Milton Road, Cambridge CB4 0GZ (United Kingdom); Farrer, I.; Ritchie, D. A. [Cavendish Laboratory, University of Cambridge, JJ Thomson Avenue, Cambridge CB3 0HE (United Kingdom)

    2015-12-28

    Measurements performed on entangled photon pairs shared between two parties can allow unique quantum cryptographic keys to be formed, creating secure links between users. An advantage of using such entangled photon links is that they can be adapted to propagate entanglement to end users of quantum networks with only untrusted nodes. However, demonstrations of quantum key distribution with entangled photons have so far relied on sources optically excited with lasers. Here, we realize a quantum cryptography system based on an electrically driven entangled-light-emitting diode. Measurement bases are passively chosen and we show formation of an error-free quantum key. Our measurements also simultaneously reveal Bell's parameter for the detected light, which exceeds the threshold for quantum entanglement.

  17. Quantum key distribution without detector vulnerabilities using optically seeded lasers

    Science.gov (United States)

    Comandar, L. C.; Lucamarini, M.; Fröhlich, B.; Dynes, J. F.; Sharpe, A. W.; Tam, S. W.-B.; Yuan, Z. L.; Penty, R. V.; Shields, A. J.

    2016-05-01

    Security in quantum cryptography is continuously challenged by inventive attacks targeting the real components of a cryptographic set-up, and duly restored by new countermeasures to foil them. Owing to their high sensitivity and complex design, detectors are the most frequently attacked components. It was recently shown that two-photon interference from independent light sources can be used to remove any vulnerability from detectors. This new form of detection-safe quantum key distribution (QKD), termed measurement-device-independent (MDI), has been experimentally demonstrated but with modest key rates. Here, we introduce a new pulsed laser seeding technique to obtain high-visibility interference from gain-switched lasers and thereby perform MDI-QKD with unprecedented key rates in excess of 1 megabit per second in the finite-size regime. This represents a two to six orders of magnitude improvement over existing implementations and supports the new scheme as a practical resource for secure quantum communications.

  18. Development of a New Cryptographic Construct Using Palmprint-Based Fuzzy Vault

    Directory of Open Access Journals (Sweden)

    Amioy Kumar

    2009-01-01

    Full Text Available The combination of cryptology and biometrics has emerged as promising component of information security. Despite the current popularity of palmprint biometric, there has not been any attempt to investigate its usage for the fuzzy vault. This paper therefore investigates the possible usage of palmprint in fuzzy vault to develop a user friendly and reliable crypto system. We suggest the use of both symmetric and asymmetric approach for the encryption. The ciphertext of any document is generated by symmetric cryptosystem; the symmetric key is then encrypted by asymmetric approach. Further, Reed and Solomon codes are used on the generated asymmetric key to provide some error tolerance while decryption. The experimental results from the proposed approach on the palmprint images suggest its possible usage in an automated palmprint-based key generation system.

  19. The compact key

    NARCIS (Netherlands)

    NN,

    1966-01-01

    Here is given a sample of a new sort of identification key, recently developed by Dr. P. W. Leenhouts of the Rijksherbarium. Having to sort many specimens of Sapindaceae into genera, he became dissatisfied with the common dichotomous key, which too often does not work when the material is not comple

  20. A Composed Protocol of Quantum Identity Authentication Plus Quantum Key Distribution Based on Squeezed States

    Institute of Scientific and Technical Information of China (English)

    张盛; 王剑; 唐朝京; 张权

    2011-01-01

    It is established that a single quantum cryptography protocol usually cooperates with other cryptographic systems, such as an authentication system, in the real world. However, few protocols have been proposed on how to combine two or more quantum protocols. To fill this gap, we propose a composed quantum protocol, containing both quantum identity authentication and quantum key distribution, using squeezed states. Hence, not only the identity can be verified, but also a new private key can be generated by our new protocol. We also analyze the security under an optimal attack, and the efficiency, which is defined by the threshold of the tolerant error rate, using Gaussian error function.

  1. Security bound of two-bases quantum key-distribution protocols using qudits

    CERN Document Server

    Nikolopoulos, G M; Nikolopoulos, Georgios M.; Alber, Gernot

    2005-01-01

    We investigate the security bounds of quantum cryptographic protocols using $d$-level systems. In particular, we focus on schemes that use two mutually unbiased bases, thus extending the BB84 quantum key distribution scheme to higher dimensions. Under the assumption of general coherent attacks, we derive an analytic expression for the ultimate upper security bound of such quantum cryptography schemes. This bound is well below the predictions of optimal cloning machines. The possibility of extraction of a secret key beyond entanglement distillation is discussed. In the case of qutrits we argue that any eavesdropping strategy is equivalent to a symmetric one. For higher dimensions such an equivalence is generally no longer valid.

  2. Provable entanglement and information cost for qubit-based quantum key-distribution protocols

    CERN Document Server

    Nikolopoulos, G M; Khalique, A

    2005-01-01

    Provable entanglement has been shown to be a necessary precondition for unconditionally secure key generation in the context of quantum cryptographic protocols. We estimate the maximal threshold disturbance up to which the two legitimate users can prove the presence of quantum correlations in their data, in the context of the four- and six-state quantum key-distribution protocols, under the assumption of coherent attacks. Moreover, we investigate the conditions under which an eavesdropper can saturate these bounds, by means of incoherent and two-qubit coherent attacks. A direct connection between entanglement distillation and classical advantage distillation is also presented.

  3. Linear Distinguishers in the Key-less Setting: Application to PRESENT

    DEFF Research Database (Denmark)

    Lauridsen, Martin Mehl; Rechberger, Christian

    2015-01-01

    The application of the concept of linear cryptanalysis to the domain of key-less primitives is largely an open problem. In this paper we, for the first time, propose a model in which its application is meaningful for distinguishing block ciphers. Combining our model with ideas from message...... modification and rebound-like approaches, we initiate a study of cryptographic primitives with respect to this new attack vector and choose the lightweight block cipher PRESENT as an example target. This leads to known-key distinguishers over up to 27 rounds, whereas the best previous result is up to 18 rounds...

  4. Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting

    DEFF Research Database (Denmark)

    Hazay, Carmit; Mikkelsen, Gert Læssøe; Rabin, Tal

    2011-01-01

    The problem of generating an RSA composite in a distributed manner without leaking its factorization is particularly challenging and useful in many cryptographic protocols. Our first contribution is the first non-generic fully simulatable protocol for distributively generating an RSA composite...... generation is comprised of the following: (i) a distributed protocol for generation of an RSA composite, and (ii) a biprimality test for verifying the validity of the generated composite. Our Paillier threshold encryption scheme uses the RSA composite as public key and is comprised of: (i) a distributed...... generation of the corresponding secret-key shares and, (ii) a distributed decryption protocol for decrypting according to Paillier....

  5. Experiments in the EMRP project KEY-VOCs: Adsorption/desorption effects of VOCs in different tubing materials and preparation and analysis of a zero gas

    Science.gov (United States)

    Englert, Jennifer; Claude, Anja; Kubistin, Dagmar; Tensing, Erasmus; Michl, Katja; Plass-Duelmer, Christian

    2017-04-01

    Atmospheric chemistry and composition are influenced by volatile organic compounds (VOCs) emitted from natural and anthropogenic sources. Due to their toxicity and their crucial role in ozone and aerosol formation VOCs impact air quality and climate change and high quality observations are demanded. The European Metrology Research Programme (EMRP) project KEY-VOCs has targeted the improvement of VOC measurement capabilities with the focus on VOCs relevant for indoor air as well as for air quality and climate monitoring programmes. One major uncertainty is the influence of surface effects of the measurement devices. By developing a test system the adsorption/desorption effects of certain VOCs can be systematically examined. Different tubing materials e.g. stainless steel and PFA were analysed with the oxygenated VOC methanol and results of these experiments will be presented. In air quality monitoring very low levels of VOCs have to be measured. Purified air or nitrogen is widely used as a zero gas to characterize measurement systems and procedures as well as for instrument calibration. A high quality zero gas is an important contributor to the quality of the measurements and generally achieved by using state-of-the-art purification technologies. The efficiency of several air purifiers was assessed and the results have been analysed.

  6. HIGHLY SECURE KEY PREDISTRIBUTION USING AFFINE PLANES AND REED MULLER CODES IN WIRELESS SENSOR NETWORKS

    Directory of Open Access Journals (Sweden)

    Pinaki Sarkar

    2011-10-01

    Full Text Available Wireless Sensor Networks (WSN consist of low powered and resource constrained sensor nodes which are left unattended for long duration of time. Hence it is very challenging to design and implement cost effective security protocols for such networks. Thus symmetric key cryptographic techniques are preferred over public key techniques for communication in such scenarios. Prior to deployment, keys are usually predistributed into the nodes and this problem has been well studied. Highlighting that connectivity and communication are two separate aspects of a WSN, we propose a secure connectivity model using Reed Muller codes. The model is then utilized to securely establish communication keys and exchange messages in a WSN designed on the basis of a scheme that uses affine planes for key predistribution. By the introduction of connectivity model, the node identifiers (ids are converted from public to private information to each node. These private node ids can be used to generate new communication keys from old ones by applying cryptographic hash functions. Novel combination of these ideas yields highly resilient communication model with full connectivity between nodes.

  7. Designing and implementing of improved cryptographic algorithm using modular arithmetic theory

    Directory of Open Access Journals (Sweden)

    Maryam Kamarzarrin

    2015-05-01

    Full Text Available Maintaining the privacy and security of people information are two most important principles of electronic health plan. One of the methods of creating privacy and securing of information is using Public key cryptography system. In this paper, we compare two algorithms, Common And Fast Exponentiation algorithms, for enhancing the efficiency of public key cryptography. We express that a designed system by Fast Exponentiation Algorithm has high speed and performance but low power consumption and space occupied compared with Common Exponentiation algorithm. Although designed systems by Common Exponentiation algorithm have slower speed and lower performance, designing by this algorithm has less complexity, and easier designing compared with Fast Exponentiation algorithm. In this paper, we will try to examine and compare two different methods of exponentiation, also observe performance Impact of these two approaches in the form of hardware with VHDL language on FPGA.

  8. Design of cryptographically secure AES like S-Box using second-order reversible cellular automata for wireless body area network applications.

    Science.gov (United States)

    Gangadari, Bhoopal Rao; Rafi Ahamed, Shaik

    2016-09-01

    In biomedical, data security is the most expensive resource for wireless body area network applications. Cryptographic algorithms are used in order to protect the information against unauthorised access. Advanced encryption standard (AES) cryptographic algorithm plays a vital role in telemedicine applications. The authors propose a novel approach for design of substitution bytes (S-Box) using second-order reversible one-dimensional cellular automata (RCA(2)) as a replacement to the classical look-up-table (LUT) based S-Box used in AES algorithm. The performance of proposed RCA(2) based S-Box and conventional LUT based S-Box is evaluated in terms of security using the cryptographic properties such as the nonlinearity, correlation immunity bias, strict avalanche criteria and entropy. Moreover, it is also shown that RCA(2) based S-Boxes are dynamic in nature, invertible and provide high level of security. Further, it is also found that the RCA(2) based S-Box have comparatively better performance than that of conventional LUT based S-Box.

  9. CRYPTOGRAPHIC SECURE CLOUD STORAGE MODEL WITH ANONYMOUS AUTHENTICATION AND AUTOMATIC FILE RECOVERY

    Directory of Open Access Journals (Sweden)

    Sowmiya Murthy

    2014-10-01

    Full Text Available We propose a secure cloud storage model that addresses security and storage issues for cloud computing environments. Security is achieved by anonymous authentication which ensures that cloud users remain anonymous while getting duly authenticated. For achieving this goal, we propose a digital signature based authentication scheme with a decentralized architecture for distributed key management with multiple Key Distribution Centers. Homomorphic encryption scheme using Paillier public key cryptosystem is used for encrypting the data that is stored in the cloud. We incorporate a query driven approach for validating the access policies defined by an individual user for his/her data i.e. the access is granted to a requester only if his credentials matches with the hidden access policy. Further, since data is vulnerable to losses or damages due to the vagaries of the network, we propose an automatic retrieval mechanism where lost data is recovered by data replication and file replacement with string matching algorithm. We describe a prototype implementation of our proposed model.

  10. A Certificate Authority (CA-based cryptographic solution for HIPAA privacy/security regulations

    Directory of Open Access Journals (Sweden)

    Sangram Ray

    2014-07-01

    Full Text Available The Health Insurance Portability and Accountability Act (HIPAA passed by the US Congress establishes a number of privacy/security regulations for e-healthcare systems. These regulations support patients’ medical privacy and secure exchange of PHI (protected health information among medical practitioners. Three existing HIPAA-based schemes have been studied but appear to be ineffective as patients’ PHI is stored in smartcards. Moreover, carrying a smartcard during a treatment session and accessing PHI from different locations results in restrictions. In addition, authentication of the smartcard presenter would not be possible if the PIN is compromised. In this context, we propose an MCS (medical center server should be located at each hospital and accessed via the Internet for secure handling of patients’ PHI. All entities of the proposed e-health system register online with the MCS, and each entity negotiates a contributory registration key, where public-key certificates issued and maintained by CAs are used for authentication. Prior to a treatment session, a doctor negotiates a secret session key with MCS and uploads/retrieves patients’ PHI securely. The proposed scheme has five phases, which have been implemented in a secure manner for supporting HIPAA privacy/security regulations. Finally, the security aspects, computation and communication costs of the scheme are analyzed and compared with existing methods that display satisfactory performance.

  11. Authenticated Key Agreement with Rekeying for Secured Body Sensor Networks

    Directory of Open Access Journals (Sweden)

    Kyngn Jung Kim

    2011-05-01

    Full Text Available Many medical systems are currently equipped with a large number of tiny, non-invasive sensors, located on, or close to, the patient’s body for health monitoring purposes. These groupings of sensors constitute a body sensor network (BSN. Key management is a fundamental service for medical BSN security. It provides and manages the cryptographic keys to enable essential security features such as confidentiality, integrity and authentication. Achieving key agreement in BSNs is a difficult task. Many key agreement schemes lack sensor addition, revocation, and rekeying properties, which are very important. Our proposed protocol circumvents these shortcomings by providing node rekeying properties, as well as node addition and revocation. It proposes a key distribution protocol based on public key cryptography—the RSA (Rivest, Shamir and Adleman algorithm, and the DHECC (Diffie-Hellman Elliptic Curve Cryptography algorithm. The proposed protocol does not trust individual sensors, and partially trusts the base station (hospital. Instead of loading full pair-wise keys into each node, after installation our protocol establishes pair-wise keys between nodes according to a specific routing algorithm. In this case, each node doesn’t have to share a key with all of its neighbors, only those involved in the routing path; this plays a key role in increasing the resiliency against node capture attacks and the network storage efficiency. Finally we evaluate our algorithm from the BSN security viewpoint and evaluate its performance in comparison with other proposals.

  12. Symmetric-key cryptosystem with DNA technology

    Institute of Scientific and Technical Information of China (English)

    LU MingXin; LAI XueJia; XIAO GuoZhen; QIN Lei

    2007-01-01

    DNA cryptography is a new field which has emerged with progress in the research of DNA computing. In our study, a symmetric-key cryptosystem was designed by applying a modern DNA biotechnology, microarray, into cryptographic technologies. This is referred to as DNA symmetric-key cryptosystem (DNASC). In DNASC,both encryption and decryption keys are formed by DNA probes, while its ciphertext is embedded in a specially designed DNA chip (microarray). The security of this system is mainly rooted in difficult biology processes and problems, rather than conventional computing technology, thus it is unaffected by changes from the attack of the coming quantum computer. The encryption process is a fabrication of a specially designed DNA chip and the decryption process is the DNA hybridization.In DNASC, billions of DNA probes are hybridized and identified at the same time,thus the decryption process is conducted in a massive, parallel way. The great potential in vast parallelism computation and the extraordinary information density of DNA are displayed in DNASC to some degree.

  13. Algorithm for finding partitionings of hard variants of boolean satisfiability problem with application to inversion of some cryptographic functions.

    Science.gov (United States)

    Semenov, Alexander; Zaikin, Oleg

    2016-01-01

    In this paper we propose an approach for constructing partitionings of hard variants of the Boolean satisfiability problem (SAT). Such partitionings can be used for solving corresponding SAT instances in parallel. For the same SAT instance one can construct different partitionings, each of them is a set of simplified versions of the original SAT instance. The effectiveness of an arbitrary partitioning is determined by the total time of solving of all SAT instances from it. We suggest the approach, based on the Monte Carlo method, for estimating time of processing of an arbitrary partitioning. With each partitioning we associate a point in the special finite search space. The estimation of effectiveness of the particular partitioning is the value of predictive function in the corresponding point of this space. The problem of search for an effective partitioning can be formulated as a problem of optimization of the predictive function. We use metaheuristic algorithms (simulated annealing and tabu search) to move from point to point in the search space. In our computational experiments we found partitionings for SAT instances encoding problems of inversion of some cryptographic functions. Several of these SAT instances with realistic predicted solving time were successfully solved on a computing cluster and in the volunteer computing project SAT@home. The solving time agrees well with estimations obtained by the proposed method.

  14. Dynamic Group Diffie-Hellman Key Exchange under standard assumptions

    Energy Technology Data Exchange (ETDEWEB)

    Bresson, Emmanuel; Chevassut, Olivier; Pointcheval, David

    2002-02-14

    Authenticated Diffie-Hellman key exchange allows two principals communicating over a public network, and each holding public-private keys, to agree on a shared secret value. In this paper we study the natural extension of this cryptographic problem to a group of principals. We begin from existing formal security models and refine them to incorporate major missing details (e.g., strong-corruption and concurrent sessions). Within this model we define the execution of a protocol for authenticated dynamic group Diffie-Hellman and show that it is provably secure under the decisional Diffie-Hellman assumption. Our security result holds in the standard model and thus provides better security guarantees than previously published results in the random oracle model.

  15. Two New Approaches for Secured Image Steganography Using Cryptographic Techniques and Type Conversions

    Directory of Open Access Journals (Sweden)

    Sujay Narayana

    2011-02-01

    Full Text Available The science of securing a data by encryption is Cryptography whereas the method of hiding secretmessages in other messages is Steganography, so that the secret’s very existence is concealed. The term‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detectionby the intruders. This paper introduces two new methods wherein cryptography and steganography arecombined to encrypt the data as well as to hide the encrypted data in another medium so the fact that amessage being sent is concealed. One of the methods shows how to secure the image by converting it intocipher text by S-DES algorithm using a secret key and conceal this text in another image bysteganographic method. Another method shows a new way of hiding an image in another image byencrypting the image directly by S-DES algorithm using a key image and the data obtained is concealedin another image. The proposed method prevents the possibilities of steganalysis also.

  16. Pre-Mrna Introns as a Model for Cryptographic Algorithm:. Theory and Experiments

    Science.gov (United States)

    Regoli, Massimo

    2010-01-01

    The RNA-Crypto System (shortly RCS) is a symmetric key algorithm to cipher data. The idea for this new algorithm starts from the observation of nature. In particular from the observation of RNA behavior and some of its properties. In particular the RNA sequences have some sections called Introns. Introns, derived from the term "intragenic regions", are non-coding sections of precursor mRNA (pre-mRNA) or other RNAs, that are removed (spliced out of the RNA) before the mature RNA is formed. Once the introns have been spliced out of a pre-mRNA, the resulting mRNA sequence is ready to be translated into a protein. The corresponding parts of a gene are known as introns as well. The nature and the role of Introns in the pre-mRNA is not clear and it is under ponderous researches by Biologists but, in our case, we will use the presence of Introns in the RNA-Crypto System output as a strong method to add chaotic non coding information and an unnecessary behaviour in the access to the secret key to code the messages. In the RNA-Crypto System algorithm the introns are sections of the ciphered message with non-coding information as well as in the precursor mRNA.

  17. A Secure Key Distribution System of Quantum Cryptography Based on the Coherent State

    Science.gov (United States)

    Guo, Guang-Can; Zhang, Xiao-Yu

    1996-01-01

    The cryptographic communication has a lot of important applications, particularly in the magnificent prospects of private communication. As one knows, the security of cryptographic channel depends crucially on the secrecy of the key. The Vernam cipher is the only cipher system which has guaranteed security. In that system the key must be as long as the message and most be used only once. Quantum cryptography is a method whereby key secrecy can be guaranteed by a physical law. So it is impossible, even in principle, to eavesdrop on such channels. Quantum cryptography has been developed in recent years. Up to now, many schemes of quantum cryptography have been proposed. Now one of the main problems in this field is how to increase transmission distance. In order to use quantum nature of light, up to now proposed schemes all use very dim light pulses. The average photon number is about 0.1. Because of the loss of the optical fiber, it is difficult for the quantum cryptography based on one photon level or on dim light to realize quantum key-distribution over long distance. A quantum key distribution based on coherent state is introduced in this paper. Here we discuss the feasibility and security of this scheme.

  18. Completely device-independent quantum key distribution

    Science.gov (United States)

    Aguilar, Edgar A.; Ramanathan, Ravishankar; Kofler, Johannes; Pawłowski, Marcin

    2016-08-01

    Quantum key distribution (QKD) is a provably secure way for two distant parties to establish a common secret key, which then can be used in a classical cryptographic scheme. Using quantum entanglement, one can reduce the necessary assumptions that the parties have to make about their devices, giving rise to device-independent QKD (DIQKD). However, in all existing protocols to date the parties need to have an initial (at least partially) random seed as a resource. In this work, we show that this requirement can be dropped. Using recent advances in the fields of randomness amplification and randomness expansion, we demonstrate that it is sufficient for the message the parties want to communicate to be (partially) unknown to the adversaries—an assumption without which any type of cryptography would be pointless to begin with. One party can use her secret message to locally generate a secret sequence of bits, which can then be openly used by herself and the other party in a DIQKD protocol. Hence our work reduces the requirements needed to perform secure DIQKD and establish safe communication.

  19. DNA-based cryptographic methods for data hiding in DNA media.

    Science.gov (United States)

    Marwan, Samiha; Shawish, Ahmed; Nagaty, Khaled

    2016-12-01

    Information security can be achieved using cryptography, steganography or a combination of them, where data is firstly encrypted using any of the available cryptography techniques and then hid into any hiding medium. Recently, the famous genomic DNA has been introduced as a hiding medium, known as DNA steganography, due to its notable ability to hide huge data sets with a high level of randomness and hence security. Despite the numerous cryptography techniques, to our knowledge only the vigenere cipher and the DNA-based playfair cipher have been combined with the DNA steganography, which keeps space for investigation of other techniques and coming up with new improvements. This paper presents a comprehensive analysis between the DNA-based playfair, vigenere, RSA and the AES ciphers, each combined with a DNA hiding technique. The conducted analysis reports the performance diversity of each combined technique in terms of security, speed, hiding capacity in addition to both key size and data size. Moreover, this paper proposes a modification of the current combined DNA-based playfair cipher technique, which makes it not only simple and fast but also provides a significantly higher hiding capacity and security. The conducted extensive experimental studies confirm such outstanding performance in comparison with all the discussed combined techniques. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  20. An update on the side channel cryptanalysis of MACs based on cryptographic hash functions

    DEFF Research Database (Denmark)

    Gauravaram, Praveen; Okeya, Katsuyuki

    2007-01-01

    into consideration. Next, we propose new hybrid NMAC/HMAC schemes for security against side channel attacks assuming that their underlying block cipher is ideal. We then show that M-NMAC, MDx-MAC and a variant of the envelope MAC scheme based on DM with an ideal block cipher are secure against DPA attacks.......Okeya has established that HMAC/NMAC implementations based on only Matyas-Meyer-Oseas (MMO) PGV scheme and his two refined PGV schemes are secure against side channel DPA attacks when the block cipher in these constructions is secure against these attacks. The significant result of Okeya's analysis...... is that the implementations of HMAC/NMAC with the Davies-Meyer (DM) compression function based hash functions such as MD5 and SHA-1 are vulnerable to side channel attacks. In this paper, first we show a partial key recovery attack on NMAC/HMAC based on Okeya's two refined PGV schemes by taking practical constraints...

  1. Teaching design discussion of trivium cryptographic algorithm%Trivium密码算法的教学设计探讨

    Institute of Scientific and Technical Information of China (English)

    韦永壮; 张润莲

    2012-01-01

      Trivium cipher algorithm is ultimately one of the selected algorithm of the European Stream Cipher Scheme ( eSTREAM ). Because of its following characteristic such as simple, graceful, fast software and hardware, security and so on, in academia and industry,it was widely payed attention to. According to existed actual problems of Trivium cryptographic algorithm in the teaching and the characteristics of the students in senior information profession, the structure of Trivium algorithm analyzed, the teaching design were put forward from the view of Boolean function, valuable teaching ideas were provided for peer.%  Trivium密码算法是欧洲流密码计划(eSTREAM)的最终入选算法之一。由于其结构简洁、优美、软硬件实现快速、安全性好等特点,倍受学术界和工业界的广泛关注。针对Trivium密码算法实际教学中存在的问题及信息专业高年级学生的特点,分析了Trivium算法的结构,提出从布尔函数的角度来进行教学设计,包括算法部件分析、加解密过程、性能及安全性等环节,为同行提供有价值的教学思路。

  2. All Different, All Equal. A Pack of Educational Materials for Schools To Develop an Understanding of Racism and Increase Awareness of the Many Cultures in Our World. For Key Stage 3 and 4 Pupils.

    Science.gov (United States)

    Norfolk Education and Action for Development, Norwich (England).

    These curriculum materials have been designed to challenge the ignorance that causes prejudice and racism. They have been produced for use in a variety of educational settings and in conjunction with other curricula for students in Key Stages 3 and 4. They target students in British counties that are predominantly white, such as Norfolk (England),…

  3. Small private key MQPKS on an embedded microprocessor.

    Science.gov (United States)

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-03-19

    Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key MQ scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key MQ scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing MQ on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key MQ scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012.

  4. Authenticated group Diffie-Hellman key exchange: theory and practice

    Energy Technology Data Exchange (ETDEWEB)

    Chevassut, Olivier [Catholic Univ. of Louvain, Louvain-la-Neuve (Belgium)

    2002-10-01

    Authenticated two-party Diffie-Hellman key exchange allows two principals A and B, communicating over a public network, and each holding a pair of matching public/private keys to agree on a session key. Protocols designed to deal with this problem ensure A (B resp.)that no other principals aside from B (A resp.) can learn any information about this value. These protocols additionally often ensure A and B that their respective partner has actually computed the shared secret value. A natural extension to the above cryptographic protocol problem is to consider a pool of principals agreeing on a session key. Over the years several papers have extended the two-party Diffie-Hellman key exchange to the multi-party setting but no formal treatments were carried out till recently. In light of recent developments in the formalization of the authenticated two-party Diffie-Hellman key exchange we have in this thesis laid out the authenticated group Diffie-Hellman key exchange on firmer foundations.

  5. Time-Dependent Cryptographic Protocol Logic and Its Formal Semantics%时间相关密码协议逻辑及其形式化语义

    Institute of Scientific and Technical Information of China (English)

    雷新锋; 刘军; 肖军模

    2011-01-01

    在密码协议中,主体的认知与信仰状态是随时间推移而不断变化的.为了在协议分析中体现这种动态性,提出一种时间相关密码协议逻辑.该逻辑基于谓词模态逻辑,通过在谓词及模态词中引入时间参数以体现时间因素,使得逻辑可表达各个主体在协议不同时间点的行为、知识及信仰.给出该逻辑的形式化语义,在避免逻辑语言二义性的同时保证了逻辑的可靠性.该语义基于Kripke结构,将可能世界建立在主体局部世界与时间局部世界的基础上,使得任一可能世界能够反映协议的一个可能的全过程.该逻辑为密码协议,特别是时间相关密码协议提供了灵活的分析方法,增强了基于逻辑方法的协议分析能力.%In cryptographic protocols, the agent's epistemic and doxastic states are changeable over time. To model these dynamics, a time-dependent cryptographic protocol logic is proposed. Our logic is based on the predicate modal logic and the time factor can be expressed in it by invoking a time variable as a parameter of predicates and modal operators. This makes it possible to model every agent's actions, knowledges and beliefs at different time points. We also give the formal semantics of our logic to avoid the ambiguity of its language and make the logic sound. The semantics is based on the kripke structure and the possible world in it is built both on the local world of agent and the specific world of time. This makes every possible world can give a global view of each point of the protocol. Our logic provides a flexible method for analyzing the cryptographic protocols, especially the time-dependent cryptographic protocols, and increases the power of the logical method for analyzing protocols.

  6. Depth keying

    Science.gov (United States)

    Gvili, Ronen; Kaplan, Amir; Ofek, Eyal; Yahav, Giora

    2003-05-01

    We present a new solution to the known problem of video keying in a natural environment. We segment foreground objects from background objects using their relative distance from the camera, which makes it possible to do away with the use of color for keying. To do so, we developed and built a novel depth video camera, capable of producing RGB and D signals, where D stands for the distance to each pixel. The new RGBD camera enables the creation of a whole new gallery of effects and applications such as multi-layer background substitutions. This new modality makes the production of real time mixed reality video possible, as well as post-production manipulation of recorded video. We address the problem of color spill -- in which the color of the foreground object is mixed, along its boundary, with the background color. This problem prevents an accurate separation of the foreground object from its background, and it is most visible when compositing the foreground objects to a new background. Most existing techniques are limited to the use of a constant background color. We offer a novel general approach to the problem with enabling the use of the natural background, based upon the D channel generated by the camera.

  7. 我国中成药处方中重点保护野生药材的应用状况分析%Analysis on application of key-protected wild medicinal materials in prescription of Chinese patent medicine

    Institute of Scientific and Technical Information of China (English)

    周跃华; 路金才

    2013-01-01

    以《国家重点保护野生药材物种名录》、《国家重点保护野生动物名录》、《国家重点保护野生植物名录(第一批)》、华盛顿公约(CITES)附录1和附录2等名录中收载且具有法定药材标准的动植物物种所对应的药材品种作为国家重点保护野生药材,对其在我国中成药质量标准“处方”项下出现的频次进行了查询,并结合相关药材人工栽培及养殖的文献,对相关重点保护野生药材在中成药中的应用状况进行初步分析,为其可持续利用提供参考.%As state key-protected wild medicinal materials, their species are collected in State Key-protected Wild Medicinal Species List, State Key-protected Wild Animals List, and State Key-protected Wild Plants List {the first) and Convention on International Trade in Endangered Species of Wild Fauna and Flora (CITES) Appendix Ⅰ/Ⅱ, and there are legal medicinal material standards. Based on the statistical results of the existence frequency in Chinese patent medicine and the literatures of medicinal materials cultivation and breeding situation, the application of key-protected wild medicinal materials is preliminarily estimated, which would provide the reference for their sustainable utilization.

  8. Free-space Quantum Key Distribution over 10 km in Daylight and at Night

    Science.gov (United States)

    Hughes, Richard; Nordholt, Jane; Peterson, Charles

    2002-05-01

    In quantum key distribution (QKD) single-photon transmissions transfer the shared, secret random number sequences, known as cryptographic keys that are used to encrypt and decrypt secret communications. Because the security of QKD is based on principles of quantum physics and information theory an adversary can neither successfully tap the key transmissions, nor evade detection. We have performed QKD using the four-state Â"BB84Â" protocol with non-orthogonal photon polarization states across a 10-km line-of-sight path in daylight and at night [1]. We transferred secret, cryptographic quality random numbers at practical rates with security against technologically feasible eavesdropping strategies. By relating the secrecy capacity (secret bits transferred per transmitted bit), which had values up to 10-3, to properties of the atmospheric channel we are able to infer the secrecy capacity of free-space QKD under other atmospheric conditions and over other, longer transmission distances. 1. R. J. Hughes, J. E. Nordholt, D. Derkacs and C. G. Peterson, Los Alamos report LA-UR-02-449.

  9. Secure Key Management in the Cloud

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Jakobsen, Thomas Pelle; Nielsen, Jesper Buus

    2013-01-01

    We consider applications involving a number of servers in the cloud that go through a sequence of online periods where the servers communicate, separated by offline periods where the servers are idle. During the offline periods, we assume that the servers need to securely store sensitive informat......We consider applications involving a number of servers in the cloud that go through a sequence of online periods where the servers communicate, separated by offline periods where the servers are idle. During the offline periods, we assume that the servers need to securely store sensitive...... information such as cryptographic keys. Applications like this include many cases where secure multiparty computation is outsourced to the cloud, and in particular a number of online auctions and benchmark computations with confidential inputs. We consider fully autonomous servers that switch between online...... and offline periods without communicating with anyone from outside the cloud, and semi-autonomous servers that need a limited kind of assistance from outside the cloud when doing the transition. We study the levels of security one can – and cannot – obtain in this model, propose light-weight protocols...

  10. A trustworthy key generation prototype based on DDR3 PUF for wireless sensor networks.

    Science.gov (United States)

    Liu, Wenchao; Zhang, Zhenhua; Li, Miaoxin; Liu, Zhenglin

    2014-06-30

    Secret key leakage in wireless sensor networks (WSNs) is a high security risk especially when sensor nodes are deployed in hostile environment and physically accessible to attackers. With nowadays semi/fully-invasive attack techniques attackers can directly derive the cryptographic key from non-volatile memory (NVM) storage. Physically Unclonable Function (PUF) is a promising technology to resist node capture attacks, and it also provides a low cost and tamper-resistant key provisioning solution. In this paper, we designed a PUF based on double-data-rate SDRAM Type 3 (DDR3) memory by exploring its memory decay characteristics. We also described a prototype of 128-bit key generation based on DDR3 PUF with integrated fuzzy extractor. Due to the wide adoption of DDR3 memory in WSN, our proposed DDR3 PUF technology with high security levels and no required hardware changes is suitable for a wide range of WSN applications.

  11. A Trustworthy Key Generation Prototype Based on DDR3 PUF for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Wenchao Liu

    2014-06-01

    Full Text Available Secret key leakage in wireless sensor networks (WSNs is a high security risk especially when sensor nodes are deployed in hostile environment and physically accessible to attackers. With nowadays semi/fully-invasive attack techniques attackers can directly derive the cryptographic key from non-volatile memory (NVM storage. Physically Unclonable Function (PUF is a promising technology to resist node capture attacks, and it also provides a low cost and tamper-resistant key provisioning solution. In this paper, we designed a PUF based on double-data-rate SDRAM Type 3 (DDR3 memory by exploring its memory decay characteristics. We also described a prototype of 128-bit key generation based on DDR3 PUF with integrated fuzzy extractor. Due to the wide adoption of DDR3 memory in WSN, our proposed DDR3 PUF technology with high security levels and no required hardware changes is suitable for a wide range of WSN applications.

  12. An Identity-Based Group Key Agreement Proto col for Low-Power Mobile Devices

    Institute of Scientific and Technical Information of China (English)

    TENG Jikai; WU Chuankun

    2016-01-01

    In wireless mobile networks, group mem-bers join and leave the group frequently, a dynamic group key agreement protocol is required to provide a group of users with a shared secret key to achieve cryptographic goal. Most of previous group key agreement protocols for wireless mobile networks are static and employ traditional PKI. This paper presents an ID-based dynamic authen-ticated group key agreement protocol for wireless mobile networks. In Setup and Join algorithms, the protocol re-quires two rounds and each low-power node transmits con-stant size of messages. Furthermore, in Leave algorithm, only one round is required and none of low-power nodes is required to transmit any message, which improves the effi-ciency of the entire protocol. The protocol’s AKE-security with forward secrecy is proved under Decisional bilinear in-verse Diffie-Hellman (DBIDH) assumption. It is addition-ally proved to be contributory.

  13. Development of high quality carrier materials for field delivery of key microorganisms used as bio-fertilisers and bio-pesticides

    Energy Technology Data Exchange (ETDEWEB)

    Yardin, M. Roseline E-mail: m.yardin@uws.edu.au; Kennedy, Ivan R.; Thies, Janice E

    2000-03-01

    High quality inoculants used as bio-fertilisers and bio-pesticides depend on having high concentrations of the microorganism(s), long shelf-life and a formulation appropriate for field delivery. To maintain the microorganisms in a viable state, commercially available carrier materials are typically based on milled peat, clays, rice, bran, seeds, or other complex organic matrices. To manufacture a high quality microbial product, it is essential that the carrier material is pre-packaged and pre-sterilised. This allows for non-competitive multiplication and maintenance of the microorganisms in a nutrient rich environment. This paper reports on the efficacy and problems inherent in the sterilisation of complex carbon-based carrier materials such as peat. Resident microbial survivors of gamma irradiation doses in excess of 50 kGy, commonly Gram positive spore-formers such as Bacillus or actinomycetes were consistently observed. (author)

  14. Obfuscation for Cryptographic Purposes

    NARCIS (Netherlands)

    D. Hofheinz (Dennis); J. Malone-Lee; M. Stam; S. Vadhan

    2007-01-01

    textabstractAn obfuscation of a function F should satisfy two requirements: firstly, using it should be possible to evaluate F; secondly, should not reveal anything about F that cannot be learnt from oracle access to F. Several definitions for obfuscation exist. However, most of them are either

  15. Enhanced OneTime Pad Cipher with MoreArithmetic and Logical Operations with Flexible Key Generation Algorithm

    Directory of Open Access Journals (Sweden)

    S.G.Srikantaswamy

    2011-12-01

    Full Text Available The process of exchanging information is called Communication. The basic Communication system involvestransmitter, receiver and the channel. The data transmitted by the sender reaches receiver through thechannel. The unauthorized parties (cracker,hacker, eavesdropper, or attacker should not be able to access the information at the channel. Therefore transmitting data securely from the sender to the receiver is a very important aspect. A cryptographic system is unconditionally secure if the cipher text produced by the system does not contain enough information to determine uniquely the corresponding plaintext, no matter how much cipher text is available. A cryptographic system is said to be computationally secure if the cost of breaking the cipher exceeds the value of the encrypted information and the time required to break the cipher exceeds the useful lifetime of the content. One time pad system can be called as unconditionally secure algorithm, if the keys (pad usedare truly random in nature. In this paper, we are demonstrating that one-time pad can be used as an efficient encryption scheme by involving arithmetic and logical operations. Here we proposed a new key generation technique, to generate a key of any length just by providing a seed value, to encrypt the message. The problem generating key value has been solved by the use of key generation algorithm.

  16. Electrochemical characterization methods of the key materials for SOFC%SOFC关键材料电化学表征方法

    Institute of Scientific and Technical Information of China (English)

    樊丽权; 赵二庆; 高克卿; 熊岳平

    2013-01-01

    Solid oxide fuel cells(SOFCs)are the solid-state devices for generating electricity from the chemical energy. The effect of solid oxide materials on the performance of SOFC is especially important. From the influence of materials on electrochemical performance of SOFC,this paper summarizes electrochemical characterization methods for the composition materials of SOFC briefly based on the fundamentals of electro-chemistry and solid electrochemistry. Some research experience is also included in the paper,which can facilitate the further research of materials.%  固体氧化物燃料电池(SOFC)是全固态的化学发电装置,其构成材料固体氧化物对SOFC性能的影响尤为重要。本文从材料对SOFC电化学性能影响的视角出发,立足电化学、固体电化学的基本原理,概述了SOFC构成材料的电化学表征方法,并将一些研究积累赘述文中,希望有利于材料的进一步研究。

  17. Improved RSA cryptosystem based on the study of number theory and public key cryptosystems

    Directory of Open Access Journals (Sweden)

    Israt Jahan

    2015-01-01

    Full Text Available Security is required to transmit confidential information over the network. Security is also demanding in wide range of applications. Cryptographic algorithms play a vital role in providing the data security against malicious attacks. RSA algorithm is extensively used in the popular implementations of Public Key Infrastructures. In asymmetric key cryptography, also called Public Key cryptography, two different keys (which form a key pair are used. One key is used for encryption and only the other corresponding key must be used for decryption. No other key can decrypt the message – not even the original (i.e. the first key used for encryption. In this paper, we have proposed an improved approach of RSA algorithm using two public key pairs and using some mathematical logic rather than sending one public key d irectly.Because if an attacker has an opportunity of getting the public key componet they can find private key value by brute force search. General Terms: Cryptography, network security

  18. PMI-based MIMO OFDM PHY Integrated Key Exchange (P-MOPI) Scheme

    CERN Document Server

    Lan, Pang-Chang; Lee, Chia-Han; Yeh, Ping-Cheng; Cheng, Chen-Mou

    2011-01-01

    In the literature, J.-P. Cheng et al. have proposed the MIMO-OFDM PHY integrated (MOPI) scheme for achieving physical-layer security in practice without using any cryptographic ciphers. The MOPI scheme uses channel sounding and physical-layer network coding (PNC) to prevent eavesdroppers from learning the channel state information (CSI). Nevertheless, due to the use of multiple antennas for PNC at transmitter and beamforming at receiver, it is not possible to have spatial multiplexing nor use space-time codes in our previous MOPI scheme. In this paper, we propose a variant of the MOPI scheme, called P-MOPI, that works with a cryptographic cipher and utilizes precoding matrix index (PMI) as an efficient key-exchange mechanism. With channel sounding, the PMI is only known between the transmitter and the legal receiver. The shared key can then be used, e.g., as the seed to generate pseudo random bit sequences for securing subsequent transmissions using a stream cipher. By applying the same techniques at independ...

  19. Synthesis of 5-aminotetrazole-1N-oxide and its azo derivative: a key step in the development of new energetic materials.

    Science.gov (United States)

    Fischer, Dennis; Klapötke, Thomas M; Piercey, Davin G; Stierstorfer, Jörg

    2013-04-01

    1-Hydroxy-5-aminotetrazole (1), which is a long-desired starting material for the synthesis of hundreds of new energetic materials, was synthesized for the first time by the reaction of aqueous hydroxylamine with cyanogen azide. The use of this unique precursor was demonstrated by the preparation of several energetic compounds with equal or higher performance than that of commonly used explosives, such as hexogen (RDX). The prepared compounds, including energetic salts of 1-hydroxy-5-aminotetrazole (hydroxylammonium (2, two polymorphs) and ammonium (3)), azo-coupled derivatives (potassium (5), hydroxylammonium (6), ammonium (7), and hydrazinium 5,5'-azo-bis(1-N-oxidotetrazolate (8, two polymorphs)), as well as neutral compounds 5,5'-azo-bis(1-oxidotetrazole) (4) and 5,5'-bis(1-oxidotetrazole)hydrazine (9), were intensively characterized by low-temperature X-ray diffraction, IR, Raman, and multinuclear NMR spectroscopy, elemental analysis, and DSC. The calculated energetic performance, by using the EXPLO5 code, based on the calculated (CBS-4M) heats of formation and X-ray densities confirm the high energetic performance of tetrazole-N-oxides as energetic materials. Last but not least, their sensitivity towards impact, friction, and electrostatic discharge were explored. 5,5'-Azo-bis(1-N-oxidotetrazole) deflagrates close to the DDT (deflagration-to-detonation transition) faster than all compounds that have been investigated in our research group to date.

  20. Materials

    Science.gov (United States)

    Glaessgen, Edward H.; Schoeppner, Gregory A.

    2006-01-01

    NASA Langley Research Center has successfully developed an electron beam freeform fabrication (EBF3) process, a rapid metal deposition process that works efficiently with a variety of weldable alloys. The EBF3 process can be used to build a complex, unitized part in a layer-additive fashion, although the more immediate payoff is for use as a manufacturing process for adding details to components fabricated from simplified castings and forgings or plate products. The EBF3 process produces structural metallic parts with strengths comparable to that of wrought product forms and has been demonstrated on aluminum, titanium, and nickel-based alloys to date. The EBF3 process introduces metal wire feedstock into a molten pool that is created and sustained using a focused electron beam in a vacuum environment. Operation in a vacuum ensures a clean process environment and eliminates the need for a consumable shield gas. Advanced metal manufacturing methods such as EBF3 are being explored for fabrication and repair of aerospace structures, offering potential for improvements in cost, weight, and performance to enhance mission success for aircraft, launch vehicles, and spacecraft. Near-term applications of the EBF3 process are most likely to be implemented for cost reduction and lead time reduction through addition of details onto simplified preforms (casting or forging). This is particularly attractive for components with protruding details that would require a significantly large volume of material to be machined away from an oversized forging, offering significant reductions to the buy-to-fly ratio. Future far-term applications promise improved structural efficiency through reduced weight and improved performance by exploiting the layer-additive nature of the EBF3 process to fabricate tailored unitized structures with functionally graded microstructures and compositions.

  1. A key factor in modern protection of historic buildings: the assessment of penetration of water-repellent polymers into porous stone-materials.

    Science.gov (United States)

    Toniolo, L; Casadio, F; Cariati, F

    2001-01-01

    From the 1960s on, the conservation of monuments and stone masonry has witnessed an increasing use of polymeric products during restoration interventions. Actual penetration depths reached by different polymers within the porous stone matrix are supposed to be key factors in determining the efficacy of the treatments themselves (besides, of course, the chemical-mineralogical nature of the stone and the chemical-physical characteristics of the various polymers). This work presents some preliminary results obtained on specimens of Noto calcarenite treated with various polymeric protective products. Samples were investigated with direct analytical methods (micro-ATR spectroscopy, SEM) in order to assess penetration depths reached by polymers inside the stone while reducing to a minimum the necessary manipulation of specimens. The obtained results highlighted the following trend in penetration depths for the various products tested: siloxane product > partially fluorinated acrylic resin > acrylic resin. Moreover, data obtained allowed to establish direct correlation between long term efficacy of products and relative penetration depths.

  2. METADATA DRIVEN EFFICIENT KEY GENERATION AND DISTRIBUTION IN CLOUD SECURITY

    Directory of Open Access Journals (Sweden)

    R. Anitha

    2014-01-01

    Full Text Available With rapid development of cloud computing to a greater extent IT industries outsource their sensitive data at cloud data storage location. To keep the stored data confidential against untrusted cloud service providers, a natural way is to store only encrypted data in the cloud severs and providing an efficient access control mechanism using a competent cipher key-Cmxn, which is becoming a promising cryptographic solution. In this proposed model the cipher key is generated based on attributes of metadata. The key problems of this approach includes, the generation of cipher key-Cmxn and establishing an access control mechanism for the encrypted data using cipher key, where keys cannot be revoked without the involvement of data owner and the Metadata Data Server (MDS, hence makes data owner feels comfortable about the data stored. From this study, we propose a novel Metadata driven efficient key generation and distribution policies for cloud data security system by exploiting the characteristic of the metadata stored. Our design enforces security by providing two novel features. 1. Generation of Cipher key-Cmxn using modified feistel network, which holds good for the avalanche effect as each round of the feistel function, depends on the previous round. 2. A novel key distribution policy is designed where the encryption and decryption keys cannot be compromised without the involvement of data owner and the Metadata Data Server (MDS, hence makes data owner comfortable about the data stored. We have implemented a security model that incorporates our ideas and evaluated the performance and scalability of the secured model.

  3. Provably-Secure Authenticated Group Diffie-Hellman KeyExchange

    Energy Technology Data Exchange (ETDEWEB)

    Bresson, Emmanuel; Chevassut, Olivier; Pointcheval, David

    2007-01-01

    Authenticated key exchange protocols allow two participantsA and B, communicating over a public network and each holding anauthentication means, to exchange a shared secret value. Methods designedto deal with this cryptographic problem ensure A (resp. B) that no otherparticipants aside from B (resp. A) can learn any information about theagreed value, and often also ensure A and B that their respective partnerhas actually computed this value. A natural extension to thiscryptographic method is to consider a pool of participants exchanging ashared secret value and to provide a formal treatment for it. Startingfrom the famous 2-party Diffie-Hellman (DH) key exchange protocol, andfrom its authenticated variants, security experts have extended it to themulti-party setting for over a decade and completed a formal analysis inthe framework of modern cryptography in the past few years. The presentpaper synthesizes this body of work on the provably-secure authenticatedgroup DH key exchange.

  4. New directions in the science and technology of advanced sheet explosive formulations and the key energetic materials used in the processing of sheet explosives: Emerging trends.

    Science.gov (United States)

    Talawar, M B; Jangid, S K; Nath, T; Sinha, R K; Asthana, S N

    2015-12-30

    This review presents the work carried out by the international community in the area of sheet explosive formulations and its applications in various systems. The sheet explosive is also named as PBXs and is a composite material in which solid explosive particles like RDX, HMX or PETN are dispersed in a polymeric matrix, forms a flexible material that can be rolled/cut into sheet form which can be applied to any complex contour. The designed sheet explosive must possess characteristic properties such as flexible, cuttable, water proof, easily initiable, and safe handling. The sheet explosives are being used for protecting tanks (ERA), light combat vehicle and futuristic infantry carrier vehicle from different attacking war heads etc. Besides, sheet explosives find wide applications in demolition of bridges, ships, cutting and metal cladding. This review also covers the aspects such as risks and hazard analysis during the processing of sheet explosive formulations, effect of ageing on sheet explosives, detection and analysis of sheet explosive ingredients and the R&D efforts of Indian researchers in the development of sheet explosive formulations. To the best of our knowledge, there has been no review article published in the literature in the area of sheet explosives.

  5. Anticollusion Attack Noninteractive Security Hierarchical Key Agreement Scheme in WHMS

    Directory of Open Access Journals (Sweden)

    Kefei Mao

    2016-01-01

    Full Text Available Wireless Health Monitoring Systems (WHMS have potential to change the way of health care and bring numbers of benefits to patients, physicians, hospitals, and society. However, there are crucial barriers not only to transmit the biometric information but also to protect the privacy and security of the patients’ information. The key agreement between two entities is an essential cryptography operation to clear the barriers. In particular, the noninteractive hierarchical key agreement scheme becomes an attractive direction in WHMS because each sensor node or gateway has limited resources and power. Recently, a noninteractive hierarchical key agreement scheme has been proposed by Kim for WHMS. However, we show that Kim’s cryptographic scheme is vulnerable to the collusion attack if the physicians can be corrupted. Obviously, it is a more practical security condition. Therefore, we proposed an improved key agreement scheme against the attack. Security proof, security analysis, and experimental results demonstrate that our proposed scheme gains enhanced security and more efficiency than Kim’s previous scheme while inheriting its qualities of one-round communication and security properties.

  6. Impact of metal ions in porphyrin-based applied materials for visible-light photocatalysis: Key information from ultrafast electronic spectroscopy

    KAUST Repository

    Kar, Prasenjit

    2014-07-10

    ProtoporphyrinIX-zinc oxide (PP-ZnO) nanohybrids have been synthesized for applications in photocatalytic devices. High-resolution transmission electron microscopy (HRTEM), X-ray diffraction (XRD), and steady-state infrared, absorption, and emission spectroscopies have been used to analyze the structural details and optical properties of these nanohybrids. Time-resolved fluorescence and transient absorption techniques have been applied to study the ultrafast dynamic events that are key to photocatalytic activities. The photocatalytic efficiency under visible-light irradiation in the presence of naturally abundant iron(III) and copper(II) ions has been found to be significantly retarded in the former case, but enhanced in the latter case. More importantly, femtosecond (fs) transient absorption data have clearly demonstrated that the residence of photoexcited electrons from the sensitizer PP in the centrally located iron moiety hinders ground-state bleach recovery of the sensitizer, affecting the overall photocatalytic rate of the nanohybrid. The presence of copper(II) ions, on the other hand, offers additional stability against photobleaching and eventually enhances the efficiency of photocatalysis. In addition, we have also explored the role of UV light in the efficiency of photocatalysis and have rationalized our observations from femtosecond- to picosecond-resolved studies. © 2014 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  7. Impact of metal ions in porphyrin-based applied materials for visible-light photocatalysis: key information from ultrafast electronic spectroscopy.

    Science.gov (United States)

    Kar, Prasenjit; Sardar, Samim; Alarousu, Erkki; Sun, Jingya; Seddigi, Zaki S; Ahmed, Saleh A; Danish, Ekram Y; Mohammed, Omar F; Pal, Samir Kumar

    2014-08-11

    Protoporphyrin IX-zinc oxide (PP-ZnO) nanohybrids have been synthesized for applications in photocatalytic devices. High-resolution transmission electron microscopy (HRTEM), X-ray diffraction (XRD), and steady-state infrared, absorption, and emission spectroscopies have been used to analyze the structural details and optical properties of these nanohybrids. Time-resolved fluorescence and transient absorption techniques have been applied to study the ultrafast dynamic events that are key to photocatalytic activities. The photocatalytic efficiency under visible-light irradiation in the presence of naturally abundant iron(III) and copper(II) ions has been found to be significantly retarded in the former case, but enhanced in the latter case. More importantly, femtosecond (fs) transient absorption data have clearly demonstrated that the residence of photoexcited electrons from the sensitizer PP in the centrally located iron moiety hinders ground-state bleach recovery of the sensitizer, affecting the overall photocatalytic rate of the nanohybrid. The presence of copper(II) ions, on the other hand, offers additional stability against photobleaching and eventually enhances the efficiency of photocatalysis. In addition, we have also explored the role of UV light in the efficiency of photocatalysis and have rationalized our observations from femtosecond- to picosecond-resolved studies. © 2014 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  8. Synthesis, characterization and evaluation of 1,2-bis(2,4,6-trinitrophenyl) hydrazine: a key precursor for the synthesis of high performance energetic materials.

    Science.gov (United States)

    Badgujar, D M; Talawar, M B; Harlapur, Sujata F; Asthana, S N; Mahulikar, P P

    2009-12-15

    1,2-Bis(2,4,6-trinitrophenyl) hydrazine (3) is one of the precursors in the synthesis of an important energetic material viz., hexanitrazobenzene. The simple and convenient lab scale synthesis of title compound (3) was carried out by the condensation of picryl chloride (2) with hydrazine hydrate at 30-50 degrees C in methanol based on the lines of scanty literature reports. Picryl chloride was synthesized by the reaction of picric acid (1) with phosphorous oxychloride based on the lines of reported method. The synthesized compound (3) was characterized by IR and 1H NMR spectral data. Some of the energetic properties of the synthesized compound have also been studied. The theoretically computed energetic properties of the title compound (3) indicated the superior performance in comparison to tetranitrodibenzo tetraazapentalene (TACOT) and hexanitrostilbene (HNS) in terms of velocity of detonation.

  9. Security assurance capability assessment based on entropy weight method for cryptographic module%基于熵权法的密码模块安全保障能力评估

    Institute of Scientific and Technical Information of China (English)

    粟登银; 徐开勇; 高杨

    2012-01-01

    To solve the problems that the index value of cryptographic modules is not fixed, the index system is hardly built, and the security assurance ability can not be quantitatively assessed, a security assurance capability assessment for cryptographic module was proposed. The description on indexes by interval number was applied to illustrate the security attribute of cryptographic modules. This paper determined the weight vector of each period point by entropy weight coefficient method combined with expert decision weight method. According to the interval multi-attribute decision methodology, a feasible methodology was adopted to solve the interval Information Assurance ( IA) capability evaluation problem of cryptographic modules. Finally, through analyzing two kinds of cryptographic modules, the experimental results show that the proposed method is feasible.%针对密码模块这类信息安全产品指标值不固定、指标系统难以建立、安全保障能力难以定量评估的问题,提出了一种定量描述密码模块安全保障能力的可行方法.方法运用区间数描述密码模块的安全属性,采用熵权法结合主观赋权法确定每个安全属性的权重值,运用区间型多属性决策方法进行综合评价,最后运用所提方法对两种商用密码模块进行了实例分析,计算结果表明所提方法可行.

  10. 高比能锂硫电池关键材料的研究%Key Materials of High Energy Lithium Sulfur Batteries

    Institute of Scientific and Technical Information of China (English)

    王维坤; 余仲宝; 苑克国; 王安邦; 杨裕生

    2011-01-01

    Lithium sulfur battery is a promising energy storage system due to its high specific energy density,low cost and environmental friendliness. But poor cycle performance has hindered its practical application. In this paper, the developing levels of lithium sulfur battery are introduced concisely. The important progress on the cathode materials, electrolytes, lithium anode and new battery composition of this battery system are reviewed.Furthermore, some investigation results in recent 5 years in this field of Chemical Defense Institute are mainly introduced. Firstly, two kinds of cathode materials, conducting polymer sulfides and mesoporous carbon/sulfur composites were prepared which improved the sulfur utilization and cycle performance. Compared with conducting polymer sulfides, mesoporous carbon/sulfur composites can embody more sulfur, so were preferable to high energy batteries. Secondly, an electrochemically stable binder, gelatin binder also functioned as a highly adhesive agent and an effective disperser was applied in lithium sulfur batteries. A novel porous sulfur cathode with the gelatin binder was prepared by using a freeze-drying mathod. Thirdly, a suitable electrolyte composition were investigated.Fourthly, the interface performance of lithium anode in lithium sulfur battery were studied. Integrating these technologies, the prototype polymer battery was assembled. It presented the energy density of more than 300Wh/kg, and showed about 60% remaining capacity after 100 cycles at 100% DOD. Finally, the prospects of the future research on lithium sulfur batteries are proposed.%锂硫电池具有突出的高比能量优势和原料廉价、环境友好等优点,有望成为新一代高能电池体系,但循环性能差是制约其实用化的主要障碍.本文介绍了锂硫电池的国内外发展水平,综述了锂硫电池在正极材料、电解质、负极及体系方面的重要进展,并着重介绍了防化研究院近5年在这一领域的主

  11. A-Well defined raw material specifications of product and its components, a key of successful new product design. A critical evaluation by case study

    Directory of Open Access Journals (Sweden)

    Vidyadhar Malhar Dandge

    2015-12-01

    Full Text Available New product design and development indeed needs long termvision for better product life and hence to have better product features the design team has to take into consideration various techno-commercial aspects todesign and develop most adequate new product. Normally in case of new product design all related activities are initiated by the team of technicians under the directive jointly given by top and marketing management of the concerned organization. Due to global competition in the market the product requirements are needed to be carefully identified so as to make the product more user friendly to the customers. Considering this it is quite obvious that top priority is for product performance considerations at the same time they have to establish the product cost to make it more competent in the market. Due to these constraints recently the design and development function has no more remained the responsibility technocrats but it has become techno-commercial activity. One should treat this as design and development joint activity to be performed by the dedicated team of techno-commercial people who are well equipped with sound technical knowledge so as to design the best possible product. Due to this reason the primary design activity is seen to be interfacing with various departments such as Marketing, Materials, Tool room ,Manufacturing, Vendor development and many other related departments and valuable in puts from them are badly needed at the initial phase of product design and development. This helps in identifying the product needs at various manufacturing stages well in advance. This ultimately helps the design department to deliver the most adequate product with no operational problems and product is ready to satisfy customer’s needs which ultimately leads to growth of organization through smooth product life cycle management.

  12. Structural integrity--Searching the key factor to suppress the voltage fade of Li-rich layered cathode materials through 3D X-ray imaging and spectroscopy techniques

    Energy Technology Data Exchange (ETDEWEB)

    Xu, Yahong; Hu, Enyuan; Yang, Feifei; Corbett, Jeff; Sun, Zhihong; Lyu, Yingchun; Yu, Xiqian; Liu, Yijin; Yang, Xiao-Qing; Li, Hong (BNL); (SLAC); (UCSF); (Donghua); (Chinese Aca. Sci.)

    2016-10-24

    Li-rich layered materials are important cathode compounds used in commercial lithium ion batteries, which, however, suffers from some drawbacks including the so-called voltage fade upon electrochemical cycling. Here, our study employs novel transmission X-ray microscopy to investigate the electrochemical reaction induced morphological and chemical changes in the Li-rich Li2Ru0.5Mn0.5O3 cathode particles at the meso to nano scale. We performed combined X-ray spectroscopy, diffraction and microscopy experiments to systematically study this cathode material's evolution upon cycling as well as to establish a comprehensive understanding of the structural origin of capacity fade through 2D and 3D fine length scale morphology and heterogeneity change of this material. This work suggests that atomic manipulation (e.g. doping, substitution etc.) or nano engineering (e.g. nano-sizing, heterogeneous structure) are important strategies to mitigate the internal strain and defects induced by extensive lithium insertion/extraction. It also shows that maintaining the structural integrity is the key in designing and synthesizing lithium-rich layered materials with better cycle stability.

  13. Supporting Symmetric 128-bit AES in Networked Embedded Systems: An Elliptic Curve Key Establishment Protocol-on-Chip

    Directory of Open Access Journals (Sweden)

    Roshan Duraisamy

    2007-02-01

    Full Text Available The secure establishment of cryptographic keys for symmetric encryption via key agreement protocols enables nodes in a network of embedded systems and remote agents to communicate securely in an insecure environment. In this paper, we propose a pure hardware implementation of a key agreement protocol, which uses the elliptic curve Diffie-Hellmann and digital signature algorithms and enables two parties, a remote agent and a networked embedded system, to establish a 128-bit symmetric key for encryption of all transmitted data via the advanced encryption scheme (AES. The resulting implementation is a protocol-on-chip that supports full 128-bit equivalent security (PoC-128. The PoC-128 has been implemented in an FPGA, but it can also be used as an IP within different embedded applications. As 128-bit security is conjectured valid for the foreseeable future, the PoC-128 goes well beyond the state of art in securing networked embedded devices.

  14. Supporting Symmetric 128-bit AES in Networked Embedded Systems: An Elliptic Curve Key Establishment Protocol-on-Chip

    Directory of Open Access Journals (Sweden)

    Strangio MaurizioAdriano

    2007-01-01

    Full Text Available The secure establishment of cryptographic keys for symmetric encryption via key agreement protocols enables nodes in a network of embedded systems and remote agents to communicate securely in an insecure environment. In this paper, we propose a pure hardware implementation of a key agreement protocol, which uses the elliptic curve Diffie-Hellmann and digital signature algorithms and enables two parties, a remote agent and a networked embedded system, to establish a 128-bit symmetric key for encryption of all transmitted data via the advanced encryption scheme (AES. The resulting implementation is a protocol-on-chip that supports full 128-bit equivalent security (PoC-128. The PoC-128 has been implemented in an FPGA, but it can also be used as an IP within different embedded applications. As 128-bit security is conjectured valid for the foreseeable future, the PoC-128 goes well beyond the state of art in securing networked embedded devices.

  15. Proof-of-principle field test of quantum key distribution immune to detector attacks

    CERN Document Server

    Rubenok, A; Chan, P; Lucio-Martinez, I; Tittel, W

    2012-01-01

    Quantum key distribution (QKD) promises the distribution of cryptographic keys whose secrecy is guaranteed by fundamental laws of quantum physics. After more than two decades devoted to the improvement of theoretical understanding and experimental realization, recent results in quantum hacking have reminded us that the information theoretic security of QKD protocols does not necessarily imply the same level of security for actual implementations. Of particular concern are attacks that exploit vulnerabilities of single photon detectors. Here we report the first proof-of-principle demonstration of a QKD protocol that removes the threat of any such attack. Our fiber-based implementation took advantage of three different locations within the city of Calgary. Its simplicity and robustness to environment-induced property variations of deployed optical fibers, along with the enhanced level of security offered by the protocol, confirms QKD as a viable technology for safeguarding secrets in transmission.

  16. Multiplexing scheme for simplified entanglement-based large-alphabet quantum key distribution

    CERN Document Server

    Dada, Adetunmise C

    2015-01-01

    We propose a practical quantum cryptographic scheme which combines high information capacity, such as provided by high-dimensional quantum entanglement, with the simplicity of a two-dimensional Clauser-Horne-Shimony-Holt (CHSH) Bell test for security verification. By applying a state combining entanglement in a two-dimensional degree of freedom, such as photon polarization, with high-dimensional correlations in another degree of freedom, such as photon orbital angular momentum (OAM) or path, the scheme provides a considerably simplified route towards security verification in quantum key distribution (QKD) aimed at exploiting high-dimensional quantum systems for increased secure key rates. It also benefits from security against collective attacks and is feasible using currently available technologies.

  17. Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting

    Directory of Open Access Journals (Sweden)

    Junghyun Nam

    2015-01-01

    Full Text Available We present the first provably-secure three-party password-only authenticated key exchange (PAKE protocol that can run in only two communication rounds. Our protocol is generic in the sense that it can be constructed from any two-party PAKE protocol. The protocol is proven secure in a variant of the widely-accepted model of Bellare, Pointcheval and Rogaway (2000 without any idealized assumptions on the cryptographic primitives used. We also investigate the security of the two-round, three-party PAKE protocol of Wang, Hu and Li (2010 and demonstrate that this protocol cannot achieve implicit key authentication in the presence of an active adversary.

  18. Efficient certificate-based signcryption secure against public key replacement attacks and insider attacks.

    Science.gov (United States)

    Lu, Yang; Li, Jiguo

    2014-01-01

    Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. We show that an existing certificate-based signcryption scheme is insecure in our model. We also propose a new certificate-based signcryption scheme that achieves security against both public key replacement attacks and insider attacks. We prove in the random oracle model that the proposed scheme is chosen-ciphertext secure and existentially unforgeable. Performance analysis shows that the proposed scheme outperforms all the previous certificate-based signcryption schemes in the literature.

  19. Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks

    Directory of Open Access Journals (Sweden)

    Yang Lu

    2014-01-01

    Full Text Available Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. We show that an existing certificate-based signcryption scheme is insecure in our model. We also propose a new certificate-based signcryption scheme that achieves security against both public key replacement attacks and insider attacks. We prove in the random oracle model that the proposed scheme is chosen-ciphertext secure and existentially unforgeable. Performance analysis shows that the proposed scheme outperforms all the previous certificate-based signcryption schemes in the literature.

  20. 高温电解水蒸汽制氢关键材料研究进展%Development on Key Materials for Hydrogen Production via High-Temperature Steam Electrolysis

    Institute of Scientific and Technical Information of China (English)

    任耀宇; 马景陶; 昝青峰; 林旭平; 张勇; 邓长生

    2011-01-01

    High-temperature steam electrolysis (HTSE) is an inverse process of high-temperature solid state fuel cells. The key aspect for the technology application is the materials for electrolysis cells. This review summerizes the merits of the HTSE, and presents the recent development on the HTSE, and summarizes the merits of the HTSE. Also, this review introduces the progress of the "co-electrolysis" of carbon dioxide and steam for syngas (CO+H2) production in the United States. In addition, some problems of developing the key materials are discussed. The structural optimization and development of novel material systems are proposed.%高温电解水蒸汽制氢技术是高温固体氧化物燃料电池发电的逆过程.实现这种技术的关键是电解池材料.本文综述了高温电解水蒸汽制氢技术的优点,及国内外该项技术的研究现状和发展趋势,并简要介绍了在美国用此技术进行二氧化碳、水蒸汽共电解制备合成气体(一氧化碳+氢气)的进展情况.对高温电解水蒸汽制氢技术所涉及关键材料存在的问题进行了归纳总结,并提出从优化结构和选择新材料体系两方面入手的解决办法.

  1. Verifiable Distribution of Material Goods Based on Cryptology

    Directory of Open Access Journals (Sweden)

    Radomír Palovský

    2015-12-01

    Full Text Available Counterfeiting of material goods is a general problem. In this paper an architecture for verifiable distribution of material goods is presented. This distribution is based on printing such a QR code on goods, which would contain digitally signed serial number of the product, and validity of this digital signature could be verifiable by a customer. Extension consisting of adding digital signatures to revenue stamps used for state-controlled goods is also presented. Discussion on possibilities in making copies leads to conclusion that cryptographic security needs to be completed by technical difficulties of copying.

  2. Enhancing E-Voting Systems By Leveraging Biometric Key Generation (Bkg

    Directory of Open Access Journals (Sweden)

    V. C. Ossai

    2013-10-01

    Full Text Available The adoption of e-voting methods in electioneering processes will effectively reduce cost as well as enhance election activities. What makes an e-voting model reliable and acceptable is its ability to properly authenticate voters and provide a secure means through which a voter can express his/her franchise. This paper therefore proposes a design of an e-voting system that leverages a Biometric Encryption scheme known as Biometric key Generation (BKG which is a secured strategy that entails using of biometrics to generate secure cryptographic keys. The main objective of this research is to improve on the already existing E-voting systems adopting a secured bio-cryptographic technique vis Biometric key Generation (BKG as well as using a secure transmission channel for confidential datasets of a voting process. This work develops a simulation model of an E-voting system which adopts relevant algorithms with emphasis on biometric key generation schemes. The simulation of a prototype model of the electronic voting system is developed using Proteus 7.6 application software. The prototype model would consist of electronic kiosk polling booths that are all networked to the state electoral collection center and collection centers that are networked to the national electoral collection center via a VPN backbone. The proposed e-voting system uses a Virtual Private Network (VPN as the means of communication between the various polling booths and collection points. The results of validation show that the proposed model facilitates the adoption of E-governance in the developing countries.

  3. Division of Labor Theory as a Key in Historical Materialism%论分工理论在历史唯物主义中的重要地位

    Institute of Scientific and Technical Information of China (English)

    陶鹏

    2014-01-01

    分工理论是马克思主义理论中的一个重要范畴。本文通过分析分工与生产力、生产关系、上层建筑、人的发展和人类社会五个历史唯物主义基本元素之间的关系,论证了分工理论是研究社会发展运行机制的重要线索,是把握历史唯物主义的关键,在历史唯物主义理论中占有极其重要的地位。%The theory “division of labor” is one of the most important content of Marxist theories .This paper analyzes the relations between division of labor and the five basic elements of historical material -ism: productivity , production relations , superstructure , human development and human society , and demonstrates that division of labor , theory is an important access to studying the operational mechanism of social development and a key to grasping the historical materialism , which occupies an extremely impor-tant position in historical materialism .

  4. Architecture for the Secret-Key BC3 Cryptography Algorithm

    Directory of Open Access Journals (Sweden)

    Arif Sasongko

    2011-08-01

    Full Text Available Cryptography is a very important aspect in data security. The focus of research in this field is shifting from merely security aspect to consider as well the implementation aspect. This paper aims to introduce BC3 algorithm with focus on its hardware implementation. It proposes architecture for the hardware implementation for this algorithm. BC3 algorithm is a secret-key cryptography algorithm developed with two considerations: robustness and implementation efficiency. This algorithm has been implemented on software and has good performance compared to AES algorithm. BC3 is improvement of BC2 and AE cryptographic algorithm and it is expected to have the same level of robustness and to gain competitive advantages in the implementation aspect. The development of the architecture gives much attention on (1 resource sharing and (2 having single clock for each round. It exploits regularity of the algorithm. This architecture is then implemented on an FPGA. This implementation is three times smaller area than AES, but about five times faster. Furthermore, this BC3 hardware implementation has better performance compared to BC3 software both in key expansion stage and randomizing stage. For the future, the security of this implementation must be reviewed especially against side channel attack.

  5. 基于安全操作系统的透明加密文件系统的设计%Design and Implementation of a Transparent Cryptographic File System Based on Secure Operating System

    Institute of Scientific and Technical Information of China (English)

    魏丕会; 卿斯汉; 刘海峰

    2003-01-01

    Almost all the important information is saved on physical media as files and managed by file system. Sofilesystem's security is an important promise to information security. We present a transparent cryptographic file sys-tem based on secure operating system(SecTCFS). The users do not aware the exist of the encrypting process. Au-thentication promises that valid user can access the files in the system.

  6. Diplectanids from Mycteroperca spp. (Epinephelidae) in the Mediterranean Sea: Redescriptions of six species from material collected off Tunisia and Libya, proposal for the 'Pseudorhabdosynochus riouxi group', and a taxonomic key.

    Science.gov (United States)

    Chaabane, Amira; Neifar, Lassad; Justine, Jean-Lou

    2017-01-01

    Diplectanid monogeneans are gill parasites that can infect fish in huge numbers and thus become harmful, especially in maricultured fish. It is therefore useful to have taxonomic tools, such as keys, to identify species. The following diplectanid species from groupers of the Mediterranean Sea were studied: five species of Pseudorhabdosynochus Yamaguti, 1958, including P. riouxi (Oliver, 1986) Kritsky & Beverley-Burton, 1986 from the dusky grouper Mycteroperca marginata, P. enitsuji Neifar & Euzet, 2007, P. bouaini Neifar & Euzet, 2007, P. dolicocolpos Neifar & Euzet, 2007 and P. sinediscus Neifar & Euzet, 2007 from the goldblotch grouper M. costae, and Echinoplectanum echinophallus (Euzet & Oliver, 1965) Justine & Euzet, 2006 from the dusky grouper. New material was obtained from fish collected from off Tunisia and Libya and compared to the type-material and voucher specimens in museum collections. Identifications of fish were confirmed by barcoding of cytochrome c oxidase subunit I (COI) sequences. The sclerotized vagina was considered the most important structure for systematics. The three species P. riouxi, P. bouaini, and P. enitsuji share a common general structure of the sclerotized vagina with a conspicuous spherical secondary chamber. We thus propose the 'Pseudorhabdosynochus riouxi group' to accommodate them. Pseudorhabdosynochus dolicocolpos has an elongate vaginal structure that is completely different from all its congeneric species reported from the Mediterranean Sea, and Pseudorhabdosynochus sinediscus has a sclerotized vagina in which the secondary chamber is not visible, and a haptor without squamodiscs. A taxonomic key to diplectanid species on Mycteroperca spp. in the Mediterranean Sea is proposed; it includes ten species of Pseudorhabdosynochus and one species of Echinoplectanum.

  7. Diplectanids from Mycteroperca spp. (Epinephelidae) in the Mediterranean Sea: Redescriptions of six species from material collected off Tunisia and Libya, proposal for the 'Pseudorhabdosynochus riouxi group’, and a taxonomic key

    Science.gov (United States)

    Neifar, Lassad; Justine, Jean-Lou

    2017-01-01

    Diplectanid monogeneans are gill parasites that can infect fish in huge numbers and thus become harmful, especially in maricultured fish. It is therefore useful to have taxonomic tools, such as keys, to identify species. The following diplectanid species from groupers of the Mediterranean Sea were studied: five species of Pseudorhabdosynochus Yamaguti, 1958, including P. riouxi (Oliver, 1986) Kritsky & Beverley-Burton, 1986 from the dusky grouper Mycteroperca marginata, P. enitsuji Neifar & Euzet, 2007, P. bouaini Neifar & Euzet, 2007, P. dolicocolpos Neifar & Euzet, 2007 and P. sinediscus Neifar & Euzet, 2007 from the goldblotch grouper M. costae, and Echinoplectanum echinophallus (Euzet & Oliver, 1965) Justine & Euzet, 2006 from the dusky grouper. New material was obtained from fish collected from off Tunisia and Libya and compared to the type-material and voucher specimens in museum collections. Identifications of fish were confirmed by barcoding of cytochrome c oxidase subunit I (COI) sequences. The sclerotized vagina was considered the most important structure for systematics. The three species P. riouxi, P. bouaini, and P. enitsuji share a common general structure of the sclerotized vagina with a conspicuous spherical secondary chamber. We thus propose the ‘Pseudorhabdosynochus riouxi group’ to accommodate them. Pseudorhabdosynochus dolicocolpos has an elongate vaginal structure that is completely different from all its congeneric species reported from the Mediterranean Sea, and Pseudorhabdosynochus sinediscus has a sclerotized vagina in which the secondary chamber is not visible, and a haptor without squamodiscs. A taxonomic key to diplectanid species on Mycteroperca spp. in the Mediterranean Sea is proposed; it includes ten species of Pseudorhabdosynochus and one species of Echinoplectanum. PMID:28152034

  8. On the security of \\alpha\\eta: Response to `Some attacks on quantum-based cryptographic protocols'

    CERN Document Server

    Yuen, H P; Corndorf, E; Kanter, G S; Kumar, P; Yuen, Horace P.; Nair, Ranjith; Corndorf, Eric; Kanter, Gregory S.; Kumar, Prem

    2005-01-01

    Lo and Ko, in QIC (6) pp. 40-47 [1], have developed some attacks on the cryptosystem called \\alpha\\eta [2], claiming that these attacks undermine the security of \\alpha\\eta for both direct encryption and key generation. In this paper, we show that their arguments fail in many different ways. In particular, the first attack in [1] requires channel loss or length of known-plaintext that is exponential in the key length and is unrealistic even for moderate key lengths. The second attack in [1] is a Grover search attack based on `asymptotic orthogonality' and was not analyzed quantitatively. We explain why it is not logically possible to ``pull back'' an argument valid only at n=infinity into a limit statement, let alone one valid for a finite number of transmissions n. We illustrate this by a `proof' using a similar asymptotic orthogonality argument that coherent-state BB84 is insecure for \\emph{any} value of loss. Even if a limit statement is true, this attack is \\emph{a priori} irrelevant as it requires an ind...

  9. A Novel Fast and Secure Mutual Remote User Authentication Protocol with Session Key Agreement Using Second Order Cellular Automata

    Directory of Open Access Journals (Sweden)

    Sofiane Baghor

    2016-06-01

    Full Text Available In this paper, we propose a novel remote user authentication protocol with session key agreement, using the mechanism of one-dimensional second order cellular automata. The scheme use simple and elementary operations to handle the problem of mutual authentication between two communicating parties, and enable the sharing of a common secure session key. Security of the proposed scheme is shown to be high, while it resist most common attacks on authentications schemes. Besides, runtime performances of the authentication protocol are very competitive, and outperform those of existing similar schemes. The proposed schemes ensure the three authentication requirements, namely the mutuality, the authenticity and the key agreement using only elementary and parallelizable operations, without requiring any addition cryptographic functions

  10. Revealing of photon-number splitting attack on quantum key distribution system by photon-number resolving devices

    Science.gov (United States)

    Gaidash, A. A.; Egorov, V. I.; Gleim, A. V.

    2016-08-01

    Quantum cryptography allows distributing secure keys between two users so that any performed eavesdropping attempt would be immediately discovered. However, in practice an eavesdropper can obtain key information from multi-photon states when attenuated laser radiation is used as a source of quantum states. In order to prevent actions of an eavesdropper, it is generally suggested to implement special cryptographic protocols, like decoy states or SARG04. In this paper, we describe an alternative method based on monitoring photon number statistics after detection. We provide a useful rule of thumb to estimate approximate order of difference of expected distribution and distribution in case of attack. Formula for calculating a minimum value of total pulses or time-gaps to resolve attack is shown. Also formulas for actual fraction of raw key known to Eve were derived. This method can therefore be used with any system and even combining with mentioned special protocols.

  11. RFID cryptographic protocol based on two-dimensional region Hash chain%基于二维区间Hash链的RFID安全协议

    Institute of Scientific and Technical Information of China (English)

    熊宛星; 薛开平; 洪佩琳; 麻常莎

    2011-01-01

    Due to the limitation of relevant devices, a lot of security problems exist in a radio frequency identification (RFID) system, one of the core technologies of the future internet of things (IOT). A new protocol based on the two-dimensional region (TDR) Hash chains was proposed after the core ideas of several typical RFID cryptographic protocols were analyzed. TDR could significantly improve the efficiency of database retrieval by identifying each Hash chain with region division. Moreover, a random number was introduced to further enhance the security of RFID systems.%作为未来物联网(IOT)的核心技术之一,无线射频识别(RFID)系统由于设备的局限性而存在许多安全问题.在分析几种典型安全协议核心思想的基础上,提出了基于二维区间(two-dimensional region,TDR) Hash链的安全协议.该协议以区间划分的方式标识各链,从而提高了数据库的检索效率;同时,由于在协议中引入了随机性,RFID系统的安全性得到了进一步增强.

  12. Run-length encoding graphic rules, biochemically editable designs and steganographical numeric data embedment for DNA-based cryptographical coding system.

    Science.gov (United States)

    Kawano, Tomonori

    2013-03-01

    There have been a wide variety of approaches for handling the pieces of DNA as the "unplugged" tools for digital information storage and processing, including a series of studies applied to the security-related area, such as DNA-based digital barcodes, water marks and cryptography. In the present article, novel designs of artificial genes as the media for storing the digitally compressed data for images are proposed for bio-computing purpose while natural genes principally encode for proteins. Furthermore, the proposed system allows cryptographical application of DNA through biochemically editable designs with capacity for steganographical numeric data embedment. As a model case of image-coding DNA technique application, numerically and biochemically combined protocols are employed for ciphering the given "passwords" and/or secret numbers using DNA sequences. The "passwords" of interest were decomposed into single letters and translated into the font image coded on the separate DNA chains with both the coding regions in which the images are encoded based on the novel run-length encoding rule, and the non-coding regions designed for biochemical editing and the remodeling processes revealing the hidden orientation of letters composing the original "passwords." The latter processes require the molecular biological tools for digestion and ligation of the fragmented DNA molecules targeting at the polymerase chain reaction-engineered termini of the chains. Lastly, additional protocols for steganographical overwriting of the numeric data of interests over the image-coding DNA are also discussed.

  13. Reducing Communication Overhead For Authentication Using Self Contained Public Key Management Scheme In MANET

    Directory of Open Access Journals (Sweden)

    Gundala Swathi

    2013-06-01

    Full Text Available In the past few years, we have seen a rapid increase in important application fields of Mobile ad-hoc networks (MANET. Hence, many industrial and academic researchers have been conducted. Because, these applications are closely related to human beings and their physical environment, the usage of MANET on a large scale depends on whether we can provide proper dependability. Particularly, security is the most important issue in MANET because of the limitation in resources. Management of keys is the most necessary activity for providing security for the network. MANETs have resource limitations. Thus using public-key based solutions is not feasible. Thus, we use symmetric key establishment. In this paper, a key management scheme which is self contained and public is represented.This scheme achieves near zero communication overhead while providing security services. Cryptographic keys in small numbers are inputted at all nodes prior to the deployment in network. Mathematical Combinations of pairs of keys, both public and private is used for better utilization of storage space. This means a combination of more than one key pair is utilized by nodes for the encryption and the decryption of messages. A secure communication algorithm for forwarding the packets in MANET is also proposed.

  14. Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems

    Science.gov (United States)

    Yu, Shucheng; Ren, Kui; Lou, Wenjing; Li, Jin

    Key-Policy Attribute-Based Encryption (KP-ABE) is a promising cryptographic primitive which enables fine-grained access control over sensitive data. However, key abuse attacks in KP-ABE may impede its wide application especially in copyright-sensitive systems. To defend against this kind of attacks, this paper proposes a novel KP-ABE scheme which is able to disclose any illegal key distributor’s ID when key abuse is detected. In our scheme, each bit of user ID is defined as an attribute and the user secret key is associated with his unique ID. The tracing algorithm fulfills its task by tricking the pirate device into decrypting the ciphertext associated with the corresponding bits of his ID. Our proposed scheme has the salient property of black box tracing, i.e., it traces back to the illegal key distributor’s ID only by observing the pirate device’s outputs on certain inputs. In addition, it does not require the pirate device’s secret keys to be well-formed as compared to some previous work. Our proposed scheme is provably secure under the Decisional Bilinear Diffie-Hellman (DBDH) assumption and the Decisional Linear (DL) assumption.

  15. 密钥管理系统研究与实现%Research and Implementation of Key Management System

    Institute of Scientific and Technical Information of China (English)

    陈亚东; 张涛; 曾荣; 费稼轩; 华晔; 叶云

    2014-01-01

    Cryptographic technology is one of the core technologies of information security,which is basis of key management. To provide efficient and economic key service,it is of crucial importance to ensure the safety of secret key throughout the process of the whole life cycle includes system initialization,key generation,key encasement,key distribution,key storage,key renovation,key destruction,and to assure the effective and safety management of symmetric key and asymmetric key. Describe the design of key management system from the infrastructure layer to the management layer,the system provides real-time safety monitoring of cryptographic devices,key manage-ment system can be used as an independent with a symmetric key and asymmetric key lifecycle safety management services,also can be extended to be the key provider of CA (Certificate Authority) system.%密码技术是信息安全问题的核心技术之一,密钥管理技术是密码技术的基础,在密钥的产生、存储、分配、更新、吊销、控制、销毁等密钥全生命周期过程中保证密钥的安全,保证对称密钥和非对称密钥的有效和安全管理,并提供高效、经济的密钥服务十分关键。文中从基础设施层到系统的管理层设计了将对称密钥和非对称密钥在整体上统一管理的密钥管理系统,实现了对密码设备的实时安全监控,可以作为一个独立提供对称密钥和非对称密钥全生命周期安全管理服务的密钥管理系统,也可以扩展作为数字证书发布系统的密钥管理系统后台。

  16. Efficient secure-channel free public key encryption with keyword search for EMRs in cloud storage.

    Science.gov (United States)

    Guo, Lifeng; Yau, Wei-Chuen

    2015-02-01

    Searchable encryption is an important cryptographic primitive that enables privacy-preserving keyword search on encrypted electronic medical records (EMRs) in cloud storage. Efficiency of such searchable encryption in a medical cloud storage system is very crucial as it involves client platforms such as smartphones or tablets that only have constrained computing power and resources. In this paper, we propose an efficient secure-channel free public key encryption with keyword search (SCF-PEKS) scheme that is proven secure in the standard model. We show that our SCF-PEKS scheme is not only secure against chosen keyword and ciphertext attacks (IND-SCF-CKCA), but also secure against keyword guessing attacks (IND-KGA). Furthermore, our proposed scheme is more efficient than other recent SCF-PEKS schemes in the literature.

  17. Information Hiding in CSS : A Secure Scheme Text-Steganography using Public Key Cryptosystem

    CERN Document Server

    Kabetta, Herman; Suyoto,

    2012-01-01

    In many recent years, the programming world has been introduced about a new programming language for designing websites, it is CSS that can be be used together with HTML to develop a web interface. And now, these two programming languages as if inseparably from each other. As a client-side scripting, CSS is visible by all users as the original script, but it can not be granted changed. Website is a tool of information disseminator throughout the world, this is certainly can be used to a secret communication by using CSS as a message hider. This paper proposed a new scheme using web tools like CSS for hiding informations. This is a secret communication mechanism using text steganography techniques that is embedded messages on CSS files and is further encrypted using RSA as a public key cryptographic algorithm.

  18. BSK-WBSN: Biometric Symmetric Keys to Secure Wireless Body Sensors Networks

    CERN Document Server

    Mesmoudi, Samira

    2011-01-01

    The Wireless Sensors Network (WSN) is an emergent technology resulting from progress of various fields. Many applications of networks WSN are born. One of the applications which have an operational effectiveness relates to the field of health and allows a medical remote support. Miniature wireless sensors, strategically placed on the human body, create a Wireless Body Sensor Network (WBSN) which allows supervising various essential biological signals (rate of heartbeat, pressure, etc). The sensitivity of medical information requires mechanisms of safety. This performance constitutes a challenge for WBSN because of their limitation in resources energy and data-processing. In this paper we propose a new approach to symmetric cryptographic key establishment, based on biometrics physiology. This approach takes into account WBSN constraints and its topology.

  19. Dynamic Key-Scheduling and Authentication Scheme for Distributed Wireless Network

    Directory of Open Access Journals (Sweden)

    T.Surya Prakash Reddy

    2010-07-01

    Full Text Available A self-protection technique is suggested for adhoc network fall short of the objective of data privacy, data integrity, and authentication. Various security standards such as IEEE 802.11i, WPA, IEEE 802.1X were suggested to enhance the security issues in 802.11.Despite their efficiency, these standards does not provide any security approach for monitoring of these authentication in a distributed architecture. For the efficient monitoring of the authentication issue in adhoc network, in this paper we present a self monitored security approach for self-monitoring of key authentication for security protocol in adhoc networks. The processing overhead for the suggested approach is evaluated for a threshold based cryptographic approach.

  20. 生物特征密码技术综述%A Survey on Biometric Cryptographic Technology

    Institute of Scientific and Technical Information of China (English)

    游林

    2015-01-01

    生物特征密码技术,即融合生物特征识别技术与密码技术的新兴技术,主要体现为基于生物特征识别技术的密钥保护技术与密钥生成技术。生物特征密码技术不仅可以安全保护用户的生物特征信息免遭泄露的风险,更重要的是可以解决各种对象实体的数字身份认证与私密信息的加密保护问题。本文综述了自1996年第一个利用指纹特征的密钥生成方案及2012年经典模糊金库提出以来主要的密钥生成技术研究工作,剖析了这些方案的基本结构及性能优劣,并探讨了生物特征密码技术的未来研究思路。%Biometric cryptography ,a newly emerging technology which fuses biometrics and cryptography , is mainly embodied in biometric-based key protection technology and biometric-based key generation technology . Biometric cryptography can not only be applied to protect the user 's biometric information from the leakage risk, what is more , it can also be applied to realize the digital identity authentication and secret information protection for various entities .In this paper , a comprehensive survey is presented on the key generation schemes since the first one proposed in 1996 and the fuzzy vaults since the classic version given in 2012 , their basic structures and their merit performances are analyzed , and the future approaches for biometric cryptography are explored .

  1. Key exchange using biometric identity based encryption for sharing encrypted data in cloud environment

    Science.gov (United States)

    Hassan, Waleed K.; Al-Assam, Hisham

    2017-05-01

    The main problem associated with using symmetric/ asymmetric keys is how to securely store and exchange the keys between the parties over open networks particularly in the open environment such as cloud computing. Public Key Infrastructure (PKI) have been providing a practical solution for session key exchange for loads of web services. The key limitation of PKI solution is not only the need for a trusted third partly (e.g. certificate authority) but also the absent link between data owner and the encryption keys. The latter is arguably more important where accessing data needs to be linked with identify of the owner. Currently available key exchange protocols depend on using trusted couriers or secure channels, which can be subject to man-in-the-middle attack and various other attacks. This paper proposes a new protocol for Key Exchange using Biometric Identity Based Encryption (KE-BIBE) that enables parties to securely exchange cryptographic keys even an adversary is monitoring the communication channel between the parties. The proposed protocol combines biometrics with IBE in order to provide a secure way to access symmetric keys based on the identity of the users in unsecure environment. In the KE-BIOBE protocol, the message is first encrypted by the data owner using a traditional symmetric key before migrating it to a cloud storage. The symmetric key is then encrypted using public biometrics of the users selected by data owner to decrypt the message based on Fuzzy Identity-Based Encryption. Only the selected users will be able to decrypt the message by providing a fresh sample of their biometric data. The paper argues that the proposed solution eliminates the needs for a key distribution centre in traditional cryptography. It will also give data owner the power of finegrained sharing of encrypted data by control who can access their data.

  2. Understanding security failures of two authentication and key agreement schemes for telecare medicine information systems.

    Science.gov (United States)

    Mishra, Dheerendra

    2015-03-01

    Smart card based authentication and key agreement schemes for telecare medicine information systems (TMIS) enable doctors, nurses, patients and health visitors to use smart cards for secure login to medical information systems. In recent years, several authentication and key agreement schemes have been proposed to present secure and efficient solution for TMIS. Most of the existing authentication schemes for TMIS have either higher computation overhead or are vulnerable to attacks. To reduce the computational overhead and enhance the security, Lee recently proposed an authentication and key agreement scheme using chaotic maps for TMIS. Xu et al. also proposed a password based authentication and key agreement scheme for TMIS using elliptic curve cryptography. Both the schemes provide better efficiency from the conventional public key cryptography based schemes. These schemes are important as they present an efficient solution for TMIS. We analyze the security of both Lee's scheme and Xu et al.'s schemes. Unfortunately, we identify that both the schemes are vulnerable to denial of service attack. To understand the security failures of these cryptographic schemes which are the key of patching existing schemes and designing future schemes, we demonstrate the security loopholes of Lee's scheme and Xu et al.'s scheme in this paper.

  3. 大厚度材料磨料水射流切割工艺及关键技术%Abrasive Water Jet Cutting Process and Key Technology of Big-thickness Materials

    Institute of Scientific and Technical Information of China (English)

    李连荣; 王晓燕; 许栋刚

    2012-01-01

    water-jet cutting process with its unique cold and soft processing characteristics, and more unique advantages compared to other cutting process according to all kinds of thermal and hard brittle materials has good prospects for future development. But because of its own flexible jet characteristics, especially in cutting big thickness materials, it exists the quality insufficient obvious such as slope, corrugated, cross section lag, cut back sewing. That becomes the marketing bottlenecks restricted technology. In this paper, from the abrasive water jet cutting process principle mechanism and technology advantages, based on the points out its defects and cutting process effect factors affecting process, the specific key technology was proposed. It has positive practical significance to expand the application fields.%磨料水射流切割工艺以其独特的“冷、软”加工特性,与其他切割工艺相比,对各类热敏、硬脆等难加工材料的切割更有独特优势,具有良好的发展前景.但因射流自身的“柔性”特征,尤其在切割大厚度材料时存在断面明显坡度、波纹、滞后、切缝、回击等质量不足,成为制约该技术应用市场推广的瓶颈.本文从磨料水射流切割工艺原理和工艺优势出发,在指出其工艺缺陷和切割效果工艺影响因素的基础上,提出针对性的关键技术,对拓展该技术的应用领域具有积极的现实意义.

  4. Synthesis, characterization and thermolysis studies on 3,7-dinitro-1,3,5,7-tetraazabicyclo[3,3,1]nonane (DPT): A key precursor in the synthesis of most powerful benchmark energetic materials (RDX/HMX) of today.

    Science.gov (United States)

    Radhakrishnan, S; Talawar, M B; Venugopalan, S; Narasimhan, V L

    2008-04-15

    This paper reports studies undertaken on 3,7-dinitro-1,3,5,7-tetraazabicyclo[3,3,1]nonane (DPT). The synthesis of DPT was carried out by the nitration of hexamine based on the lines of reported method with minor modification. DPT was characterized by elemental analysis, scanning electron microscopy (SEM), Fourier transform infrared (FTIR) and (1)H nuclear magnetic resonance (NMR) techniques. Thermal stability of DPT was studied using thermogravimetry (TG) and differential scanning calorimetry (DSC). The thermal analysis studies revealed that DPT undergoes decomposition at 211 degrees C. Decomposition of DPT using TG-FTIR indicated the evolution of carbon dioxide, water and oxides of nitrogen as main gaseous products. The electrochemical behavior of DPT was studied using cyclic voltammetric (CV) studies. The experimentally determined sensitivity parameters indicated the insensitive nature of DPT towards external stimuli. The performance parameters of DPT, RDX and HMX have been computed using Linear Output Thermodynamic User Friendly Software for Energetic Systems (LOTUSES) code. The predicted properties of DPT are interesting and important from the point of process technology and/or safety. The work reported in this paper enriches the existing scanty research and development data on one of the key precursor used for synthesis of important high energy materials (HEMs).

  5. Linux用户空间加/解密API的设计与实现%DESIGN AND IMPLEMENTATION OF LINUX USER-SPACE CRYPTOGRAPHIC API

    Institute of Scientific and Technical Information of China (English)

    李石磊; 闫宏印

    2013-01-01

    Development of the unified Crypto API interface for user-space applications is one of future design goals for Linux kernel developers. In this paper, by taking IPsec VPN gateway agent system as the application model, and using Linux system call interception and loadable kernel module technique, we study the development process and designing method of the system call-based user-space cryptographic API. Meanwhile, by comparison with the Netlink-based API, it is found that this API interface is more flexibility in design and can be customised as well. Taking the application model as the background, this API interface is tested its performance of practical use. Result shows that the use of this system call-based API can improve overall system operation performance and the system stability.%开发标准的用户空间Crypto API接口是Linux内核开发者未来开发目标之一.以IPsec VPN网关代理系统为应用模型,使用动态模块加载机制和系统调用劫持技术,对基于系统调用的用户空间加/解密API的开发流程和设计方法进行研究.通过与基于Netlink用户空间加/解密API进行对比,展示了该API接口的设计灵活性和可定制性.并以应用模型为背景,对该API接口的实际使用性能进行测试.结果表明,使用该API接口,可以提高系统的整体运行效率,也可以提高系统的稳定性.

  6. Group key management

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.; Cao, C.

    1997-08-01

    This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

  7. Quantum Encoder and Decoder for Secret Key Distribution with Check Bits

    Directory of Open Access Journals (Sweden)

    T. Godhavari

    2013-12-01

    Full Text Available The focus of this study is to develop a novel method of encoding the qubits and use as secret key in public key cryptography. In BB 84 protocol, 50% of the random number (generated at source is used as secret key and the remaining bits are used as “check bits”. The check bits are used to detect the presence of eve as well as the nature of quantum channels. In this protocol, random qubits are encoded using different type of polarizations like horizontal, veritical and diagonal. In the proposed quantum encoder, basic quantum gates are used to encode the random secret key along with the check bits. Quantum key distribution, (a cryptographic mechanism relies on the inherent randomness of quantum mechanics and serves as an option to replace techniques made vulnerable by quantum computing. However, it is still subject to clever forms of eavesdropping and poses a significant challenge to implementation. To study the challenges, quantum circuits are first simulated using QCAD.

  8. Quantum Key Distribution

    Science.gov (United States)

    Seshu, Ch.

    Quantum Key Distribution (QKD) uses Quantum Mechanics to guarantee secure communication. It enables two parties to produce a shared random bit string known only to them, which can be used as a key to encrypt and decrypt messages.

  9. Public Key Cryptography.

    Science.gov (United States)

    Tapson, Frank

    1996-01-01

    Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)

  10. Key Management Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides a secure environment to research and develop advanced electronic key management and networked key distribution technologies for the Navy and DoD....

  11. Quantum dense key distribution

    CERN Document Server

    Degiovanni, I P; Castelletto, S; Rastello, M L; Bovino, F A; Colla, A M; Castagnoli, G C

    2004-01-01

    This paper proposes a new protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than BB84 one. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.

  12. LOCKS AND KEYS SERVICE

    CERN Multimedia

    Locks and Keys Service

    2002-01-01

    The Locks and Keys service (ST/FM) will move from building 55 to building 570 from the 2nd August to the 9th August 2002 included. During this period the service will be closed. Only in case of extreme urgency please call the 164550. Starting from Monday, 12th August, the Locks and Keys Service will continue to follow the activities related to office keys (keys and locks) and will provide the keys for furniture. The service is open from 8h30 to 12h00 and from 13h00 to 17h30. We remind you that your divisional correspondents can help you in the execution of the procedures. We thank you for your comprehension and we remain at your service to help you in solving all the matters related to keys for offices and furniture. Locks and Keys Service - ST Division - FM Group

  13. 低阶煤高值转化制备基础化工原料关键技术及应用%Key technologies and application of producing basic chemical materials from low-rank coal

    Institute of Scientific and Technical Information of China (English)

    任其龙

    2016-01-01

    The production of basic chemical materials including calcium carbide and acetylene is an important approach to realizing the value-added conversion of low-rank coal. However,current production technologies usually suffer from many problems including severe pollution,large energy consumption and high cost. This project is intended to reveal the basic science in the processes of mass transfer and chemical conversion under the extreme conditions in an electric field-coupling reaction system,and give deep understanding of the principles of process control,scaling-up and energy recovery. Then,many key technologies in the production are expected to be greatly improved,including the technology of industrializing the rotating arc plasma torch, the power supply with large current for hydrogen plasma and the arc starting at low voltage,the design of long-life electrode and the ablative compensation technology,the low-cost molding of powdery raw materials and the high-temperature transportation of materials. Based on these achievements,a highly efficient, energy-saving and low-cost process for the production of calcium carbide and acetylene from low-rank coal will be developed,and a 5000t/a demonstration plant of producing acetylene from coal by plasma pyrolysis and a 800000t/a industrial plant of the regenerative production of calcium carbide will be established.%制备电石、乙炔等基础化工原料是实现低阶煤高值转化的重要技术途径,现有技术普遍存在高污染、高能耗、高成本等问题。本文介绍了国家重点研发计划项目(2016YFB0301800)拟通过揭示低阶煤在电场耦合反应体系极端条件下物质传递与转化的科学规律,深入认识反应过程调控、放大和能量回收原理,突破旋转弧等离子炬工程化技术、大电流氢等离子体电源与低电压启弧技术、长寿命电极设计及烧蚀补偿技术、低成本粉状原料成型及高温固体物料输送技术等关键技术

  14. Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks

    Science.gov (United States)

    Lederer, Christian; Mader, Roland; Koschuch, Manuel; Großschädl, Johann; Szekely, Alexander; Tillich, Stefan

    Wireless Sensor Networks (WSNs) are playing a vital role in an ever-growing number of applications ranging from environmental surveillance over medical monitoring to home automation. Since WSNs are often deployed in unattended or even hostile environments, they can be subject to various malicious attacks, including the manipulation and capture of nodes. The establishment of a shared secret key between two or more individual nodes is one of the most important security services needed to guarantee the proper functioning of a sensor network. Despite some recent advances in this field, the efficient implementation of cryptographic key establishment for WSNs remains a challenge due to the resource constraints of small sensor nodes such as the MICAz mote. In this paper we present a lightweight implementation of the elliptic curve Diffie-Hellman (ECDH) key exchange for ZigBee-compliant sensor nodes equipped with an ATmega128 processor running the TinyOS operating system. Our implementation uses a 192-bit prime field specified by the NIST as underlying algebraic structure and requires only 5.20 ·106 clock cycles to compute a scalar multiplication if the base point is fixed and known a priori. A scalar multiplication using a random base point takes about 12.33 ·106 cycles. Our results show that a full ECDH key exchange between two MICAz motes consumes an energy of 57.33 mJ (including radio communication), which is significantly better than most previously reported ECDH implementations on comparable platforms.

  15. Key Account Management

    OpenAIRE

    Dvořák, Dalibor

    2007-01-01

    This note tries to explain concept of key account management (KAM), factors leading to importance of this emerging concept, criteria to determine key accounts from customer base, benefits to both buyers and sellers agreeing to practice it, stages of KAM relationship, conditions under which power lies with buyer or seller, outlines risks faced by both the parties, key success factors, challenges faced in implementing this concept and relevance to infrastructure sector.

  16. Symbolic Analysis of Cryptographic Protocols

    DEFF Research Database (Denmark)

    Dahl, Morten

    Compos- able framework by Canetti for specifying and analysing protocols, and show that our model is sound with respect to its standard computational interpretation. Our model supports powerful primitives such as homomorphic encryption and non-interactive zero-knowledge proofs, which we show may be used...

  17. Mechanical Verification of Cryptographic Protocols

    Science.gov (United States)

    Cheng, Xiaochun; Ma, Xiaoqi; Huang, Scott C.-H.; Cheng, Maggie

    Information security is playing an increasingly important role in modern society, driven especially by the uptake of the Internet for information transfer. Large amount of information is transmitted everyday through the Internet, which is often the target of malicious attacks. In certain areas, this issue is vital. For example, military departments of governments often transmit a great amount of top-secret data, which, if divulged, could become a huge threat to the public and to national security. Even in our daily life, it is also necessary to protect information. Consider e-commerce systems as an example. No one is willing to purchase anything over the Internet before being assured that all their personal and financial information will always be kept secure and will never be leaked to any unauthorised person or organisation.

  18. Petri Nets in Cryptographic Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Winskel, Glynn

    2001-01-01

    A process language for security protocols is presented together with a semantics in terms of sets of events. The denotation of process is a set of events, and as each event specifies a set of pre and postconditions, this denotation can be viewed as a Petri net. By means of an example we illustrat...

  19. Modal Logics for Cryptographic Processes

    DEFF Research Database (Denmark)

    Frendrup, U.; Huttel, Hans; Jensen, N. J.

    2002-01-01

    We present three modal logics for the spi-calculus and show that they capture strong versions of the environment sensitive bisimulation introduced by Boreale et al. Our logics differ from conventional modal logics for process calculi in that they allow us to describe the knowledge of an attacker ...

  20. Cryptographic Analysis in Cubic Time

    DEFF Research Database (Denmark)

    Nielson, Flemming; Nielson, Hanne Riis; Seidl, H.

    2004-01-01

    The spi-calculus is a variant of the polyadic pi-calculus that admits symmetric cryptography and that admits expressing communication protocols in a precise though still abstract way. This paper shows that context-independent control flow analysis can be calculated in cubic time despite the fact ...

  1. SMART AS A CRYPTOGRAPHIC PROCESSOR

    Directory of Open Access Journals (Sweden)

    Saroja Kanchi

    2016-05-01

    Full Text Available SMaRT is a 16-bit 2.5-address RISC-type single-cycle processor, which was recently designed and successfully mapped into a FPGA chip in our ECE department. In this paper, we use SMaRT to run the well-known encryption algorithm, Data Encryption Standard. For information security purposes, encryption is a must in today’s sophisticated and ever-increasing computer communications such as ATM machines and SIM cards. For comparison and evaluation purposes, we also map the same algorithm on the HC12, a same-size but CISC-type off-the-shelf microcontroller, Our results show that compared to HC12, SMaRT code is only 14% longer in terms of the static number of instructions but about 10 times faster in terms of the number of clock cycles, and 7% smaller in terms of code size. Our results also show that 2.5- address instructions, a SMaRT selling point, amount to 45% of the whole R-type instructions resulting in significant improvement in static number of instructions hence code size as well as performance. Additionally, we see that the SMaRT short-branch range is sufficiently wide in 90% of cases in the SMaRT code. Our results also reveal that the SMaRT novel concept of locality of reference in using the MSBs of the registers in non-subroutine branch instructions stays valid with a remarkable hit rate of 95%!

  2. Financial Key Ratios

    Directory of Open Access Journals (Sweden)

    Tănase Alin-Eliodor

    2014-08-01

    Full Text Available This article focuses on computing techniques starting from trial balance data regarding financial key ratios. There are presented activity, liquidity, solvency and profitability financial key ratios. It is presented a computing methodology in three steps based on a trial balance.

  3. Experimental quantum key distribution with simulated ground-to-satellite photon losses and processing limitations

    Science.gov (United States)

    Bourgoin, Jean-Philippe; Gigov, Nikolay; Higgins, Brendon L.; Yan, Zhizhong; Meyer-Scott, Evan; Khandani, Amir K.; Lütkenhaus, Norbert; Jennewein, Thomas

    2015-11-01

    Quantum key distribution (QKD) has the potential to improve communications security by offering cryptographic keys whose security relies on the fundamental properties of quantum physics. The use of a trusted quantum receiver on an orbiting satellite is the most practical near-term solution to the challenge of achieving long-distance (global-scale) QKD, currently limited to a few hundred kilometers on the ground. This scenario presents unique challenges, such as high photon losses and restricted classical data transmission and processing power due to the limitations of a typical satellite platform. Here we demonstrate the feasibility of such a system by implementing a QKD protocol, with optical transmission and full post-processing, in the high-loss regime using minimized computing hardware at the receiver. Employing weak coherent pulses with decoy states, we demonstrate the production of secure key bits at up to 56.5 dB of photon loss. We further illustrate the feasibility of a satellite uplink by generating a secure key while experimentally emulating the varying losses predicted for realistic low-Earth-orbit satellite passes at 600 km altitude. With a 76 MHz source and including finite-size analysis, we extract 3374 bits of a secure key from the best pass. We also illustrate the potential benefit of combining multiple passes together: while one suboptimal "upper-quartile" pass produces no finite-sized key with our source, the combination of three such passes allows us to extract 165 bits of a secure key. Alternatively, we find that by increasing the signal rate to 300 MHz it would be possible to extract 21 570 bits of a secure finite-sized key in just a single upper-quartile pass.

  4. 基于CA伪随机指纹特征密钥认证的PKI技术与实现%Technology and Implementation of PKI in Cryptographic Key Authentication of CA-based Pseudo-random Fingerprint

    Institute of Scientific and Technical Information of China (English)

    华龙

    2012-01-01

    文章将简要介绍指纹密码PKI技术的概念。并从PKI的技术原理、特点等方面着手,详细介绍基于CA指纹特征认证的PKI系统的技术要点,同时结合案例,从实例中分析其配置和实现经验。%This article makes a brief introduction of the concept of PKI technology of fingerprint password.Then it presents in detail PKI system techniques based on CA fingerprint authentication from its principles and features,and analyzes the configuration and implementation experience combined with case.

  5. Two-round contributory group key exchange protocol for wireless network environments

    Directory of Open Access Journals (Sweden)

    Wu Tsu-Yang

    2011-01-01

    Full Text Available Abstract With the popularity of group-oriented applications, secure group communication has recently received much attention from cryptographic researchers. A group key exchange (GKE protocol allows that participants cooperatively establish a group key that is used to encrypt and decrypt transmitted messages. Hence, GKE protocols can be used to provide secure group communication over a public network channel. However, most of the previously proposed GKE protocols deployed in wired networks are not fully suitable for wireless network environments with low-power computing devices. Subsequently, several GKE protocols suitable for mobile or wireless networks have been proposed. In this article, we will propose a more efficient group key exchange protocol with dynamic joining and leaving. Under the decision Diffie-Hellman (DDH, the computation Diffie-Hellman (CDH, and the hash function assumptions, we demonstrate that the proposed protocol is secure against passive attack and provides forward/backward secrecy for dynamic member joining/leaving. As compared with the recently proposed GKE protocols, our protocol provides better performance in terms of computational cost, round number, and communication cost.

  6. An Efficient Key-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length

    Directory of Open Access Journals (Sweden)

    Changji Wang

    2013-01-01

    Full Text Available There is an acceleration of adoption of cloud computing among enterprises. However, moving the infrastructure and sensitive data from trusted domain of the data owner to public cloud will pose severe security and privacy risks. Attribute-based encryption (ABE is a new cryptographic primitive which provides a promising tool for addressing the problem of secure and fine-grained data sharing and decentralized access control. Key-policy attribute-based encryption (KP-ABE is an important type of ABE, which enables senders to encrypt messages under a set of attributes and private keys are associated with access structures that specify which ciphertexts the key holder will be allowed to decrypt. In most existing KP-ABE scheme, the ciphertext size grows linearly with the number of attributes embedded in ciphertext. In this paper, we propose a new KP-ABE construction with constant ciphertext size. In our construction, the access policy can be expressed as any monotone access structure. Meanwhile, the ciphertext size is independent of the number of ciphertext attributes, and the number of bilinear pairing evaluations is reduced to a constant. We prove that our scheme is semantically secure in the selective-set model based on the general Diffie-Hellman exponent assumption.

  7. PKDIP: Efficient Public-Key-Based Data Integrity Protection for Wireless Image Sensors

    Directory of Open Access Journals (Sweden)

    Changsheng Wan

    2015-01-01

    Full Text Available Due to limited energy of “wireless image sensors (WISs,” existing data integrity protection mechanisms typically employ a hash-function-based signing algorithm to generate “message authentication codes (MACs” for long image frames. However, hash-function-based signing algorithm requires the WIS and the “end user (EU” sharing a secret, which leads to a new security issue: Once the EU becomes malicious due to some reasons, it will be able to forge the WIS’s data since it holds the shared secret. Therefore, public-key cryptography is desirable. Unfortunately, public-key cryptographic operations are quite time-consuming for energy-restrained WISs. Facing this dilemma, we present a novel data integrity protection protocol named PKDIP in this paper. Similar to the mechanisms of this field, PKDIP generates MACs for data integrity protection. However, different from other well-known approaches, PKDIP introduces the “Montgomery Modular Multiplication (MontMM” technique to current public-key-based signing algorithms. Since MontMM is much more efficient than hash functions, PKDIP can reduce the signing cost significantly. Experimental results show PKDIP can even be more efficient than hash-function-based schemes.

  8. Key Technology of Advanced Composite Materials from Aircraft to Automobile%先进复合材料从飞机转向汽车应用的关键技术

    Institute of Scientific and Technical Information of China (English)

    张靠民; 李敏; 顾轶卓; 张佐光

    2013-01-01

    Lightweight is a critical approach for sustainable development of auto industry .Advanced composite materials ( ACM) , especially carbon fiber reinforced plastics ( CFRP) , supply the most feasible way due to the lightweight and high strength characteristics.Although there has been forty years since the application of ACM in aviation industry , character-istics of auto industry obviously differ from aviation industry , the most prominent of which is the higher requirement on production efficiency.Taking consideration of the features of ACM in combination with the important requirements of auto industry, the related research plans of developed country and the latest typical applications of ACM in automobile structure were introduced first.On the basis of this, key technologies which block potential application development of ACM in auto industry including integration design and manufacture of composite , low cost carbon fiber, efficient processing and recy-cling issues are discussed, it will be our best wishes if the paper is helpful to develop advanced technology of composite suited auto industry .%轻量化是汽车工业实现可持续发展的重要途径,先进复合材料( Advanced Composite Mate-rials, ACM)特别是碳纤维增强聚合物基复合材料具有质轻高强的性能特点,是最为重要的轻量化材料之一。 ACM在航空工业已有四十年的技术和应用积累,但汽车工业的产业特点明显不同于航空,其中最突出的就是对成本和生产效率的要求更高。因此,将 ACM的技术特点与汽车工业的重要需求相结合,本文首先介绍了碳纤维复合材料用于汽车结构的最新应用进展,列举了发达国家的相关研发计划。在此基础上,从复合材料设计制造一体化、低成本碳纤维、复合材料高效制造和材料循环利用等四个方面讨论了制约汽车用 ACM规模化应用的关键技术。以期为研究发展适合我国汽车工业的

  9. Key Materials and Micro-Stack Systems of Single Chamber Solid Oxide Fuel Cells%单气室固体氧化物燃料电池关键材料与微堆系统

    Institute of Scientific and Technical Information of China (English)

    吕喆; 魏波; 田彦婷; 王志红; 苏文辉

    2011-01-01

    单气室固体氧化物燃料电池(SC-SOFC)是一种与传统的双气室结构燃料电池不同的新型燃料电池.SC-SOFC的阴极和阳极都暴露在单一气室中,在工作时通入含有燃料和氧化剂的混合气体,利用阳极和阴极的选择催化作用实现发电.SC-SOFC具有结构简单、无需密封、易于进行堆叠等很多独特的优点.本文介绍了SC-SOFC近期的研究进展,内容包括工作原理的介绍、SC-SOFC的关键材料选择与研究现状、影响SC-SOFC运行的主要因素的讨论,以及微堆(电池组)系统结构设计和试验等.着重介绍了本课题组在SC-SOFC的研究工作,包括对复合阴极材料、Ni修饰氧化物阳极的研究,以及星型和阵列式等多种新型SC-SOFC微堆结构设计与实验等.最后,基于对其优缺点的分析,展望了SC-SOFC各种潜在的应用.%Single chamber solid oxide fuel cell (SC-SOFC) is different from the conventional solid oxide fuel cell with dual gas chamber structure.Both cathode and anode of SC-SOFC are exposed to the only one gas chamber.Mixed gas containing fuel and oxidant is fed during operation and it can generate electric energy by the selectively catalytic activities of cathode and anode.SC-SOFC has many particular advatages, such as more simple structure, eliminating the need for sealing and easy stacking etc.In this paper, the recent research advances of SC-SOFC are reviewed, including brief introduction of operational principle of SC-SOFC, the selection of key materials for SC-SOFC, the discussion of main influencing factors on SC-SOFC, as well as the design and test of micro-stack (battery) system.The investigation results on SC-SOFC of our research group are highlighted, including composite cathode, oxide anode with Ni modification, and some novel designs for SC-SOFC micro stacks, such as star-type and array-type stacks, and so on.Finally, an outlook about the potential applications of SC-SOFC is given according to the analysis of

  10. An Alternative to Keys

    Science.gov (United States)

    O'Hagan, James

    1977-01-01

    For the secondary school, the author discourages the use of dichotomous keys in favor of a punch-card system. The system is readily constructed by students for use in plant and animal classification. (CP)

  11. Keys to the City

    DEFF Research Database (Denmark)

    Monsson, Christian Kjær

    2014-01-01

    Review of: Keys to the City: How Economics, Institutions, Social Interaction, and Politics Shape Development / Michael Storper Princeton University Press, Princeton, NJ, 2013, 288 pp., $39.95/£27.95 (cloth), ISBN 9780691143118......Review of: Keys to the City: How Economics, Institutions, Social Interaction, and Politics Shape Development / Michael Storper Princeton University Press, Princeton, NJ, 2013, 288 pp., $39.95/£27.95 (cloth), ISBN 9780691143118...

  12. Key concepts in energy

    CERN Document Server

    Madureira, Nuno Luis

    2014-01-01

    Highlights how key energy concepts surfaced, tracing their evolution throughout history to encompasses four economic concepts and four technological-engineering concepts developed through their history to conclude with current economic and environmental sciences Considers the process of energy-substitutions through complementary usages, hybridization and technological mixes Combines a conceptual approach with key theoretical concepts from engineering, geological and economic sciences providing cross disciplinary overview of energy fundamentals in a short and focused reading

  13. Secret Key Crypto Implementations

    Science.gov (United States)

    Bertoni, Guido Marco; Melzani, Filippo

    This chapter presents the algorithm selected in 2001 as the Advanced Encryption Standard. This algorithm is the base for implementing security and privacy based on symmetric key solutions in almost all new applications. Secret key algorithms are used in combination with modes of operation to provide different security properties. The most used modes of operation are presented in this chapter. Finally an overview of the different techniques of software and hardware implementations is given.

  14. 甜高粱生产生物燃料关键因素分析%Analysis on key factors of sweet sorghum as raw material for bio-fuel production

    Institute of Scientific and Technical Information of China (English)

    杜瑞恒; 李素英; 吕芃; 刘国庆; 籍贵苏; 侯升林; 马雪; 王建平; 杨娜

    2012-01-01

    针对以甜高粱为原料生产生物燃料中存在的原料不足、产品成本高等问题,根据近10年甜高粱育种与栽培研究成果以及与企业的合作经验,对影响上述问题的主要因素如品种、种植区域、技术、政策等进行分析。结果表明:甜高粱虽有较好的品种,但不能满足所有地区以甜高粱秆为原料生产燃料产业持续发展的需要,这是造成原料基地不足的首要原因。我国的边际土地面积巨大、类型众多,不都完全适合种植甜高粱来生产燃料乙醇,选择种植区域不当是甜高粱种植不足的第2个原因。在甜高粱高产种植、加工技术方面,重视了高产栽培、发酵技术等核心技术的研究,忽略了配套技术研究,这是造成生产成本高的主要原因。国家虽然制定了相关产业政策,但不足以引导生物质能产业健康持续发展。在今后发展以甜高粱为原料生产生物燃料过程中,首先需注意甜高粱品种的多元化,要特别注意选育早熟、高产、高含糖量品种、杂交种;其次根据区域气候特点,选择适宜地区不仅适合种植甜高粱,更要适合甜高粱的储藏和加工;同时研究甜高粱机械化收储运、甜高粱秆连续发酵、糟渣利用等配套技术研究,构建完整的产业链;制定中小规模生物质能产业持续发展的政策法规和生物能源研发的国家持续投入机制,保障生物质能产业稳步发展。%In addition to the problems of the shortage of raw material and high costs in bio-fuel production using sweet sorghum.The reasons which bringing on the above-mentioned problems are analyzed based on the achievement in sweet sorghum breeding,cultivation and industrial cooperation during the last decade.The key factors include the cultivar of sweet sorghum,planting areas,technology and the government policy.Although some sweet sorghum cultivars are better,these cultivars could not provide a sustainable supply to

  15. Keys through ARQ

    CERN Document Server

    Latif, Mohamed Abdel; Gamal, Hesham El

    2009-01-01

    This paper develops a novel framework for sharing secret keys using the well-known Automatic Repeat reQuest (ARQ) protocol. The proposed key sharing protocol does not assume any prior knowledge about the channel state information (CSI), but, harnesses the available opportunistic secrecy gains using only the one bit feedback, in the form of ACK/NACK. The distribution of key bits among multiple ARQ epochs, in our approach, allows for mitigating the secrecy outage phenomenon observed in earlier works. We characterize the information theoretic limits of the proposed scheme, under different assumptions on the channel spatial and temporal correlation function, and develop low complexity explicit implementations. Our analysis reveals a novel role of "dumb antennas" in overcoming the negative impact of spatial correlation, between the legitimate and eavesdropper channels, on the achievable secrecy rates. We further develop an adaptive rate allocation policy which achieves higher secrecy rates by exploiting the channe...

  16. An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments

    Directory of Open Access Journals (Sweden)

    S.K. Hafizul Islam

    2017-07-01

    Full Text Available In the literature, many three-party authenticated key exchange (3PAKE protocols are put forwarded to established a secure session key between two users with the help of trusted server. The computed session key will ensure secure message exchange between the users over any insecure communication networks. In this paper, we identified some deficiencies in Tan’s 3PAKE protocol and then devised an improved 3PAKE protocol without symmetric key en/decryption technique for mobile-commerce environments. The proposed protocol is based on the elliptic curve cryptography and one-way cryptographic hash function. In order to prove security validation of the proposed 3PAKE protocol we have used widely accepted AVISPA software whose results confirm that the proposed protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The proposed protocol is not only secure in the AVISPA software, but it also secure against relevant numerous security attacks such as man-in-the-middle attack, impersonation attack, parallel attack, key-compromise impersonation attack, etc. In addition, our protocol is designed with lower computation cost than other relevant protocols. Therefore, the proposed protocol is more efficient and suitable for practical use than other protocols in mobile-commerce environments.

  17. Precision Cryptographic Calculation of the Observed Values of the Cosmological Constants {\\Omega}{\\Lambda} and {\\Omega}m as a Manifestation of the Higgs State in the Extension Field

    CERN Document Server

    Rhodes, Charles

    2010-01-01

    The Higgs concept can be assigned a precise quantitative cosmic identity with a physically anchored cryptographic analysis. Specifically demonstrated is the direct correspondence of the supersymmetric solution pair (BHh1 and BHh2) of the Higgs Congruence in the extension field to the observed magnitudes of the cosmological constants and . These results are in perfect agreement with the maximally preferred magnitudes of these quantities as experimentally determined (0.712 < {\\Omega}{\\Lambda}< 0.758 and 0.242 < {\\Omega}m< 0.308) by the concordance of measured ranges. The corresponding theoretical values found also satisfy exactly the condition for perfect flatness, an outcome that is legislated by the concept of supersymmetry in . Since previous work has established that the fine-structure constant {\\alpha} can be uniquely computed in the corresponding physically defined prime field , in sharp accord with the best high-precision measurement (~370 ppt) of {\\alpha}, the computation of and with the ide...

  18. Key World Energy Statistics

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2010-07-01

    The IEA produced its first handy, pocket-sized summary of key energy data in 1997. This new edition responds to the enormously positive reaction to the book since then. Key World Energy Statistics produced by the IEA contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts. It exists in different formats to suit our readers' requirements.

  19. A Polynomial Subset-Based Efficient Multi-Party Key Management System for Lightweight Device Networks.

    Science.gov (United States)

    Mahmood, Zahid; Ning, Huansheng; Ghafoor, AtaUllah

    2017-03-24

    Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure.

  20. Locks and Keys Service

    CERN Multimedia

    Claude Ducastel

    The GS-LS-SEM section is pleased to inform you that as from Monday 30 November 2009, the opening hours of the Locks and Keys service will be the following: 08h30 - 12h30 / 13h30 - 16:30, Mondays to Fridays. GS-SEM-LS 73333

  1. Keyed shear joints

    DEFF Research Database (Denmark)

    Hansen, Klaus

    This report gives a summary of the present information on the behaviour of vertical keyed shear joints in large panel structures. An attemp is made to outline the implications which this information might have on the analysis and design of a complete wall. The publications also gives a short...

  2. Key performance indicators

    NARCIS (Netherlands)

    Zwetsloot, G.I.J.M.

    2014-01-01

    This paper addresses how organisations can use OSH performance indicators. This is an important way to mainstream OSH into business management. Key performance indicators (KPIs) should provide objective data on the OSH situation. It is often said that ‘what gets measured gets managed’. Without

  3. Key performance indicators

    NARCIS (Netherlands)

    Zwetsloot, G.I.J.M.

    2014-01-01

    This paper addresses how organisations can use OSH performance indicators. This is an important way to mainstream OSH into business management. Key performance indicators (KPIs) should provide objective data on the OSH situation. It is often said that ‘what gets measured gets managed’. Without infor

  4. Public-Key Encryption with Non-interactive Opening

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Hofheinz, Dennis; Kiltz, Eike

    2008-01-01

    in cryptographic protocol design, e.g., when the receiver wants to demonstrate that some information he was sent privately was not correctly formed. We give a definition based on the UC framework as well as an equivalent game-based definition. The PKENO concept was informally introduced by Damgård and Thorbek who...

  5. Physician Appraisals: Key Challenges

    Directory of Open Access Journals (Sweden)

    Klich Jacek

    2017-06-01

    Full Text Available The main purpose of the article is to identify key criteria being used for physician appraisals and to find how communication skills of physicians are valued in those appraisals. ScienceDirect and EBSCOhost databases were used for this search. The results show that a physician appraisal is underestimated both theoretically and empirically. The particular gap exists with respect to the communication skills of physicians, which are rarely present in medical training syllabi and physician assessments. The article contributes to the theoretical discourse on physician appraisals and points out at the inconsistency between the high status of physicians as a key hospital resource on the one hand and, on the other hand, at inadequate and poorly researched assessment of their performance with a special emphasis on communication skills. The article may inspire health managers to develop and implement up-to-date assessment forms for physicians and good managerial practices in this respect in hospitals and other health care units.

  6. Efficient Quantum Key Distribution

    CERN Document Server

    Ardehali, M; Chau, H F; Lo, H K

    1998-01-01

    We devise a simple modification that essentially doubles the efficiency of a well-known quantum key distribution scheme proposed by Bennett and Brassard (BB84). Our scheme assigns significantly different probabilities for the different polarization bases during both transmission and reception to reduce the fraction of discarded data. The actual probabilities used in the scheme are announced in public. As the number of transmitted signals increases, the efficiency of our scheme can be made to approach 100%. The security of our scheme (against single-photon eavesdropping strategies) is guaranteed by a refined analysis of accepted data which is employed to detect eavesdropping: Instead of lumping all the accepted data together to estimate a single error rate, we separate the accepted data into various subsets according to the basis employed and estimate an error rate for each subset individually. Our scheme is the first quantum key distribution with an efficiency greater than 50%. We remark that our idea is rath...

  7. Ancel Keys: a tribute

    Directory of Open Access Journals (Sweden)

    VanItallie Theodore B

    2005-02-01

    Full Text Available Abstract Ancel Keys, Ph.D., who died in November, 2004, at the age of 100, was among the first scientists to recognize that human atherosclerosis is not an inevitable consequence of aging, and that a high-fat diet can be a major risk factor for coronary heart disease. During World War II, he and a group of talented co-workers at the University of Minnesota conducted a large-scale study of experimentally-induced human starvation. The data generated by this study – which was immediately recognized to be a classic – continue to be of inestimable value to nutrition scientists. In his later years, Keys spent more time at his home in Naples, Italy, where he had the opportunity to continue his personal study of the beneficial effects on health and longevity of a Mediterranean diet.

  8. Ancel Keys: a tribute.

    Science.gov (United States)

    Vanitallie, Theodore B

    2005-02-14

    Ancel Keys, Ph.D., who died in November, 2004, at the age of 100, was among the first scientists to recognize that human atherosclerosis is not an inevitable consequence of aging, and that a high-fat diet can be a major risk factor for coronary heart disease. During World War II, he and a group of talented co-workers at the University of Minnesota conducted a large-scale study of experimentally-induced human starvation. The data generated by this study - which was immediately recognized to be a classic - continue to be of inestimable value to nutrition scientists. In his later years, Keys spent more time at his home in Naples, Italy, where he had the opportunity to continue his personal study of the beneficial effects on health and longevity of a Mediterranean diet.

  9. Bioresponsive materials

    Science.gov (United States)

    Lu, Yue; Aimetti, Alex A.; Langer, Robert; Gu, Zhen

    2016-10-01

    'Smart' bioresponsive materials that are sensitive to biological signals or to pathological abnormalities, and interact with or are actuated by them, are appealing therapeutic platforms for the development of next-generation precision medications. Armed with a better understanding of various biologically responsive mechanisms, researchers have made innovations in the areas of materials chemistry, biomolecular engineering, pharmaceutical science, and micro- and nanofabrication to develop bioresponsive materials for a range of applications, including controlled drug delivery, diagnostics, tissue engineering and biomedical devices. This Review highlights recent advances in the design of smart materials capable of responding to the physiological environment, to biomarkers and to biological particulates. Key design principles, challenges and future directions, including clinical translation, of bioresponsive materials are also discussed.

  10. Bioresponsive materials

    Science.gov (United States)

    Lu, Yue; Aimetti, Alex A.; Langer, Robert; Gu, Zhen

    2017-01-01

    'Smart' bioresponsive materials that are sensitive to biological signals or to pathological abnormalities, and interact with or are actuated by them, are appealing therapeutic platforms for the development of next-generation precision medications. Armed with a better understanding of various biologically responsive mechanisms, researchers have made innovations in the areas of materials chemistry, biomolecular engineering, pharmaceutical science, and micro- and nanofabrication to develop bioresponsive materials for a range of applications, including controlled drug delivery, diagnostics, tissue engineering and biomedical devices. This Review highlights recent advances in the design of smart materials capable of responding to the physiological environment, to biomarkers and to biological particulates. Key design principles, challenges and future directions, including clinical translation, of bioresponsive materials are also discussed.

  11. ABSTRACTS AND KEY WORDS

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    Establishment of a Method for Content Determination of Polysaccharide in Membranous milkveteh root Applied in Fisheries Yu Xiao-qing et al. (1) Abstract Some chemical component in the traditional Chinese medicine Membranous milkvetch root can improve the ability of disease-prevention of animal and it can be applied in fisheries. In the paper, the method about content determination of polysaccharide in the root was established based on orthogonal experimental design Key words medicine; polysaccharide in Membranous milkvetch root; method of determination

  12. Ancel Keys: a tribute

    OpenAIRE

    VanItallie Theodore B

    2005-01-01

    Abstract Ancel Keys, Ph.D., who died in November, 2004, at the age of 100, was among the first scientists to recognize that human atherosclerosis is not an inevitable consequence of aging, and that a high-fat diet can be a major risk factor for coronary heart disease. During World War II, he and a group of talented co-workers at the University of Minnesota conducted a large-scale study of experimentally-induced human starvation. The data generated by this study – which was immediately recogni...

  13. Identification key to Quivira milkweeds

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This document is a key to milkweed identification at Quivira National Wildlife Refuge. It contains a dichotomous key as well as a picture key. Milkweeds found on the...

  14. Key strategies for enhancing the cycling stability and rate capacity of LiNi0.5Mn1.5O4 as high-voltage cathode materials for high power lithium-ion batteries

    Science.gov (United States)

    Yi, Ting-Feng; Mei, Jie; Zhu, Yan-Rong

    2016-06-01

    Spinel LiNi0.5Mn1.5O4 (LNMO) is one of the most promising high voltage cathode materials for future application due to its advantages of large reversible capacity, high thermal stability, low cost, environmental friendliness, and high energy density. LNMO can provide 20% and 30% higher energy density than traditional cathode materials LiCoO2 and LiFePO4, respectively. Unfortunately, LNMO-based batteries with LiPF6-based carbonate electrolytes always suffer from severe capacity deterioration and poor thermostability because of the oxidization of organic carbonate solvents and decomposition of LiPF6, especially at elevated temperatures and water-containing environment. Hence, it is necessary to systematically and comprehensively summarize the progress in understanding and modifying LNMO cathode from various aspects. In this review, the structure, transport properties and different reported possible fading mechanisms of LNMO cathode are first discussed detailedly. And then, the major goal of this review is to highlight new progress in using proposed strategies to improve the cycling stability and rate capacity of LNMO-based batteries, including synthesis, control of special morphologies, element doping and surface coating etc., especially at elevated temperatures. Finally, an insight into the future research and further development of LNMO cathode is discussed.

  15. ELT Materials: The Key to Fostering Effective Teaching and Learning Settings Materiales para la enseñanza del inglés: la clave para promover ambientes efectivos de enseñanza y aprendizaje

    Directory of Open Access Journals (Sweden)

    Astrid Núñez Pardo

    2009-10-01

    Full Text Available Our article aims at providing teachers with an overview for materials development, taking into account the experience gained by two teachers in the English Programme of the School of Education at Universidad Externado de Colombia in Bogotá. This experience has helped us achieve better teaching and learning conditions for our university students in their quest to learn a foreign language. This paper addresses the issue of the role of teachers as textbook developers, and how they can meet materials development demands by integrating a clear conceptualisation and set of principles as well as their essential components.Este artículo brinda a los profesores de inglés un panorama del desarrollo de materiales con base en nuestra experiencia como profesoras del Programa de Inglés de la Facultad de Educación de la Universidad Externado de Colombia, en Bogotá. Esta experiencia ha permitido mejorar las condiciones de aprendizaje de nuestros estudiantes de inglés como lengua extrajera. El documento se centra en el papel de los profesores como diseñadores de textos para cursos de inglés, y cómo ellos pueden satisfacer las exigencias que demanda el desarrollo de materiales, integrando una clara conceptualización, sus principios y sus componentes esenciales.

  16. ID-based Key-insulated Authenticated Key Agreement Protocol

    Institute of Scientific and Technical Information of China (English)

    ZHOU Yuan; CHENG Xiao-ming; CHAI Zhen-chuan

    2007-01-01

    The basic idea behind an ID-based cryptosystem is that end user's public key can be determined by his identity information. Comparing with the traditional certificate-based cryptography, identity-based cryptography can eliminate much of the overhead associated with the deployment and management of certificate. However, exposure of private keys can be the most devastating attack on a public key based cryptosystem since such that all security guarantees are lost. In this paper, an ID-based authenticated key agreement protocol was presented. For solving the problem of key exposure of the basic scheme, the technique of key insulation was applied and a key insulated version is developed.

  17. Paediatric pharmacokinetics: key considerations

    Science.gov (United States)

    Batchelor, Hannah Katharine; Marriott, John Francis

    2015-01-01

    A number of anatomical and physiological factors determine the pharmacokinetic profile of a drug. Differences in physiology in paediatric populations compared with adults can influence the concentration of drug within the plasma or tissue. Healthcare professionals need to be aware of anatomical and physiological changes that affect pharmacokinetic profiles of drugs to understand consequences of dose adjustments in infants and children. Pharmacokinetic clinical trials in children are complicated owing to the limitations on blood sample volumes and perception of pain in children resulting from blood sampling. There are alternative sampling techniques that can minimize the invasive nature of such trials. Population based models can also limit the sampling required from each individual by increasing the overall sample size to generate robust pharmacokinetic data. This review details key considerations in the design and development of paediatric pharmacokinetic clinical trials. PMID:25855821

  18. ABSTRACTS AND KEY WORDS

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    Determination of the Estrogen Alkylphenols and Bisphenol A in Marine Sediments by Gas Chromatography-Mass Spectrometry Deng Xu-xiu et al. (1) Abstract Octylphenol, nonylphenol and bisphenol A are recognized environmental endocrine disruptors. A quantitative method was established for the simultaneous determination of octylphenol, nonylphenol and bisphenol A in marine sediments by gas chromatography-mass spectrometry. The test sample was extracted by methanol with ultrasonic technique, purified with copper powder and carbon solid phase extraction column, and derived with heptafluorobutyric anhydride. Then the analytes were separated on HP-5ms column and determined by gas chromatography-mass. The recovery of the method was between 84.3% and 94.5%, and the LOQ of 4-N- octylphenol, nonylphenol and bisphenol A was 0.25 g/kg, 0.15 g/kg and 0.15 g/kg. Key words octylphenol; nonylphenol; bisphenol A; gas chromatography-mass spectrometry

  19. Key aspects congenital infection

    Directory of Open Access Journals (Sweden)

    Yu. V. Lobzin

    2014-01-01

    Full Text Available The key questions to solve the problem of congenital infection in the Russian Federation are: using in national practice over world accepted terminology adapted to the recommendations of the World Health Organization; representation of the modern concepts of an infectious process in the classification of congenital infections; scientific development and introducing in clinical practice the «standard case definitions», applied to different congenital infections; optimization of protocols and clinical guidelines for diagnosis, treatment and prevention of congenital infections; improvement a knowledge in the infectious disease for all  pecialists involved in the risk assessment of congenital infections, manage pregnancy and children. Based on our experience and analysis of publications, the authors suggest possible solutions.

  20. Biometric Methods for Secure Communications in Body Sensor Networks: Resource-Efficient Key Management and Signal-Level Data Scrambling

    Directory of Open Access Journals (Sweden)

    Dimitrios Hatzinakos

    2008-03-01

    Full Text Available As electronic communications become more prevalent, mobile and universal, the threats of data compromises also accordingly loom larger. In the context of a body sensor network (BSN, which permits pervasive monitoring of potentially sensitive medical data, security and privacy concerns are particularly important. It is a challenge to implement traditional security infrastructures in these types of lightweight networks since they are by design limited in both computational and communication resources. A key enabling technology for secure communications in BSN's has emerged to be biometrics. In this work, we present two complementary approaches which exploit physiological signals to address security issues: (1 a resource-efficient key management system for generating and distributing cryptographic keys to constituent sensors in a BSN; (2 a novel data scrambling method, based on interpolation and random sampling, that is envisioned as a potential alternative to conventional symmetric encryption algorithms for certain types of data. The former targets the resource constraints in BSN's, while the latter addresses the fuzzy variability of biometric signals, which has largely precluded the direct application of conventional encryption. Using electrocardiogram (ECG signals as biometrics, the resulting computer simulations demonstrate the feasibility and efficacy of these methods for delivering secure communications in BSN's.

  1. Biometric Methods for Secure Communications in Body Sensor Networks: Resource-Efficient Key Management and Signal-Level Data Scrambling

    Science.gov (United States)

    Bui, Francis Minhthang; Hatzinakos, Dimitrios

    2007-12-01

    As electronic communications become more prevalent, mobile and universal, the threats of data compromises also accordingly loom larger. In the context of a body sensor network (BSN), which permits pervasive monitoring of potentially sensitive medical data, security and privacy concerns are particularly important. It is a challenge to implement traditional security infrastructures in these types of lightweight networks since they are by design limited in both computational and communication resources. A key enabling technology for secure communications in BSN's has emerged to be biometrics. In this work, we present two complementary approaches which exploit physiological signals to address security issues: (1) a resource-efficient key management system for generating and distributing cryptographic keys to constituent sensors in a BSN; (2) a novel data scrambling method, based on interpolation and random sampling, that is envisioned as a potential alternative to conventional symmetric encryption algorithms for certain types of data. The former targets the resource constraints in BSN's, while the latter addresses the fuzzy variability of biometric signals, which has largely precluded the direct application of conventional encryption. Using electrocardiogram (ECG) signals as biometrics, the resulting computer simulations demonstrate the feasibility and efficacy of these methods for delivering secure communications in BSN's.

  2. Exponential Arithmetic Based Self-Healing Group Key Distribution Scheme with Backward Secrecy under the Resource-Constrained Wireless Networks.

    Science.gov (United States)

    Guo, Hua; Zheng, Yandong; Zhang, Xiyong; Li, Zhoujun

    2016-04-28

    In resource-constrained wireless networks, resources such as storage space and communication bandwidth are limited. To guarantee secure communication in resource-constrained wireless networks, group keys should be distributed to users. The self-healing group key distribution (SGKD) scheme is a promising cryptographic tool, which can be used to distribute and update the group key for the secure group communication over unreliable wireless networks. Among all known SGKD schemes, exponential arithmetic based SGKD (E-SGKD) schemes reduce the storage overhead to constant, thus is suitable for the the resource-constrained wireless networks. In this paper, we provide a new mechanism to achieve E-SGKD schemes with backward secrecy. We first propose a basic E-SGKD scheme based on a known polynomial-based SGKD, where it has optimal storage overhead while having no backward secrecy. To obtain the backward secrecy and reduce the communication overhead, we introduce a novel approach for message broadcasting and self-healing. Compared with other E-SGKD schemes, our new E-SGKD scheme has the optimal storage overhead, high communication efficiency and satisfactory security. The simulation results in Zigbee-based networks show that the proposed scheme is suitable for the resource-restrained wireless networks. Finally, we show the application of our proposed scheme.

  3. Exponential Arithmetic Based Self-Healing Group Key Distribution Scheme with Backward Secrecy under the Resource-Constrained Wireless Networks

    Directory of Open Access Journals (Sweden)

    Hua Guo

    2016-04-01

    Full Text Available In resource-constrained wireless networks, resources such as storage space and communication bandwidth are limited. To guarantee secure communication in resource-constrained wireless networks, group keys should be distributed to users. The self-healing group key distribution (SGKD scheme is a promising cryptographic tool, which can be used to distribute and update the group key for the secure group communication over unreliable wireless networks. Among all known SGKD schemes, exponential arithmetic based SGKD (E-SGKD schemes reduce the storage overhead to constant, thus is suitable for the the resource-constrained wireless networks. In this paper, we provide a new mechanism to achieve E-SGKD schemes with backward secrecy. We first propose a basic E-SGKD scheme based on a known polynomial-based SGKD, where it has optimal storage overhead while having no backward secrecy. To obtain the backward secrecy and reduce the communication overhead, we introduce a novel approach for message broadcasting and self-healing. Compared with other E-SGKD schemes, our new E-SGKD scheme has the optimal storage overhead, high communication efficiency and satisfactory security. The simulation results in Zigbee-based networks show that the proposed scheme is suitable for the resource-restrained wireless networks. Finally, we show the application of our proposed scheme.

  4. Implementation and Analysis Audio Steganography Used Parity Coding for Symmetric Cryptography Key Delivery

    Directory of Open Access Journals (Sweden)

    Afany Zeinata Firdaus

    2013-12-01

    Full Text Available In today's era of communication, online data transactions is increasing. Various information even more accessible, both upload and download. Because it takes a capable security system. Blowfish cryptographic equipped with Audio Steganography is one way to secure the data so that the data can not be accessed by unauthorized parties. In this study Audio Steganography technique is implemented using parity coding method that is used to send the key cryptography blowfish in e-commerce applications based on Android. The results obtained for the average computation time on stage insertion (embedding the secret message is shorter than the average computation time making phase (extracting the secret message. From the test results can also be seen that the more the number of characters pasted the greater the noise received, where the highest SNR is obtained when a character is inserted as many as 506 characters is equal to 11.9905 dB, while the lowest SNR obtained when a character is inserted as many as 2006 characters at 5,6897 dB . Keywords: audio steganograph, parity coding, embedding, extractin, cryptography blowfih.

  5. Failure Impact Analysis of Key Management in AMI Using Cybernomic Situational Assessment (CSA)

    Energy Technology Data Exchange (ETDEWEB)

    Abercrombie, Robert K [ORNL; Sheldon, Frederick T [ORNL; Hauser, Katie R [ORNL; Lantz, Margaret W [ORNL; Mili, Ali [New Jersey Insitute of Technology

    2013-01-01

    In earlier work, we presented a computational framework for quantifying the security of a system in terms of the average loss a stakeholder stands to sustain as a result of threats to the system. We named this system, the Cyberspace Security Econometrics System (CSES). In this paper, we refine the framework and apply it to cryptographic key management within the Advanced Metering Infrastructure (AMI) as an example. The stakeholders, requirements, components, and threats are determined. We then populate the matrices with justified values by addressing the AMI at a higher level, rather than trying to consider every piece of hardware and software involved. We accomplish this task by leveraging the recently established NISTR 7628 guideline for smart grid security. This allowed us to choose the stakeholders, requirements, components, and threats realistically. We reviewed the literature and selected an industry technical working group to select three representative threats from a collection of 29 threats. From this subset, we populate the stakes, dependency, and impact matrices, and the threat vector with realistic numbers. Each Stakeholder s Mean Failure Cost is then computed.

  6. Automated secured cost effective key refreshing technique to enhance WiMAX privacy key management

    Science.gov (United States)

    Sridevi, B.; Sivaranjani, S.; Rajaram, S.

    2013-01-01

    In all walks of life the way of communication is transformed by the rapid growth of wireless communication and its pervasive use. A wireless network which is fixed and richer in bandwidth is specified as IEEE 802.16, promoted and launched by an industrial forum is termed as Worldwide Interoperability for Microwave Access (WiMAX). This technology enables seamless delivery of wireless broadband service for fixed and/or mobile users. The obscurity is the long delay which occurs during the handoff management in every network. Mobile WiMAX employs an authenticated key management protocol as a part of handoff management in which the Base Station (BS) controls the distribution of keying material to the Mobile Station (MS). The protocol employed is Privacy Key Management Version 2- Extensible Authentication Protocol (PKMV2-EAP) which is responsible for the normal and periodical authorization of MSs, reauthorization as well as key refreshing. Authorization key (AK) and Traffic Encryption key (TEK) plays a vital role in key exchange. When the lifetime of key expires, MS has to request for a new key to BS which in turn leads to repetition of authorization, authentication as well as key exchange. To avoid service interruption during reauthorization , two active keys are transmitted at the same time by BS to MS. The consequences of existing work are hefty amount of bandwidth utilization, time consumption and large storage. It is also endured by Man in the Middle attack and Impersonation due to lack of security in key exchange. This paper designs an automatic mutual refreshing of keys to minimize bandwidth utilization, key storage and time consumption by proposing Previous key and Iteration based Key Refreshing Function (PKIBKRF). By integrating PKIBKRF in key generation, the simulation results indicate that 21.8% of the bandwidth and storage of keys are reduced and PKMV2 mutual authentication time is reduced by 66.67%. The proposed work is simulated with Qualnet model and

  7. Nanofluids research: key issues.

    Science.gov (United States)

    Wang, Liqiu; Fan, Jing

    2010-05-22

    Nanofluids are a new class of fluids engineered by dispersing nanometer-size structures (particles, fibers, tubes, droplets) in base fluids. The very essence of nanofluids research and development is to enhance fluid macroscopic and megascale properties such as thermal conductivity through manipulating microscopic physics (structures, properties and activities). Therefore, the success of nanofluid technology depends very much on how well we can address issues like effective means of microscale manipulation, interplays among physics at different scales and optimization of microscale physics for the optimal megascale properties. In this work, we take heat-conduction nanofluids as examples to review methodologies available to effectively tackle these key but difficult problems and identify the future research needs as well. The reviewed techniques include nanofluids synthesis through liquid-phase chemical reactions in continuous-flow microfluidic microreactors, scaling-up by the volume averaging and constructal design with the constructal theory. The identified areas of future research contain microfluidic nanofluids, thermal waves and constructal nanofluids.

  8. Nanofluids Research: Key Issues

    Directory of Open Access Journals (Sweden)

    Wang Liqiu

    2010-01-01

    Full Text Available Abstract Nanofluids are a new class of fluids engineered by dispersing nanometer-size structures (particles, fibers, tubes, droplets in base fluids. The very essence of nanofluids research and development is to enhance fluid macroscopic and megascale properties such as thermal conductivity through manipulating microscopic physics (structures, properties and activities. Therefore, the success of nanofluid technology depends very much on how well we can address issues like effective means of microscale manipulation, interplays among physics at different scales and optimization of microscale physics for the optimal megascale properties. In this work, we take heat-conduction nanofluids as examples to review methodologies available to effectively tackle these key but difficult problems and identify the future research needs as well. The reviewed techniques include nanofluids synthesis through liquid-phase chemical reactions in continuous-flow microfluidic microreactors, scaling-up by the volume averaging and constructal design with the constructal theory. The identified areas of future research contain microfluidic nanofluids, thermal waves and constructal nanofluids.

  9. Infrastructure of the hydrogen use and materials for fuel cells: key for its soon use; Infraestructura de uso de hidrogeno y materiales para celdas de combustible: clave para su pronto uso

    Energy Technology Data Exchange (ETDEWEB)

    Cano Castillo, Ulises; Rejon Garcia, Leonardo; Ojeda Hernandez, Mirna [Instituto de Investigaciones Electricas, Temixco, Morelos (Mexico)

    2000-07-01

    Nowadays, many products for the personal generation of electrical energy exist, such as the batteries and the of internal combustion machines; that have developed and established the infrastructure required for their manufacture, distribution and commercial use. Nevertheless, disadvantages as well as practical limitations and their relationship with the environment exist. The fuel cells are able to increase their applications, as well as to solve practical and environmental challenges, but still they face challenges related to the initial cost and the infrastructure required for their uses. In this article the materials and the fuel cells (PEM) are described (membrane cells of proton interchange or of polymeric membrane electrolyte), of the proton interchanging membrane, gas diffuser, current collector plates of with fields gas flow fields and electrocatalizers. A table of fuel cells applications is shown according to the type of cell from a power of less than 1 KW to greater than 1 MW. Also there is a table of hydrogen production methods and tables where it is represented the hydrogen route in a PEM cell and the basic components of a type PEM fuel cell. In the article appears a table where a comparison of some properties of current collector plates is shown, as well as a graph of the spectra of electrochemical impedances. [Spanish] Hoy en dia, existen muchos productos para la generacion personal de energia electrica, como las baterias y las maquinas de combustion interna; que han desarrollado y establecido la infraestructura requerida para su fabricacion, distribucion y su uso comercial. Sin embargo, existen desventajas en cuanto a limitaciones practicas y su relacion con el ambiente. Las celdas de combustion son capaces de aumentar sus aplicaciones, asi como resolver retos practicos y ambientales, pero asi enfrentan retos relacionados con el costo inicial y las infraestructura requerida para su usos. En este articulo se describen los materiales y la descripcion

  10. Key Updating Methods for Combinatorial Design Based Key Management Schemes

    Directory of Open Access Journals (Sweden)

    Chonghuan Xu

    2014-01-01

    Full Text Available Wireless sensor network (WSN has become one of the most promising network technologies for many useful applications. However, for the lack of resources, it is different but important to ensure the security of the WSNs. Key management is a corner stone on which to build secure WSNs for it has a fundamental role in confidentiality, authentication, and so on. Combinatorial design theory has been used to generate good-designed key rings for each sensor node in WSNs. A large number of combinatorial design based key management schemes have been proposed but none of them have taken key updating into consideration. In this paper, we point out the essence of key updating for the unital design based key management scheme and propose two key updating methods; then, we conduct performance analysis on the two methods from three aspects; at last, we generalize the two methods to other combinatorial design based key management schemes and enhance the second method.

  11. A threshold key escrow scheme based on public key cryptosystem

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    In key escrow field it is important to solve the problem thatuser's secret key completely depends on the trusted escrow agency. In 1995, some methods of solving the problem were presented. But these methods are no better than that of directly using threshold cryptography. In this paper, we present a common pattern of threshold key escrow scheme based on public key cryptosystem, and a detailed design based on the improved RSA algorithm is given. The above problem is solved by this scheme.

  12. 直接甲醇燃料电池关键材料的表面改性及其研究进展%Research Progress and Surface Modification in Key Materials of Direct Methanol Fuel Cells

    Institute of Scientific and Technical Information of China (English)

    何璧; 刘其阳; 李欢; 唐彬彬; 聂明; 李庆; 刘晓卫; 杜胜娟; 周倩; 廖羽佳; 王宏煜; 袁宇

    2014-01-01

    直接甲醇燃料电池( DMFC)由于结构简单、能量密度大、无污染等优点,已经成为近年来国内外研究的热点之一。简要介绍了直接甲醇燃料电池的原理,重点概述了阳极催化剂和电解质膜这两个决定电池性能的关键材料的表面改性及其研究进展。介绍了提高直接甲醇燃料电池阳极催化剂催化活性的各种改性技术,如通过离子溅射法、分子束法等传统物理方法对电极表面进行修饰,在电极材料中掺杂对甲醇催化活性较好的纳米材料等。此外,还介绍了基于降低甲醇渗透率的Nafion膜改进技术,如通过等离子蚀刻法等物理手段对膜表面进行改性,掺杂阻醇性能较好的无机化合物等。并介绍了几种具有应用前景的新型替代膜,如接枝膜、共混膜等。最后对直接甲醇燃料电池的发展应用进行了展望。%Objective Direct methanol fuel cells ( DMFC) have become the domestic and international research focus in recent years due to its many advantages, such as simple structure, high energy density and pollutionlessness. This paper reviewed the principle of DMFC and the study process of anode catalyst and proton exchange membrane was emphatically elaborated. The details in modification of the anode catalyst for improving its catalytic activity were introduced, for example, the modification of the elec-trode surface by physical methods such as ion sputtering and molecular beam method, and modification of the electrode material by doping with nanomaterials of higher methanol catalysis activity. Emphasis was laid on the studies on both Nafion membranes and the substitutes to remarkably reduce the methanol permeability, such as the modification over the membrane surface by physical means of plasma etching, and by doping with some methanol-resistant inorganic compounds. Several promising alternative membranes were introduced, such as the grafted membranes and blended

  13. 基于生物特征认证的用户密钥保护机制%User Key Protection Mechanism Based on Biometrics Authentication

    Institute of Scientific and Technical Information of China (English)

    王志刚; 罗云锋

    2015-01-01

    As the cryptographic technology is used extensively in information security ,it’s an important problem to pro‐tect the user key in security .A solution for user key protection mechanism based on fingerprint authentication technology is proposed .The architecture of the user key protection system and the process of acquiring the user key are described .This scheme guarantees the security and usability of user key .%密码技术广泛应用于信息安全领域,如何安全地保存密钥都是需要解决的关键问题。论文提出了一种基于生物特征认证的用户密钥保护机制,描述了基于指纹认证的用户密钥保护系统组成及用户密钥获取流程。该方法保证了用户密钥的安全,同时也便于用户密钥的使用。

  14. Sets, Subsets, and Dichotomous Keys

    Science.gov (United States)

    Cole, E. James

    1973-01-01

    Discusses the procedures that should be observed in constructing a dichotomous key. The keying exercise described was used as a laboratory activity in a biology course for elementary education majors, however it could be used in other courses. (JR)

  15. The key found

    Directory of Open Access Journals (Sweden)

    Agata Stankowka

    2010-01-01

    Full Text Available Poetycka antropologia Julii Hartwig [Julia Hartwig’s poetic anthropology] written by Marcin Terlecki is a book that fills the yawning gap in our literary understanding of the twentieth century Polish poetry and constitutes the first attempt at a comprehensive and detailed presentation of the lyrical works by J. Hartwig. The modern collection in which the work appears allow M. Terlecki to reveal the poetess’ fundamental insights dominating and underlying her world outlook and epistemological views. This, in turn, puts him in a position to give an explanation to the logic embedded in the evolution under scrutiny. M. Terlecki convincingly supports his own argument concerning J. Hartwig’s poetic reception of the world proving the thesis that its fundamentals are deeply rooted in the anthropological perspective. Terlecki differentiates the latter into three basic categories. First, there is “strangeness/alienation”, which results in the need for self-definition (determination of one’s nature and basic qualities. Then, “identity”, whose reflection turns out to be not only what is different in its external shape, but also what is different inside — within the plane of one’s own culture, biography and personality. And, finally, “empathy”, born out of questions on a feasibility of contact with what is different, alien and absent. The three categories, connected by the logic of anthropological vision, are presented as basic and fundamental for the subsequent stages in Hartwig’s poetical output. At the same time, they reveal themselves as axes of anthropological reading material provided by the author — for the discussed book is the author’s own research project on “poetic anthropology”.

  16. FPGA密码模块恶意木马后门设计%Design of vicious trojan backdoor for FPGA cryptographical module

    Institute of Scientific and Technical Information of China (English)

    孙海涛; 刘洁; 何循来; 俞文文

    2013-01-01

    Security of FPGA contains two parts of data and program . Each phases in the life cycle of FPGA can bring significant influence for its security . The vulnerabilities in today ’ s design and fabrication process have raised the possibility of malicious circuit modification as known as trojans in a design to impact the functionality or transmit key information to the adver-sary . This paper designs a hardware trojan of transmitting key information towards FPGA . It is importantation to realize the imple-ment mechanism and raise the attention to IC security .%FPGA 器件安全性包括数据安全性和应用程序安全性两部分。FPGA 生命周期的各个阶段对其安全性都会产生至关重要的影响,由于 FPGA 电路在设计和生产中的脆弱性,使得恶意木马电路能够有机可乘。针对 FPGA 器件开发阶段,以 FPGA 密码模块为目标,设计能够泄露密钥的恶意木马后门电路,对于了解硬件木马实现机理、警示 FPGA 芯片安全具有重要作用。

  17. Public-key cryptography in functional programming context

    CERN Document Server

    Márton, Gyöngyvér

    2010-01-01

    Up to now, for efficiency reasons cryptographic algorithm has been written in an imperative language. But to get acquaintance with a functional programming language a question arises: functional programming offers some new for secure communication or not? This article investigates this question giving an overview on some cryptography algorithms and presents how the RSA encryption in the functional language Clean can be implemented and how can be measured the efficiency of a certain application.

  18. System and method for key generation in security tokens

    Energy Technology Data Exchange (ETDEWEB)

    Evans, Philip G.; Humble, Travis S.; Paul, Nathanael R.; Pooser, Raphael C.; Prowell, Stacy J.

    2015-10-27

    Functional randomness in security tokens (FRIST) may achieve improved security in two-factor authentication hardware tokens by improving on the algorithms used to securely generate random data. A system and method in one embodiment according to the present invention may allow for security of a token based on storage cost and computational security. This approach may enable communication where security is no longer based solely on onetime pads (OTPs) generated from a single cryptographic function (e.g., SHA-256).

  19. Ultra Encryption Standard Modified (UES Version-I: Symmetric Key Cryptosystem With Multiple Encryption and Randomized Vernam Key Using Generalized Modified Vernam Cipher Method, Permutation Method, and Columnar Transposition Method

    Directory of Open Access Journals (Sweden)

    Satyaki Roy

    2012-07-01

    Full Text Available In the present paper a new combined cryptographic method called Modified UES Version-I has been introduced. Nath et al. have already developed several symmetric key methods. It combines three different methods namely, Generalized Modified Vernam Cipher method, Permutation method and Columnar Transposition method. Nath et al recently developed few efficient combined encryption methods such as TTJSA, DJMNA where they have used generalized MSA method, NJJSAA method and DJSA methods. Each of the methods can be applied independently to encrypt any message. Nath et. al showed that TTJSA and DJMNA is most suitable methods to encrypt password or any small message. The name of this method is Ultra Encryption Standard modified (UES version-I since it is based on UES version-I developed by Roy et. al. In this method an encryption key pad in Vernam Cipher Method also the feedback has been used which is considered to make the encryption process stronger. Modified UES Version-I may be applied to encrypt data in any office, corporate sectors etc. The method is most suitable to encrypt any type of file such as text, audio, video, image and databases etc

  20. Key Concepts in Informatics: Algorithm

    Science.gov (United States)

    Szlávi, Péter; Zsakó, László

    2014-01-01

    "The system of key concepts contains the most important key concepts related to the development tasks of knowledge areas and their vertical hierarchy as well as the links of basic key concepts of different knowledge areas." (Vass 2011) One of the most important of these concepts is the algorithm. In everyday life, when learning or…

  1. Stahlschüssel key to steel

    CERN Document Server

    Wegst, W S

    2016-01-01

    The Key to Steel (Stahlschlüssel/Stahlschluessel) cross reference book will help you to decode / decipher steel designations and find equivalent materials worldwide. The 2016 edition includes more than 70,000 standard designations and trade names from approximately 300 steelmakers and suppliers. Presentation is trilingual: English, French, and German. Materials covered include structural steels, tool steels, valve steels, high temperature steels and alloys, stainless and heat-resisting steels, and more. Standards and designations from 25 countries are cross-referenced.

  2. Developments and key issues in tourism mobilities

    OpenAIRE

    Hannam, Kevin; Butler, Gareth; Paris, Cody Morris

    2013-01-01

    This paper examines key developments in recent tourism mobilities research. It begins by outlining the recent conceptualisation of tourism mobilities, arguing that it is not just that tourism is a form of mobility like other forms of mobility but that different mobilities inform and are informed by tourism. It then examines work which has been developed in terms of materialities, autmobilities and new technologies. It concludes by discussing mobile methodologies and some thoughts on future re...

  3. Limitations on quantum key repeaters.

    Science.gov (United States)

    Bäuml, Stefan; Christandl, Matthias; Horodecki, Karol; Winter, Andreas

    2015-04-23

    A major application of quantum communication is the distribution of entangled particles for use in quantum key distribution. Owing to noise in the communication line, quantum key distribution is, in practice, limited to a distance of a few hundred kilometres, and can only be extended to longer distances by use of a quantum repeater, a device that performs entanglement distillation and quantum teleportation. The existence of noisy entangled states that are undistillable but nevertheless useful for quantum key distribution raises the question of the feasibility of a quantum key repeater, which would work beyond the limits of entanglement distillation, hence possibly tolerating higher noise levels than existing protocols. Here we exhibit fundamental limits on such a device in the form of bounds on the rate at which it may extract secure key. As a consequence, we give examples of states suitable for quantum key distribution but unsuitable for the most general quantum key repeater protocol.

  4. A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS.

    Science.gov (United States)

    Das, Ashok Kumar; Odelu, Vanga; Goswami, Adrijit

    2015-09-01

    The telecare medicine information system (TMIS) helps the patients to gain the health monitoring facility at home and access medical services over the Internet of mobile networks. Recently, Amin and Biswas presented a smart card based user authentication and key agreement security protocol usable for TMIS system using the cryptographic one-way hash function and biohashing function, and claimed that their scheme is secure against all possible attacks. Though their scheme is efficient due to usage of one-way hash function, we show that their scheme has several security pitfalls and design flaws, such as (1) it fails to protect privileged-insider attack, (2) it fails to protect strong replay attack, (3) it fails to protect strong man-in-the-middle attack, (4) it has design flaw in user registration phase, (5) it has design flaw in login phase, (6) it has design flaw in password change phase, (7) it lacks of supporting biometric update phase, and (8) it has flaws in formal security analysis. In order to withstand these security pitfalls and design flaws, we aim to propose a secure and robust user authenticated key agreement scheme for the hierarchical multi-server environment suitable in TMIS using the cryptographic one-way hash function and fuzzy extractor. Through the rigorous security analysis including the formal security analysis using the widely-accepted Burrows-Abadi-Needham (BAN) logic, the formal security analysis under the random oracle model and the informal security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme using the most-widely accepted and used Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The simulation results show that our scheme is also secure. Our scheme is more efficient in computation and communication as compared to Amin-Biswas's scheme and other related schemes. In addition, our scheme supports extra functionality features as compared to

  5. KeyChains: A Decentralized Public-Key Infrastructure

    Science.gov (United States)

    2006-03-02

    exposed. This problem is easily solved in KeyChains, taking inspiration from existing techniques: certificate expiration, revocation lists and online...the peer. The peer maintains an access control list indicating what operations (key storage, key retrieval, and peer management) are permitted to a...2002, Norfolk, VA, September 2002. [9] http://www.umiacs.umd.edu/˜mmarsh/ CODEX /. [10] A. Datta, M. Hauswirth, and K. Aberer. Beyond ”web of trust

  6. 针对AES密码算法FPGA实现的CEMA攻击%Correlation electromagnetic analysis against AES cryptographic on implementations of FPGA

    Institute of Scientific and Technical Information of China (English)

    段二朋; 严迎建; 李佩之

    2012-01-01

    The mechanism of the electromagnetic (EM) information leakage of the cipher chip and the capturing of the near field EM signal is analyzed, a EMA platform is designed, the method of correlation electromagnetic analysis (CEMA) are studied, then the experiment of the attack on the advanced encryption standard (AES) on implementations of field programmable gate array (FPGA) is implemented. The result shows that, the platform could capture the EM information leakage; the method of correlation electromagnetic analysis CEMA could obtain the right key of AES.%通过分析密码芯片的电磁信息泄漏和近场采集原理,构建了电磁信息采集平台,并研究了相关性电磁分析攻击方法,对基于现场可编程门阵列(FPGA)实现的高级加密标准(AES)密码算法进行了近场相关性电磁分析(CEMA)攻击.攻击结果表明,该平台能够获取密码芯片工作时的电磁信息泄漏;相关性电磁分析攻击方法能够获得正确密钥.

  7. A System-Level Throughput Model for Quantum Key Distribution

    Science.gov (United States)

    2015-09-17

    quantum mechanics to generate and distribute shared secret keying material. QKD systems generate and distribute key by progressing through a number of...communicate a seed to prime random number generation to construct a very large matrix used in the calculation of Privacy Amplification. We assume that... generate a desired number of final key bits. RQ7: What are the implications of altering the amount of Alice’s memory allocated for Quantum Exchange

  8. Systematic Optimization of Battery Materials: Key Parameter Optimization for the Scalable Synthesis of Uniform, High-Energy, and High Stability LiNi0.6Mn0.2Co0.2O2 Cathode Material for Lithium-Ion Batteries.

    Science.gov (United States)

    Ren, Dong; Shen, Yun; Yang, Yao; Shen, Luxi; Levin, Barnaby D A; Yu, Yingchao; Muller, David A; Abruña, Héctor D

    2017-10-06

    Ni-rich LiNixMnyCo1-x-yO2 (x > 0.5) (NMC) materials have attracted a great deal of interest as promising cathode candidates for Li-ion batteries due to their low cost and high energy density. However, several issues, including sensitivity to moisture, difficulty in reproducibly preparing well-controlled morphology particles and, poor cyclability, have hindered their large scale deployment; especially for electric vehicle (EV) applications. In this work, we have developed a uniform, highly stable, high-energy density, Ni-rich LiNi0.6Mn0.2Co0.2O2 cathode material by systematically optimizing synthesis parameters, including pH, stirring rate, and calcination temperature. The particles exhibit a spherical morphology and uniform size distribution, with a well-defined structure and homogeneous transition-metal distribution, owing to the well-controlled synthesis parameters. The material exhibited superior electrochemical properties, when compared to a commercial sample, with an initial discharge capacity of 205 mAh/g at 0.1 C. It also exhibited a remarkable rate capability with discharge capacities of 157 mAh/g and 137 mAh/g at 10 and 20 C, respectively, as well as high tolerance to air and moisture. In order to demonstrate incorporation into a commercial scale EV, a large-scale 4.7 Ah LiNi0.6Mn0.2Co0.2O2 Al-full pouch cell with a high cathode loading of 21.6 mg/cm(2), paired with a graphite anode, was fabricated. It exhibited exceptional cyclability with a capacity retention of 96% after 500 cycles at room temperature. This material, which was obtained by a fully optimized scalable synthesis, delivered combined performance metrics that are among the best for NMC materials reported to date.

  9. An Internet Key Exchange Protocol Based on Public Key Infrastructure

    Institute of Scientific and Technical Information of China (English)

    朱建明; 马建峰

    2004-01-01

    Internet key exchange (IKE) is an automated key exchange mechanism that is used to facilitate the transfer of IPSec security associations (SAs). Public key infrastructure (PKI) is considered as a key element for providing security to new distributed communication networks and services. In this paper, we concentrate on the properties of the protocol of Phase 1 IKE. After investigating IKE protocol and PKI technology, we combine IKE protocol and PKI and present an implementation scheme of the IKE based on PKI. Then, we give a logic analysis of the proposed protocol with the BAN-logic and discuss the security of the protocol. The result indicates that the protocol is correct and satisfies the security requirements of Internet key exchange.

  10. Key Findings for Interpersonal Skills

    Science.gov (United States)

    2013-12-04

    2005). Beyond difference and domination? Intercultural communication in legal contexts. Intercultural discourse and communication . The essential...trainable and consequential to warfighters in being good strangers. These key skills include observing and adapting to variation in communicative norms...warfighters in being good strangers. These key skills include observing and adapting to variation in communicative norms; allowing civilian

  11. Keys to the Natural World.

    Science.gov (United States)

    Misiti, Frank L., Jr.

    1996-01-01

    Presents a lesson that uses the learning cycle to introduce the concept of classification and the use of dichotomous keys to identify plants and animals. Encourages students to become better observers and helps them gain confidence and experience in using simple classification keys. (JRH)

  12. Flow hydrodynamics near inlet key of Piano Key Weir (PKW)

    Indian Academy of Sciences (India)

    Harinarayan Tiwari; Nayan Sharma

    2015-10-01

    This paper presents fundamental outcomes from an experimental study on the hydrodynamic performance near inlet key of Piano Key Weir (PKW). Hydrodynamic performance was tested in a circulated open channel that comprised of PKW and sand bed (d50 = 0.25 mm). Instantaneous velocities were measured at 20 cross sections using Laser Doppler Velocimeter (LDV) with constant discharge and depth. Average velocity and turbulence intensities in both directions were investigated. Average longitudinal velocities are found very much consistent at every point and maximum around the midway of inlet key. In transverse direction, flow is bifurcating in two directions which are also confirmed by average transverse velocity estimation. Variation of turbulence intensity presents average 10 times higher transverse turbulence than longitudinal turbulence near inlet key of PKW.

  13. [Key points in anterior esthetic restorations with all ceramic].

    Science.gov (United States)

    Luo, Xiaoping; Qian, Dongdong; Yuan, Yu; Meng, Xiangfeng

    2013-04-01

    This paper introduced the key points in fabricating anterior esthetic restorations with all ceramic materials, including pre-operative smile design, standard tooth preparation, provisional restoration fabrication, all ceramic materials selection, all ceramic restoration bonding, ceramic crack and fracture prevention. And then, the authors summarized and reviewed the clinical common problems in anterior esthetic restorations.

  14. Smartphones Could Make Keys Obsolete

    Institute of Scientific and Technical Information of China (English)

    Matt Richtel

    2011-01-01

    @@ Front pockets and purses are slowly being emptied of one of civilization's most basic and enduring tools: the key.It's being swallowed by the cellphone.New technology lets smartphones unlock hotel, office and house doors and open garages and even car doors. It's a not-too-distant cousin of the technology that allows key fobs to remotely unlock automobiles or key cards to be waved beside electronic pads at office entrances.What's new is that it is on the device more people are using as the Swiss Army knife of electronics, in equal parts phone, memo pad, stereo, map, GPS unit, and camera and game machine.

  15. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    Directory of Open Access Journals (Sweden)

    Ki-Wook Kim

    2017-09-01

    Full Text Available Many Internet of Things (IoT services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  16. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks.

    Science.gov (United States)

    Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi

    2017-09-21

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  17. Contrast Materials

    Science.gov (United States)

    ... Physician Resources Professions Site Index A-Z Contrast Materials What are contrast materials and how do they ... material? Pregnancy and contrast materials What are contrast materials and how do they work? Contrast materials, also ...

  18. Slips of the Typewriter Key.

    Science.gov (United States)

    Berg, Thomas

    2002-01-01

    Presents an analysis of 500 submorphemic slips of the typewriter key that escaped the notice of authors and other proofreaders and thereby made their way into the published records of scientific research. (Author/VWL)

  19. Secret Key Generation From Mobility

    CERN Document Server

    Gungor, Onur; Koksal, C Emre

    2011-01-01

    We consider secret key generation from relative localization information of a pair of nodes in a mobile wireless network in the presence of a mobile eavesdropper. Our scheme consists of two phases: in the first phase, legitimate node pair exchanges beacon signals to establish localization information based on noisy observations of these beacons; in the second phase, nodes generate secret key bits via a public discussion. Our problem can be categorized under the source models of information theoretic secrecy, where the distance between the legitimate nodes acts as the observed common randomness. We characterize the achievable secret key bit rate in terms of the observation noise variance at the legitimate nodes and the eavesdropper. This work provides a framework that combines information theoretic secrecy and wireless localization, and proves that the localization information provides a significant additional resource for secret key generation in mobile wireless networks.

  20. Security of Quantum Key Distribution

    CERN Document Server

    Renner, R

    2005-01-01

    We propose various new techniques in quantum information theory, including a de Finetti style representation theorem for finite symmetric quantum states. As an application, we give a proof for the security of quantum key distribution which applies to arbitrary protocols.

  1. Key Statistics for Thyroid Cancer

    Science.gov (United States)

    ... and Treatment? Thyroid Cancer About Thyroid Cancer Key Statistics for Thyroid Cancer How common is thyroid cancer? ... remains very low compared with most other cancers. Statistics on survival rates for thyroid cancer are discussed ...

  2. Wiki keys on mobile devices

    OpenAIRE

    Weber, Gisela; Hagedorn, Gregor

    2010-01-01

    The development of increasingly powerful mobile devices like PDAs (Personal Digital Assistants) and Smartphones, with larger displays and greater resolution makes them increasingly suitable for identification tools available directly “in the field”. One of several approaches towards this aim in the KeyToNature project is based on wiki-stored documents. Important features of wiki-based keys, such as hidden text and media information as well as links to glossary entries are su...

  3. Policies to Enable Bioenergy Deployment: Key Considerations and Good Practices

    Energy Technology Data Exchange (ETDEWEB)

    Smolinksi, Sharon [National Renewable Energy Lab. (NREL), Golden, CO (United States); Cox, Sadie [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2016-05-01

    Bioenergy is renewable energy generated from biological source materials, and includes electricity, transportation fuels and heating. Source materials are varied types of biomass, including food crops such as corn and sugarcane, non-edible lignocellulosic materials such as agricultural and forestry waste and dedicated crops, and municipal and livestock wastes. Key aspects of policies for bioenergy deployment are presented in this brief as part of the Clean Energy Solutions Center's Clean Energy Policy Brief Series.

  4. Finite-key security analysis for multilevel quantum key distribution

    Science.gov (United States)

    Brádler, Kamil; Mirhosseini, Mohammad; Fickler, Robert; Broadbent, Anne; Boyd, Robert

    2016-07-01

    We present a detailed security analysis of a d-dimensional quantum key distribution protocol based on two and three mutually unbiased bases (MUBs) both in an asymptotic and finite-key-length scenario. The finite secret key rates (in bits per detected photon) are calculated as a function of the length of the sifted key by (i) generalizing the uncertainly relation-based insight from BB84 to any d-level 2-MUB QKD protocol and (ii) by adopting recent advances in the second-order asymptotics for finite block length quantum coding (for both d-level 2- and 3-MUB QKD protocols). Since the finite and asymptotic secret key rates increase with d and the number of MUBs (together with the tolerable threshold) such QKD schemes could in principle offer an important advantage over BB84. We discuss the possibility of an experimental realization of the 3-MUB QKD protocol with the orbital angular momentum degrees of freedom of photons.

  5. Closing global material loops

    DEFF Research Database (Denmark)

    Prosman, Ernst-Jan; Wæhrens, Brian Vejrum; Liotta, Giacomo

    2017-01-01

    Replacing virgin materials with waste materials, a practice known as Industrial Symbiosis (IS), has been identified as a key strategy for closing material loops. This article adopts a critical view on geographic proximity and external coordinators – two key enablers of IS. By ‘uncovering’ a case...... where both enablers are absent, this study seeks to explore firm-level challenges of IS. We adopt an exploratory case study approach at a cement manufacturer who engages in cross-border IS without the support of external coordinators. Our research presents insights into two key areas of IS: 1) setting...... for geographic proximity and external coordinators. In doing so, our insights into firm-level challenges of long-distance IS exchanges contribute to closing global material loops by increasing the number of potential circular pathways....

  6. Self-healing materials.

    Science.gov (United States)

    Hager, Martin D; Greil, Peter; Leyens, Christoph; van der Zwaag, Sybrand; Schubert, Ulrich S

    2010-12-14

    Self-healing materials are able to partially or completely heal damage inflicted on them, e.g., crack formation; it is anticipated that the original functionality can be restored. This article covers the design and generic principles of self-healing materials through a wide range of different material classes including metals, ceramics, concrete, and polymers. Recent key developments and future challenges in the field of self-healing materials are summarised, and generic, fundamental material-independent principles and mechanism are discussed and evaluated.

  7. 基于时滞混沌系统的带密钥Hash函数的设计与分析%Design and Analysis of a Cryptographic Hash Function Based on Time-Delay Chaotic System

    Institute of Scientific and Technical Information of China (English)

    徐杰; 杨娣洁; 隆克平

    2011-01-01

    An algorithm of cryptographic hash function based on time-delay chaotic system is presented in this paper. In this algorithm, initial message is modulated into time-delay chaotic iteration, and the Hash value can be calculated by a HMAC-MD5 algorithm. Thus, every bit of this Hash value is correlative with initial message,and this Hash value is very sensitive to micro changes of the initial message or the initial condition of chaotic system. By theory analyses and simulations, we obtain that the Hash value has irregularity and diffusion properties,and the parameter space is augmented because of the properties of chaos. The nonlinear relation between hash value and initial message can be effectively against linear analysis. Therefore, this Hash function based on time-delay chaotic system can get better anti-attack and anti-collision capacity.%提出了一种基于时滞混沌系统的带密钥Hash函数算法,该算法利用时滞混沌系统非线性动力学特性,将需要传送的明文信息调制在时滞混沌迭代的轨迹中,并通过HMAC-MD5算法计算得出Hash值,Hash值的每个比特都与需传送的明文信息相关.该算法使Hash值对明文信息及时滞混沌迭代初始条件的微小变化高度敏感.理论分析和仿真结果均表明,该算法在保证Hash值的混乱性和散布性的同时,由于其混沌特性的加入而增大了参数空间,并且混沌Hash值与初始明文信息之间的非线性关系可以有效地抵御线性分析.因此,本文设计的基于时滞混沌系统的Hash函数算法具有很好的安全性、抗碰撞性和抗攻击能力,在数字签名等认证技术领域有很好的应用前景.

  8. Decoy State Quantum Key Distribution

    Science.gov (United States)

    Lo, Hoi-Kwong

    2005-10-01

    Quantum key distribution (QKD) allows two parties to communicate in absolute security based on the fundamental laws of physics. Up till now, it is widely believed that unconditionally secure QKD based on standard Bennett-Brassard (BB84) protocol is limited in both key generation rate and distance because of imperfect devices. Here, we solve these two problems directly by presenting new protocols that are feasible with only current technology. Surprisingly, our new protocols can make fiber-based QKD unconditionally secure at distances over 100km (for some experiments, such as GYS) and increase the key generation rate from O(η2) in prior art to O(η) where η is the overall transmittance. Our method is to develop the decoy state idea (first proposed by W.-Y. Hwang in "Quantum Key Distribution with High Loss: Toward Global Secure Communication", Phys. Rev. Lett. 91, 057901 (2003)) and consider simple extensions of the BB84 protocol. This part of work is published in "Decoy State Quantum Key Distribution", . We present a general theory of the decoy state protocol and propose a decoy method based on only one signal state and two decoy states. We perform optimization on the choice of intensities of the signal state and the two decoy states. Our result shows that a decoy state protocol with only two types of decoy states--a vacuum and a weak decoy state--asymptotically approaches the theoretical limit of the most general type of decoy state protocols (with an infinite number of decoy states). We also present a one-decoy-state protocol as a special case of Vacuum+Weak decoy method. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long distance (larger than 100km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical. This part of work is published in "Practical Decoy State for Quantum Key Distribution

  9. Wireless Physical Layer Security: On the Performance Limit of Secret-Key Agreement

    KAUST Repository

    Zorgui, Marwen

    2015-05-01

    Physical layer security (PLS) is a new paradigm aiming at securing communications between legitimate parties at the physical layer. Conventionally, achieving confidentiality in communication networks relies on cryptographic techniques such as public-key cryptography, secret-key distribution and symmetric encryption. Such techniques are deemed secure based on the assumption of limited computational abilities of a wiretapper. Given the relentless progress in computational capacities and the dynamic topology and proliferation of modern wireless networks, the relevance of the previous techniques in securing communications is more and more questionable and less and less reliable. In contrast to this paradigm, PLS does not assume a specific computational power at any eavesdropper, its premise to guarantee provable security via employing channel coding techniques at the physical layer exploiting the inherent randomness in most communication systems. In this dissertation, we investigate a particular aspect of PLS, which is secret-key agreement, also known as secret-sharing. In this setup, two legitimate parties try to distill a secret-key via the observation of correlated signals through a noisy wireless channel, in the presence of an eavesdropper who must be kept ignorant of the secret-key. Additionally, a noiseless public channel is made available to the legitimate parties to exchange public messages that are also accessible to the eavesdropper. Recall that key agreement is an important aspect toward realizing secure communications in the sense that the key can be used in a one-time pad scheme to send the confidential message. In the first part, our focus is on secret-sharing over Rayleigh fading quasi-static channels. We study the fundamental relationship relating the probability of error and a given target secret-key rate in the high power regime. This is characterized through the diversity multiplexing tradeoff (DMT) concept, that we define for our model and then

  10. Key China Energy Statistics 2012

    Energy Technology Data Exchange (ETDEWEB)

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-05-01

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). The Group has published seven editions to date of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  11. Key Revocation System for DNSSEC

    Directory of Open Access Journals (Sweden)

    Gilles Guette

    2008-06-01

    Full Text Available The Doma in Name System (DNS is a distributed tree-based database largely used to translate a human readable machine name into an IP address. The DNS security extensions (DNSSEC has been designed to protect the DNS protocol using public key cryptography and digital signatures. In this paper, we show how DNSSEC can be attacked using compromised keys and the consequences of such attacks. Then, we propose a new revocation scheme for DNSSEC based on two new resource records. There is currently no revocation system defined in the DNSSEC standard.

  12. Key China Energy Statistics 2011

    Energy Technology Data Exchange (ETDEWEB)

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-01-15

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). In 2008 the Group published the Seventh Edition of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  13. Key World Energy Statistics 2013

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-08-01

    The IEA produced its first handy, pocket-sized summary of key energy data in 1997 and every year since then it has been more and more successful. Key World Energy Statistics contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts.

  14. Cryptographic Implications for Artificially Mediated Games

    CERN Document Server

    Meyer, Thomas Kellam

    2010-01-01

    There is currently an intersection in the research of game theory and cryptography. Generally speaking, there are two aspects to this partnership. First there is the application of game theory to cryptography. Yet, the purpose of this paper is to focus on the second aspect, the converse of the first, the application of cryptography to game theory. Chiefly, there exist a branch of non-cooperative games which have a correlated equilibrium as their solution. These equilibria tend to be superior to the conventional Nash equilibria. The primary condition for a correlated equilibrium is the presence of a mediator within the game. This is simply a neutral and mutually trusted entity. It is the role of the mediator to make recommendations in terms of strategy profiles to all players, who then act (supposedly) on this advice. Each party privately provides the mediator with the necessary information, and the referee responds privately with their optimized strategy set. However, there seem to be a multitude of situation...

  15. Cryptographic Techniques for Privacy Preserving Identity

    Science.gov (United States)

    2011-05-13

    information is often sufficient to match an individual to their pseudonym, for example, as in the case of the Netflix Prize movie rental dataset [71]. It was...up relying on similarities in subject matter, such as specific words related to the topic of the blog. We take the following strategies in avoiding...problems with more than two labels. Due to the very large number of labels in our case, we employ the one-versus-all strategy for reducing the problem to

  16. Cryptographically-enhanced privacy for recommender systems

    NARCIS (Netherlands)

    Jeckmans, Adrianus Johannus Paulus

    2014-01-01

    Automated recommender systems are used to help people find interesting content or persons in the vast amount of information available via the internet. There are different types of recommender systems, for example collaborative filtering systems and content-based recommender systems. However, all re

  17. The Cryptographic Schemes for Secret Images

    Directory of Open Access Journals (Sweden)

    P. Anusha

    2014-08-01

    Full Text Available Visual cryptography is one of the techniques used to encrypt the images by dividing the original image into transparencies [1]. The transparencies can be sent to the intended person, and at the other end the transparencies received person can decrypt the transparencies using our tool, thus gets the original image. Our proposed Visual cryptography provides the demonstration to the users to show how encryption and decryption can be done to the images. In this technology, the end user identifies an image, which is not the correct image. That is, while transmitting the image the sender will encrypt the image using our application here sender gets the two or more transparencies of the same image. Our application provides an option to the end user of encryption. The end user can divide the original image into number of different images. Using our application we can send encrypted images that are in the format of GIF and PNG. The encrypted transparencies can be saved in the machine and can be sent to the intended person by other means [source].

  18. Recursion vs. Replication in Simple Cryptographic Protocols

    DEFF Research Database (Denmark)

    Huttel, Hans; Srba, Jiri

    2005-01-01

    We use some recent techniques from process algebra to draw several conclusions about the well studied class of ping-pong protocols introduced by Dolev and Yao. In particular we show that all nontrivial properties, including reachability and equivalence checking wrt. the whole van Glabbeek's spect...

  19. Recursion Versus Replication in Simple Cryptographic Protocols

    DEFF Research Database (Denmark)

    Hüttel, Hans; Srba, Jiri

    2005-01-01

    We use some very recent techniques from process algebra to draw interesting conclusions about the well studied class of ping-pong protocols introduced by Dolev and Yao. In particular we show that all nontrivial properties, including reachability and equivalence checking wrt. the whole van Glabbee...

  20. Threshold Circuit Lower Bounds on Cryptographic Functions

    NARCIS (Netherlands)

    Kiltz, E.; Simon, H.U.

    2005-01-01

    In this work, we are interested in non-trivial upper bounds on the spectral norm of binary matrices $M$ from {-1, 1} $^{N × N}$. It is known that the distributed Boolean function represented by $M$ is hard to compute in various restricted models of computation if the spectral norm is bounded from ab

  1. Cryptographically Enforced Distributed Data Access Control

    NARCIS (Netherlands)

    Ibraimi, L.

    2011-01-01

    Outsourcing data storage reduces the cost of ownership. However, once data is stored on a remote server, users lose control over their sensitive data. There are two approaches to control the access to outsourced data. The first approach assumes that the outsourcee is fully trusted. This approach is

  2. On Protocol Security in the Cryptographic Model

    DEFF Research Database (Denmark)

    Nielsen, Jesper Buus

    the channels by which they communicate. A general solution to the secure multiparty computation problem is a compiler which given any feasible function describes an efficient protocol which allows the parties to compute the function securely on their local inputs over an open network. Over the past twenty...... previous approaches to the problem. Starting from an open point-to-point network there is a long way to general secure multiparty computation. The dissertation contains contributions at several points along the way. In particular we investigate how to realize secure channels. We also show how threshold...... you as possible. This is the general problem of secure multiparty computation. The usual way of formalizing the problem is to say that a number of parties who do not trust each other wish to compute some function of their local inputs, while keeping their inputs as secret as possible and guaranteeing...

  3. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    . In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...... but not the computation. Such weaker model can still be practically useful and moreover, may provide nice building-blocks to tackle full-fledged tampering in future. In this dissertation we study different models of memory-tampering and provide a number of solutions with different flavors. Mainly we took two different...

  4. Key World Energy Statistics 2012

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-07-01

    Key World Energy Statistics contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts.

  5. Grouted Connections with Shear Keys

    DEFF Research Database (Denmark)

    Pedersen, Ronnie; Jørgensen, M. B.; Damkilde, Lars

    2012-01-01

    This paper presents a finite element model in the software package ABAQUS in which a reliable analysis of grouted pile-to-sleeve connections with shear keys is the particular purpose. The model is calibrated to experimental results and a consistent set of input parameters is estimated so...

  6. Key to marine arthropod larvae

    Directory of Open Access Journals (Sweden)

    John A. Fornshell

    2012-03-01

    Full Text Available The scope of this key is restricted to the larvae of marine arthropods. The key is based solely on their morphology, patterns of body segmentation, numbers of appendages, and mode of locomotion. An effort has been made to treat all traditionally named larval forms, both planktonic and benthic. It is intended that this key be useful for a researcher working with archived museum specimens and therefore, does not include habitat information as a identifying trait, even though this information is usually available in the archived records. Within the phylum Arthropoda there are two sub-phyla and eleven classes having larval stages in the marineenvironment. Where feasible the original names of the various larval types have been used. Because this nomenclature is less commonly used today compared to the past, the more recent taxonomic affinities are included in parentheses after the original larval name. The key includes the following thirty-four larvae: Branchhiopoda nauplii; Cephalocarida nauplii; Mystacocarida nauplii; trilobite larva; protonymphon; hexapod larvae; Remipedia nauplii; nauplius - Y larvae; Cirripedia nauplii; Ascothoracida nauplii; Ostracoda nauplii; Euphausiacea nauplii; Penaeidea nauplii; Cyclopoida nauplii; Calanoida nauplii; Harpacticoida nauplii;Polyarthra nauplii; cypris larva; eryonecius larva; cypris-Y larva; elapthocaris larvae; mysis larvae; lucifer zoea; acetes zoea; acanthosoma larva; phyllosoma; antizoea larva; anomuran zoea; brachyuran zoea; calyptopis larvae; furcilia larva; crytopia larva; puerulus larva; alima larva.

  7. Key Skills Influencing Student Achievement

    Science.gov (United States)

    Balch, Tonya; Gruenert, Steve

    2009-01-01

    A predictive, non-experimental, cross-sectional design (Johnson, 2001) was used to conduct a study to determine if elementary administrators' key counseling skills and select demographics predicted state-level student performance indicators in their respective schools. A secondary purpose of this study was to develop a valid and reliable on-line…

  8. Ten Keys to the Portal

    Science.gov (United States)

    Schaffhauser, Dian

    2011-01-01

    Successful web portals help users stay informed, in touch, and up to speed. They are also a telling window into the efficiency of one's institution. To develop a cutting-edge portal takes planning, communication, and research. In this article, the author presents and discusses 10 keys to portal success: (1) make critical info visible; (2) make the…

  9. [Key informers. When and How?].

    Science.gov (United States)

    Martín González, R

    2009-03-01

    When information obtained through duly designed and developed studies is not available, the solution to certain problems that affect the population or that respond to certain questions may be approached by using the information and experience provided by the so-called key informer. The key informer is defined as a person who is in contact with the community or with the problem to be studied, who is considered to have good knowledge of the situation and therefore who is considered an expert. The search for consensus is the basis to obtain information through the key informers. The techniques used have different characteristics based on whether the experts chosen meet together or not, whether they are guided or not, whether they interact with each other or not. These techniques include the survey, the Delphi technique, the nominal group technique, brainwriting, brainstorming, the Phillips 66 technique, the 6-3-5 technique, the community forum and the community impressions technique. Information provided by key informers through the search for consensus is relevant when this is not available or cannot be obtained by other methods. It has permitted the analysis of the existing neurological care model, elaboration of recommendations on visit times for the out-patient neurological care, and the elaboration of guidelines and recommendations for the management of prevalent neurological problems.

  10. KeyPathwayMinerWeb

    DEFF Research Database (Denmark)

    List, Markus; Alcaraz, Nicolas; Dissing-Hansen, Martin;

    2016-01-01

    We present KeyPathwayMinerWeb, the first online platform for de novo pathway enrichment analysis directly in the browser. Given a biological interaction network (e.g. protein-protein interactions) and a series of molecular profiles derived from one or multiple OMICS studies (gene expression...

  11. Overview, conclusions, and key recommendations

    NARCIS (Netherlands)

    Loeber, R.; Farrington, D.P.; Howell, J.C.; Hoeve, M.; Loeber, R.; Farrington, D.P.

    2012-01-01

    Section I of this chapter summarizes the most important points of Chapters 2 to 5 and relevant portions of Chapter 10 (which concerns European issues) by addressing key findings that are relevant for juveniles’ transition of offending from adolescence (up to age 18) into adulthood. Section I focuses

  12. Key concepts in social pedagogy

    DEFF Research Database (Denmark)

    Harbo, Lotte Junker

    2011-01-01

    and activities around key social pedagogical concepts, such as the Common Third, the 3 P’s, the Zone of Proximal Development and the Learning Zone model. In the article we explore how a joint activity, for example playing soccer, can be seen as a pedagogical activity and with what intentions it is undertaken...

  13. Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting

    DEFF Research Database (Denmark)

    Hazay, Carmit; Mikkelsen, Gert Læssøe; Rabin, Tal

    2012-01-01

    The problem of generating an RSA composite in a distributed manner without leaking its factorization is particularly challenging and useful in many cryptographic protocols. Our first contribution is the first non-generic fully simulatable protocol for distributively generating an RSA composite...

  14. Practical quantum key distribution over a 48-km optical fiber network

    CERN Document Server

    Hughes, R J; Peterson, C G; Hughes, Richard J.; Morgan, George L.

    1999-01-01

    The secure distribution of the secret random bit sequences known as "key" material, is an essential precursor to their use for the encryption and decryption of confidential communications. Quantum cryptography is a new technique for secure key distribution with single-photon transmissions: Heisenberg's uncertainty principle ensures that an adversary can neither successfully tap the key transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). We have developed experimental quantum cryptography systems based on the transmission of non-orthogonal photon states to generate shared key material over multi-kilometer optical fiber paths and over line-of-sight links. In both cases, key material is built up using the transmission of a single-photon per bit of an initial secret random sequence. A quantum-mechanically random subset of this sequence is identified, becoming the key material after a data reconciliation stage with the sender. Here we report the most recent results...

  15. OCLC Search Key Usage Patterns in a Large Research Library

    Directory of Open Access Journals (Sweden)

    Kunj B. Rastogi

    1981-06-01

    Full Text Available Many libraries use the OCLC Online Union Catalog and Shared Cataloging Subsystem to perform various library functions, such as acquisitions and cataloging of library materials. As an initial part of the operations,users must search and retrieve a bibliographic record for the desired item from the large OC LC database. Various types of derived search keys are available for retrieval. This study of actual search keysentered by users of the OCLC online system was conducted to determine the types of search keys users prefer for performing various library operations and to find out whether the preferred search keys are effective.

  16. Key drivers of airline loyalty

    Science.gov (United States)

    Dolnicar, Sara; Grabler, Klaus; Grün, Bettina; Kulnig, Anna

    2011-01-01

    This study investigates drivers of airline loyalty. It contributes to the body of knowledge in the area by investigating loyalty for a number of a priori market segments identified by airline management and by using a method which accounts for the multi-step nature of the airline choice process. The study is based on responses from 687 passengers. Results indicate that, at aggregate level, frequent flyer membership, price, the status of being a national carrier and the reputation of the airline as perceived by friends are the variables which best discriminate between travellers loyal to the airline and those who are not. Differences in drivers of airline loyalty for a number of segments were identified. For example, loyalty programs play a key role for business travellers whereas airline loyalty of leisure travellers is difficult to trace back to single factors. For none of the calculated models satisfaction emerged as a key driver of airline loyalty. PMID:27064618

  17. Key drivers of airline loyalty.

    Science.gov (United States)

    Dolnicar, Sara; Grabler, Klaus; Grün, Bettina; Kulnig, Anna

    2011-10-01

    This study investigates drivers of airline loyalty. It contributes to the body of knowledge in the area by investigating loyalty for a number of a priori market segments identified by airline management and by using a method which accounts for the multi-step nature of the airline choice process. The study is based on responses from 687 passengers. Results indicate that, at aggregate level, frequent flyer membership, price, the status of being a national carrier and the reputation of the airline as perceived by friends are the variables which best discriminate between travellers loyal to the airline and those who are not. Differences in drivers of airline loyalty for a number of segments were identified. For example, loyalty programs play a key role for business travellers whereas airline loyalty of leisure travellers is difficult to trace back to single factors. For none of the calculated models satisfaction emerged as a key driver of airline loyalty.

  18. Key to Language Learning Success

    OpenAIRE

    2015-01-01

    This paper looks at the important elements of language learning and teaching i.e. the role of teachers as well as the attitude and motivation of learners. Teachers undoubtedly play crucial roles in students’ language learning outcome which could ignite or diminish students’ motivation. Positive attitudes and motivation – instrumental or integrative and intrinsic or extrinsic – are key to successful learning. Therefore it is paramount for language teachers as well as learners to know these rol...

  19. Key Questions in Thoracic Surgery

    OpenAIRE

    Subotic, Dragan R.

    2016-01-01

    This 1000-page textbook encompasses much more than the title suggests. In fact, the title “Key questions in thoracic surgery and pulmonology” would be more fitting. The specific format of the book, with precise questions and evidence-based, but equally clear answers covering all relevant fields of pulmonology and thoracic surgery, makes this 40-chapter book a “must read” not only for residents, but also for senior pulmonologists and thoracic surgeons.

  20. Innovation, Key to Lasting Success

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    @@ Oerlikon Textile will be exhibiting at ITMA ASIA 2010 in Shanghai on its 750- -plus stand C 51/C 52 in hall W2 from 22 to 26 June 2010. Highlights of the five brands under the umbrella of the textile machinery manufacturer include the new Autoconer X5 winding machine, a new FDY technology and the Era embroidery machine. Their technological innovations illustrate the slogan under which Oerlikon Textile is appearing at the show: Innovation remains the key to success.

  1. Human Resources Key Performance Indicators

    Directory of Open Access Journals (Sweden)

    Gabčanová Iveta

    2012-03-01

    Full Text Available The article brings out a proposed strategy map and respective key performance indicators (KPIs in human resources (HR. The article provides an overview of how HR activities are supported in order to reach the partial goals of HR as defined in the strategic map. Overall the aim of the paper is to show the possibilities of using the modern Balanced Scorecard method in human capital.

  2. The Security Requirement and Applicable Cryptographic Techniques on Identity Cards%身份证件的安全要求和可使用的密码学技术

    Institute of Scientific and Technical Information of China (English)

    武传坤

    2015-01-01

    Identity cards are often used in our normal life to identity someone. In many cases, identity cards are complementary but necessary documents: when someone tends to sell his/her real estate property, apart from showing the original certiifcate of the property, a valid identity card of the seller is also necessary; in the process of large amount currency withdraw from a bank account, the identity card of the withdrawer together with a valid bank card is necessary. So, in some sense, the forgery detection of many other documents can be complemented by the forgery detection of identity cards. As we know, the production of resident identity cards is a national secret; hence most people do not now know its technical detail. However, as has been shown by many instances in the information technology industry that, the information security provision via manufacturing process has great risks. So public research should be encouraged, and based on the public research outcomes, the manufacture process should combine technical means of protections. This paper tends to overview the weakness of current identity cards in detecting forgeries, discuss the security functionalities that should be possessed by identity cards, particularly by the residential identity cards, intending to explore the possibility for the cryptographic techniques to be used in identity cards, expecting to provide some reference for securer identity card production in the future.%在我们日常生活中少不了使用身份证来鉴别身份.许多情况下,身份证是辅助但又是不可或缺的证件:出售房屋除提供房屋产权证外,还需要提供卖方有效的身份证件;银行提取大额款项除提供银行卡/折外,也需要提供申请人甚至账户户主的有效身份证件.从某种意义上说,许多证件的防伪需求都没有身份证更重要.大家知道,公民身份证制作属于国家机密,一般人不知其技术细节.但是,正如许多IT行业的事例所表明的,

  3. The locks and keys to industrial biotechnology.

    Science.gov (United States)

    Wohlgemuth, Roland

    2009-04-01

    The sustainable use of resources by Nature to synthesize the required products at the right place, when they are needed, continues to be the role model for total synthesis and production in general. The combination of molecular and engineering science and technology in the biotechnological approach needs no protecting groups at all and has therefore been established for numerous large-scale routes to both natural and synthetic products in industry. The use of biobased raw materials for chemical synthesis, and the economy of molecular transformations like atom economy and step economy are of growing importance. As safety, health and environmental issues are key drivers for process improvements in the chemical industry, the development of biocatalytic reactions or pathways replacing hazardous reagents is a major focus. The integration of the biocatalytic reaction and downstream processing with product isolation has led to a variety of in situ product recovery techniques and has found numerous successful applications. With the growing collection of biocatalytic reactions, the retrosynthetic thinking can be applied to biocatalysis as well. The introduction of biocatalytic reactions is uniquely suited to cost reductions and higher quality products, as well as to more sustainable processes. The transfer of Nature's simple and robust sensing and control principles as well as its reaction and separation organization into useful technical systems can be applied to different fermentations, biotransformations and downstream processes. Biocatalyst and pathway discovery and development is the key towards new synthetic transformations in industrial biotechnology.

  4. Key Obama officials leave administration

    Science.gov (United States)

    Showstack, Randy

    2013-01-01

    Secretary of the Interior Ken Salazar is one of the latest members of the Obama administration to announce that he is leaving his position near the start of President Obama's second term in office. Salazar, who has served as interior secretary since January 2009, intends to leave the department by the end of March, the department noted on 16 January. Salazar joins a number of other key officials who are planning to leave the administration. They include Environmental Protection Agency administrator Lisa Jackson, National Oceanic and Atmospheric Administration administrator Jane Lubchenco, and U.S. Geological Survey director Marcia McNutt.

  5. Fibre Optic Communication Key Devices

    CERN Document Server

    Grote, Norbert

    2012-01-01

    The book gives an in-depth description of the key devices of current and next generation fibre optic communication networks. In particular, the book covers devices such as semiconductor lasers, optical amplifiers, modulators, wavelength filters, and detectors but the relevant properties of optical fibres as well. The presentations include the physical principles underlying the various devices, the technologies used for the realization of the different devices, typical performance characteristics and limitations, and development trends towards more advanced components are also illustrated. Thus the scope of the book spans relevant principles, state-of-the-art implementations, the status of current research and expected future components.

  6. Key paediatric messages from Amsterdam

    Directory of Open Access Journals (Sweden)

    Jonathan Grigg

    2016-04-01

    Full Text Available The Paediatric Assembly of the European Respiratory Society (ERS maintained its high profile at the 2015 ERS International Congress in Amsterdam. There were symposia on preschool wheeze, respiratory sounds and cystic fibrosis; an educational skills workshop on paediatric respiratory resuscitation; a hot topic session on risk factors and early origins of respiratory diseases; a meet the expert session on paediatric lung function test reference values; and the annual paediatric grand round. In this report the Chairs of the Paediatric Assembly's Groups highlight the key messages from the abstracts presented at the Congress.

  7. Key energy technologies for Europe

    DEFF Research Database (Denmark)

    Jørgensen, B.H.

    2005-01-01

    This report on key energy technologies is part of the work undertaken by the High-Level Expert Group to prepare a report on emerging science and technology trends and the implications for EU and Member State research policies. Senior Scientist BirteHolst Jørgensen, Risø National Laboratory......, is responsible for the report, which is based on literature studies. Post Doc Stefan Krüger Nielsen, Risø National Laboratory, has contributed to parts of the report, including the description of the IEA energyscenarios, the IEA statistics on R&D and the description of the science and technology base of biomass...

  8. Symmetric autocompensating quantum key distribution

    Science.gov (United States)

    Walton, Zachary D.; Sergienko, Alexander V.; Levitin, Lev B.; Saleh, Bahaa E. A.; Teich, Malvin C.

    2004-08-01

    We present quantum key distribution schemes which are autocompensating (require no alignment) and symmetric (Alice and Bob receive photons from a central source) for both polarization and time-bin qubits. The primary benefit of the symmetric configuration is that both Alice and Bob may have passive setups (neither Alice nor Bob is required to make active changes for each run of the protocol). We show that both the polarization and the time-bin schemes may be implemented with existing technology. The new schemes are related to previously described schemes by the concept of advanced waves.

  9. Authenticated Key Agreement in Group Settings

    Institute of Scientific and Technical Information of China (English)

    LI Ming; WANG Yong; GU Da-wu; BAI Ying-cai

    2006-01-01

    An enhanced definition of implicit key authentication and a secure group key agreement scheme from pairings are presented. This scheme combines the merits of group public key and key trees to achieve a communication-efficient and authenticated group key agreement protocol. Besides, it avoids dependence on signature or MAC by involving member's long-term keys and short-term keys in the group key. Furthermore, the idea behind this design can be employed as a general approach to extend the authenticated two-party Diffie-Hellman protocols to group settings.

  10. Key Polices for Development of Petroleum and Petrochemicals

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    @@ Recently, the State Economic and Trade Commission published the 10th Five-Year Plan (2001~2005) for the development of 13 major sectorsmachinery, automobile, light Industry,building materials, chemicals,nonferrous metals, steel, textile,petroleum, power, petrochemicals,pharmaceuticals, and coal. The key policies concerning petroleum and petrochemicals are excerpted as follows:

  11. Advanced healthcare materials

    CERN Document Server

    Tiwari, Ashutosh

    2014-01-01

    Advanced materials are attracting strong interest in the fundamental as well as applied sciences and are being extensively explored for their potential usage in a range of healthcare technological and biological applications. Advanced Healthcare Nanomaterials summarises the current status of knowledge in the fields of advanced materials for functional therapeutics, point-of-care diagnostics, translational materials, up and coming bio-engineering devices. The book highlights the key features which enable engineers to design stimuli-responsive smart nanoparticles, novel biomaterials, nan

  12. Some keys to reread authority.

    Directory of Open Access Journals (Sweden)

    Edgar Straehle

    2015-12-01

    Full Text Available This article vindicates a rereading of the concept of authority and tries to dissociate this concept from the concept of power in order to undo their identification and thereby the oblivion of the specific nature (or the history of authority. Besides, this rereading must not be confused with an apology of authority but with an exploration about this complicated and ambivalent category. The key point of this distinction lies in that authority, unlike power, depends not on itself but on the other person, the person who acknowledges another one as authority. Therefore, authority can be compatible with freedom and can appear as an exteriority of power, which undermines it or even becomes a counterpower. Hence the logical endeavours of power to monopolize and instrumentalize authority.

  13. Quantum Public-Key Cryptosystem

    Science.gov (United States)

    Luo, Ming-Xing; Chen, Xiu-Bo; Yun, Deng; Yang, Yi-Xian

    2012-03-01

    Quantum one-way functions play a fundamental role in cryptography because of its necessity for the secure encryption schemes taking into account the quantum computer. In this paper our purpose is to establish a theoretical framework for a candidate of the quantum one-way functions and quantum trapdoor functions based on one-parameter unitary groups. The dynamics of parameterized unitary groups ensure the one-wayness and quantum undistinguishability in different levels, and the physical feasibility are derived from the simultaneous approximation of its infinitesimal generators. Moreover, these special functions are used to construct new cryptosystems-the quantum public-key cryptosystems for encrypting both the classical and quantum information.

  14. Key to Language Learning Success

    Directory of Open Access Journals (Sweden)

    Oktavian Mantiri

    2015-01-01

    Full Text Available This paper looks at the important elements of language learning and teaching i.e. the role of teachers as well as the attitude and motivation of learners. Teachers undoubtedly play crucial roles in students’ language learning outcome which could ignite or diminish students’ motivation. Positive attitudes and motivation – instrumental or integrative and intrinsic or extrinsic – are key to successful learning. Therefore it is paramount for language teachers as well as learners to know these roles and nurture the best possible ways where language teaching and learning will thrive. This paper also suggested that both stake-holders should be open to holistic approach of language learning and that other factors such as the environment could play an important part in language teaching and learning success.

  15. Key Aspects of Wave Energy

    DEFF Research Database (Denmark)

    Margheritini, Lucia; Nørgaard, Jørgen Harck

    2012-01-01

    Diversification of renewable energy sources is fundamental to ensure sustainability. In this contest, wave energy can provide a substantial contribution as soon as the sector breaks into the market. In order to accelerate shift from a technology to a market focus and reduce technical and non...... be used as a breakwater therefore providing a solid structure for harbor protection; the Wave Star can be used as a base for offshore wind and photovoltaic installation in the middle of the sea, realizing an hybrid renewable energy platform. It is the authors´ believe that taking wave energy devices......-technical risks, it is critical to provide comprehensive and reliable information on the technologies without neglecting attractive advantages. It is possible to underline a different key of lecture of wave energy performance by considering efficiency and power production as well as device versatility...

  16. Applied public-key steganography

    Science.gov (United States)

    Guillon, Pierre; Furon, Teddy; Duhamel, Pierre

    2002-04-01

    We consider the problem of hiding information in a steganographic framework, i.e. embedding a binary message within an apparently innocuous content, in order to establish a suspicion-free digital communication channel. The adversary is passive as no intentional attack is foreseen. The only threat is that she discovers the presence of a hidden communication. The main goal of this article is to find if the Scalar Costa Scheme, a recently published embedding method exploiting side information at the encoder, is suitable for that framework. We justify its use assessing its security level with respect to the Cachin's criterion. We derive a public-key stego-system following the ideas of R. Anderson and P. Petitcolas. This technique is eventually applied to PCM audio contents. Experimental performances are detailed in terms of bit-rate and Kullback-Leibler distance.

  17. Fibre optic communication key devices

    CERN Document Server

    Grote, Norbert

    2017-01-01

    The book gives an in-depth description of key devices of current and next generation fibre optic communication networks. Devices treated include semiconductor lasers, optical amplifiers, modulators, wavelength filters and other passives, detectors, all-optical switches, but relevant properties of optical fibres and network aspects are included as well. The presentations include the physical principles underlying the various devices, technologies used for their realization, typical performance characteristics and limitations, but development trends towards more advanced components are also illustrated. This new edition of a successful book was expanded and updated extensively. The new edition covers among others lasers for optical communication, optical switches, hybrid integration, monolithic integration and silicon photonics. The main focus is on Indium phosphide-based structures but silicon photonics is included as well. The book covers relevant principles, state-of-the-art implementations, status of curren...

  18. New Weak Keys in RSA

    Institute of Scientific and Technical Information of China (English)

    WANG Baocang; LIU Shuanggen; HU Yupu

    2006-01-01

    The security of the RSA system with the prime pairs of some special form is investigated. A new special-purpose algorithm for factoring RSA numbers is proposed. The basic idea of the method is to factor RSA numbers by factoring a well-chosen quadratic polynomial with integral coefficients. When viewed as a general-purpose algorithm, the new algorithm has a high computational complexity. It is shown that the RSA number n=pq can be easily factored if p and q have the special form of p=as+b, q=cs+d, where a, b, c, d are relatively small numbers. Such prime pairs (p, q) are the weak keys of RSA, so when we generate RSA modulus, we should avoid using such prime pairs (p, q).

  19. Electrode materials

    Energy Technology Data Exchange (ETDEWEB)

    Amine, Khalil; Abouimrane, Ali; Belharouak, Ilias

    2017-01-31

    A process for forming a surface-treatment layer on an electroactive material includes heating the electroactive material and exposing the electroactive material to a reducing gas to form a surface-treatment layer on the electroactive material, where the surface-treatment layer is a layer of partial reduction of the electroactive material.

  20. Key energy technologies for Europe

    Energy Technology Data Exchange (ETDEWEB)

    Holst Joergensen, Birte

    2005-09-01

    The report is part of the work undertaken by the High-Level Expert Group to prepare a report on emerging science and technology trends and the implications for EU and Member State research policies. The outline of the report is: 1) In the introductory section, energy technologies are defined and for analytical reasons further narrowed down; 2) The description of the socio-economic challenges facing Europe in the energy field is based on the analysis made by the International Energy Agency going back to 1970 and with forecasts to 2030. Both the world situation and the European situation are described. This section also contains an overview of the main EU policy responses to energy. Both EU energy R and D as well as Member State energy R and D resources are described in view of international efforts; 3) The description of the science and technology base is made for selected energy technologies, including energy efficiency, biomass, hydrogen, and fuel cells, photovoltaics, clean fossil fuel technologies and CO{sub 2} capture and storage, nuclear fission and fusion. When possible, a SWOT is made for each technology and finally summarised; 4) The forward look highlights some of the key problems and uncertainties related to the future energy situation. Examples of recent energy foresights are given, including national energy foresights in Sweden and the UK as well as links to a number of regional and national foresights and roadmaps; 5) Appendix 1 contains a short description of key international organisations dealing with energy technologies and energy research. (ln)