Sample records for lower-layer cryptographic methods

  1. Developing a Standard Method for Link-Layer Security of CCSDS Space Communications

    NASA Technical Reports Server (NTRS)

    Biggerstaff, Craig

    2009-01-01

    Communications security for space systems has been a specialized field generally far removed from considerations of mission interoperability and cross-support in fact, these considerations often have been viewed as intrinsically opposed to security objectives. The space communications protocols defined by the Consultative Committee for Space Data Systems (CCSDS) have a twenty-five year history of successful use in over 400 missions. While the CCSDS Telemetry, Telecommand, and Advancing Orbiting Systems protocols for use at OSI Layer 2 are operationally mature, there has been no direct support within these protocols for communications security techniques. Link-layer communications security has been successfully implemented in the past using mission-unique methods, but never before with an objective of facilitating cross-support and interoperability. This paper discusses the design of a standard method for cryptographic authentication, encryption, and replay protection at the data link layer that can be integrated into existing CCSDS protocols without disruption to legacy communications services. Integrating cryptographic operations into existing data structures and processing sequences requires a careful assessment of the potential impediments within spacecraft, ground stations, and operations centers. The objective of this work is to provide a sound method for cryptographic encapsulation of frame data that also facilitates Layer 2 virtual channel switching, such that a mission may procure data transport services as needed without involving third parties in the cryptographic processing, or split independent data streams for separate cryptographic processing.

  2. Physically Unclonable Cryptographic Primitives by Chemical Vapor Deposition of Layered MoS2.

    PubMed

    Alharbi, Abdullah; Armstrong, Darren; Alharbi, Somayah; Shahrjerdi, Davood

    2017-12-26

    Physically unclonable cryptographic primitives are promising for securing the rapidly growing number of electronic devices. Here, we introduce physically unclonable primitives from layered molybdenum disulfide (MoS 2 ) by leveraging the natural randomness of their island growth during chemical vapor deposition (CVD). We synthesize a MoS 2 monolayer film covered with speckles of multilayer islands, where the growth process is engineered for an optimal speckle density. Using the Clark-Evans test, we confirm that the distribution of islands on the film exhibits complete spatial randomness, hence indicating the growth of multilayer speckles is a spatial Poisson process. Such a property is highly desirable for constructing unpredictable cryptographic primitives. The security primitive is an array of 2048 pixels fabricated from this film. The complex structure of the pixels makes the physical duplication of the array impossible (i.e., physically unclonable). A unique optical response is generated by applying an optical stimulus to the structure. The basis for this unique response is the dependence of the photoemission on the number of MoS 2 layers, which by design is random throughout the film. Using a threshold value for the photoemission, we convert the optical response into binary cryptographic keys. We show that the proper selection of this threshold is crucial for maximizing combination randomness and that the optimal value of the threshold is linked directly to the growth process. This study reveals an opportunity for generating robust and versatile security primitives from layered transition metal dichalcogenides.

  3. Secure method for biometric-based recognition with integrated cryptographic functions.

    PubMed

    Chiou, Shin-Yan

    2013-01-01

    Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied.

  4. Apparatus, system and method for providing cryptographic key information with physically unclonable function circuitry

    DOEpatents

    Areno, Matthew

    2015-12-08

    Techniques and mechanisms for providing a value from physically unclonable function (PUF) circuitry for a cryptographic operation of a security module. In an embodiment, a cryptographic engine receives a value from PUF circuitry and based on the value, outputs a result of a cryptographic operation to a bus of the security module. The bus couples the cryptographic engine to control logic or interface logic of the security module. In another embodiment, the value is provided to the cryptographic engine from the PUF circuitry via a signal line which is distinct from the bus, where any exchange of the value by either of the cryptographic engine and the PUF circuitry is for communication of the first value independent of the bus.

  5. Secure Method for Biometric-Based Recognition with Integrated Cryptographic Functions

    PubMed Central

    Chiou, Shin-Yan

    2013-01-01

    Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied. PMID:23762851

  6. Autonomous Byte Stream Randomizer

    NASA Technical Reports Server (NTRS)

    Paloulian, George K.; Woo, Simon S.; Chow, Edward T.

    2013-01-01

    Net-centric networking environments are often faced with limited resources and must utilize bandwidth as efficiently as possible. In networking environments that span wide areas, the data transmission has to be efficient without any redundant or exuberant metadata. The Autonomous Byte Stream Randomizer software provides an extra level of security on top of existing data encryption methods. Randomizing the data s byte stream adds an extra layer to existing data protection methods, thus making it harder for an attacker to decrypt protected data. Based on a generated crypto-graphically secure random seed, a random sequence of numbers is used to intelligently and efficiently swap the organization of bytes in data using the unbiased and memory-efficient in-place Fisher-Yates shuffle method. Swapping bytes and reorganizing the crucial structure of the byte data renders the data file unreadable and leaves the data in a deconstructed state. This deconstruction adds an extra level of security requiring the byte stream to be reconstructed with the random seed in order to be readable. Once the data byte stream has been randomized, the software enables the data to be distributed to N nodes in an environment. Each piece of the data in randomized and distributed form is a separate entity unreadable on its own right, but when combined with all N pieces, is able to be reconstructed back to one. Reconstruction requires possession of the key used for randomizing the bytes, leading to the generation of the same cryptographically secure random sequence of numbers used to randomize the data. This software is a cornerstone capability possessing the ability to generate the same cryptographically secure sequence on different machines and time intervals, thus allowing this software to be used more heavily in net-centric environments where data transfer bandwidth is limited.

  7. An Analysis of Cryptographically Significant Boolean Functions With High Correlation Immunity by Reconfigurable Computer

    DTIC Science & Technology

    2010-12-01

    with high correlation immunity and then evaluate these functions for other desirable cryptographic features. C. METHOD The only known primary methods...out if not used) # ---------------------------------- # PRIMARY = < primary file 1> < primary file 2> #SECONDARY = <secondary file 1...finding the fuction value for a //set u and for each value of v. end end

  8. A covert authentication and security solution for GMOs.

    PubMed

    Mueller, Siguna; Jafari, Farhad; Roth, Don

    2016-09-21

    Proliferation and expansion of security risks necessitates new measures to ensure authenticity and validation of GMOs. Watermarking and other cryptographic methods are available which conceal and recover the original signature, but in the process reveal the authentication information. In many scenarios watermarking and standard cryptographic methods are necessary but not sufficient and new, more advanced, cryptographic protocols are necessary. Herein, we present a new crypto protocol, that is applicable in broader settings, and embeds the authentication string indistinguishably from a random element in the signature space and the string is verified or denied without disclosing the actual signature. Results show that in a nucleotide string of 1000, the algorithm gives a correlation of 0.98 or higher between the distribution of the codon and that of E. coli, making the signature virtually invisible. This algorithm may be used to securely authenticate and validate GMOs without disclosing the actual signature. While this protocol uses watermarking, its novelty is in use of more complex cryptographic techniques based on zero knowledge proofs to encode information.

  9. Cryptographic synchronization recovery by measuring randomness of decrypted data

    DOEpatents

    Maestas, Joseph H.; Pierson, Lyndon G.

    1990-01-01

    The invention relates to synchronization of encrypted data communication systems and a method which looks for any lack of pattern or intelligent information in the received data and triggers a resynchronization signal based thereon. If the encrypter/decrypter pairs are out of cryptographic synchronization, the received (decrypted) data resembles pseudorandom data. A method and system are provided for detecting such pseudorandom binary data by, for example, ones density. If the data is sufficiently random the system is resynchronized.

  10. Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview

    NASA Astrophysics Data System (ADS)

    Zhang, Junqing; Duong, Trung; Woods, Roger; Marshall, Alan

    2017-08-01

    The security of the Internet of Things (IoT) is receiving considerable interest as the low power constraints and complexity features of many IoT devices are limiting the use of conventional cryptographic techniques. This article provides an overview of recent research efforts on alternative approaches for securing IoT wireless communications at the physical layer, specifically the key topics of key generation and physical layer encryption. These schemes can be implemented and are lightweight, and thus offer practical solutions for providing effective IoT wireless security. Future research to make IoT-based physical layer security more robust and pervasive is also covered.

  11. An adaptive cryptographic accelerator for network storage security on dynamically reconfigurable platform

    NASA Astrophysics Data System (ADS)

    Tang, Li; Liu, Jing-Ning; Feng, Dan; Tong, Wei

    2008-12-01

    Existing security solutions in network storage environment perform poorly because cryptographic operations (encryption and decryption) implemented in software can dramatically reduce system performance. In this paper we propose a cryptographic hardware accelerator on dynamically reconfigurable platform for the security of high performance network storage system. We employ a dynamic reconfigurable platform based on a FPGA to implement a PowerPCbased embedded system, which executes cryptographic algorithms. To reduce the reconfiguration latency, we apply prefetch scheduling. Moreover, the processing elements could be dynamically configured to support different cryptographic algorithms according to the request received by the accelerator. In the experiment, we have implemented AES (Rijndael) and 3DES cryptographic algorithms in the reconfigurable accelerator. Our proposed reconfigurable cryptographic accelerator could dramatically increase the performance comparing with the traditional software-based network storage systems.

  12. A novel, privacy-preserving cryptographic approach for sharing sequencing data

    PubMed Central

    Cassa, Christopher A; Miller, Rachel A; Mandl, Kenneth D

    2013-01-01

    Objective DNA samples are often processed and sequenced in facilities external to the point of collection. These samples are routinely labeled with patient identifiers or pseudonyms, allowing for potential linkage to identity and private clinical information if intercepted during transmission. We present a cryptographic scheme to securely transmit externally generated sequence data which does not require any patient identifiers, public key infrastructure, or the transmission of passwords. Materials and methods This novel encryption scheme cryptographically protects participant sequence data using a shared secret key that is derived from a unique subset of an individual’s genetic sequence. This scheme requires access to a subset of an individual’s genetic sequence to acquire full access to the transmitted sequence data, which helps to prevent sample mismatch. Results We validate that the proposed encryption scheme is robust to sequencing errors, population uniqueness, and sibling disambiguation, and provides sufficient cryptographic key space. Discussion Access to a set of an individual’s genotypes and a mutually agreed cryptographic seed is needed to unlock the full sequence, which provides additional sample authentication and authorization security. We present modest fixed and marginal costs to implement this transmission architecture. Conclusions It is possible for genomics researchers who sequence participant samples externally to protect the transmission of sequence data using unique features of an individual’s genetic sequence. PMID:23125421

  13. On Various Nonlinearity Measures for Boolean Functions*

    PubMed Central

    Boyar, Joan; Find, Magnus Gausdal; Peralta, René

    2016-01-01

    A necessary condition for the security of cryptographic functions is to be “sufficiently distant” from linear, and cryptographers have proposed several measures for this distance. In this paper, we show that six common measures, nonlinearity, algebraic degree, annihilator immunity, algebraic thickness, normality, and multiplicative complexity, are incomparable in the sense that for each pair of measures, μ1, μ2, there exist functions f1, f2 with f1 being more nonlinear than f2 according to μ1, but less nonlinear according to μ2. We also present new connections between two of these measures. Additionally, we give a lower bound on the multiplicative complexity of collision-free functions. PMID:27458499

  14. A Scheme for Obtaining Secure S-Boxes Based on Chaotic Baker's Map

    NASA Astrophysics Data System (ADS)

    Gondal, Muhammad Asif; Abdul Raheem; Hussain, Iqtadar

    2014-09-01

    In this paper, a method for obtaining cryptographically strong 8 × 8 substitution boxes (S-boxes) is presented. The method is based on chaotic baker's map and a "mini version" of a new block cipher with block size 8 bits and can be easily and efficiently performed on a computer. The cryptographic strength of some 8 × 8 S-boxes randomly produced by the method is analyzed. The results show (1) all of them are bijective; (2) the nonlinearity of each output bit of them is usually about 100; (3) all of them approximately satisfy the strict avalanche criterion and output bits independence criterion; (4) they all have an almost equiprobable input/output XOR distribution.

  15. Random sequences generation through optical measurements by phase-shifting interferometry

    NASA Astrophysics Data System (ADS)

    François, M.; Grosges, T.; Barchiesi, D.; Erra, R.; Cornet, A.

    2012-04-01

    The development of new techniques for producing random sequences with a high level of security is a challenging topic of research in modern cryptographics. The proposed method is based on the measurement by phase-shifting interferometry of the speckle signals of the interaction between light and structures. We show how the combination of amplitude and phase distributions (maps) under a numerical process can produce random sequences. The produced sequences satisfy all the statistical requirements of randomness and can be used in cryptographic schemes.

  16. A Model of Onion Routing With Provable Anonymity

    DTIC Science & Technology

    2006-08-30

    Lysyanskaya. “A Formal Treatment of Onion Routing.” CRYPTO 2005, pp. 169.187, 2005. [4] David Chaum . “The dining cryptographers problem...1988. [5] David Chaum . “Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms.” Communi- cations of the ACM, 24(2), pp. 84-88, 1981...network layer.” ACM Conference on Computer and Communications Security, pp. 193-206, 2002. [11] David Goldschlag, Michael Reed, and Paul Syverson

  17. Secure and Efficient Regression Analysis Using a Hybrid Cryptographic Framework: Development and Evaluation

    PubMed Central

    Jiang, Xiaoqian; Aziz, Md Momin Al; Wang, Shuang; Mohammed, Noman

    2018-01-01

    Background Machine learning is an effective data-driven tool that is being widely used to extract valuable patterns and insights from data. Specifically, predictive machine learning models are very important in health care for clinical data analysis. The machine learning algorithms that generate predictive models often require pooling data from different sources to discover statistical patterns or correlations among different attributes of the input data. The primary challenge is to fulfill one major objective: preserving the privacy of individuals while discovering knowledge from data. Objective Our objective was to develop a hybrid cryptographic framework for performing regression analysis over distributed data in a secure and efficient way. Methods Existing secure computation schemes are not suitable for processing the large-scale data that are used in cutting-edge machine learning applications. We designed, developed, and evaluated a hybrid cryptographic framework, which can securely perform regression analysis, a fundamental machine learning algorithm using somewhat homomorphic encryption and a newly introduced secure hardware component of Intel Software Guard Extensions (Intel SGX) to ensure both privacy and efficiency at the same time. Results Experimental results demonstrate that our proposed method provides a better trade-off in terms of security and efficiency than solely secure hardware-based methods. Besides, there is no approximation error. Computed model parameters are exactly similar to plaintext results. Conclusions To the best of our knowledge, this kind of secure computation model using a hybrid cryptographic framework, which leverages both somewhat homomorphic encryption and Intel SGX, is not proposed or evaluated to this date. Our proposed framework ensures data security and computational efficiency at the same time. PMID:29506966

  18. An Analysis of the Computer Security Ramifications of Weakened Asymmetric Cryptographic Algorithms

    DTIC Science & Technology

    2012-06-01

    OpenVPN (Yonan). TLS (and by extension SSL) obviously rely on encryption to provide the confidentiality, integrity and authentication services it...Secure Shell (SSH) Transport Layer Protocol.” IETF, Jan. 2006. <tools.ietf.org/html/rfc4253> Yonan, James, and Mattock. " OpenVPN ." SourceForge...11 May 2012. <http://sourceforge.net/projects/ openvpn /> 92 REPORT DOCUMENTATION PAGE Form Approved OMB No. 074-0188 The public reporting

  19. A cryptographic hash function based on chaotic network automata

    NASA Astrophysics Data System (ADS)

    Machicao, Jeaneth; Bruno, Odemir M.

    2017-12-01

    Chaos theory has been used to develop several cryptographic methods relying on the pseudo-random properties extracted from simple nonlinear systems such as cellular automata (CA). Cryptographic hash functions (CHF) are commonly used to check data integrity. CHF “compress” arbitrary long messages (input) into much smaller representations called hash values or message digest (output), designed to prevent the ability to reverse the hash values into the original message. This paper proposes a chaos-based CHF inspired on an encryption method based on chaotic CA rule B1357-S2468. Here, we propose an hybrid model that combines CA and networks, called network automata (CNA), whose chaotic spatio-temporal outputs are used to compute a hash value. Following the Merkle and Damgård model of construction, a portion of the message is entered as the initial condition of the network automata, so that the rest parts of messages are iteratively entered to perturb the system. The chaotic network automata shuffles the message using flexible control parameters, so that the generated hash value is highly sensitive to the message. As demonstrated in our experiments, the proposed model has excellent pseudo-randomness and sensitivity properties with acceptable performance when compared to conventional hash functions.

  20. A Double Chaotic Layer Encryption Algorithm for Clinical Signals in Telemedicine.

    PubMed

    Murillo-Escobar, M A; Cardoza-Avendaño, L; López-Gutiérrez, R M; Cruz-Hernández, C

    2017-04-01

    Recently, telemedicine offers medical services remotely via telecommunications systems and physiological monitoring devices. This scheme provides healthcare delivery services between physicians and patients conveniently, since some patients can not attend the hospital due to any reason. However, transmission of information over an insecure channel such as internet or private data storing generates a security problem. Therefore, authentication, confidentiality, and privacy are important challenges in telemedicine, where only authorized users should have access to medical or clinical records. On the other hand, chaotic systems have been implemented efficiently in cryptographic systems to provide confidential and privacy. In this work, we propose a novel symmetric encryption algorithm based on logistic map with double chaotic layer encryption (DCLE) in diffusion process and just one round of confusion-diffusion for the confidentiality and privacy of clinical information such as electrocardiograms (ECG), electroencephalograms (EEG), and blood pressure (BP) for applications in telemedicine. The clinical signals are acquired from PhysioBank data base for encryption proposes and analysis. In contrast with recent schemes in literature, we present a secure cryptographic algorithm based on chaos validated with the most complete security analysis until this time. In addition, the cryptograms are validated with the most complete pseudorandomness tests based on National Institute of Standards and Technology (NIST) 800-22 suite. All results are at MATLAB simulations and all them show the effectiveness, security, robustness, and the potential use of the proposed scheme in telemedicine.

  1. A Lightweight Protocol for Secure Video Streaming

    PubMed Central

    Morkevicius, Nerijus; Bagdonas, Kazimieras

    2018-01-01

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing “Fog Node-End Device” layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard. PMID:29757988

  2. A Lightweight Protocol for Secure Video Streaming.

    PubMed

    Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis

    2018-05-14

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.

  3. Secure and Efficient Regression Analysis Using a Hybrid Cryptographic Framework: Development and Evaluation.

    PubMed

    Sadat, Md Nazmus; Jiang, Xiaoqian; Aziz, Md Momin Al; Wang, Shuang; Mohammed, Noman

    2018-03-05

    Machine learning is an effective data-driven tool that is being widely used to extract valuable patterns and insights from data. Specifically, predictive machine learning models are very important in health care for clinical data analysis. The machine learning algorithms that generate predictive models often require pooling data from different sources to discover statistical patterns or correlations among different attributes of the input data. The primary challenge is to fulfill one major objective: preserving the privacy of individuals while discovering knowledge from data. Our objective was to develop a hybrid cryptographic framework for performing regression analysis over distributed data in a secure and efficient way. Existing secure computation schemes are not suitable for processing the large-scale data that are used in cutting-edge machine learning applications. We designed, developed, and evaluated a hybrid cryptographic framework, which can securely perform regression analysis, a fundamental machine learning algorithm using somewhat homomorphic encryption and a newly introduced secure hardware component of Intel Software Guard Extensions (Intel SGX) to ensure both privacy and efficiency at the same time. Experimental results demonstrate that our proposed method provides a better trade-off in terms of security and efficiency than solely secure hardware-based methods. Besides, there is no approximation error. Computed model parameters are exactly similar to plaintext results. To the best of our knowledge, this kind of secure computation model using a hybrid cryptographic framework, which leverages both somewhat homomorphic encryption and Intel SGX, is not proposed or evaluated to this date. Our proposed framework ensures data security and computational efficiency at the same time. ©Md Nazmus Sadat, Xiaoqian Jiang, Md Momin Al Aziz, Shuang Wang, Noman Mohammed. Originally published in JMIR Medical Informatics (http://medinform.jmir.org), 05.03.2018.

  4. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    This report contains papers on the following topics: NREN Security Issues: Policies and Technologies; Layer Wars: Protect the Internet with Network Layer Security; Electronic Commission Management; Workflow 2000 - Electronic Document Authorization in Practice; Security Issues of a UNIX PEM Implementation; Implementing Privacy Enhanced Mail on VMS; Distributed Public Key Certificate Management; Protecting the Integrity of Privacy-enhanced Electronic Mail; Practical Authorization in Large Heterogeneous Distributed Systems; Security Issues in the Truffles File System; Issues surrounding the use of Cryptographic Algorithms and Smart Card Applications; Smart Card Augmentation of Kerberos; and An Overview of the Advanced Smart Card Access Control System.more » Selected papers were processed separately for inclusion in the Energy Science and Technology Database.« less

  5. Combining Cryptography with EEG Biometrics

    PubMed Central

    Kazanavičius, Egidijus; Woźniak, Marcin

    2018-01-01

    Cryptographic frameworks depend on key sharing for ensuring security of data. While the keys in cryptographic frameworks must be correctly reproducible and not unequivocally connected to the identity of a user, in biometric frameworks this is different. Joining cryptography techniques with biometrics can solve these issues. We present a biometric authentication method based on the discrete logarithm problem and Bose-Chaudhuri-Hocquenghem (BCH) codes, perform its security analysis, and demonstrate its security characteristics. We evaluate a biometric cryptosystem using our own dataset of electroencephalography (EEG) data collected from 42 subjects. The experimental results show that the described biometric user authentication system is effective, achieving an Equal Error Rate (ERR) of 0.024.

  6. Combining Cryptography with EEG Biometrics.

    PubMed

    Damaševičius, Robertas; Maskeliūnas, Rytis; Kazanavičius, Egidijus; Woźniak, Marcin

    2018-01-01

    Cryptographic frameworks depend on key sharing for ensuring security of data. While the keys in cryptographic frameworks must be correctly reproducible and not unequivocally connected to the identity of a user, in biometric frameworks this is different. Joining cryptography techniques with biometrics can solve these issues. We present a biometric authentication method based on the discrete logarithm problem and Bose-Chaudhuri-Hocquenghem (BCH) codes, perform its security analysis, and demonstrate its security characteristics. We evaluate a biometric cryptosystem using our own dataset of electroencephalography (EEG) data collected from 42 subjects. The experimental results show that the described biometric user authentication system is effective, achieving an Equal Error Rate (ERR) of 0.024.

  7. Security of a sessional blind signature based on quantum cryptograph

    NASA Astrophysics Data System (ADS)

    Wang, Tian-Yin; Cai, Xiao-Qiu; Zhang, Rui-Ling

    2014-08-01

    We analyze the security of a sessional blind signature protocol based on quantum cryptograph and show that there are two security leaks in this protocol. One is that the legal user Alice can change the signed message after she gets a valid blind signature from the signatory Bob, and the other is that an external opponent Eve also can forge a valid blind message by a special attack, which are not permitted for blind signature. Therefore, this protocol is not secure in the sense that it does not satisfy the non-forgeability of blind signatures. We also discuss the methods to prevent the attack strategies in the end.

  8. A Secure Information Framework with APRQ Properties

    NASA Astrophysics Data System (ADS)

    Rupa, Ch.

    2017-08-01

    Internet of the things is the most trending topics in the digital world. Security issues are rampant. In the corporate or institutional setting, security risks are apparent from the outset. Market leaders are unable to use the cryptographic techniques due to their complexities. Hence many bits of private information, including ID, are readily available for third parties to see and to utilize. There is a need to decrease the complexity and increase the robustness of the cryptographic approaches. In view of this, a new cryptographic technique as good encryption pact with adjacency, random prime number and quantum code properties has been proposed. Here, encryption can be done by using quantum photons with gray code. This approach uses the concepts of physics and mathematics with no external key exchange to improve the security of the data. It also reduces the key attacks by generation of a key at the party side instead of sharing. This method makes the security more robust than with the existing approach. Important properties of gray code and quantum are adjacency property and different photons to a single bit (0 or 1). These can reduce the avalanche effect. Cryptanalysis of the proposed method shows that it is resistant to various attacks and stronger than the existing approaches.

  9. Method for exponentiating in cryptographic systems

    DOEpatents

    Brickell, Ernest F.; Gordon, Daniel M.; McCurley, Kevin S.

    1994-01-01

    An improved cryptographic method utilizing exponentiation is provided which has the advantage of reducing the number of multiplications required to determine the legitimacy of a message or user. The basic method comprises the steps of selecting a key from a preapproved group of integer keys g; exponentiating the key by an integer value e, where e represents a digital signature, to generate a value g.sup.e ; transmitting the value g.sup.e to a remote facility by a communications network; receiving the value g.sup.e at the remote facility; and verifying the digital signature as originating from the legitimate user. The exponentiating step comprises the steps of initializing a plurality of memory locations with a plurality of values g.sup.xi ; computi The United States Government has rights in this invention pursuant to Contract No. DE-AC04-76DP00789 between the Department of Energy and AT&T Company.

  10. Hardware device binding and mutual authentication

    DOEpatents

    Hamlet, Jason R; Pierson, Lyndon G

    2014-03-04

    Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

  11. A survey of noninteractive zero knowledge proof system and its applications.

    PubMed

    Wu, Huixin; Wang, Feng

    2014-01-01

    Zero knowledge proof system which has received extensive attention since it was proposed is an important branch of cryptography and computational complexity theory. Thereinto, noninteractive zero knowledge proof system contains only one message sent by the prover to the verifier. It is widely used in the construction of various types of cryptographic protocols and cryptographic algorithms because of its good privacy, authentication, and lower interactive complexity. This paper reviews and analyzes the basic principles of noninteractive zero knowledge proof system, and summarizes the research progress achieved by noninteractive zero knowledge proof system on the following aspects: the definition and related models of noninteractive zero knowledge proof system, noninteractive zero knowledge proof system of NP problems, noninteractive statistical and perfect zero knowledge, the connection between noninteractive zero knowledge proof system, interactive zero knowledge proof system, and zap, and the specific applications of noninteractive zero knowledge proof system. This paper also points out the future research directions.

  12. A cryptographic key management solution for HIPAA privacy/security regulations.

    PubMed

    Lee, W-B; Lee, C-D

    2008-01-01

    The Health Insurance Portability and Accountability Act (HIPAA) privacy and security regulations are two crucial provisions in the protection of healthcare privacy. Privacy regulations create a principle to assure that patients have more control over their health information and set limits on the use and disclosure of health information. The security regulations stipulate the provisions implemented to guard data integrity, confidentiality, and availability. Undoubtedly, the cryptographic mechanisms are well defined to provide suitable solutions. In this paper, to comply with the HIPAA regulations, a flexible cryptographic key management solution is proposed to facilitate interoperations among the applied cryptographic mechanisms. In addition, case of consent exceptions intended to facilitate emergency applications and other possible exceptions can also be handled easily.

  13. Hardware device to physical structure binding and authentication

    DOEpatents

    Hamlet, Jason R.; Stein, David J.; Bauer, Todd M.

    2013-08-20

    Detection and deterrence of device tampering and subversion may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a binding of the hardware device and a physical structure. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generate an internal PUF value. Binding logic is coupled to receive the internal PUF value, as well as an external PUF value associated with the physical structure, and generates a binding PUF value, which represents the binding of the hardware device and the physical structure. The cryptographic fingerprint unit also includes a cryptographic unit that uses the binding PUF value to allow a challenger to authenticate the binding.

  14. Physical cryptographic verification of nuclear warheads

    PubMed Central

    Kemp, R. Scott; Danagoulian, Areg; Macdonald, Ruaridh R.; Vavrek, Jayson R.

    2016-01-01

    How does one prove a claim about a highly sensitive object such as a nuclear weapon without revealing information about the object? This paradox has challenged nuclear arms control for more than five decades. We present a mechanism in the form of an interactive proof system that can validate the structure and composition of an object, such as a nuclear warhead, to arbitrary precision without revealing either its structure or composition. We introduce a tomographic method that simultaneously resolves both the geometric and isotopic makeup of an object. We also introduce a method of protecting information using a provably secure cryptographic hash that does not rely on electronics or software. These techniques, when combined with a suitable protocol, constitute an interactive proof system that could reject hoax items and clear authentic warheads with excellent sensitivity in reasonably short measurement times. PMID:27432959

  15. On protection against a bright-pulse attack in the two-pass quantum cryptography system

    NASA Astrophysics Data System (ADS)

    Balygin, K. A.; Klimov, A. N.; Korol'kov, A. V.; Kulik, S. P.; Molotkov, S. N.

    2016-06-01

    The security of keys in quantum cryptography systems, in contrast to mathematical cryptographic algorithms, is guaranteed by fundamental quantum-mechanical laws. However, the cryptographic resistance of such systems, which are distributed physical devices, fundamentally depends on the method of their implementation and particularly on the calibration and control of critical parameters. The most important parameter is the number of photons in quasi-single-photon information states in a communication channel. The sensitivity to a bright-pulse attack has been demonstrated in an explicit form for a number of systems. A method guaranteeing the resistance to such attacks has been proposed and implemented. Furthermore, the relation of physical observables used and obtained at the control of quantum states to the length of final secret keys has been obtained for the first time.

  16. Physical cryptographic verification of nuclear warheads

    NASA Astrophysics Data System (ADS)

    Kemp, R. Scott; Danagoulian, Areg; Macdonald, Ruaridh R.; Vavrek, Jayson R.

    2016-08-01

    How does one prove a claim about a highly sensitive object such as a nuclear weapon without revealing information about the object? This paradox has challenged nuclear arms control for more than five decades. We present a mechanism in the form of an interactive proof system that can validate the structure and composition of an object, such as a nuclear warhead, to arbitrary precision without revealing either its structure or composition. We introduce a tomographic method that simultaneously resolves both the geometric and isotopic makeup of an object. We also introduce a method of protecting information using a provably secure cryptographic hash that does not rely on electronics or software. These techniques, when combined with a suitable protocol, constitute an interactive proof system that could reject hoax items and clear authentic warheads with excellent sensitivity in reasonably short measurement times.

  17. Physical cryptographic verification of nuclear warheads.

    PubMed

    Kemp, R Scott; Danagoulian, Areg; Macdonald, Ruaridh R; Vavrek, Jayson R

    2016-08-02

    How does one prove a claim about a highly sensitive object such as a nuclear weapon without revealing information about the object? This paradox has challenged nuclear arms control for more than five decades. We present a mechanism in the form of an interactive proof system that can validate the structure and composition of an object, such as a nuclear warhead, to arbitrary precision without revealing either its structure or composition. We introduce a tomographic method that simultaneously resolves both the geometric and isotopic makeup of an object. We also introduce a method of protecting information using a provably secure cryptographic hash that does not rely on electronics or software. These techniques, when combined with a suitable protocol, constitute an interactive proof system that could reject hoax items and clear authentic warheads with excellent sensitivity in reasonably short measurement times.

  18. System of end-to-end symmetric database encryption

    NASA Astrophysics Data System (ADS)

    Galushka, V. V.; Aydinyan, A. R.; Tsvetkova, O. L.; Fathi, V. A.; Fathi, D. V.

    2018-05-01

    The article is devoted to the actual problem of protecting databases from information leakage, which is performed while bypassing access control mechanisms. To solve this problem, it is proposed to use end-to-end data encryption, implemented at the end nodes of an interaction of the information system components using one of the symmetric cryptographic algorithms. For this purpose, a key management method designed for use in a multi-user system based on the distributed key representation model, part of which is stored in the database, and the other part is obtained by converting the user's password, has been developed and described. In this case, the key is calculated immediately before the cryptographic transformations and is not stored in the memory after the completion of these transformations. Algorithms for registering and authorizing a user, as well as changing his password, have been described, and the methods for calculating parts of a key when performing these operations have been provided.

  19. Physical cryptographic verification of nuclear warheads

    DOE PAGES

    Kemp, R. Scott; Danagoulian, Areg; Macdonald, Ruaridh R.; ...

    2016-07-18

    How does one prove a claim about a highly sensitive object such as a nuclear weapon without revealing information about the object? This paradox has challenged nuclear arms control for more than five decades. We present a mechanism in the form of an interactive proof system that can validate the structure and composition of an object, such as a nuclear warhead, to arbitrary precision without revealing either its structure or composition. We introduce a tomographic method that simultaneously resolves both the geometric and isotopic makeup of an object. We also introduce a method of protecting information using a provably securemore » cryptographic hash that does not rely on electronics or software. Finally, these techniques, when combined with a suitable protocol, constitute an interactive proof system that could reject hoax items and clear authentic warheads with excellent sensitivity in reasonably short measurement times.« less

  20. Secure Cryptographic Key Management System (CKMS) Considerations for Smart Grid Devices

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abercrombie, Robert K; Sheldon, Frederick T; Aldridge, Hal

    2011-01-01

    In this paper, we examine some unique challenges associated with key management in the Smart Grid and concomitant research initiatives: 1) effectively model security requirements and their implementations, and 2) manage keys and key distribution for very large scale deployments such as Smart Meters over a long period of performance. This will set the stage to: 3) develop innovative, low cost methods to protect keying material, and 4) provide high assurance authentication services. We will present our perspective on key management and will discuss some key issues within the life cycle of a cryptographic key designed to achieve the following:more » 1) control systems designed, installed, operated, and maintained to survive an intentional cyber assault with no loss of critical function, and 2) widespread implementation of methods for secure communication between remote access devices and control centers that are scalable and cost-effective to deploy.« less

  1. SIMPL Systems, or: Can We Design Cryptographic Hardware without Secret Key Information?

    NASA Astrophysics Data System (ADS)

    Rührmair, Ulrich

    This paper discusses a new cryptographic primitive termed SIMPL system. Roughly speaking, a SIMPL system is a special type of Physical Unclonable Function (PUF) which possesses a binary description that allows its (slow) public simulation and prediction. Besides this public key like functionality, SIMPL systems have another advantage: No secret information is, or needs to be, contained in SIMPL systems in order to enable cryptographic protocols - neither in the form of a standard binary key, nor as secret information hidden in random, analog features, as it is the case for PUFs. The cryptographic security of SIMPLs instead rests on (i) a physical assumption on their unclonability, and (ii) a computational assumption regarding the complexity of simulating their output. This novel property makes SIMPL systems potentially immune against many known hardware and software attacks, including malware, side channel, invasive, or modeling attacks.

  2. Variable-bias coin tossing

    NASA Astrophysics Data System (ADS)

    Colbeck, Roger; Kent, Adrian

    2006-03-01

    Alice is a charismatic quantum cryptographer who believes her parties are unmissable; Bob is a (relatively) glamorous string theorist who believes he is an indispensable guest. To prevent possibly traumatic collisions of self-perception and reality, their social code requires that decisions about invitation or acceptance be made via a cryptographically secure variable-bias coin toss (VBCT). This generates a shared random bit by the toss of a coin whose bias is secretly chosen, within a stipulated range, by one of the parties; the other party learns only the random bit. Thus one party can secretly influence the outcome, while both can save face by blaming any negative decisions on bad luck. We describe here some cryptographic VBCT protocols whose security is guaranteed by quantum theory and the impossibility of superluminal signaling, setting our results in the context of a general discussion of secure two-party computation. We also briefly discuss other cryptographic applications of VBCT.

  3. Heavy-Ion Microbeam Fault Injection into SRAM-Based FPGA Implementations of Cryptographic Circuits

    NASA Astrophysics Data System (ADS)

    Li, Huiyun; Du, Guanghua; Shao, Cuiping; Dai, Liang; Xu, Guoqing; Guo, Jinlong

    2015-06-01

    Transistors hit by heavy ions may conduct transiently, thereby introducing transient logic errors. Attackers can exploit these abnormal behaviors and extract sensitive information from the electronic devices. This paper demonstrates an ion irradiation fault injection attack experiment into a cryptographic field-programmable gate-array (FPGA) circuit. The experiment proved that the commercial FPGA chip is vulnerable to low-linear energy transfer carbon irradiation, and the attack can cause the leakage of secret key bits. A statistical model is established to estimate the possibility of an effective fault injection attack on cryptographic integrated circuits. The model incorporates the effects from temporal, spatial, and logical probability of an effective attack on the cryptographic circuits. The rate of successful attack calculated from the model conforms well to the experimental results. This quantitative success rate model can help evaluate security risk for designers as well as for the third-party assessment organizations.

  4. Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network.

    PubMed

    Omala, Anyembe Andrew; Mbandu, Angolo Shem; Mutiria, Kamenyi Domenic; Jin, Chunhua; Li, Fagen

    2018-04-28

    Wireless body area network (WBAN) provides a medium through which physiological information could be harvested and transmitted to application provider (AP) in real time. Integrating WBAN in a heterogeneous Internet of Things (IoT) ecosystem would enable an AP to monitor patients from anywhere and at anytime. However, the IoT roadmap of interconnected 'Things' is still faced with many challenges. One of the challenges in healthcare is security and privacy of streamed medical data from heterogeneously networked devices. In this paper, we first propose a heterogeneous signcryption scheme where a sender is in a certificateless cryptographic (CLC) environment while a receiver is in identity-based cryptographic (IBC) environment. We then use this scheme to design a heterogeneous access control protocol. Formal security proof for indistinguishability against adaptive chosen ciphertext attack and unforgeability against adaptive chosen message attack in random oracle model is presented. In comparison with some of the existing access control schemes, our scheme has lower computation and communication cost.

  5. A Survey of Noninteractive Zero Knowledge Proof System and Its Applications

    PubMed Central

    Wu, Huixin; Wang, Feng

    2014-01-01

    Zero knowledge proof system which has received extensive attention since it was proposed is an important branch of cryptography and computational complexity theory. Thereinto, noninteractive zero knowledge proof system contains only one message sent by the prover to the verifier. It is widely used in the construction of various types of cryptographic protocols and cryptographic algorithms because of its good privacy, authentication, and lower interactive complexity. This paper reviews and analyzes the basic principles of noninteractive zero knowledge proof system, and summarizes the research progress achieved by noninteractive zero knowledge proof system on the following aspects: the definition and related models of noninteractive zero knowledge proof system, noninteractive zero knowledge proof system of NP problems, noninteractive statistical and perfect zero knowledge, the connection between noninteractive zero knowledge proof system, interactive zero knowledge proof system, and zap, and the specific applications of noninteractive zero knowledge proof system. This paper also points out the future research directions. PMID:24883407

  6. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jason L. Wright

    Finding and identifying Cryptography is a growing concern in the malware analysis community. In this paper, a heuristic method for determining the likelihood that a given function contains a cryptographic algorithm is discussed and the results of applying this method in various environments is shown. The algorithm is based on frequency analysis of opcodes that make up each function within a binary.

  7. [Linking anonymous databases for national and international multicenter epidemiological studies: a cryptographic algorithm].

    PubMed

    Quantin, C; Fassa, M; Coatrieux, G; Riandey, B; Trouessin, G; Allaert, F A

    2009-02-01

    Compiling individual records which come from different sources remains very important for multicenter epidemiological studies, but at the same time European directives or other national legislation concerning nominal data processing have to be respected. These legal aspects can be satisfied by implementing mechanisms that allow anonymization of patient data (such as hashing techniques). Moreover, for security reasons, official recommendations suggest using different cryptographic keys in combination with a cryptographic hash function for each study. Unfortunately, such an anonymization procedure is in contradiction with the common requirement in public health and biomedical research as it becomes almost impossible to link records from separate data collections where the same entity is not referenced in the same way. Solving this paradox by using methodology based on the combination of hashing and enciphering techniques is the main aim of this article. The method relies on one of the best known hashing functions (the secure hash algorithm) to ensure the anonymity of personal information while providing greater resistance to dictionary attacks, combined with encryption techniques. The originality of the method relies on the way the combination of hashing and enciphering techniques is performed: like in asymmetric encryption, two keys are used but the private key depends on the patient's identity. The combination of hashing and enciphering techniques provides a great improvement in the overall security of the proposed scheme. This methodology makes the stored data available for use in the field of public health for the benefit of patients, while respecting legal security requirements.

  8. Secure management of biomedical data with cryptographic hardware.

    PubMed

    Canim, Mustafa; Kantarcioglu, Murat; Malin, Bradley

    2012-01-01

    The biomedical community is increasingly migrating toward research endeavors that are dependent on large quantities of genomic and clinical data. At the same time, various regulations require that such data be shared beyond the initial collecting organization (e.g., an academic medical center). It is of critical importance to ensure that when such data are shared, as well as managed, it is done so in a manner that upholds the privacy of the corresponding individuals and the overall security of the system. In general, organizations have attempted to achieve these goals through deidentification methods that remove explicitly, and potentially, identifying features (e.g., names, dates, and geocodes). However, a growing number of studies demonstrate that deidentified data can be reidentified to named individuals using simple automated methods. As an alternative, it was shown that biomedical data could be shared, managed, and analyzed through practical cryptographic protocols without revealing the contents of any particular record. Yet, such protocols required the inclusion of multiple third parties, which may not always be feasible in the context of trust or bandwidth constraints. Thus, in this paper, we introduce a framework that removes the need for multiple third parties by collocating services to store and to process sensitive biomedical data through the integration of cryptographic hardware. Within this framework, we define a secure protocol to process genomic data and perform a series of experiments to demonstrate that such an approach can be run in an efficient manner for typical biomedical investigations.

  9. Secure Management of Biomedical Data With Cryptographic Hardware

    PubMed Central

    Canim, Mustafa; Kantarcioglu, Murat; Malin, Bradley

    2014-01-01

    The biomedical community is increasingly migrating toward research endeavors that are dependent on large quantities of genomic and clinical data. At the same time, various regulations require that such data be shared beyond the initial collecting organization (e.g., an academic medical center). It is of critical importance to ensure that when such data are shared, as well as managed, it is done so in a manner that upholds the privacy of the corresponding individuals and the overall security of the system. In general, organizations have attempted to achieve these goals through deidentification methods that remove explicitly, and potentially, identifying features (e.g., names, dates, and geocodes). However, a growing number of studies demonstrate that deidentified data can be reidentified to named individuals using simple automated methods. As an alternative, it was shown that biomedical data could be shared, managed, and analyzed through practical cryptographic protocols without revealing the contents of any particular record. Yet, such protocols required the inclusion of multiple third parties, which may not always be feasible in the context of trust or bandwidth constraints. Thus, in this paper, we introduce a framework that removes the need for multiple third parties by collocating services to store and to process sensitive biomedical data through the integration of cryptographic hardware. Within this framework, we define a secure protocol to process genomic data and perform a series of experiments to demonstrate that such an approach can be run in an efficient manner for typical biomedical investigations. PMID:22010157

  10. Twenty Seven Years of Quantum Cryptography!

    NASA Astrophysics Data System (ADS)

    Hughes, Richard

    2011-03-01

    One of the fundamental goals of cryptographic research is to minimize the assumptions underlying the protocols that enable secure communications between pairs or groups of users. In 1984, building on earlier research by Stephen Wiesner, Charles Bennett and Gilles Brassard showed how quantum physics could be harnessed to provide information-theoretic security for protocols such as the distribution of cryptographic keys, which enables two parties to secure their conventional communications. Bennett and Brassard and colleagues performed a proof-of-principle quantum key distribution (QKD) experiment with single-photon quantum state transmission over a 32-cm air path in 1991. This seminal experiment led other researchers to explore QKD in optical fibers and over line-of-sight outdoor atmospheric paths (``free-space''), resulting in dramatic increases in range, bit rate and security. These advances have been enabled by improvements in sources and single-photon detectors. Also in 1991 Artur Ekert showed how the security of QKD could be related to quantum entanglement. This insight led to a deeper understanding and proof of QKD security with practical sources and detectors in the presence of transmission loss and channel noise. Today, QKD has been implemented over ranges much greater than 100km in both fiber and free-space, multi-node network testbeds have been demonstrated, and satellite-based QKD is under study in several countries. ``Quantum hacking'' researchers have shown the importance of extending security considerations to the classical devices that produce and detect the photon quantum states. New quantum cryptographic protocols such as secure identification have been proposed, and others such as quantum secret splitting have been demonstrated. It is now possible to envision quantum cryptography providing a more secure alternative to present-day cryptographic methods for many secure communications functions. My talk will survey these remarkable developments.

  11. Cryptography for a High-Assurance Web-Based Enterprise

    DTIC Science & Technology

    2013-10-01

    2. Other Cryptographic services - Java provides many cryptographic services through the Java Cryptography Architecture (JCA) framework. The...id=2125 [7]. Miller, Sandra Kay, Fiber Optic Networks Vulnerable to Attack, Information Security Magazine, November 15, 2006, [8]. José R.C

  12. Classification of cognitive systems dedicated to data sharing

    NASA Astrophysics Data System (ADS)

    Ogiela, Lidia; Ogiela, Marek R.

    2017-08-01

    In this paper will be presented classification of new cognitive information systems dedicated to cryptographic data splitting and sharing processes. Cognitive processes of semantic data analysis and interpretation, will be used to describe new classes of intelligent information and vision systems. In addition, cryptographic data splitting algorithms and cryptographic threshold schemes will be used to improve processes of secure and efficient information management with application of such cognitive systems. The utility of the proposed cognitive sharing procedures and distributed data sharing algorithms will be also presented. A few possible application of cognitive approaches for visual information management and encryption will be also described.

  13. Cryptographic Securities Exchanges

    NASA Astrophysics Data System (ADS)

    Thorpe, Christopher; Parkes, David C.

    While transparency in financial markets should enhance liquidity, its exploitation by unethical and parasitic traders discourages others from fully embracing disclosure of their own information. Traders exploit both the private information in upstairs markets used to trade large orders outside traditional exchanges and the public information present in exchanges' quoted limit order books. Using homomorphic cryptographic protocols, market designers can create "partially transparent" markets in which every matched trade is provably correct and only beneficial information is revealed. In a cryptographic securities exchange, market operators can hide information to prevent its exploitation, and still prove facts about the hidden information such as bid/ask spread or market depth.

  14. Cryptography and the Internet: lessons and challenges

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McCurley, K.S.

    1996-12-31

    The popularization of the Internet has brought fundamental changes to the world, because it allows a universal method of communication between computers. This carries enormous benefits with it, but also raises many security considerations. Cryptography is a fundamental technology used to provide security of computer networks, and there is currently a widespread engineering effort to incorporate cryptography into various aspects of the Internet. The system-level engineering required to provide security services for the Internet carries some important lessons for researchers whose study is focused on narrowly defined problems. It also offers challenges to the cryptographic research community by raising newmore » questions not adequately addressed by the existing body of knowledge. This paper attempts to summarize some of these lessons and challenges for the cryptographic research community.« less

  15. Deductive Verification of Cryptographic Software

    NASA Technical Reports Server (NTRS)

    Almeida, Jose Barcelar; Barbosa, Manuel; Pinto, Jorge Sousa; Vieira, Barbara

    2009-01-01

    We report on the application of an off-the-shelf verification platform to the RC4 stream cipher cryptographic software implementation (as available in the openSSL library), and introduce a deductive verification technique based on self-composition for proving the absence of error propagation.

  16. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Christy, J. E.; Nickless, W. K.; Thiede, D. R.

    The Transport version 3 (T3) system uses the Network News Transfer Protocol (NNTP) to move data from sources to a Data Reporisoty (DR). Interested recipients subscribe to newsgroups to retrieve data. Data in transport is protected by AES-256 and RSA cryptographic services provided by the external OpenSSL cryptographic libraries.

  17. Report on Pairing-based Cryptography.

    PubMed

    Moody, Dustin; Peralta, Rene; Perlner, Ray; Regenscheid, Andrew; Roginsky, Allen; Chen, Lily

    2015-01-01

    This report summarizes study results on pairing-based cryptography. The main purpose of the study is to form NIST's position on standardizing and recommending pairing-based cryptography schemes currently published in research literature and standardized in other standard bodies. The report reviews the mathematical background of pairings. This includes topics such as pairing-friendly elliptic curves and how to compute various pairings. It includes a brief introduction to existing identity-based encryption (IBE) schemes and other cryptographic schemes using pairing technology. The report provides a complete study of the current status of standard activities on pairing-based cryptographic schemes. It explores different application scenarios for pairing-based cryptography schemes. As an important aspect of adopting pairing-based schemes, the report also considers the challenges inherent in validation testing of cryptographic algorithms and modules. Based on the study, the report suggests an approach for including pairing-based cryptography schemes in the NIST cryptographic toolkit. The report also outlines several questions that will require further study if this approach is followed.

  18. Report on Pairing-based Cryptography

    PubMed Central

    Moody, Dustin; Peralta, Rene; Perlner, Ray; Regenscheid, Andrew; Roginsky, Allen; Chen, Lily

    2015-01-01

    This report summarizes study results on pairing-based cryptography. The main purpose of the study is to form NIST’s position on standardizing and recommending pairing-based cryptography schemes currently published in research literature and standardized in other standard bodies. The report reviews the mathematical background of pairings. This includes topics such as pairing-friendly elliptic curves and how to compute various pairings. It includes a brief introduction to existing identity-based encryption (IBE) schemes and other cryptographic schemes using pairing technology. The report provides a complete study of the current status of standard activities on pairing-based cryptographic schemes. It explores different application scenarios for pairing-based cryptography schemes. As an important aspect of adopting pairing-based schemes, the report also considers the challenges inherent in validation testing of cryptographic algorithms and modules. Based on the study, the report suggests an approach for including pairing-based cryptography schemes in the NIST cryptographic toolkit. The report also outlines several questions that will require further study if this approach is followed. PMID:26958435

  19. 75 FR 52798 - State-07, Cryptographic Clearance Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-27

    ... of records, Authority for maintenance of the system, Purpose, Safeguards and Retrievability as well... INDIVIDUALS COVERED BY THE SYSTEM: All current Civil Service and Foreign Service direct hire employees of the... well as those who have already received cryptographic clearance. CATEGORIES OF RECORDS IN THE SYSTEM...

  20. Practical quantum retrieval games

    NASA Astrophysics Data System (ADS)

    Arrazola, Juan Miguel; Karasamanis, Markos; Lütkenhaus, Norbert

    2016-06-01

    Complex cryptographic protocols are often constructed from simpler building blocks. In order to advance quantum cryptography, it is important to study practical building blocks that can be used to develop new protocols. An example is quantum retrieval games (QRGs), which have broad applicability and have already been used to construct quantum money schemes. In this work, we introduce a general construction of quantum retrieval games based on the hidden matching problem and show how they can be implemented in practice using available technology. More precisely, we provide a general method to construct (1-out-of-k ) QRGs, proving that their cheating probabilities decrease exponentially in k . In particular, we define QRGs based on coherent states of light, which can be implemented even in the presence of experimental imperfections. Our results constitute a tool in the arsenal of the practical quantum cryptographer.

  1. Elliptic net and its cryptographic application

    NASA Astrophysics Data System (ADS)

    Muslim, Norliana; Said, Mohamad Rushdan Md

    2017-11-01

    Elliptic net is a generalization of elliptic divisibility sequence and in cryptography field, most cryptographic pairings that are based on elliptic curve such as Tate pairing can be improved by applying elliptic nets algorithm. The elliptic net is constructed by using n dimensional array of values in rational number satisfying nonlinear recurrence relations that arise from elliptic divisibility sequences. The two main properties hold in the recurrence relations are for all positive integers m>n, hm +nhm -n=hm +1hm -1hn2-hn +1hn -1hm2 and hn divides hm whenever n divides m. In this research, we discuss elliptic divisibility sequence associated with elliptic nets based on cryptographic perspective and its possible research direction.

  2. Cryptographer

    ERIC Educational Resources Information Center

    Sullivan, Megan

    2005-01-01

    For the general public, the field of cryptography has recently become famous as the method used to uncover secrets in Dan Brown's fictional bestseller, The Da Vinci Code. But the science of cryptography has been popular for centuries--secret hieroglyphics discovered in Egypt suggest that code-making dates back almost 4,000 years. In today's…

  3. Parallel Processable Cryptographic Methods with Unbounded Practical Security.

    ERIC Educational Resources Information Center

    Rothstein, Jerome

    Addressing the problem of protecting confidential information and data stored in computer databases from access by unauthorized parties, this paper details coding schemes which present such astronomical work factors to potential code breakers that security breaches are hopeless in any practical sense. Two procedures which can be used to encode for…

  4. Design of cryptographically secure AES like S-Box using second-order reversible cellular automata for wireless body area network applications.

    PubMed

    Gangadari, Bhoopal Rao; Rafi Ahamed, Shaik

    2016-09-01

    In biomedical, data security is the most expensive resource for wireless body area network applications. Cryptographic algorithms are used in order to protect the information against unauthorised access. Advanced encryption standard (AES) cryptographic algorithm plays a vital role in telemedicine applications. The authors propose a novel approach for design of substitution bytes (S-Box) using second-order reversible one-dimensional cellular automata (RCA 2 ) as a replacement to the classical look-up-table (LUT) based S-Box used in AES algorithm. The performance of proposed RCA 2 based S-Box and conventional LUT based S-Box is evaluated in terms of security using the cryptographic properties such as the nonlinearity, correlation immunity bias, strict avalanche criteria and entropy. Moreover, it is also shown that RCA 2 based S-Boxes are dynamic in nature, invertible and provide high level of security. Further, it is also found that the RCA 2 based S-Box have comparatively better performance than that of conventional LUT based S-Box.

  5. Design of cryptographically secure AES like S-Box using second-order reversible cellular automata for wireless body area network applications

    PubMed Central

    Rafi Ahamed, Shaik

    2016-01-01

    In biomedical, data security is the most expensive resource for wireless body area network applications. Cryptographic algorithms are used in order to protect the information against unauthorised access. Advanced encryption standard (AES) cryptographic algorithm plays a vital role in telemedicine applications. The authors propose a novel approach for design of substitution bytes (S-Box) using second-order reversible one-dimensional cellular automata (RCA2) as a replacement to the classical look-up-table (LUT) based S-Box used in AES algorithm. The performance of proposed RCA2 based S-Box and conventional LUT based S-Box is evaluated in terms of security using the cryptographic properties such as the nonlinearity, correlation immunity bias, strict avalanche criteria and entropy. Moreover, it is also shown that RCA2 based S-Boxes are dynamic in nature, invertible and provide high level of security. Further, it is also found that the RCA2 based S-Box have comparatively better performance than that of conventional LUT based S-Box. PMID:27733924

  6. The Zagora cryptograph

    NASA Astrophysics Data System (ADS)

    Coucouzeli, A.

    A unique lead seal from the well-known eighth century B.C. settlement of Zagora on the island of Andros dramatically confirms and expands our knowledge of the town planning identified at the site and constituting the earliest example of an orthogonal grid plan in the Greek world. The seal in question is decorated with a symbolic design that constitutes a rare representation of the Dioskouroi as part of the constellation Gemini. This design appears to have acted as a cryptograph enciphering the basic mathematical and astronomical principles behind the planning of Zagora. Besides offering us new insights into early Greek settlement planning, the cryptograph seems to reveal an advanced practical competence in mathematics and celestial observation, which was hitherto unsuspected for such an early period. The Zagora cryptograph also suggests that astronomy and mathematics played a crucial role in the strengthening of the ruling elite's power at Zagora in the framework of the rising city-state or polis. The tight interweaving of astronomical, mathematical, architectural and social considerations in the planning of Zagora is an entirely new discovery for Greece, whose implications are far-reaching.

  7. Quantum cryptographic system with reduced data loss

    DOEpatents

    Lo, H.K.; Chau, H.F.

    1998-03-24

    A secure method for distributing a random cryptographic key with reduced data loss is disclosed. Traditional quantum key distribution systems employ similar probabilities for the different communication modes and thus reject at least half of the transmitted data. The invention substantially reduces the amount of discarded data (those that are encoded and decoded in different communication modes e.g. using different operators) in quantum key distribution without compromising security by using significantly different probabilities for the different communication modes. Data is separated into various sets according to the actual operators used in the encoding and decoding process and the error rate for each set is determined individually. The invention increases the key distribution rate of the BB84 key distribution scheme proposed by Bennett and Brassard in 1984. Using the invention, the key distribution rate increases with the number of quantum signals transmitted and can be doubled asymptotically. 23 figs.

  8. Pseudonyms for cancer registries.

    PubMed

    Pommerening, K; Miller, M; Schmidtmann, I; Michaelis, J

    1996-06-01

    In order to conform to the rigid German legislation on data privacy and security we developed a new concept of data flow and data storage for population-based cancer registries. A special trusted office generates a pseudonym for each case by a cryptographic procedure. This office also handles the notification of cases and communicates with the reporting physicians. It passes pseudonymous records to the registration office for permanent storage. The registration office links the records according to the pseudonyms. Starting from a requirements analysis we show how to construct the pseudonyms; we then show that they meet the requirements. We discuss how the pseudonyms have to be protected by cryptographic and organizational means. A pilot study showed that the proposed procedure gives acceptable synonym and homonym error rates. The methods described are not restricted to cancer registration and may serve as a model for comparable applications in medical informatics.

  9. Security analysis of quadratic phase based cryptography

    NASA Astrophysics Data System (ADS)

    Muniraj, Inbarasan; Guo, Changliang; Malallah, Ra'ed; Healy, John J.; Sheridan, John T.

    2016-09-01

    The linear canonical transform (LCT) is essential in modeling a coherent light field propagation through first-order optical systems. Recently, a generic optical system, known as a Quadratic Phase Encoding System (QPES), for encrypting a two-dimensional (2D) image has been reported. It has been reported together with two phase keys the individual LCT parameters serve as keys of the cryptosystem. However, it is important that such the encryption systems also satisfies some dynamic security properties. Therefore, in this work, we examine some cryptographic evaluation methods, such as Avalanche Criterion and Bit Independence, which indicates the degree of security of the cryptographic algorithms on QPES. We compare our simulation results with the conventional Fourier and the Fresnel transform based DRPE systems. The results show that the LCT based DRPE has an excellent avalanche and bit independence characteristics than that of using the conventional Fourier and Fresnel based encryption systems.

  10. Choice of optical system is critical for the security of double random phase encryption systems

    NASA Astrophysics Data System (ADS)

    Muniraj, Inbarasan; Guo, Changliang; Malallah, Ra'ed; Cassidy, Derek; Zhao, Liang; Ryle, James P.; Healy, John J.; Sheridan, John T.

    2017-06-01

    The linear canonical transform (LCT) is used in modeling a coherent light-field propagation through first-order optical systems. Recently, a generic optical system, known as the quadratic phase encoding system (QPES), for encrypting a two-dimensional image has been reported. In such systems, two random phase keys and the individual LCT parameters (α,β,γ) serve as secret keys of the cryptosystem. It is important that such encryption systems also satisfy some dynamic security properties. We, therefore, examine such systems using two cryptographic evaluation methods, the avalanche effect and bit independence criterion, which indicate the degree of security of the cryptographic algorithms using QPES. We compared our simulation results with the conventional Fourier and the Fresnel transform-based double random phase encryption (DRPE) systems. The results show that the LCT-based DRPE has an excellent avalanche and bit independence characteristics compared to the conventional Fourier and Fresnel-based encryption systems.

  11. Quantum cryptographic system with reduced data loss

    DOEpatents

    Lo, Hoi-Kwong; Chau, Hoi Fung

    1998-01-01

    A secure method for distributing a random cryptographic key with reduced data loss. Traditional quantum key distribution systems employ similar probabilities for the different communication modes and thus reject at least half of the transmitted data. The invention substantially reduces the amount of discarded data (those that are encoded and decoded in different communication modes e.g. using different operators) in quantum key distribution without compromising security by using significantly different probabilities for the different communication modes. Data is separated into various sets according to the actual operators used in the encoding and decoding process and the error rate for each set is determined individually. The invention increases the key distribution rate of the BB84 key distribution scheme proposed by Bennett and Brassard in 1984. Using the invention, the key distribution rate increases with the number of quantum signals transmitted and can be doubled asymptotically.

  12. Using the Hill Cipher to Teach Cryptographic Principles

    ERIC Educational Resources Information Center

    McAndrew, Alasdair

    2008-01-01

    The Hill cipher is the simplest example of a "block cipher," which takes a block of plaintext as input, and returns a block of ciphertext as output. Although it is insecure by modern standards, its simplicity means that it is well suited for the teaching of such concepts as encryption modes, and properties of cryptographic hash functions. Although…

  13. A Software Assurance Framework for Mitigating the Risks of Malicious Software in Embedded Systems Used in Aircraft

    DTIC Science & Technology

    2011-09-01

    to show cryptographic signature # generation on a UNIX system # SHA=/bin/ sha256 CSDB=/tmp/csdb CODEBASE=. touch "$CSDB" find "$CODEBASE" -type f...artifacts generated earlier. 81 #! /bin/sh # # Demo program to show cryptographic signature # verification on a UNIX system # SHA=/bin/ sha256 CSDB=/tmp

  14. Technical Analysis of SSP-21 Protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bromberger, S.

    As part of the California Energy Systems for the Twenty-First Century (CES-21) program, in December 2016 San Diego Gas and Electric (SDG&E) contracted with Lawrence Livermore National Laboratory (LLNL) to perform an independent verification and validation (IV&V) of a white paper describing their Secure SCADA Protocol for the Twenty-First Century (SSP-21) in order to analyze the effectiveness and propriety of cryptographic protocol use within the SSP-21 specification. SSP-21 is designed to use cryptographic protocols to provide (optional) encryption, authentication, and nonrepudiation, among other capabilities. The cryptographic protocols to be used reflect current industry standards; future versions of SSP-21 will usemore » other advanced technologies to provide a subset of security services.« less

  15. Software and Critical Technology Protection Against Side-Channel Analysis Through Dynamic Hardware Obfuscation

    DTIC Science & Technology

    2011-03-01

    resampling a second time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 70 Plot of RSA bitgroup exponentiation with DAILMOM after a...14 DVFS Dynamic Voltage and Frequency Switching . . . . . . . . . . . . . . . . . . . 14 MDPL Masked Dual-Rail...algorithms to prevent whole-sale discovery of PINs and other simple methods to prevent employee tampering [5]. In time , cryptographic systems have

  16. Fundamental problems in provable security and cryptography.

    PubMed

    Dent, Alexander W

    2006-12-15

    This paper examines methods for formally proving the security of cryptographic schemes. We show that, despite many years of active research and dozens of significant results, there are fundamental problems which have yet to be solved. We also present a new approach to one of the more controversial aspects of provable security, the random oracle model.

  17. Quantum cryptography with 3-state systems.

    PubMed

    Bechmann-Pasquinucci, H; Peres, A

    2000-10-09

    We consider quantum cryptographic schemes where the carriers of information are 3-state particles. One protocol uses four mutually unbiased bases and appears to provide better security than obtainable with 2-state carriers. Another possible method allows quantum states to belong to more than one basis. Security is not better, but many curious features arise.

  18. Security Criteria for Distributed Systems: Functional Requirements.

    DTIC Science & Technology

    1995-09-01

    Open Company Limited. Ziv , J. and A. Lempel . 1977. A Universal Algorithm for Sequential Data Compression . IEEE Transactions on Information Theory Vol...3, SCF-5 DCF-7. Configurable Cryptographic Algorithms (a) It shall be possible to configure the system such that the data confidentiality functions...use different cryptographic algorithms for different protocols (e.g., mail or interprocess communication data ). (b) The modes of encryption

  19. Using Compilers to Enhance Cryptographic Product Development

    NASA Astrophysics Data System (ADS)

    Bangerter, E.; Barbosa, M.; Bernstein, D.; Damgård, I.; Page, D.; Pagter, J. I.; Sadeghi, A.-R.; Sovio, S.

    Developing high-quality software is hard in the general case, and it is significantly more challenging in the case of cryptographic software. A high degree of new skill and understanding must be learnt and applied without error to avoid vulnerability and inefficiency. This is often beyond the financial, manpower or intellectual resources avail-able. In this paper we present the motivation for the European funded CACE (Computer Aided Cryptography Engineering) project The main objective of CACE is to provide engineers (with limited or no expertise in cryptography) with a toolbox that allows them to generate robust and efficient implementations of cryptographic primitives. We also present some preliminary results already obtained in the early stages of this project, and discuss the relevance of the project as perceived by stakeholders in the mobile device arena.

  20. Secure self-calibrating quantum random-bit generator

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fiorentino, M.; Santori, C.; Spillane, S. M.

    2007-03-15

    Random-bit generators (RBGs) are key components of a variety of information processing applications ranging from simulations to cryptography. In particular, cryptographic systems require 'strong' RBGs that produce high-entropy bit sequences, but traditional software pseudo-RBGs have very low entropy content and therefore are relatively weak for cryptography. Hardware RBGs yield entropy from chaotic or quantum physical systems and therefore are expected to exhibit high entropy, but in current implementations their exact entropy content is unknown. Here we report a quantum random-bit generator (QRBG) that harvests entropy by measuring single-photon and entangled two-photon polarization states. We introduce and implement a quantum tomographicmore » method to measure a lower bound on the 'min-entropy' of the system, and we employ this value to distill a truly random-bit sequence. This approach is secure: even if an attacker takes control of the source of optical states, a secure random sequence can be distilled.« less

  1. Automatic Inference of Cryptographic Key Length Based on Analysis of Proof Tightness

    DTIC Science & Technology

    2016-06-01

    within an attack tree structure, then expand attack tree methodology to include cryptographic reductions. We then provide the algorithms for...maintaining and automatically reasoning about these expanded attack trees . We provide a software tool that utilizes machine-readable proof and attack metadata...and the attack tree methodology to provide rapid and precise answers regarding security parameters and effective security. This eliminates the need

  2. Investigation of Current State of Crytpography and Theoretical Implementation of a Cryptographic System for the Combat Service Support Control System.

    DTIC Science & Technology

    1987-05-01

    34 Advances in Crypt g: Proceedings of CRYPTO 84,r o ... .. .. _ __...o ... .. ... ....... ed. by G.R. Blakely and D. Chaum . [Wagn84b] Wagner, Neal R...in Distributed Computer Systems," IEEE Trans. on Computers, Vol. C-35, No. 7, Jul. 86, pp. 583-590. Gifford, David K., "Cryptographic Sealing for

  3. Cryptanalysis of "an improvement over an image encryption method based on total shuffling"

    NASA Astrophysics Data System (ADS)

    Akhavan, A.; Samsudin, A.; Akhshani, A.

    2015-09-01

    In the past two decades, several image encryption algorithms based on chaotic systems had been proposed. Many of the proposed algorithms are meant to improve other chaos based and conventional cryptographic algorithms. Whereas, many of the proposed improvement methods suffer from serious security problems. In this paper, the security of the recently proposed improvement method for a chaos-based image encryption algorithm is analyzed. The results indicate the weakness of the analyzed algorithm against chosen plain-text.

  4. A 3D Split Manufacturing Approach to Trustworthy System Development

    DTIC Science & Technology

    2012-12-01

    addition of any cryptographic algorithm or implementation to be included in the system as a foundry-level option. Essentially, 3D security introduces...8192 bytes). We modeled our cryptographic process after the AES algorithm , which can occupy up to 4640 bytes with an enlarged T-Box implementation [4...Reconfigurable Systems and Algorithms (ERSA), Las Vegas, NV, July 2011. [10] Intelligence Advanced Research Projects Agency (IARPA). Trusted integrated

  5. Analog Video Authentication and Seal Verification Equipment Development

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gregory Lancaster

    Under contract to the US Department of Energy in support of arms control treaty verification activities, the Savannah River National Laboratory in conjunction with the Pacific Northwest National Laboratory, the Idaho National Laboratory and Milagro Consulting, LLC developed equipment for use within a chain of custody regime. This paper discussed two specific devices, the Authentication Through the Lens (ATL) analog video authentication system and a photographic multi-seal reader. Both of these devices have been demonstrated in a field trial, and the experience gained throughout will also be discussed. Typically, cryptographic methods are used to prove the authenticity of digital imagesmore » and video used in arms control chain of custody applications. However, in some applications analog cameras are used. Since cryptographic authentication methods will not work on analog video streams, a simple method of authenticating analog video was developed and tested. A photographic multi-seal reader was developed to image different types of visual unique identifiers for use in chain of custody and authentication activities. This seal reader is unique in its ability to image various types of seals including the Cobra Seal, Reflective Particle Tags, and adhesive seals. Flicker comparison is used to compare before and after images collected with the seal reader in order to detect tampering and verify the integrity of the seal.« less

  6. Robust hashing for 3D models

    NASA Astrophysics Data System (ADS)

    Berchtold, Waldemar; Schäfer, Marcel; Rettig, Michael; Steinebach, Martin

    2014-02-01

    3D models and applications are of utmost interest in both science and industry. With the increment of their usage, their number and thereby the challenge to correctly identify them increases. Content identification is commonly done by cryptographic hashes. However, they fail as a solution in application scenarios such as computer aided design (CAD), scientific visualization or video games, because even the smallest alteration of the 3D model, e.g. conversion or compression operations, massively changes the cryptographic hash as well. Therefore, this work presents a robust hashing algorithm for 3D mesh data. The algorithm applies several different bit extraction methods. They are built to resist desired alterations of the model as well as malicious attacks intending to prevent correct allocation. The different bit extraction methods are tested against each other and, as far as possible, the hashing algorithm is compared to the state of the art. The parameters tested are robustness, security and runtime performance as well as False Acceptance Rate (FAR) and False Rejection Rate (FRR), also the probability calculation of hash collision is included. The introduced hashing algorithm is kept adaptive e.g. in hash length, to serve as a proper tool for all applications in practice.

  7. National Computer Security Conference (13th) Held in Washington, DC on 1-4 October, 1990. Procedings. Volume 1: Information Systems Security: Standards - The Key to the Future

    DTIC Science & Technology

    1990-10-04

    methods Category 6: Cryptographic methods (hard/ software ) - Tested countermeasures and standard means - Acknowledgements As the number of antivirus ...Skulason), only our own antiviruses have been mentioned in the catalog. We hope to include the major antivirus packages in the future. The current...Center GTE SRI International Trusted Information Systems, Inc. Grumann Data Systems SRI International Software Engineering Institute Trusted

  8. Superstrate sub-cell voltage-matched multijunction solar cells

    DOEpatents

    Mascarenhas, Angelo; Alberi, Kirstin

    2016-03-15

    Voltage-matched thin film multijunction solar cell and methods of producing cells having upper CdTe pn junction layers formed on a transparent substrate which in the completed device is operatively positioned in a superstate configuration. The solar cell also includes a lower pn junction formed independently of the CdTe pn junction and an insulating layer between CdTe and lower pn junctions. The voltage-matched thin film multijunction solar cells further include a parallel connection between the CdTe pn junction and lower pn junctions to form a two-terminal photonic device. Methods of fabricating devices from independently produced upper CdTe junction layers and lower junction layers are also disclosed.

  9. Cryptographic Boolean Functions with Biased Inputs

    DTIC Science & Technology

    2015-07-31

    theory of random graphs developed by Erdős and Rényi [2]. The graph properties in a random graph expressed as such Boolean functions are used by...distributed Bernoulli variates with the parameter p. Since our scope is within the area of cryptography , we initiate an analysis of cryptographic...Boolean functions with biased inputs, which we refer to as µp-Boolean functions, is a common generalization of Boolean functions which stems from the

  10. Practical Computer Security through Cryptography

    NASA Technical Reports Server (NTRS)

    McNab, David; Twetev, David (Technical Monitor)

    1998-01-01

    The core protocols upon which the Internet was built are insecure. Weak authentication and the lack of low level encryption services introduce vulnerabilities that propagate upwards in the network stack. Using statistics based on CERT/CC Internet security incident reports, the relative likelihood of attacks via these vulnerabilities is analyzed. The primary conclusion is that the standard UNIX BSD-based authentication system is by far the most commonly exploited weakness. Encryption of Sensitive password data and the adoption of cryptographically-based authentication protocols can greatly reduce these vulnerabilities. Basic cryptographic terminology and techniques are presented, with attention focused on the ways in which technology such as encryption and digital signatures can be used to protect against the most commonly exploited vulnerabilities. A survey of contemporary security software demonstrates that tools based on cryptographic techniques, such as Kerberos, ssh, and PGP, are readily available and effectively close many of the most serious security holes. Nine practical recommendations for improving security are described.

  11. Reset Tree-Based Optical Fault Detection

    PubMed Central

    Lee, Dong-Geon; Choi, Dooho; Seo, Jungtaek; Kim, Howon

    2013-01-01

    In this paper, we present a new reset tree-based scheme to protect cryptographic hardware against optical fault injection attacks. As one of the most powerful invasive attacks on cryptographic hardware, optical fault attacks cause semiconductors to misbehave by injecting high-energy light into a decapped integrated circuit. The contaminated result from the affected chip is then used to reveal secret information, such as a key, from the cryptographic hardware. Since the advent of such attacks, various countermeasures have been proposed. Although most of these countermeasures are strong, there is still the possibility of attack. In this paper, we present a novel optical fault detection scheme that utilizes the buffers on a circuit's reset signal tree as a fault detection sensor. To evaluate our proposal, we model radiation-induced currents into circuit components and perform a SPICE simulation. The proposed scheme is expected to be used as a supplemental security tool. PMID:23698267

  12. Evaluation of Information Leakage from Cryptographic Hardware via Common-Mode Current

    NASA Astrophysics Data System (ADS)

    Hayashi, Yu-Ichi; Homma, Naofumi; Mizuki, Takaaki; Sugawara, Takeshi; Kayano, Yoshiki; Aoki, Takafumi; Minegishi, Shigeki; Satoh, Akashi; Sone, Hideaki; Inoue, Hiroshi

    This paper presents a possibility of Electromagnetic (EM) analysis against cryptographic modules outside their security boundaries. The mechanism behind the information leakage is explained from the view point of Electromagnetic Compatibility: electric fluctuation released from cryptographic modules can conduct to peripheral circuits based on ground bounce, resulting in radiation. We demonstrate the consequence of the mechanism through experiments where the ISO/IEC standard block cipher AES (Advanced Encryption Standard) is implemented on an FPGA board and EM radiations from power and communication cables are measured. Correlation Electromagnetic Analysis (CEMA) is conducted in order to evaluate the information leakage. The experimental results show that secret keys are revealed even though there are various disturbing factors such as voltage regulators and AC/DC converters between the target module and the measurement points. We also discuss information-suppression techniques as electrical-level countermeasures against such CEMAs.

  13. Inkjet Printing Based Mono-layered Photonic Crystal Patterning for Anti-counterfeiting Structural Colors.

    PubMed

    Nam, Hyunmoon; Song, Kyungjun; Ha, Dogyeong; Kim, Taesung

    2016-08-04

    Photonic crystal structures can be created to manipulate electromagnetic waves so that many studies have focused on designing photonic band-gaps for various applications including sensors, LEDs, lasers, and optical fibers. Here, we show that mono-layered, self-assembled photonic crystals (SAPCs) fabricated by using an inkjet printer exhibit extremely weak structural colors and multiple colorful holograms so that they can be utilized in anti-counterfeit measures. We demonstrate that SAPC patterns on a white background are covert under daylight, such that pattern detection can be avoided, but they become overt in a simple manner under strong illumination with smartphone flash light and/or on a black background, showing remarkable potential for anti-counterfeit techniques. Besides, we demonstrate that SAPCs yield different RGB histograms that depend on viewing angles and pattern densities, thus enhancing their cryptographic capabilities. Hence, the structural colorations designed by inkjet printers would not only produce optical holograms for the simple authentication of many items and products but also enable a high-secure anti-counterfeit technique.

  14. Design and Development of Layered Security: Future Enhancements and Directions in Transmission

    PubMed Central

    Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang

    2016-01-01

    Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack. PMID:26751443

  15. Inkjet Printing Based Mono-layered Photonic Crystal Patterning for Anti-counterfeiting Structural Colors

    NASA Astrophysics Data System (ADS)

    Nam, Hyunmoon; Song, Kyungjun; Ha, Dogyeong; Kim, Taesung

    2016-08-01

    Photonic crystal structures can be created to manipulate electromagnetic waves so that many studies have focused on designing photonic band-gaps for various applications including sensors, LEDs, lasers, and optical fibers. Here, we show that mono-layered, self-assembled photonic crystals (SAPCs) fabricated by using an inkjet printer exhibit extremely weak structural colors and multiple colorful holograms so that they can be utilized in anti-counterfeit measures. We demonstrate that SAPC patterns on a white background are covert under daylight, such that pattern detection can be avoided, but they become overt in a simple manner under strong illumination with smartphone flash light and/or on a black background, showing remarkable potential for anti-counterfeit techniques. Besides, we demonstrate that SAPCs yield different RGB histograms that depend on viewing angles and pattern densities, thus enhancing their cryptographic capabilities. Hence, the structural colorations designed by inkjet printers would not only produce optical holograms for the simple authentication of many items and products but also enable a high-secure anti-counterfeit technique.

  16. Design and Development of Layered Security: Future Enhancements and Directions in Transmission.

    PubMed

    Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang

    2016-01-06

    Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack.

  17. SSL/TLS Vulnerability Detection Using Black Box Approach

    NASA Astrophysics Data System (ADS)

    Gunawan, D.; Sitorus, E. H.; Rahmat, R. F.; Hizriadi, A.

    2018-03-01

    Socket Secure Layer (SSL) and Transport Layer Security (TLS) are cryptographic protocols that provide data encryption to secure the communication over a network. However, in some cases, there are vulnerability found in the implementation of SSL/TLS because of weak cipher key, certificate validation error or session handling error. One of the most vulnerable SSL/TLS bugs is heartbleed. As the security is essential in data communication, this research aims to build a scanner that detect the SSL/TLS vulnerability by using black box approach. This research will focus on heartbleed case. In addition, this research also gathers information about existing SSL in the server. The black box approach is used to test the output of a system without knowing the process inside the system itself. For testing purpose, this research scanned websites and found that some of the websites still have SSL/TLS vulnerability. Thus, the black box approach can be used to detect the vulnerability without considering the source code and the process inside the application.

  18. Evaluating privacy-preserving record linkage using cryptographic long-term keys and multibit trees on large medical datasets.

    PubMed

    Brown, Adrian P; Borgs, Christian; Randall, Sean M; Schnell, Rainer

    2017-06-08

    Integrating medical data using databases from different sources by record linkage is a powerful technique increasingly used in medical research. Under many jurisdictions, unique personal identifiers needed for linking the records are unavailable. Since sensitive attributes, such as names, have to be used instead, privacy regulations usually demand encrypting these identifiers. The corresponding set of techniques for privacy-preserving record linkage (PPRL) has received widespread attention. One recent method is based on Bloom filters. Due to superior resilience against cryptographic attacks, composite Bloom filters (cryptographic long-term keys, CLKs) are considered best practice for privacy in PPRL. Real-world performance of these techniques using large-scale data is unknown up to now. Using a large subset of Australian hospital admission data, we tested the performance of an innovative PPRL technique (CLKs using multibit trees) against a gold-standard derived from clear-text probabilistic record linkage. Linkage time and linkage quality (recall, precision and F-measure) were evaluated. Clear text probabilistic linkage resulted in marginally higher precision and recall than CLKs. PPRL required more computing time but 5 million records could still be de-duplicated within one day. However, the PPRL approach required fine tuning of parameters. We argue that increased privacy of PPRL comes with the price of small losses in precision and recall and a large increase in computational burden and setup time. These costs seem to be acceptable in most applied settings, but they have to be considered in the decision to apply PPRL. Further research on the optimal automatic choice of parameters is needed.

  19. Thickness dependence of the levitation performance of double-layer high-temperature superconductor bulks above a magnetic rail

    NASA Astrophysics Data System (ADS)

    Sun, R. X.; Zheng, J.; Liao, X. L.; Che, T.; Gou, Y. F.; He, D. B.; Deng, Z. G.

    2014-10-01

    A double-layer high-temperature superconductor (HTSC) arrangement was proposed and proved to be able to bring improvements to both levitation force and guidance force compared with present single-layer HTSC arrangement. To fully exploit the applied magnetic field by a magnetic rail, the thickness dependence of a double-layer HTSC arrangement on the levitation performance was further investigated in the paper. In this study, the lower-layer bulk was polished step by step to different thicknesses, and the upper-layer bulk with constant thickness was directly superimposed on the lower-layer one. The levitation force and the force relaxation of the double-layer HTSC arrangement were measured above a Halbach magnetic rail. Experimental result shows that a bigger levitation force and a less levitation force decay could be achieved by optimizing the thickness of the lower-layer bulk HTSC. This thickness optimization method could be applied together with former reported double-layer HTSC arrangement method with aligned growth sector boundaries pattern. This series of study on the optimized combination method do bring a significant improvement on the levitation performance of present HTS maglev systems.

  20. System and method for key generation in security tokens

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Evans, Philip G.; Humble, Travis S.; Paul, Nathanael R.

    Functional randomness in security tokens (FRIST) may achieve improved security in two-factor authentication hardware tokens by improving on the algorithms used to securely generate random data. A system and method in one embodiment according to the present invention may allow for security of a token based on storage cost and computational security. This approach may enable communication where security is no longer based solely on onetime pads (OTPs) generated from a single cryptographic function (e.g., SHA-256).

  1. Design and fabrication of a multi-layered solid dynamic phantom: validation platform on methods for reducing scalp-hemodynamic effect from fNIRS signal

    NASA Astrophysics Data System (ADS)

    Kawaguchi, Hiroshi; Tanikawa, Yukari; Yamada, Toru

    2017-02-01

    Scalp hemodynamics contaminates the signals from functional near-infrared spectroscopy (fNIRS). Numerous methods have been proposed to reduce this contamination, but no golden standard has yet been established. Here we constructed a multi-layered solid phantom to experimentally validate such methods. This phantom comprises four layers corresponding to epidermides, dermis/skull (upper dynamic layer), cerebrospinal fluid and brain (lower dynamic layer) and the thicknesses of these layers were 0.3, 10, 1, and 50 mm, respectively. The epidermides and cerebrospinal fluid layers were made of polystyrene and an acrylic board, respectively. Both of these dynamic layers were made of epoxy resin. An infrared dye and titanium dioxide were mixed to match their absorption and reduced scattering coefficients (μa and μs', respectively) with those of biological tissues. The bases of both upper and lower dynamic layers have a slot for laterally sliding a bar that holds an absorber piece. This bar was laterally moved using a programmable stepping motor. The optical properties of dynamic layers were estimated based on the transmittance and reflectance using the Monte Carlo look-up table method. The estimated coefficients for lower and upper dynamic layers approximately coincided with those for biological tissues. We confirmed that the preliminary fNIRS measurement using the fabricated phantom showed that the signals from the brain layer were recovered if those from the dermis layer were completely removed from their mixture, indicating that the phantom is useful for evaluating methods for reducing the contamination of the signals from the scalp.

  2. Secure Embedded System Design Methodologies for Military Cryptographic Systems

    DTIC Science & Technology

    2016-03-31

    Fault- Tree Analysis (FTA); Built-In Self-Test (BIST) Introduction Secure access-control systems restrict operations to authorized users via methods...failures in the individual software/processor elements, the question of exactly how unlikely is difficult to answer. Fault- Tree Analysis (FTA) has a...Collins of Sandia National Laboratories for years of sharing his extensive knowledge of Fail-Safe Design Assurance and Fault- Tree Analysis

  3. Using Temporal Logic to Specify and Verify Cryptographic Protocols (Progress Report)

    DTIC Science & Technology

    1995-01-01

    know, Meadows’ 1Supported by grant HKUST 608/94E from the Hong Kong Research Grants Council. 1 Report Documentation Page Form ApprovedOMB No. 0704... 1 Introduction We have started work on a project to apply temporal logic to reason about cryptographic protocols. Some of the goals of the project...are as follows. 1 . Allow the user to state and prove that the penetrator cannot use logical or algebraic techniques (e.g., we are disregarding

  4. Hybrid ququart-encoded quantum cryptography protected by Kochen-Specker contextuality

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cabello, Adan; Department of Physics, Stockholm University, S-10691 Stockholm; D'Ambrosio, Vincenzo

    2011-09-15

    Quantum cryptographic protocols based on complementarity are not secure against attacks in which complementarity is imitated with classical resources. The Kochen-Specker (KS) theorem provides protection against these attacks, without requiring entanglement or spatially separated composite systems. We analyze the maximum tolerated noise to guarantee the security of a KS-protected cryptographic scheme against these attacks and describe a photonic realization of this scheme using hybrid ququarts defined by the polarization and orbital angular momentum of single photons.

  5. Identifying genetic relatives without compromising privacy

    PubMed Central

    He, Dan; Furlotte, Nicholas A.; Hormozdiari, Farhad; Joo, Jong Wha J.; Wadia, Akshay; Ostrovsky, Rafail; Sahai, Amit; Eskin, Eleazar

    2014-01-01

    The development of high-throughput genomic technologies has impacted many areas of genetic research. While many applications of these technologies focus on the discovery of genes involved in disease from population samples, applications of genomic technologies to an individual’s genome or personal genomics have recently gained much interest. One such application is the identification of relatives from genetic data. In this application, genetic information from a set of individuals is collected in a database, and each pair of individuals is compared in order to identify genetic relatives. An inherent issue that arises in the identification of relatives is privacy. In this article, we propose a method for identifying genetic relatives without compromising privacy by taking advantage of novel cryptographic techniques customized for secure and private comparison of genetic information. We demonstrate the utility of these techniques by allowing a pair of individuals to discover whether or not they are related without compromising their genetic information or revealing it to a third party. The idea is that individuals only share enough special-purpose cryptographically protected information with each other to identify whether or not they are relatives, but not enough to expose any information about their genomes. We show in HapMap and 1000 Genomes data that our method can recover first- and second-order genetic relationships and, through simulations, show that our method can identify relationships as distant as third cousins while preserving privacy. PMID:24614977

  6. Identifying genetic relatives without compromising privacy.

    PubMed

    He, Dan; Furlotte, Nicholas A; Hormozdiari, Farhad; Joo, Jong Wha J; Wadia, Akshay; Ostrovsky, Rafail; Sahai, Amit; Eskin, Eleazar

    2014-04-01

    The development of high-throughput genomic technologies has impacted many areas of genetic research. While many applications of these technologies focus on the discovery of genes involved in disease from population samples, applications of genomic technologies to an individual's genome or personal genomics have recently gained much interest. One such application is the identification of relatives from genetic data. In this application, genetic information from a set of individuals is collected in a database, and each pair of individuals is compared in order to identify genetic relatives. An inherent issue that arises in the identification of relatives is privacy. In this article, we propose a method for identifying genetic relatives without compromising privacy by taking advantage of novel cryptographic techniques customized for secure and private comparison of genetic information. We demonstrate the utility of these techniques by allowing a pair of individuals to discover whether or not they are related without compromising their genetic information or revealing it to a third party. The idea is that individuals only share enough special-purpose cryptographically protected information with each other to identify whether or not they are relatives, but not enough to expose any information about their genomes. We show in HapMap and 1000 Genomes data that our method can recover first- and second-order genetic relationships and, through simulations, show that our method can identify relationships as distant as third cousins while preserving privacy.

  7. A noise-immune cryptographic information protection method for facsimile information transmission and the realization algorithms

    NASA Astrophysics Data System (ADS)

    Krasilenko, Vladimir G.; Bardachenko, Vitaliy F.; Nikolsky, Alexander I.; Lazarev, Alexander A.; Ogorodnik, Konstantin V.

    2006-04-01

    We analyse the existent methods of cryptographic defence for the facsimile information transfer, consider their shortcomings and prove the necessity of better information protection degree. The method of information protection that is based on presentation of input data as images is proposed. We offer a new noise-immune algorithm for realization of this method which consists in transformation of an input frame by pixels transposition according to an entered key. At decoding mode the reverse transformation of image with the use of the same key is used. Practical realization of the given method takes into account noise in the transmission channels and information distortions by scanners, faxes and others like that. We show that the given influences are reduced to the transformation of the input image coordinates. We show the algorithm in detail and consider its basic steps. We show the possibility of the offered method by the means of the developed software. The realized algorithm corrects curvature of frames: turn, scaling, fallout of pixels and others like that. At low noise level (loss of pixel information less than 10 percents) it is possible to encode, transfer and decode any types of images and texts with 12-size font character. The software filters for information restore and noise removing allow to transfer fax data with 30 percents pixels loss at 18-size font text. This percent of data loss can be considerably increased by the use of the software character recognition block that can be realized on fuzzy-neural algorithms. Examples of encoding and decryption of images and texts are shown.

  8. Biased decoy-state measurement-device-independent quantum cryptographic conferencing with finite resources.

    PubMed

    Chen, RuiKe; Bao, WanSu; Zhou, Chun; Li, Hongwei; Wang, Yang; Bao, HaiZe

    2016-03-21

    In recent years, a large quantity of work have been done to narrow the gap between theory and practice in quantum key distribution (QKD). However, most of them are focus on two-party protocols. Very recently, Yao Fu et al proposed a measurement-device-independent quantum cryptographic conferencing (MDI-QCC) protocol and proved its security in the limit of infinitely long keys. As a step towards practical application for MDI-QCC, we design a biased decoy-state measurement-device-independent quantum cryptographic conferencing protocol and analyze the performance of the protocol in both the finite-key and infinite-key regime. From numerical simulations, we show that our decoy-state analysis is tighter than Yao Fu et al. That is, we can achieve the nonzero asymptotic secret key rate in long distance with approximate to 200km and we also demonstrate that with a finite size of data (say 1011 to 1013 signals) it is possible to perform secure MDI-QCC over reasonable distances.

  9. Formal Methods for Cryptographic Protocol Analysis: Emerging Issues and Trends

    DTIC Science & Technology

    2003-01-01

    signatures , which depend upon the homomor- phic properties of RSA. Other algorithms and data structures, such as Chaum mixes [17], designed for...Communications Security, pages 176–185. ACM, Novem- ber 2001. [17] D. Chaum . Untraceable electronic mail, return addresses and digital signatures ...something like the Diffie- Hellman algorithm, which depends, as a minimum, on the commutative properties of exponentiation, or something like Chaum’s blinded

  10. Practical Quantum Cryptography for Secure Free-Space Communications

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Buttler, W.T.; Hughes, R.J.; Kwiat, P.G.

    1999-02-01

    Quantum cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. The security of these transmissions is based on the inviolability of the laws of quantum mechanics and information-theoretically secure post-processing methods. An adversary can neither successfully tap the quantum transmissions, nor evade detection, owing to Heisenberg's uncertainty principle. In this paper we describe the theory of quantum cryptography, and the most recent results from our experimental free-space system with which we have demonstrated for the first time the feasibility of quantum key generation overmore » a point-to-point outdoor atmospheric path in daylight. We achieved a transmission distance of 0.5 km, which was limited only by the length of the test range. Our results provide strong evidence that cryptographic key material could be generated on demand between a ground station and a satellite (or between two satellites), allowing a satellite to be securely re-keyed on orbit. We present a feasibility analysis of surface-to-satellite quantum key generation.« less

  11. FREE-SPACE QUANTUM CRYPTOGRAPHY IN DAYLIGHT

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hughes, R.J.; Buttler, W.T.

    2000-01-01

    Quantum cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. The security of these transmissions is based on the inviolability of the laws of quantum mechanics and information-theoretically secure post-processing methods. An adversary can neither successfully tap the quantum transmissions, nor evade detection, owing to Heisenberg's uncertainty principle. In this paper we describe the theory of quantum cryptography, and the most recent results from our experimental free-space system with which we have demonstrated for the first time the feasibility of quantum key generation overmore » a point-to-point outdoor atmospheric path in daylight. We achieved a transmission distance of 0.5 km, which was limited only by the length of the test range. Our results provide strong evidence that cryptographic key material could be generated on demand between a ground station and a satellite (or between two satellites), allowing a satellite to be securely re-keyed on orbit. We present a feasibility analysis of surface-to-satellite quantum key generation.« less

  12. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jason L. Wright; Milos Manic

    Time synchronization and event time correlation are important in wireless sensor networks. In particular, time is used to create a sequence events or time line to answer questions of cause and effect. Time is also used as a basis for determining the freshness of received packets and the validity of cryptographic certificates. This paper presents secure method of time synchronization and event time correlation for TESLA-based hierarchical wireless sensor networks. The method demonstrates that events in a TESLA network can be accurately timestamped by adding only a few pieces of data to the existing protocol.

  13. Inkjet Printing Based Mono-layered Photonic Crystal Patterning for Anti-counterfeiting Structural Colors

    PubMed Central

    Nam, Hyunmoon; Song, Kyungjun; Ha, Dogyeong; Kim, Taesung

    2016-01-01

    Photonic crystal structures can be created to manipulate electromagnetic waves so that many studies have focused on designing photonic band-gaps for various applications including sensors, LEDs, lasers, and optical fibers. Here, we show that mono-layered, self-assembled photonic crystals (SAPCs) fabricated by using an inkjet printer exhibit extremely weak structural colors and multiple colorful holograms so that they can be utilized in anti-counterfeit measures. We demonstrate that SAPC patterns on a white background are covert under daylight, such that pattern detection can be avoided, but they become overt in a simple manner under strong illumination with smartphone flash light and/or on a black background, showing remarkable potential for anti-counterfeit techniques. Besides, we demonstrate that SAPCs yield different RGB histograms that depend on viewing angles and pattern densities, thus enhancing their cryptographic capabilities. Hence, the structural colorations designed by inkjet printers would not only produce optical holograms for the simple authentication of many items and products but also enable a high-secure anti-counterfeit technique. PMID:27487978

  14. Quantum cryptography using coherent states: Randomized encryption and key generation

    NASA Astrophysics Data System (ADS)

    Corndorf, Eric

    With the advent of the global optical-telecommunications infrastructure, an increasing number of individuals, companies, and agencies communicate information with one another over public networks or physically-insecure private networks. While the majority of the traffic flowing through these networks requires little or no assurance of secrecy, the same cannot be said for certain communications between banks, between government agencies, within the military, and between corporations. In these arenas, the need to specify some level of secrecy in communications is a high priority. While the current approaches to securing sensitive information (namely the public-key-cryptography infrastructure and deterministic private-key ciphers like AES and 3DES) seem to be cryptographically strong based on empirical evidence, there exist no mathematical proofs of secrecy for any widely deployed cryptosystem. As an example, the ubiquitous public-key cryptosystems infer all of their secrecy from the assumption that factoring of the product of two large primes is necessarily time consuming---something which has not, and perhaps cannot, be proven. Since the 1980s, the possibility of using quantum-mechanical features of light as a physical mechanism for satisfying particular cryptographic objectives has been explored. This research has been fueled by the hopes that cryptosystems based on quantum systems may provide provable levels of secrecy which are at least as valid as quantum mechanics itself. Unfortunately, the most widely considered quantum-cryptographic protocols (BB84 and the Ekert protocol) have serious implementation problems. Specifically, they require quantum-mechanical states which are not readily available, and they rely on unproven relations between intrusion-level detection and the information available to an attacker. As a result, the secrecy level provided by these experimental implementations is entirely unspecified. In an effort to provably satisfy the cryptographic objectives of key generation and direct data-encryption, a new quantum cryptographic principle is demonstrated wherein keyed coherent-state signal sets are employed. Taking advantage of the fundamental and irreducible quantum-measurement noise of coherent states, these schemes do not require the users to measure the influence of an attacker. Experimental key-generation and data encryption schemes based on these techniques, which are compatible with today's WDM fiber-optic telecommunications infrastructure, are implemented and analyzed.

  15. A cryptologic based trust center for medical images.

    PubMed

    Wong, S T

    1996-01-01

    To investigate practical solutions that can integrate cryptographic techniques and picture archiving and communication systems (PACS) to improve the security of medical images. The PACS at the University of California San Francisco Medical Center consolidate images and associated data from various scanners into a centralized data archive and transmit them to remote display stations for review and consultation purposes. The purpose of this study is to investigate the model of a digital trust center that integrates cryptographic algorithms and protocols seamlessly into such a digital radiology environment to improve the security of medical images. The timing performance of encryption, decryption, and transmission of the cryptographic protocols over 81 volumetric PACS datasets has been measured. Lossless data compression is also applied before the encryption. The transmission performance is measured against three types of networks of different bandwidths: narrow-band Integrated Services Digital Network, Ethernet, and OC-3c Asynchronous Transfer Mode. The proposed digital trust center provides a cryptosystem solution to protect the confidentiality and to determine the authenticity of digital images in hospitals. The results of this study indicate that diagnostic images such as x-rays and magnetic resonance images could be routinely encrypted in PACS. However, applying encryption in teleradiology and PACS is a tradeoff between communications performance and security measures. Many people are uncertain about how to integrate cryptographic algorithms coherently into existing operations of the clinical enterprise. This paper describes a centralized cryptosystem architecture to ensure image data authenticity in a digital radiology department. The system performance has been evaluated in a hospital-integrated PACS environment.

  16. A cryptologic based trust center for medical images.

    PubMed Central

    Wong, S T

    1996-01-01

    OBJECTIVE: To investigate practical solutions that can integrate cryptographic techniques and picture archiving and communication systems (PACS) to improve the security of medical images. DESIGN: The PACS at the University of California San Francisco Medical Center consolidate images and associated data from various scanners into a centralized data archive and transmit them to remote display stations for review and consultation purposes. The purpose of this study is to investigate the model of a digital trust center that integrates cryptographic algorithms and protocols seamlessly into such a digital radiology environment to improve the security of medical images. MEASUREMENTS: The timing performance of encryption, decryption, and transmission of the cryptographic protocols over 81 volumetric PACS datasets has been measured. Lossless data compression is also applied before the encryption. The transmission performance is measured against three types of networks of different bandwidths: narrow-band Integrated Services Digital Network, Ethernet, and OC-3c Asynchronous Transfer Mode. RESULTS: The proposed digital trust center provides a cryptosystem solution to protect the confidentiality and to determine the authenticity of digital images in hospitals. The results of this study indicate that diagnostic images such as x-rays and magnetic resonance images could be routinely encrypted in PACS. However, applying encryption in teleradiology and PACS is a tradeoff between communications performance and security measures. CONCLUSION: Many people are uncertain about how to integrate cryptographic algorithms coherently into existing operations of the clinical enterprise. This paper describes a centralized cryptosystem architecture to ensure image data authenticity in a digital radiology department. The system performance has been evaluated in a hospital-integrated PACS environment. PMID:8930857

  17. Token-based information security for commercial and federal information networks

    NASA Astrophysics Data System (ADS)

    Rohland, William S.

    1996-03-01

    The planning of cryptographic solutions for messaging and electronic commerce applications in the United States during the past few years has been motivated by a high level of interest in the technology on the part of potential users. It has been marked by a high level of controversy over algorithms, patent rights and escrow policy. The diverse needs of the government and commercial sectors have led to mutually exclusive solutions based on different algorithms and policy; this phenomenon is fairly unique to the United States. Because of the strong requirement to preserve the differences that make these solutions unique for the two environments, the near-term evolution of a single standard appears unlikely. Furthermore, the need on the part of some government agencies and some commercial establishments exists to operate in both environments. This paper deals with the technical definition and design approach to a dual-use cryptographic device and the migration paths to the dual-use device from both environments. Such a device is further considered as a component of a secure cryptographic translation facility.

  18. WLC Preface

    NASA Astrophysics Data System (ADS)

    Miret, Josep M.; Sebé, Francesc

    Low-cost devices are the key component of several applications: RFID tags permit an automated supply chain management while smart cards are a secure means of storing cryptographic keys required for remote and secure authentication in e-commerce and e-government applications. These devices must be cheap in order to permit their cost-effective massive manufacturing and deployment. Unfortunately, their low cost limits their computational power. Other devices such as nodes of sensor networks suffer from an additional constraint, namely, their limited battery life. Secure applications designed for these devices cannot make use of classical cryptographic primitives designed for full-fledged computers.

  19. Post-quantum cryptography.

    PubMed

    Bernstein, Daniel J; Lange, Tanja

    2017-09-13

    Cryptography is essential for the security of online communication, cars and implanted medical devices. However, many commonly used cryptosystems will be completely broken once large quantum computers exist. Post-quantum cryptography is cryptography under the assumption that the attacker has a large quantum computer; post-quantum cryptosystems strive to remain secure even in this scenario. This relatively young research area has seen some successes in identifying mathematical operations for which quantum algorithms offer little advantage in speed, and then building cryptographic systems around those. The central challenge in post-quantum cryptography is to meet demands for cryptographic usability and flexibility without sacrificing confidence.

  20. Post-quantum cryptography

    NASA Astrophysics Data System (ADS)

    Bernstein, Daniel J.; Lange, Tanja

    2017-09-01

    Cryptography is essential for the security of online communication, cars and implanted medical devices. However, many commonly used cryptosystems will be completely broken once large quantum computers exist. Post-quantum cryptography is cryptography under the assumption that the attacker has a large quantum computer; post-quantum cryptosystems strive to remain secure even in this scenario. This relatively young research area has seen some successes in identifying mathematical operations for which quantum algorithms offer little advantage in speed, and then building cryptographic systems around those. The central challenge in post-quantum cryptography is to meet demands for cryptographic usability and flexibility without sacrificing confidence.

  1. Lower limits of spin detection efficiency for two-parameter two-qubit (TPTQ) states with non-ideal ferromagnetic detectors

    NASA Astrophysics Data System (ADS)

    Majd, Nayereh; Ghasemi, Zahra

    2016-10-01

    We have investigated a TPTQ state as an input state of a non-ideal ferromagnetic detectors. Minimal spin polarization required to demonstrate spin entanglement according to entanglement witness and CHSH inequality with respect to (w.r.t.) their two free parameters have been found, and we have numerically shown that the entanglement witness is less stringent than the direct tests of Bell's inequality in the form of CHSH in the entangled limits of its free parameters. In addition, the lower limits of spin detection efficiency fulfilling secure cryptographic key against eavesdropping have been derived. Finally, we have considered TPTQ state as an output of spin decoherence channel and the region of ballistic transmission time w.r.t. spin relaxation time and spin dephasing time has been found.

  2. Selective etching of silicon carbide films

    DOEpatents

    Gao, Di; Howe, Roger T.; Maboudian, Roya

    2006-12-19

    A method of etching silicon carbide using a nonmetallic mask layer. The method includes providing a silicon carbide substrate; forming a non-metallic mask layer by applying a layer of material on the substrate; patterning the mask layer to expose underlying areas of the substrate; and etching the underlying areas of the substrate with a plasma at a first rate, while etching the mask layer at a rate lower than the first rate.

  3. All-optical cryptography of M-QAM formats by using two-dimensional spectrally sliced keys.

    PubMed

    Abbade, Marcelo L F; Cvijetic, Milorad; Messani, Carlos A; Alves, Cleiton J; Tenenbaum, Stefan

    2015-05-10

    There has been an increased interest in enhancing the security of optical communications systems and networks. All-optical cryptography methods have been considered as an alternative to electronic data encryption. In this paper we propose and verify the use of a novel all-optical scheme based on cryptographic keys applied on the spectral signal for encryption of the M-QAM modulated data with bit rates of up to 200 gigabits per second.

  4. Novel Authentication of Monitoring Data Through the use of Secret and Public Cryptographic Keys

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Benz, Jacob M.; Tolk, Keith; Tanner, Jennifer E.

    The Office of Nuclear Verification (ONV) is supporting the development of a piece of equipment to provide data authentication and protection for a suite of monitoring sensors as part of a larger effort to create an arms control technology toolkit. This device, currently called the Red Box, leverages the strengths of both secret and public cryptographic keys to authenticate, digitally sign, and pass along monitoring data to allow for host review, and redaction if necessary, without the loss of confidence in the authenticity of the data by the monitoring party. The design of the Red Box will allow for themore » addition and removal of monitoring equipment and can also verify that the data was collected by authentic monitoring equipment prior to signing the data and sending it to the host and for review. The host will then forward the data to the monitor for review and inspection. This paper will highlight the progress to date of the Red Box development, and will explain the novel method of leveraging both symmetric and asymmetric (secret and public key) cryptography to authenticate data within a warhead monitoring regime.« less

  5. Protecting Cryptographic Keys and Functions from Malware Attacks

    DTIC Science & Technology

    2010-12-01

    registers. modifies RSA private key signing in OpenSSL to use the technique. The resulting system has the following features: 1. No special hardware is...the above method based on OpenSSL , by exploiting the Streaming SIMD Extension (SSE) XMM registers of modern Intel and AMD x86-compatible CPU’s [22...one can store a 2048-bit exponent.1 Our prototype is based on OpenSSL 0.9.8e, the Ubuntu 6.06 Linux distribution with a 2.6.15 kernel, and SSE2 which

  6. Robust and Reusable Fuzzy Extractors

    NASA Astrophysics Data System (ADS)

    Boyen, Xavier

    The use of biometric features as key material in security protocols has often been suggested to relieve their owner from the need to remember long cryptographic secrets. The appeal of biometric data as cryptographic secrets stems from their high apparent entropy, their availability to their owner, and their relative immunity to loss. In particular, they constitute a very effective basis for user authentication, especially when combined with complementary credentials such as a short memorized password or a physical token. However, the use of biometrics in cryptography does not come without problems. Some difficulties are technical, such as the lack of uniformity and the imperfect reproducibility of biometrics, but some challenges are more fundamental.

  7. Cryptographically secure biometrics

    NASA Astrophysics Data System (ADS)

    Stoianov, A.

    2010-04-01

    Biometric systems usually do not possess a cryptographic level of security: it has been deemed impossible to perform a biometric authentication in the encrypted domain because of the natural variability of biometric samples and of the cryptographic intolerance even to a single bite error. Encrypted biometric data need to be decrypted on authentication, which creates privacy and security risks. On the other hand, the known solutions called "Biometric Encryption (BE)" or "Fuzzy Extractors" can be cracked by various attacks, for example, by running offline a database of images against the stored helper data in order to obtain a false match. In this paper, we present a novel approach which combines Biometric Encryption with classical Blum-Goldwasser cryptosystem. In the "Client - Service Provider (SP)" or in the "Client - Database - SP" architecture it is possible to keep the biometric data encrypted on all the stages of the storage and authentication, so that SP never has an access to unencrypted biometric data. It is shown that this approach is suitable for two of the most popular BE schemes, Fuzzy Commitment and Quantized Index Modulation (QIM). The approach has clear practical advantages over biometric systems using "homomorphic encryption". Future work will deal with the application of the proposed solution to one-to-many biometric systems.

  8. Implementation of Rivest Shamir Adleman Algorithm (RSA) and Vigenere Cipher In Web Based Information System

    NASA Astrophysics Data System (ADS)

    Aryanti, Aryanti; Mekongga, Ikhthison

    2018-02-01

    Data security and confidentiality is one of the most important aspects of information systems at the moment. One attempt to secure data such as by using cryptography. In this study developed a data security system by implementing the cryptography algorithm Rivest, Shamir Adleman (RSA) and Vigenere Cipher. The research was done by combining Rivest, Shamir Adleman (RSA) and Vigenere Cipher cryptographic algorithms to document file either word, excel, and pdf. This application includes the process of encryption and decryption of data, which is created by using PHP software and my SQL. Data encryption is done on the transmit side through RSA cryptographic calculations using the public key, then proceed with Vigenere Cipher algorithm which also uses public key. As for the stage of the decryption side received by using the Vigenere Cipher algorithm still use public key and then the RSA cryptographic algorithm using a private key. Test results show that the system can encrypt files, decrypt files and transmit files. Tests performed on the process of encryption and decryption of files with different file sizes, file size affects the process of encryption and decryption. The larger the file size the longer the process of encryption and decryption.

  9. Critical analysis of the Bennett-Riedel attack on secure cryptographic key distributions via the Kirchhoff-Law-Johnson-noise scheme.

    PubMed

    Kish, Laszlo B; Abbott, Derek; Granqvist, Claes G

    2013-01-01

    Recently, Bennett and Riedel (BR) (http://arxiv.org/abs/1303.7435v1) argued that thermodynamics is not essential in the Kirchhoff-law-Johnson-noise (KLJN) classical physical cryptographic exchange method in an effort to disprove the security of the KLJN scheme. They attempted to demonstrate this by introducing a dissipation-free deterministic key exchange method with two batteries and two switches. In the present paper, we first show that BR's scheme is unphysical and that some elements of its assumptions violate basic protocols of secure communication. All our analyses are based on a technically unlimited Eve with infinitely accurate and fast measurements limited only by the laws of physics and statistics. For non-ideal situations and at active (invasive) attacks, the uncertainly principle between measurement duration and statistical errors makes it impossible for Eve to extract the key regardless of the accuracy or speed of her measurements. To show that thermodynamics and noise are essential for the security, we crack the BR system with 100% success via passive attacks, in ten different ways, and demonstrate that the same cracking methods do not function for the KLJN scheme that employs Johnson noise to provide security underpinned by the Second Law of Thermodynamics. We also present a critical analysis of some other claims by BR; for example, we prove that their equations for describing zero security do not apply to the KLJN scheme. Finally we give mathematical security proofs for each BR-attack against the KLJN scheme and conclude that the information theoretic (unconditional) security of the KLJN method has not been successfully challenged.

  10. Critical Analysis of the Bennett–Riedel Attack on Secure Cryptographic Key Distributions via the Kirchhoff-Law–Johnson-Noise Scheme

    PubMed Central

    Kish, Laszlo B.; Abbott, Derek; Granqvist, Claes G.

    2013-01-01

    Recently, Bennett and Riedel (BR) (http://arxiv.org/abs/1303.7435v1) argued that thermodynamics is not essential in the Kirchhoff-law–Johnson-noise (KLJN) classical physical cryptographic exchange method in an effort to disprove the security of the KLJN scheme. They attempted to demonstrate this by introducing a dissipation-free deterministic key exchange method with two batteries and two switches. In the present paper, we first show that BR's scheme is unphysical and that some elements of its assumptions violate basic protocols of secure communication. All our analyses are based on a technically unlimited Eve with infinitely accurate and fast measurements limited only by the laws of physics and statistics. For non-ideal situations and at active (invasive) attacks, the uncertainly principle between measurement duration and statistical errors makes it impossible for Eve to extract the key regardless of the accuracy or speed of her measurements. To show that thermodynamics and noise are essential for the security, we crack the BR system with 100% success via passive attacks, in ten different ways, and demonstrate that the same cracking methods do not function for the KLJN scheme that employs Johnson noise to provide security underpinned by the Second Law of Thermodynamics. We also present a critical analysis of some other claims by BR; for example, we prove that their equations for describing zero security do not apply to the KLJN scheme. Finally we give mathematical security proofs for each BR-attack against the KLJN scheme and conclude that the information theoretic (unconditional) security of the KLJN method has not been successfully challenged. PMID:24358129

  11. Methods of Testing Thermal Insulation and Associated Test Apparatus

    NASA Technical Reports Server (NTRS)

    Fesmire, James E. (Inventor); Augustynowicz, Stanislaw D. (Inventor)

    2004-01-01

    The system and method for testing thermal insulation uses a cryostatic insulation tester having a vacuum chamber and a cold mass including a test chamber and upper and lower guard chambers adjacent thereto. The thermal insulation is positioned within the vacuum chamber and adjacent the cold mass. Cryogenic liquid is supplied to the test chamber, upper guard and lower guard to create a first gas layer in an upper portion of the lower guard chamber and a second gas layer in an upper portion of the test chamber. Temperature are sensed within the vacuum chamber to test the thermal insulation.

  12. Deterrence of device counterfeiting, cloning, and subversion by substitution using hardware fingerprinting

    DOEpatents

    Hamlet, Jason R; Bauer, Todd M; Pierson, Lyndon G

    2014-09-30

    Deterrence of device subversion by substitution may be achieved by including a cryptographic fingerprint unit within a computing device for authenticating a hardware platform of the computing device. The cryptographic fingerprint unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware platform. The PUF circuit is used to generate a PUF value. A key generator is coupled to generate a private key and a public key based on the PUF value while a decryptor is coupled to receive an authentication challenge posed to the computing device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

  13. Defense frontier analysis of quantum cryptographic systems.

    PubMed

    Slutsky, B; Rao, R; Sun, P C; Tancevski, L; Fainman, S

    1998-05-10

    When a quantum cryptographic system operates in the presence of background noise, security of the key can be recovered by a procedure called key distillation. A key-distillation scheme effective against so-called individual (bitwise-independent) eavesdropping attacks involves sacrifice of some of the data through privacy amplification. We derive the amount of data sacrifice sufficient to defend against individual eavesdropping attacks in both BB84 and B92 protocols and show in what sense the communication becomes secure as a result. We also compare the secrecy capacity of various quantum cryptosystems, taking into account data sacrifice during key distillation, and conclude that the BB84 protocol may offer better performance characteristics than the B92.

  14. Local randomness: Examples and application

    NASA Astrophysics Data System (ADS)

    Fu, Honghao; Miller, Carl A.

    2018-03-01

    When two players achieve a superclassical score at a nonlocal game, their outputs must contain intrinsic randomness. This fact has many useful implications for quantum cryptography. Recently it has been observed [C. Miller and Y. Shi, Quantum Inf. Computat. 17, 0595 (2017)] that such scores also imply the existence of local randomness—that is, randomness known to one player but not to the other. This has potential implications for cryptographic tasks between two cooperating but mistrustful players. In the current paper we bring this notion toward practical realization, by offering near-optimal bounds on local randomness for the CHSH game, and also proving the security of a cryptographic application of local randomness (single-bit certified deletion).

  15. Backside imaging of a microcontroller with common-path digital holography

    NASA Astrophysics Data System (ADS)

    Finkeldey, Markus; Göring, Lena; Schellenberg, Falk; Gerhardt, Nils C.; Hofmann, Martin

    2017-03-01

    The investigation of integrated circuits (ICs), such as microcontrollers (MCUs) and system on a chip (SoCs) devices is a topic with growing interests. The need for fast and non-destructive imaging methods is given by the increasing importance of hardware Trojans, reverse engineering and further security related analysis of integrated cryptographic devices. In the field of side-channel attacks, for instance, the precise spot for laser fault attacks is important and could be determined by using modern high resolution microscopy methods. Digital holographic microscopy (DHM) is a promising technique to achieve high resolution phase images of surface structures. These phase images provide information about the change of the refractive index in the media and the topography. For enabling a high phase stability, we use the common-path geometry to create the interference pattern. The interference pattern, or hologram, is captured with a water cooled sCMOS camera. This provides a fast readout while maintaining a low level of noise. A challenge for these types of holograms is the interference of the reflected waves from the different interfaces inside the media. To distinguish between the phase signals from the buried layer and the surface reflection we use specific numeric filters. For demonstrating the performance of our setup we show results with devices under test (DUT), using a 1064 nm laser diode as light source. The DUTs are modern microcontrollers thinned to different levels of thickness of the Si-substrate. The effect of the numeric filter compared to unfiltered images is analyzed.

  16. A Secure Key Distribution System of Quantum Cryptography Based on the Coherent State

    NASA Technical Reports Server (NTRS)

    Guo, Guang-Can; Zhang, Xiao-Yu

    1996-01-01

    The cryptographic communication has a lot of important applications, particularly in the magnificent prospects of private communication. As one knows, the security of cryptographic channel depends crucially on the secrecy of the key. The Vernam cipher is the only cipher system which has guaranteed security. In that system the key must be as long as the message and most be used only once. Quantum cryptography is a method whereby key secrecy can be guaranteed by a physical law. So it is impossible, even in principle, to eavesdrop on such channels. Quantum cryptography has been developed in recent years. Up to now, many schemes of quantum cryptography have been proposed. Now one of the main problems in this field is how to increase transmission distance. In order to use quantum nature of light, up to now proposed schemes all use very dim light pulses. The average photon number is about 0.1. Because of the loss of the optical fiber, it is difficult for the quantum cryptography based on one photon level or on dim light to realize quantum key-distribution over long distance. A quantum key distribution based on coherent state is introduced in this paper. Here we discuss the feasibility and security of this scheme.

  17. Designing and Operating Through Compromise: Architectural Analysis of CKMS for the Advanced Metering Infrastructure

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Duren, Mike; Aldridge, Hal; Abercrombie, Robert K

    2013-01-01

    Compromises attributable to the Advanced Persistent Threat (APT) highlight the necessity for constant vigilance. The APT provides a new perspective on security metrics (e.g., statistics based cyber security) and quantitative risk assessments. We consider design principals and models/tools that provide high assurance for energy delivery systems (EDS) operations regardless of the state of compromise. Cryptographic keys must be securely exchanged, then held and protected on either end of a communications link. This is challenging for a utility with numerous substations that must secure the intelligent electronic devices (IEDs) that may comprise complex control system of systems. For example, distribution andmore » management of keys among the millions of intelligent meters within the Advanced Metering Infrastructure (AMI) is being implemented as part of the National Smart Grid initiative. Without a means for a secure cryptographic key management system (CKMS) no cryptographic solution can be widely deployed to protect the EDS infrastructure from cyber-attack. We consider 1) how security modeling is applied to key management and cyber security concerns on a continuous basis from design through operation, 2) how trusted models and key management architectures greatly impact failure scenarios, and 3) how hardware-enabled trust is a critical element to detecting, surviving, and recovering from attack.« less

  18. Experimental realization of a highly secure chaos communication under strong channel noise

    NASA Astrophysics Data System (ADS)

    Ye, Weiping; Dai, Qionglin; Wang, Shihong; Lu, Huaping; Kuang, Jinyu; Zhao, Zhenfeng; Zhu, Xiangqing; Tang, Guoning; Huang, Ronghuai; Hu, Gang

    2004-09-01

    A one-way coupled spatiotemporally chaotic map lattice is used to construct cryptosystem. With the combinatorial applications of both chaotic computations and conventional algebraic operations, our system has optimal cryptographic properties much better than the separative applications of known chaotic and conventional methods. We have realized experiments to practice duplex voice secure communications in realistic Wired Public Switched Telephone Network by applying our chaotic system and the system of Advanced Encryption Standard (AES), respectively, for cryptography. Our system can work stably against strong channel noise when AES fails to work.

  19. HyDEn: A Hybrid Steganocryptographic Approach for Data Encryption Using Randomized Error-Correcting DNA Codes

    PubMed Central

    Regoui, Chaouki; Durand, Guillaume; Belliveau, Luc; Léger, Serge

    2013-01-01

    This paper presents a novel hybrid DNA encryption (HyDEn) approach that uses randomized assignments of unique error-correcting DNA Hamming code words for single characters in the extended ASCII set. HyDEn relies on custom-built quaternary codes and a private key used in the randomized assignment of code words and the cyclic permutations applied on the encoded message. Along with its ability to detect and correct errors, HyDEn equals or outperforms existing cryptographic methods and represents a promising in silico DNA steganographic approach. PMID:23984392

  20. High-Dimensional Quantum Information Processing with Linear Optics

    NASA Astrophysics Data System (ADS)

    Fitzpatrick, Casey A.

    Quantum information processing (QIP) is an interdisciplinary field concerned with the development of computers and information processing systems that utilize quantum mechanical properties of nature to carry out their function. QIP systems have become vastly more practical since the turn of the century. Today, QIP applications span imaging, cryptographic security, computation, and simulation (quantum systems that mimic other quantum systems). Many important strategies improve quantum versions of classical information system hardware, such as single photon detectors and quantum repeaters. Another more abstract strategy engineers high-dimensional quantum state spaces, so that each successful event carries more information than traditional two-level systems allow. Photonic states in particular bring the added advantages of weak environmental coupling and data transmission near the speed of light, allowing for simpler control and lower system design complexity. In this dissertation, numerous novel, scalable designs for practical high-dimensional linear-optical QIP systems are presented. First, a correlated photon imaging scheme using orbital angular momentum (OAM) states to detect rotational symmetries in objects using measurements, as well as building images out of those interactions is reported. Then, a statistical detection method using chains of OAM superpositions distributed according to the Fibonacci sequence is established and expanded upon. It is shown that the approach gives rise to schemes for sorting, detecting, and generating the recursively defined high-dimensional states on which some quantum cryptographic protocols depend. Finally, an ongoing study based on a generalization of the standard optical multiport for applications in quantum computation and simulation is reported upon. The architecture allows photons to reverse momentum inside the device. This in turn enables realistic implementation of controllable linear-optical scattering vertices for carrying out quantum walks on arbitrary graph structures, a powerful tool for any quantum computer. It is shown that the novel architecture provides new, efficient capabilities for the optical quantum simulation of Hamiltonians and topologically protected states. Further, these simulations use exponentially fewer resources than feedforward techniques, scale linearly to higher-dimensional systems, and use only linear optics, thus offering a concrete experimentally achievable implementation of graphical models of discrete-time quantum systems.

  1. Forced vibrations of a two-layered shell in the case of viscous resistance

    NASA Astrophysics Data System (ADS)

    Aghalovyan, L. A.; Ghulghazaryan, L. G.

    2018-04-01

    Forced vibrations of a two-layered orthotropic shell are studied in the case of viscous resistance in the lower layer of the shell. Two versions of spatial boundary conditions on the upper surface of the shell are posed, and the displacement vector is given on the lower surface. An asymptotic method is used to solve the corresponding dynamic equations and relations of the three-dimensional problem of elasticity. The amplitudes of the forced vibrations are determined, and the resonance conditions are established.

  2. Quantum-secured blockchain

    NASA Astrophysics Data System (ADS)

    Kiktenko, E. O.; Pozhar, N. O.; Anufriev, M. N.; Trushechkin, A. S.; Yunusov, R. R.; Kurochkin, Y. V.; Lvovsky, A. I.; Fedorov, A. K.

    2018-07-01

    Blockchain is a distributed database which is cryptographically protected against malicious modifications. While promising for a wide range of applications, current blockchain platforms rely on digital signatures, which are vulnerable to attacks by means of quantum computers. The same, albeit to a lesser extent, applies to cryptographic hash functions that are used in preparing new blocks, so parties with access to quantum computation would have unfair advantage in procuring mining rewards. Here we propose a possible solution to the quantum era blockchain challenge and report an experimental realization of a quantum-safe blockchain platform that utilizes quantum key distribution across an urban fiber network for information-theoretically secure authentication. These results address important questions about realizability and scalability of quantum-safe blockchains for commercial and governmental applications.

  3. Next generation DRM: cryptography or forensics?

    NASA Astrophysics Data System (ADS)

    Robert, Arnaud

    2009-02-01

    Current content protection systems rely primarily on applied cryptographic techniques but there is an increased use of forensic solutions in images, music and video distribution alike. The two approaches differ significantly, both in terms of technology and in terms of strategy, and thus it begs the question: will one approach take over in the long run, and if so which one? Discussing the evolution of both cryptographic and forensic solutions, we conclude that neither approach is ideal for all constituents, and that in the video space at least they will continue to co-exist for the foreseeable future - even if this may not be the case for other media types. We also analyze shortcomings of these approaches, and suggest that new solutions are necessary in this still emerging marketplace.

  4. Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Deutsch, D.; Ekert, A.; Jozsa, R.

    1996-09-01

    Existing quantum cryptographic schemes are not, as they stand, operable in the presence of noise on the quantum communication channel. Although they become operable if they are supplemented by classical privacy-amplification techniques, the resulting schemes are difficult to analyze and have not been proved secure. We introduce the concept of quantum privacy amplification and a cryptographic scheme incorporating it which is provably secure over a noisy channel. The scheme uses an {open_quote}{open_quote}entanglement purification{close_quote}{close_quote} procedure which, because it requires only a few quantum controlled-not and single-qubit operations, could be implemented using technology that is currently being developed. {copyright} {ital 1996 Themore » American Physical Society.}« less

  5. Improved boundary layer height measurement using a fuzzy logic method: Diurnal and seasonal variabilities of the convective boundary layer over a tropical station

    NASA Astrophysics Data System (ADS)

    Allabakash, S.; Yasodha, P.; Bianco, L.; Venkatramana Reddy, S.; Srinivasulu, P.; Lim, S.

    2017-09-01

    This paper presents the efficacy of a "tuned" fuzzy logic method at determining the height of the boundary layer using the measurements from a 1280 MHz lower atmospheric radar wind profiler located in Gadanki (13.5°N, 79°E, 375 mean sea level), India, and discusses the diurnal and seasonal variations of the measured convective boundary layer over this tropical station. The original fuzzy logic (FL) method estimates the height of the atmospheric boundary layer combining the information from the range-corrected signal-to-noise ratio, the Doppler spectral width of the vertical velocity, and the vertical velocity itself, measured by the radar, through a series of thresholds and rules, which did not prove to be optimal for our radar system and geographical location. For this reason the algorithm was tuned to perform better on our data set. Atmospheric boundary layer heights obtained by this tuned FL method, the original FL method, and by a "standard method" (that only uses the information from the range-corrected signal-to-noise ratio) are compared with those obtained from potential temperature profiles measured by collocated Global Positioning System Radio Sonde during years 2011 and 2013. The comparison shows that the tuned FL method is more accurate than the other methods. Maximum convective boundary layer heights are observed between 14:00 and 15:00 local time (LT = UTC + 5:30) for clear-sky days. These daily maxima are found to be lower during winter and postmonsoon seasons and higher during premonsoon and monsoon seasons, due to net surface radiation and convective processes over this region being more intense during premonsoon and monsoon seasons and less intense in winter and postmonsoon seasons.

  6. Communication systems, transceivers, and methods for generating data based on channel characteristics

    DOEpatents

    Forman, Michael A; Young, Derek

    2012-09-18

    Examples of methods for generating data based on a communications channel are described. In one such example, a processing unit may generate a first vector representation based in part on at least two characteristics of a communications channel. A constellation having at least two dimensions may be addressed with the first vector representation to identify a first symbol associated with the first vector representation. The constellation represents a plurality of regions, each region associated with a respective symbol. The symbol may be used to generate data, which may stored in an electronic storage medium and used as a cryptographic key or a spreading code or hopping sequence in a modulation technique.

  7. Privacy-preserving search for chemical compound databases.

    PubMed

    Shimizu, Kana; Nuida, Koji; Arai, Hiromi; Mitsunari, Shigeo; Attrapadung, Nuttapong; Hamada, Michiaki; Tsuda, Koji; Hirokawa, Takatsugu; Sakuma, Jun; Hanaoka, Goichiro; Asai, Kiyoshi

    2015-01-01

    Searching for similar compounds in a database is the most important process for in-silico drug screening. Since a query compound is an important starting point for the new drug, a query holder, who is afraid of the query being monitored by the database server, usually downloads all the records in the database and uses them in a closed network. However, a serious dilemma arises when the database holder also wants to output no information except for the search results, and such a dilemma prevents the use of many important data resources. In order to overcome this dilemma, we developed a novel cryptographic protocol that enables database searching while keeping both the query holder's privacy and database holder's privacy. Generally, the application of cryptographic techniques to practical problems is difficult because versatile techniques are computationally expensive while computationally inexpensive techniques can perform only trivial computation tasks. In this study, our protocol is successfully built only from an additive-homomorphic cryptosystem, which allows only addition performed on encrypted values but is computationally efficient compared with versatile techniques such as general purpose multi-party computation. In an experiment searching ChEMBL, which consists of more than 1,200,000 compounds, the proposed method was 36,900 times faster in CPU time and 12,000 times as efficient in communication size compared with general purpose multi-party computation. We proposed a novel privacy-preserving protocol for searching chemical compound databases. The proposed method, easily scaling for large-scale databases, may help to accelerate drug discovery research by making full use of unused but valuable data that includes sensitive information.

  8. Privacy-preserving search for chemical compound databases

    PubMed Central

    2015-01-01

    Background Searching for similar compounds in a database is the most important process for in-silico drug screening. Since a query compound is an important starting point for the new drug, a query holder, who is afraid of the query being monitored by the database server, usually downloads all the records in the database and uses them in a closed network. However, a serious dilemma arises when the database holder also wants to output no information except for the search results, and such a dilemma prevents the use of many important data resources. Results In order to overcome this dilemma, we developed a novel cryptographic protocol that enables database searching while keeping both the query holder's privacy and database holder's privacy. Generally, the application of cryptographic techniques to practical problems is difficult because versatile techniques are computationally expensive while computationally inexpensive techniques can perform only trivial computation tasks. In this study, our protocol is successfully built only from an additive-homomorphic cryptosystem, which allows only addition performed on encrypted values but is computationally efficient compared with versatile techniques such as general purpose multi-party computation. In an experiment searching ChEMBL, which consists of more than 1,200,000 compounds, the proposed method was 36,900 times faster in CPU time and 12,000 times as efficient in communication size compared with general purpose multi-party computation. Conclusion We proposed a novel privacy-preserving protocol for searching chemical compound databases. The proposed method, easily scaling for large-scale databases, may help to accelerate drug discovery research by making full use of unused but valuable data that includes sensitive information. PMID:26678650

  9. Transient liquid phase ceramic bonding

    DOEpatents

    Glaeser, Andreas M.

    1994-01-01

    Ceramics are joined to themselves or to metals using a transient liquid phase method employing three layers, one of which is a refractory metal, ceramic or alloy. The refractory layer is placed between two metal layers, each of which has a lower melting point than the refractory layer. The three layers are pressed between the two articles to be bonded to form an assembly. The assembly is heated to a bonding temperature at which the refractory layer remains solid, but the two metal layers melt to form a liquid. The refractory layer reacts with the surrounding liquid and a single solid bonding layer is eventually formed. The layers may be designed to react completely with each other and form refractory intermetallic bonding layers. Impurities incorporated into the refractory metal may react with the metal layers to form refractory compounds. Another method for joining ceramic articles employs a ceramic interlayer sandwiched between two metal layers. In alternative embodiments, the metal layers may include sublayers. A method is also provided for joining two ceramic articles using a single interlayer. An alternate bonding method provides a refractory-metal oxide interlayer placed adjacent to a strong oxide former. Aluminum or aluminum alloys are joined together using metal interlayers.

  10. Cryptographic Protocol for Comparing Sets without Leaking Them: Applications in Astronomy

    NASA Astrophysics Data System (ADS)

    McCullough, Peter R.

    2011-09-01

    We describe a cryptographic protocol for two or more persons to compare individual lists of astronomical objects of interest without leaking them. Cryptographers have long known such protocols; astronomers and other scientists may benefit from them also. We describe some latent opportunities that would be enabled by this protocol. Consider the following scenario: Alice has a set of stars that are candidate hosts of transiting planets. Bob has a similar set. Alice and Bob have a mutual desire to know the intersection of their two lists without revealing them to each other. Alice and Bob can recruit a trusted third party, Josephine, to make the comparison, report the results, and then destroy each list. Limitations of that approach are that 1) Josephine must devote time to make each comparison, 2) Alice and Bob may not know a Josephine that they both can trust, especially if Alice and Bob are from different communities, 3) Josephine may not indeed be trustworthy, 4) a fourth person may wittingly or unwittingly intercept one or both of the lists in Josephine's care, and 5) anticipating those limitations, Alice and Bob may elect not to recruit a Josephine and hence not compare their lists. We describe a variant that overcomes those limitations by A) encrypting the lists prior to transmitting them to Josephine, and B) replacing a human Josephine with a computer website.

  11. Network-Centric Quantum Communications

    NASA Astrophysics Data System (ADS)

    Hughes, Richard

    2014-03-01

    Single-photon quantum communications (QC) offers ``future-proof'' cryptographic security rooted in the laws of physics. Today's quantum-secured communications cannot be compromised by unanticipated future technological advances. But to date, QC has only existed in point-to-point instantiations that have limited ability to address the cyber security challenges of our increasingly networked world. In my talk I will describe a fundamentally new paradigm of network-centric quantum communications (NQC) that leverages the network to bring scalable, QC-based security to user groups that may have no direct user-to-user QC connectivity. With QC links only between each of N users and a trusted network node, NQC brings quantum security to N2 user pairs, and to multi-user groups. I will describe a novel integrated photonics quantum smartcard (``QKarD'') and its operation in a multi-node NQC test bed. The QKarDs are used to implement the quantum cryptographic protocols of quantum identification, quantum key distribution and quantum secret splitting. I will explain how these cryptographic primitives are used to provide key management for encryption, authentication, and non-repudiation for user-to-user communications. My talk will conclude with a description of a recent demonstration that QC can meet both the security and quality-of-service (latency) requirements for electric grid control commands and data. These requirements cannot be met simultaneously with present-day cryptography.

  12. Gencrypt: one-way cryptographic hashes to detect overlapping individuals across samples

    PubMed Central

    Turchin, Michael C.; Hirschhorn, Joel N.

    2012-01-01

    Summary: Meta-analysis across genome-wide association studies is a common approach for discovering genetic associations. However, in some meta-analysis efforts, individual-level data cannot be broadly shared by study investigators due to privacy and Institutional Review Board concerns. In such cases, researchers cannot confirm that each study represents a unique group of people, leading to potentially inflated test statistics and false positives. To resolve this problem, we created a software tool, Gencrypt, which utilizes a security protocol known as one-way cryptographic hashes to allow overlapping participants to be identified without sharing individual-level data. Availability: Gencrypt is freely available under the GNU general public license v3 at http://www.broadinstitute.org/software/gencrypt/ Contact: joelh@broadinstitute.org Supplementary information: Supplementary data are available at Bioinformatics online. PMID:22302573

  13. Multi-factor authentication

    DOEpatents

    Hamlet, Jason R; Pierson, Lyndon G

    2014-10-21

    Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

  14. Modular multiplication in GF(p) for public-key cryptography

    NASA Astrophysics Data System (ADS)

    Olszyna, Jakub

    Modular multiplication forms the basis of modular exponentiation which is the core operation of the RSA cryptosystem. It is also present in many other cryptographic algorithms including those based on ECC and HECC. Hence, an efficient implementation of PKC relies on efficient implementation of modular multiplication. The paper presents a survey of most common algorithms for modular multiplication along with hardware architectures especially suitable for cryptographic applications in energy constrained environments. The motivation for studying low-power and areaefficient modular multiplication algorithms comes from enabling public-key security for ultra-low power devices that can perform under constrained environments like wireless sensor networks. Serial architectures for GF(p) are analyzed and presented. Finally proposed architectures are verified and compared according to the amount of power dissipated throughout the operation.

  15. Cryptographic robustness of a quantum cryptography system using phase-time coding

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Molotkov, S. N.

    2008-01-15

    A cryptographic analysis is presented of a new quantum key distribution protocol using phase-time coding. An upper bound is obtained for the error rate that guarantees secure key distribution. It is shown that the maximum tolerable error rate for this protocol depends on the counting rate in the control time slot. When no counts are detected in the control time slot, the protocol guarantees secure key distribution if the bit error rate in the sifted key does not exceed 50%. This protocol partially discriminates between errors due to system defects (e.g., imbalance of a fiber-optic interferometer) and eavesdropping. In themore » absence of eavesdropping, the counts detected in the control time slot are not caused by interferometer imbalance, which reduces the requirements for interferometer stability.« less

  16. Quantum communication and information processing

    NASA Astrophysics Data System (ADS)

    Beals, Travis Roland

    Quantum computers enable dramatically more efficient algorithms for solving certain classes of computational problems, but, in doing so, they create new problems. In particular, Shor's Algorithm allows for efficient cryptanalysis of many public-key cryptosystems. As public key cryptography is a critical component of present-day electronic commerce, it is crucial that a working, secure replacement be found. Quantum key distribution (QKD), first developed by C.H. Bennett and G. Brassard, offers a partial solution, but many challenges remain, both in terms of hardware limitations and in designing cryptographic protocols for a viable large-scale quantum communication infrastructure. In Part I, I investigate optical lattice-based approaches to quantum information processing. I look at details of a proposal for an optical lattice-based quantum computer, which could potentially be used for both quantum communications and for more sophisticated quantum information processing. In Part III, I propose a method for converting and storing photonic quantum bits in the internal state of periodically-spaced neutral atoms by generating and manipulating a photonic band gap and associated defect states. In Part II, I present a cryptographic protocol which allows for the extension of present-day QKD networks over much longer distances without the development of new hardware. I also present a second, related protocol which effectively solves the authentication problem faced by a large QKD network, thus making QKD a viable, information-theoretic secure replacement for public key cryptosystems.

  17. ID-based encryption scheme with revocation

    NASA Astrophysics Data System (ADS)

    Othman, Hafizul Azrie; Ismail, Eddie Shahril

    2017-04-01

    In 2015, Meshram proposed an efficient ID-based cryptographic encryption based on the difficulty of solving discrete logarithm and integer-factoring problems. The scheme was pairing free and claimed to be secure against adaptive chosen plaintext attacks (CPA). Later, Tan et al. proved that the scheme was insecure by presenting a method to recover the secret master key and to obtain prime factorization of modulo n. In this paper, we propose a new pairing-free ID-based encryption scheme with revocation based on Meshram's ID-based encryption scheme, which is also secure against Tan et al.'s attacks.

  18. Noise removing in encrypted color images by statistical analysis

    NASA Astrophysics Data System (ADS)

    Islam, N.; Puech, W.

    2012-03-01

    Cryptographic techniques are used to secure confidential data from unauthorized access but these techniques are very sensitive to noise. A single bit change in encrypted data can have catastrophic impact over the decrypted data. This paper addresses the problem of removing bit error in visual data which are encrypted using AES algorithm in the CBC mode. In order to remove the noise, a method is proposed which is based on the statistical analysis of each block during the decryption. The proposed method exploits local statistics of the visual data and confusion/diffusion properties of the encryption algorithm to remove the errors. Experimental results show that the proposed method can be used at the receiving end for the possible solution for noise removing in visual data in encrypted domain.

  19. Evaluation of manometric temperature measurement, a process analytical technology tool for freeze-drying: part II measurement of dry-layer resistance.

    PubMed

    Tang, Xiaolin Charlie; Nail, Steven L; Pikal, Michael J

    2006-01-01

    The purpose of this work was to study the factors that may cause systematic errors in the manometric temperature measurement (MTM) procedure used to determine product dry-layer resistance to vapor flow. Product temperature and dry-layer resistance were obtained using MTM software installed on a laboratory freeze-dryer. The MTM resistance values were compared with the resistance values obtained using the "vial method." The product dry-layer resistances obtained by MTM, assuming fixed temperature difference (DeltaT; 2 degrees C), were lower than the actual values, especially when the product temperatures and sublimation rates were low, but with DeltaT determined from the pressure rise data, more accurate results were obtained. MTM resistance values were generally lower than the values obtained with the vial method, particularly whenever freeze-drying was conducted under conditions that produced large variations in product temperature (ie, low shelf temperature, low chamber pressure, and without thermal shields). In an experiment designed to magnify temperature heterogeneity, MTM resistance values were much lower than the simple average of the product resistances. However, in experiments where product temperatures were homogenous, good agreement between MTM and "vial-method" resistances was obtained. The reason for the low MTM resistance problem is the fast vapor pressure rise from a few "warm" edge vials or vials with low resistance. With proper use of thermal shields, and the evaluation of DeltaT from the data, MTM resistance data are accurate. Thus, the MTM method for determining dry-layer resistance is a useful tool for freeze-drying process analytical technology.

  20. Conventional Cryptography.

    ERIC Educational Resources Information Center

    Wright, Marie A.

    1993-01-01

    Cryptography is the science that renders data unintelligible to prevent its unauthorized disclosure or modification. Presents an application of matrices used in linear transformations to illustrate a cryptographic system. An example is provided. (17 references) (MDH)

  1. Target recognition based on convolutional neural network

    NASA Astrophysics Data System (ADS)

    Wang, Liqiang; Wang, Xin; Xi, Fubiao; Dong, Jian

    2017-11-01

    One of the important part of object target recognition is the feature extraction, which can be classified into feature extraction and automatic feature extraction. The traditional neural network is one of the automatic feature extraction methods, while it causes high possibility of over-fitting due to the global connection. The deep learning algorithm used in this paper is a hierarchical automatic feature extraction method, trained with the layer-by-layer convolutional neural network (CNN), which can extract the features from lower layers to higher layers. The features are more discriminative and it is beneficial to the object target recognition.

  2. Changes to Quantum Cryptography

    NASA Astrophysics Data System (ADS)

    Sakai, Yasuyuki; Tanaka, Hidema

    Quantum cryptography has become a subject of widespread interest. In particular, quantum key distribution, which provides a secure key agreement by using quantum systems, is believed to be the most important application of quantum cryptography. Quantum key distribution has the potential to achieve the “unconditionally” secure infrastructure. We also have many cryptographic tools that are based on “modern cryptography” at the present time. They are being used in an effort to guarantee secure communication over open networks such as the Internet. Unfortunately, their ultimate efficacy is in doubt. Quantum key distribution systems are believed to be close to practical and commercial use. In this paper, we discuss what we should do to apply quantum cryptography to our communications. We also discuss how quantum key distribution can be combined with or used to replace cryptographic tools based on modern cryptography.

  3. Protecting privacy in a clinical data warehouse.

    PubMed

    Kong, Guilan; Xiao, Zhichun

    2015-06-01

    Peking University has several prestigious teaching hospitals in China. To make secondary use of massive medical data for research purposes, construction of a clinical data warehouse is imperative in Peking University. However, a big concern for clinical data warehouse construction is how to protect patient privacy. In this project, we propose to use a combination of symmetric block ciphers, asymmetric ciphers, and cryptographic hashing algorithms to protect patient privacy information. The novelty of our privacy protection approach lies in message-level data encryption, the key caching system, and the cryptographic key management system. The proposed privacy protection approach is scalable to clinical data warehouse construction with any size of medical data. With the composite privacy protection approach, the clinical data warehouse can be secure enough to keep the confidential data from leaking to the outside world. © The Author(s) 2014.

  4. Formal Analysis of Key Integrity in PKCS#11

    NASA Astrophysics Data System (ADS)

    Falcone, Andrea; Focardi, Riccardo

    PKCS#11 is a standard API to cryptographic devices such as smarcards, hardware security modules and usb crypto-tokens. Though widely adopted, this API has been shown to be prone to attacks in which a malicious user gains access to the sensitive keys stored in the devices. In 2008, Delaune, Kremer and Steel proposed a model to formally reason on this kind of attacks. We extend this model to also describe flaws that are based on integrity violations of the stored keys. In particular, we consider scenarios in which a malicious overwriting of keys might fool honest users into using attacker's own keys, while performing sensitive operations. We further enrich the model with a trusted key mechanism ensuring that only controlled, non-tampered keys are used in cryptographic operations, and we show how this modified API prevents the above mentioned key-replacement attacks.

  5. A novel key management solution for reinforcing compliance with HIPAA privacy/security regulations.

    PubMed

    Lee, Chien-Ding; Ho, Kevin I-J; Lee, Wei-Bin

    2011-07-01

    Digitizing medical records facilitates the healthcare process. However, it can also cause serious security and privacy problems, which are the major concern in the Health Insurance Portability and Accountability Act (HIPAA). While various conventional encryption mechanisms can solve some aspects of these problems, they cannot address the illegal distribution of decrypted medical images, which violates the regulations defined in the HIPAA. To protect decrypted medical images from being illegally distributed by an authorized staff member, the model proposed in this paper provides a way to integrate several cryptographic mechanisms. In this model, the malicious staff member can be tracked by a watermarked clue. By combining several well-designed cryptographic mechanisms and developing a key management scheme to facilitate the interoperation among these mechanisms, the risk of illegal distribution can be reduced.

  6. Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation.

    PubMed

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Han, Sangchul; Kim, Moonseong; Paik, Juryon; Won, Dongho

    2015-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks).

  7. Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation

    PubMed Central

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Han, Sangchul; Kim, Moonseong; Paik, Juryon; Won, Dongho

    2015-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks). PMID:25849359

  8. Low-temperature method of producing nano-scaled graphene platelets and their nanocomposites

    DOEpatents

    Zhamu, Aruna [Centerville, OH; Shi, Jinjun [Columbus, OH; Guo, Jiusheng [Centerville, OH; Jang, Bor Z [Centerville, OH

    2012-03-13

    A method of exfoliating a layered material to produce separated nano-scaled platelets having a thickness smaller than 100 nm. The method comprises: (a) providing a graphite intercalation compound comprising a layered graphite containing expandable species residing in an interlayer space of the layered graphite; (b) exposing the graphite intercalation compound to an exfoliation temperature lower than 650.degree. C. for a duration of time sufficient to at least partially exfoliate the layered graphite without incurring a significant level of oxidation; and (c) subjecting the at least partially exfoliated graphite to a mechanical shearing treatment to produce separated platelets. The method can further include a step of dispersing the platelets in a polymer or monomer solution or suspension as a precursor step to nanocomposite fabrication.

  9. Interpretation of magnetotelluric resistivity and phase soundings over horizontal layers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Patella, D.

    1976-02-01

    The present paper deals with a new inverse method for quantitatively interpreting magnetotelluric apparent resistivity and phase-lag sounding curves over horizontally stratified earth sections. The recurrent character of the general formula relating the wave impedance of an (n-l)-layered medium to that of an n-layered medium suggests the use of the method of reduction to a lower boundary plane, as originally termed by Koefoed in the case of dc resistivity soundings. The layering parameters are so directly derived by a simple iterative procedure. The method is applicable for any number of layers but only when both apparent resistivity and phase-lag soundingmore » curves are jointly available. Moreover no sophisticated algorithm is required: a simple desk electronic calculator together with a sheet of two-layer apparent resistivity and phase-lag master curves are sufficient to reproduce earth sections which, in the range of equivalence, are all consistent with field data.« less

  10. 15 CFR Supplement No. 8 to Part 742 - Self-Classification Report for Encryption Items

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... forensics (v) Cryptographic accelerator (vi) Data backup and recovery (vii) Database (viii) Disk/drive... (MAN) (xxii) Modem (xxiii) Network convergence or infrastructure n.e.s. (xxiv) Network forensics (xxv...

  11. 15 CFR Supplement No. 8 to Part 742 - Self-Classification Report for Encryption Items

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... forensics (v) Cryptographic accelerator (vi) Data backup and recovery (vii) Database (viii) Disk/drive... (MAN) (xxii) Modem (xxiii) Network convergence or infrastructure n.e.s. (xxiv) Network forensics (xxv...

  12. 15 CFR Supplement No. 8 to Part 742 - Self-Classification Report for Encryption Items

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... forensics (v) Cryptographic accelerator (vi) Data backup and recovery (vii) Database (viii) Disk/drive... (MAN) (xxii) Modem (xxiii) Network convergence or infrastructure n.e.s. (xxiv) Network forensics (xxv...

  13. 15 CFR Supplement No. 8 to Part 742 - Self-Classification Report for Encryption Items

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... forensics (v) Cryptographic accelerator (vi) Data backup and recovery (vii) Database (viii) Disk/drive... (MAN) (xxii) Modem (xxiii) Network convergence or infrastructure n.e.s. (xxiv) Network forensics (xxv...

  14. 10 CFR 25.15 - Access permitted under “Q” or “L” access authorization.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Confidential National Security Information including intelligence information, CRYPTO (i.e., cryptographic... official business when the employee has the appropriate level of NRC access authorization and need-to-know...

  15. Flexural Properties of PLA Components Under Various Test Condition Manufactured by 3D Printer

    NASA Astrophysics Data System (ADS)

    Jaya Christiyan, K. G.; Chandrasekhar, U.; Venkateswarlu, K.

    2018-06-01

    Rapid Prototyping (RP) technologies have emerged as a fabrication method to obtain engineering components in the resent past. Desktop 3D printing, also referred as an additive layer manufacturing technology is a powerful method of RP technique that can fabricate 3 dimensional engineering components. In this method, 3D digital data is converted into real product. In the present investigation, Polylactic Acid (PLA) was considered as a starting material. Flexural strength of PLA material was evaluated using 3-point bend test, as per ASTM D790 standard. Specimens with flat (0°) and vertical (90°) orientation were considered. Moreover, layer thicknesses of 0.2, 0.25, and 0.3 mm were considered. To fabricate these specimens, printing speed of 38 and 52 mm/s was maintained. Nozzle diameter of 0.4 mm with 40 % of infill density were used. Based on the experimental results, it was observed that 0° orientation, 38 mm/s printing speed, and 0.2 mm layer thickness resulted maximum flexural strength, as compared to all other specimens. The improved flexural strength was due to the lower layer thickness (0.2 mm) specimens, as compared with other specimens made of 0.25 and 0.30 mm layer thicknesses. It was concluded that flexural strength properties were greatly influenced by lower the layer thickness, printing speed, and orientation.

  16. Digital rights management for digital cinema

    NASA Astrophysics Data System (ADS)

    Kirovski, Darko; Peinado, Marcus; Petitcolas, Fabien A. P.

    2001-12-01

    There is a wide consensus among the feature film production studios that the Internet era brings a new paradigm for film distribution to cinemas worldwide. The benefits of digital cinema to both producers and cinemas are numerous: significantly lower distribution and maintenance costs, immediate access to film libraries, higher presentation quality, and strong potential for developing new business models. Despite these advantages, the studios are still reluctant to jump into the digital age. The main showstopper for digital cinema is the danger of widespread piracy. Piracy already costs Hollywood an estimated two billion dollars annually and digital cinema without proper copyright enforcement could increase this number. In this paper, we present a copyright management system that aims at providing the set of necessary security tools: standard cryptographic primitives and copyright protection mechanisms that enable a reliable and secure feature film delivery system.

  17. Security Concepts for Satellite Links

    NASA Astrophysics Data System (ADS)

    Tobehn, C.; Penné, B.; Rathje, R.; Weigl, A.; Gorecki, Ch.; Michalik, H.

    2008-08-01

    The high costs to develop, launch and maintain a satellite network makes protecting the assets imperative. Attacks may be passive such as eavesdropping on the payload data. More serious threat are active attacks that try to gain control of the satellite, which may lead to the total lost of the satellite asset. To counter these threats, new satellite and ground systems are using cryptographic technologies to provide a range of services: confidentiality, entity & message authentication, and data integrity. Additionally, key management cryptographic services are required to support these services. This paper describes the key points of current satellite control and operations, that are authentication of the access to the satellite TMTC link and encryption of security relevant TM/TC data. For payload data management the key points are multi-user ground station access and high data rates both requiring frequent updates and uploads of keys with the corresponding key management methods. For secure satellite management authentication & key negotiation algorithms as HMAC-RIPEMD160, EC- DSA and EC-DH are used. Encryption of data uses algorithms as IDEA, AES, Triple-DES, or other. A channel coding and encryption unit for payload data provides download data rates up to Nx250 Mbps. The presented concepts are based on our experience and heritage of the security systems for all German MOD satellite projects (SATCOMBw2, SAR-Lupe multi- satellite system and German-French SAR-Lupe-Helios- II systems inter-operability) as well as for further international (KOMPSAT-II Payload data link system) and ESA activities (TMTC security and GMES).

  18. SPOT: Optimization Tool for Network Adaptable Security

    NASA Astrophysics Data System (ADS)

    Ksiezopolski, Bogdan; Szalachowski, Pawel; Kotulski, Zbigniew

    Recently we have observed the growth of the intelligent application especially with its mobile character, called e-anything. The implementation of these applications provides guarantee of security requirements of the cryptographic protocols which are used in the application. Traditionally the protocols have been configured with the strongest possible security mechanisms. Unfortunately, when the application is used by means of the mobile devices, the strongest protection can lead to the denial of services for them. The solution of this problem is introducing the quality of protection models which will scale the protection level depending on the actual threat level. In this article we would like to introduce the application which manages the protection level of the processes in the mobile environment. The Security Protocol Optimizing Tool (SPOT) optimizes the cryptographic protocol and defines the protocol version appropriate to the actual threat level. In this article the architecture of the SPOT is presented with a detailed description of the included modules.

  19. Quantum random oracle model for quantum digital signature

    NASA Astrophysics Data System (ADS)

    Shang, Tao; Lei, Qi; Liu, Jianwei

    2016-10-01

    The goal of this work is to provide a general security analysis tool, namely, the quantum random oracle (QRO), for facilitating the security analysis of quantum cryptographic protocols, especially protocols based on quantum one-way function. QRO is used to model quantum one-way function and different queries to QRO are used to model quantum attacks. A typical application of quantum one-way function is the quantum digital signature, whose progress has been hampered by the slow pace of the experimental realization. Alternatively, we use the QRO model to analyze the provable security of a quantum digital signature scheme and elaborate the analysis procedure. The QRO model differs from the prior quantum-accessible random oracle in that it can output quantum states as public keys and give responses to different queries. This tool can be a test bed for the cryptanalysis of more quantum cryptographic protocols based on the quantum one-way function.

  20. Authenticity techniques for PACS images and records

    NASA Astrophysics Data System (ADS)

    Wong, Stephen T. C.; Abundo, Marco; Huang, H. K.

    1995-05-01

    Along with the digital radiology environment supported by picture archiving and communication systems (PACS) comes a new problem: How to establish trust in multimedia medical data that exist only in the easily altered memory of a computer. Trust is characterized in terms of integrity and privacy of digital data. Two major self-enforcing techniques can be used to assure the authenticity of electronic images and text -- key-based cryptography and digital time stamping. Key-based cryptography associates the content of an image with the originator using one or two distinct keys and prevents alteration of the document by anyone other than the originator. A digital time stamping algorithm generates a characteristic `digital fingerprint' for the original document using a mathematical hash function, and checks that it has not been modified. This paper discusses these cryptographic algorithms and their appropriateness for a PACS environment. It also presents experimental results of cryptographic algorithms on several imaging modalities.

  1. Network Security via Biometric Recognition of Patterns of Gene Expression

    NASA Technical Reports Server (NTRS)

    Shaw, Harry C.

    2016-01-01

    Molecular biology provides the ability to implement forms of information and network security completely outside the bounds of legacy security protocols and algorithms. This paper addresses an approach which instantiates the power of gene expression for security. Molecular biology provides a rich source of gene expression and regulation mechanisms, which can be adopted to use in the information and electronic communication domains. Conventional security protocols are becoming increasingly vulnerable due to more intensive, highly capable attacks on the underlying mathematics of cryptography. Security protocols are being undermined by social engineering and substandard implementations by IT (Information Technology) organizations. Molecular biology can provide countermeasures to these weak points with the current security approaches. Future advances in instruments for analyzing assays will also enable this protocol to advance from one of cryptographic algorithms to an integrated system of cryptographic algorithms and real-time assays of gene expression products.

  2. Network Security via Biometric Recognition of Patterns of Gene Expression

    NASA Technical Reports Server (NTRS)

    Shaw, Harry C.

    2016-01-01

    Molecular biology provides the ability to implement forms of information and network security completely outside the bounds of legacy security protocols and algorithms. This paper addresses an approach which instantiates the power of gene expression for security. Molecular biology provides a rich source of gene expression and regulation mechanisms, which can be adopted to use in the information and electronic communication domains. Conventional security protocols are becoming increasingly vulnerable due to more intensive, highly capable attacks on the underlying mathematics of cryptography. Security protocols are being undermined by social engineering and substandard implementations by IT organizations. Molecular biology can provide countermeasures to these weak points with the current security approaches. Future advances in instruments for analyzing assays will also enable this protocol to advance from one of cryptographic algorithms to an integrated system of cryptographic algorithms and real-time expression and assay of gene expression products.

  3. The model of encryption algorithm based on non-positional polynomial notations and constructed on an SP-network

    NASA Astrophysics Data System (ADS)

    Kapalova, N.; Haumen, A.

    2018-05-01

    This paper addresses to structures and properties of the cryptographic information protection algorithm model based on NPNs and constructed on an SP-network. The main task of the research is to increase the cryptostrength of the algorithm. In the paper, the transformation resulting in the improvement of the cryptographic strength of the algorithm is described in detail. The proposed model is based on an SP-network. The reasons for using the SP-network in this model are the conversion properties used in these networks. In the encryption process, transformations based on S-boxes and P-boxes are used. It is known that these transformations can withstand cryptanalysis. In addition, in the proposed model, transformations that satisfy the requirements of the "avalanche effect" are used. As a result of this work, a computer program that implements an encryption algorithm model based on the SP-network has been developed.

  4. Quantum-noise randomized data encryption for wavelength-division-multiplexed fiber-optic networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Corndorf, Eric; Liang Chuang; Kanter, Gregory S.

    2005-06-15

    We demonstrate high-rate randomized data-encryption through optical fibers using the inherent quantum-measurement noise of coherent states of light. Specifically, we demonstrate 650 Mbit/s data encryption through a 10 Gbit/s data-bearing, in-line amplified 200-km-long line. In our protocol, legitimate users (who share a short secret key) communicate using an M-ry signal set while an attacker (who does not share the secret key) is forced to contend with the fundamental and irreducible quantum-measurement noise of coherent states. Implementations of our protocol using both polarization-encoded signal sets as well as polarization-insensitive phase-keyed signal sets are experimentally and theoretically evaluated. Different from the performancemore » criteria for the cryptographic objective of key generation (quantum key-generation), one possible set of performance criteria for the cryptographic objective of data encryption is established and carefully considered.« less

  5. Min-entropy uncertainty relation for finite-size cryptography

    NASA Astrophysics Data System (ADS)

    Ng, Nelly Huei Ying; Berta, Mario; Wehner, Stephanie

    2012-10-01

    Apart from their foundational significance, entropic uncertainty relations play a central role in proving the security of quantum cryptographic protocols. Of particular interest are therefore relations in terms of the smooth min-entropy for Bennett-Brassard 1984 (BB84) and six-state encodings. The smooth min-entropy Hminɛ(X/B) quantifies the negative logarithm of the probability for an attacker B to guess X, except with a small failure probability ɛ. Previously, strong uncertainty relations were obtained which are valid in the limit of large block lengths. Here, we prove an alternative uncertainty relation in terms of the smooth min-entropy that is only marginally less strong but has the crucial property that it can be applied to rather small block lengths. This paves the way for a practical implementation of many cryptographic protocols. As part of our proof we show tight uncertainty relations for a family of Rényi entropies that may be of independent interest.

  6. Security of subcarrier wave quantum key distribution against the collective beam-splitting attack.

    PubMed

    Miroshnichenko, G P; Kozubov, A V; Gaidash, A A; Gleim, A V; Horoshko, D B

    2018-04-30

    We consider a subcarrier wave quantum key distribution (QKD) system, where quantum encoding is carried out at weak sidebands generated around a coherent optical beam as a result of electro-optical phase modulation. We study security of two protocols, B92 and BB84, against one of the most powerful attacks for this class of systems, the collective beam-splitting attack. Our analysis includes the case of high modulation index, where the sidebands are essentially multimode. We demonstrate numerically and experimentally that a subcarrier wave QKD system with realistic parameters is capable of distributing cryptographic keys over large distances in presence of collective attacks. We also show that BB84 protocol modification with discrimination of only one state in each basis performs not worse than the original BB84 protocol in this class of QKD systems, thus significantly simplifying the development of cryptographic networks using the considered QKD technique.

  7. Continuous-variable protocol for oblivious transfer in the noisy-storage model.

    PubMed

    Furrer, Fabian; Gehring, Tobias; Schaffner, Christian; Pacher, Christoph; Schnabel, Roman; Wehner, Stephanie

    2018-04-13

    Cryptographic protocols are the backbone of our information society. This includes two-party protocols which offer protection against distrustful players. Such protocols can be built from a basic primitive called oblivious transfer. We present and experimentally demonstrate here a quantum protocol for oblivious transfer for optical continuous-variable systems, and prove its security in the noisy-storage model. This model allows us to establish security by sending more quantum signals than an attacker can reliably store during the protocol. The security proof is based on uncertainty relations which we derive for continuous-variable systems, that differ from the ones used in quantum key distribution. We experimentally demonstrate in a proof-of-principle experiment the proposed oblivious transfer protocol for various channel losses by using entangled two-mode squeezed states measured with balanced homodyne detection. Our work enables the implementation of arbitrary two-party quantum cryptographic protocols with continuous-variable communication systems.

  8. Physical key-protected one-time pad

    PubMed Central

    Horstmeyer, Roarke; Judkewitz, Benjamin; Vellekoop, Ivo M.; Assawaworrarit, Sid; Yang, Changhuei

    2013-01-01

    We describe an encrypted communication principle that forms a secure link between two parties without electronically saving either of their keys. Instead, random cryptographic bits are kept safe within the unique mesoscopic randomness of two volumetric scattering materials. We demonstrate how a shared set of patterned optical probes can generate 10 gigabits of statistically verified randomness between a pair of unique 2 mm3 scattering objects. This shared randomness is used to facilitate information-theoretically secure communication following a modified one-time pad protocol. Benefits of volumetric physical storage over electronic memory include the inability to probe, duplicate or selectively reset any bits without fundamentally altering the entire key space. Our ability to securely couple the randomness contained within two unique physical objects can extend to strengthen hardware required by a variety of cryptographic protocols, which is currently a critically weak link in the security pipeline of our increasingly mobile communication culture. PMID:24345925

  9. Local-Area-Network Simulator

    NASA Technical Reports Server (NTRS)

    Gibson, Jim; Jordan, Joe; Grant, Terry

    1990-01-01

    Local Area Network Extensible Simulator (LANES) computer program provides method for simulating performance of high-speed local-area-network (LAN) technology. Developed as design and analysis software tool for networking computers on board proposed Space Station. Load, network, link, and physical layers of layered network architecture all modeled. Mathematically models according to different lower-layer protocols: Fiber Distributed Data Interface (FDDI) and Star*Bus. Written in FORTRAN 77.

  10. Multijunction photovoltaic device and fabrication method

    DOEpatents

    Arya, Rajeewa R.; Catalano, Anthony W.

    1993-09-21

    A multijunction photovoltaic device includes first and second amorphous silicon PIN photovoltaic cells in a stacked arrangement. An interface layer, composed of a doped silicon compound, is disposed between the two cells and has a lower bandgap than the respective n- and p-type adjacent layers of the first and second cells. The interface layer forms an ohmic contact with the one or the adjacent cell layers of the same conductivity type, and a tunnel junction with the other of the adjacent cell layers. The disclosed device is fabricated by a glow discharge process.

  11. Detection of entanglement in asymmetric quantum networks and multipartite quantum steering.

    PubMed

    Cavalcanti, D; Skrzypczyk, P; Aguilar, G H; Nery, R V; Ribeiro, P H Souto; Walborn, S P

    2015-08-03

    The future of quantum communication relies on quantum networks composed by observers sharing multipartite quantum states. The certification of multipartite entanglement will be crucial to the usefulness of these networks. In many real situations it is natural to assume that some observers are more trusted than others in the sense that they have more knowledge of their measurement apparatuses. Here we propose a general method to certify all kinds of multipartite entanglement in this asymmetric scenario and experimentally demonstrate it in an optical experiment. Our results, which can be seen as a definition of genuine multipartite quantum steering, give a method to detect entanglement in a scenario in between the standard entanglement and fully device-independent scenarios, and provide a basis for semi-device-independent cryptographic applications in quantum networks.

  12. A Double Perturbation Method for Reducing Dynamical Degradation of the Digital Baker Map

    NASA Astrophysics Data System (ADS)

    Liu, Lingfeng; Lin, Jun; Miao, Suoxia; Liu, Bocheng

    2017-06-01

    The digital Baker map is widely used in different kinds of cryptosystems, especially for image encryption. However, any chaotic map which is realized on the finite precision device (e.g. computer) will suffer from dynamical degradation, which refers to short cycle lengths, low complexity and strong correlations. In this paper, a novel double perturbation method is proposed for reducing the dynamical degradation of the digital Baker map. Both state variables and system parameters are perturbed by the digital logistic map. Numerical experiments show that the perturbed Baker map can achieve good statistical and cryptographic properties. Furthermore, a new image encryption algorithm is provided as a simple application. With a rather simple algorithm, the encrypted image can achieve high security, which is competitive to the recently proposed image encryption algorithms.

  13. Breaking down the barriers of using strong authentication and encryption in resource constrained embedded systems

    NASA Astrophysics Data System (ADS)

    Knobler, Ron; Scheffel, Peter; Jackson, Scott; Gaj, Kris; Kaps, Jens Peter

    2013-05-01

    Various embedded systems, such as unattended ground sensors (UGS), are deployed in dangerous areas, where they are subject to compromise. Since numerous systems contain a network of devices that communicate with each other (often times with commercial off the shelf [COTS] radios), an adversary is able to intercept messages between system devices, which jeopardizes sensitive information transmitted by the system (e.g. location of system devices). Secret key algorithms such as AES are a very common means to encrypt all system messages to a sufficient security level, for which lightweight implementations exist for even very resource constrained devices. However, all system devices must use the appropriate key to encrypt and decrypt messages from each other. While traditional public key algorithms (PKAs), such as RSA and Elliptic Curve Cryptography (ECC), provide a sufficiently secure means to provide authentication and a means to exchange keys, these traditional PKAs are not suitable for very resource constrained embedded systems or systems which contain low reliability communication links (e.g. mesh networks), especially as the size of the network increases. Therefore, most UGS and other embedded systems resort to pre-placed keys (PPKs) or other naïve schemes which greatly reduce the security and effectiveness of the overall cryptographic approach. McQ has teamed with the Cryptographic Engineering Research Group (CERG) at George Mason University (GMU) to develop an approach using revolutionary cryptographic techniques that provides both authentication and encryption, but on resource constrained embedded devices, without the burden of large amounts of key distribution or storage.

  14. Scattering from very rough layers under the geometric optics approximation: further investigation.

    PubMed

    Pinel, Nicolas; Bourlier, Christophe

    2008-06-01

    Scattering from very rough homogeneous layers is studied in the high-frequency limit (under the geometric optics approximation) by taking the shadowing effect into account. To do so, the iterated Kirchhoff approximation, recently developed by Pinel et al. [Waves Random Complex Media17, 283 (2007)] and reduced to the geometric optics approximation, is used and investigated in more detail. The contributions from the higher orders of scattering inside the rough layer are calculated under the iterated Kirchhoff approximation. The method can be applied to rough layers of either very rough or perfectly flat lower interfaces, separating either lossless or lossy media. The results are compared with the PILE (propagation-inside-layer expansion) method, recently developed by Déchamps et al. [J. Opt. Soc. Am. A23, 359 (2006)], and accelerated by the forward-backward method with spectral acceleration. They highlight that there is very good agreement between the developed method and the reference numerical method for all scattering orders and that the method can be applied to root-mean-square (RMS) heights at least down to 0.25lambda.

  15. Joint-layer encoder optimization for HEVC scalable extensions

    NASA Astrophysics Data System (ADS)

    Tsai, Chia-Ming; He, Yuwen; Dong, Jie; Ye, Yan; Xiu, Xiaoyu; He, Yong

    2014-09-01

    Scalable video coding provides an efficient solution to support video playback on heterogeneous devices with various channel conditions in heterogeneous networks. SHVC is the latest scalable video coding standard based on the HEVC standard. To improve enhancement layer coding efficiency, inter-layer prediction including texture and motion information generated from the base layer is used for enhancement layer coding. However, the overall performance of the SHVC reference encoder is not fully optimized because rate-distortion optimization (RDO) processes in the base and enhancement layers are independently considered. It is difficult to directly extend the existing joint-layer optimization methods to SHVC due to the complicated coding tree block splitting decisions and in-loop filtering process (e.g., deblocking and sample adaptive offset (SAO) filtering) in HEVC. To solve those problems, a joint-layer optimization method is proposed by adjusting the quantization parameter (QP) to optimally allocate the bit resource between layers. Furthermore, to make more proper resource allocation, the proposed method also considers the viewing probability of base and enhancement layers according to packet loss rate. Based on the viewing probability, a novel joint-layer RD cost function is proposed for joint-layer RDO encoding. The QP values of those coding tree units (CTUs) belonging to lower layers referenced by higher layers are decreased accordingly, and the QP values of those remaining CTUs are increased to keep total bits unchanged. Finally the QP values with minimal joint-layer RD cost are selected to match the viewing probability. The proposed method was applied to the third temporal level (TL-3) pictures in the Random Access configuration. Simulation results demonstrate that the proposed joint-layer optimization method can improve coding performance by 1.3% for these TL-3 pictures compared to the SHVC reference encoder without joint-layer optimization.

  16. Number Theory and Public-Key Cryptography.

    ERIC Educational Resources Information Center

    Lefton, Phyllis

    1991-01-01

    Described are activities in the study of techniques used to conceal the meanings of messages and data. Some background information and two BASIC programs that illustrate the algorithms used in a new cryptographic system called "public-key cryptography" are included. (CW)

  17. Psst, Can You Keep a Secret?

    PubMed

    Vassilev, Apostol; Mouha, Nicky; Brandão, Luís

    2018-01-01

    The security of encrypted data depends not only on the theoretical properties of cryptographic primitives but also on the robustness of their implementations in software and hardware. Threshold cryptography introduces a computational paradigm that enables higher assurance for such implementations.

  18. Shannon: Theory and cryptography

    NASA Astrophysics Data System (ADS)

    Roefs, H. F. A.

    1982-11-01

    The ideas of Shannon as a theoretical basis for cryptography are discussed. The notion of mutual information is introduced to provide a deeper understanding of the functioning of cryptographic systems. Shannon's absolute secure cryptosystem and his notion of unicity distance are explained.

  19. A solution-processed quaternary oxide system obtained at low-temperature using a vertical diffusion technique

    PubMed Central

    Yoon, Seokhyun; Kim, Si Joon; Tak, Young Jun; Kim, Hyun Jae

    2017-01-01

    We report a method for fabricating solution-processed quaternary In-Ga-Zn-O (IGZO) thin-film transistors (TFTs) at low annealing temperatures using a vertical diffusion technique (VDT). The VDT is a deposition process for spin-coating binary and ternary oxide layers consecutively and annealing at once. With the VDT, uniform and dense quaternary oxide layers were fabricated at lower temperatures (280 °C). Compared to conventional IGZO and ternary In-Zn-O (IZO) thin films, VDT IGZO thin film had higher density of the metal-oxide bonds and lower density of the oxygen vacancies. The field-effect mobility of VDT IGZO TFT increased three times with an improved stability under positive bias stress than IZO TFT due to the reduction in oxygen vacancies. Therefore, the VDT process is a simple method that reduces the processing temperature without any additional treatment for quaternary oxide semiconductors with uniform layers. PMID:28230088

  20. A solution-processed quaternary oxide system obtained at low-temperature using a vertical diffusion technique

    NASA Astrophysics Data System (ADS)

    Yoon, Seokhyun; Kim, Si Joon; Tak, Young Jun; Kim, Hyun Jae

    2017-02-01

    We report a method for fabricating solution-processed quaternary In-Ga-Zn-O (IGZO) thin-film transistors (TFTs) at low annealing temperatures using a vertical diffusion technique (VDT). The VDT is a deposition process for spin-coating binary and ternary oxide layers consecutively and annealing at once. With the VDT, uniform and dense quaternary oxide layers were fabricated at lower temperatures (280 °C). Compared to conventional IGZO and ternary In-Zn-O (IZO) thin films, VDT IGZO thin film had higher density of the metal-oxide bonds and lower density of the oxygen vacancies. The field-effect mobility of VDT IGZO TFT increased three times with an improved stability under positive bias stress than IZO TFT due to the reduction in oxygen vacancies. Therefore, the VDT process is a simple method that reduces the processing temperature without any additional treatment for quaternary oxide semiconductors with uniform layers.

  1. A solution-processed quaternary oxide system obtained at low-temperature using a vertical diffusion technique.

    PubMed

    Yoon, Seokhyun; Kim, Si Joon; Tak, Young Jun; Kim, Hyun Jae

    2017-02-23

    We report a method for fabricating solution-processed quaternary In-Ga-Zn-O (IGZO) thin-film transistors (TFTs) at low annealing temperatures using a vertical diffusion technique (VDT). The VDT is a deposition process for spin-coating binary and ternary oxide layers consecutively and annealing at once. With the VDT, uniform and dense quaternary oxide layers were fabricated at lower temperatures (280 °C). Compared to conventional IGZO and ternary In-Zn-O (IZO) thin films, VDT IGZO thin film had higher density of the metal-oxide bonds and lower density of the oxygen vacancies. The field-effect mobility of VDT IGZO TFT increased three times with an improved stability under positive bias stress than IZO TFT due to the reduction in oxygen vacancies. Therefore, the VDT process is a simple method that reduces the processing temperature without any additional treatment for quaternary oxide semiconductors with uniform layers.

  2. Jovian vortices by simulated annealing

    NASA Astrophysics Data System (ADS)

    Morrison, P. J.; Flierl, G. R.; Swaminathan, R. V.

    2017-11-01

    We explore the conditions required for isolated vortices to exist in sheared zonal flows and the stability of the underlying zonal winds. This is done using the standard 2-layer quasigeostrophic model with the lower layer depth becoming infinite; however, this model differs from the usual layer model because the lower layer is not assumed to be motionless but has a steady configuration of alternating zonal flows. Steady state vortices are obtained by a simulated annealing computational method introduced in, generalized and applied in in fluid flow, and used in the context of magnetohydrodynamics in. Various cases of vortices with a constant potential vorticity anomaly atop zonal winds and the stability of the underlying winds are considered using a mix of computational and analytical techniques. U.S. Department of Energy Contract DE-FG05-80ET-53088.

  3. Stagnation-point heat-transfer rate predictions at aeroassist flight conditions

    NASA Technical Reports Server (NTRS)

    Gupta, Roop N.; Jones, Jim J.; Rochelle, William C.

    1992-01-01

    The results are presented for the stagnation-point heat-transfer rates used in the design process of the Aeroassist Flight Experiment (AFE) vehicle over its entire aeropass trajectory. The prediction methods used in this investigation demonstrate the application of computational fluid dynamics (CFD) techniques to a wide range of flight conditions and their usefulness in a design process. The heating rates were computed by a viscous-shock-layer (VSL) code at the lower altitudes and by a Navier-Stokes (N-S) code for the higher altitude cases. For both methods, finite-rate chemically reacting gas was considered, and a temperature-dependent wall-catalysis model was used. The wall temperature for each case was assumed to be radiative equilibrium temperature, based on total heating. The radiative heating was estimated by using a correlation equation. Wall slip was included in the N-S calculation method, and this method implicitly accounts for shock slip. The N-S/VSL combination of projection methods was established by comparison with the published benchmark flow-field code LAURA results at lower altitudes, and the direct simulation Monte Carlo results at higher altitude cases. To obtain the design heating rate over the entire forward face of the vehicle, a boundary-layer method (BLIMP code) that employs reacting chemistry and surface catalysis was used. The ratio of the VSL or N-S method prediction to that obtained from the boundary-layer method code at the stagnation point is used to define an adjustment factor, which accounts for the errors involved in using the boundary-layer method.

  4. Method for making a uranium chloride salt product

    DOEpatents

    Miller, William E [Naperville, IL; Tomczuk, Zygmunt [Lockport, IL

    2004-10-05

    The subject apparatus provides a means to produce UCl.sub.3 in large quantities without incurring corrosion of the containment vessel or associated apparatus. Gaseous Cl is injected into a lower layer of Cd where CdCl.sub.2 is formed. Due to is lower density, the CdCl.sub.2 rises through the Cd layer into a layer of molten LiCl--KCL salt where a rotatable basket containing uranium ingots is suspended. The CdCl.sub.2 reacts with the uranium to form UCl.sub.3 and Cd. Due to density differences, the Cd sinks down to the liquid Cd layer and is reused. The UCl.sub.3 combines with the molten salt. During production the temperature is maintained at about 600.degree. C. while after the uranium has been depleted the salt temperature is lowered, the molten salt is pressure siphoned from the vessel, and the salt product LiCl--KCl-30 mol % UCl.sub.3 is solidified.

  5. Recovering DC coefficients in block-based DCT.

    PubMed

    Uehara, Takeyuki; Safavi-Naini, Reihaneh; Ogunbona, Philip

    2006-11-01

    It is a common approach for JPEG and MPEG encryption systems to provide higher protection for dc coefficients and less protection for ac coefficients. Some authors have employed a cryptographic encryption algorithm for the dc coefficients and left the ac coefficients to techniques based on random permutation lists which are known to be weak against known-plaintext and chosen-ciphertext attacks. In this paper we show that in block-based DCT, it is possible to recover dc coefficients from ac coefficients with reasonable image quality and show the insecurity of image encryption methods which rely on the encryption of dc values using a cryptoalgorithm. The method proposed in this paper combines dc recovery from ac coefficients and the fact that ac coefficients can be recovered using a chosen ciphertext attack. We demonstrate that a method proposed by Tang to encrypt and decrypt MPEG video can be completely broken.

  6. Psst, Can You Keep a Secret?

    PubMed Central

    Vassilev, Apostol; Mouha, Nicky; Brandão, Luís

    2018-01-01

    The security of encrypted data depends not only on the theoretical properties of cryptographic primitives but also on the robustness of their implementations in software and hardware. Threshold cryptography introduces a computational paradigm that enables higher assurance for such implementations. PMID:29576634

  7. 21 CFR 1311.08 - Incorporation by reference.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... of Standards and Technology, Computer Security Division, Information Technology Laboratory, National... standards are available from the National Institute of Standards and Technology, Computer Security Division... 140-2, Security Requirements for Cryptographic Modules, May 25, 2001, as amended by Change Notices 2...

  8. Case Study: OpenSSL 2012 Validation

    DTIC Science & Technology

    2013-08-01

    there are probably millions of users who are impacted directly, and hundreds of millions who are indirectly affected. Cryptographic libraries are...UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESSES 8. PERFORMING ORGANIZATION REPORT NUMBER D-4991 H13 -001174 Institute for Defense

  9. Implicit treatment of diffusion terms in lower-upper algorithms

    NASA Technical Reports Server (NTRS)

    Shih, T. I.-P.; Steinthorsson, E.; Chyu, W. J.

    1993-01-01

    A method is presented which allows diffusion terms to be treated implicitly in the lower-upper (LU) algorithm (which is a commonly used method for solving 'compressible' Euler and Navier-Stokes equations) so that the algorithm's good stability properties will not be impaired. The new method generalizes the concept of LU factorization from that associated with the sign of eigenvalues to that associated with backward- and forward-difference operators without regard to eigenvalues. The method is verified in a turbulent boundary layer study.

  10. Method for optical and mechanically coupling optical fibers

    DOEpatents

    Toeppen, J.S.

    1996-10-01

    A method and apparatus are disclosed for splicing optical fibers. A fluorescing solder glass frit having a melting point lower than the melting point of first and second optical fibers is prepared. The solder glass frit is then attached to the end of the first optical fiber and/or the end of the second optical fiber. The ends of the optical fibers are aligned and placed in close proximity to each other. The solder glass frit is then heated to a temperature which is lower than the melting temperature of the first and second optical fibers, but which is high enough to melt the solder glass frit. A force is applied to the first and second optical fibers pushing the ends of the fibers towards each other. As the solder glass flit becomes molten, the layer of molten solder glass is compressed into a thin layer between the first and second optical fibers. The thin compressed layer of molten solder glass is allowed to cool such that the first and second optical fibers are bonded to each other by the hardened layer of solder glass. 6 figs.

  11. Method for optical and mechanically coupling optical fibers

    DOEpatents

    Toeppen, John S.

    1996-01-01

    A method and apparatus for splicing optical fibers. A fluorescing solder glass frit having a melting point lower than the melting point of first and second optical fibers is prepared. The solder glass frit is then attached to the end of the first optical fiber and/or the end of the second optical fiber. The ends of the optical fibers are aligned and placed in close proximity to each other. The solder glass frit is then heated to a temperature which is lower than the melting temperature of the first and second optical fibers, but which is high enough to melt the solder glass frit. A force is applied to the first and second optical fibers pushing the ends of the fibers towards each other. As the solder glass flit becomes molten, the layer of molten solder glass is compressed into a thin layer between the first and second optical fibers. The thin compressed layer of molten solder glass is allowed to cool such that the first and second optical fibers are bonded to each other by the hardened layer of solder glass.

  12. High performance liquid chromatography: Tandem mass spectrometric determination of cisplatin levels in different visceral pleura layers of rats.

    PubMed

    Xia, Hui; Zhang, Wen; Li, Yingjie; Yu, Changhai

    2015-05-01

    The aim of the present study was to investigate the concentration of cisplatin in different layers of the visceral pleura in rats, following drug administration. In this study, a sensitive and specific liquid chromatography method coupled with electrospray ionization-tandem mass spectrometry was established to investigate the disposition of cisplatin in different layers of the visceral pleura in rats. Methodological data, including specificity, linearity, accuracy, recovery, precision and lower limits of quantification, confirmed that this novel method may be used to efficiently quantify the cisplatin concentrations in visceral pleura of rats following administration of the drug. Furthermore, the results demonstrated that the desired drug concentration was not achieved in the outer or inner elastic layers of the visceral pleura following injection with cisplatin through various administration methods.

  13. Design of a novel bilayered gastric mucoadhesive system for localized and unidirectional release of lamotrigine

    PubMed Central

    Mohana Raghava Srivalli, K.; Lakshmi, P.K.; Balasubramaniam, J.

    2012-01-01

    Lamotrigine is a BCS class II drug with pH dependent solubility. The bilayered gastric mucoadhesive tablets of lamotrigine were designed such that the drug and controlled release polymers were incorporated in the upper layer and the lower layer had the mucoadhesive polymers. The major ingredients selected for the upper layer were the drug and control release polymer (either HPMC K15M or polyox) while the lower MA layer predominantly comprised of Carbopol 974P. A 23 full factorial design was constructed for this study and the tablets were optimized for parameters like tablet size, shape, ex vivo mucoadhesive properties and unidirectional drug release. Oval tablets with an average size of 14 mm diameter were set optimum. Maximum mucoadhesive bond strength of 79.3 ± 0.91 * 103 dyn/cm2 was achieved with carbopol when used in combination with a synergistic resin polymer. All the tested formulations presented a mucoadhesion time of greater than 12 h. The incorporation of methacrylic polymers in the lower layer ensured unidirectional drug release from the bilayered tablets. The unidirectional drug release was confirmed after comparing the dissolution results of paddle method with those of a modified basket method. Model independent similarity and dissimilarity factor methods were used for the comparison of dissolution results. Controlled drug release profiles with zero order kinetics were obtained with polyox and HPMC K15M which reported t90% at 6th and 12th hours, respectively. The “n” value with polyox was 0.992 and that with HPMC K15M was 0.946 indicating an approximate case II transport. These two formulations showed the potential for oral administration of lamotrigine as bilayered gastric mucoadhesive tablets by yielding highest similarity factor values, 96.06 and 92.47, respectively, between the paddle and modified basket method dissolution release profiles apart from reporting the best tablet physical properties and maximum mucoadhesive strength. PMID:24109205

  14. New public key cryptosystem based on quaternions

    NASA Astrophysics Data System (ADS)

    Durcheva, Mariana; Karailiev, Kristian

    2017-12-01

    Quaternions are not commonly used in cryptography. Nevertheless, the noncommutativity of their multiplication makes them suitable for cryptographic purposes. In this paper we suggest a Diffie-Hellman like cryptosystem based on the the quaternions. Additionally, a computer realization of the protocol is given.

  15. Reconstruction method for data protection in telemedicine systems

    NASA Astrophysics Data System (ADS)

    Buldakova, T. I.; Suyatinov, S. I.

    2015-03-01

    In the report the approach to protection of transmitted data by creation of pair symmetric keys for the sensor and the receiver is offered. Since biosignals are unique for each person, their corresponding processing allows to receive necessary information for creation of cryptographic keys. Processing is based on reconstruction of the mathematical model generating time series that are diagnostically equivalent to initial biosignals. Information about the model is transmitted to the receiver, where the restoration of physiological time series is performed using the reconstructed model. Thus, information about structure and parameters of biosystem model received in the reconstruction process can be used not only for its diagnostics, but also for protection of transmitted data in telemedicine complexes.

  16. Method Producing an SNS Superconducting Junction with Weak Link Barrier

    NASA Technical Reports Server (NTRS)

    Hunt, Brian D. (Inventor)

    1999-01-01

    A method of producing a high temperature superconductor Josephson element and an improved SNS weak link barrier element is provided. A YBaCuO superconducting electrode film is deposited on a substrate at a temperature of approximately 800 C. A weak link barrier layer of a nonsuperconducting film of N-YBaCuO is deposited over the electrode at a temperature range of 520 C. to 540 C. at a lower deposition rate. Subsequently a superconducting counter-electrode film layer of YBaCuO is deposited over the weak link barrier layer at approximately 800 C. The weak link barrier layer has a thickness of approximately 50 A and the SNS element can be constructed to provide an edge geometry junction.

  17. Secure password-based authenticated key exchange for web services

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options inmore » the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.« less

  18. Privacy-preserving genome-wide association studies on cloud environment using fully homomorphic encryption

    PubMed Central

    2015-01-01

    Objective Developed sequencing techniques are yielding large-scale genomic data at low cost. A genome-wide association study (GWAS) targeting genetic variations that are significantly associated with a particular disease offers great potential for medical improvement. However, subjects who volunteer their genomic data expose themselves to the risk of privacy invasion; these privacy concerns prevent efficient genomic data sharing. Our goal is to presents a cryptographic solution to this problem. Methods To maintain the privacy of subjects, we propose encryption of all genotype and phenotype data. To allow the cloud to perform meaningful computation in relation to the encrypted data, we use a fully homomorphic encryption scheme. Noting that we can evaluate typical statistics for GWAS from a frequency table, our solution evaluates frequency tables with encrypted genomic and clinical data as input. We propose to use a packing technique for efficient evaluation of these frequency tables. Results Our solution supports evaluation of the D′ measure of linkage disequilibrium, the Hardy-Weinberg Equilibrium, the χ2 test, etc. In this paper, we take χ2 test and linkage disequilibrium as examples and demonstrate how we can conduct these algorithms securely and efficiently in an outsourcing setting. We demonstrate with experimentation that secure outsourcing computation of one χ2 test with 10, 000 subjects requires about 35 ms and evaluation of one linkage disequilibrium with 10, 000 subjects requires about 80 ms. Conclusions With appropriate encoding and packing technique, cryptographic solutions based on fully homomorphic encryption for secure computations of GWAS can be practical. PMID:26732892

  19. Developments of the Physical and Electrical Properties of NiCr and NiCrSi Single-Layer and Bi-Layer Nano-Scale Thin-Film Resistors.

    PubMed

    Cheng, Huan-Yi; Chen, Ying-Chung; Li, Chi-Lun; Li, Pei-Jou; Houng, Mau-Phon; Yang, Cheng-Fu

    2016-02-25

    In this study, commercial-grade NiCr (80 wt % Ni, 20 wt % Cr) and NiCrSi (55 wt % Ni, 40 wt % Cr, 5 wt % Si) were used as targets and the sputtering method was used to deposit NiCr and NiCrSi thin films on Al₂O₃ and Si substrates at room temperature under different deposition time. X-ray diffraction patterns showed that the NiCr and NiCrSi thin films were amorphous phase, and the field-effect scanning electronic microscope observations showed that only nano-crystalline grains were revealed on the surfaces of the NiCr and NiCrSi thin films. The log (resistivity) values of the NiCr and NiCrSi thin-film resistors decreased approximately linearly as their thicknesses increased. We found that the value of temperature coefficient of resistance (TCR value) of the NiCr thin-film resistors was positive and that of the NiCrSi thin-film resistors was negative. To investigate these thin-film resistors with a low TCR value, we designed a novel bi-layer structure to fabricate the thin-film resistors via two different stacking methods. The bi-layer structures were created by depositing NiCr for 10 min as the upper (or lower) layer and depositing NiCrSi for 10, 30, or 60 min as the lower (or upper) layer. We aim to show that the stacking method had no apparent effect on the resistivity of the NiCr-NiCrSi bi-layer thin-film resistors but had large effect on the TCR value.

  20. Developments of the Physical and Electrical Properties of NiCr and NiCrSi Single-Layer and Bi-Layer Nano-Scale Thin-Film Resistors

    PubMed Central

    Cheng, Huan-Yi; Chen, Ying-Chung; Li, Chi-Lun; Li, Pei-Jou; Houng, Mau-Phon; Yang, Cheng-Fu

    2016-01-01

    In this study, commercial-grade NiCr (80 wt % Ni, 20 wt % Cr) and NiCrSi (55 wt % Ni, 40 wt % Cr, 5 wt % Si) were used as targets and the sputtering method was used to deposit NiCr and NiCrSi thin films on Al2O3 and Si substrates at room temperature under different deposition time. X-ray diffraction patterns showed that the NiCr and NiCrSi thin films were amorphous phase, and the field-effect scanning electronic microscope observations showed that only nano-crystalline grains were revealed on the surfaces of the NiCr and NiCrSi thin films. The log (resistivity) values of the NiCr and NiCrSi thin-film resistors decreased approximately linearly as their thicknesses increased. We found that the value of temperature coefficient of resistance (TCR value) of the NiCr thin-film resistors was positive and that of the NiCrSi thin-film resistors was negative. To investigate these thin-film resistors with a low TCR value, we designed a novel bi-layer structure to fabricate the thin-film resistors via two different stacking methods. The bi-layer structures were created by depositing NiCr for 10 min as the upper (or lower) layer and depositing NiCrSi for 10, 30, or 60 min as the lower (or upper) layer. We aim to show that the stacking method had no apparent effect on the resistivity of the NiCr-NiCrSi bi-layer thin-film resistors but had large effect on the TCR value. PMID:28344296

  1. Use of a thin-layer technique in thyroid fine needle aspiration.

    PubMed

    Malle, Despoina; Valeri, Rosalia-Maria; Pazaitou-Panajiotou, Kalliopi; Kiziridou, Anastasia; Vainas, Iraklis; Destouni, Charicleia

    2006-01-01

    To investigate the efficacy of the ThinPrep Processor (Cytyc Corporation, Boxborough, Massachusetts, U.S.A) in fine needle aspiration (FNA) of thyroid gland lesions. This study included 459 thyroid FNA specimens obtained from patients who came to our endocrinology department with various thyroid disorders over 3 years. The cytologic material was prepared using both the conventional and ThinPrep method in the first 2 years (285 cases), while in the last one only the ThinPrep method was used (1 74 cases). The smears were stained using a modified Papanicolaou procedure and May-Grünwald-Giemsa stain. Immunocytochemistry was performed on thin-layer slides using specific monoclonal antibodies when needed. Thin-layer and direct smear diagnoses were compared with the final cytologic or histologic diagnoses, when available. Our cases included 279 adenomatoid nodules, 15 cases of Hashimoto thyroiditis, 45 follicular neoplasms, 14 Hürthle cell tumors, 58 papillary carcinomas and 1 5 anaplastic carcinomas. Thin-layer preparations showed a trend toward a lower proportion of inadequate specimens and a lower false negative rate. Cytomorphologic features showed some differences between the 2 methods. Colloid was less frequently observed on ThinPrep slides, while nuclear detail and micronucleoli were more easily detected with this technique. Moreover, ThinPrep appeared to be the appropriate method for the use of ancillary techniques in suspicious cases. Thin-layer cytology improves the diagnostic accuracy of thyroid FNA and offers the possibility of performing new techniques, such as immunocytochemistry, on the same sample in order to detect malignancy as well as the type and origin of thyroid gland neoplasms.

  2. Security in Wireless Sensor Networks Employing MACGSP6

    ERIC Educational Resources Information Center

    Nitipaichit, Yuttasart

    2010-01-01

    Wireless Sensor Networks (WSNs) have unique characteristics which constrain them; including small energy stores, limited computation, and short range communication capability. Most traditional security algorithms use cryptographic primitives such as Public-key cryptography and are not optimized for energy usage. Employing these algorithms for the…

  3. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Draelos, Timothy John; Dautenhahn, Nathan; Schroeppel, Richard Crabtree

    The security of the widely-used cryptographic hash function SHA1 has been impugned. We have developed two replacement hash functions. The first, SHA1X, is a drop-in replacement for SHA1. The second, SANDstorm, has been submitted as a candidate to the NIST-sponsored SHA3 Hash Function competition.

  4. 76 FR 11433 - Federal Transition To Secure Hash Algorithm (SHA)-256

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-02

    ... generating digital signatures. Current information systems, Web servers, applications and workstation operating systems were designed to process, and use SHA-1 generated signatures. National Institute of... cryptographic keys, and more robust algorithms by December 2013. Government systems may begin to encounter...

  5. A Multi-Threaded Cryptographic Pseudorandom Number Generator Test Suite

    DTIC Science & Technology

    2016-09-01

    bitcoin thieves, Google releases patch. (2013, Aug. 16). SiliconANGLE. [Online]. Available: http://siliconangle.com/blog/2013/ 08/16/android-crypto-prng...flaw-aided- bitcoin -thieves-google-releases-patch/ [5] M. Gondree. (2014, Sep. 28). NPS POSIX thread pool library. [Online]. Available: https

  6. 48 CFR 352.239-71 - Standard for encryption language.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... language. 352.239-71 Section 352.239-71 Federal Acquisition Regulations System HEALTH AND HUMAN SERVICES... Information Processing Standard (FIPS) 140-2-compliant encryption (Security Requirements for Cryptographic Module, as amended) to protect all instances of HHS sensitive information during storage and transmission...

  7. 48 CFR 352.239-71 - Standard for encryption language.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... product has been validated under the Cryptographic Module Validation Program (see http://csrc.nist.gov... of the validation documentation to the Contracting Officer and the Contracting Officer's Technical... computers, desktop computers, and other mobile devices and portable media that store or process sensitive...

  8. 48 CFR 352.239-71 - Standard for encryption language.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... product has been validated under the Cryptographic Module Validation Program (see http://csrc.nist.gov... of the validation documentation to the Contracting Officer and the Contracting Officer's Technical... computers, desktop computers, and other mobile devices and portable media that store or process sensitive...

  9. 48 CFR 352.239-71 - Standard for encryption language.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... product has been validated under the Cryptographic Module Validation Program (see http://csrc.nist.gov... of the validation documentation to the Contracting Officer and the Contracting Officer's Technical... computers, desktop computers, and other mobile devices and portable media that store or process sensitive...

  10. An effective biometric discretization approach to extract highly discriminative, informative, and privacy-protective binary representation

    NASA Astrophysics Data System (ADS)

    Lim, Meng-Hui; Teoh, Andrew Beng Jin

    2011-12-01

    Biometric discretization derives a binary string for each user based on an ordered set of biometric features. This representative string ought to be discriminative, informative, and privacy protective when it is employed as a cryptographic key in various security applications upon error correction. However, it is commonly believed that satisfying the first and the second criteria simultaneously is not feasible, and a tradeoff between them is always definite. In this article, we propose an effective fixed bit allocation-based discretization approach which involves discriminative feature extraction, discriminative feature selection, unsupervised quantization (quantization that does not utilize class information), and linearly separable subcode (LSSC)-based encoding to fulfill all the ideal properties of a binary representation extracted for cryptographic applications. In addition, we examine a number of discriminative feature-selection measures for discretization and identify the proper way of setting an important feature-selection parameter. Encouraging experimental results vindicate the feasibility of our approach.

  11. Too good to be true: when overwhelming evidence fails to convince.

    PubMed

    Gunn, Lachlan J; Chapeau-Blondeau, François; McDonnell, Mark D; Davis, Bruce R; Allison, Andrew; Abbott, Derek

    2016-03-01

    Is it possible for a large sequence of measurements or observations, which support a hypothesis, to counterintuitively decrease our confidence? Can unanimous support be too good to be true? The assumption of independence is often made in good faith; however, rarely is consideration given to whether a systemic failure has occurred. Taking this into account can cause certainty in a hypothesis to decrease as the evidence for it becomes apparently stronger. We perform a probabilistic Bayesian analysis of this effect with examples based on (i) archaeological evidence, (ii) weighing of legal evidence and (iii) cryptographic primality testing. In this paper, we investigate the effects of small error rates in a set of measurements or observations. We find that even with very low systemic failure rates, high confidence is surprisingly difficult to achieve; in particular, we find that certain analyses of cryptographically important numerical tests are highly optimistic, underestimating their false-negative rate by as much as a factor of 2 80 .

  12. Low-power cryptographic coprocessor for autonomous wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Olszyna, Jakub; Winiecki, Wiesław

    2013-10-01

    The concept of autonomous wireless sensor networks involves energy harvesting, as well as effective management of system resources. Public-key cryptography (PKC) offers the advantage of elegant key agreement schemes with which a secret key can be securely established over unsecure channels. In addition to solving the key management problem, the other major application of PKC is digital signatures, with which non-repudiation of messages exchanges can be achieved. The motivation for studying low-power and area efficient modular arithmetic algorithms comes from enabling public-key security for low-power devices that can perform under constrained environment like autonomous wireless sensor networks. This paper presents a cryptographic coprocessor tailored to the autonomous wireless sensor networks constraints. Such hardware circuit is aimed to support the implementation of different public-key cryptosystems based on modular arithmetic in GF(p) and GF(2m). Key components of the coprocessor are described as GEZEL models and can be easily transformed to VHDL and implemented in hardware.

  13. Geometric Data Perturbation-Based Personal Health Record Transactions in Cloud Computing

    PubMed Central

    Balasubramaniam, S.; Kavitha, V.

    2015-01-01

    Cloud computing is a new delivery model for information technology services and it typically involves the provision of dynamically scalable and often virtualized resources over the Internet. However, cloud computing raises concerns on how cloud service providers, user organizations, and governments should handle such information and interactions. Personal health records represent an emerging patient-centric model for health information exchange, and they are outsourced for storage by third parties, such as cloud providers. With these records, it is necessary for each patient to encrypt their own personal health data before uploading them to cloud servers. Current techniques for encryption primarily rely on conventional cryptographic approaches. However, key management issues remain largely unsolved with these cryptographic-based encryption techniques. We propose that personal health record transactions be managed using geometric data perturbation in cloud computing. In our proposed scheme, the personal health record database is perturbed using geometric data perturbation and outsourced to the Amazon EC2 cloud. PMID:25767826

  14. Geometric data perturbation-based personal health record transactions in cloud computing.

    PubMed

    Balasubramaniam, S; Kavitha, V

    2015-01-01

    Cloud computing is a new delivery model for information technology services and it typically involves the provision of dynamically scalable and often virtualized resources over the Internet. However, cloud computing raises concerns on how cloud service providers, user organizations, and governments should handle such information and interactions. Personal health records represent an emerging patient-centric model for health information exchange, and they are outsourced for storage by third parties, such as cloud providers. With these records, it is necessary for each patient to encrypt their own personal health data before uploading them to cloud servers. Current techniques for encryption primarily rely on conventional cryptographic approaches. However, key management issues remain largely unsolved with these cryptographic-based encryption techniques. We propose that personal health record transactions be managed using geometric data perturbation in cloud computing. In our proposed scheme, the personal health record database is perturbed using geometric data perturbation and outsourced to the Amazon EC2 cloud.

  15. A Cryptographic SoC for Robust Protection of Secret Keys in IPTV DRM Systems

    NASA Astrophysics Data System (ADS)

    Lee, Sanghan; Yang, Hae-Yong; Yeom, Yongjin; Park, Jongsik

    The security level of an internet protocol television (IPTV) digital right management (DRM) system ultimately relies on protection of secret keys. Well known devices for the key protection include smartcards and battery backup SRAMs (BB-SRAMs); however, these devices could be vulnerable to various physical attacks. In this paper, we propose a secure and cost-effective design of a cryptographic system on chip (SoC) that integrates the BB-SRAM with a cell-based design technique. The proposed SoC provides robust safeguard against the physical attacks, and satisfies high-speed and low-price requirements of IPTV set-top boxes. Our implementation results show that the maximum encryption rate of the SoC is 633Mb/s. In order to verify the data retention capabilities, we made a prototype chip using 0.18µm standard cell technology. The experimental results show that the integrated BB-SRAM can reliably retain data with a 1.4µA leakage current.

  16. Semi-quantum Secure Direct Communication Scheme Based on Bell States

    NASA Astrophysics Data System (ADS)

    Xie, Chen; Li, Lvzhou; Situ, Haozhen; He, Jianhao

    2018-06-01

    Recently, the idea of semi-quantumness has been often used in designing quantum cryptographic schemes, which allows some of the participants of a quantum cryptographic scheme to remain classical. One of the reasons why this idea is popular is that it allows a quantum information processing task to be accomplished by using quantum resources as few as possible. In this paper, we extend the idea to quantum secure direct communication(QSDC) by proposing a semi-quantum secure direct communication scheme. In the scheme, the message sender, Alice, encodes each bit into a Bell state |φ+> = 1/{√2}(|00> +|11> ) or |{Ψ }+> = 1/{√ 2}(|01> +|10> ), and the message receiver, Bob, who is classical in the sense that he can either let the qubit he received reflect undisturbed, or measure the qubit in the computational basis |0>, |1> and then resend it in the state he found. Moreover, the security analysis of our scheme is also given.

  17. Quantum Cryptography for Secure Communications to Low-Earth Orbit Satellites

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hughes, R.J.; Buttler, W.T.; Kwiat, P.G.

    1999-06-03

    This is the final report of a three-year, Laboratory Directed Research and Development (LDRD) project at Los Alamos National Laboratory (LANL). Quantum cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. The security of these transmissions is based on the inviolability of the laws of quantum mechanics. An adversary can neither successfully tap the quantum transmissions, nor evade detection. Key material is built up using the transmission of a single-photon per bit. We have developed an experimental quantum cryptography system based on the transmissionmore » of non-orthogonal single-photon polarization states to generate shared key material over line-of-sight optical links. Our results provide strong evidence that cryptographic key material could be generated on demand between a ground station and a satellite (or between two satellites), allowing a satellite to be securely re-keyed on in orbit.« less

  18. Method of making an icosahedral boride structure

    DOEpatents

    Hersee, Stephen D.; Wang, Ronghua; Zubia, David; Aselage, Terrance L.; Emin, David

    2005-01-11

    A method for fabricating thin films of an icosahedral boride on a silicon carbide (SiC) substrate is provided. Preferably the icosahedral boride layer is comprised of either boron phosphide (B.sub.12 P.sub.2) or boron arsenide (B.sub.12 As.sub.2). The provided method achieves improved film crystallinity and lowered impurity concentrations. In one aspect, an epitaxially grown layer of B.sub.12 P.sub.2 with a base layer or substrate of SiC is provided. In another aspect, an epitaxially grown layer of B.sub.12 As.sub.2 with a base layer or substrate of SiC is provided. In yet another aspect, thin films of B.sub.12 P.sub.2 or B.sub.12 As.sub.2 are formed on SiC using CVD or other vapor deposition means. If CVD techniques are employed, preferably the deposition temperature is above 1050.degree. C., more preferably in the range of 1100.degree. C. to 1400.degree. C., and still more preferably approximately 1150.degree. C.

  19. A pitfall in shallow shear-wave refraction surveying

    USGS Publications Warehouse

    Xia, J.; Miller, R.D.; Park, C.B.; Wightman, E.; Nigbor, R.

    2002-01-01

    The shallow shear-wave refraction method works successfully in an area with a series of horizontal layers. However, complex near-surface geology may not fit into the assumption of a series of horizontal layers. That a plane SH-wave undergoes wave-type conversion along an interface in an area of nonhorizontal layers is theoretically inevitable. One real example shows that the shallow shear-wave refraction method provides velocities of a converted wave rather than an SH- wave. Moreover, it is impossible to identify the converted wave by refraction data itself. As most geophysical engineering firms have limited resources, an additional P-wave refraction survey is necessary to verify if velocities calculated from a shear-wave refraction survey are velocities of converted waves. The alternative at this time may be the surface wave method, which can provide reliable S-wave velocities, even in an area of velocity inversion (a higher velocity layer underlain by a lower velocity layer). ?? 2002 Elsevier Science B.V. All rights reserved.

  20. Optimization of hetero-epitaxial growth for the threading dislocation density reduction of germanium epilayers

    NASA Astrophysics Data System (ADS)

    Chong, Haining; Wang, Zhewei; Chen, Chaonan; Xu, Zemin; Wu, Ke; Wu, Lan; Xu, Bo; Ye, Hui

    2018-04-01

    In order to suppress dislocation generation, we develop a "three-step growth" method to heteroepitaxy low dislocation density germanium (Ge) layers on silicon with the MBE process. The method is composed of 3 growth steps: low temperature (LT) seed layer, LT-HT intermediate layer as well as high temperature (HT) epilayer, successively. Threading dislocation density (TDD) of epitaxial Ge layers is measured as low as 1.4 × 106 cm-2 by optimizing the growth parameters. The results of Raman spectrum showed that the internal strain of heteroepitaxial Ge layers is tensile and homogeneous. During the growth of LT-HT intermediate layer, TDD reduction can be obtained by lowering the temperature ramping rate, and high rate deposition maintains smooth surface morphology in Ge epilayer. A mechanism based on thermodynamics is used to explain the TDD and surface morphological dependence on temperature ramping rate and deposition rate. Furthermore, we demonstrate that the Ge layer obtained can provide an excellent platform for III-V materials integrated on Si.

  1. Combining Different Privacy-Preserving Record Linkage Methods for Hospital Admission Data.

    PubMed

    Stausberg, Jürgen; Waldenburger, Andreas; Borgs, Christian; Schnell, Rainer

    2017-01-01

    Record linkage (RL) is the process of identifying pairs of records that correspond to the same entity, for example the same patient. The basic approach assigns to each pair of records a similarity weight, and then determines a certain threshold, above which the two records are considered to be a match. Three different RL methods were applied under privacy-preserving conditions on hospital admission data: deterministic RL (DRL), probabilistic RL (PRL), and Bloom filters. The patient characteristics like names were one-way encrypted (DRL, PRL) or transformed to a cryptographic longterm key (Bloom filters). Based on one year of hospital admissions, the data set was split randomly in 30 thousand new and 1,5 million known patients. With the combination of the three RL-methods, a positive predictive value of 83 % (95 %-confidence interval 65 %-94 %) was attained. Thus, the application of the presented combination of RL-methods seem to be suited for other applications of population-based research.

  2. Mechanical properties of monolayer graphene oxide.

    PubMed

    Suk, Ji Won; Piner, Richard D; An, Jinho; Ruoff, Rodney S

    2010-11-23

    Mechanical properties of ultrathin membranes consisting of one layer, two overlapped layers, and three overlapped layers of graphene oxide platelets were investigated by atomic force microscopy (AFM) imaging in contact mode. In order to evaluate both the elastic modulus and prestress of thin membranes, the AFM measurement was combined with the finite element method (FEM) in a new approach for evaluating the mechanics of ultrathin membranes. Monolayer graphene oxide was found to have a lower effective Young's modulus (207.6 ± 23.4 GPa when a thickness of 0.7 nm is used) as compared to the value reported for "pristine" graphene. The prestress (39.7-76.8 MPa) of the graphene oxide membranes obtained by solution-based deposition was found to be 1 order of magnitude lower than that obtained by others for mechanically cleaved graphene. The novel AFM imaging and FEM-based mapping methods presented here are of general utility for obtaining the elastic modulus and prestress of thin membranes.

  3. Method of forming buried oxide layers in silicon

    DOEpatents

    Sadana, Devendra Kumar; Holland, Orin Wayne

    2000-01-01

    A process for forming Silicon-On-Insulator is described incorporating the steps of ion implantation of oxygen into a silicon substrate at elevated temperature, ion implanting oxygen at a temperature below 200.degree. C. at a lower dose to form an amorphous silicon layer, and annealing steps to form a mixture of defective single crystal silicon and polycrystalline silicon or polycrystalline silicon alone and then silicon oxide from the amorphous silicon layer to form a continuous silicon oxide layer below the surface of the silicon substrate to provide an isolated superficial layer of silicon. The invention overcomes the problem of buried isolated islands of silicon oxide forming a discontinuous buried oxide layer.

  4. Multijunction photovoltaic device and method of manufacture

    DOEpatents

    Arya, Rejeewa R.; Catalano, Anthony W.; Bennett, Murray

    1995-04-04

    A multijunction photovoltaic device includes first, second, and third amorphous silicon p-i-n photovoltaic cells in a stacked arrangement. The intrinsic layers of the second and third cells are formed of a-SiGe alloys with differing ratios of Ge such that the bandgap of the intrinsic layers respectively decrease from the first uppermost cell to the third lowermost cell. An interface layer, composed of a doped silicon compound, is disposed between the two cells and has a lower bandgap than the respective n- and p-type adjacent layers of the first and second cells. The interface layer forms an ohmic contact with the one of the adjacent cell layers of the same conductivity type, and a tunnel junction with the other of the adjacent cell layers.

  5. User Authentication and Authorization Challenges in a Networked Library Environment.

    ERIC Educational Resources Information Center

    Machovec, George S.

    1997-01-01

    Discusses computer user authentication and authorization issues when libraries need to let valid users access databases and information services without making the process too difficult for either party. Common solutions are explained, including filtering, passwords, and kerberos (cryptographic authentication scheme for secure use over public…

  6. Method for producing high energy electroluminescent devices

    DOEpatents

    Meyerson, Bernard S.; Scott, Bruce A.; Wolford, Jr., Donald J.

    1992-09-29

    A method is described for fabricating electroluminescent devices exhibiting visible electroluminescence at room temperature, where the devices include at least one doped layer of amorphous hydrogenated silicon (a-Si:H). The a-Si:H layer is deposited on a substrate by homogeneous chemical vapor deposition (H-CVD) in which the substrate is held at a temperature lower than about 200.degree. C. and the a-Si:H layer is doped in-situ during deposition, the amount of hydrogen incorporated in the deposited layer being 12-50 atomic percent. The bandgap of the a-Si:H layer is between 1.6 and 2.6 eV, and in preferrable embodiments is between 2.0 and 2.6 eV. The conductivity of the a-Si:H layer is chosen in accordance with device requirements, and can be 10.sup.16 -10.sup.19 carriers/cm.sup.2. The bandgap of the a-Si:H layer depends at least in part on the temperature of the substrate on which the layer is deposited, and can be "tuned" by changing the substrate temperature.

  7. Low Cost Synthesis Method of Two-Dimensional Titanium Carbide MXene

    NASA Astrophysics Data System (ADS)

    Rasid, Z. A. M.; Omar, M. F.; Nazeri, M. F. M.; A'ziz, M. A. A.; Szota, M.

    2017-06-01

    A layered MAX phase of Ti3AlC2 was synthesized through pressureless sintering (PLS) the initial powder of TiH2/Al/C without preliminary dehydrogenation under argon atmosphere at 1350°C. An elegant exfoliations approach was used to prepare a two-dimensional (2D) metal carbide Ti3C2 from layered MAX phase by removing A layer by chemical etching. The use of PLS method instead of any pressure assistance method such as hot isostatic press (HIP) and hot press (HP) lowered the cost of synthesis. Recently, some unique potential of Ti3C2 has been discovered leads to the proposal of potential application, mostly on electronic devices. Morphology and structural analysis was used to confirm the successful of this research.

  8. Selective epitaxy using the gild process

    DOEpatents

    Weiner, Kurt H.

    1992-01-01

    The present invention comprises a method of selective epitaxy on a semiconductor substrate. The present invention provides a method of selectively forming high quality, thin GeSi layers in a silicon circuit, and a method for fabricating smaller semiconductor chips with a greater yield (more error free chips) at a lower cost. The method comprises forming an upper layer over a substrate, and depositing a reflectivity mask which is then removed over selected sections. Using a laser to melt the unmasked sections of the upper layer, the semiconductor material in the upper layer is heated and diffused into the substrate semiconductor material. By varying the amount of laser radiation, the epitaxial layer is formed to a controlled depth which may be very thin. When cooled, a single crystal epitaxial layer is formed over the patterned substrate. The present invention provides the ability to selectively grow layers of mixed semiconductors over patterned substrates such as a layer of Ge.sub.x Si.sub.1-x grown over silicon. Such a process may be used to manufacture small transistors that have a narrow base, heavy doping, and high gain. The narrowness allows a faster transistor, and the heavy doping reduces the resistance of the narrow layer. The process does not require high temperature annealing; therefore materials such as aluminum can be used. Furthermore, the process may be used to fabricate diodes that have a high reverse breakdown voltage and a low reverse leakage current.

  9. Probability Distributions over Cryptographic Protocols

    DTIC Science & Technology

    2009-06-01

    Artificial Immune Algorithm . . . . . . . . . . . . . . . . . . . 9 3 Design Decisions 11 3.1 Common Ground...creation algorithm for unbounded distribution . . . . . . . 24 4.2 Message creation algorithm for unbounded naive distribution . . . . 24 4.3 Protocol...creation algorithm for intended-run distributions . . . . . . 26 4.4 Protocol and message creation algorithm for realistic distribution . . 32 ix THIS

  10. 22 CFR 124.14 - Exports to warehouses or distribution points outside the United States.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... distribution, end-use and reporting. Licenses for exports pursuant to such agreements must be obtained prior to... country, either in their original form or after being incorporated through an intermediate process into...., sporting firearms for commercial resale, cryptographic devices and software for financial and business...

  11. Cryptographic Research and NSA: Report of the Public Cryptography Study Group.

    ERIC Educational Resources Information Center

    Davida, George I.

    1981-01-01

    The Public Cryptography Study Group accepted the claim made by the National Security Agency that some information in some publications concerning cryptology could be inimical to national security, and is allowing the establishment of a voluntary mechanism, on an experimental basis, for NSA to review cryptology manuscripts. (MLW)

  12. Harry Potter and the Cryptography with Matrices

    ERIC Educational Resources Information Center

    Chua, Boon Liang

    2006-01-01

    This article describes Cryptography, defined as the science of encrypting and deciphering messages written in secret codes, it has played a vital role in securing information since ancient times. There are several cryptographic techniques and many make extensive use of mathematics to secure information. The author discusses an activity built…

  13. Security Protocol Verification and Optimization by Epistemic Model Checking

    DTIC Science & Technology

    2010-11-05

    Three cryptographers are sitting down to dinner at their favourite restau- rant. Their waiter informs them that arrangements have been made with the...Unfortunately, the protocol cannot be expected to satisfy this: suppose that all agents manage to broadcast their mes- sage and all messages have the

  14. 49 CFR 236.1033 - Communications and security requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... shall: (1) Use an algorithm approved by the National Institute of Standards (NIST) or a similarly...; or (ii) When the key algorithm reaches its lifespan as defined by the standards body responsible for approval of the algorithm. (c) The cleartext form of the cryptographic keys shall be protected from...

  15. 49 CFR 236.1033 - Communications and security requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... shall: (1) Use an algorithm approved by the National Institute of Standards (NIST) or a similarly...; or (ii) When the key algorithm reaches its lifespan as defined by the standards body responsible for approval of the algorithm. (c) The cleartext form of the cryptographic keys shall be protected from...

  16. 49 CFR 236.1033 - Communications and security requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... shall: (1) Use an algorithm approved by the National Institute of Standards (NIST) or a similarly...; or (ii) When the key algorithm reaches its lifespan as defined by the standards body responsible for approval of the algorithm. (c) The cleartext form of the cryptographic keys shall be protected from...

  17. 49 CFR 236.1033 - Communications and security requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... shall: (1) Use an algorithm approved by the National Institute of Standards (NIST) or a similarly...; or (ii) When the key algorithm reaches its lifespan as defined by the standards body responsible for approval of the algorithm. (c) The cleartext form of the cryptographic keys shall be protected from...

  18. Exploitation of Unintentional Information Leakage from Integrated Circuits

    ERIC Educational Resources Information Center

    Cobb, William E.

    2011-01-01

    The information leakage of electronic devices, especially those used in cryptographic or other vital applications, represents a serious practical threat to secure systems. While physical implementation attacks have evolved rapidly over the last decade, relatively little work has been done to allow system designers to effectively counter the…

  19. 49 CFR 236.1033 - Communications and security requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... shall: (1) Use an algorithm approved by the National Institute of Standards (NIST) or a similarly...; or (ii) When the key algorithm reaches its lifespan as defined by the standards body responsible for approval of the algorithm. (c) The cleartext form of the cryptographic keys shall be protected from...

  20. 21 CFR 1311.08 - Incorporation by reference.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... the National Institute of Standards and Technology, Computer Security Division, Information Technology... Publication (FIPS PUB) 140-2, Change Notices (12-03-2002), Security Requirements for Cryptographic Modules... §§ 1311.30(b), 1311.55(b), 1311.115(b), 1311.120(b), 1311.205(b). (i) Annex A: Approved Security Functions...

  1. Cryptographic Properties of the Hidden Weighted Bit Function

    DTIC Science & Technology

    2013-12-23

    valid OMB control number. 1. REPORT DATE 23 DEC 2013 2. REPORT TYPE 3. DATES COVERED 00-00-2013 to 00-00-2013 4. TITLE AND SUBTITLE...K. Feng, An Infinite Class of Balanced Vectorial Boolean Functions with Optimum Algebraic Immunity and Good Nonlinearity, in: IWCC 2009, In: LNCS

  2. Possibility of Earthquake-prediction by analyzing VLF signals

    NASA Astrophysics Data System (ADS)

    Ray, Suman; Chakrabarti, Sandip Kumar; Sasmal, Sudipta

    2016-07-01

    Prediction of seismic events is one of the most challenging jobs for the scientific community. Conventional ways for prediction of earthquakes are to monitor crustal structure movements, though this method has not yet yield satisfactory results. Furthermore, this method fails to give any short-term prediction. Recently, it is noticed that prior to any seismic event a huge amount of energy is released which may create disturbances in the lower part of D-layer/E-layer of the ionosphere. This ionospheric disturbance may be used as a precursor of earthquakes. Since VLF radio waves propagate inside the wave-guide formed by lower ionosphere and Earth's surface, this signal may be used to identify ionospheric disturbances due to seismic activity. We have analyzed VLF signals to find out the correlations, if any, between the VLF signal anomalies and seismic activities. We have done both the case by case study and also the statistical analysis using a whole year data. In both the methods we found that the night time amplitude of VLF signals fluctuated anomalously three days before the seismic events. Also we found that the terminator time of the VLF signals shifted anomalously towards night time before few days of any major seismic events. We calculate the D-layer preparation time and D-layer disappearance time from the VLF signals. We have observed that this D-layer preparation time and D-layer disappearance time become anomalously high 1-2 days before seismic events. Also we found some strong evidences which indicate that it may possible to predict the location of epicenters of earthquakes in future by analyzing VLF signals for multiple propagation paths.

  3. A pipelined FPGA implementation of an encryption algorithm based on genetic algorithm

    NASA Astrophysics Data System (ADS)

    Thirer, Nonel

    2013-05-01

    With the evolution of digital data storage and exchange, it is essential to protect the confidential information from every unauthorized access. High performance encryption algorithms were developed and implemented by software and hardware. Also many methods to attack the cipher text were developed. In the last years, the genetic algorithm has gained much interest in cryptanalysis of cipher texts and also in encryption ciphers. This paper analyses the possibility to use the genetic algorithm as a multiple key sequence generator for an AES (Advanced Encryption Standard) cryptographic system, and also to use a three stages pipeline (with four main blocks: Input data, AES Core, Key generator, Output data) to provide a fast encryption and storage/transmission of a large amount of data.

  4. Protecting Privacy and Securing the Gathering of Location Proofs - The Secure Location Verification Proof Gathering Protocol

    NASA Astrophysics Data System (ADS)

    Graham, Michelle; Gray, David

    As wireless networks become increasingly ubiquitous, the demand for a method of locating a device has increased dramatically. Location Based Services are now commonplace but there are few methods of verifying or guaranteeing a location provided by a user without some specialised hardware, especially in larger scale networks. We propose a system for the verification of location claims, using proof gathered from neighbouring devices. In this paper we introduce a protocol to protect this proof gathering process, protecting the privacy of all involved parties and securing it from intruders and malicious claiming devices. We present the protocol in stages, extending the security of this protocol to allow for flexibility within its application. The Secure Location Verification Proof Gathering Protocol (SLVPGP) has been designed to function within the area of Vehicular Networks, although its application could be extended to any device with wireless & cryptographic capabilities.

  5. A Group Action Method for Construction of Strong Substitution Box

    NASA Astrophysics Data System (ADS)

    Jamal, Sajjad Shaukat; Shah, Tariq; Attaullah, Atta

    2017-06-01

    In this paper, the method to develop cryptographically strong substitution box is presented which can be used in multimedia security and data hiding techniques. The algorithm of construction depends on the action of a projective general linear group over the set of units of the finite commutative ring. The strength of substitution box and ability to create confusion is assessed with different available analyses. Moreover, the ability of resistance against malicious attacks is also evaluated. The substitution box is examined by bit independent criterion, strict avalanche criterion, nonlinearity test, linear approximation probability test and differential approximation probability test. This substitution box is equated with well-recognized substitution boxes such as AES, Gray, APA, S8, prime of residue, Xyi and Skipjack. The comparison shows encouraging results about the strength of the proposed box. The majority logic criterion is also calculated to analyze the strength and its practical implementation.

  6. A Bitslice Implementation of Anderson's Attack on A5/1

    NASA Astrophysics Data System (ADS)

    Bulavintsev, Vadim; Semenov, Alexander; Zaikin, Oleg; Kochemazov, Stepan

    2018-03-01

    The A5/1 keystream generator is a part of Global System for Mobile Communications (GSM) protocol, employed in cellular networks all over the world. Its cryptographic resistance was extensively analyzed in dozens of papers. However, almost all corresponding methods either employ a specific hardware or require an extensive preprocessing stage and significant amounts of memory. In the present study, a bitslice variant of Anderson's Attack on A5/1 is implemented. It requires very little computer memory and no preprocessing. Moreover, the attack can be made even more efficient by harnessing the computing power of modern Graphics Processing Units (GPUs). As a result, using commonly available GPUs this method can quite efficiently recover the secret key using only 64 bits of keystream. To test the performance of the implementation, a volunteer computing project was launched. 10 instances of A5/1 cryptanalysis have been successfully solved in this project in a single week.

  7. Revealing of photon-number splitting attack on quantum key distribution system by photon-number resolving devices

    NASA Astrophysics Data System (ADS)

    Gaidash, A. A.; Egorov, V. I.; Gleim, A. V.

    2016-08-01

    Quantum cryptography allows distributing secure keys between two users so that any performed eavesdropping attempt would be immediately discovered. However, in practice an eavesdropper can obtain key information from multi-photon states when attenuated laser radiation is used as a source of quantum states. In order to prevent actions of an eavesdropper, it is generally suggested to implement special cryptographic protocols, like decoy states or SARG04. In this paper, we describe an alternative method based on monitoring photon number statistics after detection. We provide a useful rule of thumb to estimate approximate order of difference of expected distribution and distribution in case of attack. Formula for calculating a minimum value of total pulses or time-gaps to resolve attack is shown. Also formulas for actual fraction of raw key known to Eve were derived. This method can therefore be used with any system and even combining with mentioned special protocols.

  8. Multi-level discriminative dictionary learning with application to large scale image classification.

    PubMed

    Shen, Li; Sun, Gang; Huang, Qingming; Wang, Shuhui; Lin, Zhouchen; Wu, Enhua

    2015-10-01

    The sparse coding technique has shown flexibility and capability in image representation and analysis. It is a powerful tool in many visual applications. Some recent work has shown that incorporating the properties of task (such as discrimination for classification task) into dictionary learning is effective for improving the accuracy. However, the traditional supervised dictionary learning methods suffer from high computation complexity when dealing with large number of categories, making them less satisfactory in large scale applications. In this paper, we propose a novel multi-level discriminative dictionary learning method and apply it to large scale image classification. Our method takes advantage of hierarchical category correlation to encode multi-level discriminative information. Each internal node of the category hierarchy is associated with a discriminative dictionary and a classification model. The dictionaries at different layers are learnt to capture the information of different scales. Moreover, each node at lower layers also inherits the dictionary of its parent, so that the categories at lower layers can be described with multi-scale information. The learning of dictionaries and associated classification models is jointly conducted by minimizing an overall tree loss. The experimental results on challenging data sets demonstrate that our approach achieves excellent accuracy and competitive computation cost compared with other sparse coding methods for large scale image classification.

  9. Method of depositing multi-layer carbon-based coatings for field emission

    DOEpatents

    Sullivan, John P.; Friedmann, Thomas A.

    1999-01-01

    A novel field emitter device for cold cathode field emission applications, comprising a multi-layer resistive carbon film. The multi-layered film of the present invention is comprised of at least two layers of a resistive carbon material, preferably amorphous-tetrahedrally coordinated carbon, such that the resistivities of adjacent layers differ. For electron emission from the surface, the preferred structure comprises a top layer having a lower resistivity than the bottom layer. For edge emitting structures, the preferred structure of the film comprises a plurality of carbon layers, wherein adjacent layers have different resistivities. Through selection of deposition conditions, including the energy of the depositing carbon species, the presence or absence of certain elements such as H, N, inert gases or boron, carbon layers having desired resistivities can be produced. Field emitters made according the present invention display improved electron emission characteristics in comparison to conventional field emitter materials.

  10. Method of depositing multi-layer carbon-based coatings for field emission

    DOEpatents

    Sullivan, J.P.; Friedmann, T.A.

    1999-08-10

    A novel field emitter device is disclosed for cold cathode field emission applications, comprising a multi-layer resistive carbon film. The multi-layered film of the present invention is comprised of at least two layers of a resistive carbon material, preferably amorphous-tetrahedrally coordinated carbon, such that the resistivities of adjacent layers differ. For electron emission from the surface, the preferred structure comprises a top layer having a lower resistivity than the bottom layer. For edge emitting structures, the preferred structure of the film comprises a plurality of carbon layers, wherein adjacent layers have different resistivities. Through selection of deposition conditions, including the energy of the depositing carbon species, the presence or absence of certain elements such as H, N, inert gases or boron, carbon layers having desired resistivities can be produced. Field emitters made according the present invention display improved electron emission characteristics in comparison to conventional field emitter materials. 8 figs.

  11. Single-layer continuous suture contributes to the reduction of surgical complications in digestive tract anastomosis involving special anatomical locations.

    PubMed

    Li, Guo-Cai; Zhang, Yu-Chun; Xu, Yong; Zhang, Fang-Cheng; Huang, Wei-Hua; Xu, Jian-Qing; Ma, Qing-Jiu

    2014-01-01

    The key point of digestive cancer surgery is reconstruction and anastomosis of the digestive tract. Traditional anastomoses involve double-layer interrupted suturing, manually or using a surgical stapler. In special anatomical locations, however, suturing may become increasingly difficult and the complication rate increases accordingly. In this study, we aimed to investigate the feasibility and safety of a new manual suturing method, the single-layer continuous suture in the posterior wall of the anastomosis. Between January, 2007 and August, 2012, 101 patients with digestive cancer underwent surgery in Xi'an Gaoxin Hospital. Of those patients, 27 underwent surgery with the new manual method and the remaining 74 underwent surgery using traditional methods of anastomosis of the digestive tract. Surgical time, intraoperative blood loss, drainage duration, complications, blood tests, postoperative quality of life (QOL) and overall expenditure were recorded and analyzed. No significant differences were observed in surgical time, intraoperative blood loss, temperature, blood tests and postoperative QOL between the two groups. However, compared with the control group, the new manual suture group exhibited a lower surgical complication rate (7.40 vs. 31.08%; P=0.018), lower blood transfusion volume (274.07±419.33 vs. 646.67±1,146.06 ml; P=0.053), shorter postoperative hospital stay (14.60±4.19 vs. 17.60±6.29 days; P=0.038) and lower overall expenditure (3,509.85±768.68 vs. 6,141.83±308.90 renminbi; P=0.001). Our results suggested that single-layer continuous suturing for the anastomosis of the digestive tract is feasible and safe and may contribute to the reduction of surgical complications and overall expenditure.

  12. Single-layer continuous suture contributes to the reduction of surgical complications in digestive tract anastomosis involving special anatomical locations

    PubMed Central

    LI, GUO-CAI; ZHANG, YU-CHUN; XU, YONG; ZHANG, FANG-CHENG; HUANG, WEI-HUA; XU, JIAN-QING; MA, QING-JIU

    2014-01-01

    The key point of digestive cancer surgery is reconstruction and anastomosis of the digestive tract. Traditional anastomoses involve double-layer interrupted suturing, manually or using a surgical stapler. In special anatomical locations, however, suturing may become increasingly difficult and the complication rate increases accordingly. In this study, we aimed to investigate the feasibility and safety of a new manual suturing method, the single-layer continuous suture in the posterior wall of the anastomosis. Between January, 2007 and August, 2012, 101 patients with digestive cancer underwent surgery in Xi’an Gaoxin Hospital. Of those patients, 27 underwent surgery with the new manual method and the remaining 74 underwent surgery using traditional methods of anastomosis of the digestive tract. Surgical time, intraoperative blood loss, drainage duration, complications, blood tests, postoperative quality of life (QOL) and overall expenditure were recorded and analyzed. No significant differences were observed in surgical time, intraoperative blood loss, temperature, blood tests and postoperative QOL between the two groups. However, compared with the control group, the new manual suture group exhibited a lower surgical complication rate (7.40 vs. 31.08%; P=0.018), lower blood transfusion volume (274.07±419.33 vs. 646.67±1,146.06 ml; P=0.053), shorter postoperative hospital stay (14.60±4.19 vs. 17.60±6.29 days; P=0.038) and lower overall expenditure (3,509.85±768.68 vs. 6,141.83±308.90 renminbi; P=0.001). Our results suggested that single-layer continuous suturing for the anastomosis of the digestive tract is feasible and safe and may contribute to the reduction of surgical complications and overall expenditure. PMID:24649327

  13. Single-layer and dual-layer contrast-enhanced mammography using amorphous selenium flat panel detectors

    NASA Astrophysics Data System (ADS)

    Allec, N.; Abbaszadeh, S.; Karim, K. S.

    2011-09-01

    The accumulation of injected contrast agents allows the image enhancement of lesions through the use of contrast-enhanced mammography. In this technique, the combination of two acquired images is used to create an enhanced image. There exist several methods to acquire the images to be combined, which include dual energy subtraction using a single detection layer that suffers from motion artifacts due to patient motion between image acquisition. To mitigate motion artifacts, a detector composed of two layers may be used to simultaneously acquire the low and high energy images. In this work, we evaluate both of these methods using amorphous selenium as the detection material to find the system parameters (tube voltage, filtration, photoconductor thickness and relative intensity ratio) leading to the optimal performance. We then compare the performance of the two detectors under the variation of contrast agent concentration, tumor size and dose. The detectability was found to be most comparable at the lower end of the evaluated factors. The single-layer detector not only led to better contrast, due to its greater spectral separation capabilities, but also had lower quantum noise. The single-layer detector was found to have a greater detectability by a factor of 2.4 for a 2.5 mm radius tumor having a contrast agent concentration of 1.5 mg ml-1 in a 4.5 cm thick 50% glandular breast. The inclusion of motion artifacts in the comparison is part of ongoing research efforts.

  14. Single-layer and dual-layer contrast-enhanced mammography using amorphous selenium flat panel detectors.

    PubMed

    Allec, N; Abbaszadeh, S; Karim, K S

    2011-09-21

    The accumulation of injected contrast agents allows the image enhancement of lesions through the use of contrast-enhanced mammography. In this technique, the combination of two acquired images is used to create an enhanced image. There exist several methods to acquire the images to be combined, which include dual energy subtraction using a single detection layer that suffers from motion artifacts due to patient motion between image acquisition. To mitigate motion artifacts, a detector composed of two layers may be used to simultaneously acquire the low and high energy images. In this work, we evaluate both of these methods using amorphous selenium as the detection material to find the system parameters (tube voltage, filtration, photoconductor thickness and relative intensity ratio) leading to the optimal performance. We then compare the performance of the two detectors under the variation of contrast agent concentration, tumor size and dose. The detectability was found to be most comparable at the lower end of the evaluated factors. The single-layer detector not only led to better contrast, due to its greater spectral separation capabilities, but also had lower quantum noise. The single-layer detector was found to have a greater detectability by a factor of 2.4 for a 2.5 mm radius tumor having a contrast agent concentration of 1.5 mg ml(-1) in a 4.5 cm thick 50% glandular breast. The inclusion of motion artifacts in the comparison is part of ongoing research efforts.

  15. Effect of a multi-layer infection control barrier on the micro-hardness of a composite resin

    PubMed Central

    HWANG, In-Nam; HONG, Sung-Ok; LEE, Bin-Na; HWANG, Yun-Chan; OH, Won-Mann; CHANG, Hoon-Sang

    2012-01-01

    Objective The aim of this study was to evaluate the effect of multiple layers of an infection control barrier on the micro-hardness of a composite resin. Material and Methods One, two, four, and eight layers of an infection control barrier were used to cover the light guides of a high-power light emitting diode (LED) light curing unit (LCU) and a low-power halogen LCU. The composite specimens were photopolymerized with the LCUs and the barriers, and the micro-hardness of the upper and lower surfaces was measured (n=10). The hardness ratio was calculated by dividing the bottom surface hardness of the experimental groups by the irradiated surface hardness of the control groups. The data was analyzed by two-way ANOVA and Tukey's HSD test. Results The micro-hardness of the composite specimens photopolymerized with the LED LCU decreased significantly in the four- and eight-layer groups of the upper surface and in the two-, four-, and eight-layer groups of the lower surface. The hardness ratio of the composite specimens was <80% in the eight-layer group. The micro-hardness of the composite specimens photopolymerized with the halogen LCU decreased significantly in the eight-layer group of the upper surface and in the two-, four-, and eight-layer groups of the lower surface. However, the hardness ratios of all the composite specimens photopolymerized with barriers were <80%. Conclusions The two-layer infection control barrier could be used on high-power LCUs without decreasing the surface hardness of the composite resin. However, when using an infection control barrier on the low-power LCUs, attention should be paid so as not to sacrifice the polymerization efficiency. PMID:23138746

  16. Partitioning of Alkali Metal Salts and Boric Acid from Aqueous Phase into the Polyamide Active Layers of Reverse Osmosis Membranes.

    PubMed

    Wang, Jingbo; Kingsbury, Ryan S; Perry, Lamar A; Coronell, Orlando

    2017-02-21

    The partition coefficient of solutes into the polyamide active layer of reverse osmosis (RO) membranes is one of the three membrane properties (together with solute diffusion coefficient and active layer thickness) that determine solute permeation. However, no well-established method exists to measure solute partition coefficients into polyamide active layers. Further, the few studies that measured partition coefficients for inorganic salts report values significantly higher than one (∼3-8), which is contrary to expectations from Donnan theory and the observed high rejection of salts. As such, we developed a benchtop method to determine solute partition coefficients into the polyamide active layers of RO membranes. The method uses a quartz crystal microbalance (QCM) to measure the change in the mass of the active layer caused by the uptake of the partitioned solutes. The method was evaluated using several inorganic salts (alkali metal salts of chloride) and a weak acid of common concern in water desalination (boric acid). All partition coefficients were found to be lower than 1, in general agreement with expectations from Donnan theory. Results reported in this study advance the fundamental understanding of contaminant transport through RO membranes, and can be used in future studies to decouple the contributions of contaminant partitioning and diffusion to contaminant permeation.

  17. Two-Layer Viscous Shallow-Water Equations and Conservation Laws

    NASA Astrophysics Data System (ADS)

    Kanayama, Hiroshi; Dan, Hiroshi

    In our previous papers, the two-layer viscous shallow-water equations were derived from the three-dimensional Navier-Stokes equations under the hydrostatic assumption. Also, it was noted that the combination of upper and lower equations in the two-layer model produces the classical one-layer equations if the density of each layer is the same. Then, the two-layer equations were approximated by a finite element method which followed our numerical scheme established for the one-layer model in 1978. Also, it was numerically demonstrated that the interfacial instability generated when the densities are the same can be eliminated by providing a sufficient density difference. In this paper, we newly show that conservation laws are still valid in the two-layer model. Also, we show results of a new physical experiment for the interfacial instability.

  18. A Baroclinic Eddy Mixer: Supercritical Transformation of Compensated Eddies

    NASA Astrophysics Data System (ADS)

    Sutyrin, G.

    2016-02-01

    In contrast to many real-ocean rings and eddies, circular vortices with initial lower layer at rest tend to be highly unstable in idealized two-layer models, unless their radius is made small or the lower layer depth is made artificially large. Numerical simulations of unstable vortices with parameters typical for ocean eddies revealed strong deformations and pulsations of the vortex core in the two-layer setup due to development of corotating tripolar structures in the lower layer during their supercritical transformation. The addition of a middle layer with the uniform potential vorticity weakens vertical coupling between the upper and lower layer that enhances vortex stability and makes the vortex lifespan more realistic. Such a three-layer vortex model possesses smaller lower interface slope than the two-layer model that reduces the potential vorticity gradient in the lower layer and provides with less unstable configurations. While cyclonic eddies become only slightly deformed and look nearly circular when the middle layer with uniform potential vorticity is added, anticyclonic eddies tend to corotating and pulsating elongated states through potential vorticity stripping and stirring. Enhanced vortex stability in such three-layer setup has important implications for adequate representation of the energy transfer across scales.

  19. Wall Interference in Two-Dimensional Wind Tunnels

    NASA Technical Reports Server (NTRS)

    Kemp, William B., Jr.

    1986-01-01

    Viscosity and tunnel-wall constraints introduced via boundary conditions. TWINTN4 computer program developed to implement method of posttest assessment of wall interference in two-dimensional wind tunnels. Offers two methods for combining sidewall boundary-layer effects with upper and lower wall interference. In sequential procedure, Sewall method used to define flow free of sidewall effects, then assessed for upper and lower wall effects. In unified procedure, wind-tunnel flow equations altered to incorporate effects from all four walls at once. Program written in FORTRAN IV for batch execution.

  20. 4H-SiC p i n diodes grown by sublimation epitaxy in vacuum (SEV) and their application as microwave diodes

    NASA Astrophysics Data System (ADS)

    Camara, N.; Zekentes, K.; Zelenin, V. V.; Abramov, P. L.; Kirillov, A. V.; Romanov, L. P.; Boltovets, N. S.; Krivutsa, V. A.; Thuaire, A.; Bano, E.; Tsoi, E.; Lebedev, A. A.

    2008-02-01

    Sublimation epitaxy under vacuum (SEV) was investigated as a method for growing 4H-SiC epitaxial structures for p-i-n diode fabrication. The SEV-grown 4H-SiC material was investigated with scanning electron microscopy (SEM), atomic force microscopy (AFM), x-ray diffraction, photo-luminescence spectroscopy (PL), cathodo-luminescence (CL) spectroscopy, photocurrent method for carrier diffusion length determination, electro-luminescence microscopy (EL), deep level transient spectroscopy (DLTS), C-V profiling and Hall-effect measurements. When possible, the same investigation techniques were used in parallel with similar layers grown by chemical vapour deposition (CVD) epitaxy and the physical properties of the two kind of epitaxied layers were compared. p-i-n diodes were fabricated in parallel on SEV and CVD-grown layers and showed close electrical performances in dc mode in term of capacitance, resistance and transient time switching, despite the lower mobility and the diffusion length of the SEV-grown layers. X-band microwave switches based on the SEV-grown p-i-n diodes have been demonstrated with insertion loss lower than 4 dB and an isolation higher than 17 dB. These single-pole single-throw (SPST) switches were able to handle a pulsed power up to 1800 W in isolation mode, similar to the value obtained with switches incorporating diodes with CVD-grown layers.

  1. On Federated and Proof Of Validation Based Consensus Algorithms In Blockchain

    NASA Astrophysics Data System (ADS)

    Ambili, K. N.; Sindhu, M.; Sethumadhavan, M.

    2017-08-01

    Almost all real world activities have been digitized and there are various client server architecture based systems in place to handle them. These are all based on trust on third parties. There is an active attempt to successfully implement blockchain based systems which ensures that the IT systems are immutable, double spending is avoided and cryptographic strength is provided to them. A successful implementation of blockchain as backbone of existing information technology systems is bound to eliminate various types of fraud and ensure quicker delivery of the item on trade. To adapt IT systems to blockchain architecture, an efficient consensus algorithm need to be designed. Blockchain based on proof of work first came up as the backbone of cryptocurrency. After this, several other methods with variety of interesting features have come up. In this paper, we conduct a survey on existing attempts to achieve consensus in block chain. A federated consensus method and a proof of validation method are being compared.

  2. Surface acoustic waves in acoustic superlattice lithium niobate coated with a waveguide layer

    NASA Astrophysics Data System (ADS)

    Yang, G. Y.; Du, J. K.; Huang, B.; Jin, Y. A.; Xu, M. H.

    2017-04-01

    The effects of the waveguide layer on the band structure of Rayleigh waves are studied in this work based on a one-dimensional acoustic superlattice lithium niobate substrate coated with a waveguide layer. The present phononic structure is formed by the periodic domain-inverted single crystal that is the Z-cut lithium niobate substrate with a waveguide layer on the upper surface. The plane wave expansion method (PWE) is adopted to determine the band gap behavior of the phononic structure and validated by the finite element method (FEM). The FEM is also used to investigate the transmission of Rayleigh waves in the phononic structure with the interdigital transducers by means of the commercial package COMSOL. The results show that, although there is a homogeneous waveguide layer on the surface, the band gap of Rayleigh waves still exist. It is also found that increasing the thickness of the waveguide layer, the band width narrows and the band structure shifts to lower frequency. The present approach can be taken as an efficient tool in designing of phononic structures with waveguide layer.

  3. Observation of nanometer-sized electro-active defects in insulating layers by fluorescence microscopy and electrochemistry.

    PubMed

    Renault, Christophe; Marchuk, Kyle; Ahn, Hyun S; Titus, Eric J; Kim, Jiyeon; Willets, Katherine A; Bard, Allen J

    2015-06-02

    We report a method to study electro-active defects in passivated electrodes. This method couples fluorescence microscopy and electrochemistry to localize and size electro-active defects. The method was validated by comparison with a scanning probe technique, scanning electrochemical microscopy. We used our method for studying electro-active defects in thin TiO2 layers electrodeposited on 25 μm diameter Pt ultramicroelectrodes (UMEs). The permeability of the TiO2 layer was estimated by measuring the oxidation of ferrocenemethanol at the UME. Blocking of current ranging from 91.4 to 99.8% was achieved. Electro-active defects with an average radius ranging between 9 and 90 nm were observed in these TiO2 blocking layers. The distribution of electro-active defects over the TiO2 layer is highly inhomogeneous and the number of electro-active defect increases for lower degree of current blocking. The interest of the proposed technique is the possibility to quickly (less than 15 min) image samples as large as several hundreds of μm(2) while being able to detect electro-active defects of only a few tens of nm in radius.

  4. Long-Distance Translocation of Protein during Morphogenesis of the Fruiting Body in the Filamentous Fungus, Agaricus bisporus

    PubMed Central

    Woolston, Benjamin M.; Schlagnhaufer, Carl; Wilkinson, Jack; Larsen, Jeffrey; Shi, Zhixin; Mayer, Kimberly M.; Walters, Donald S.; Curtis, Wayne R.; Romaine, C. Peter

    2011-01-01

    Commercial cultivation of the mushroom fungus, Agaricus bisporus, utilizes a substrate consisting of a lower layer of compost and upper layer of peat. Typically, the two layers are seeded with individual mycelial inoculants representing a single genotype of A. bisporus. Studies aimed at examining the potential of this fungal species as a heterologous protein expression system have revealed unexpected contributions of the mycelial inoculants in the morphogenesis of the fruiting body. These contributions were elucidated using a dual-inoculant method whereby the two layers were differientially inoculated with transgenic β-glucuronidase (GUS) and wild-type (WT) lines. Surprisingly, use of a transgenic GUS line in the lower substrate and a WT line in the upper substrate yielded fruiting bodies expressing GUS activity while lacking the GUS transgene. Results of PCR and RT-PCR analyses for the GUS transgene and RNA transcript, respectively, suggested translocation of the GUS protein from the transgenic mycelium colonizing the lower layer into the fruiting body that developed exclusively from WT mycelium colonizing the upper layer. Effective translocation of the GUS protein depended on the use of a transgenic line in the lower layer in which the GUS gene was controlled by a vegetative mycelium-active promoter (laccase 2 and β-actin), rather than a fruiting body-active promoter (hydrophobin A). GUS-expressing fruiting bodies lacking the GUS gene had a bonafide WT genotype, confirmed by the absence of stably inherited GUS and hygromycin phosphotransferase selectable marker activities in their derived basidiospores and mycelial tissue cultures. Differientially inoculating the two substrate layers with individual lines carrying the GUS gene controlled by different tissue-preferred promoters resulted in up to a ∼3.5-fold increase in GUS activity over that obtained with a single inoculant. Our findings support the existence of a previously undescribed phenomenon of long-distance protein translocation in A. bisporus that has potential application in recombinant protein expression and biotechnological approaches for crop improvement. PMID:22163014

  5. Polarity of cortical electrical stimulation differentially affects neuronal activity of deep and superficial layers of rat motor cortex.

    PubMed

    Yazdan-Shahmorad, Azadeh; Kipke, Daryl R; Lehmkuhle, Mark J

    2011-10-01

    Cortical electrical stimulation (CES) techniques are practical tools in neurorehabilitation that are currently being used to test models of functional recovery after neurologic injury. However, the mechanisms by which CES has therapeutic effects, are not fully understood. In this study, we investigated the effects of CES on unit activity of different neuronal elements in layers of rat primary motor cortex after the offset of stimulation. We evaluated the effects of monopolar CES pulse polarity (anodic-first versus cathodic-first) using various stimulation frequencies and amplitudes on unit activity after stimulation. A penetrating single shank silicon microelectrode array enabled us to span the entirety of six layer motor cortex allowing simultaneous electrophysiologic recordings from different depths after monopolar CES. Neural spiking activity before the onset and after the offset of CES was modeled using point processes fit to capture neural spiking dynamics as a function of extrinsic stimuli based on generalized linear model methods. We found that neurons in lower layers have a higher probability of being excited after anodic CES. Conversely, neurons located in upper cortical layers have a higher probability of being excited after cathodic stimulation. The opposing effects observed following anodic versus cathodic stimulation in upper and lower layers were frequency- and amplitude-dependent. The data demonstrates that the poststimulus changes in neural activity after manipulation of CES parameters changes according to the location (depth) of the recorded units in rat primary motor cortex. The most effective pulse polarity for eliciting action potentials after stimulation in lower layers was not as effective in upper layers. Likewise, lower amplitudes and frequencies of CES were more effective than higher amplitudes and frequencies for eliciting action potentials. These results have important implications in the context of maximizing efficacy of CES for neurorehabilitation and neuroprosthetic applications. Copyright © 2011 Elsevier Inc. All rights reserved.

  6. Investigation to determine the vulnerability of reclaimed land to building collapse using near surface geophysical method

    NASA Astrophysics Data System (ADS)

    Adewoyin, O. O.; Joshua, E. O.; Akinyemi, M. L.; Omeje, M.; Joel, E. S.

    2017-05-01

    Adequate knowledge of the geology and the structures of the subsurface would assist engineers in the best way to carry out constructions to avoid building collapse. In this study, near surface seismic refraction method was used to determine the geotechnical parameters of the subsurface, the results obtained were correlated with the result of borehole data drilled in the study area. The results of seismic refraction method delineated mostly two distinct layers with the first layer having the lower geotechnical parameters. It was observed that in the first layer, the Young’s modulus ranged from 0.168 to 0.458 GPa, shear modulus ranged between 0.068 and 0.185 GPa, the bulk modulus ranged between 0.106 and 0.287 GPa while the bearing capacity ranged from 0.083 to 0.139 MPa. On the other hand, in the second layer, the Young’s modulus ranged between 3.717 and 7.018 GPa, shear modulus ranged from 1.500 to 2.830 GPa while the bulk modulus ranged from 2.383 to 4.449 GPa. Significantly, the formation of the second layer appeared to be more competent than the first layer, therefore engineering construction in this geological setting is recommended to be founded on the second layer at depth ranging between 7 and 16 m.

  7. Signal processing for smart cards

    NASA Astrophysics Data System (ADS)

    Quisquater, Jean-Jacques; Samyde, David

    2003-06-01

    In 1998, Paul Kocher showed that when a smart card computes cryptographic algorithms, for signatures or encryption, its consumption or its radiations leak information. The keys or the secrets hidden in the card can then be recovered using a differential measurement based on the intercorrelation function. A lot of silicon manufacturers use desynchronization countermeasures to defeat power analysis. In this article we detail a new resynchronization technic. This method can be used to facilitate the use of a neural network to do the code recognition. It becomes possible to reverse engineer a software code automatically. Using data and clock separation methods, we show how to optimize the synchronization using signal processing. Then we compare these methods with watermarking methods for 1D and 2D signal. The very last watermarking detection improvements can be applied to signal processing for smart cards with very few modifications. Bayesian processing is one of the best ways to do Differential Power Analysis, and it is possible to extract a PIN code from a smart card in very few samples. So this article shows the need to continue to set up effective countermeasures for cryptographic processors. Although the idea to use advanced signal processing operators has been commonly known for a long time, no publication explains that results can be obtained. The main idea of differential measurement is to use the cross-correlation of two random variables and to repeat consumption measurements on the processor to be analyzed. We use two processors clocked at the same external frequency and computing the same data. The applications of our design are numerous. Two measurements provide the inputs of a central operator. With the most accurate operator we can improve the signal noise ratio, re-synchronize the acquisition clock with the internal one, or remove jitter. The analysis based on consumption or electromagnetic measurements can be improved using our structure. At first sight the same results can be obtained with only one smart card, but this idea is not completely true because the statistical properties of the signal are not the same. As the two smart cards are submitted to the same external noise during the measurement, it is more easy to reduce the influence of perturbations. This paper shows the importance of accurate countermeasures against differential analysis.

  8. High permeance sulfur tolerant Pd/Cu alloy membranes

    DOEpatents

    Ma, Yi Hua; Pomerantz, Natalie

    2014-02-18

    A method of making a membrane permeable to hydrogen gas (H.sub.2.uparw.) is disclosed. The membrane is made by forming a palladium layer, depositing a layer of copper on the palladium layer, and galvanically displacing a portion of the copper with palladium. The membrane has improved resistance to poisoning by H.sub.2S compared to a palladium membrane. The membrane also has increased permeance of hydrogen gas compared to palladium-copper alloys. The membrane can be annealed at a lower temperature for a shorter amount of time.

  9. Aeroheating Predictions for X-34 Using an Inviscid-Boundary Layer Method

    NASA Technical Reports Server (NTRS)

    Riley, Christopher J.; Kleb, William L.; Alter, Steven J.

    1998-01-01

    Radiative equilibrium surface temperatures and surface heating rates from a combined inviscid-boundary layer method are presented for the X-34 Reusable Launch Vehicle for several points along the hypersonic descent portion of its trajectory. Inviscid, perfect-gas solutions are generated with the Langley Aerothermodynamic Upwind Relaxation Algorithm (LAURA) and the Data-Parallel Lower-Upper Relaxation (DPLUR) code. Surface temperatures and heating rates are then computed using the Langley Approximate Three-Dimensional Convective Heating (LATCH) engineering code employing both laminar and turbulent flow models. The combined inviscid-boundary layer method provides accurate predictions of surface temperatures over most of the vehicle and requires much less computational effort than a Navier-Stokes code. This enables the generation of a more thorough aerothermal database which is necessary to design the thermal protection system and specify the vehicle's flight limits.

  10. Occupational Field 66 (Avionics) Less MOS’s 6682, 6683 and 6689 Task Analysis.

    DTIC Science & Technology

    1979-04-01

    EQUIPMENT ( SACE ) TECH 011 ACFT CRYPTOGRAPHIC SYS TECI-, IMA 018 ACFT INERTIAL NAVIGATION SYSTEM (INS) SACE TECH 019 ACFT SEARCH/TRACK (SIT) SACE TECH...020 SACE SYS TECH 021 ACFT DECEPTIVE ELECTRONIC COUNTERMEASURES IDECM) TECH 022 ELECTRONIC COUNTERMEASURES (ECM) MODULE REPAIR TECH 023 ACFT ECM TECH

  11. Improved Algorithm For Finite-Field Normal-Basis Multipliers

    NASA Technical Reports Server (NTRS)

    Wang, C. C.

    1989-01-01

    Improved algorithm reduces complexity of calculations that must precede design of Massey-Omura finite-field normal-basis multipliers, used in error-correcting-code equipment and cryptographic devices. Algorithm represents an extension of development reported in "Algorithm To Design Finite-Field Normal-Basis Multipliers" (NPO-17109), NASA Tech Briefs, Vol. 12, No. 5, page 82.

  12. The Zimmermann Telegram. Teaching with Documents.

    ERIC Educational Resources Information Center

    National Archives and Records Administration, Washington, DC.

    Between 1914 and the spring of 1917, Europe engaged in the conflict known as World War I. The United States remained neutral. In January of 1917, British cryptographers deciphered a telegram from German Foreign Minister Arthur Zimmerman to the German Minister to Mexico, Heinrich J. F. von Eckhardt, offering U.S. territory to Mexico in return for…

  13. Applying Trustworthy Computing to End-to-End Electronic Voting

    ERIC Educational Resources Information Center

    Fink, Russell A.

    2010-01-01

    "End-to-End (E2E)" voting systems provide cryptographic proof that the voter's intention is captured, cast, and tallied correctly. While E2E systems guarantee integrity independent of software, most E2E systems rely on software to provide confidentiality, availability, authentication, and access control; thus, end-to-end integrity is not…

  14. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hamlet, Jason; Pierson, Lyndon; Bauer, Todd

    Supply chain security to detect, deter, and prevent the counterfeiting of networked and stand-alone integrated circuits (ICs) is critical to cyber security. Sandia National Laboratory researchers have developed IC ID to leverage Physically Unclonable Functions (PUFs) and strong cryptographic authentication to create a unique fingerprint for each integrated circuit. IC ID assures the authenticity of ICs to prevent tampering or malicious substitution.

  15. Concatenations of the Hidden Weighted Bit Function and Their Cryptographic Properties

    DTIC Science & Technology

    2014-01-01

    a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE 2014 2. REPORT TYPE 3. DATES COVERED 00...nonlinearity, in Advances in Cryptology – ASIACRYPT 2008 , Springer-Verlag, 2008, 425–440. [6] C. Carlet and K. Feng, An infinite class of balanced vectorial

  16. A Construction of Boolean Functions with Good Cryptographic Properties

    DTIC Science & Technology

    2014-01-01

    be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT...2008, LNCS 5350, Springer–Verlag, 2008, pp. 425–440. [10] C. Carlet and K. Feng, “An Infinite Class of Balanced Vectorial Boolean Functions with Optimum

  17. A Foundational Proof Framework for Cryptography

    DTIC Science & Technology

    2015-05-01

    uniformly-distributed natural numbers in [0, ) is shown in Listing 7. RndNat_h is a helper function that samples a natural number with the appro...expect that a skilled Coq developer could complete such a proof in a matter of days (though he may require the help of a cryptographer to develop the

  18. Super-Encryption Implementation Using Monoalphabetic Algorithm and XOR Algorithm for Data Security

    NASA Astrophysics Data System (ADS)

    Rachmawati, Dian; Andri Budiman, Mohammad; Aulia, Indra

    2018-03-01

    The exchange of data that occurs offline and online is very vulnerable to the threat of data theft. In general, cryptography is a science and art to maintain data secrecy. An encryption is a cryptography algorithm in which data is transformed into cipher text, which is something that is unreadable and meaningless so it cannot be read or understood by other parties. In super-encryption, two or more encryption algorithms are combined to make it more secure. In this work, Monoalphabetic algorithm and XOR algorithm are combined to form a super- encryption. Monoalphabetic algorithm works by changing a particular letter into a new letter based on existing keywords while the XOR algorithm works by using logic operation XOR Since Monoalphabetic algorithm is a classical cryptographic algorithm and XOR algorithm is a modern cryptographic algorithm, this scheme is expected to be both easy-to-implement and more secure. The combination of the two algorithms is capable of securing the data and restoring it back to its original form (plaintext), so the data integrity is still ensured.

  19. DOE Office of Scientific and Technical Information (OSTI.GOV)

    No, author

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors inmore » Section 4, and discuss bene ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.« less

  20. Random ambience using high fidelity images

    NASA Astrophysics Data System (ADS)

    Abu, Nur Azman; Sahib, Shahrin

    2011-06-01

    Most of the secure communication nowadays mandates true random keys as an input. These operations are mostly designed and taken care of by the developers of the cryptosystem. Due to the nature of confidential crypto development today, pseudorandom keys are typically designed and still preferred by the developers of the cryptosystem. However, these pseudorandom keys are predictable, periodic and repeatable, hence they carry minimal entropy. True random keys are believed to be generated only via hardware random number generators. Careful statistical analysis is still required to have any confidence the process and apparatus generates numbers that are sufficiently random to suit the cryptographic use. In this underlying research, each moment in life is considered unique in itself. The random key is unique for the given moment generated by the user whenever he or she needs the random keys in practical secure communication. An ambience of high fidelity digital image shall be tested for its randomness according to the NIST Statistical Test Suite. Recommendation on generating a simple 4 megabits per second random cryptographic keys live shall be reported.

  1. Reasoning about Probabilistic Security Using Task-PIOAs

    NASA Astrophysics Data System (ADS)

    Jaggard, Aaron D.; Meadows, Catherine; Mislove, Michael; Segala, Roberto

    Task-structured probabilistic input/output automata (Task-PIOAs) are concurrent probabilistic automata that, among other things, have been used to provide a formal framework for the universal composability paradigms of protocol security. One of their advantages is that that they allow one to distinguish high-level nondeterminism that can affect the outcome of the protocol, from low-level choices, which can't. We present an alternative approach to analyzing the structure of Task-PIOAs that relies on ordered sets. We focus on two of the components that are required to define and apply Task-PIOAs: discrete probability theory and automata theory. We believe our development gives insight into the structure of Task-PIOAs and how they can be utilized to model crypto-protocols. We illustrate our approach with an example from anonymity, an area that has not previously been addressed using Task-PIOAs. We model Chaum's Dining Cryptographers Protocol at a level that does not require cryptographic primitives in the analysis. We show via this example how our approach can leverage a proof of security in the case a principal behaves deterministically to prove security when that principal behaves probabilistically.

  2. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Solis, John Hector

    In this paper, we present a modular framework for constructing a secure and efficient program obfuscation scheme. Our approach, inspired by the obfuscation with respect to oracle machines model of [4], retains an interactive online protocol with an oracle, but relaxes the original computational and storage restrictions. We argue this is reasonable given the computational resources of modern personal devices. Furthermore, we relax the information-theoretic security requirement for computational security to utilize established cryptographic primitives. With this additional flexibility we are free to explore different cryptographic buildingblocks. Our approach combines authenticated encryption with private information retrieval to construct a securemore » program obfuscation framework. We give a formal specification of our framework, based on desired functionality and security properties, and provide an example instantiation. In particular, we implement AES in Galois/Counter Mode for authenticated encryption and the Gentry-Ramzan [13]constant communication-rate private information retrieval scheme. We present our implementation results and show that non-trivial sized programs can be realized, but scalability is quickly limited by computational overhead. Finally, we include a discussion on security considerations when instantiating specific modules.« less

  3. Design and Analysis of Optimization Algorithms to Minimize Cryptographic Processing in BGP Security Protocols.

    PubMed

    Sriram, Vinay K; Montgomery, Doug

    2017-07-01

    The Internet is subject to attacks due to vulnerabilities in its routing protocols. One proposed approach to attain greater security is to cryptographically protect network reachability announcements exchanged between Border Gateway Protocol (BGP) routers. This study proposes and evaluates the performance and efficiency of various optimization algorithms for validation of digitally signed BGP updates. In particular, this investigation focuses on the BGPSEC (BGP with SECurity extensions) protocol, currently under consideration for standardization in the Internet Engineering Task Force. We analyze three basic BGPSEC update processing algorithms: Unoptimized, Cache Common Segments (CCS) optimization, and Best Path Only (BPO) optimization. We further propose and study cache management schemes to be used in conjunction with the CCS and BPO algorithms. The performance metrics used in the analyses are: (1) routing table convergence time after BGPSEC peering reset or router reboot events and (2) peak-second signature verification workload. Both analytical modeling and detailed trace-driven simulation were performed. Results show that the BPO algorithm is 330% to 628% faster than the unoptimized algorithm for routing table convergence in a typical Internet core-facing provider edge router.

  4. Design and implementation of a high performance network security processor

    NASA Astrophysics Data System (ADS)

    Wang, Haixin; Bai, Guoqiang; Chen, Hongyi

    2010-03-01

    The last few years have seen many significant progresses in the field of application-specific processors. One example is network security processors (NSPs) that perform various cryptographic operations specified by network security protocols and help to offload the computation intensive burdens from network processors (NPs). This article presents a high performance NSP system architecture implementation intended for both internet protocol security (IPSec) and secure socket layer (SSL) protocol acceleration, which are widely employed in virtual private network (VPN) and e-commerce applications. The efficient dual one-way pipelined data transfer skeleton and optimised integration scheme of the heterogenous parallel crypto engine arrays lead to a Gbps rate NSP, which is programmable with domain specific descriptor-based instructions. The descriptor-based control flow fragments large data packets and distributes them to the crypto engine arrays, which fully utilises the parallel computation resources and improves the overall system data throughput. A prototyping platform for this NSP design is implemented with a Xilinx XC3S5000 based FPGA chip set. Results show that the design gives a peak throughput for the IPSec ESP tunnel mode of 2.85 Gbps with over 2100 full SSL handshakes per second at a clock rate of 95 MHz.

  5. R2NA: Received Signal Strength (RSS) Ratio-Based Node Authentication for Body Area Network

    PubMed Central

    Wu, Yang; Wang, Kai; Sun, Yongmei; Ji, Yuefeng

    2013-01-01

    The body area network (BAN) is an emerging branch of wireless sensor networks for personalized applications. The services in BAN usually have a high requirement on security, especially for the medical diagnosis. One of the fundamental directions to ensure security in BAN is how to provide node authentication. Traditional research using cryptography relies on prior secrets shared among nodes, which leads to high resource cost. In addition, most existing non-cryptographic solutions exploit out-of-band (OOB) channels, but they need the help of additional hardware support or significant modifications to the system software. To avoid the above problems, this paper presents a proximity-based node authentication scheme, which only uses wireless modules equipped on sensors. With only one sensor and one control unit (CU) in BAN, we could detect a unique physical layer characteristic, namely, the difference between the received signal strength (RSS) measured on different devices in BAN. Through the above-mentioned particular difference, we can tell whether the sender is close enough to be legitimate. We validate our scheme through both theoretical analysis and experiments, which are conducted on the real Shimmer nodes. The results demonstrate that our proposed scheme has a good security performance.

  6. An updated model of induced airflow in the unsaturated zone

    USGS Publications Warehouse

    Baehr, Arthur L.; Joss, Craig J.

    1995-01-01

    Simulation of induced movement of air in the unsaturated zone provides a method to determine permeability and to design vapor extraction remediation systems. A previously published solution to the airflow equation for the case in which the unsaturated zone is separated from the atmosphere by a layer of lower permeability (such as a clay layer) has been superseded. The new solution simulates airflow through the layer of lower permeability more rigorously by defining the leakage in terms of the upper boundary condition rather than by adding a leakage term to the governing airflow equation. This note presents the derivation of the new solution. Formulas for steady state pressure, specific discharge, and mass flow in the domain are obtained for the new model and for the case in which the unsaturated zone is in direct contact with the atmosphere.

  7. Epitaxial GaN layers formed on langasite substrates by the plasma-assisted MBE method

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lobanov, D. N., E-mail: dima@ipmras.ru; Novikov, A. V.; Yunin, P. A.

    2016-11-15

    In this publication, the results of development of the technology of the epitaxial growth of GaN on single-crystal langasite substrates La{sub 3}Ga{sub 5}SiO{sub 14} (0001) by the plasma-assisted molecular-beam epitaxy (PA MBE) method are reported. An investigation of the effect of the growth temperature at the initial stage of deposition on the crystal quality and morphology of the obtained GaN layer is performed. It is demonstrated that the optimal temperature for deposition of the initial GaN layer onto the langasite substrate is about ~520°C. A decrease in the growth temperature to this value allows the suppression of oxygen diffusion frommore » langasite into the growing layer and a decrease in the dislocation density in the main GaN layer upon its subsequent high-temperature deposition (~700°C). Further lowering of the growth temperature of the nucleation layer leads to sharp degradation of the GaN/LGS layer crystal quality. As a result of the performed research, an epitaxial GaN/LGS layer with a dislocation density of ~10{sup 11} cm{sup –2} and low surface roughness (<2 nm) is obtained.« less

  8. Cake properties in ultrafiltration of TiO2 fine particles combined with HA: in situ measurement of cake thickness by fluid dynamic gauging and CFD calculation of imposed shear stress for cake controlling.

    PubMed

    Du, Xing; Qu, Fangshu; Liang, Heng; Li, Kai; Chang, Haiqing; Li, Guibai

    2016-05-01

    In this study, the cake buildup of TiO2 fine particles in the presence of humid acid (HA) and cake layer controlling during ultrafiltration (UF) were investigated. Specifically, we measured the cake thickness using fluid dynamic gauging (FDG) method under various solution conditions, including TiO2 concentration (0.1-0.5 g/L), HA concentration (0-5 mg/L, total organic carbon (TOC)), and pH values (e.g., 4, 6 and 10), and calculated the shear stress distribution induced by stirring using computational fluid dynamics (CFD) to analyze the cake layer controlling conditions, including the operation flux (50-200 L m(-2) h(-1)) and TiO2 concentration (0.1-0.5 g/L). It was found that lower TiO2/HA concentration ratio could lead to exceedingly severe membrane fouling because of the formation of a relatively denser cake layer by filling the voids of cake layer with HA, and pH was essential for cake layer formation owing to the net repulsion between particles. Additionally, it was observed that shear stress was rewarding for mitigating cake growth under lower operation flux as a result of sufficient back-transport forces, and exhibited an excellent performance on cake layer controlling in lower TiO2 concentrations due to slight interaction forces on the vicinity of membrane.

  9. Strained-layer epitaxy of germanium-silicon alloys

    NASA Astrophysics Data System (ADS)

    Bean, J. C.

    1985-10-01

    Strained-layer epitaxy is presented as a developing technique for combining Si with other materials in order to obtain semiconductors with enhanced electronic properties. The method involves applying layers sufficiently thin so that the atoms deposited match the bonding configurations of the substrate crystal. When deposited on Si, a four-fold bonding pattern is retained, with a lowered interfacial energy and augmented stored strain energy in the epitaxial layer. The main problem which remains is building an epitaxial layer thick enough to yield desired epitaxial properties while avoiding a reversion to an unstrained structure. The application of a Ge layer to Si using MBE is described, along with the formation of heterojunction multi-layer superlattices, which can reduce the dislocation effects in some homojunctions. The technique shows promise for developing materials of use as bipolar transistors, optical detectors and fiber optic transmission devices.

  10. Key handling in wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Li, Y.; Newe, T.

    2007-07-01

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided.

  11. A Combined Adaptive Neural Network and Nonlinear Model Predictive Control for Multirate Networked Industrial Process Control.

    PubMed

    Wang, Tong; Gao, Huijun; Qiu, Jianbin

    2016-02-01

    This paper investigates the multirate networked industrial process control problem in double-layer architecture. First, the output tracking problem for sampled-data nonlinear plant at device layer with sampling period T(d) is investigated using adaptive neural network (NN) control, and it is shown that the outputs of subsystems at device layer can track the decomposed setpoints. Then, the outputs and inputs of the device layer subsystems are sampled with sampling period T(u) at operation layer to form the index prediction, which is used to predict the overall performance index at lower frequency. Radial basis function NN is utilized as the prediction function due to its approximation ability. Then, considering the dynamics of the overall closed-loop system, nonlinear model predictive control method is proposed to guarantee the system stability and compensate the network-induced delays and packet dropouts. Finally, a continuous stirred tank reactor system is given in the simulation part to demonstrate the effectiveness of the proposed method.

  12. Mapping the layer count of few-layer hexagonal boron nitride at high lateral spatial resolutions

    NASA Astrophysics Data System (ADS)

    Mohsin, Ali; Cross, Nicholas G.; Liu, Lei; Watanabe, Kenji; Taniguchi, Takashi; Duscher, Gerd; Gu, Gong

    2018-01-01

    Layer count control and uniformity of two dimensional (2D) layered materials are critical to the investigation of their properties and to their electronic device applications, but methods to map 2D material layer count at nanometer-level lateral spatial resolutions have been lacking. Here, we demonstrate a method based on two complementary techniques widely available in transmission electron microscopes (TEMs) to map the layer count of multilayer hexagonal boron nitride (h-BN) films. The mass-thickness contrast in high-angle annular dark-field (HAADF) imaging in the scanning transmission electron microscope (STEM) mode allows for thickness determination in atomically clean regions with high spatial resolution (sub-nanometer), but is limited by surface contamination. To complement, another technique based on the boron K ionization edge in the electron energy loss spectroscopy spectrum (EELS) of h-BN is developed to quantify the layer count so that surface contamination does not cause an overestimate, albeit at a lower spatial resolution (nanometers). The two techniques agree remarkably well in atomically clean regions with discrepancies within  ±1 layer. For the first time, the layer count uniformity on the scale of nanometers is quantified for a 2D material. The methodology is applicable to layer count mapping of other 2D layered materials, paving the way toward the synthesis of multilayer 2D materials with homogeneous layer count.

  13. RBS, XRR and optical reflectivity measurements of Ti-TiO{sub 2} thin films deposited by magnetron sputtering

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Drogowska, K.; Institute of Materials Science, Technische Universitaet Darmstadt, Petersenstrasse 23, 64287 Darmstadt; Tarnawski, Z., E-mail: tarnawsk@agh.edu.pl

    2012-02-15

    Highlights: Black-Right-Pointing-Pointer The single-, bi- and tri-layered films of Ti-TiO{sub 2} deposited onto Si(1 1 1) substrates. Black-Right-Pointing-Pointer Three methods RBS, XRR, optical reflectometer were used. Black-Right-Pointing-Pointer The real thickness of each layer was smaller than 50 nm. Black-Right-Pointing-Pointer Ti and TiO{sub 2} film-densities were slightly lower than the corresponding bulk values. -- Abstract: Single-, bi- and tri-layered films of Ti-TiO{sub 2} system were deposited by d.c. pulsed magnetron sputtering from metallic Ti target in an inert Ar or reactive Ar + O{sub 2} atmosphere. The nominal thickness of each layer was 50 nm. The chemical composition and its depthmore » profile were determined by Rutherford backscattering spectroscopy (RBS). Crystallographic structure was analysed by means of X-ray diffraction (XRD) at glancing incidence. X-ray reflectometry (XRR) was used as a complementary method for the film thickness and density evaluation. Modelling of the optical reflectivity spectra of Ti-TiO{sub 2} thin films deposited onto Si(1 1 1) substrates provided an independent estimate of the layer thickness. The combined analysis of RBS, XRR and reflectivity spectra indicated the real thickness of each layer less than 50 nm with TiO{sub 2} film density slightly lower than the corresponding bulk value. Scanning Electron Microscopy (SEM) cross-sectional images revealed the columnar growth of TiO{sub 2} layers. Thickness estimated directly from SEM studies was found to be in a good agreement with the results of RBS, XRR and reflectivity spectra.« less

  14. Centralized Cryptographic Key Management and Critical Risk Assessment - CRADA Final Report For CRADA Number NFE-11-03562

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abercrombie, R. K.; Peters, Scott

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) Cyber Security for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing Cyber Security for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modifiedmore » and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system operation. To further address probabilities of threats, information security analysis can be performed using game theory implemented in dynamic Agent Based Game Theoretic (ABGT) simulations. Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. The strategy for the game was developed by analyzing five electric sector representative failure scenarios contained in the AMI functional domain from NESCOR WG1. From these five selected scenarios, we characterized them into three specific threat categories affecting confidentiality, integrity and availability (CIA). The analysis using our ABGT simulation demonstrated how to model the AMI functional domain using a set of rationalized game theoretic rules decomposed from the failure scenarios in terms of how those scenarios might impact the AMI network with respect to CIA.« less

  15. Cryptographic Key Management and Critical Risk Assessment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abercrombie, Robert K

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) CyberSecurity for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing CyberSecurity for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and usedmore » as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system operation. To further address probabilities of threats, information security analysis can be performed using game theory implemented in dynamic Agent Based Game Theoretic (ABGT) simulations. Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. The strategy for the game was developed by analyzing five electric sector representative failure scenarios contained in the AMI functional domain from NESCOR WG1. From these five selected scenarios, we characterized them into three specific threat categories affecting confidentiality, integrity and availability (CIA). The analysis using our ABGT simulation demonstrated how to model the AMI functional domain using a set of rationalized game theoretic rules decomposed from the failure scenarios in terms of how those scenarios might impact the AMI network with respect to CIA.« less

  16. Improved planetary boundary layer retrievals using a combination of direct and reflected bending angles from radio occultations

    NASA Astrophysics Data System (ADS)

    Wang, K. N.; Ao, C. O.; de la Torre Juarez, M.

    2017-12-01

    As a remote sensing technique, Global Positioning System (GPS) radio occultation (RO) is a suitable method to observe lower troposphere due to its high vertical resolution and cloud-penetrating capability. However, super-refraction (SR), or ducting, caused by large refractivity gradients usually associated with the top of the planetary boundary layer, can violate the uniqueness condition necessary for the traditional inverse Abel transform. Consequently, the retrieved refractivity, which is the minimum profile among an infinite number of potential solutions corresponding to the same bending angle profile, will be negatively biased under ducting layers. Previous research has shown that optimal estimation techniques that combine low altitude RO retrievals and the collocated precipitable water (PW) estimates can effectively reduce the negative RO bias and enhance the data quality under the ducting layer (Wang et al, 2017). Here we propose an improvement that uses the reflected RO bending angle observation information as a source for refractivity constraints. The RO signal reflected from the Earth surface profile can be reconstructed by solely using GPS-RO data without requiring external information such as PW. The radio holographic (RH) method is adapted here to calculate the reflected RO bending angle, and the forward model simulation is implemented to validate this preliminary concept. Our results suggest that this new approach can distinguish between different refractivity profiles when ducting occurs and theoretically this should reduce the negative bias. In addition, It also improves the RO observation in lower troposphere by capturing the sharpness and height of the critical layer separating the free troposphere from the boundary layer.

  17. Full-color reflective cholesteric liquid crystal display

    NASA Astrophysics Data System (ADS)

    Huang, Xiao-Yang; Khan, Asad A.; Davis, Donald J.; Podojil, Gregg M.; Jones, Chad M.; Miller, Nick; Doane, J. William

    1999-03-01

    We report a full color 1/4 VGA reflective cholesteric display with 4096 colors. The display can deliver a brightness approaching 40 percent reflected luminance, far exceeding all other reflective technologies. With its zero voltage bistability, images can be stored for days and months without ny power consumption. This property can significantly extend the battery life. The capability of displaying full color complex graphics and images is a must in order to establish a market position in this multimedia age. Color is achieved by stacking RGB cells. The top layer is blue with right chirality, the middle layer is green with left chirality, and the bottom layer is red with right chirality. The choice of opposite chirality prevents the loss in the green and red spectra from the blue layer on the top. We also adjusted the thickness of each layer to achieve color balance. We implement gray scale in each layer with pulse width modulation. This modulation method is the best choice consideration of lower driver cost, simpler structure with fewer cross talk problems. Various drive schemes and modulation methods will be discussed in the conference.

  18. Efficient small molecular organic light emitting diode with graphene cathode covered by a Sm layer with nano-hollows and n-doped by Bphen:Cs2CO3 in the hollows

    NASA Astrophysics Data System (ADS)

    Yao, Li; Li, Lei; Qin, Laixiang; Ma, Yaoguang; Wang, Wei; Meng, Hu; Jin, Weifeng; Wang, Yilun; Xu, Wanjin; Ran, Guangzhao; You, Liping; Qin, Guogang

    2017-03-01

    Graphene is a favorable candidate for electrodes of organic light emitting diodes (OLEDs). Graphene has quite a high work function of ˜4.5 eV, and has been extensively studied when used as anodes of OLEDs. In order to use graphene as a cathode, the electron injection barrier between the graphene cathode and the electron transport layer has to be low enough. Using 4,7-diphenyl-1,10-phenanthroline (Bphen):Cs2CO3 to n-dope graphene is a very good method, but the electron injection barrier between the n-doped graphene and Bphen:Cs2CO3 is still too high to be ˜1.0 eV. In this work, in order to further reduce the electron injection barrier, a novel method is suggested. On the graphene cathode, a Sm layer with a lot of nano-hollows, and subsequently a layer of Bphen:Cs2CO3, are deposited. The Bphen:Cs2CO3 can n-dope graphene in the nano-hollows, and the Fermi level of the graphene rises. The nano Sm layer is very easily oxidized. Oxygen adsorbed on the surface of graphene may react with Sm to form an O--Sm+ dipole layer. On the areas of the Sm oxide dipole layer without nano-hollows, the electron injection barrier can be further lowered by the dipole layer. Electrons tend to mainly inject through the lower electron barrier where the dipole layer exists. Based on this idea, an effective inverted small molecular OLED with the structure of graphene/1 nm Sm layer with a lot of nano-hollows/Bphen:Cs2CO3/Alq3:C545T/NPB/MoO3/Al is presented. The maximum current efficiency and maximum power efficiency of the OLED with a 1 nm Sm layer are about two and three times of those of the reference OLED without any Sm layer, respectively.

  19. Photovoltaic module and laminate

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bunea, Gabriela E.; Kim, Sung Dug; Kavulak, David F.J.

    A photovoltaic module is disclosed. The photovoltaic module has a first side directed toward the sun during normal operation and a second, lower side. The photovoltaic module comprises a perimeter frame and a photovoltaic laminate at least partially enclosed by and supported by the perimeter frame. The photovoltaic laminate comprises a transparent cover layer positioned toward the first side of the photovoltaic module, an upper encapsulant layer beneath and adhering to the cover layer, a plurality of photovoltaic solar cells beneath the upper encapsulant layer, the photovoltaic solar cells electrically interconnected, a lower encapsulant layer beneath the plurality of photovoltaicmore » solar cells, the upper and lower encapsulant layers enclosing the plurality of photovoltaic solar cells, and a homogenous rear environmental protection layer, the rear environmental protection layer adhering to the lower encapsulant layer, the rear environmental protection layer exposed to the ambient environment on the second side of the photovoltaic module.« less

  20. Discrete element simulation of charging and mixed layer formation in the ironmaking blast furnace

    NASA Astrophysics Data System (ADS)

    Mitra, Tamoghna; Saxén, Henrik

    2016-11-01

    The burden distribution in the ironmaking blast furnace plays an important role for the operation as it affects the gas flow distribution, heat and mass transfer, and chemical reactions in the shaft. This work studies certain aspects of burden distribution by small-scale experiments and numerical simulation by the discrete element method (DEM). Particular attention is focused on the complex layer-formation process and the problems associated with estimating the burden layer distribution by burden profile measurements. The formation of mixed layers is studied, and a computational method for estimating the extent of the mixed layer, as well as its voidage, is proposed and applied on the results of the DEM simulations. In studying a charging program and its resulting burden distribution, the mixed layers of coke and pellets were found to show lower voidage than the individual burden layers. The dynamic evolution of the mixed layer during the charging process is also analyzed. The results of the study can be used to gain deeper insight into the complex charging process of the blast furnace, which is useful in the design of new charging programs and for mathematical models that do not consider the full behavior of the particles in the burden layers.

  1. Review of the Potential of the Ni/Cu Plating Technique for Crystalline Silicon Solar Cells

    PubMed Central

    Rehman, Atteq ur; Lee, Soo Hong

    2014-01-01

    Developing a better method for the metallization of silicon solar cells is integral part of realizing superior efficiency. Currently, contact realization using screen printing is the leading technology in the silicon based photovoltaic industry, as it is simple and fast. However, the problem with metallization of this kind is that it has a lower aspect ratio and higher contact resistance, which limits solar cell efficiency. The mounting cost of silver pastes and decreasing silicon wafer thicknesses encourages silicon solar cell manufacturers to develop fresh metallization techniques involving a lower quantity of silver usage and not relying pressing process of screen printing. In recent times nickel/copper (Ni/Cu) based metal plating has emerged as a metallization method that may solve these issues. This paper offers a detailed review and understanding of a Ni/Cu based plating technique for silicon solar cells. The formation of a Ni seed layer by adopting various deposition techniques and a Cu conducting layer using a light induced plating (LIP) process are appraised. Unlike screen-printed metallization, a step involving patterning is crucial for opening the masking layer. Consequently, experimental procedures involving patterning methods are also explicated. Lastly, the issues of adhesion, back ground plating, process complexity and reliability for industrial applications are also addressed. PMID:28788516

  2. Review of the Potential of the Ni/Cu Plating Technique for Crystalline Silicon Solar Cells.

    PubMed

    Rehman, Atteq Ur; Lee, Soo Hong

    2014-02-18

    Developing a better method for the metallization of silicon solar cells is integral part of realizing superior efficiency. Currently, contact realization using screen printing is the leading technology in the silicon based photovoltaic industry, as it is simple and fast. However, the problem with metallization of this kind is that it has a lower aspect ratio and higher contact resistance, which limits solar cell efficiency. The mounting cost of silver pastes and decreasing silicon wafer thicknesses encourages silicon solar cell manufacturers to develop fresh metallization techniques involving a lower quantity of silver usage and not relying pressing process of screen printing. In recent times nickel/copper (Ni/Cu) based metal plating has emerged as a metallization method that may solve these issues. This paper offers a detailed review and understanding of a Ni/Cu based plating technique for silicon solar cells. The formation of a Ni seed layer by adopting various deposition techniques and a Cu conducting layer using a light induced plating (LIP) process are appraised. Unlike screen-printed metallization, a step involving patterning is crucial for opening the masking layer. Consequently, experimental procedures involving patterning methods are also explicated. Lastly, the issues of adhesion, back ground plating, process complexity and reliability for industrial applications are also addressed.

  3. The Compressible Laminar Boundary Layer with Heat Transfer and Arbitrary Pressure Gradient

    NASA Technical Reports Server (NTRS)

    Cohen, Clarence B; Reshotko, Eli

    1956-01-01

    An approximate method for the calculation of the compressible laminar boundary layer with heat transfer and arbitrary pressure gradient, based on Thwaites' correlation concept, is presented. With the definition of dimensionless shear and heat-transfer parameters and an assumed correlation of these parameters in terms of a momentum parameter, a complete system of relations for calculating skin friction and heat transfer results. Knowledge of velocity or temperature profiles is not necessary in using this calculation method. When the method is applied to a convergent-divergent, axially symmetric rocket nozzle, it shows that high rates of heat transfer are obtained at the initial stagnation point and at the throat of the nozzle. Also indicated are negative displacement thicknesses in the convergent portion of the nozzle; these occur because of the high density within the lower portions of the cooled boundary layer. (author)

  4. Efficient multiuser quantum cryptography network based on entanglement.

    PubMed

    Xue, Peng; Wang, Kunkun; Wang, Xiaoping

    2017-04-04

    We present an efficient quantum key distribution protocol with a certain entangled state to solve a special cryptographic task. Also, we provide a proof of security of this protocol by generalizing the proof of modified of Lo-Chau scheme. Based on this two-user scheme, a quantum cryptography network protocol is proposed without any quantum memory.

  5. Efficient multiuser quantum cryptography network based on entanglement

    PubMed Central

    Xue, Peng; Wang, Kunkun; Wang, Xiaoping

    2017-01-01

    We present an efficient quantum key distribution protocol with a certain entangled state to solve a special cryptographic task. Also, we provide a proof of security of this protocol by generalizing the proof of modified of Lo-Chau scheme. Based on this two-user scheme, a quantum cryptography network protocol is proposed without any quantum memory. PMID:28374854

  6. Securing Secrets and Managing Trust in Modern Computing Applications

    ERIC Educational Resources Information Center

    Sayler, Andy

    2016-01-01

    The amount of digital data generated and stored by users increases every day. In order to protect this data, modern computing systems employ numerous cryptographic and access control solutions. Almost all of such solutions, however, require the keeping of certain secrets as the basis of their security models. How best to securely store and control…

  7. Efficient multiuser quantum cryptography network based on entanglement

    NASA Astrophysics Data System (ADS)

    Xue, Peng; Wang, Kunkun; Wang, Xiaoping

    2017-04-01

    We present an efficient quantum key distribution protocol with a certain entangled state to solve a special cryptographic task. Also, we provide a proof of security of this protocol by generalizing the proof of modified of Lo-Chau scheme. Based on this two-user scheme, a quantum cryptography network protocol is proposed without any quantum memory.

  8. Multiplier Architecture for Coding Circuits

    NASA Technical Reports Server (NTRS)

    Wang, C. C.; Truong, T. K.; Shao, H. M.; Deutsch, L. J.

    1986-01-01

    Multipliers based on new algorithm for Galois-field (GF) arithmetic regular and expandable. Pipeline structures used for computing both multiplications and inverses. Designs suitable for implementation in very-large-scale integrated (VLSI) circuits. This general type of inverter and multiplier architecture especially useful in performing finite-field arithmetic of Reed-Solomon error-correcting codes and of some cryptographic algorithms.

  9. Defence Capability Plan 2009 (Australian Department of Defence). Public Version

    DTIC Science & Technology

    2009-01-24

    workings or Intellectual Property . > Armoured vehicles. This capability relates to the repair, maintenance and some upgrades of specialist military...cryptographic equipment. > Composite and exotic materials. This is the ability to repair specialist alloys and composite materials, to develop new...manufacture of some high usage munitions, ammunition components, propellants and explosives. > Signature management. Includes the capabilities and coatings

  10. 21 CFR 1311.115 - Additional requirements for two-factor authentication.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...) separate from the computer to which the practitioner is gaining access. (b) If one factor is a hard token, it must be separate from the computer to which it is gaining access and must meet at least the criteria of FIPS 140-2 Security Level 1, as incorporated by reference in § 1311.08, for cryptographic...

  11. 21 CFR 1311.115 - Additional requirements for two-factor authentication.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...) separate from the computer to which the practitioner is gaining access. (b) If one factor is a hard token, it must be separate from the computer to which it is gaining access and must meet at least the criteria of FIPS 140-2 Security Level 1, as incorporated by reference in § 1311.08, for cryptographic...

  12. 21 CFR 1311.115 - Additional requirements for two-factor authentication.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...) separate from the computer to which the practitioner is gaining access. (b) If one factor is a hard token, it must be separate from the computer to which it is gaining access and must meet at least the criteria of FIPS 140-2 Security Level 1, as incorporated by reference in § 1311.08, for cryptographic...

  13. 21 CFR 1311.115 - Additional requirements for two-factor authentication.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...) separate from the computer to which the practitioner is gaining access. (b) If one factor is a hard token, it must be separate from the computer to which it is gaining access and must meet at least the criteria of FIPS 140-2 Security Level 1, as incorporated by reference in § 1311.08, for cryptographic...

  14. 21 CFR 1311.115 - Additional requirements for two-factor authentication.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ...) separate from the computer to which the practitioner is gaining access. (b) If one factor is a hard token, it must be separate from the computer to which it is gaining access and must meet at least the criteria of FIPS 140-2 Security Level 1, as incorporated by reference in § 1311.08, for cryptographic...

  15. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Philippe, Sebastien

    A system that can compare physical objects while potentially protecting sensitive information about the objects themselves has been demonstrated experimentally at the U.S. Department of Energy’s (DOE) Princeton Plasma Physics Laboratory (PPPL). This work, by researchers at Princeton University and PPPL, marks an initial confirmation of the application of a powerful cryptographic technique in the physical world. Graduate student Sébastien Philippe discusses the experiment.

  16. An integral wall model for Large Eddy Simulation (iWMLES) and applications to developing boundary layers over smooth and rough plates

    NASA Astrophysics Data System (ADS)

    Yang, Xiang; Sadique, Jasim; Mittal, Rajat; Meneveau, Charles

    2014-11-01

    A new wall model for Large-Eddy-Simulations is proposed. It is based on an integral boundary layer method that assumes a functional form for the local mean velocity profile. The method, iWMLES, evaluates required unsteady and advective terms in the vertically integrated boundary layer equations analytically. The assumed profile contains a viscous or roughness sublayer, and a logarithmic layer with an additional linear term accounting for inertial and pressure gradient effects. The iWMLES method is tested in the context of a finite difference LES code. Test cases include developing turbulent boundary layers on a smooth flat plate at various Reynolds numbers, over flat plates with unresolved roughness, and a sample application to boundary layer flow over a plate that includes resolved roughness elements. The elements are truncated cones acting as idealized barnacle-like roughness elements that often occur in biofouling of marine surfaces. Comparisons with data show that iWMLES provides accurate predictions of near-wall velocity profiles in LES while, similarly to equilibrium wall models, its cost remains independent of Reynolds number and is thus significantly lower compared to standard zonal or hybrid wall models. This work is funded by ONR Grant N00014-12-1-0582 (Dr. R. Joslin, program manager).

  17. Spectrum splitting using multi-layer dielectric meta-surfaces for efficient solar energy harvesting

    NASA Astrophysics Data System (ADS)

    Yao, Yuhan; Liu, He; Wu, Wei

    2014-06-01

    We designed a high-efficiency dispersive mirror based on multi-layer dielectric meta-surfaces. By replacing the secondary mirror of a dome solar concentrator with this dispersive mirror, the solar concentrator can be converted into a spectrum-splitting photovoltaic system with higher energy harvesting efficiency and potentially lower cost. The meta-surfaces are consisted of high-index contrast gratings (HCG). The structures and parameters of the dispersive mirror (i.e. stacked HCG) are optimized based on finite-difference time-domain and rigorous coupled-wave analysis method. Our numerical study shows that the dispersive mirror can direct light with different wavelengths into different angles in the entire solar spectrum, maintaining very low energy loss. Our approach will not only improve the energy harvesting efficiency, but also lower the cost by using single junction cells instead of multi-layer tandem solar cells. Moreover, this approach has the minimal disruption to the existing solar concentrator infrastructures.

  18. On the instability of a three-dimensional attachment-line boundary layer - Weakly nonlinear theory and a numerical approach

    NASA Technical Reports Server (NTRS)

    Hall, P.; Malik, M. R.

    1986-01-01

    The instability of a three-dimensional attachment-line boundary layer is considered in the nonlinear regime. Using weakly nonlinear theory, it is found that, apart from a small interval near the (linear) critical Reynolds number, finite-amplitude solutions bifurcate subcritically from the upper branch of the neutral curve. The time-dependent Navier-Stokes equations for the attachment-line flow have been solved using a Fourier-Chebyshev spectral method and the subcritical instability is found at wavenumbers that correspond to the upper branch. Both the theory and the numerical calculations show the existence of supercritical finite-amplitude (equilibrium) states near the lower branch which explains why the observed flow exhibits a preference for the lower branch modes. The effect of blowing and suction on nonlinear stability of the attachment-line boundary layer is also investigated.

  19. On the instability of a 3-dimensional attachment line boundary layer: Weakly nonlinear theory and a numerical approach

    NASA Technical Reports Server (NTRS)

    Hall, P.; Malik, M. R.

    1984-01-01

    The instability of a three dimensional attachment line boundary layer is considered in the nonlinear regime. Using weakly nonlinear theory, it is found that, apart from a small interval near the (linear) critical Reynolds number, finite amplitude solutions bifurcate subcritically from the upper branch of the neutral curve. The time dependent Navier-Stokes equations for the attachment line flow have been solved using a Fourier-Chebyshev spectral method and the subcritical instability is found at wavenumbers that correspond to the upper branch. Both the theory and the numerical calculations show the existence of supercritical finite amplitude (equilibrium) states near the lower branch which explains why the observed flow exhibits a preference for the lower branch modes. The effect of blowing and suction on nonlinear stability of the attachment line boundary layer is also investigated.

  20. Low temperature processed complementary metal oxide semiconductor (CMOS) device by oxidation effect from capping layer.

    PubMed

    Wang, Zhenwei; Al-Jawhari, Hala A; Nayak, Pradipta K; Caraveo-Frescas, J A; Wei, Nini; Hedhili, M N; Alshareef, H N

    2015-04-20

    In this report, both p- and n-type tin oxide thin-film transistors (TFTs) were simultaneously achieved using single-step deposition of the tin oxide channel layer. The tuning of charge carrier polarity in the tin oxide channel is achieved by selectively depositing a copper oxide capping layer on top of tin oxide, which serves as an oxygen source, providing additional oxygen to form an n-type tin dioxide phase. The oxidation process can be realized by annealing at temperature as low as 190 °C in air, which is significantly lower than the temperature generally required to form tin dioxide. Based on this approach, CMOS inverters based entirely on tin oxide TFTs were fabricated. Our method provides a solution to lower the process temperature for tin dioxide phase, which facilitates the application of this transparent oxide semiconductor in emerging electronic devices field.

  1. Low Temperature Processed Complementary Metal Oxide Semiconductor (CMOS) Device by Oxidation Effect from Capping Layer

    PubMed Central

    Wang, Zhenwei; Al-Jawhari, Hala A.; Nayak, Pradipta K.; Caraveo-Frescas, J. A.; Wei, Nini; Hedhili, M. N.; Alshareef, H. N.

    2015-01-01

    In this report, both p- and n-type tin oxide thin-film transistors (TFTs) were simultaneously achieved using single-step deposition of the tin oxide channel layer. The tuning of charge carrier polarity in the tin oxide channel is achieved by selectively depositing a copper oxide capping layer on top of tin oxide, which serves as an oxygen source, providing additional oxygen to form an n-type tin dioxide phase. The oxidation process can be realized by annealing at temperature as low as 190°C in air, which is significantly lower than the temperature generally required to form tin dioxide. Based on this approach, CMOS inverters based entirely on tin oxide TFTs were fabricated. Our method provides a solution to lower the process temperature for tin dioxide phase, which facilitates the application of this transparent oxide semiconductor in emerging electronic devices field. PMID:25892711

  2. Model of the vertical structure of the optical parameters of the Neptune atmosphere.

    NASA Astrophysics Data System (ADS)

    Morozhenko, A. V.

    Analyzes the wavelength dependence of the geometric albedo of Neptune's disk and estimates some parameters of the planet's atmosphere by the method based on the determination of deviations of the vertical structure of the cloud layer from the homogeneity condition. The ratio between the methane and gas scale heights is found to be about 0.4. For the upper atmosphere, components of methane, aerosol, the mean geometric radius of particles, the turbulent mixing coefficient are determined. Two solutions were found for deeper atmospheric layers. The first one suggests a rather dense cloud; in the second solution the lower cloud layer is an extension of the upper aerosol layer.

  3. Lower layers in the motor cortex are more effective targets for penetrating microelectrodes in cortical prostheses

    NASA Astrophysics Data System (ADS)

    Parikh, Hirak; Marzullo, Timothy C.; Kipke, Daryl R.

    2009-04-01

    Improving cortical prostheses requires the development of recording neural interfaces that are efficient in terms of providing maximal control information with minimal interface complexity. While the typical approaches have targeted neurons in the motor cortex with multiple penetrating shanks, an alternative approach is to determine an efficient distribution of electrode sites within the layers of the cortex with fewer penetrating shanks. The objective of this study was to compare unit activity in the upper and lower layers of the cortex with respect to movement and direction in order to inform the design of penetrating microelectrodes. Four rats were implanted bilaterally with multi-site single-shank silicon microelectrode arrays in the neck/shoulder region of the motor cortex. We simultaneously recorded unit activity across all layers of the motor cortex while the animal was engaged in a movement direction task. Localization of the electrode array within the different layers of the cortex was determined by histology. We denoted units from layers 2 and 3 and units as upper layer units, and units from layers 5 and 6 as lower layer units. Analysis of unit spiking activity demonstrated that both the upper and lower layers encode movement and direction information. Unit responses in either cortical layer of the cortex were not preferentially associated with contralateral or ipsilateral movement. Aggregate analysis (633 neurons) and best session analysis (75 neurons) indicated that units in the lower layers (layers 5, 6) are more likely to encode direction information when compared to units in the upper layers (layers 2, 3) (p< 0.05). These results suggest that electrode sites clustered in the lower layers provide access to more salient control information for cortical neuroprostheses.

  4. A method for calculating aerodynamic heating on sounding rocket tangent ogive noses.

    NASA Technical Reports Server (NTRS)

    Wing, L. D.

    1973-01-01

    A method is presented for calculating the aerodynamic heating and shear stresses at the wall for tangent ogive noses that are slender enough to maintain an attached nose shock through that portion of flight during which heat transfer from the boundary layer to the wall is significant. The lower entropy of the attached nose shock combined with the inclusion of the streamwise pressure gradient yields a reasonable estimate of the actual flow conditions. Both laminar and turbulent boundary layers are examined and an approximation of the effects of (up to) moderate angles-of-attack is included in the analysis. The analytical method has been programmed in FORTRAN IV for an IBM 360/91 computer.

  5. A method for calculating aerodynamic heating on sounding rocket tangent ogive noses

    NASA Technical Reports Server (NTRS)

    Wing, L. D.

    1972-01-01

    A method is presented for calculating the aerodynamic heating and shear stresses at the wall for tangent ogive noses that are slender enough to maintain an attached nose shock through that portion of flight during which heat transfer from the boundary layer to the wall is significant. The lower entropy of the attached nose shock combined with the inclusion of the streamwise pressure gradient yields a reasonable estimate of the actual flow conditions. Both laminar and turbulent boundary layers are examined and an approximation of the effects of (up to) moderate angles-of-attack is included in the analysis. The analytical method has been programmed in FORTRAN 4 for an IBM 360/91 computer.

  6. Clinical map document based on XML (cMDX): document architecture with mapping feature for reporting and analysing prostate cancer in radical prostatectomy specimens

    PubMed Central

    2010-01-01

    Background The pathology report of radical prostatectomy specimens plays an important role in clinical decisions and the prognostic evaluation in Prostate Cancer (PCa). The anatomical schema is a helpful tool to document PCa extension for clinical and research purposes. To achieve electronic documentation and analysis, an appropriate documentation model for anatomical schemas is needed. For this purpose we developed cMDX. Methods The document architecture of cMDX was designed according to Open Packaging Conventions by separating the whole data into template data and patient data. Analogue custom XML elements were considered to harmonize the graphical representation (e.g. tumour extension) with the textual data (e.g. histological patterns). The graphical documentation was based on the four-layer visualization model that forms the interaction between different custom XML elements. Sensible personal data were encrypted with a 256-bit cryptographic algorithm to avoid misuse. In order to assess the clinical value, we retrospectively analysed the tumour extension in 255 patients after radical prostatectomy. Results The pathology report with cMDX can represent pathological findings of the prostate in schematic styles. Such reports can be integrated into the hospital information system. "cMDX" documents can be converted into different data formats like text, graphics and PDF. Supplementary tools like cMDX Editor and an analyser tool were implemented. The graphical analysis of 255 prostatectomy specimens showed that PCa were mostly localized in the peripheral zone (Mean: 73% ± 25). 54% of PCa showed a multifocal growth pattern. Conclusions cMDX can be used for routine histopathological reporting of radical prostatectomy specimens and provide data for scientific analysis. PMID:21078179

  7. Real-time monitoring of enzyme activity in a mesoporous silicon double layer

    PubMed Central

    Orosco, Manuel M.; Pacholski, Claudia; Sailor, Michael J.

    2009-01-01

    A double layer mesoporous silicon with different pore sizes functions as a nano-reactor that can isolate, filter and quantify the kinetics of enzyme reactions in real-time by optical reflectivity. This tiny reactor may be used to rapidly characterize a variety of isolated enzymes in a label-free manner. Activity of certain protease enzymes is often an indicator of disease states such as cancer1,2, stroke2, and neurodegeneracy3, and thus, there is a need for rapid assays that can characterize the kinetics and substrate specificity of enzymatic reactions. Nanostructured membranes can efficiently separate biomolecules4 but coupling a sensitive detection method remains difficult. Here we report a single mesoporous nano-reactor that can isolate and quantify in real-time the reaction products of proteases. The reactor consists of two layers of porous films electrochemically prepared from crystalline silicon. The upper layer with large pore sizes traps the protease enzymes and acts as the reactor while the lower layer with smaller pore sizes excludes the large proteins and captures the reaction products. Infiltration of the digested fragments into the lower layer produces a measurable change in optical reflectivity and this allows label-free quantification of enzyme kinetics in real-time within a volume of approximately 5 nanoliters. PMID:19350037

  8. Occurrence of infectious laryngotracheitis outbreaks in commercial layer hens detected by ELISA.

    PubMed

    Aras, Zeki; Yavuz, Orhan; Sanioğlu Gölen, Gökçenur

    2018-02-09

    Infectious laryngotracheitis (ILT) is an acute respiratory disease of chickens and a cause of great economic loss in commercial layers. The aims of this study were to investigate the prevalence of ILT in the field outbreaks and to compare the characteristics of ILT-infected and free flocks of commercial layers. A total of 625 blood serum samples were collected from 25 different layer flocks. The presence of antibodies against infectious laryngotracheitis virus (ILTV) in each sample was determined by ELISA. Of the 625 serum samples, 266 (42.56%) were found to be positive for ILTV antibodies. A total of 16 (64%) flocks were detected ILT positive by ELISA method. The mortality of infected flocks was statistically higher (P < 0.05) than uninfected flocks. The egg production of positive flocks was lower than that of the free flocks, but this difference was not statistically significant. The average live weight of hens in infected flocks was lower (P > 0.05) than hens in free flocks. In conclusion, the results of this study indicated a high prevalence of ILT infection in the commercial layer flocks in Konya region, Turkey. In outbreaks, ILT significantly increased the mortality rate and decreased the average live weight in layer hens.

  9. Analytical solution for static and dynamic analysis of magnetically affected viscoelastic orthotropic double-layered graphene sheets resting on viscoelastic foundation

    NASA Astrophysics Data System (ADS)

    Jalaei, M. H.; Arani, A. Ghorbanpour

    2018-02-01

    By considering the small scale effect based on the nonlocal Eringen's theory, the static and dynamic analysis of viscoelastic orthotropic double-layered graphene sheets subjected to longitudinal magnetic field and mechanical load is investigated analytically. For this objective, first order shear deformation theory (FSDT) is proposed. The surrounding medium is simulated by visco-Pasternak foundation model in which damping, normal and transverse shear loads are taken into account. The governing equations of motion are obtained via energy method and Hamilton's principle which are then solved analytically by means of Navier's approach and Laplace inversion technique in the space and time domains, respectively. Through various parametric studies, the influences of the nonlocal parameter, structural damping, van der Waals (vdW) interaction, stiffness and damping coefficient of the foundation, magnetic parameter, aspect ratio and length to thickness ratio on the static and dynamic response of the nanoplates are examined. The results depict that when the vdW interaction is considered to be zero, the upper layer deflection reaches a maximum point whereas the lower layer deflection becomes zero. In addition, it is observed that with growing the vdW interaction, the effect of magnetic field on the deflection of the lower layer increases while this effect reduces for the upper layer deflection.

  10. Chitosan-Sodium Phytate Films with a Strong Water Barrier and Antimicrobial Properties Produced via One-Step-Consecutive-Stripping and Layer-by-Layer-Casting Technologies.

    PubMed

    Yang, Jie; Xiong, Liu; Li, Man; Sun, Qingjie

    2018-06-20

    The pursuit of sustainable functional materials requires the development of materials based on renewable resources and efficient fabrication methods. Here, we first fabricated chitosan-sodium phytate films via one-step-stripping and layer-by-layer-casting technologies. The proposed film-fabrication methods are general, facile, environmentally benign, cost-effective, and easy to scale up. The resultant one-step-stripped film was thin (9 ± 1 μm), soft, transparent, and strong, whereas the thickness of the layer-by-layer-cast film was 70 ± 3 μm. FTIR analysis of the films indicated the formation of interactions between the phosphoric groups in sodium phytate and the amino groups in chitosan. More importantly, the water-vapor-permeability values of the one-step-stripped and cast films were 4-5 orders of magnitude lower than chitosan films reported before. Layer-by-layer-cast films in particular exhibited high tensile strength (49.21 ± 1.12 MPa) and were more than three times stronger than other polyelectrolyte multilayer films. Both types of films remained stable in an acidic environment. Furthermore, the layer-by-layer-assembled films presented greater antimicrobial activity than the stripped films. The developed chitosan-sodium phytate films can enhance several biomedical and environmental applications, such as packaging, drug delivery, diagnostics, microfluidics, and biosensing.

  11. A Study of the Physical Processes of an Advection Fog BoundaryLayer

    NASA Astrophysics Data System (ADS)

    Liu, D.; Yan, W.; Kang, Z.; Dai, Z.; Liu, D.; Liu, M.; Cao, L.; Chen, H.

    2016-12-01

    Using the fog boundary layer observation collected by a moored balloon between December 1 and 2, 2009, the processes of advection fog formation and dissipation under cold and warm double-advection conditions was studied. the conclusions are as follows: 1. The advection fog process was generated by the interaction between the near-surface northeast cold advection and the upper layer's southeast warm, humid advection. The ground fog formed in an advection cooling process, and the thick fog disappeared in two hours when the wind shifted from the northeast to the northwest. The top of the fog layer remained over 600 m for most of the time. 2. This advection fog featured a double-inversion structure. The interaction between the southeast warm, humid advection of the upper layer and the descending current generated the upper inversion layer. The northeast cold advection near the ground and the warm, humid advection in the high-altitude layer formed the lower layer clouds and lower inversion layer. The upper inversion layer was composed of southeast warm, humid advection and a descending current with increasing temperature. The double inversion provided good thermal conditions for maintaining the thick fog layer. 3. The southeast wind of the upper layer not only created the upper inversion layer but also brought vapour-rich air to the fog region. The steady southeast vapour transportation by the southeast wind was the main condition that maintained the fog thickness, homogeneous density, and long duration. The low-altitude low-level jet beneath the lower inversion layer helped maintain the thickness and uniform density of the fog layer by enhancing the exchange of heat, momentum and vapour within the lower inversion layer. 4. There were three transportation mechanisms associated with this advection fog: 1) The surface layer vapour was delivered to the lower fog layer. 2) The low-altitude southeast low-level jet transported the vapour to the upper layer. 3) The vapour was exchanged between the upper and lower layers via the turbulent exchange and vertical air motion, which mixed the fog density and maintained the thickness of the fog. These mechanisms explain why the fog top was higher than the lower inversion layer and reached the upper inversion layer, as well as why this advection fog was so thick.

  12. Seismic constraints on the nature of lower crustal reflectors beneath the extending Southern Transition Zone of the Colorado Plateau, Arizona

    USGS Publications Warehouse

    Parsons, Thomas E.; Howie, John M.; Thompson, George A.

    1992-01-01

    We determine the reflection polarity and exploit variations in P and S wave reflectivity and P wave amplitude versus offset (AVO) to constrain the origin of lower crustal reflectivity observed on new three-component seismic data recorded across the structural transition of the Colorado Plateau. The near vertical incidence reflection data were collected by Stanford University in 1989 as part of the U.S. Geological Survey Pacific to Arizona Crustal Experiment that traversed the Arizona Transition Zone of the Colorado Plateau. The results of independent waveform modeling methods are consistent with much of the lower crustal reflectivity resulting from thin, high-impedance layers. The reflection polarity of the cleanest lower crustal events is positive, which implies that these reflections result from high-velocity contrasts, and the waveform character indicates that the reflectors are probably layers less than or approximately equal to 200 m thick. The lower crustal events are generally less reflective to incident S waves than to P waves, which agrees with the predicted behavior of high-velocity mafic layering. Analysis of the P wave AVO character of lower crustal reflections demonstrates that the events maintain a constant amplitude with offset, which is most consistent with a mafic-layering model. One exception is a high-amplitude (10 dB above background) event near the base of lower crustal reflectivity which abruptly decreases in amplitude at increasing offsets. The event has a pronounced S wave response, which along with its negative AVO trend is a possible indication of the presence of fluids in the lower crust. The Arizona Transition Zone is an active but weakly extended province, which causes us to discard models of lower crustal layering resulting from shearing because of the high degree of strain required to create such layers. Instead, we favor horizontal basaltic intrusions as the primary origin of high-impedance reflectors based on (1) The fact that most xenoliths in eruptive basalts of the Transition Zone are of mafic igneous composition, (2) indications that a pulse of magmatic activity crossed the Transition Zone in the late Tertiary period, and (3) the high regional heat flow observed in the Transition Zone. The apparent presence of fluids near the base of the reflective zone may indicate a partially molten intrusion. We present a mechanism by which magma can be trapped and be induced to intrude horizontally at rheologic contrasts in extending crust.

  13. Localization of rainfall and determination its intensity in the lower layers of the troposphere from the measurements of local RF transmitter characteristics

    NASA Astrophysics Data System (ADS)

    Podhorský, Dušan; Fabo, Peter

    2016-12-01

    The article deals with a method of acquiring the temporal and spatial distribution of local precipitation from measurement of performance characteristics of local sources of high frequency electromagnetic radiation in the 1-3GHz frequency range in the lower layers of the troposphere up to 100 m. The method was experimentally proven by monitoring the GSM G2 base stations of cell phone providers in the frequency range of 920-960MHz using methods of frequential and spatial diversity reception. Modification of the SART method for localization of precipitation was also proposed. The achieved results allow us to obtain the timeframe of the intensity of local precipitation in the observed area with a temporal resolution of 10 sec. A spatial accuracy of 100m in localization of precipitation is expected, after a network of receivers is built. The acquired data can be used as one of the inputs for meteorological forecasting models, in agriculture, hydrology as a supplementary method to ombrograph stations and measurements for the weather radar network, in transportation as part of a warning system and in many other areas.

  14. Using Cryptography to Improve Conjunction Analysis

    NASA Astrophysics Data System (ADS)

    Hemenway, B.; Welser, B.; Baiocchi, D.

    2012-09-01

    Coordination of operations between satellite operators is becoming increasingly important to prevent collisions. Unfortunately, this coordination is often handicapped by a lack of trust. Coordination and cooperation between satellite operators can take many forms, however, one specific area where cooperation between operators would yield significant benefits is in the computation of conjunction analyses. Passively collected orbital are of generally of too low fidelity to be of use in conjunction analyses. Each operator, however, maintains high fidelity data about their own satellites. These high fidelity data are significantly more valuable in calculating conjunction analyses than the lower-fidelity data. If operators were to share their high fidelity data overall space situational awareness could be improved. At present, many operators do not share data and as a consequence space situational awareness suffers. Restrictive data sharing policies are primarily motivated by privacy concerns on the part of the satellite operators, as each operator is reluctant or unwilling to share data that might compromise its political or commercial interests. In order to perform the necessary conjunction analyses while still maintaining the privacy of their own data, a few operators have entered data sharing agreements. These operators provide their private data to a trusted outside party, who then performs the conjunction analyses and reports the results to the operators. These types of agreements are not an ideal solution as they require a degree of trust between the parties, and the cost of employing the trusted party can be large. In this work, we present and analyze cryptographic tools that would allow satellite operators to securely calculate conjunction analyses without the help of a trusted outside party, while provably maintaining the privacy of their own orbital information. For example, recent advances in cryptographic protocols, specifically in the area of secure Multiparty Computation (MPC) have the potential to allow satellite operators to perform the necessary conjunction analyses without the need to reveal their orbital information to anyone. This talk will describe how MPC works, and how we propose to use it to facilitate secure information sharing between satellite operators.

  15. Study of first electronic transition and hydrogen bonding state of ultra-thin water layer of nanometer thickness on an α-alumina surface by far-ultraviolet spectroscopy

    NASA Astrophysics Data System (ADS)

    Goto, Takeyoshi; Kinugasa, Tomoya

    2018-05-01

    The first electronic transition (A˜ ← X˜) and the hydrogen bonding state of an ultra-thin water layer of nanometer thickness between two α-alumina surfaces (0.5-20 nm) were studied using far-ultraviolet (FUV) spectroscopy in the wavelength range 140-180 nm. The ultra-thin water layer of nanometer thickness was prepared by squeezing a water droplet ( 1 μL) between a highly polished α-alumina prism and an α-alumina plate using a high pressure clamp ( 4.7 MPa), and the FUV spectra of the water layer at different thicknesses were measured using the attenuated total reflection method. As the water layer became thinner, the A˜ ← X˜ bands were gradually shifted to higher or lower energy relative to that of bulk water; at thicknesses smaller than 4 nm, these shifts were substantial (0.1-0.2 eV) in either case. The FUV spectra of the water layer with thickness < 4 nm indicate the formation of structured ice-like hydrogen bond (H-bond) layers for the higher energy shifts or the formation of slightly weaker H-bond layers as compared to those in the bulk liquid state for lower energy shifts. In either case, the H-bond structure of bulk liquid water is nearly lost at thicknesses below 4 nm, because of steric hydration forces between the α-alumina surfaces.

  16. Airborne observation of mixing across the entrainment zone during PARADE 2011

    NASA Astrophysics Data System (ADS)

    Berkes, Florian; Hoor, Peter; Bozem, Heiko; Kunkel, Daniel; Sprenger, Michael; Henne, Stephan

    2016-05-01

    This study presents the analysis of the structure and air mass characteristics of the lower atmosphere during the field campaign PARADE (PArticles and RAdicals: Diel observations of the impact of urban and biogenic Emissions) on Mount Kleiner Feldberg in southwestern Germany during late summer 2011. We analysed measurements of meteorological variables (temperature, moisture, pressure, wind speed and direction) from radio soundings and of chemical tracers (carbon dioxide, ozone) from aircraft measurements. We focus on the thermodynamic and dynamic properties that control the chemical distribution of atmospheric constituents in the boundary layer. We show that the evolution of tracer profiles of CO2 and O3 indicate mixing across the inversion layer (or entrainment zone). This finding is supported by the analysis of tracer-tracer correlations which are indicative for mixing and the relation of tracer profiles in relation to the evolution of the boundary layer height deduced from radio soundings. The study shows the relevance of entrainment processes for the lower troposphere in general and specifically that the tracer-tracer correlation method can be used to identify mixing and irreversible exchange processes across the inversion layer.

  17. Election Verifiability: Cryptographic Definitions and an Analysis of Helios and JCJ

    DTIC Science & Technology

    2015-08-06

    SHA - 256 [98], we assume that H is a random oracle to prove Theorem 2. Moreover, we assume the sigma protocols used by Helios 4.0 satisfy the...Aspects in Security and Trust, volume 5491 of LNCS, pages 242– 256 . Springer, 2008. [68] Martin Hirt. Receipt-Free K-out-of-L Voting Based on ElGamal

  18. R&D100: IC ID

    ScienceCinema

    Hamlet, Jason; Pierson, Lyndon; Bauer, Todd

    2018-06-25

    Supply chain security to detect, deter, and prevent the counterfeiting of networked and stand-alone integrated circuits (ICs) is critical to cyber security. Sandia National Laboratory researchers have developed IC ID to leverage Physically Unclonable Functions (PUFs) and strong cryptographic authentication to create a unique fingerprint for each integrated circuit. IC ID assures the authenticity of ICs to prevent tampering or malicious substitution.

  19. Efficient Byzantine Fault Tolerance for Scalable Storage and Services

    DTIC Science & Technology

    2009-07-01

    most critical applications must survive in ever harsher environments. Less synchronous networking delivers packets unreliably and unpredictably, and... synchronous environments to allowing asynchrony, and from tolerating crashes to tolerating some corruptions through ad-hoc consistency checks. Ad-hoc...servers are responsive. To support this thesis statement, this disseration takes the following steps. First, it develops a new cryptographic primitive

  20. Fast Modular Exponentiation and Elliptic Curve Group Operation in Maple

    ERIC Educational Resources Information Center

    Yan, S. Y.; James, G.

    2006-01-01

    The modular exponentiation, y[equivalent to]x[superscript k](mod n) with x,y,k,n integers and n [greater than] 1; is the most fundamental operation in RSA and ElGamal public-key cryptographic systems. Thus the efficiency of RSA and ElGamal depends entirely on the efficiency of the modular exponentiation. The same situation arises also in elliptic…

  1. Security Engineering and Educational Initiatives for Critical Information Infrastructures

    DTIC Science & Technology

    2013-06-01

    standard for cryptographic protection of SCADA communications. The United Kingdom’s National Infrastructure Security Co-ordination Centre (NISCC...has released a good practice guide on firewall deployment for SCADA systems and process control networks [17]. Meanwhile, National Institute for ...report. APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED 18 The SCADA gateway collects the data gathered by sensors, translates them from

  2. National Security Implications of Virtual Currency: Examining the Potential for Non-state Actor Deployment

    DTIC Science & Technology

    2015-02-01

    Centralization . . . . . . . . . . . . . . . . . . . . . . 43 “Anonymity”: A Bitcoin Case Study...been a case of x National Security Implications of Virtual Currency such a non-state actor deployment; in this report, we aim to high- light...development of VCs may advance, including a gen- eral increased sophistication in cryptographic applications. More gen- erally, we make the case that the main

  3. The Analysis of Dimensionality Reduction Techniques in Cryptographic Object Code Classification

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jason L. Wright; Milos Manic

    2010-05-01

    This paper compares the application of three different dimension reduction techniques to the problem of locating cryptography in compiled object code. A simple classi?er is used to compare dimension reduction via sorted covariance, principal component analysis, and correlation-based feature subset selection. The analysis concentrates on the classi?cation accuracy as the number of dimensions is increased.

  4. Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography

    PubMed Central

    2018-01-01

    Researches in Artificial Intelligence (AI) have achieved many important breakthroughs, especially in recent years. In some cases, AI learns alone from scratch and performs human tasks faster and better than humans. With the recent advances in AI, it is natural to wonder whether Artificial Neural Networks will be used to successfully create or break cryptographic algorithms. Bibliographic review shows the main approach to this problem have been addressed throughout complex Neural Networks, but without understanding or proving the security of the generated model. This paper presents an analysis of the security of cryptographic algorithms generated by a new technique called Adversarial Neural Cryptography (ANC). Using the proposed network, we show limitations and directions to improve the current approach of ANC. Training the proposed Artificial Neural Network with the improved model of ANC, we show that artificially intelligent agents can learn the unbreakable One-Time Pad (OTP) algorithm, without human knowledge, to communicate securely through an insecure communication channel. This paper shows in which conditions an AI agent can learn a secure encryption scheme. However, it also shows that, without a stronger adversary, it is more likely to obtain an insecure one. PMID:29695066

  5. Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography.

    PubMed

    Coutinho, Murilo; de Oliveira Albuquerque, Robson; Borges, Fábio; García Villalba, Luis Javier; Kim, Tai-Hoon

    2018-04-24

    Researches in Artificial Intelligence (AI) have achieved many important breakthroughs, especially in recent years. In some cases, AI learns alone from scratch and performs human tasks faster and better than humans. With the recent advances in AI, it is natural to wonder whether Artificial Neural Networks will be used to successfully create or break cryptographic algorithms. Bibliographic review shows the main approach to this problem have been addressed throughout complex Neural Networks, but without understanding or proving the security of the generated model. This paper presents an analysis of the security of cryptographic algorithms generated by a new technique called Adversarial Neural Cryptography (ANC). Using the proposed network, we show limitations and directions to improve the current approach of ANC. Training the proposed Artificial Neural Network with the improved model of ANC, we show that artificially intelligent agents can learn the unbreakable One-Time Pad (OTP) algorithm, without human knowledge, to communicate securely through an insecure communication channel. This paper shows in which conditions an AI agent can learn a secure encryption scheme. However, it also shows that, without a stronger adversary, it is more likely to obtain an insecure one.

  6. Hybrid cryptosystem implementation using fast data encipherment algorithm (FEAL) and goldwasser-micali algorithm for file security

    NASA Astrophysics Data System (ADS)

    Rachmawati, D.; Budiman, M. A.; Siburian, W. S. E.

    2018-05-01

    On the process of exchanging files, security is indispensable to avoid the theft of data. Cryptography is one of the sciences used to secure the data by way of encoding. Fast Data Encipherment Algorithm (FEAL) is a block cipher symmetric cryptographic algorithms. Therefore, the file which wants to protect is encrypted and decrypted using the algorithm FEAL. To optimize the security of the data, session key that is utilized in the algorithm FEAL encoded with the Goldwasser-Micali algorithm, which is an asymmetric cryptographic algorithm and using probabilistic concept. In the encryption process, the key was converted into binary form. The selection of values of x that randomly causes the results of the cipher key is different for each binary value. The concept of symmetry and asymmetry algorithm merger called Hybrid Cryptosystem. The use of the algorithm FEAL and Goldwasser-Micali can restore the message to its original form and the algorithm FEAL time required for encryption and decryption is directly proportional to the length of the message. However, on Goldwasser- Micali algorithm, the length of the message is not directly proportional to the time of encryption and decryption.

  7. A joint signal processing and cryptographic approach to multimedia encryption.

    PubMed

    Mao, Yinian; Wu, Min

    2006-07-01

    In recent years, there has been an increasing trend for multimedia applications to use delegate service providers for content distribution, archiving, search, and retrieval. These delegate services have brought new challenges to the protection of multimedia content confidentiality. This paper discusses the importance and feasibility of applying a joint signal processing and cryptographic approach to multimedia encryption, in order to address the access control issues unique to multimedia applications. We propose two atomic encryption operations that can preserve standard compliance and are friendly to delegate processing. Quantitative analysis for these operations is presented to demonstrate that a good tradeoff can be made between security and bitrate overhead. In assisting the design and evaluation of media security systems, we also propose a set of multimedia-oriented security scores to quantify the security against approximation attacks and to complement the existing notion of generic data security. Using video as an example, we present a systematic study on how to strategically integrate different atomic operations to build a video encryption system. The resulting system can provide superior performance over both generic encryption and its simple adaptation to video in terms of a joint consideration of security, bitrate overhead, and friendliness to delegate processing.

  8. William Friedman, Geneticist Turned Cryptographer

    PubMed Central

    Goldman, Irwin L.

    2017-01-01

    William Friedman (1891–1969), trained as a plant geneticist at Cornell University, was employed at Riverbank Laboratories by the eccentric millionaire George Fabyan to work on wheat breeding. Friedman, however, soon became intrigued by and started working on a pet project of Fabyan’s involving the conjecture that Francis Bacon, a polymath known for the study of ciphers, was the real author of Shakespeare’s plays. Thus, beginning in ∼1916, Friedman turned his attention to the so called “Baconian cipher,” and developed decryption techniques that bore similarity to approaches for solving problems in population genetics. His most significant, indeed pathbreaking, work used ideas from genetics and statistics, focusing on analysis of the frequencies of letters in language use. Although he had transitioned from being a geneticist to a cryptographer, his earlier work had resonance in his later pursuits. He soon began working directly for the United States government and produced solutions used to solve complex military ciphers, in particular to break the Japanese Purple code during World War II. Another important legacy of his work was the establishment of the Signal Intelligence Service and eventually the National Security Agency. PMID:28476859

  9. William Friedman, Geneticist Turned Cryptographer.

    PubMed

    Goldman, Irwin L

    2017-05-01

    William Friedman (1891-1969), trained as a plant geneticist at Cornell University, was employed at Riverbank Laboratories by the eccentric millionaire George Fabyan to work on wheat breeding. Friedman, however, soon became intrigued by and started working on a pet project of Fabyan's involving the conjecture that Francis Bacon, a polymath known for the study of ciphers, was the real author of Shakespeare's plays. Thus, beginning in ∼1916, Friedman turned his attention to the so called "Baconian cipher," and developed decryption techniques that bore similarity to approaches for solving problems in population genetics. His most significant, indeed pathbreaking, work used ideas from genetics and statistics, focusing on analysis of the frequencies of letters in language use. Although he had transitioned from being a geneticist to a cryptographer, his earlier work had resonance in his later pursuits. He soon began working directly for the United States government and produced solutions used to solve complex military ciphers, in particular to break the Japanese Purple code during World War II. Another important legacy of his work was the establishment of the Signal Intelligence Service and eventually the National Security Agency. Copyright © 2017 by the Genetics Society of America.

  10. Physically unclonable cryptographic primitives using self-assembled carbon nanotubes.

    PubMed

    Hu, Zhaoying; Comeras, Jose Miguel M Lobez; Park, Hongsik; Tang, Jianshi; Afzali, Ali; Tulevski, George S; Hannon, James B; Liehr, Michael; Han, Shu-Jen

    2016-06-01

    Information security underpins many aspects of modern society. However, silicon chips are vulnerable to hazards such as counterfeiting, tampering and information leakage through side-channel attacks (for example, by measuring power consumption, timing or electromagnetic radiation). Single-walled carbon nanotubes are a potential replacement for silicon as the channel material of transistors due to their superb electrical properties and intrinsic ultrathin body, but problems such as limited semiconducting purity and non-ideal assembly still need to be addressed before they can deliver high-performance electronics. Here, we show that by using these inherent imperfections, an unclonable electronic random structure can be constructed at low cost from carbon nanotubes. The nanotubes are self-assembled into patterned HfO2 trenches using ion-exchange chemistry, and the width of the trench is optimized to maximize the randomness of the nanotube placement. With this approach, two-dimensional (2D) random bit arrays are created that can offer ternary-bit architecture by determining the connection yield and switching type of the nanotube devices. As a result, our cryptographic keys provide a significantly higher level of security than conventional binary-bit architecture with the same key size.

  11. Physically unclonable cryptographic primitives using self-assembled carbon nanotubes

    NASA Astrophysics Data System (ADS)

    Hu, Zhaoying; Comeras, Jose Miguel M. Lobez; Park, Hongsik; Tang, Jianshi; Afzali, Ali; Tulevski, George S.; Hannon, James B.; Liehr, Michael; Han, Shu-Jen

    2016-06-01

    Information security underpins many aspects of modern society. However, silicon chips are vulnerable to hazards such as counterfeiting, tampering and information leakage through side-channel attacks (for example, by measuring power consumption, timing or electromagnetic radiation). Single-walled carbon nanotubes are a potential replacement for silicon as the channel material of transistors due to their superb electrical properties and intrinsic ultrathin body, but problems such as limited semiconducting purity and non-ideal assembly still need to be addressed before they can deliver high-performance electronics. Here, we show that by using these inherent imperfections, an unclonable electronic random structure can be constructed at low cost from carbon nanotubes. The nanotubes are self-assembled into patterned HfO2 trenches using ion-exchange chemistry, and the width of the trench is optimized to maximize the randomness of the nanotube placement. With this approach, two-dimensional (2D) random bit arrays are created that can offer ternary-bit architecture by determining the connection yield and switching type of the nanotube devices. As a result, our cryptographic keys provide a significantly higher level of security than conventional binary-bit architecture with the same key size.

  12. Quantifying retinal microvascular changes in uveitis using spectral domain optical coherence tomography angiography (SD-OCTA)

    PubMed Central

    Kim, Alice Y.; Rodger, Damien C.; Shahidzadeh, Anoush; Chu, Zhongdi; Koulisis, Nicole; Burkemper, Bruce; Jiang, Xuejuan; Pepple, Kathryn L.; Wang, Ruikang K.; Puliafito, Carmen A.; Rao, Narsing A.; Kashani, Amir H.

    2016-01-01

    Purpose To quantify retinal capillary density and morphology in uveitis using SD-OCTA. Design Cross-sectional, observational study Methods Healthy and uveitic subjects were recruited from two tertiary care eye centers. Prototype SD-OCTA devices (Cirrus, Carl Zeiss Meditec, Inc., Dublin, CA) were used to generate 3×3 mm2 OCTA images centered on the fovea. Subjects were placed into 3 groups based on the type of optical microangiography (OMAG) algorithm used for image processing (intensity-and/or phase) and type of retinal segmentation (automatic or manual). A semi-automated method was used to calculate skeleton density (SD), vessel density (VD), fractal dimension (FD), and vessel diameter index (VDI). Retinal vasculature was assessed in the superficial retinal layer (SRL), deep retinal layer (DRL), and non-segmented retinal layer (NS-RL). A generalized estimating equations model was used to analyze associations between the OCTA measures and disease status within each retinal layer. A P value < 0.05 was accepted as significant. Reproducibility and repeatability were assessed using the Intraclass Correlation Coefficient (ICC). Results The SD, VD, and FD of the parafoveal capillaries were lower in uveitic eyes compared to healthy eyes in all retinal segments. In addition, SD and VD were significantly lower in the DRL of subjects with uveitic macular edema. There was no correlation in any capillary parameters and anatomic classification of uveitis. Conclusions Quantitative analysis of parafoveal capillary density and morphology in uveitis demonstrates significantly lower capillary density and complexity. SD-OCTA algorithms are robust enough to detect these changes and can provide a novel diagnostic index of disease for uveitis subjects. PMID:27594138

  13. Apulian crust: Top to bottom

    NASA Astrophysics Data System (ADS)

    Amato, Alessandro; Bianchi, Irene; Agostinetti, Nicola Piana

    2014-12-01

    We investigate the crustal seismic structure of the Adria plate using teleseismic receiver functions (RF) recorded at 12 broadband seismic stations in the Apulia region. Detailed models of the Apulian crust, e.g. the structure of the Apulian Multi-layer Platform (AMP), are crucial for assessing the presence of potential décollements at different depth levels that may play a role in the evolution of the Apenninic orogen. We reconstruct S-wave velocity profiles applying a trans-dimensional Monte Carlo method for the inversion of RF data. Using this method, the resolution at the different depth level is completely dictated by the data and we avoid introducing artifacts in the crustal structure. We focus our study on three different key-elements: the Moho depth, the lower crust S-velocity, and the fine-structure of the AMP. We find a well defined and relatively flat Moho discontinuity below the region at 28-32 km depth, possibly indicating that the original Moho is still preserved in the area. The lower crust appears as a generally low velocity layer (average Vs = 3.7 km/s in the 15-26 km depth interval), likely suggestive of a felsic composition, with no significant velocity discontinuities except for its upper and lower boundaries where we find layering. Finally, for the shallow structure, the comparison of RF results with deep well stratigraphic and sonic log data allowed us to constrain the structure of the AMP and the presence of underlying Permo-Triassic (P-T) sediments. We find that the AMP structure displays small-scale heterogeneities in the region, with a thickness of the carbonates layers varying between 4 and 12 km, and is underlain by a thin, discontinuous layer of P-T terrigenous sediments, that are lacking in some areas. This fact may be due to the roughness in the original topography of the continental margins or to heterogeneities in its shallow structure due to the rifting process.

  14. Optical colour image watermarking based on phase-truncated linear canonical transform and image decomposition

    NASA Astrophysics Data System (ADS)

    Su, Yonggang; Tang, Chen; Li, Biyuan; Lei, Zhenkun

    2018-05-01

    This paper presents a novel optical colour image watermarking scheme based on phase-truncated linear canonical transform (PT-LCT) and image decomposition (ID). In this proposed scheme, a PT-LCT-based asymmetric cryptography is designed to encode the colour watermark into a noise-like pattern, and an ID-based multilevel embedding method is constructed to embed the encoded colour watermark into a colour host image. The PT-LCT-based asymmetric cryptography, which can be optically implemented by double random phase encoding with a quadratic phase system, can provide a higher security to resist various common cryptographic attacks. And the ID-based multilevel embedding method, which can be digitally implemented by a computer, can make the information of the colour watermark disperse better in the colour host image. The proposed colour image watermarking scheme possesses high security and can achieve a higher robustness while preserving the watermark’s invisibility. The good performance of the proposed scheme has been demonstrated by extensive experiments and comparison with other relevant schemes.

  15. Inherent secure communications using lattice based waveform design

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pugh, Matthew Owen

    2013-12-01

    The wireless communications channel is innately insecure due to the broadcast nature of the electromagnetic medium. Many techniques have been developed and implemented in order to combat insecurities and ensure the privacy of transmitted messages. Traditional methods include encrypting the data via cryptographic methods, hiding the data in the noise floor as in wideband communications, or nulling the signal in the spatial direction of the adversary using array processing techniques. This work analyzes the design of signaling constellations, i.e. modulation formats, to combat eavesdroppers from correctly decoding transmitted messages. It has been shown that in certain channel models the abilitymore » of an adversary to decode the transmitted messages can be degraded by a clever signaling constellation based on lattice theory. This work attempts to optimize certain lattice parameters in order to maximize the security of the data transmission. These techniques are of interest because they are orthogonal to, and can be used in conjunction with, traditional security techniques to create a more secure communication channel.« less

  16. Identification of the Centrifuged Lipoaspirate Fractions Suitable for Postgrafting Survival.

    PubMed

    Qiu, Lihong; Su, Yingjun; Zhang, Dongliang; Song, Yajuan; Liu, Bei; Yu, Zhou; Guo, Shuzhong; Yi, Chenggang

    2016-01-01

    The Coleman centrifugation procedure generates fractions with different adipocyte and progenitor cell densities. This study aimed to identify all fractions that are feasible for implantation. Human lipoaspirates were processed by Coleman centrifugation. The centrifugates were divided arbitrarily into upper, middle, and lower layers. Adipocyte viability, morphology, numbers of stromal vascular fraction cells, and adipose-derived mesenchymal stem cells of each layer were determined. The 12-week volume retention of subcutaneously implanted 0.3-ml lipoasperate of each layer was investigated in an athymic mice model. Most damaged adipocytes were located in the upper layers, whereas the intact adipocytes were distributed in the middle and lower layers. A gradient of stromal vascular fraction cell density was formed in the centrifugates. The implant volume retentions of samples from the upper, middle, and lower layers were 33.44 ± 5.9, 55.11 ± 4.4, and 71.2 ± 5.8 percent, respectively. Furthermore, the middle and lower layers contained significantly more adipose-derived stem cells than did the upper layer. The lower layer contains more viable adipocytes and stromal vascular fraction cells leading to the highest implant volume retention, whereas the most impaired cells are distributed in the upper layer, leading to the least volume retention. Although with a lower stromal vascular fraction content, the middle layer has a substantial number of intact adipocytes that are capable of retaining partial adipose tissue volume after implantation, suggesting that the middle layer may be an alternative fat source when large volumes of fat grafts are needed for transplantation.

  17. Time domain reflectometry measurements of solute transport across a soil layer boundary

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nissen, H.H.; Moldrup, P.; Kachanoski, R.G.

    2000-02-01

    The mechanisms governing solute transport through layered soil are not fully understood. Solute transport at, above, and beyond the interface between two soil layers during quasi-steady-state soil water movement was investigated using time domain reflectometry (TDR). A 0.26-m sandy loam layer was packed on top of a 1.35-m fine sand layer in a soil column. Soil water content ({theta}) and bulk soil electrical conductivity (EC{sub b}) were measured by 50 horizontal and 2 vertical TDR probes. A new TDR calibration method that gives a detailed relationship between apparent relative dielectric permittivity (K{sub s}) and {theta} was applied. Two replicate solutemore » transport experiments were conducted adding a conservative tracer (CCl) to the surface as a short pulse. The convective lognormal transfer function model (CLT) was fitted to the TDR-measured time integral-normalized resident concentration breakthrough curves (BTCs). The BTCs and the average solute-transport velocities showed preferential flow occurred across the layer boundary. A nonlinear decrease in TDR-measured {theta} in the upper soil toward the soil layer boundary suggests the existence of a 0.10-m zone where water is confined towards fingered flow, creating lateral variations in the area-averaged water flux above the layer boundary. A comparison of the time integral-normalized flux concentration measured by vertical and horizontal TDR probes at the layer boundary also indicates a nonuniform solute transport. The solute dispersivity remained constant in the upper soil layer, but increased nonlinearly (and further down, linearly) with depth in the lower layer, implying convective-dispersive solute transport in the upper soil, a transition zone just below the boundary, and stochastic-convective solute transport in the remaining part of the lower soil.« less

  18. A Modeling Pattern for Layered System Interfaces

    NASA Technical Reports Server (NTRS)

    Shames, Peter M.; Sarrel, Marc A.

    2015-01-01

    Communications between systems is often initially represented at a single, high level of abstraction, a link between components. During design evolution it is usually necessary to elaborate the interface model, defining it from several different, related viewpoints and levels of abstraction. This paper presents a pattern to model such multi-layered interface architectures simply and efficiently, in a way that supports expression of technical complexity, interfaces and behavior, and analysis of complexity. Each viewpoint and layer of abstraction has its own properties and behaviors. System elements are logically connected both horizontally along the communication path, and vertically across the different layers of protocols. The performance of upper layers depends on the performance of lower layers, yet the implementation of lower layers is intentionally opaque to upper layers. Upper layers are hidden from lower layers except as sources and sinks of data. The system elements may not be linked directly at each horizontal layer but only via a communication path, and end-to-end communications may depend on intermediate components that are hidden from them, but may need to be shown in certain views and analyzed for certain purposes. This architectural model pattern uses methods described in ISO 42010, Recommended Practice for Architectural Description of Software-intensive Systems and CCSDS 311.0-M-1, Reference Architecture for Space Data Systems (RASDS). A set of useful viewpoints and views are presented, along with the associated modeling representations, stakeholders and concerns. These viewpoints, views, and concerns then inform the modeling pattern. This pattern permits viewing the system from several different perspectives and at different layers of abstraction. An external viewpoint treats the systems of interest as black boxes and focuses on the applications view, another view exposes the details of the connections and other components between the black boxes. An internal view focuses on the implementation within the systems of interest, either showing external interface bindings and specific standards that define the communication stack profile or at the level of internal behavior. Orthogonally, a horizontal view isolates a single layer and a vertical viewpoint shows all layers at a single interface point between the systems of interest. Each of these views can in turn be described from both behavioral and structural viewpoints.

  19. Angular oversampling with temporally offset layers on multilayer detectors in computed tomography

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sjölin, Martin, E-mail: martin.sjolin@mi.physics.kth.se; Danielsson, Mats

    2016-06-15

    Purpose: Today’s computed tomography (CT) scanners operate at an increasingly high rotation speed in order to reduce motion artifacts and to fulfill the requirements of dynamic acquisition, e.g., perfusion and cardiac imaging, with lower angular sampling rate as a consequence. In this paper, a simple method for obtaining angular oversampling when using multilayer detectors in continuous rotation CT is presented. Methods: By introducing temporal offsets between the measurement periods of the different layers on a multilayer detector, the angular sampling rate can be increased by a factor equal to the number of layers on the detector. The increased angular samplingmore » rate reduces the risk of producing aliasing artifacts in the image. A simulation of a detector with two layers is performed to prove the concept. Results: The simulation study shows that aliasing artifacts from insufficient angular sampling are reduced by the proposed method. Specifically, when imaging a single point blurred by a 2D Gaussian kernel, the method is shown to reduce the strength of the aliasing artifacts by approximately an order of magnitude. Conclusions: The presented oversampling method is easy to implement in today’s multilayer detectors and has the potential to reduce aliasing artifacts in the reconstructed images.« less

  20. Resonant tunneling device with two-dimensional quantum well emitter and base layers

    DOEpatents

    Simmons, J.A.; Sherwin, M.E.; Drummond, T.J.; Weckwerth, M.V.

    1998-10-20

    A double electron layer tunneling device is presented. Electrons tunnel from a two dimensional emitter layer to a two dimensional tunneling layer and continue traveling to a collector at a lower voltage. The emitter layer is interrupted by an isolation etch, a depletion gate, or an ion implant to prevent electrons from traveling from the source along the emitter to the drain. The collector is similarly interrupted by a backgate, an isolation etch, or an ion implant. When the device is used as a transistor, a control gate is added to control the allowed energy states of the emitter layer. The tunnel gate may be recessed to change the operating range of the device and allow for integrated complementary devices. Methods of forming the device are also set forth, utilizing epoxy-bond and stop etch (EBASE), pre-growth implantation of the backgate or post-growth implantation. 43 figs.

  1. Resonant tunneling device with two-dimensional quantum well emitter and base layers

    DOEpatents

    Simmons, Jerry A.; Sherwin, Marc E.; Drummond, Timothy J.; Weckwerth, Mark V.

    1998-01-01

    A double electron layer tunneling device is presented. Electrons tunnel from a two dimensional emitter layer to a two dimensional tunneling layer and continue traveling to a collector at a lower voltage. The emitter layer is interrupted by an isolation etch, a depletion gate, or an ion implant to prevent electrons from traveling from the source along the emitter to the drain. The collector is similarly interrupted by a backgate, an isolation etch, or an ion implant. When the device is used as a transistor, a control gate is added to control the allowed energy states of the emitter layer. The tunnel gate may be recessed to change the operating range of the device and allow for integrated complementary devices. Methods of forming the device are also set forth, utilizing epoxy-bond and stop etch (EBASE), pre-growth implantation of the backgate or post-growth implantation.

  2. Patent and product piracy

    NASA Astrophysics Data System (ADS)

    Ignat, V.

    2016-08-01

    Advanced industrial countries are affected by technology theft. German industry annually loses more than 50 billion euros. The main causes are industrial espionage and fraudulent copying patents and industrial products. Many Asian countries are profiteering saving up to 65% of production costs. Most affected are small medium enterprises, who do not have sufficient economic power to assert themselves against some powerful countries. International organizations, such as Interpol and World Customs Organization - WCO - work together to combat international economic crime. Several methods of protection can be achieved by registering patents or specific technical methods for recognition of product originality. They have developed more suitable protection, like Hologram, magnetic stripe, barcode, CE marking, digital watermarks, DNA or Nano-technologies, security labels, radio frequency identification, micro color codes, matrix code, cryptographic encodings. The automotive industry has developed the method “Manufactures against Product Piracy”. A sticker on the package features original products and it uses a Data Matrix verifiable barcode. The code can be recorded with a smartphone camera. The smartphone is connected via Internet to a database, where the identification numbers of the original parts are stored.

  3. Secure steganography designed for mobile platforms

    NASA Astrophysics Data System (ADS)

    Agaian, Sos S.; Cherukuri, Ravindranath; Sifuentes, Ronnie R.

    2006-05-01

    Adaptive steganography, an intelligent approach to message hiding, integrated with matrix encoding and pn-sequences serves as a promising resolution to recent security assurance concerns. Incorporating the above data hiding concepts with established cryptographic protocols in wireless communication would greatly increase the security and privacy of transmitting sensitive information. We present an algorithm which will address the following problems: 1) low embedding capacity in mobile devices due to fixed image dimensions and memory constraints, 2) compatibility between mobile and land based desktop computers, and 3) detection of stego images by widely available steganalysis software [1-3]. Consistent with the smaller available memory, processor capabilities, and limited resolution associated with mobile devices, we propose a more magnified approach to steganography by focusing adaptive efforts at the pixel level. This deeper method, in comparison to the block processing techniques commonly found in existing adaptive methods, allows an increase in capacity while still offering a desired level of security. Based on computer simulations using high resolution, natural imagery and mobile device captured images, comparisons show that the proposed method securely allows an increased amount of embedding capacity but still avoids detection by varying steganalysis techniques.

  4. Synthesis, characterization, and antimicrobial properties of novel double layer nanocomposite electrospun fibers for wound dressing applications

    PubMed Central

    Hassiba, Alaa J; El Zowalaty, Mohamed E; Webster, Thomas J; Abdullah, Aboubakr M; Nasrallah, Gheyath K; Khalil, Khalil Abdelrazek; Luyt, Adriaan S; Elzatahry, Ahmed A

    2017-01-01

    Herein, novel hybrid nanomaterials were developed for wound dressing applications with antimicrobial properties. Electrospinning was used to fabricate a double layer nanocomposite nanofibrous mat consisting of an upper layer of poly(vinyl alcohol) and chitosan loaded with silver nanoparticles (AgNPs) and a lower layer of polyethylene oxide (PEO) or polyvinylpyrrolidone (PVP) nanofibers loaded with chlorhexidine (as an antiseptic). The top layer containing AgNPs, whose purpose was to protect the wound site against environmental germ invasion, was prepared by reducing silver nitrate to its nanoparticulate form through interaction with chitosan. The lower layer, which would be in direct contact with the injured site, contained the antibiotic drug needed to avoid wound infections which would otherwise interfere with the healing process. Initially, the upper layer was electrospun, followed sequentially by electrospinning the second layer, creating a bilayer nanofibrous mat. The morphology of the nanofibrous mats was studied by scanning electron microscopy and transmission electron microscopy, showing successful nanofiber production. X-ray diffraction confirmed the reduction of silver nitrate to AgNPs. Fourier transform infrared spectroscopy showed a successful incorporation of the material used in the produced nanofibrous mats. Thermal studies carried out by thermogravimetric analysis indicated that the PVP–drug-loaded layer had the highest thermal stability in comparison to other fabricated nanofibrous mats. Antimicrobial activities of the as-synthesized nanofibrous mats against Staphylococcus aureus, Escherichia coli, Pseudomonas aeruginosa, and Candida albicans were determined using disk diffusion method. The results indicated that the PEO–drug-loaded mat had the highest antibacterial activity, warranting further attention for numerous wound-healing applications. PMID:28356737

  5. Active vibration control of functionally graded beams with piezoelectric layers based on higher order shear deformation theory

    NASA Astrophysics Data System (ADS)

    Bendine, K.; Boukhoulda, F. B.; Nouari, M.; Satla, Z.

    2016-12-01

    This paper reports on a study of active vibration control of functionally graded beams with upper and lower surface-bonded piezoelectric layers. The model is based on higher-order shear deformation theory and implemented using the finite element method (FEM). The proprieties of the functionally graded beam (FGB) are graded along the thickness direction. The piezoelectric actuator provides a damping effect on the FGB by means of a velocity feedback control algorithm. A Matlab program has been developed for the FGB model and compared with ANSYS APDL. Using Newmark's method numerical solutions are obtained for the dynamic equations of FGB with piezoelectric layers. Numerical results show the effects of the constituent volume fraction and the influence the feedback control gain on the frequency and dynamic response of FGBs.

  6. Optimization of solar cells for air mass zero operation and study of solar cells at high temperatures, phase 4

    NASA Technical Reports Server (NTRS)

    Hovel, H. J.; Woodall, J. M.

    1980-01-01

    The Pd contact to GaAs was studied using backscattering, Auger analysis, and sheet resistance measurements. Several metallurgical phases were present at low temperatures, but PdGa was the dominant phase in samples annealed at 500 C. Ti/Pd/Ag contacts appeared to have the lowest contact resistance. Etchback epitaxy (EBE) was compared to saturated melt epitaxy (SME) method of growing liquid phase epitaxial layers. The SME method resulted in a lower density of Ga microdroplets in the grown layer, although the best solar cells were made by the EBE method. Photoluminescence was developed as a tool for contactless analysis of GaAs cells. Efficiencies of over 8 percent were measured at 250 C.

  7. Method of boronizing transition metal surfaces

    DOEpatents

    Koyama, Koichiro; Shimotake, Hiroshi

    1983-01-01

    A method is presented for preparing a boride layer on a transition metal substrate for use in corrosive environments or as a harden surface in machine applications. This method is particularly useful in treating current collectors for use within a high temperature and corrosive electrochemical cell environment. A melt of a alkali metal boride tetrafluoride salt including such as KF to lower its melting point is prepared including a dissolved boron containing material, for instance NiB, MnB.sub.2, or CrB.sub.2. A transition metal to be coated is immersed in the melt at a temperature of no more than 700.degree. C. and a surface boride layer of that transition metal is formed within a period of about 24 hours on the substrate surface.

  8. The onset of convection in a binary fluid mixture with temperature dependent viscosity and Coriolis force with Soret presence

    NASA Astrophysics Data System (ADS)

    Abidin, Nurul Hafizah Zainal; Mokhtar, Nor Fadzillah Mohd; Majid, Zanariah Abdul; Ghani, Siti Salwa Abd

    2017-11-01

    Temperature dependent viscosity and Coriolis force were applied to the steady Benard-Marangoni convection where the lower boundary of a horizontal layer of the binary mixture is heated from below and cooled from above. The purpose of this paper is to study in detail the onset of convection with these effects. Few cases of boundary conditions are studied which are rigid-rigid, rigid-free and free-free representing the lower-upper boundaries. A detailed numerical calculation of the marginal stability curves was performed by using the Galerkin method and it is showed that temperature dependent viscosity and Soret number destabilize the binary fluid layer system and Taylor number act oppositely.

  9. [Research on the photoelectric conversion efficiency of grating antireflective layer solar cells].

    PubMed

    Zhong, Hui; Gao, Yong-Yi; Zhou, Ren-Long; Zhou, Bing-ju; Tang, Li-qiang; Wu, Ling-xi; Li, Hong-jian

    2011-07-01

    A numerical investigation of the effect of grating antireflective layer structure on the photoelectric conversion efficiency of solar cells was carried out by the finite-difference time-domain method. The influence of grating shape, height and the metal film thickness coated on grating surface on energy storage was analyzed in detail. It was found that the comparison between unoptimized and optimized surface grating structure on solar cells shows that the optimization of surface by grating significantly increases the energy storage capability and greatly improves the efficiency, especially of the photoelectric conversion efficiency and energy storage of the triangle grating. As the film thickness increases, energy storage effect increases, while as the film thickness is too thick, energy storage effect becomes lower and lower.

  10. Estimation of electrode location in a rat motor cortex by laminar analysis of electrophysiology and intracortical electrical stimulation

    NASA Astrophysics Data System (ADS)

    Yazdan-Shahmorad, A.; Lehmkuhle, M. J.; Gage, G. J.; Marzullo, T. C.; Parikh, H.; Miriani, R. M.; Kipke, D. R.

    2011-08-01

    While the development of microelectrode arrays has enabled access to disparate regions of a cortex for neurorehabilitation, neuroprosthetic and basic neuroscience research, accurate interpretation of the signals and manipulation of the cortical neurons depend upon the anatomical placement of the electrode arrays in a layered cortex. Toward this end, this report compares two in vivo methods for identifying the placement of electrodes in a linear array spaced 100 µm apart based on in situ laminar analysis of (1) ketamine-xylazine-induced field potential oscillations in a rat motor cortex and (2) an intracortical electrical stimulation-induced movement threshold. The first method is based on finding the polarity reversal in laminar oscillations which is reported to appear at the transition between layers IV and V in laminar 'high voltage spindles' of the rat cortical column. Analysis of histological images in our dataset indicates that polarity reversal is detected 150.1 ± 104.2 µm below the start of layer V. The second method compares the intracortical microstimulation currents that elicit a physical movement for anodic versus cathodic stimulation. It is based on the hypothesis that neural elements perpendicular to the electrode surface are preferentially excited by anodic stimulation while cathodic stimulation excites those with a direction component parallel to its surface. With this method, we expect to see a change in the stimulation currents that elicits a movement at the beginning of layer V when comparing anodic versus cathodic stimulation as the upper cortical layers contain neuronal structures that are primarily parallel to the cortical surface and lower layers contain structures that are primarily perpendicular. Using this method, there was a 78.7 ± 68 µm offset in the estimate of the depth of the start of layer V. The polarity reversal method estimates the beginning of layer V within ±90 µm with 95% confidence and the intracortical stimulation method estimates it within ±69.3 µm. We propose that these methods can be used to estimate the in situ location of laminar electrodes implanted in the rat motor cortex.

  11. A physical zero-knowledge object-comparison system for nuclear warhead verification

    PubMed Central

    Philippe, Sébastien; Goldston, Robert J.; Glaser, Alexander; d'Errico, Francesco

    2016-01-01

    Zero-knowledge proofs are mathematical cryptographic methods to demonstrate the validity of a claim while providing no further information beyond the claim itself. The possibility of using such proofs to process classified and other sensitive physical data has attracted attention, especially in the field of nuclear arms control. Here we demonstrate a non-electronic fast neutron differential radiography technique using superheated emulsion detectors that can confirm that two objects are identical without revealing their geometry or composition. Such a technique could form the basis of a verification system that could confirm the authenticity of nuclear weapons without sharing any secret design information. More broadly, by demonstrating a physical zero-knowledge proof that can compare physical properties of objects, this experiment opens the door to developing other such secure proof-systems for other applications. PMID:27649477

  12. A physical zero-knowledge object-comparison system for nuclear warhead verification.

    PubMed

    Philippe, Sébastien; Goldston, Robert J; Glaser, Alexander; d'Errico, Francesco

    2016-09-20

    Zero-knowledge proofs are mathematical cryptographic methods to demonstrate the validity of a claim while providing no further information beyond the claim itself. The possibility of using such proofs to process classified and other sensitive physical data has attracted attention, especially in the field of nuclear arms control. Here we demonstrate a non-electronic fast neutron differential radiography technique using superheated emulsion detectors that can confirm that two objects are identical without revealing their geometry or composition. Such a technique could form the basis of a verification system that could confirm the authenticity of nuclear weapons without sharing any secret design information. More broadly, by demonstrating a physical zero-knowledge proof that can compare physical properties of objects, this experiment opens the door to developing other such secure proof-systems for other applications.

  13. A physical zero-knowledge object-comparison system for nuclear warhead verification

    NASA Astrophysics Data System (ADS)

    Philippe, Sébastien; Goldston, Robert J.; Glaser, Alexander; D'Errico, Francesco

    2016-09-01

    Zero-knowledge proofs are mathematical cryptographic methods to demonstrate the validity of a claim while providing no further information beyond the claim itself. The possibility of using such proofs to process classified and other sensitive physical data has attracted attention, especially in the field of nuclear arms control. Here we demonstrate a non-electronic fast neutron differential radiography technique using superheated emulsion detectors that can confirm that two objects are identical without revealing their geometry or composition. Such a technique could form the basis of a verification system that could confirm the authenticity of nuclear weapons without sharing any secret design information. More broadly, by demonstrating a physical zero-knowledge proof that can compare physical properties of objects, this experiment opens the door to developing other such secure proof-systems for other applications.

  14. A physical zero-knowledge object-comparison system for nuclear warhead verification

    DOE PAGES

    Philippe, Sébastien; Goldston, Robert J.; Glaser, Alexander; ...

    2016-09-20

    Zero-knowledge proofs are mathematical cryptographic methods to demonstrate the validity of a claim while providing no further information beyond the claim itself. The possibility of using such proofs to process classified and other sensitive physical data has attracted attention, especially in the field of nuclear arms control. Here we demonstrate a non-electronic fast neutron differential radiography technique using superheated emulsion detectors that can confirm that two objects are identical without revealing their geometry or composition. Such a technique could form the basis of a verification system that could confirm the authenticity of nuclear weapons without sharing any secret design information.more » More broadly, by demonstrating a physical zero-knowledge proof that can compare physical properties of objects, this experiment opens the door to developing other such secure proof-systems for other applications.« less

  15. Stability assessment of QKD procedures in commercial quantum cryptography systems versus quality of dark channel

    NASA Astrophysics Data System (ADS)

    Jacak, Monika; Melniczuk, Damian; Jacak, Janusz; Jóźwiak, Ireneusz; Gruber, Jacek; Jóźwiak, Piotr

    2015-02-01

    In order to assess the susceptibility of the quantum key distribution (QKD) systems to the hacking attack including simultaneous and frequent system self-decalibrations, we analyze the stability of the QKD transmission organized in two commercially available systems. The first one employs non-entangled photons as flying qubits in the dark quantum channel for communication whereas the second one utilizes the entangled photon pairs to secretly share the cryptographic key. Applying standard methods of the statistical data analysis to the characteristic indicators of the quality of the QKD communication (the raw key exchange rate [RKER] and the quantum bit error rate [QBER]), we have estimated the pace of the self-decalibration of both systems and the repeatability rate in the case of controlled worsening of the dark channel quality.

  16. A physical zero-knowledge object-comparison system for nuclear warhead verification

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Philippe, Sébastien; Goldston, Robert J.; Glaser, Alexander

    Zero-knowledge proofs are mathematical cryptographic methods to demonstrate the validity of a claim while providing no further information beyond the claim itself. The possibility of using such proofs to process classified and other sensitive physical data has attracted attention, especially in the field of nuclear arms control. Here we demonstrate a non-electronic fast neutron differential radiography technique using superheated emulsion detectors that can confirm that two objects are identical without revealing their geometry or composition. Such a technique could form the basis of a verification system that could confirm the authenticity of nuclear weapons without sharing any secret design information.more » More broadly, by demonstrating a physical zero-knowledge proof that can compare physical properties of objects, this experiment opens the door to developing other such secure proof-systems for other applications.« less

  17. Verification of OpenSSL version via hardware performance counters

    NASA Astrophysics Data System (ADS)

    Bruska, James; Blasingame, Zander; Liu, Chen

    2017-05-01

    Many forms of malware and security breaches exist today. One type of breach downgrades a cryptographic program by employing a man-in-the-middle attack. In this work, we explore the utilization of hardware events in conjunction with machine learning algorithms to detect which version of OpenSSL is being run during the encryption process. This allows for the immediate detection of any unknown downgrade attacks in real time. Our experimental results indicated this detection method is both feasible and practical. When trained with normal TLS and SSL data, our classifier was able to detect which protocol was being used with 99.995% accuracy. After the scope of the hardware event recording was enlarged, the accuracy diminished greatly, but to 53.244%. Upon removal of TLS 1.1 from the data set, the accuracy returned to 99.905%.

  18. [Characteristic of sample banks isolated from EDTA-blood by sedimentation method].

    PubMed

    Chen, Zhi-bin; Lin, Qin; Ma, Chang-hua; Liu, Kai-ning; Meng, Huan-xin

    2014-02-18

    To assess the characteristics of establishing the different sample banks of plasma, leukocytes and DNA by sedimentation method of isolating from ethylene diamine tetraacetic acid(EDTA)-blood and to clarify the sedimentation method of leukocyte isolation and plasma volume by comparative data and recommended procedures for applicability. In the study, 29 EDTA-bloods were obtained, the total amounts of leukocytes and the percentage of neutrophile granulocytes, and lymphocytes in the EDTA-blood detected as a control group and then assigned equally into 4 EP tubes with 1 mL EDTA-blood per tube as 4 test groups, then the 4 tubes were placed with the EDTA-blood at room temperature and the plasma layers were isolated at 0.5, 1, 2 and 3 h, receptively. The total amount of leukocytes and the percentage of neutrophile granulocytes, and lymphocytes were detected by automated hematology analyzer at the clinical laboratory. The volume of the plasma was also measured at the same time. The plasma volume at 0.5 h [(241.72 ± 101.52)μL] was substantially lower than those at 1 h[(317.24 ± 97.50)μL], at 2 h[(371.03 ± 91.66)μL], and at 3 h [(408.97 ± 97.43)μL] , P < 0.05. The plasma volume at 1 h was substantially lower than those at 2 h and 3 h (P < 0.05). The total amount of leukocytes in the plasma layer at 0.5 h (2.50 × 10(6) ± 1.48 × 10(6)) group was substantially higher than the amount of 2 or 3 h groups respectively (1.47 × 10(6) ± 7.19 × 105,1.21 × 10(6) ± 7.41 × 105), P < 0.05. Significant difference was not found between 0.5 h group and 1 h group (2.29 × 10(6)± 1.17 × 10(6)), P > 0.05. The total amount of leukocytes in the plasma layer in 1 h group was substantially higher than that in 2 h and 3 h groups (P < 0.05). There was no significant difference between 3 h group and 2 h group (P > 0.05). The total amount of leukocytes in the plasma layer of the 4 test groups was substantially lower than that in the control group (P < 0.05). The percentage of neutrophile granulocytes (54.14% ± 11.65%) in the plasma layer in 0.5 h group was substantially higher than those in 1 h, 2 h and 3 h groups (46.66% ± 12.70%,39.17% ± 12.33%,43.25% ± 14.54%), P < 0.05, respectively, which was the substantially lower than that in the control group (60.53% ± 8.46%), P < 0.05. The average value of the percentage of neutrophile granulocytes in the plasma layer in 1 h group was substantially higher than that in 2 h group (P < 0.05). There was no significant different between 3 h group and both 1 h, 2 h groups (P > 0.05). The mean percentage of lymphocytes in the plasma layer in 0.5 h group (35.09% ± 10.84%) was substantially lower than those in the plasma layer in 1 h, 2 h and 3 h groups, respectively ( 41.48% ± 12.20%, 47.96% ± 12.27%, 45.50% ± 13.71%), which was significant higher than that in the control group(30.98% ± 7.33%), P < 0.05. The average value of the percentage of lymphocytes in the plasma layer in 1 h group was substantially higher than those in the control group and 0.5 h group, but was substantially lower than those in 2 h and 3 h groups (P < 0.05). The average value of percentage of lymphocytes in the plasma layer in 2 h group was substantially higher than those in the control group, 0.5 h and 1 h groups (P < 0.05). There was no significant difference between 2 h and 3 h groups (P > 0.05). The best period of time in obtaining leukocytes is 0.5-1 h sedimentation of EDTA-blood. Both the plasma layer and leukocytes can be separated and obtained at the same time from the same sample by the sedimentation method of EDTA-blood. The sedimentation of EDTA-blood has the least interference of both chemical and physical factors, as well as a ready operation, which can establish the plasma, leukocytes and DNA sample banks for various aspects of research.

  19. Numerical Model of Multiple Scattering and Emission from Layering Snowpack for Microwave Remote Sensing

    NASA Astrophysics Data System (ADS)

    Jin, Y.; Liang, Z.

    2002-12-01

    The vector radiative transfer (VRT) equation is an integral-deferential equation to describe multiple scattering, absorption and transmission of four Stokes parameters in random scatter media. From the integral formal solution of VRT equation, the lower order solutions, such as the first-order scattering for a layer medium or the second order scattering for a half space, can be obtained. The lower order solutions are usually good at low frequency when high-order scattering is negligible. It won't be feasible to continue iteration for obtaining high order scattering solution because too many folds integration would be involved. In the space-borne microwave remote sensing, for example, the DMSP (Defense Meterological Satellite Program) SSM/I (Special Sensor Microwave/Imager) employed seven channels of 19, 22, 37 and 85GHz. Multiple scattering from the terrain surfaces such as snowpack cannot be neglected at these channels. The discrete ordinate and eigen-analysis method has been studied to take into account for multiple scattering and applied to remote sensing of atmospheric precipitation, snowpack etc. Snowpack was modeled as a layer of dense spherical particles, and the VRT for a layer of uniformly dense spherical particles has been numerically studied by the discrete ordinate method. However, due to surface melting and refrozen crusts, the snowpack undergoes stratifying to form inhomegeneous profiles of the ice grain size, fractional volume and physical temperature etc. It becomes necessary to study multiple scattering and emission from stratified snowpack of dense ice grains. But, the discrete ordinate and eigen-analysis method cannot be simply applied to multi-layers model, because numerically solving a set of multi-equations of VRT is difficult. Stratifying the inhomogeneous media into multi-slabs and employing the first order Mueller matrix of each thin slab, this paper developed an iterative method to derive high orders scattering solutions of whole scatter media. High order scattering and emission from inhomogeneous stratifying media of dense spherical particles are numerically obtained. The brightness temperature at low frequency such as 5.3 GHz without high order scattering and at SSM/I channels with high order scattering are obtained. This approach is also compared with the conventional discrete ordinate method for an uniform layer model. Numerical simulation for inhomogeneous snowpack is also compared with the measurements of microwave remote sensing.

  20. Characterization of metal-supported axial injection plasma sprayed solid oxide fuel cells with aqueous suspension plasma sprayed electrolyte layers

    NASA Astrophysics Data System (ADS)

    Waldbillig, D.; Kesler, O.

    A method for manufacturing metal-supported SOFCs with atmospheric plasma spraying (APS) is presented, making use of aqueous suspension feedstock for the electrolyte layer and dry powder feedstock for the anode and cathode layers. The cathode layer was deposited first directly onto a metal support, in order to minimize contact resistance, and to allow the introduction of added porosity. The electrolyte layers produced by suspension plasma spraying (SPS) were characterized in terms of thickness, permeability, and microstructure, and the impact of substrate morphology on electrolyte properties was investigated. Fuel cells produced by APS were electrochemically tested at temperatures ranging from 650 to 750 °C. The substrate morphology had little effect on open circuit voltage, but substrates with finer porosity resulted in lower kinetic losses in the fuel cell polarization.

  1. Methods for forming thin-film heterojunction solar cells from I-III-VI{sub 2}

    DOEpatents

    Mickelsen, R.A.; Chen, W.S.

    1985-08-13

    An improved thin-film, large area solar cell, and methods for forming the same are disclosed, having a relatively high light-to-electrical energy conversion efficiency and characterized in that the cell comprises a p-n type heterojunction formed of: (i) a first semiconductor layer comprising a photovoltaic active material selected from the class of I-III-VI{sub 2} chalcopyrite ternary materials which is vacuum deposited in a thin ``composition-graded`` layer ranging from on the order of about 2.5 microns to about 5.0 microns ({approx_equal}2.5 {mu}m to {approx_equal}5.0 {mu}m) and wherein the lower region of the photovoltaic active material preferably comprises a low resistivity region of p-type semiconductor material having a superimposed region of relatively high resistivity, transient n-type semiconductor material defining a transient p-n homojunction; and (ii) a second semiconductor layer comprising a low resistivity n-type semiconductor material; wherein interdiffusion occurs (a) between the elemental constituents of the two discrete juxtaposed regions of the first semiconductor layer defining a transient p-n homojunction layer, and (b) between the transient n-type material in the first semiconductor layer and the second n-type semiconductor layer. 16 figs.

  2. Methods for forming thin-film heterojunction solar cells from I-III-VI[sub 2

    DOEpatents

    Mickelsen, R.A.; Chen, W.S.

    1982-06-15

    An improved thin-film, large area solar cell, and methods for forming the same are disclosed, having a relatively high light-to-electrical energy conversion efficiency and characterized in that the cell comprises a p-n type heterojunction formed of: (1) a first semiconductor layer comprising a photovoltaic active material selected from the class of I-III-VI[sub 2] chalcopyrite ternary materials which is vacuum deposited in a thin composition-graded'' layer ranging from on the order of about 2.5 microns to about 5.0 microns ([approx equal]2.5[mu]m to [approx equal]5.0[mu]m) and wherein the lower region of the photovoltaic active material preferably comprises a low resistivity region of p-type semiconductor material having a superimposed region of relatively high resistivity, transient n-type semiconductor material defining a transient p-n homojunction; and (2), a second semiconductor layer comprising a low resistivity n-type semiconductor material; wherein interdiffusion (a) between the elemental constituents of the two discrete juxtaposed regions of the first semiconductor layer defining a transient p-n homojunction layer, and (b) between the transient n-type material in the first semiconductor layer and the second n-type semiconductor layer, is allowed.

  3. Soldering to a single atomic layer

    NASA Astrophysics Data System (ADS)

    Girit, ćaǧlar Ö.; Zettl, A.

    2007-11-01

    The standard technique to make electrical contact to nanostructures is electron beam lithography. This method has several drawbacks including complexity, cost, and sample contamination. We present a simple technique to cleanly solder submicron sized, Ohmic contacts to nanostructures. To demonstrate, we contact graphene, a single atomic layer of carbon, and investigate low- and high-bias electronic transport. We set lower bounds on the current carrying capacity of graphene. A simple model allows us to obtain device characteristics such as mobility, minimum conductance, and contact resistance.

  4. Soldering to a single atomic layer

    NASA Astrophysics Data System (ADS)

    Girit, Caglar; Zettl, Alex

    2008-03-01

    The standard technique to make electrical contact to nanostructures is electron beam lithography. This method has several drawbacks including complexity, cost, and sample contamination. We present a simple technique to cleanly solder submicron sized, Ohmic contacts to nanostructures. To demonstrate, we contact graphene, a single atomic layer of carbon, and investigate low- and high-bias electronic transport. We set lower bounds on the current carrying capacity of graphene. A simple model allows us to obtain device characteristics such as mobility, minimum conductance, and contact resistance.

  5. Evaluation of retrieval methods of daytime convective boundary layer height based on lidar data

    NASA Astrophysics Data System (ADS)

    Li, Hong; Yang, Yi; Hu, Xiao-Ming; Huang, Zhongwei; Wang, Guoyin; Zhang, Beidou; Zhang, Tiejun

    2017-04-01

    The atmospheric boundary layer height is a basic parameter in describing the structure of the lower atmosphere. Because of their high temporal resolution, ground-based lidar data are widely used to determine the daytime convective boundary layer height (CBLH), but the currently available retrieval methods have their advantages and drawbacks. In this paper, four methods of retrieving the CBLH (i.e., the gradient method, the idealized backscatter method, and two forms of the wavelet covariance transform method) from lidar normalized relative backscatter are evaluated, using two artificial cases (an idealized profile and a case similar to real profile), to test their stability and accuracy. The results show that the gradient method is suitable for high signal-to-noise ratio conditions. The idealized backscatter method is less sensitive to the first estimate of the CBLH; however, it is computationally expensive. The results obtained from the two forms of the wavelet covariance transform method are influenced by the selection of the initial input value of the wavelet amplitude. Further sensitivity analysis using real profiles under different orders of magnitude of background counts show that when different initial input values are set, the idealized backscatter method always obtains consistent CBLH. For two wavelet methods, the different CBLH are always obtained with the increase in the wavelet amplitude when noise is significant. Finally, the CBLHs as measured by three lidar-based methods are evaluated by as measured from L-band soundings. The boundary layer heights from two instruments coincide with ±200 m in most situations.

  6. Securing mobile code.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Link, Hamilton E.; Schroeppel, Richard Crabtree; Neumann, William Douglas

    2004-10-01

    If software is designed so that the software can issue functions that will move that software from one computing platform to another, then the software is said to be 'mobile'. There are two general areas of security problems associated with mobile code. The 'secure host' problem involves protecting the host from malicious mobile code. The 'secure mobile code' problem, on the other hand, involves protecting the code from malicious hosts. This report focuses on the latter problem. We have found three distinct camps of opinions regarding how to secure mobile code. There are those who believe special distributed hardware ismore » necessary, those who believe special distributed software is necessary, and those who believe neither is necessary. We examine all three camps, with a focus on the third. In the distributed software camp we examine some commonly proposed techniques including Java, D'Agents and Flask. For the specialized hardware camp, we propose a cryptographic technique for 'tamper-proofing' code over a large portion of the software/hardware life cycle by careful modification of current architectures. This method culminates by decrypting/authenticating each instruction within a physically protected CPU, thereby protecting against subversion by malicious code. Our main focus is on the camp that believes that neither specialized software nor hardware is necessary. We concentrate on methods of code obfuscation to render an entire program or a data segment on which a program depends incomprehensible. The hope is to prevent or at least slow down reverse engineering efforts and to prevent goal-oriented attacks on the software and execution. The field of obfuscation is still in a state of development with the central problem being the lack of a basis for evaluating the protection schemes. We give a brief introduction to some of the main ideas in the field, followed by an in depth analysis of a technique called 'white-boxing'. We put forth some new attacks and improvements on this method as well as demonstrating its implementation for various algorithms. We also examine cryptographic techniques to achieve obfuscation including encrypted functions and offer a new application to digital signature algorithms. To better understand the lack of security proofs for obfuscation techniques, we examine in detail general theoretical models of obfuscation. We explain the need for formal models in order to obtain provable security and the progress made in this direction thus far. Finally we tackle the problem of verifying remote execution. We introduce some methods of verifying remote exponentiation computations and some insight into generic computation checking.« less

  7. Study on influences of TiN capping layer on time-dependent dielectric breakdown characteristic of ultra-thin EOT high-k metal gate NMOSFET with kMC TDDB simulations

    NASA Astrophysics Data System (ADS)

    Xu, Hao; Yang, Hong; Luo, Wei-Chun; Xu, Ye-Feng; Wang, Yan-Rong; Tang, Bo; Wang, Wen-Wu; Qi, Lu-Wei; Li, Jun-Feng; Yan, Jiang; Zhu, Hui-Long; Zhao, Chao; Chen, Da-Peng; Ye, Tian-Chun

    2016-08-01

    The thickness effect of the TiN capping layer on the time dependent dielectric breakdown (TDDB) characteristic of ultra-thin EOT high-k metal gate NMOSFET is investigated in this paper. Based on experimental results, it is found that the device with a thicker TiN layer has a more promising reliability characteristic than that with a thinner TiN layer. From the charge pumping measurement and secondary ion mass spectroscopy (SIMS) analysis, it is indicated that the sample with the thicker TiN layer introduces more Cl passivation at the IL/Si interface and exhibits a lower interface trap density. In addition, the influences of interface and bulk trap density ratio N it/N ot are studied by TDDB simulations through combining percolation theory and the kinetic Monte Carlo (kMC) method. The lifetime reduction and Weibull slope lowering are explained by interface trap effects for TiN capping layers with different thicknesses. Project supported by the National High Technology Research and Development Program of China (Grant No. SS2015AA010601), the National Natural Science Foundation of China (Grant Nos. 61176091 and 61306129), and the Opening Project of Key Laboratory of Microelectronics Devices & Integrated Technology, Institute of MicroElectronics of Chinese Academy of Sciences.

  8. Use of double-layer ITO films in reflective contacts for blue and near-UV LEDs

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Markov, L. K., E-mail: l.markov@mail.ioffe.ru; Smirnova, I. P.; Pavluchenko, A. S.

    2014-12-15

    The structural and optical properties of multilayer ITO/SiO{sub 2}/Ag composites are studied. In these composites, the ITO (indium-tin oxide) layer is produced by two different methods: electron-beam evaporation and a combined method including electron-beam evaporation and subsequent magnetron sputtering. It is shown that the reflectance of the composite based on the ITO film produced by electron-beam evaporation is substantially lower. This can be attributed to the strong absorption of light at both boundaries of the SiO{sub 2} layer, which results from the complex surface profile of ITO films deposited by electron-beam evaporation. Samples with a film deposited by the combinedmore » method have a reflectance of about 90% at normal light incidence, which, combined with their higher electrical conductivity, makes these samples advantageous for use as reflective contacts to the p-type region of AlInGaN light-emitting diodes of the flip-chip design.« less

  9. Toward soft-tissue elastography using digital holography to monitor surface acoustic waves

    NASA Astrophysics Data System (ADS)

    Li, Shiguang; Mohan, Karan D.; Sanders, William W.; Oldenburg, Amy L.

    2011-11-01

    Measuring the elasticity distribution inside the human body is of great interest because elastic abnormalities can serve as indicators of several diseases. We present a method for mapping elasticity inside soft tissues by imaging surface acoustic waves (SAWs) with digital holographic interferometry. With this method, we show that SAWs are consistent with Rayleigh waves, with velocities proportional to the square root of the elastic modulus greater than 2-40 kPa in homogeneous tissue phantoms. In two-layer phantoms, the SAW velocity transitions approximately from that of the lower layer to that of the upper layer as frequency is increased in agreement with the theoretical relationship between SAW dispersion and the depth-dependent stiffness profile. We also observed deformation in the propagation direction of SAWs above a stiff inclusion placed 8 mm below the surface. These findings demonstrate the potential for quantitative digital holography-based elastography of soft tissues as a noninvasive method for disease detection.

  10. Development of the α-IGZO/Ag/α-IGZO Triple-Layer Structure Films for the Application of Transparent Electrode.

    PubMed

    Chen, Kun-Neng; Yang, Cheng-Fu; Wu, Chia-Ching; Chen, Yu-Hsin

    2017-02-24

    We investigated the structural, optical, and electrical properties of amorphous IGZO/silver/amorphous IGZO (α-IGZO/Ag/α-IGZO) triple-layer structures that were deposited at room temperature on Eagle XG glass and flexible polyethylene terephthalate substrates through the sputtering method. Thin Ag layers with different thicknesses were inserted between two IGZO layers to form a triple-layer structure. Ag was used because of its lower absorption and resistivity. Field emission scanning electron microscopy measurements of the triple-layer structures revealed that the thicknesses of the Ag layers ranged from 13 to 41 nm. The thickness of the Ag layer had a large effect on the electrical and optical properties of the electrodes. The optimum thickness of the Ag metal thin film could be evaluated according to the optical transmittance, electrical conductivity, and figure of merit of the electrode. This study demonstrates that the α-IGZO/Ag/α-IGZO triple-layer transparent electrode can be fabricated with low sheet resistance (4.2 Ω/□) and high optical transmittance (88.1%) at room temperature without postannealing processing on the deposited thin films.

  11. Testing, Selection, and Implementation of Random Number Generators

    DTIC Science & Technology

    2008-07-01

    Complexity and Lempel - Ziv Compression tests. This causes concern for cryptographic use but is not relevant for our applications. In fact, the features of...Linear Complexity, Lempel - Ziv Compression , and Matrix Rank test failures excluded. The Mersenne Twister is widely accepted by the community; in fact...searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection information. Send comments

  12. Wireless, amphibious theory for reinforcement learning

    NASA Astrophysics Data System (ADS)

    Li, Jinci

    2013-10-01

    Cryptographers agree that heterogeneous information are an interesting new topic in the field of cryptography, and biologists concur. Given the current status of stochastic epistemologies, security experts clearly desire the construction of flip-flop gates [1, 2, 3]. Mungo, our new system for authenticated algorithms, is the solution to all of these challenges. Though such a hypothesis at first glance seems perverse, it has ample historical precedence.

  13. Atomicity in Electronic Commerce,

    DTIC Science & Technology

    1996-01-01

    even 1¢, the standard credit card rates would dominate the cost of the item. Thus, a number of parties have proposed support for microtransactions ...Millicent [14].) Both NetBill and cryptographic postage indicia are motivated by the idea of supporting microtransactions . Some of the design decisions made...for those systems can only be understood by the microtransaction requirement. However, a detailed discussion of microtransactions is beyond the scope

  14. Scalable Anonymous Group Communication in the Anytrust Model

    DTIC Science & Technology

    2012-04-10

    Scalable Anonymous Group Communication in the Anytrust Model David Isaac Wolinsky, Henry Corrigan-Gibbs, and Bryan Ford Yale University...12th KDD, Aug. 2006. [10] D. Chaum . Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2), Feb...1981. [11] D. Chaum . The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology, 1(1):65–75, Jan. 1988

  15. Correlation Immunity, Avalanche Features, and Other Cryptographic Properties of Generalized Boolean Functions

    DTIC Science & Technology

    2017-09-01

    information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and...maintaining the data needed, and completing and reviewing the collection of information . Send comments regarding this burden estimate or any other aspect...of this collection of information , including suggestions for reducing this burden to Washington headquarters Services, Directorate for Information

  16. An Overview of Electronic Passport Security Features

    NASA Astrophysics Data System (ADS)

    Říha, Zdeněk

    Electronic passports include contactless chip which stores personal data of the passport holder, information about the passport and the issuing institution. In its simplest form an electronic passport contains just a collection of read-only files, more advanced variants can include sophisticated cryptographic mechanisms protecting security of the document and / or privacy of the passport holder. This paper describes security features of electronic passports and discusses their efficiency.

  17. PACE: Proactively Secure Accumulo with Cryptographic Enforcement

    DTIC Science & Technology

    2017-05-27

    Abstract—Cloud-hosted databases have many compelling ben- efits, including high availability , flexible resource allocation, and resiliency to attack...infrastructure to the cloud. This move is motivated by the cloud’s increased availability , flexibility, and resilience [1]. Most importantly, the cloud enables...a level of availability and performance that would be impossible for many companies to achieve using their own infrastructure. For example, using a

  18. Effects of Daytime Atmospheric Boundary Layer Turbulence on the Generation of Nonsteady Wind Turbine Loadings and Predictive Accuracy of Lower Order Models

    NASA Astrophysics Data System (ADS)

    Lavely, Adam W.

    Modern utility-scale wind turbines operate in the the lower atmospheric boundary layer (ABL), which is characterized by large gradients in mean velocity and temperature and the existence of strong coherent turbulence eddies that reflect the interaction between strong mean shear and vertical buoyancy driven by solar heating. The spatio-temporal velocity variations drive nonsteady loadings on wind turbines that contribute to premature wind turbine component fatigue failure, decreasing the levelized cost of (wind) energy (LCOE). The aims of the current comprehensive research program center on the quantification of the characteristics of the nonsteady loads resulting from the interactions between the coherent energy contain gin atmospheric turbulence eddies within the lower ABL as the eddies advect through the rotor plane and the rotating wind turbine blade encounter the internal turbulence structure of the atmospheric eddies. We focus on the daytime atmospheric boundary layer, where buoyancy due to surface heating interacts with shear to create coherent turbulence structures. Pseudo-spectral large eddy simulation (LES) is used to generate an equilibrium atmospheric boundary layer over at terrain with uniform surface roughness characteristic of the Midwest on a typical sunny windy afternoon when the ABL can be approximated as quasi-steady. The energy-containing eddies are found to create advective time-responses of order 30-90 seconds with lateral spatial scales of order the wind turbine rotor diameter. Different wind turbine simulation methods of a representative utility scale turbine were applied using the atmospheric turbulence as in flow. We apply three different fidelity wind turbine simulation methods to quantify the extent to which lower order models are able to accurately predict the nonsteady loading due to atmospheric turbulence eddies advecting through the rotor plane and interacting with the wind turbine. The methods vary both the coupling to the atmospheric boundary layer and the way in which the blade geometry is resolved and sectional blade forces are calculated. The highest fidelity simulation resolves the blade geometry to capture unsteady boundary layer response and separation dynamics within a simulation of the atmospheric boundary layer coupling the effect of the turbine to the atmospheric in flow. The lower order models both use empirical look-up tables to predict the time changes in blade sectional forces as a function of time changes in local velocity vector. The actuator line method (ALM) is two-way coupled and feeds these blade forces back into a simulation of the atmospheric boundary layer. The blade element momentum theory (BEMT) is one-way coupled and models the effect of the turbine on the incoming velocity field. The coupling method and method of blade resolution are both found to have an effect on the ability to accurately predict sectional blade load response to nonsteady atmospheric turbulence. The BEMT cannot accurately predict the timing of the response changes as these are modulated by the wind turbine within the ABL simulations. The lower order models have increased blade sectional load range and temporal gradients due to their inability to accurately capture the temporal response of the blade geometry to in flow changes. Taking advantage of horizontal homogeneity to collect statistics, we investigate the time period required to create well converged statistics in the equilibrium atmospheric boundary layer and find whereas the 10-minute industry standard for 'averages' retains variability of order 10%, the 10-minute average is an optimal choice. We compare the industry standard 10-minute averaging period. The residual variability within the 10-minute period to the National Renewable Energy Laboratory (NREL) Gearbox Reliability Collaborative (GRC) field test database to find that whereas the 10-minute window still contains large variability, it is, in some sense, optimal because averaging times much longer would be required to significantly reduce variability. Turbulence fluctuations in streamwise velocity are found to be the primary driver of temporal variations in local angles of attack and sectional blade loads. Based on this new understanding, we develop analyses to show that whereas rotor torque and thrust correlate well with upstream horizontal velocity averaged over the rotor disk, out-of-plane bending moment magnitude correlates with the asymmetry in the horizontal fluctuating velocity over the rotor disk. Consequentially, off-design motions of the drivetrain and gearbox shown with the GRC field test data are well predicted using an asymmetry index designed to capture the response of a three-bladed turbine to asymmetry in the rotor plane. The predictors for torque, thrust and out-of-plane bending moment are shown to correlate well to upstream rotor planes indicating that they may be applied to advanced feed-forward control methods such as forward-facing LIDAR used to detect velocity changes in front of a wind turbine. This has the potential to increase wind turbine reliability by using controls to reduce potentially detrimental load responses to incoming atmospheric turbulence and decrease the LCOE.

  19. Apparatus and method for transient thermal infrared spectrometry

    DOEpatents

    McClelland, John F.; Jones, Roger W.

    1991-12-03

    A method and apparatus for enabling analysis of a material (16, 42) by applying a cooling medium (20, 54) to cool a thin surface layer portion of the material and to transiently generate a temperature differential between the thin surface layer portion and the lower portion of the material sufficient to alter the thermal infrared emission spectrum of the material from the black-body thermal infrared emission spectrum of the material. The altered thermal infrared emission spectrum of the material is detected by a spectrometer/detector (28, 50) while the altered thermal infrared emission spectrum is sufficiently free of self-absorption by the material of the emitted infrared radiation. The detection is effected prior to the temperature differential propagating into the lower portion of the material to an extent such that the altered thermal infrared emission spectrum is no longer sufficiently free of self-absorption by the material of emitted infrared radiation, so that the detected altered thermal infrared emission spectrum is indicative of the characteristics relating to the molecular composition of the material.

  20. Detecting a liquid and solid H2O layer by geophysical methods

    NASA Astrophysics Data System (ADS)

    Yoshikawa, K.; Romanovsky, V.; Tsapin, A.; Brown, J.

    2002-12-01

    The objective is to detect the hydrological and cryological structure of the cold continuous permafrost subsurface using geophysical methods. We believe that a lot of water potentially exists as solid and liquid phases underground on Mars. It is likely that the liquid fluid would be high in saline concentration (brine). The ground freezing process involves many hydrological processes including enrichment of the brine layer. The brine layer is an important environment for ancient and/or current life to exist on terrestrial permafrost regions. The existence of a Martian brine layer would increase the possibility of the existence of life, as on Earth. In situ electric resistivity measurement will be the most efficient method to determine brine layer as well as massive H2O ice in the permafrost. However, the wiring configuration is unlikely to operate on the remote planetary surface. Satellite-born Radar and/or EM methods will be the most accessible methods for detecting the hydrological and cryological structure. We are testing several geophysical methods at the brine layer site in Barrow and massive pingo ice site in Fairbanks, Alaska. The radar system is affected by the dielectric properties of subsurface materials, which allows for evidence of liquid phase in the frozen ground. The dielectric constant varies greatly between liquid water and frozen ground. The depth of the terrestrial (and probably Martian) brine layer is frequently located deeper than the maximum detecting depth of the impulse type of the ground penetrating radar system. Once we develop a radar system with a deeper penetrating capability (Lower frequency), the dispersion of the ground ice will be the key function for interpretation of these signals. We will improve and use radar signals to understand the hydrological and cryological structure in the permafrost. The core samples and borehole temperature data validate these radar signals.

  1. A target detection multi-layer matched filter for color and hyperspectral cameras

    NASA Astrophysics Data System (ADS)

    Miyanishi, Tomoya; Preece, Bradley L.; Reynolds, Joseph P.

    2018-05-01

    In this article, a method for applying matched filters to a 3-dimentional hyperspectral data cube is discussed. In many applications, color visible cameras or hyperspectral cameras are used for target detection where the color or spectral optical properties of the imaged materials are partially known in advance. Therefore, the use of matched filtering with spectral data along with shape data is an effective method for detecting certain targets. Since many methods for 2D image filtering have been researched, we propose a multi-layer filter where ordinary spatially matched filters are used before the spectral filters. We discuss a way to layer the spectral filters for a 3D hyperspectral data cube, accompanied by a detectability metric for calculating the SNR of the filter. This method is appropriate for visible color cameras and hyperspectral cameras. We also demonstrate an analysis using the Night Vision Integrated Performance Model (NV-IPM) and a Monte Carlo simulation in order to confirm the effectiveness of the filtering in providing a higher output SNR and a lower false alarm rate.

  2. 49 CFR 393.122 - What are the rules for securing paper rolls?

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... be loaded on a layer of paper rolls beneath unless the lower layer extends to the front of the vehicle. (2) Paper rolls in the second and subsequent layers must be prevented from forward, rearward or lateral movement by means as allowed for the bottom layer, or by use of a blocking roll from a lower layer...

  3. Anatomical Study of Temporal Fat Compartments and its Clinical Application for Temporal Fat Grafting

    PubMed Central

    Huang, Ru-Lin; Xie, Yun; Wang, Wenjin; Herrler, Tanja; Zhou, Jia; Zhao, Peijuan; Pu, Lee LQ; Li, Qingfeng

    2017-01-01

    Abstract Background Low satisfaction rates and severe complications are two major limitations for temporal hollowing augmentation using autologous fat grafting. Despite fat compartments in temporal region have been reported, its clinical applied anatomy for fat grafting have not been the subject of studies that show its benefits objectively and statistically. Objectives To investigate temporal fat compartments and relative neurovascular structures in cadavers, developing a safe and effective fat grafting technique for temporal hollowing augmentation. Methods The study was conducted on 8 cadavers (16 temples). The tissue layers, fat compartments, ligaments, and neurovascular structures in the temporal region were analysed. The variables were the number and location of sentinel veins, perforator vessels of the middle temporal vein. Measurements were taken with a digital calliper. Results Two separate fat compartments, the lateral temporal-cheek fat compartment and lateral orbital fat compartment, were found in the subcutaneous layer, and two separate septum compartments, the upper and lower temporal compartment, were found in the loose areolar tissue layer. One sentinel vein and 1 to 6 perforator vessels were found to travel through the subcutaneous tissue layer, traverse the overlapping tissue layers in the lower temporal septum region, and finally join in the middle temporal vein. Conclusions The four fat compartments in the temporal region are ideal receipt sites for fat grafting. The medial border of the junction of the hairline and temporal line is a safe and effective cannula entry site for temporal fat grafting. The anterior half of the lower temporal compartment is a “zone of caution” for temporal fat grafting. PMID:28520850

  4. Comparison of three different prehospital wrapping methods for preventing hypothermia - a crossover study in humans

    PubMed Central

    2011-01-01

    Background Accidental hypothermia increases mortality and morbidity in trauma patients. Various methods for insulating and wrapping hypothermic patients are used worldwide. The aim of this study was to compare the thermal insulating effects and comfort of bubble wrap, ambulance blankets / quilts, and Hibler's method, a low-cost method combining a plastic outer layer with an insulating layer. Methods Eight volunteers were dressed in moistened clothing, exposed to a cold and windy environment then wrapped using one of the three different insulation methods in random order on three different days. They were rested quietly on their back for 60 minutes in a cold climatic chamber. Skin temperature, rectal temperature, oxygen consumption were measured, and metabolic heat production was calculated. A questionnaire was used for a subjective evaluation of comfort, thermal sensation, and shivering. Results Skin temperature was significantly higher 15 minutes after wrapping using Hibler's method compared with wrapping with ambulance blankets / quilts or bubble wrap. There were no differences in core temperature between the three insulating methods. The subjects reported more shivering, they felt colder, were more uncomfortable, and had an increased heat production when using bubble wrap compared with the other two methods. Hibler's method was the volunteers preferred method for preventing hypothermia. Bubble wrap was the least effective insulating method, and seemed to require significantly higher heat production to compensate for increased heat loss. Conclusions This study demonstrated that a combination of vapour tight layer and an additional dry insulating layer (Hibler's method) is the most efficient wrapping method to prevent heat loss, as shown by increased skin temperatures, lower metabolic rate and better thermal comfort. This should then be the method of choice when wrapping a wet patient at risk of developing hypothermia in prehospital environments. PMID:21699720

  5. Development of mirrors for precision laser gyros

    NASA Astrophysics Data System (ADS)

    Schmitt, Dirk-Roger

    1987-11-01

    Substrate polishing and interference-layer deposition techniques for the preparation of laser-gyro mirrors to operate at laser wavelength 633 nm and incidence angle 30 deg are investigated experimentally. The importance of high reflectivity and low backscatter for accurate laser-gyro angular-velocity measurement is explained, and the methods used to measure these parameters are outlined. Results for uncoated quartz glass, Zerodur, and Si monocrystal; thin Ag layers; alternate layers of SiO2 and TiO2, and Ag with a thin layer of SiO2 are presented in graphs and micrographs and characterized in detail. It is predicted that further improvements in polishing, the use of ion-beam deposition techniques, and perhaps the replacement of TiO2 with Ta2O5 will give mirrors with lower backscatter values.

  6. Omnidirectional optical waveguide

    DOEpatents

    Bora, Mihail; Bond, Tiziana C.

    2016-08-02

    In one embodiment, a system includes a scintillator material; a detector coupled to the scintillator material; and an omnidirectional waveguide coupled to the scintillator material, the omnidirectional waveguide comprising: a plurality of first layers comprising one or more materials having a refractive index in a first range; and a plurality of second layers comprising one or more materials having a refractive index in a second range, the second range being lower than the first range, a plurality of interfaces being defined between alternating ones of the first and second layers. In another embodiment, a method includes depositing alternating layers of a material having a relatively high refractive index and a material having a relatively low refractive index on a substrate to form an omnidirectional waveguide; and coupling the omnidirectional waveguide to at least one surface of a scintillator material.

  7. Structure reconstruction of TiO2-based multi-wall nanotubes: first-principles calculations.

    PubMed

    Bandura, A V; Evarestov, R A; Lukyanov, S I

    2014-07-28

    A new method of theoretical modelling of polyhedral single-walled nanotubes based on the consolidation of walls in the rolled-up multi-walled nanotubes is proposed. Molecular mechanics and ab initio quantum mechanics methods are applied to investigate the merging of walls in nanotubes constructed from the different phases of titania. The combination of two methods allows us to simulate the structures which are difficult to find only by ab initio calculations. For nanotube folding we have used (1) the 3-plane fluorite TiO2 layer; (2) the anatase (101) 6-plane layer; (3) the rutile (110) 6-plane layer; and (4) the 6-plane layer with lepidocrocite morphology. The symmetry of the resulting single-walled nanotubes is significantly lower than the symmetry of initial coaxial cylindrical double- or triple-walled nanotubes. These merged nanotubes acquire higher stability in comparison with the initial multi-walled nanotubes. The wall thickness of the merged nanotubes exceeds 1 nm and approaches the corresponding parameter of the experimental patterns. The present investigation demonstrates that the merged nanotubes can integrate the two different crystalline phases in one and the same wall structure.

  8. Epitaxial growth and chemical vapor transport of ZnTe by closed-tube method

    NASA Astrophysics Data System (ADS)

    Ogawa, H.; Nishio, M.; Arizumi, T.

    1981-04-01

    The epitaxial growth of ZnTe in a ZnTe- I2 system by a closed tube method is investigated by varying the charged iodine concentration ( MI2) or the temperature difference ( ΔT) between the high and low temperature zones. The transport rate is a function of MI2 and ΔT and has a minimum value increasing monotonically at higher and lower iodine concentration, and it increases with increasing ΔT. This experimental result can be explained well by thermodynamical calculations. The growth rate of ZnTe has the same tendency as the transport rate. The surface morphology of epitaxial layer on (110)ZnTe is not sinificantly affected by MI2 but becomes smoother with increasing temperature. The surface morphology and the growth rate of ZnTe layers also depend upon the orientation of substrate. The epitaxial layer can be obtained at temperature as low as 623°C.

  9. Colorimetric As (V) detection based on S-layer functionalized gold nanoparticles.

    PubMed

    Lakatos, Mathias; Matys, Sabine; Raff, Johannes; Pompe, Wolfgang

    2015-11-01

    Herein, we present simple and rapid colorimetric and UV/VIS spectroscopic methods for detecting anionic arsenic (V) complexes in aqueous media. The methods exploit the aggregation of S-layer-functionalized spherical gold nanoparticles of sizes between 20 and 50 nm in the presence of arsenic species. The gold nanoparticles were functionalized with oligomers of the S-layer protein of Lysinibacillus sphaericus JG-A12. The aggregation of the nanoparticles results in a color change from burgundy-red for widely dispersed nanoparticles to blue for aggregated nanoparticles. A detailed signal analysis was achieved by measuring the shift of the particle plasmon resonance signal with UV/VIS spectroscopy. To further improve signal sensitivity, the influence of larger nanoparticles was tested. In the case of 50 nm gold nanoparticles, a concentration of the anionic arsenic (V) complex lower than 24 ppb was detectable. Copyright © 2015 Elsevier B.V. All rights reserved.

  10. On the security of semi-device-independent QKD protocols

    NASA Astrophysics Data System (ADS)

    Chaturvedi, Anubhav; Ray, Maharshi; Veynar, Ryszard; Pawłowski, Marcin

    2018-06-01

    While fully device-independent security in (BB84-like) prepare-and-measure quantum key distribution (QKD) is impossible, it can be guaranteed against individual attacks in a semi-device-independent (SDI) scenario, wherein no assumptions are made on the characteristics of the hardware used except for an upper bound on the dimension of the communicated system. Studying security under such minimal assumptions is especially relevant in the context of the recent quantum hacking attacks wherein the eavesdroppers can not only construct the devices used by the communicating parties but are also able to remotely alter their behavior. In this work, we study the security of a SDIQKD protocol based on the prepare-and-measure quantum implementation of a well-known cryptographic primitive, the random access code (RAC). We consider imperfect detectors and establish the critical values of the security parameters (the observed success probability of the RAC and the detection efficiency) required for guaranteeing security against eavesdroppers with and without quantum memory. Furthermore, we suggest a minimal characterization of the preparation device in order to lower the requirements for establishing a secure key.

  11. Method of boronizing transition metal surfaces

    DOEpatents

    Koyama, Koichiro; Shimotake, Hiroshi.

    1983-08-16

    A method is presented for preparing a boride layer on a transition metal substrate for use in corrosive environments or as a harden surface in machine applications. This method is particularly useful in treating current collectors for use within a high temperature and corrosive electrochemical cell environment. A melt of a alkali metal boride tetrafluoride salt including such as KF to lower its melting point is prepared including a dissolved boron containing material, for instance NiB, MnB[sub 2], or CrB[sub 2]. A transition metal to be coated is immersed in the melt at a temperature of no more than 700 C and a surface boride layer of that transition metal is formed within a period of about 24 hours on the substrate surface. 4 figs.

  12. Metaporous layer to overcome the thickness constraint for broadband sound absorption

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yang, Jieun; Lee, Joong Seok; Kim, Yoon Young, E-mail: yykim@snu.ac.kr

    The sound absorption of a porous layer is affected by its thickness, especially in a low-frequency range. If a hard-backed porous layer contains periodical arrangements of rigid partitions that are coordinated parallel and perpendicular to the direction of incoming sound waves, the lower bound of the effective sound absorption can be lowered much more and the overall absorption performance enhanced. The consequence of rigid partitioning in a porous layer is to make the first thickness resonance mode in the layer appear at much lower frequencies compared to that in the original homogeneous porous layer with the same thickness. Moreover, appropriatemore » partitioning yields multiple thickness resonances with higher absorption peaks through impedance matching. The physics of the partitioned porous layer, or the metaporous layer, is theoretically investigated in this study.« less

  13. Structural and electronic investigations of PbTa4O11 and BiTa7O19 constructed from α-U3O8 types of layers

    NASA Astrophysics Data System (ADS)

    Boltersdorf, Jonathan; Maggard, Paul A.

    2015-09-01

    The PbTa4O11 and BiTa7O19 phases were prepared by ion-exchange and solid-state methods, respectively, and their structures were characterized by neutron time-of-flight diffraction and Rietveld refinement methods (PbTa4O11, R 3 (No. 146), a=6.23700(2) Å, c=36.8613(1) Å; BiTa7O19, P 6 bar c 2 (No. 188), a=6.2197(2) Å, c=20.02981(9) Å). Their structures are comprised of layers of TaO6 octahedra surrounded by three 7-coordinate Pb(II) cations or two 8-coordinate Bi(III) cations. These layers alternate down the c-axis with α-U3O8 types of single and double TaO7 pentagonal bipyramid layers. In contrast to earlier studies, both phases are found to crystallize in noncentrosymmetric structures. Symmetry-lowering structural distortions within PbTa4O11, i.e. R 3 bar c →R3, are found to be a result of the displacement of the Ta atoms within the TaO7 and TaO6 polyhedra, towards the apical and facial oxygen atoms, respectively. In BiTa7O19, relatively lower reaction temperatures leads to an ordering of the Bi/Ta cations within a lower-symmetry structure, i.e., P63/mcm→ P 6 bar c 2 . In the absence of Bi/Ta site disorder, the Ta-O-Ta bond angles decrease and the Ta-O bond distances increase within the TaO7 double layers. Scanning electron microscopy images reveal two particle morphologies for PbTa4O11, hexagonal rods and finer irregularly-shaped particles, while BiTa7O19 forms as aggregates of irregularly-shaped particles. Electronic-structure calculations confirm the highest-energy valence band states are comprised of O 2p-orbitals and the respective Pb 6s-orbital and Bi 6s-orbital contributions. The lowest-energy conduction band states are composed of Ta 5d-orbital contributions that are delocalized over the TaO6 octahedra and layers of TaO7 pentagonal bipyramids. The symmetry-lowering distortions in the PbTa4O11 structure, and the resulting effects on its electronic structure, lead to its relatively higher photocatalytic activity compared to similar structures without these distortions.

  14. Correlation between gross anatomical topography, sectional sheet plastination, microscopic anatomy and endoanal sonography of the anal sphincter complex in human males

    PubMed Central

    Al-Ali, S; Blyth, P; Beatty, S; Duang, A; Parry, B; Bissett, I P

    2009-01-01

    This study elucidates the structure of the anal sphincter complex (ASC) and correlates the individual layers, namely the external anal sphincter (EAS), conjoint longitudinal muscle (CLM) and internal anal sphincter (IAS), with their ultrasonographic images. Eighteen male cadavers, with an average age of 72 years (range 62–82 years), were used in this study. Multiple methods were used including gross dissection, coronal and axial sheet plastination, different histological staining techniques and endoanal sonography. The EAS was a continuous layer but with different relations, an upper part (corresponding to the deep and superficial parts in the traditional description) and a lower (subcutaneous) part that was located distal to the IAS, and was the only muscle encircling the anal orifice below the IAS. The CLM was a fibro-fatty-muscular layer occupying the intersphincteric space and was continuous superiorly with the longitudinal muscle layer of the rectum. In its middle and lower parts it consisted of collagen and elastic fibres with fatty tissue filling the spaces between the fibrous septa. The IAS was a markedly thickened extension of the terminal circular smooth muscle layer of the rectum and it terminated proximal to the lower part of the EAS. On endoanal sonography, the EAS appeared as an irregular hyperechoic band; CLM was poorly represented by a thin irregular hyperechoic line and IAS was represented by a hypoechoic band. Data on the measurements of the thickness of the ASC layers are presented and vary between dissection and sonographic imaging. The layers of the ASC were precisely identified in situ, in sections, in isolated dissected specimens and the same structures were correlated with their sonographic appearance. The results of the measurements of ASC components in this study on male cadavers were variable, suggesting that these should be used with caution in diagnostic and management settings. PMID:19486204

  15. Citizen's dosimeter

    DOEpatents

    Klemic, Gladys [Naperville, IL; Bailey, Paul [Chicago, IL; Breheny, Cecilia [Yonkers, NY

    2008-09-02

    The present invention relates to a citizen's dosimeter. More specifically, the invention relates to a small, portable, personal dosimetry device designed to be used in the wake of a event involving a Radiological Dispersal Device (RDD), Improvised Nuclear Device (IND), or other event resulting in the contamination of large area with radioactive material or where on site personal dosimetry is required. The card sized dosimeter generally comprises: a lower card layer, the lower card body having an inner and outer side; a upper card layer, the layer card having an inner and outer side; an optically stimulated luminescent material (OSLM), wherein the OSLM is sandwiched between the inner side of the lower card layer and the inner side of the upper card layer during dosimeter radiation recording, a shutter means for exposing at least one side of the OSLM for dosimeter readout; and an energy compensation filter attached to the outer sides of the lower and upper card layers.

  16. Transmission properties of dielectric-coated hollow optical fibers based on stainless tube

    NASA Astrophysics Data System (ADS)

    Iwai, Katsumasa; Takaku, Hiroyuki; Miyagi, Mitsunobu; Shi, Yi-Wei; Zhu, Xiao-Song; Matsuura, Yuji

    2018-02-01

    Stainless pipe is used as the supporting tube for the infrared hollow fiber to obtain high durability and strong mechanical strength. In order to reduce roughness of inner surface of stainless tubes which causes the additional transmission loss, an acrylic-silicon resin material is used as a buffer layer to the inner wall of stainless tube for a low-loss characteristic. For the dielectric inner-coating layer, cyclic olefin polymer (COP) is used to lower the transmission loss. The COP layer is formed by using liquid-phase coating method. The hollow fiber with optimized COP inner film thickness for CO2 laser light were fabricated and reasonable transmission loss was demonstrated.

  17. A new solution chemical method to make low dimensional thermoelectric materials

    NASA Astrophysics Data System (ADS)

    Ding, Zhongfen

    2001-11-01

    Bismuth telluride and its alloys are currently the best thermoelectric materials known at room temperature and are therefore used for portable solid-state refrigeration. If the thermal electric figure of merit ZT could be improved by a factor of about 3, quiet and rugged solid-state devices could eventually replace conventional compressor based cooling systems. In order to test a theory that improved one-dimensional or two-dimensional materials could enhance ZT due to lower thermal conductivity, we are developing solution processing methods to make low dimensional materials. Bismuth telluride and its p-type and n-type alloys have layered structures consisting of 5 atom thick Te-Bi-Te-Bi-Te sheets, each sheet about 10 A thick. Lithium ions are intercalated into the layered materials using liquid ammonia. The lithium-intercalated materials are then exfoliated in water to form colloidal suspensions with narrow particle size distributions and are stable for more than 24 hours. The layers are then deposited on substrates, which after annealing at low temperatures, form highly c-axis oriented thin films. The exfoliated layers can potentially be restacked with other ions or layered materials in between the sheets to form novel structures. The restacked layers when treated with nitric acid and sonication form high yield nanorod structured materials. This new intercalation and exfoliation followed by sonication method could potentially be used for many other layered materials to make nanorod structured materials. The low dimensional materials are characterized by powder X-ray diffraction, atomic force microscopy (AFM), transmission electron microscopy (TEM), scanning electron microscopy (SEM), inductively coupled plasma (ICP) and dynamic light scattering.

  18. ATIP Report: Cyber Security Research in China

    DTIC Science & Technology

    2015-06-05

    vulnerabilities. ATIP Document ID: 150605AR CYBER SECURITY RESEARCH IN CHINA 17 Le GUAN et al. at SKLOIS of IIE, CAS proposed a solution named “ Mimosa ...that protects RSA private keys against the above software-based and physical memory attacks. When the Mimosa service is in idle, private keys are...encrypted and reside in memory as ciphertext. During the cryptographic computing, Mimosa uses hardware transactional memory (HTM) to ensure that (a

  19. CrossTalk: The Journal of Defense Software Engineering. Volume 19, Number 7

    DTIC Science & Technology

    2006-07-01

    public key certificates and cryptographic keys for crypto - graphic devices. In an environment where enterprise protection relies on an array of IA-enabled...allowing for greater accuracy, currency , and relevance of the information con- tained in the satellite communications data- base will be evaluated...JWPO). The purpose of the JWPO is to define, develop, validate, and evolve the JTRS SCA; acquire wave- form software applications; acquire Crypto

  20. Election Verifiability: Cryptographic Definitions and an Analysis of Helios and JCJ

    DTIC Science & Technology

    2015-04-01

    anonymous credentials. In CSF’14: 27th Computer Security Foundations Symposium. IEEE Computer Society, 2014. To appear. [22] David Chaum . Untraceable...electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84–88, 1981. [23] David Chaum . Secret-ballot receipts...True voter-verifiable elections. IEEE Security and Privacy, 2(1):38–47, 2004. [24] David Chaum , Richard Carback, Jeremy Clark, Aleksander Essex, Stefan

  1. Sebastien Philippe Discusses the Zero-Knowledge Protocol

    ScienceCinema

    Philippe, Sebastien

    2018-06-12

    A system that can compare physical objects while potentially protecting sensitive information about the objects themselves has been demonstrated experimentally at the U.S. Department of Energy’s (DOE) Princeton Plasma Physics Laboratory (PPPL). This work, by researchers at Princeton University and PPPL, marks an initial confirmation of the application of a powerful cryptographic technique in the physical world. Graduate student Sébastien Philippe discusses the experiment.

  2. Defining ’Anonymity’ in Networked Communication, Version 1

    DTIC Science & Technology

    2011-12-01

    conference that features many current works on anonymity [5]. 7. References [1] D . Chaum , “Security without Identification: Transaction Systems...to make Big Brother Obsolete,” Communications of the ACM 28:10 (1985), pp. 1030-1044. [2] D . Chaum , “The Dining Cryptographers Problem: Unconditional...Sender and Recipient Untraceability,” Journal of Cryptology 1:1 (1988), pp. 65-75. [3] D . Chaum , “Untraceable Electronic Mail, Return Addresses

  3. Efficient authentication scheme based on near-ring root extraction problem

    NASA Astrophysics Data System (ADS)

    Muthukumaran, V.; Ezhilmaran, D.

    2017-11-01

    An authentication protocolis the type of computer communication protocol or cryptography protocol specifically designed for transfer of authentication data between two entities. We have planned a two new entity authentication scheme on the basis of root extraction problem near-ring in this article. We suggest that this problem is suitably difficult to serve as a cryptographic assumption over the platform of near-ring N. The security issues also discussed.

  4. Federal Plan for Cyber Security and Information Assurance Research and Development

    DTIC Science & Technology

    2006-04-01

    Security Systems 103 varieties of the BB84 scheme have been developed, and other forms of quantum key distribution have been proposed. Rapid progress has led... key . Capability Gaps Existing quantum cryptographic protocols may also have weaknesses. Although BB84 is generally regarded as secure , researchers...complement agency-specific prioritization and R&D planning efforts in cyber security and information assurance. The Plan also describes the key Federal

  5. Finding Effective Responses Against Cyber Attacks for Divided Nations

    DTIC Science & Technology

    2015-12-01

    Coordination Center LTE Long Term Evolution MAC Media Access Control MCRC Master Control and Reporting Center MEI Ministry of Electronics...satellites that aid Internet connections. Individual users can access the Internet via not only a wired connection up to 1 Gbps, but also by 4G LTE ...operate air-gapped intranets with security measures such as cryptographic modules that correspond to security levels. The MND does maintain the public

  6. Computing border bases using mutant strategies

    NASA Astrophysics Data System (ADS)

    Ullah, E.; Abbas Khan, S.

    2014-01-01

    Border bases, a generalization of Gröbner bases, have actively been addressed during recent years due to their applicability to industrial problems. In cryptography and coding theory a useful application of border based is to solve zero-dimensional systems of polynomial equations over finite fields, which motivates us for developing optimizations of the algorithms that compute border bases. In 2006, Kehrein and Kreuzer formulated the Border Basis Algorithm (BBA), an algorithm which allows the computation of border bases that relate to a degree compatible term ordering. In 2007, J. Ding et al. introduced mutant strategies bases on finding special lower degree polynomials in the ideal. The mutant strategies aim to distinguish special lower degree polynomials (mutants) from the other polynomials and give them priority in the process of generating new polynomials in the ideal. In this paper we develop hybrid algorithms that use the ideas of J. Ding et al. involving the concept of mutants to optimize the Border Basis Algorithm for solving systems of polynomial equations over finite fields. In particular, we recall a version of the Border Basis Algorithm which is actually called the Improved Border Basis Algorithm and propose two hybrid algorithms, called MBBA and IMBBA. The new mutants variants provide us space efficiency as well as time efficiency. The efficiency of these newly developed hybrid algorithms is discussed using standard cryptographic examples.

  7. Shall we trust WDDL?

    NASA Astrophysics Data System (ADS)

    Guilley, Sylvain; Chaudhuri, Sumanta; Sauvage, Laurent; Graba, Tarik; Danger, Jean-Luc; Hoogvorst, Philippe; Vong, Vinh-Nga; Nassar, Maxime; Flament, Florent

    Security is not only a matter of cryptographic algorithms robustness but becomes also a question of securing their implementation. P. Kocher’s differential power analysis (DPA) is one of the many side-channel attacks that are more and more studied by the security community. Indeed, side-channel attacks (SCA) have proved to be very powerful on cryptographic algorithms such as DES and AES, customarily implemented in a wide variety of devices, ranging from smart-cards or ASICs to FPGAs. Among the proposed countermeasures, the “dual-rail with precharge logic” (DPL) aims at hiding information leaked by the circuit by making the power consumption independent of the calculation. However DPL logic could be subject to second order attacks exploiting timing difference between dual nets. In this article, we characterize by simulation, the vulnerability due to timing unbalance in the eight DES substitution boxes implemented in DPL WDDL style. The characterization results in a classification of the nodes according to their timing unbalance. Our results show that the timing unbalance is a major weakness of the WDDL logic, and that it could be used to retrieve the key using a DPA attack. This vulnerability has been experimentally observed on a full DES implementation using WDDL style for Altera Stratix EP1S25 FPGA.

  8. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kumar, Dinesh; Thapliyal, Himanshu; Mohammad, Azhar

    Differential Power Analysis (DPA) attack is considered to be a main threat while designing cryptographic processors. In cryptographic algorithms like DES and AES, S-Box is used to indeterminate the relationship between the keys and the cipher texts. However, S-box is prone to DPA attack due to its high power consumption. In this paper, we are implementing an energy-efficient 8-bit S-Box circuit using our proposed Symmetric Pass Gate Adiabatic Logic (SPGAL). SPGAL is energy-efficient as compared to the existing DPAresistant adiabatic and non-adiabatic logic families. SPGAL is energy-efficient due to reduction of non-adiabatic loss during the evaluate phase of the outputs.more » Further, the S-Box circuit implemented using SPGAL is resistant to DPA attacks. The results are verified through SPICE simulations in 180nm technology. SPICE simulations show that the SPGAL based S-Box circuit saves upto 92% and 67% of energy as compared to the conventional CMOS and Secured Quasi-Adiabatic Logic (SQAL) based S-Box circuit. From the simulation results, it is evident that the SPGAL based circuits are energy-efficient as compared to the existing DPAresistant adiabatic and non-adiabatic logic families. In nutshell, SPGAL based gates can be used to build secure hardware for lowpower portable electronic devices and Internet-of-Things (IoT) based electronic devices.« less

  9. Mixing Acid Salts and Layered Double Hydroxides in Nanoscale under Solid Condition

    PubMed Central

    Nakayama, Hirokazu; Hayashi, Aki

    2014-01-01

    The immobilization of potassium sorbate, potassium aspartate and sorbic acid in layered double hydroxide under solid condition was examined. By simply mixing two solids, immobilization of sorbate and aspartate in the interlayer space of nitrate-type layered double hydroxide, so called intercalation reaction, was achieved, and the uptakes, that is, the amount of immobilized salts and the interlayer distances of intercalation compounds were almost the same as those obtained in aqueous solution. However, no intercalation was achieved for sorbic acid. Although intercalation of sorbate and aspartate into chloride-type layered double hydroxide was possible, the uptakes for these intercalation compounds were lower than those obtained using nitrate-type layered double hydroxide. The intercalation under solid condition could be achieved to the same extent as for ion-exchange reaction in aqueous solution, and the reactivity was similar to that observed in aqueous solution. This method will enable the encapsulation of acidic drug in layered double hydroxide as nano level simply by mixing both solids. PMID:25080007

  10. Mixing Acid Salts and Layered Double Hydroxides in Nanoscale under Solid Condition.

    PubMed

    Nakayama, Hirokazu; Hayashi, Aki

    2014-07-30

    The immobilization of potassium sorbate, potassium aspartate and sorbic acid in layered double hydroxide under solid condition was examined. By simply mixing two solids, immobilization of sorbate and aspartate in the interlayer space of nitrate-type layered double hydroxide, so called intercalation reaction, was achieved, and the uptakes, that is, the amount of immobilized salts and the interlayer distances of intercalation compounds were almost the same as those obtained in aqueous solution. However, no intercalation was achieved for sorbic acid. Although intercalation of sorbate and aspartate into chloride-type layered double hydroxide was possible, the uptakes for these intercalation compounds were lower than those obtained using nitrate-type layered double hydroxide. The intercalation under solid condition could be achieved to the same extent as for ion-exchange reaction in aqueous solution, and the reactivity was similar to that observed in aqueous solution. This method will enable the encapsulation of acidic drug in layered double hydroxide as nano level simply by mixing both solids.

  11. A novel method of measuring leaf epidermis and mesophyll stiffness shows the ubiquitous nature of the sandwich structure of leaf laminas in broad-leaved angiosperm species

    PubMed Central

    Onoda, Yusuke; Schieving, Feike; Anten, Niels P. R.

    2015-01-01

    Plant leaves commonly exhibit a thin, flat structure that facilitates a high light interception per unit mass, but may increase risks of mechanical failure when subjected to gravity, wind and herbivory as well as other stresses. Leaf laminas are composed of thin epidermis layers and thicker intervening mesophyll layers, which resemble a composite material, i.e. sandwich structure, used in engineering constructions (e.g. airplane wings) where high bending stiffness with minimum weight is important. Yet, to what extent leaf laminas are mechanically designed and behave as a sandwich structure remains unclear. To resolve this issue, we developed and applied a novel method to estimate stiffness of epidermis- and mesophyll layers without separating the layers. Across a phylogenetically diverse range of 36 angiosperm species, the estimated Young’s moduli (a measure of stiffness) of mesophyll layers were much lower than those of the epidermis layers, indicating that leaf laminas behaved similarly to efficient sandwich structures. The stiffness of epidermis layers was higher in evergreen species than in deciduous species, and strongly associated with cuticle thickness. The ubiquitous nature of sandwich structures in leaves across studied species suggests that the sandwich structure has evolutionary advantages as it enables leaves to be simultaneously thin and flat, efficiently capturing light and maintaining mechanical stability under various stresses. PMID:25675956

  12. Methods for forming thin-film heterojunction solar cells from I-III-VI.sub. 2

    DOEpatents

    Mickelsen, Reid A.; Chen, Wen S.

    1982-01-01

    An improved thin-film, large area solar cell, and methods for forming the same, having a relatively high light-to-electrical energy conversion efficiency and characterized in that the cell comprises a p-n type heterojunction formed of: (i) a first semiconductor layer comprising a photovoltaic active material selected from the class of I-III-VI.sub.2 chalcopyrite ternary materials which is vacuum deposited in a thin "composition-graded" layer ranging from on the order of about 2.5 microns to about 5.0 microns (.congruent.2.5.mu.m to .congruent.5.0.mu.m) and wherein the lower region of the photovoltaic active material preferably comprises a low resistivity region of p-type semiconductor material having a superimposed region of relatively high resistivity, transient n-type semiconductor material defining a transient p-n homojunction; and (ii), a second semiconductor layer comprising a low resistivity n-type semiconductor material; wherein interdiffusion (a) between the elemental constituents of the two discrete juxtaposed regions of the first semiconductor layer defining a transient p-n homojunction layer, and (b) between the transient n-type material in the first semiconductor layer and the second n-type semiconductor layer, causes the transient n-type material in The Government has rights in this invention pursuant to Contract No. EG-77-C-01-4042, Subcontract No. XJ-9-8021-1 awarded by the U.S. Department of Energy.

  13. Methods for forming thin-film heterojunction solar cells from I-III-VI.sub. 2

    DOEpatents

    Mickelsen, Reid A [Bellevue, WA; Chen, Wen S [Seattle, WA

    1985-08-13

    An improved thin-film, large area solar cell, and methods for forming the same, having a relatively high light-to-electrical energy conversion efficiency and characterized in that the cell comprises a p-n type heterojunction formed of: (i) a first semiconductor layer comprising a photovoltaic active material selected from the class of I-III-VI.sub.2 chalcopyrite ternary materials which is vacuum deposited in a thin "composition-graded" layer ranging from on the order ot about 2.5 microns to about 5.0 microns (.congruent.2.5 .mu.m to .congruent.5.0 .mu.m) and wherein the lower region of the photovoltaic active material preferably comprises a low resistivity region of p-type semiconductor material having a superimposed region of relatively high resistivity, transient n-type semiconductor material defining a transient p-n homojunction; and (ii), a second semiconductor layer comprising a low resistivity n-type semiconductor material; wherein interdiffusion (a) between the elemental constituents of the two discrete juxtaposed regions of the first semiconductor layer defining a transient p-n homojunction layer, and (b) between the transient n-type material in the first semiconductor layer and the second n-type semiconductor layer, causes the The Government has rights in this invention pursuant to Contract No. EG-77-C-01-4042, Subcontract No. XJ-9-8021-1 awarded by the U.S. Department of Energy.

  14. Adaptive real time selection for quantum key distribution in lossy and turbulent free-space channels

    NASA Astrophysics Data System (ADS)

    Vallone, Giuseppe; Marangon, Davide G.; Canale, Matteo; Savorgnan, Ilaria; Bacco, Davide; Barbieri, Mauro; Calimani, Simon; Barbieri, Cesare; Laurenti, Nicola; Villoresi, Paolo

    2015-04-01

    The unconditional security in the creation of cryptographic keys obtained by quantum key distribution (QKD) protocols will induce a quantum leap in free-space communication privacy in the same way that we are beginning to realize secure optical fiber connections. However, free-space channels, in particular those with long links and the presence of atmospheric turbulence, are affected by losses, fluctuating transmissivity, and background light that impair the conditions for secure QKD. Here we introduce a method to contrast the atmospheric turbulence in QKD experiments. Our adaptive real time selection (ARTS) technique at the receiver is based on the selection of the intervals with higher channel transmissivity. We demonstrate, using data from the Canary Island 143-km free-space link, that conditions with unacceptable average quantum bit error rate which would prevent the generation of a secure key can be used once parsed according to the instantaneous scintillation using the ARTS technique.

  15. Codeless GPS Applications to Multi-Path: CGAMP

    NASA Technical Reports Server (NTRS)

    Macdoran, P. F.; Miller, R. B.; Jenkins, D.; Lemmon, J.; Gold, K.; Schreiner, W.; Snyder, G.

    1990-01-01

    Cordless Global Positioning System (GPS) Applications to Multi-Path (CGAMP) is meeting the challenge of exploiting the L-band signals from the Global Positioning System (GPS) satellites for the measurement of the impulse response of radio transmission channels over space-Earth paths. This approach was originally suggested by E. K. Smith and has been pursued by J. Lemmon, without an affordable implementation being identifiable. In addition to the high cost of a suitable P code correlating GPS receiver, there is also the major impediment of the often announced Department of Defense policy of selective availability/anti-spoof (SA/AS) that clouds reliable access to the wideband (20 MHz) P channel of the GPS signals without cryptographic access. A technique proposed by MacDoran utilizes codeless methods for exploiting the P channel signals implemented by the use of a pair of antennas and cross correlation signal detection.

  16. Expecting the Unexpected: Towards Robust Credential Infrastructure

    NASA Astrophysics Data System (ADS)

    Xu, Shouhuai; Yung, Moti

    Cryptographic credential infrastructures, such as Public key infrastructure (PKI), allow the building of trust relationships in electronic society and electronic commerce. At the center of credential infrastructures is the methodology of digital signatures. However, methods that assure that credentials and signed messages possess trustworthiness and longevity are not well understood, nor are they adequately addressed in both literature and practice. We believe that, as a basic engineering principle, these properties have to be built into the credential infrastructure rather than be treated as an after-thought since they are crucial to the long term success of this notion. In this paper we present a step in the direction of dealing with these issues. Specifically, we present the basic engineering reasoning as well as a model that helps understand (somewhat formally) the trustworthiness and longevity of digital signatures, and then we give basic mechanisms that help improve these notions.

  17. Improving data transparency in clinical trials using blockchain smart contracts.

    PubMed

    Nugent, Timothy; Upton, David; Cimpoesu, Mihai

    2016-01-01

    The scientific credibility of findings from clinical trials can be undermined by a range of problems including missing data, endpoint switching, data dredging, and selective publication. Together, these issues have contributed to systematically distorted perceptions regarding the benefits and risks of treatments. While these issues have been well documented and widely discussed within the profession, legislative intervention has seen limited success. Recently, a method was described for using a blockchain to prove the existence of documents describing pre-specified endpoints in clinical trials. Here, we extend the idea by using smart contracts - code, and data, that resides at a specific address in a blockchain, and whose execution is cryptographically validated by the network - to demonstrate how trust in clinical trials can be enforced and data manipulation eliminated. We show that blockchain smart contracts provide a novel technological solution to the data manipulation problem, by acting as trusted administrators and providing an immutable record of trial history.

  18. PRESAGE: PRivacy-preserving gEnetic testing via SoftwAre Guard Extension.

    PubMed

    Chen, Feng; Wang, Chenghong; Dai, Wenrui; Jiang, Xiaoqian; Mohammed, Noman; Al Aziz, Md Momin; Sadat, Md Nazmus; Sahinalp, Cenk; Lauter, Kristin; Wang, Shuang

    2017-07-26

    Advances in DNA sequencing technologies have prompted a wide range of genomic applications to improve healthcare and facilitate biomedical research. However, privacy and security concerns have emerged as a challenge for utilizing cloud computing to handle sensitive genomic data. We present one of the first implementations of Software Guard Extension (SGX) based securely outsourced genetic testing framework, which leverages multiple cryptographic protocols and minimal perfect hash scheme to enable efficient and secure data storage and computation outsourcing. We compared the performance of the proposed PRESAGE framework with the state-of-the-art homomorphic encryption scheme, as well as the plaintext implementation. The experimental results demonstrated significant performance over the homomorphic encryption methods and a small computational overhead in comparison to plaintext implementation. The proposed PRESAGE provides an alternative solution for secure and efficient genomic data outsourcing in an untrusted cloud by using a hybrid framework that combines secure hardware and multiple crypto protocols.

  19. Proposal for founding mistrustful quantum cryptography on coin tossing

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kent, Adrian; Hewlett-Packard Laboratories, Filton Road, Stoke Gifford, Bristol BS34 8QZ,

    2003-07-01

    A significant branch of classical cryptography deals with the problems which arise when mistrustful parties need to generate, process, or exchange information. As Kilian showed a while ago, mistrustful classical cryptography can be founded on a single protocol, oblivious transfer, from which general secure multiparty computations can be built. The scope of mistrustful quantum cryptography is limited by no-go theorems, which rule out, inter alia, unconditionally secure quantum protocols for oblivious transfer or general secure two-party computations. These theorems apply even to protocols which take relativistic signaling constraints into account. The best that can be hoped for, in general, aremore » quantum protocols which are computationally secure against quantum attack. Here a method is described for building a classically certified bit commitment, and hence every other mistrustful cryptographic task, from a secure coin-tossing protocol. No security proof is attempted, but reasons are sketched why these protocols might resist quantum computational attack.« less

  20. Object-Oriented Design for Sparse Direct Solvers

    NASA Technical Reports Server (NTRS)

    Dobrian, Florin; Kumfert, Gary; Pothen, Alex

    1999-01-01

    We discuss the object-oriented design of a software package for solving sparse, symmetric systems of equations (positive definite and indefinite) by direct methods. At the highest layers, we decouple data structure classes from algorithmic classes for flexibility. We describe the important structural and algorithmic classes in our design, and discuss the trade-offs we made for high performance. The kernels at the lower layers were optimized by hand. Our results show no performance loss from our object-oriented design, while providing flexibility, case of use, and extensibility over solvers using procedural design.

  1. An ellipsometric approach towards the description of inhomogeneous polymer-based Langmuir layers

    PubMed Central

    Rottke, Falko O; Schulz, Burkhard; Richau, Klaus; Kratz, Karl

    2016-01-01

    Summary The applicability of nulling-based ellipsometric mapping as a complementary method next to Brewster angle microscopy (BAM) and imaging ellipsometry (IE) is presented for the characterization of ultrathin films at the air–water interface. First, the methodology is demonstrated for a vertically nonmoving Langmuir layer of star-shaped, 4-arm poly(ω-pentadecalactone) (PPDL-D4). Using nulling-based ellipsometric mapping, PPDL-D4-based inhomogeneously structured morphologies with a vertical dimension in the lower nm range could be mapped. In addition to the identification of these structures, the differentiation between a monolayer and bare water was possible. Second, the potential and limitations of this method were verified by applying it to more versatile Langmuir layers of telechelic poly[(rac-lactide)-co-glycolide]-diol (PLGA). All ellipsometric maps were converted into thickness maps by introduction of the refractive index that was derived from independent ellipsometric experiments, and the result was additionally evaluated in terms of the root mean square roughness, R q. Thereby, a three-dimensional view into the layers was enabled and morphological inhomogeneity could be quantified. PMID:27826490

  2. Deep Retinal Layer Microvasculature Dropout detected by the Optical Coherence Tomography Angiography in Glaucoma

    PubMed Central

    Suh, Min Hee; Zangwill, Linda M.; Manalastas, Patricia Isabel C.; Belghith, Akram; Yarmohammadi, Adeleh; Medeiros, Felipe A.; Diniz-Filho, Alberto; Saunders, Luke J.; Weinreb, Robert N.

    2016-01-01

    Purpose To investigate factors associated with dropout of the deep retinal layer microvasculature within the β-zone parapapillary atrophy (βPPA) assessed by optical coherence tomography angiography (OCT-A) in glaucomatous eyes. Design Cross-sectional study. Participants Seventy-one eyes from 71 primary open angle glaucoma (POAG) patients with βPPA enrolled in the Diagnostic Innovations in Glaucoma Study. Methods βPPA deep layer microvasculature dropout was defined as a complete loss of the microvasculature located within deep retinal layer of the βPPA from OCT-A-derived optic nerve head vessel density maps by standardized qualitative assessment. Circumpapillary vessel density (cpVD) within the retinal nerve fiber layer (RNFL) was also calculated using OCT-A. Choroidal thickness and presence of the focal lamina cribrosa (LC) defect were determined using swept-source OCT. Main Outcome Measures Presence of the βPPA deep layer microvasculature dropout. Parameters including age, systolic and diastolic blood pressure, axial length, intraocular pressure, disc hemorrhage, cpVD, visual field (VF) mean deviation (MD), focal LC defect, βPPA area, and choroidal thickness were analyzed. Results βPPA deep layer microvasculature dropout was detected in 37 eyes (52.1%) of eyes with POAG. Eyes with dropouts had a higher prevalence of LC defect (70.3 vs. 32.4%), lower cpVD (52.7 vs. 58.8%), worse VF MD (-9.06 vs. -3.83dB), thinner total choroidal thickness (126.5 vs. 169.1/μm), longer axial length (24.7 vs. 24.0mm), larger βPPA (1.2 vs. 0.76mm2) and lower diastolic blood pressure (74.7 vs. 81.7mmHg) than those without dropouts (P< 0.05, respectively). In the multivariate logistic regression, higher prevalence of focal LC defect (odds ratio [OR], 6.27; P = 0.012), reduced cpVD (OR, 1.27; P = 0.002), worse VF MD (OR, 1.27; P = 0.001), thinner choroidal thickness (OR, 1.02; P = 0.014), and lower diastolic blood pressure (OR, 1.16; P = 0.003) were significantly associated with the dropout. Conclusions Certain systemic and ocular factors such as focal LC defect, more advanced disease status, reduced RNFL vessel density, thinner choroidal thickness, and lower diastolic blood pressure were factors associated with the βPPA deep layer microvasculature dropout in glaucomatous eyes. Longitudinal studies are required to elucidate the temporal relationship between βPPA deep layer dropout and these factors. PMID:27769587

  3. Design and Performance of Property Gradient Ternary Nitride Coating Based on Process Control.

    PubMed

    Yan, Pei; Chen, Kaijie; Wang, Yubin; Zhou, Han; Peng, Zeyu; Jiao, Li; Wang, Xibin

    2018-05-09

    Surface coating is an effective approach to improve cutting tool performance, and multiple or gradient coating structures have become a common development strategy. However, composition mutations at the interfaces decrease the performance of multi-layered coatings. The key mitigation technique has been to reduce the interface effect at the boundaries. This study proposes a structure design method for property-component gradient coatings based on process control. The method produces coatings with high internal cohesion and high external hardness, which could reduce the composition and performance mutations at the interface. A ZrTiN property gradient ternary nitride coating was deposited on cemented carbide by multi-arc ion plating with separated Ti and Zr targets. The mechanical properties, friction behaviors, and cutting performances were systematically investigated, compared with a single-layer coating. The results indicated that the gradient coating had better friction and wear performance with lower wear rate and higher resistance to peeling off during sliding friction. The gradient coating had better wear and damage resistance in cutting processes, with lower machined surface roughness Ra. Gradient-structured coatings could effectively inhibit micro crack initiation and growth under alternating force and temperature load. This method could be extended to similar ternary nitride coatings.

  4. Layered Crustal Anisotropy in the NE Tibetan Plateau Inferred from Ambient Noise Tomography

    NASA Astrophysics Data System (ADS)

    Jiang, C.; Yang, Y.; Zheng, Y.

    2016-12-01

    The Tibetan Plateau is the highest and largest plateau in the world with an average elevation of 4-5 km and 60-70 km thick crust, about twice of the thickness of average continental crust. Two end-member models have bene invoked to explain the crustal thickening and the growth of the plateau: (1) continuous and uniform thickening of the whole crust and (2) mid/lower crustal channel flow. However, which mechanism dominates the crustal thickening and the growth of the plateau is still under hot debate. Seismic anisotropy can provide observational constraints on deformation mode, which would have distinguished pattern resulting from the two different thickening models. Thus, by studying seismic anisotropy, we can distinguish different models of crustal thickening and plateau growth. In this study, we employ an eikonal tomography method of ambient noise to investigate azimuthal anisotropy of Rayleigh waves in the NE Tibetan Plateau. Our tomography reveals significant anisotropy in the crust. In particular, stratification of crustal azimuthal anisotropy is observed: an upper crustal anisotropic layer characterized by a NE-SW fast direction and a mid/lower crustal anisotropic layer with a NNE-SSW fast direction. The dominantly NE-SW oriented anisotropy in the upper crust is likely caused by shape-preferred orientation (SPO) of faults and fractures in the shallow depths. The anisotropy in the mid/lower crust, however, is nearly orthogonal to that in the shallow crust, suggesting a different mechanism. The NNE-SSW fast direction coincides with the proposed flow direction by the crustal flow model in NE Tibetan Plateau, suggesting anisotropy in the mid/lower crust may be related to the crustal flow. The two-layered crustal stratigraphy observed in the NE Tibetan Plateau is contrary to the continuous thickening model, but favours the crustal flow model.

  5. Method of fabricating bifacial tandem solar cells

    DOEpatents

    Wojtczuk, Steven J; Chiu, Philip T; Zhang, Xuebing; Gagnon, Edward; Timmons, Michael

    2014-10-07

    A method of fabricating on a semiconductor substrate bifacial tandem solar cells with semiconductor subcells having a lower bandgap than the substrate bandgap on one side of the substrate and with subcells having a higher bandgap than the substrate on the other including, first, growing a lower bandgap subcell on one substrate side that uses only the same periodic table group V material in the dislocation-reducing grading layers and bottom subcells as is present in the substrate and after the initial growth is complete and then flipping the substrate and growing the higher bandgap subcells on the opposite substrate side which can be of different group V material.

  6. Development of the α-IGZO/Ag/α-IGZO Triple-Layer Structure Films for the Application of Transparent Electrode

    PubMed Central

    Chen, Kun-Neng; Yang, Cheng-Fu; Wu, Chia-Ching; Chen, Yu-Hsin

    2017-01-01

    We investigated the structural, optical, and electrical properties of amorphous IGZO/silver/amorphous IGZO (α-IGZO/Ag/α-IGZO) triple-layer structures that were deposited at room temperature on Eagle XG glass and flexible polyethylene terephthalate substrates through the sputtering method. Thin Ag layers with different thicknesses were inserted between two IGZO layers to form a triple-layer structure. Ag was used because of its lower absorption and resistivity. Field emission scanning electron microscopy measurements of the triple-layer structures revealed that the thicknesses of the Ag layers ranged from 13 to 41 nm. The thickness of the Ag layer had a large effect on the electrical and optical properties of the electrodes. The optimum thickness of the Ag metal thin film could be evaluated according to the optical transmittance, electrical conductivity, and figure of merit of the electrode. This study demonstrates that the α-IGZO/Ag/α-IGZO triple-layer transparent electrode can be fabricated with low sheet resistance (4.2 Ω/□) and high optical transmittance (88.1%) at room temperature without postannealing processing on the deposited thin films. PMID:28772586

  7. A novel (ex situ) method to quantify oxygen diffusion coefficient of polymer fuel cells backing and catalyst layers

    NASA Astrophysics Data System (ADS)

    Baricci, Andrea; Casalegno, Andrea

    2016-09-01

    Limiting current density of oxygen reduction reaction in polymer electrolyte fuel cells is determined by several mass transport resistances that lower the concentration of oxygen on the catalyst active site. Among them, diffusion across porous media plays a significant role. Despite the extensive experimental activity documented in PEMFC literature, only few efforts have been dedicated to the measurement of the effective transport properties in porous layers. In the present work, a methodology for ex situ measurement of the effective diffusion coefficient and Knudsen radius of porous layers for polymer electrolyte fuel cells (gas diffusion layer, micro porous layer and catalyst layer) is described and applied to high temperature polymer fuel cells State of Art materials. Regression of the measured quantities by means of a quasi 2D physical model is performed to quantify the Knudsen effect, which is reported to account, respectively, for 30% and 50% of the mass transport resistance in micro porous layer and catalyst layer. On the other side, the model reveals that pressure gradient consequent to permeation in porous layers of high temperature polymer fuel cells has a negligible effect on oxygen concentration in relevant operating conditions.

  8. Free-edge effects in laminates under extension, bending and twisting. II - Sublaminate/layer modeling and analysis

    NASA Technical Reports Server (NTRS)

    Yin, Wan-Lee

    1992-01-01

    The stress-function-based variational method of Yin (1991) is extended and modified into a combined layer/sublaminate approach applicable to a laminated strip composed of a large number of differently orientated, anisotropic elastic plies. Lekhnitskii's (1963) stress functions are introduced into two interior layers adjacent to a particular interface. The remaining layers are grouped into an upper sublaminate and a lower sublaminate. The stress functions are expanded in truncated power series of the thickness coordinate, and the differential equations governing the coefficient functions are derived by using the complementary virtual work principle. The layer/sublaminate approach limits the dimension of the eigenvalue problem to a fixed number irrespective of the number of layers in the sublaminate, so that reasonably accurate solutions of the interlaminar stresses can be computed with extreme ease. For symmetric, four-layer, angle-ply and cross-ply laminates, a comparison of the previous analysis results based on the pure layer model and new results based on two different layer/sublaminate models indicates reasonable over-all agreement in the interlaminar stresses and superior agreement in the total peeling and shearing force.

  9. Influence of Pentacene Interface Layer in ITO/α-NPD/Alq3/Al Organic Light Emitting Diodes by Time-Resolved Electric-Field-Induced Optical Second-Harmonic Generation Measurement.

    PubMed

    Oda, Yoshiaki; Sadakata, Atsuo; Taguchi, Dai; Manaka, Takaaki; Iwamoto, Mitsumasa

    2016-04-01

    By using I-V, EL-V, displacement current measurement (DCM) and time-resolved electric-field-induced optical second-harmonic generation (TR-EFISHG) measurement, we studied the influence of interface pentacene layer inserted between ITO and a-NPD layers in ITO/α-NPD/Alq3/Al OLEDs. All experiments were carried out for the OLEDs with and without a pentacene interface layer. The I-V and EL-V measurements showed the decrease of operating voltage of EL, the DCM showed the lowering of inception voltage of carrier injection by inserting a pentacene interface layer. The TR-EFISHG measurement showed the faster accumulation of holes at the interface between the a-NPD and Alq3 layers, which resulted in the relaxation of electric field of a-NPD layer accomplished by the increase of the conductivity and the increase of the electric field in the Alq3 layer. We conclude that TR-EFISHG measurement is helpful for understanding I-V and EL-V characteristics, and can be combined with other methods to give significant information which are impacted by the interface layer.

  10. Measured acoustic properties of variable and low density bulk absorbers

    NASA Technical Reports Server (NTRS)

    Dahl, M. D.; Rice, E. J.

    1985-01-01

    Experimental data were taken to determine the acoustic absorbing properties of uniform low density and layered variable density samples using a bulk absober with a perforated plate facing to hold the material in place. In the layered variable density case, the bulk absorber was packed such that the lowest density layer began at the surface of the sample and progressed to higher density layers deeper inside. The samples were placed in a rectangular duct and measurements were taken using the two microphone method. The data were used to calculate specific acoustic impedances and normal incidence absorption coefficients. Results showed that for uniform density samples the absorption coefficient at low frequencies decreased with increasing density and resonances occurred in the absorption coefficient curve at lower densities. These results were confirmed by a model for uniform density bulk absorbers. Results from layered variable density samples showed that low frequency absorption was the highest when the lowest density possible was packed in the first layer near the exposed surface. The layers of increasing density within the sample had the effect of damping the resonances.

  11. Study of iron deposit using seismic refraction and resistivity in Carajás Mineral Province, Brazil

    NASA Astrophysics Data System (ADS)

    Nogueira, Pedro Vencovsky; Rocha, Marcelo Peres; Borges, Welitom Rodrigues; Silva, Adalene Moreira; Assis, Luciano Mozer de

    2016-10-01

    This work comprises the acquisition, processing and interpretation of 2D seismic shallow refraction (P-wave) and resistivity profiles located in the iron ore deposit of N4WS, Carajás Mineral Province (CMP), northern Brazil. The geophysical methods were used to identify the boundaries of the iron ore deposit. Another objective was to evaluate the potentiality of these geophysical methods in that geological context. In order to validate the results, the geophysical lines were located to match a geological borehole line. For the seismic refraction, we used 120 channels, spaced by 10 m, in a line of 1190 m, with seven shot points. The resistivity method used in the acquisition was the electrical resistivity imaging, with pole-pole array, in order to reach greater depths. The resistivity line had a length of 1430 m, with 10 m spacing between electrodes. The seismic results produced a model with two distinct layers. Based on the velocities values, the first layer was interpreted as altered rocks, and the second layer as more preserved rocks. It was not possible to discriminate different lithologies with the seismic method inside each layer. From the resistivity results, a zone of higher resistivity (> 3937 Ω·m) was interpreted as iron ore, and a region of intermediate resistivity (from 816 to 2330 Ω·m) as altered rocks. These two regions represent the first seismic layer. On the second seismic layer, an area with intermediated resistivity values (from 483 to 2330 Ω·m) was interpreted as mafic rocks, and the area with lower resistivity (< 483 Ω·m) as jaspilite. Our results were compared with geological boreholes and show reasonable correlation, suggesting that the geophysical anomalies correspond to the main variations in composition and physical properties of rocks.

  12. Vegetative propagation of Cecropia obtusifolia (Cecropiaceae).

    PubMed

    LaPierre, L M

    2001-01-01

    Cecropia is a relatively well-known and well-studied genus in the Neotropics. Methods for the successful propagation of C. obtusifolia Bertoloni, 1840 from cuttings and air layering are described, and the results of an experiment to test the effect of two auxins, naphthalene acetic acid (NAA) and indole butyric acid (IBA), on adventitious root production in cuttings are presented. In general, C. obtusifolia cuttings respond well to adventitious root production (58.3% of cuttings survived to root), but air layering was the better method (93% of cuttings survived to root). The concentration of auxins used resulted in an overall significantly lower quality of roots produced compared with cuttings without auxin treatment. Future experiments using Cecropia could benefit from the use of isogenic plants produced by vegetative propagation.

  13. Inference-Based Similarity Search in Randomized Montgomery Domains for Privacy-Preserving Biometric Identification.

    PubMed

    Wang, Yi; Wan, Jianwu; Guo, Jun; Cheung, Yiu-Ming; Yuen, Pong C; Yi Wang; Jianwu Wan; Jun Guo; Yiu-Ming Cheung; Yuen, Pong C; Cheung, Yiu-Ming; Guo, Jun; Yuen, Pong C; Wan, Jianwu; Wang, Yi

    2018-07-01

    Similarity search is essential to many important applications and often involves searching at scale on high-dimensional data based on their similarity to a query. In biometric applications, recent vulnerability studies have shown that adversarial machine learning can compromise biometric recognition systems by exploiting the biometric similarity information. Existing methods for biometric privacy protection are in general based on pairwise matching of secured biometric templates and have inherent limitations in search efficiency and scalability. In this paper, we propose an inference-based framework for privacy-preserving similarity search in Hamming space. Our approach builds on an obfuscated distance measure that can conceal Hamming distance in a dynamic interval. Such a mechanism enables us to systematically design statistically reliable methods for retrieving most likely candidates without knowing the exact distance values. We further propose to apply Montgomery multiplication for generating search indexes that can withstand adversarial similarity analysis, and show that information leakage in randomized Montgomery domains can be made negligibly small. Our experiments on public biometric datasets demonstrate that the inference-based approach can achieve a search accuracy close to the best performance possible with secure computation methods, but the associated cost is reduced by orders of magnitude compared to cryptographic primitives.

  14. Methods and compositions for removing carbon dioxide from a gaseous mixture

    DOEpatents

    Li, Jing; Wu, Haohan

    2014-06-24

    Provided is a method for adsorbing or separating carbon dioxide from a mixture of gases by passing the gas mixture through a porous three-dimensional polymeric coordination compound having a plurality of layers of two-dimensional arrays of repeating structural units, which results in a lower carbon dioxide content in the gas mixture. Thus, this invention provides useful compositions and methods for removal of greenhouse gases, in particular CO.sub.2, from industrial flue gases or from the atmosphere.

  15. Deriving depths of deep chlorophyll maximum and water inherent optical properties: A regional model

    NASA Astrophysics Data System (ADS)

    Xiu, Peng; Liu, Yuguang; Li, Gang; Xu, Qing; Zong, Haibo; Rong, Zengrui; Yin, Xiaobin; Chai, Fei

    2009-10-01

    The Bohai Sea is a semi-enclosed inland sea with case-2 waters near the coast. A comprehensive set of optical data was collected during three cruises in June, August, and September 2005 in the Bohai Sea. The vertical profile measurements, such as chlorophyll concentration, water turbidity, downwelling irradiance, and diffuse attenuation coefficient, showed that the Bohai Sea was vertically stratified with a relative clear upper layer superimposed on a turbid lower layer. The upper layer was found to correspond to the euphotic zone and the deep chlorophyll maximum (DCM) occurs at the base of this layer. By tuning a semi-analytical model (Lee et al., 1998, 1999) for the Bohai Sea, we developed a method to derive water inherent optical properties and the depth of DCM from above-surface measurements. Assuming a 'fake' bottom in the stratified water, this new method retrieves the 'fake' bottom depth, which is highly correlated with the DCM depth. The average relative error between derived and measured values is 33.9% for phytoplankton absorption at 440 nm, 25.6% for colored detrital matter (detritus plus gelbstoff) absorption at 440 nm, and 24.2% for the DCM depth. This modified method can retrieve water inherent optical properties and monitor the depth of DCM in the Bohai Sea, and the method is also applicable to other stratified waters.

  16. Seismic and Petrological Constraints on Deep Crustal Evolution in North America: Where and What are 7.x Layers?

    NASA Astrophysics Data System (ADS)

    Mahan, K. H.; Schulte-Pelkum, V.; Shen, W.; Ritzwoller, M. H.

    2012-12-01

    Continental crust worldwide has been found to have areas with a lowermost layer characterized by unusually high seismic P velocities of over 7 km/s, often called 7.x layers. Such layers are commonly ascribed to underplating - in some cases by underthrusting, but in most cases by magmatic processes. In North America, high-velocity lower crust underlies upper crust of Archean, Proterozoic, and younger ages. Its presence reflects the tectonic and magmatic processes associated with continental rifting, collision, subduction, and other evolutionary (e.g. thermal) trends, and its occurrence also provides clues on the nature of the underlying mantle. Detection of a lower crustal high-velocity layer stems mostly from seismic refraction and wide-angle reflection experiments, and information on its geographical extent is very spotty. Similarly sparse are age determinations and knowledge of the tectonic processes responsible for construction of these layers. Despite glimpses of 7.x layers on many profiles across the continental U.S. and Canada, there is no systematic geographical and age information on this fundamental process of crustal growth, and many of the existing observations contradict current hypotheses on underplating. We compare compositional and physical property data of lower crustal and uppermost mantle xenoliths from Montana, Wyoming, and other localities with maps of lower crustal and uppermost mantle seismic velocities obtained from joint inversions of receiver functions with surface waves, and to mapped distinct high-velocity lower crustal layers in receiver functions in areas covered by the EarthScope Transportable Array. Xenolith observations from Montana indicate that portions of metasomatized uppermost mantle exist in that area that may be difficult to distinguish from mafic lower crust based on seismic velocities alone, raising the interesting question of whether a 7.x layer may be below rather than above the seismic Moho in some cases. The persistence of high-velocity, presumably strong lower crust under the Laramide-affected Wyoming craton and the Colorado Plateau suggest that crustal strength may influence surface deformation. The Rocky Mountain Front and Rio Grande rift largely separate fast lower crust to the East from slower lower crust to the West, cutting across NE-SW trends inherited from continental assembly and suggesting that the velocity distribution may be dominated by thermal effects; however, recent volcanics do not correlate well geographically with lower crustal velocity.

  17. Sintered wire cesium dispenser photocathode

    DOEpatents

    Montgomery, Eric J; Ives, R. Lawrence; Falce, Louis R

    2014-03-04

    A photoelectric cathode has a work function lowering material such as cesium placed into an enclosure which couples a thermal energy from a heater to the work function lowering material. The enclosure directs the work function lowering material in vapor form through a low diffusion layer, through a free space layer, and through a uniform porosity layer, one side of which also forms a photoelectric cathode surface. The low diffusion layer may be formed from sintered powdered metal, such as tungsten, and the uniform porosity layer may be formed from wires which are sintered together to form pores between the wires which are continuous from the a back surface to a front surface which is also the photoelectric surface.

  18. Civitas: Toward a Secure Voting System

    DTIC Science & Technology

    2008-05-01

    voting, we believe that remote vot- ing is the right problem to solve. One of our goals was therefore to strike a reasonable compromise between enabling...versions of this work. References [1] Ben Adida . Advances in Cryptographic Voting Systems. PhD thesis, MIT, Aug. 2006. [2] Roberto Araújo, Sébastien...3] Association for Computing Machinery. SIG elections. http://www.acm.org/sigs/elections, 2007. [4] Jonathan Bannet, David W. Price , Algis Rudys

  19. Airborne Tactical Data Network Gateways: Evaluating EPLRS’ Ability to Integrate With Wireless Meshed Networks

    DTIC Science & Technology

    2005-09-01

    Computer Memory Card International Association PHY Physical PLI Position Location Information PLRS Position Location Reporting System PoP Point of...it is widely acknowledged that the JTRS program will not be providing any sustentative operational capability prior to FY’09. This reality has...Figure 5, and a man-packed antenna (AS- 3448/PSQ-4). Back-up (cryptographic key) memory is maintained by a traditional 9v 24

  20. SHAMROCK: A Synthesizable High Assurance Cryptography and Key Management Coprocessor

    DTIC Science & Technology

    2016-11-01

    and excluding devices from a communicating group as they become trusted, or untrusted. An example of using rekeying to dynamically adjust group...algorithms, such as the Elliptic Curve Digital Signature Algorithm (ECDSA), work by computing a cryptographic hash of a message using, for example , the...material is based upon work supported by the Assistant Secretary of Defense for Research and Engineering under Air Force Contract No. FA8721- 05-C

  1. Cryptographic Techniques for Privacy Preserving Identity

    DTIC Science & Technology

    2011-05-13

    information is often sufficient to match an individual to their pseudonym, for example, as in the case of the Netflix Prize movie rental dataset [71]. It was...shown that knowledge of only a couple approximate movie rental dates (as might be revealed by simply mentioning what one has watched recently) is...government censor may require Google or another popular blog host to reveal the login times of the top suspects, which could be correlated with the

  2. A Proof-Carrying File System

    DTIC Science & Technology

    2009-06-06

    written in Standard ML, and comprises nearly 7,000 lines of code. OpenSSL is used for all cryptographic operations. Because the front end tools are used...be managed. Macrobenchmarks. To understand the performance of PCFS in practice, we also ran two simple macrobenchmarks. The first (called OpenSSL in...the table below), untars the OpenSSL source code, compiles it and deletes it. The other (called Fuse in the table below), performs similar operations

  3. Field trial of the enhanced data authentication system (EDAS)

    DOE PAGES

    Thomas, Maikael A.; Hymel, Ross W.; Baldwin, George; ...

    2016-11-01

    The Enhanced Data Authentication System (EDAS) is means to securely branch information from an existing measurement system or data stream to a secondary observer. In an international nuclear safeguards context, the EDAS connects to operator instrumentation, and provides a cryptographically secure copy of the information for a safeguards inspectorate. However, this novel capability could be a valuable complement to inspector-owned safeguards instrumentation, offering context that is valuable for anomaly resolution and contingency.

  4. New Capabilities in Security and QoS Using the Updated MANET Routing Protocol OLSRv2

    DTIC Science & Technology

    2010-09-01

    integrity, by the authentication of packets or messages, and confidentiality. These are discussed in the following sections. Issues of availability...fully specified, in [2] is the addition of a TLV including a cryptographic signature that will allow the authentication of the received information...The objective is to ensure the integrity of the ad hoc network, that only authorised routers can join the network because unauthorised routers will

  5. Affine Equivalence and Constructions of Cryptographically Strong Boolean Functions

    DTIC Science & Technology

    2013-09-01

    manner is crucial for today’s global citizen. We want our financial transactions over the Internet to get processed without error. Cyber warfare between...encryption and decryption processes . An asymmetric cipher uses different keys to encrypt and decrypt a message, and the connection between the encryption and...Depending on how a symmetric cipher processes a message before encryption or de- cryption, a symmetric cipher can be further classified into a block or

  6. Secure Image Hash Comparison for Warhead Verification

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bruillard, Paul J.; Jarman, Kenneth D.; Robinson, Sean M.

    2014-06-06

    The effort to inspect and verify warheads in the context of possible future arms control treaties is rife with security and implementation issues. In this paper we review prior work on perceptual image hashing for template-based warhead verification. Furthermore, we formalize the notion of perceptual hashes and demonstrate that large classes of such functions are likely not cryptographically secure. We close with a brief discussion of fully homomorphic encryption as an alternative technique.

  7. Non-Black-Box Simulation from One-Way Functions and Applications to Resettable Security

    DTIC Science & Technology

    2012-11-05

    from 2001, Barak (FOCS’01) introduced a novel non-black-box simulation technique. This technique enabled the construc- tion of new cryptographic...primitives, such as resettably-sound zero-knowledge arguments, that cannot be proven secure using just black-box simulation techniques. The work of Barak ... Barak requires the existence of collision-resistant hash functions, and a very recent result by Bitansky and Paneth (FOCS’12) instead requires the

  8. A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors

    DTIC Science & Technology

    2012-01-01

    and mobile phones, lottery ticket vending machines , and various electronic payment systems. The main reason for their use in such applications is that...military applications such as secure communication links. However, the proliferation of Automated Teller Machines (ATMs) in the ’80s introduced them to...commercial applications. Today many popular consumer devices have cryptographic processors in them, for example, smart- cards for pay-TV access machines

  9. Guaranteeing Spoof-Resilient Multi-Robot Networks

    DTIC Science & Technology

    2015-05-12

    particularly challenging attack on this assumption is the so-called “Sybil attack.” In a Sybil attack a malicious agent can generate (or spoof) a large...cybersecurity in general multi-node networks (e.g. a wired LAN), the same is not true for multi- robot networks [14, 28], leaving them largely vulnerable...key passing or cryptographic authen- tication is difficult to maintain due to the highly dynamic and distributed nature of multi-robot teams where

  10. Secure Biometric E-Voting Scheme

    NASA Astrophysics Data System (ADS)

    Ahmed, Taha Kh.; Aborizka, Mohamed

    The implementation of the e-voting becomes more substantial with the rapid increase of e-government development. The recent growth in communications and cryptographic techniques facilitate the implementation of e-voting. Many countries introduced e-voting systems; unfortunately most of these systems are not fully functional. In this paper we will present an e-voting scheme that covers most of the e-voting requirements, smart card and biometric recognition technology were implemented to guarantee voter's privacy and authentication.

  11. Reference layer adaptive filtering (RLAF) for EEG artifact reduction in simultaneous EEG-fMRI.

    PubMed

    Steyrl, David; Krausz, Gunther; Koschutnig, Karl; Edlinger, Günter; Müller-Putz, Gernot R

    2017-04-01

    Simultaneous electroencephalography (EEG) and functional magnetic resonance imaging (fMRI) combines advantages of both methods, namely high temporal resolution of EEG and high spatial resolution of fMRI. However, EEG quality is limited due to severe artifacts caused by fMRI scanners. To improve EEG data quality substantially, we introduce methods that use a reusable reference layer EEG cap prototype in combination with adaptive filtering. The first method, reference layer adaptive filtering (RLAF), uses adaptive filtering with reference layer artifact data to optimize artifact subtraction from EEG. In the second method, multi band reference layer adaptive filtering (MBRLAF), adaptive filtering is performed on bandwidth limited sub-bands of the EEG and the reference channels. The results suggests that RLAF outperforms the baseline method, average artifact subtraction, in all settings and also its direct predecessor, reference layer artifact subtraction (RLAS), in lower (<35 Hz) frequency ranges. MBRLAF is computationally more demanding than RLAF, but highly effective in all EEG frequency ranges. Effectivity is determined by visual inspection, as well as root-mean-square voltage reduction and power reduction of EEG provided that physiological EEG components such as occipital EEG alpha power and visual evoked potentials (VEP) are preserved. We demonstrate that both, RLAF and MBRLAF, improve VEP quality. For that, we calculate the mean-squared-distance of single trial VEP to the mean VEP and estimate single trial VEP classification accuracies. We found that the average mean-squared-distance is lowest and the average classification accuracy is highest after MBLAF. RLAF was second best. In conclusion, the results suggests that RLAF and MBRLAF are potentially very effective in improving EEG quality of simultaneous EEG-fMRI. Highlights We present a new and reusable reference layer cap prototype for simultaneous EEG-fMRI We introduce new algorithms for reducing EEG artifacts due to simultaneous fMRI The algorithms combine a reference layer and adaptive filtering Several evaluation criteria suggest superior effectivity in terms of artifact reduction We demonstrate that physiological EEG components are preserved.

  12. Reference layer adaptive filtering (RLAF) for EEG artifact reduction in simultaneous EEG-fMRI

    NASA Astrophysics Data System (ADS)

    Steyrl, David; Krausz, Gunther; Koschutnig, Karl; Edlinger, Günter; Müller-Putz, Gernot R.

    2017-04-01

    Objective. Simultaneous electroencephalography (EEG) and functional magnetic resonance imaging (fMRI) combines advantages of both methods, namely high temporal resolution of EEG and high spatial resolution of fMRI. However, EEG quality is limited due to severe artifacts caused by fMRI scanners. Approach. To improve EEG data quality substantially, we introduce methods that use a reusable reference layer EEG cap prototype in combination with adaptive filtering. The first method, reference layer adaptive filtering (RLAF), uses adaptive filtering with reference layer artifact data to optimize artifact subtraction from EEG. In the second method, multi band reference layer adaptive filtering (MBRLAF), adaptive filtering is performed on bandwidth limited sub-bands of the EEG and the reference channels. Main results. The results suggests that RLAF outperforms the baseline method, average artifact subtraction, in all settings and also its direct predecessor, reference layer artifact subtraction (RLAS), in lower (<35 Hz) frequency ranges. MBRLAF is computationally more demanding than RLAF, but highly effective in all EEG frequency ranges. Effectivity is determined by visual inspection, as well as root-mean-square voltage reduction and power reduction of EEG provided that physiological EEG components such as occipital EEG alpha power and visual evoked potentials (VEP) are preserved. We demonstrate that both, RLAF and MBRLAF, improve VEP quality. For that, we calculate the mean-squared-distance of single trial VEP to the mean VEP and estimate single trial VEP classification accuracies. We found that the average mean-squared-distance is lowest and the average classification accuracy is highest after MBLAF. RLAF was second best. Significance. In conclusion, the results suggests that RLAF and MBRLAF are potentially very effective in improving EEG quality of simultaneous EEG-fMRI. Highlights We present a new and reusable reference layer cap prototype for simultaneous EEG-fMRI We introduce new algorithms for reducing EEG artifacts due to simultaneous fMRI The algorithms combine a reference layer and adaptive filtering Several evaluation criteria suggest superior effectivity in terms of artifact reduction We demonstrate that physiological EEG components are preserved

  13. Catalyst containing oxygen transport membrane

    DOEpatents

    Christie, Gervase Maxwell; Wilson, Jamie Robyn; van Hassel, Bart Antonie

    2012-12-04

    A composite oxygen transport membrane having a dense layer, a porous support layer and an intermediate porous layer located between the dense layer and the porous support layer. Both the dense layer and the intermediate porous layer are formed from an ionic conductive material to conduct oxygen ions and an electrically conductive material to conduct electrons. The porous support layer has a high permeability, high porosity, and a high average pore diameter and the intermediate porous layer has a lower permeability and lower pore diameter than the porous support layer. Catalyst particles selected to promote oxidation of a combustible substance are located in the intermediate porous layer and in the porous support adjacent to the intermediate porous layer. The catalyst particles can be formed by wicking a solution of catalyst precursors through the porous support toward the intermediate porous layer.

  14. Integrated field emission array for ion desorption

    DOEpatents

    Resnick, Paul J; Hertz, Kristin L.; Holland, Christopher; Chichester, David

    2016-08-23

    An integrated field emission array for ion desorption includes an electrically conductive substrate; a dielectric layer lying over the electrically conductive substrate comprising a plurality of laterally separated cavities extending through the dielectric layer; a like plurality of conically-shaped emitter tips on posts, each emitter tip/post disposed concentrically within a laterally separated cavity and electrically contacting the substrate; and a gate electrode structure lying over the dielectric layer, including a like plurality of circular gate apertures, each gate aperture disposed concentrically above an emitter tip/post to provide a like plurality of annular gate electrodes and wherein the lower edge of each annular gate electrode proximate the like emitter tip/post is rounded. Also disclosed herein are methods for fabricating an integrated field emission array.

  15. Integrated field emission array for ion desorption

    DOEpatents

    Resnick, Paul J; Hertz, Kristin L; Holland, Christopher; Chichester, David; Schwoebel, Paul

    2013-09-17

    An integrated field emission array for ion desorption includes an electrically conductive substrate; a dielectric layer lying over the electrically conductive substrate comprising a plurality of laterally separated cavities extending through the dielectric layer; a like plurality of conically-shaped emitter tips on posts, each emitter tip/post disposed concentrically within a laterally separated cavity and electrically contacting the substrate; and a gate electrode structure lying over the dielectric layer, including a like plurality of circular gate apertures, each gate aperture disposed concentrically above an emitter tip/post to provide a like plurality of annular gate electrodes and wherein the lower edge of each annular gate electrode proximate the like emitter tip/post is rounded. Also disclosed herein are methods for fabricating an integrated field emission array.

  16. Depletion layer recombination effects on the radiation damage hardness of gallium arsenide cells

    NASA Technical Reports Server (NTRS)

    Garlick, G. F. J.

    1985-01-01

    The significant effect of junction depletion layer recombination on the efficiency of windowed GaAs cells was demonstrated. The effect becomes more pronounced as radiation damage occurs. The depletion is considered for 1 MeV electron fluences up to 10 to the 16th power e/sq m. The cell modeling separates damage in emitter and base or buffer layers using different damage coefficients is reported. The lower coefficient for the emitter predicts less loss of performance at fluences greater than 10 to the 15th power e/sq cm. A method for obtaining information on junction recombination effects as damage proceeds is described; this enables a more complete diagnosis of damage to be made.

  17. A Solvent-Free Surface Suspension Melt Technique for Making Biodegradable PCL Membrane Scaffolds for Tissue Engineering Applications.

    PubMed

    Suntornnond, Ratima; An, Jia; Tijore, Ajay; Leong, Kah Fai; Chua, Chee Kai; Tan, Lay Poh

    2016-03-21

    In tissue engineering, there is limited availability of a simple, fast and solvent-free process for fabricating micro-porous thin membrane scaffolds. This paper presents the first report of a novel surface suspension melt technique to fabricate a micro-porous thin membrane scaffolds without using any organic solvent. Briefly, a layer of polycaprolactone (PCL) particles is directly spread on top of water in the form of a suspension. After that, with the use of heat, the powder layer is transformed into a melted layer, and following cooling, a thin membrane is obtained. Two different sizes of PCL powder particles (100 µm and 500 µm) are used. Results show that membranes made from 100 µm powders have lower thickness, smaller pore size, smoother surface, higher value of stiffness but lower ultimate tensile load compared to membranes made from 500 µm powder. C2C12 cell culture results indicate that the membrane supports cell growth and differentiation. Thus, this novel membrane generation method holds great promise for tissue engineering.

  18. Novel two-step laser ablation and ionization mass spectrometry (2S-LAIMS) of actor-spectator ice layers: Probing chemical composition of D{sub 2}O ice beneath a H{sub 2}O ice layer

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yang, Rui, E-mail: ryang73@ustc.edu; Gudipati, Murthy S., E-mail: gudipati@jpl.nasa.gov

    2014-03-14

    In this work, we report for the first time successful analysis of organic aromatic analytes imbedded in D{sub 2}O ices by novel infrared (IR) laser ablation of a layered non-absorbing D{sub 2}O ice (spectator) containing the analytes and an ablation-active IR-absorbing H{sub 2}O ice layer (actor) without the analyte. With these studies we have opened up a new method for the in situ analysis of solids containing analytes when covered with an IR laser-absorbing layer that can be resonantly ablated. This soft ejection method takes advantage of the tenability of two-step infrared laser ablation and ultraviolet laser ionization mass spectrometry,more » previously demonstrated in this lab to study chemical reactions of polycyclic aromatic hydrocarbons (PAHs) in cryogenic ices. The IR laser pulse tuned to resonantly excite only the upper H{sub 2}O ice layer (actor) generates a shockwave upon impact. This shockwave penetrates the lower analyte-containing D{sub 2}O ice layer (spectator, a non-absorbing ice that cannot be ablated directly with the wavelength of the IR laser employed) and is reflected back, ejecting the contents of the D{sub 2}O layer into the vacuum where they are intersected by a UV laser for ionization and detection by a time-of-flight mass spectrometer. Thus, energy is transmitted from the laser-absorbing actor layer into the non-absorbing spectator layer resulting its ablation. We found that isotope cross-contamination between layers was negligible. We also did not see any evidence for thermal or collisional chemistry of PAH molecules with H{sub 2}O molecules in the shockwave. We call this “shockwave mediated surface resonance enhanced subsurface ablation” technique as “two-step laser ablation and ionization mass spectrometry of actor-spectator ice layers.” This method has its roots in the well-established MALDI (matrix assisted laser desorption and ionization) method. Our method offers more flexibility to optimize both the processes—ablation and ionization. This new technique can thus be potentially employed to undertake in situ analysis of materials imbedded in diverse media, such as cryogenic ices, biological samples, tissues, minerals, etc., by covered with an IR-absorbing laser ablation medium and study the chemical composition and reaction pathways of the analyte in its natural surroundings.« less

  19. Contrasts in Lower Crustal Structure and Evolution Between the Northern and Southern Rocky Mountains From Xenoliths and Seismic Data

    NASA Astrophysics Data System (ADS)

    Schulte-Pelkum, V.; Mahan, K. H.; Shen, W.; Stachnik, J. C.

    2016-12-01

    We compare and contrast crustal structure and composition along a transect from the Southern to Northern Rocky Mountains, with a focus on the lower crust. Evolution of the crust can include processes of emplacement, differentiation, and thermal changes that may generate lower crust with high seismic wavespeeds. The high seismic velocities can be due to mafic composition, the presence of garnet, or both. We seek to find seismic signatures preserved from such processes and compare xenolith samples and present-day seismic appearance between regions with varying tectonic histories. We review recent seismic results from the EarthScope Transportable Array from receiver functions and surface waves, compilations of active source studies, and xenolith studies to compare lower crustal structure along transects through the Northern and Southern Rocky Mountains traversing Montana, Wyoming, Colorado, Utah, and New Mexico. Xenoliths from an unusually thick lower crustal layer with high seismic velocities in Montana record magmatic emplacement processes dating back to the Archean. The lower crustal layer possesses internal velocity contrasts that lead to conflicting interpretations of Moho depth depending on the method used, with xenoliths and a refraction study placing the Moho at 55 km depth, while studies using surface waves and receiver functions identify the largest contrast at 40-45 km depth as the Moho. An additional confounding factor is the presence of metasomatized uppermost mantle with low seismic velocities, which may further diminish the seismic signature of the petrological Moho. To the south, the high-velocity layer diminishes, and seismic velocities in the deep crust under southern Wyoming, Colorado, and New Mexico are lower. In the literature, north-south gradients in lower crustal velocity in this area and observed differences in garnet content have variously been ascribed to thermal dehydration of Archean-age hydrous crust or Laramide-age hydration of previously garnet-rich crust.

  20. Resistivity profiling for mapping gravel layers that may control contaminant migration at the Amargosa Desert Research Site, Nevada

    USGS Publications Warehouse

    Lucius, Jeffrey E.; Abraham, Jared D.; Burton, Bethany L.

    2008-01-01

    Gaseous contaminants, including CFC 113, chloroform, and tritiated compounds, move preferentially in unsaturated subsurface gravel layers away from disposal trenches at a closed low-level radioactive waste-disposal facility in the Amargosa Desert about 17 kilometers south of Beatty, Nevada. Two distinct gravel layers are involved in contaminant transport: a thin, shallow layer between about 0.5 and 2.2 meters below the surface and a layer of variable thickness between about 15 and 30 meters below land surface. From 2003 to 2005, the U.S. Geological Survey used multielectrode DC and AC resistivity surveys to map these gravel layers. Previous core sampling indicates the fine-grained sediments generally have higher water content than the gravel layers or the sediments near the surface. The relatively higher electrical resistivity of the dry gravel layers, compared to that of the surrounding finer sediments, makes the gravel readily mappable using electrical resistivity profiling. The upper gravel layer is not easily distinguished from the very dry, fine-grained deposits at the surface. Two-dimensional resistivity models, however, clearly identify the resistive lower gravel layer, which is continuous near the facility except to the southeast. Multielectrode resistivity surveys provide a practical noninvasive method to image hydrogeologic features in the arid environment of the Amargosa Desert.

Top