Sample records for public key cryptosystem

  1. Partially Key Distribution with Public Key Cryptosystem Based on Error Control Codes

    NASA Astrophysics Data System (ADS)

    Tavallaei, Saeed Ebadi; Falahati, Abolfazl

    Due to the low level of security in public key cryptosystems based on number theory, fundamental difficulties such as "key escrow" in Public Key Infrastructure (PKI) and a secure channel in ID-based cryptography, a new key distribution cryptosystem based on Error Control Codes (ECC) is proposed . This idea is done by some modification on McEliece cryptosystem. The security of ECC cryptosystem obtains from the NP-Completeness of block codes decoding. The capability of generating public keys with variable lengths which is suitable for different applications will be provided by using ECC. It seems that usage of these cryptosystems because of decreasing in the security of cryptosystems based on number theory and increasing the lengths of their keys would be unavoidable in future.

  2. Image encryption based on nonlinear encryption system and public-key cryptography

    NASA Astrophysics Data System (ADS)

    Zhao, Tieyu; Ran, Qiwen; Chi, Yingying

    2015-03-01

    Recently, optical asymmetric cryptosystem (OACS) has became the focus of discussion and concern of researchers. Some researchers pointed out that OACS was not tenable because of misunderstanding the concept of asymmetric cryptosystem (ACS). We propose an improved cryptosystem using RSA public-key algorithm based on existing OACS and the new system conforms to the basic agreement of public key cryptosystem. At the beginning of the encryption process, the system will produce an independent phase matrix and allocate the input image, which also conforms to one-time pad cryptosystem. The simulation results show that the validity of the improved cryptosystem and the high robustness against attack scheme using phase retrieval technique.

  3. Efficient Implementation of the Pairing on Mobilephones Using BREW

    NASA Astrophysics Data System (ADS)

    Yoshitomi, Motoi; Takagi, Tsuyoshi; Kiyomoto, Shinsaku; Tanaka, Toshiaki

    Pairing based cryptosystems can accomplish novel security applications such as ID-based cryptosystems, which have not been constructed efficiently without the pairing. The processing speed of the pairing based cryptosystems is relatively slow compared with the other conventional public key cryptosystems. However, several efficient algorithms for computing the pairing have been proposed, namely Duursma-Lee algorithm and its variant ηT pairing. In this paper, we present an efficient implementation of the pairing over some mobilephones. Moreover, we compare the processing speed of the pairing with that of the other standard public key cryptosystems, i. e. RSA cryptosystem and elliptic curve cryptosystem. Indeed the processing speed of our implementation in ARM9 processors on BREW achieves under 100 milliseconds using the supersingular curve over F397. In addition, the pairing is more efficient than the other public key cryptosystems, and the pairing can be achieved enough also on BREW mobilephones. It has become efficient enough to implement security applications, such as short signature, ID-based cryptosystems or broadcast encryption, using the pairing on BREW mobilephones.

  4. Multivariate Cryptography Based on Clipped Hopfield Neural Network.

    PubMed

    Wang, Jia; Cheng, Lee-Ming; Su, Tong

    2018-02-01

    Designing secure and efficient multivariate public key cryptosystems [multivariate cryptography (MVC)] to strengthen the security of RSA and ECC in conventional and quantum computational environment continues to be a challenging research in recent years. In this paper, we will describe multivariate public key cryptosystems based on extended Clipped Hopfield Neural Network (CHNN) and implement it using the MVC (CHNN-MVC) framework operated in space. The Diffie-Hellman key exchange algorithm is extended into the matrix field, which illustrates the feasibility of its new applications in both classic and postquantum cryptography. The efficiency and security of our proposed new public key cryptosystem CHNN-MVC are simulated and found to be NP-hard. The proposed algorithm will strengthen multivariate public key cryptosystems and allows hardware realization practicality.

  5. Quantum Public Key Cryptosystem Based on Bell States

    NASA Astrophysics Data System (ADS)

    Wu, WanQing; Cai, QingYu; Zhang, HuanGuo; Liang, XiaoYan

    2017-11-01

    Classical public key cryptosystems ( P K C), such as R S A, E I G a m a l, E C C, are no longer secure in quantum algorithms, and quantum cryptography has become a novel research topic. In this paper we present a quantum asymmetrical cryptosystem i.e. quantum public key cryptosystem ( Q P K C) based on the Bell states. In particular, in the proposed QPKC the public key are given by the first n particles of Bell states and generalized Pauli operations. The corresponding secret key are the last n particles of Bell states and the inverse of generalized Pauli operations. The proposed QPKC encrypts the message using a public key and decrypts the ciphertext using a private key. By H o l e v o ' s theorem, we proved the security of the secret key and messages during the QPKC.

  6. Security of Color Image Data Designed by Public-Key Cryptosystem Associated with 2D-DWT

    NASA Astrophysics Data System (ADS)

    Mishra, D. C.; Sharma, R. K.; Kumar, Manish; Kumar, Kuldeep

    2014-08-01

    In present times the security of image data is a major issue. So, we have proposed a novel technique for security of color image data by public-key cryptosystem or asymmetric cryptosystem. In this technique, we have developed security of color image data using RSA (Rivest-Shamir-Adleman) cryptosystem with two-dimensional discrete wavelet transform (2D-DWT). Earlier proposed schemes for security of color images designed on the basis of keys, but this approach provides security of color images with the help of keys and correct arrangement of RSA parameters. If the attacker knows about exact keys, but has no information of exact arrangement of RSA parameters, then the original information cannot be recovered from the encrypted data. Computer simulation based on standard example is critically examining the behavior of the proposed technique. Security analysis and a detailed comparison between earlier developed schemes for security of color images and proposed technique are also mentioned for the robustness of the cryptosystem.

  7. Bit-Oriented Quantum Public-Key Cryptosystem Based on Bell States

    NASA Astrophysics Data System (ADS)

    Wu, WanQing; Cai, QingYu; Zhang, HuanGuo; Liang, XiaoYan

    2018-02-01

    Quantum public key encryption system provides information confidentiality using quantum mechanics. This paper presents a quantum public key cryptosystem (Q P K C) based on the Bell states. By H o l e v o's theorem, the presented scheme provides the security of the secret key using one-wayness during the QPKC. While the QPKC scheme is information theoretic security under chosen plaintext attack (C P A). Finally some important features of presented QPKC scheme can be compared with other QPKC scheme.

  8. Bit-Oriented Quantum Public-Key Cryptosystem Based on Bell States

    NASA Astrophysics Data System (ADS)

    Wu, WanQing; Cai, QingYu; Zhang, HuanGuo; Liang, XiaoYan

    2018-06-01

    Quantum public key encryption system provides information confidentiality using quantum mechanics. This paper presents a quantum public key cryptosystem ( Q P K C) based on the Bell states. By H o l e v o' s theorem, the presented scheme provides the security of the secret key using one-wayness during the QPKC. While the QPKC scheme is information theoretic security under chosen plaintext attack ( C P A). Finally some important features of presented QPKC scheme can be compared with other QPKC scheme.

  9. Cryptosystem based on two-step phase-shifting interferometry and the RSA public-key encryption algorithm

    NASA Astrophysics Data System (ADS)

    Meng, X. F.; Peng, X.; Cai, L. Z.; Li, A. M.; Gao, Z.; Wang, Y. R.

    2009-08-01

    A hybrid cryptosystem is proposed, in which one image is encrypted to two interferograms with the aid of double random-phase encoding (DRPE) and two-step phase-shifting interferometry (2-PSI), then three pairs of public-private keys are utilized to encode and decode the session keys (geometrical parameters, the second random-phase mask) and interferograms. In the stage of decryption, the ciphered image can be decrypted by wavefront reconstruction, inverse Fresnel diffraction, and real amplitude normalization. This approach can successfully solve the problem of key management and dispatch, resulting in increased security strength. The feasibility of the proposed cryptosystem and its robustness against some types of attack are verified and analyzed by computer simulations.

  10. Fast parallel molecular algorithms for DNA-based computation: factoring integers.

    PubMed

    Chang, Weng-Long; Guo, Minyi; Ho, Michael Shan-Hui

    2005-06-01

    The RSA public-key cryptosystem is an algorithm that converts input data to an unrecognizable encryption and converts the unrecognizable data back into its original decryption form. The security of the RSA public-key cryptosystem is based on the difficulty of factoring the product of two large prime numbers. This paper demonstrates to factor the product of two large prime numbers, and is a breakthrough in basic biological operations using a molecular computer. In order to achieve this, we propose three DNA-based algorithms for parallel subtractor, parallel comparator, and parallel modular arithmetic that formally verify our designed molecular solutions for factoring the product of two large prime numbers. Furthermore, this work indicates that the cryptosystems using public-key are perhaps insecure and also presents clear evidence of the ability of molecular computing to perform complicated mathematical operations.

  11. Public-key quantum digital signature scheme with one-time pad private-key

    NASA Astrophysics Data System (ADS)

    Chen, Feng-Lin; Liu, Wan-Fang; Chen, Su-Gen; Wang, Zhi-Hua

    2018-01-01

    A quantum digital signature scheme is firstly proposed based on public-key quantum cryptosystem. In the scheme, the verification public-key is derived from the signer's identity information (such as e-mail) on the foundation of identity-based encryption, and the signature private-key is generated by one-time pad (OTP) protocol. The public-key and private-key pair belongs to classical bits, but the signature cipher belongs to quantum qubits. After the signer announces the public-key and generates the final quantum signature, each verifier can verify publicly whether the signature is valid or not with the public-key and quantum digital digest. Analysis results show that the proposed scheme satisfies non-repudiation and unforgeability. Information-theoretic security of the scheme is ensured by quantum indistinguishability mechanics and OTP protocol. Based on the public-key cryptosystem, the proposed scheme is easier to be realized compared with other quantum signature schemes under current technical conditions.

  12. New public key cryptosystem based on quaternions

    NASA Astrophysics Data System (ADS)

    Durcheva, Mariana; Karailiev, Kristian

    2017-12-01

    Quaternions are not commonly used in cryptography. Nevertheless, the noncommutativity of their multiplication makes them suitable for cryptographic purposes. In this paper we suggest a Diffie-Hellman like cryptosystem based on the the quaternions. Additionally, a computer realization of the protocol is given.

  13. Error-correcting pairs for a public-key cryptosystem

    NASA Astrophysics Data System (ADS)

    Pellikaan, Ruud; Márquez-Corbella, Irene

    2017-06-01

    Code-based Cryptography (CBC) is a powerful and promising alternative for quantum resistant cryptography. Indeed, together with lattice-based cryptography, multivariate cryptography and hash-based cryptography are the principal available techniques for post-quantum cryptography. CBC was first introduced by McEliece where he designed one of the most efficient Public-Key encryption schemes with exceptionally strong security guarantees and other desirable properties that still resist to attacks based on Quantum Fourier Transform and Amplitude Amplification. The original proposal, which remains unbroken, was based on binary Goppa codes. Later, several families of codes have been proposed in order to reduce the key size. Some of these alternatives have already been broken. One of the main requirements of a code-based cryptosystem is having high performance t-bounded decoding algorithms which is achieved in the case the code has a t-error-correcting pair (ECP). Indeed, those McEliece schemes that use GRS codes, BCH, Goppa and algebraic geometry codes are in fact using an error-correcting pair as a secret key. That is, the security of these Public-Key Cryptosystems is not only based on the inherent intractability of bounded distance decoding but also on the assumption that it is difficult to retrieve efficiently an error-correcting pair. In this paper, the class of codes with a t-ECP is proposed for the McEliece cryptosystem. Moreover, we study the hardness of distinguishing arbitrary codes from those having a t-error correcting pair.

  14. Information hiding based on double random-phase encoding and public-key cryptography.

    PubMed

    Sheng, Yuan; Xin, Zhou; Alam, Mohammed S; Xi, Lu; Xiao-Feng, Li

    2009-03-02

    A novel information hiding method based on double random-phase encoding (DRPE) and Rivest-Shamir-Adleman (RSA) public-key cryptosystem is proposed. In the proposed technique, the inherent diffusion property of DRPE is cleverly utilized to make up the diffusion insufficiency of RSA public-key cryptography, while the RSA cryptosystem is utilized for simultaneous transmission of the cipher text and the two phase-masks, which is not possible under the DRPE technique. This technique combines the complementary advantages of the DPRE and RSA encryption techniques and brings security and convenience for efficient information transmission. Extensive numerical simulation results are presented to verify the performance of the proposed technique.

  15. Information verification cryptosystem using one-time keys based on double random phase encoding and public-key cryptography

    NASA Astrophysics Data System (ADS)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2016-08-01

    A novel image encryption system based on double random phase encoding (DRPE) and RSA public-key algorithm is proposed. The main characteristic of the system is that each encryption process produces a new decryption key (even for the same plaintext), thus the encryption system conforms to the feature of the one-time pad (OTP) cryptography. The other characteristic of the system is the use of fingerprint key. Only with the rightful authorization will the true decryption be obtained, otherwise the decryption will result in noisy images. So the proposed system can be used to determine whether the ciphertext is falsified by attackers. In addition, the system conforms to the basic agreement of asymmetric cryptosystem (ACS) due to the combination with the RSA public-key algorithm. The simulation results show that the encryption scheme has high robustness against the existing attacks.

  16. Hybrid cryptosystem RSA - CRT optimization and VMPC

    NASA Astrophysics Data System (ADS)

    Rahmadani, R.; Mawengkang, H.; Sutarman

    2018-03-01

    Hybrid cryptosystem combines symmetric algorithms and asymmetric algorithms. This combination utilizes speeds on encryption/decryption processes of symmetric algorithms and asymmetric algorithms to secure symmetric keys. In this paper we propose hybrid cryptosystem that combine symmetric algorithms VMPC and asymmetric algorithms RSA - CRT optimization. RSA - CRT optimization speeds up the decryption process by obtaining plaintext with dp and p key only, so there is no need to perform CRT processes. The VMPC algorithm is more efficient in software implementation and reduces known weaknesses in RC4 key generation. The results show hybrid cryptosystem RSA - CRT optimization and VMPC is faster than hybrid cryptosystem RSA - VMPC and hybrid cryptosystem RSA - CRT - VMPC. Keyword : Cryptography, RSA, RSA - CRT, VMPC, Hybrid Cryptosystem.

  17. Novel asymmetric cryptosystem based on distorted wavefront beam illumination and double-random phase encoding.

    PubMed

    Yu, Honghao; Chang, Jun; Liu, Xin; Wu, Chuhan; He, Yifan; Zhang, Yongjian

    2017-04-17

    Herein, we propose a new security enhancing method that employs wavefront aberrations as optical keys to improve the resistance capabilities of conventional double-random phase encoding (DRPE) optical cryptosystems. This study has two main innovations. First, we exploit a special beam-expander afocal-reflecting to produce different types of aberrations, and the wavefront distortion can be altered by changing the shape of the afocal-reflecting system using a deformable mirror. Then, we reconstruct the wavefront aberrations via the surface fitting of Zernike polynomials and use the reconstructed aberrations as novel asymmetric vector keys. The ideal wavefront and the distorted wavefront obtained by wavefront sensing can be regarded as a pair of private and public keys. The wavelength and focal length of the Fourier lens can be used as additional keys to increase the number of degrees of freedom. This novel cryptosystem can enhance the resistance to various attacks aimed at DRPE systems. Finally, we conduct ZEMAX and MATLAB simulations to demonstrate the superiority of this method.

  18. Public-Key Cryptography: A Hardware Implementation and Novel Neural Network-Based Approach

    DTIC Science & Technology

    1992-09-01

    FUNDINGISPONSORING 8b. OFFICE SYMBOL 9. PROCUREMENT INSTRUMENT IDENTIFICATION NUMBER ORGANIZATION (if applicable ) 8c. ADDRESS (City, State, and ZIP Code) 10...8217....... ......... 4. .. . . iii TABLE OF CONTENTS I. INTRODUCTION ............................. 1 II. MATHEMATICAL BASIS FOR THE DEVELOPMENT OF PUBLIC-KEY...in the spirit of this future that this thesis is presented. It is an in-depth study of the public-key cryptosystem. First, the mathematical basis

  19. Phase-only asymmetric optical cryptosystem based on random modulus decomposition

    NASA Astrophysics Data System (ADS)

    Xu, Hongfeng; Xu, Wenhui; Wang, Shuaihua; Wu, Shaofan

    2018-06-01

    We propose a phase-only asymmetric optical cryptosystem based on random modulus decomposition (RMD). The cryptosystem is presented for effectively improving the capacity to resist various attacks, including the attack of iterative algorithms. On the one hand, RMD and phase encoding are combined to remove the constraints that can be used in the attacking process. On the other hand, the security keys (geometrical parameters) introduced by Fresnel transform can increase the key variety and enlarge the key space simultaneously. Numerical simulation results demonstrate the strong feasibility, security and robustness of the proposed cryptosystem. This cryptosystem will open up many new opportunities in the application fields of optical encryption and authentication.

  20. An effective and secure key-management scheme for hierarchical access control in E-medicine system.

    PubMed

    Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit

    2013-04-01

    Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems.

  1. On the security of compressed encryption with partial unitary sensing matrices embedding a secret keystream

    NASA Astrophysics Data System (ADS)

    Yu, Nam Yul

    2017-12-01

    The principle of compressed sensing (CS) can be applied in a cryptosystem by providing the notion of security. In this paper, we study the computational security of a CS-based cryptosystem that encrypts a plaintext with a partial unitary sensing matrix embedding a secret keystream. The keystream is obtained by a keystream generator of stream ciphers, where the initial seed becomes the secret key of the CS-based cryptosystem. For security analysis, the total variation distance, bounded by the relative entropy and the Hellinger distance, is examined as a security measure for the indistinguishability. By developing upper bounds on the distance measures, we show that the CS-based cryptosystem can be computationally secure in terms of the indistinguishability, as long as the keystream length for each encryption is sufficiently large with low compression and sparsity ratios. In addition, we consider a potential chosen plaintext attack (CPA) from an adversary, which attempts to recover the key of the CS-based cryptosystem. Associated with the key recovery attack, we show that the computational security of our CS-based cryptosystem is brought by the mathematical intractability of a constrained integer least-squares (ILS) problem. For a sub-optimal, but feasible key recovery attack, we consider a successive approximate maximum-likelihood detection (SAMD) and investigate the performance by developing an upper bound on the success probability. Through theoretical and numerical analyses, we demonstrate that our CS-based cryptosystem can be secure against the key recovery attack through the SAMD.

  2. ElGamal cryptosystem with embedded compression-crypto technique

    NASA Astrophysics Data System (ADS)

    Mandangan, Arif; Yin, Lee Souk; Hung, Chang Ee; Hussin, Che Haziqah Che

    2014-12-01

    Key distribution problem in symmetric cryptography has been solved by the emergence of asymmetric cryptosystem. Due to its mathematical complexity, computation efficiency becomes a major problem in the real life application of asymmetric cryptosystem. This scenario encourage various researches regarding the enhancement of computation efficiency of asymmetric cryptosystems. ElGamal cryptosystem is one of the most established asymmetric cryptosystem. By using proper parameters, ElGamal cryptosystem is able to provide a good level of information security. On the other hand, Compression-Crypto technique is a technique used to reduce the number of plaintext to be encrypted from k∈ Z+, k > 2 plaintext become only 2 plaintext. Instead of encrypting k plaintext, we only need to encrypt these 2 plaintext. In this paper, we embed the Compression-Crypto technique into the ElGamal cryptosystem. To show that the embedded ElGamal cryptosystem works, we provide proofs on the decryption processes to recover the encrypted plaintext.

  3. On the common modulus attack into the LUC4,6 cryptosystem

    NASA Astrophysics Data System (ADS)

    Wong, Tze Jin; Said, Mohd Rushdan Md; Othman, Mohamed; Koo, Lee Feng

    2015-05-01

    The LUC4,6 cryptosystem is a system analogy with RSA cryptosystem and extended from LUC and LUC3 cryptosystems. The process of encryption and decryption are derived from the fourth order linear recurrence sequence and based on Lucas function. This paper reports an investigation into the common modulus attack on the LUC4,6 cryptosystem. In general, the common modulus attack will be succeeded if the sender sends the plaintext to two users used same RSA-modulus and both of encryption keys of them are relatively prime to each other. However, based on the characteristics of high order Lucas sequence, the LUC4,6 cryptosystem is unattackable

  4. Enhanced diffie-hellman algorithm for reliable key exchange

    NASA Astrophysics Data System (ADS)

    Aryan; Kumar, Chaithanya; Vincent, P. M. Durai Raj

    2017-11-01

    The Diffie -Hellman is one of the first public-key procedure and is a certain way of exchanging the cryptographic keys securely. This concept was introduced by Ralph Markel and it is named after Whitfield Diffie and Martin Hellman. Sender and Receiver make a common secret key in Diffie-Hellman algorithm and then they start communicating with each other over the public channel which is known to everyone. A number of internet services are secured by Diffie -Hellman. In Public key cryptosystem, the sender has to trust while receiving the public key of the receiver and vice-versa and this is the challenge of public key cryptosystem. Man-in-the-Middle attack is very much possible on the existing Diffie-Hellman algorithm. In man-in-the-middle attack, the attacker exists in the public channel, the attacker receives the public key of both sender and receiver and sends public keys to sender and receiver which is generated by his own. This is how man-in-the-middle attack is possible on Diffie-Hellman algorithm. Denial of service attack is another attack which is found common on Diffie-Hellman. In this attack, the attacker tries to stop the communication happening between sender and receiver and attacker can do this by deleting messages or by confusing the parties with miscommunication. Some more attacks like Insider attack, Outsider attack, etc are possible on Diffie-Hellman. To reduce the possibility of attacks on Diffie-Hellman algorithm, we have enhanced the Diffie-Hellman algorithm to a next level. In this paper, we are extending the Diffie -Hellman algorithm by using the concept of the Diffie -Hellman algorithm to get a stronger secret key and that secret key is further exchanged between the sender and the receiver so that for each message, a new secret shared key would be generated. The second secret key will be generated by taking primitive root of the first secret key.

  5. Quantum cryptography using coherent states: Randomized encryption and key generation

    NASA Astrophysics Data System (ADS)

    Corndorf, Eric

    With the advent of the global optical-telecommunications infrastructure, an increasing number of individuals, companies, and agencies communicate information with one another over public networks or physically-insecure private networks. While the majority of the traffic flowing through these networks requires little or no assurance of secrecy, the same cannot be said for certain communications between banks, between government agencies, within the military, and between corporations. In these arenas, the need to specify some level of secrecy in communications is a high priority. While the current approaches to securing sensitive information (namely the public-key-cryptography infrastructure and deterministic private-key ciphers like AES and 3DES) seem to be cryptographically strong based on empirical evidence, there exist no mathematical proofs of secrecy for any widely deployed cryptosystem. As an example, the ubiquitous public-key cryptosystems infer all of their secrecy from the assumption that factoring of the product of two large primes is necessarily time consuming---something which has not, and perhaps cannot, be proven. Since the 1980s, the possibility of using quantum-mechanical features of light as a physical mechanism for satisfying particular cryptographic objectives has been explored. This research has been fueled by the hopes that cryptosystems based on quantum systems may provide provable levels of secrecy which are at least as valid as quantum mechanics itself. Unfortunately, the most widely considered quantum-cryptographic protocols (BB84 and the Ekert protocol) have serious implementation problems. Specifically, they require quantum-mechanical states which are not readily available, and they rely on unproven relations between intrusion-level detection and the information available to an attacker. As a result, the secrecy level provided by these experimental implementations is entirely unspecified. In an effort to provably satisfy the cryptographic objectives of key generation and direct data-encryption, a new quantum cryptographic principle is demonstrated wherein keyed coherent-state signal sets are employed. Taking advantage of the fundamental and irreducible quantum-measurement noise of coherent states, these schemes do not require the users to measure the influence of an attacker. Experimental key-generation and data encryption schemes based on these techniques, which are compatible with today's WDM fiber-optic telecommunications infrastructure, are implemented and analyzed.

  6. Optical image cryptosystem using chaotic phase-amplitude masks encoding and least-data-driven decryption by compressive sensing

    NASA Astrophysics Data System (ADS)

    Lang, Jun; Zhang, Jing

    2015-03-01

    In our proposed optical image cryptosystem, two pairs of phase-amplitude masks are generated from the chaotic web map for image encryption in the 4f double random phase-amplitude encoding (DRPAE) system. Instead of transmitting the real keys and the enormous masks codes, only a few observed measurements intermittently chosen from the masks are delivered. Based on compressive sensing paradigm, we suitably refine the series expansions of web map equations to better reconstruct the underlying system. The parameters of the chaotic equations can be successfully calculated from observed measurements and then can be used to regenerate the correct random phase-amplitude masks for decrypting the encoded information. Numerical simulations have been performed to verify the proposed optical image cryptosystem. This cryptosystem can provide a new key management and distribution method. It has the advantages of sufficiently low occupation of the transmitted key codes and security improvement of information transmission without sending the real keys.

  7. Algorithms for Lightweight Key Exchange.

    PubMed

    Alvarez, Rafael; Caballero-Gil, Cándido; Santonja, Juan; Zamora, Antonio

    2017-06-27

    Public-key cryptography is too slow for general purpose encryption, with most applications limiting its use as much as possible. Some secure protocols, especially those that enable forward secrecy, make a much heavier use of public-key cryptography, increasing the demand for lightweight cryptosystems that can be implemented in low powered or mobile devices. This performance requirements are even more significant in critical infrastructure and emergency scenarios where peer-to-peer networks are deployed for increased availability and resiliency. We benchmark several public-key key-exchange algorithms, determining those that are better for the requirements of critical infrastructure and emergency applications and propose a security framework based on these algorithms and study its application to decentralized node or sensor networks.

  8. Bidirectional private key exchange using delay-coupled semiconductor lasers.

    PubMed

    Porte, Xavier; Soriano, Miguel C; Brunner, Daniel; Fischer, Ingo

    2016-06-15

    We experimentally demonstrate a key exchange cryptosystem based on the phenomenon of identical chaos synchronization. In our protocol, the private key is symmetrically generated by the two communicating partners. It is built up from the synchronized bits occurring between two current-modulated bidirectionally coupled semiconductor lasers with additional self-feedback. We analyze the security of the exchanged key and discuss the amplification of its privacy. We demonstrate private key generation rates up to 11  Mbit/s over a public channel.

  9. An Application of Discrete Mathematics to Coding Theory.

    ERIC Educational Resources Information Center

    Donohoe, L. Joyce

    1992-01-01

    Presents a public-key cryptosystem application to introduce students to several topics in discrete mathematics. A computer algorithms using recursive methods is presented to solve a problem in which one person wants to send a coded message to a second person while keeping the message secret from a third person. (MDH)

  10. Modified Multi Prime RSA Cryptosystem

    NASA Astrophysics Data System (ADS)

    Ghazali Kamardan, M.; Aminudin, N.; Che-Him, Norziha; Sufahani, Suliadi; Khalid, Kamil; Roslan, Rozaini

    2018-04-01

    RSA [1] is one of the mostly used cryptosystem in securing data and information. Though, it has been recently discovered that RSA has some weaknesses and in advance technology, RSA is believed to be inefficient especially when it comes to decryption. Thus, a new algorithm called Multi prime RSA, an extended version of the standard RSA is studied. Then, a modification is made to the Multi prime RSA where another keys is shared secretly between the receiver and the sender to increase the securerity. As in RSA, the methodology used for modified Multi-prime RSA also consists of three phases; 1. Key Generation in which the secret and public keys are generated and published. In this phase, the secrecy is improved by adding more prime numbers and addition of secret keys. 2. Encryption of the message using the public and secret keys given. 3. Decryption of the secret message using the secret key generated. For the decryption phase, a method called Chinese Remainder Theorem is used which helps to fasten the computation. Since Multi prime RSA use more than two prime numbers, the algorithm is more efficient and secure when compared to the standard RSA. Furthermore, in modified Multi prime RSA another secret key is introduced to increase the obstacle to the attacker. Therefore, it is strongly believed that this new algorithm is better and can be an alternative to the RSA.

  11. On the Hardness of Subset Sum Problem from Different Intervals

    NASA Astrophysics Data System (ADS)

    Kogure, Jun; Kunihiro, Noboru; Yamamoto, Hirosuke

    The subset sum problem, which is often called as the knapsack problem, is known as an NP-hard problem, and there are several cryptosystems based on the problem. Assuming an oracle for shortest vector problem of lattice, the low-density attack algorithm by Lagarias and Odlyzko and its variants solve the subset sum problem efficiently, when the “density” of the given problem is smaller than some threshold. When we define the density in the context of knapsack-type cryptosystems, weights are usually assumed to be chosen uniformly at random from the same interval. In this paper, we focus on general subset sum problems, where this assumption may not hold. We assume that weights are chosen from different intervals, and make analysis of the effect on the success probability of above algorithms both theoretically and experimentally. Possible application of our result in the context of knapsack cryptosystems is the security analysis when we reduce the data size of public keys.

  12. Quantum communication and information processing

    NASA Astrophysics Data System (ADS)

    Beals, Travis Roland

    Quantum computers enable dramatically more efficient algorithms for solving certain classes of computational problems, but, in doing so, they create new problems. In particular, Shor's Algorithm allows for efficient cryptanalysis of many public-key cryptosystems. As public key cryptography is a critical component of present-day electronic commerce, it is crucial that a working, secure replacement be found. Quantum key distribution (QKD), first developed by C.H. Bennett and G. Brassard, offers a partial solution, but many challenges remain, both in terms of hardware limitations and in designing cryptographic protocols for a viable large-scale quantum communication infrastructure. In Part I, I investigate optical lattice-based approaches to quantum information processing. I look at details of a proposal for an optical lattice-based quantum computer, which could potentially be used for both quantum communications and for more sophisticated quantum information processing. In Part III, I propose a method for converting and storing photonic quantum bits in the internal state of periodically-spaced neutral atoms by generating and manipulating a photonic band gap and associated defect states. In Part II, I present a cryptographic protocol which allows for the extension of present-day QKD networks over much longer distances without the development of new hardware. I also present a second, related protocol which effectively solves the authentication problem faced by a large QKD network, thus making QKD a viable, information-theoretic secure replacement for public key cryptosystems.

  13. Algorithms for Lightweight Key Exchange †

    PubMed Central

    Santonja, Juan; Zamora, Antonio

    2017-01-01

    Public-key cryptography is too slow for general purpose encryption, with most applications limiting its use as much as possible. Some secure protocols, especially those that enable forward secrecy, make a much heavier use of public-key cryptography, increasing the demand for lightweight cryptosystems that can be implemented in low powered or mobile devices. This performance requirements are even more significant in critical infrastructure and emergency scenarios where peer-to-peer networks are deployed for increased availability and resiliency. We benchmark several public-key key-exchange algorithms, determining those that are better for the requirements of critical infrastructure and emergency applications and propose a security framework based on these algorithms and study its application to decentralized node or sensor networks. PMID:28654006

  14. Optical asymmetric cryptography based on elliptical polarized light linear truncation and a numerical reconstruction technique.

    PubMed

    Lin, Chao; Shen, Xueju; Wang, Zhisong; Zhao, Cheng

    2014-06-20

    We demonstrate a novel optical asymmetric cryptosystem based on the principle of elliptical polarized light linear truncation and a numerical reconstruction technique. The device of an array of linear polarizers is introduced to achieve linear truncation on the spatially resolved elliptical polarization distribution during image encryption. This encoding process can be characterized as confusion-based optical cryptography that involves no Fourier lens and diffusion operation. Based on the Jones matrix formalism, the intensity transmittance for this truncation is deduced to perform elliptical polarized light reconstruction based on two intensity measurements. Use of a quick response code makes the proposed cryptosystem practical, with versatile key sensitivity and fault tolerance. Both simulation and preliminary experimental results that support theoretical analysis are presented. An analysis of the resistance of the proposed method on a known public key attack is also provided.

  15. Enhancement of security using structured phase masked in optical image encryption on Fresnel transform domain

    NASA Astrophysics Data System (ADS)

    Yadav, Poonam Lata; Singh, Hukum

    2018-05-01

    To enhance the security in optical image encryption system and to protect it from the attackers, this paper proposes new digital spiral phase mask based on Fresnel Transform. In this cryptosystem the Spiral Phase Mask (SPM) used is a hybrid of Fresnel Zone Plate (FZP) and Radial Hilbert Mask (RHM) which makes the key strong and enhances the security. The different keys used for encryption and decryption purposed make the system much more secure. Proposed scheme uses various structured phase mask which increases the key space also it increases the number of parameters which makes it difficult for the attackers to exactly find the key to recover the original image. We have also used different keys for encryption and decryption purpose to make the system much more secure. The strength of the proposed cryptosystem has been analyzed by simulating on MATLAB 7.9.0(R2008a). Mean Square Errors (MSE) and Peak Signal to Noise Ratio (PSNR) are calculated for the proposed algorithm. The experimental results are provided to highlight the effectiveness and sustainability of proposed cryptosystem and to prove that the cryptosystem is secure for usage.

  16. On Patarin's Attack against the lIC Scheme

    NASA Astrophysics Data System (ADS)

    Ogura, Naoki; Uchiyama, Shigenori

    In 2007, Ding et al. proposed an attractive scheme, which is called the l-Invertible Cycles (lIC) scheme. lIC is one of the most efficient multivariate public-key cryptosystems (MPKC); these schemes would be suitable for using under limited computational resources. In 2008, an efficient attack against lIC using Gröbner basis algorithms was proposed by Fouque et al. However, they only estimated the complexity of their attack based on their experimental results. On the other hand, Patarin had proposed an efficient attack against some multivariate public-key cryptosystems. We call this attack Patarin's attack. The complexity of Patarin's attack can be estimated by finding relations corresponding to each scheme. In this paper, we propose an another practical attack against the lIC encryption/signature scheme. We estimate the complexity of our attack (not experimentally) by adapting Patarin's attack. The attack can be also applied to the lIC- scheme. Moreover, we show some experimental results of a practical attack against the lIC/lIC- schemes. This is the first implementation of both our proposed attack and an attack based on Gröbner basis algorithm for the even case, that is, a parameter l is even.

  17. An Asymmetric Image Encryption Based on Phase Truncated Hybrid Transform

    NASA Astrophysics Data System (ADS)

    Khurana, Mehak; Singh, Hukum

    2017-09-01

    To enhance the security of the system and to protect it from the attacker, this paper proposes a new asymmetric cryptosystem based on hybrid approach of Phase Truncated Fourier and Discrete Cosine Transform (PTFDCT) which adds non linearity by including cube and cube root operation in the encryption and decryption path respectively. In this cryptosystem random phase masks are used as encryption keys and phase masks generated after the cube operation in encryption process are reserved as decryption keys and cube root operation is required to decrypt image in decryption process. The cube and cube root operation introduced in the encryption and decryption path makes system resistant against standard attacks. The robustness of the proposed cryptosystem has been analysed and verified on the basis of various parameters by simulating on MATLAB 7.9.0 (R2008a). The experimental results are provided to highlight the effectiveness and suitability of the proposed cryptosystem and prove the system is secure.

  18. Key-Generation Algorithms for Linear Piece In Hand Matrix Method

    NASA Astrophysics Data System (ADS)

    Tadaki, Kohtaro; Tsujii, Shigeo

    The linear Piece In Hand (PH, for short) matrix method with random variables was proposed in our former work. It is a general prescription which can be applicable to any type of multivariate public-key cryptosystems for the purpose of enhancing their security. Actually, we showed, in an experimental manner, that the linear PH matrix method with random variables can certainly enhance the security of HFE against the Gröbner basis attack, where HFE is one of the major variants of multivariate public-key cryptosystems. In 1998 Patarin, Goubin, and Courtois introduced the plus method as a general prescription which aims to enhance the security of any given MPKC, just like the linear PH matrix method with random variables. In this paper we prove the equivalence between the plus method and the primitive linear PH matrix method, which is introduced by our previous work to explain the notion of the PH matrix method in general in an illustrative manner and not for a practical use to enhance the security of any given MPKC. Based on this equivalence, we show that the linear PH matrix method with random variables has the substantial advantage over the plus method with respect to the security enhancement. In the linear PH matrix method with random variables, the three matrices, including the PH matrix, play a central role in the secret-key and public-key. In this paper, we clarify how to generate these matrices and thus present two probabilistic polynomial-time algorithms to generate these matrices. In particular, the second one has a concise form, and is obtained as a byproduct of the proof of the equivalence between the plus method and the primitive linear PH matrix method.

  19. Triple symmetric key cryptosystem for data security

    NASA Astrophysics Data System (ADS)

    Fuzail, C. Md; Norman, Jasmine; Mangayarkarasi, R.

    2017-11-01

    As the technology is getting spreads in the macro seconds of speed and in which the trend changing era from human to robotics the security issue is also getting increased. By means of using machine attacks it is very easy to break the cryptosystems in very less amount of time. Cryptosystem is a process which provides the security in all sorts of processes, communications and transactions to be done securely with the help of electronical mechanisms. Data is one such thing with the expanded implication and possible scraps over the collection of data to secure predominance and achievement, Information Security is the process where the information is protected from invalid and unverified accessibilities and data from mishandling. So the idea of Information Security has risen. Symmetric key which is also known as private key.Whereas the private key is mostly used to attain the confidentiality of data. It is a dynamic topic which can be implemented over different applications like android, wireless censor networks, etc. In this paper, a new mathematical manipulation algorithm along with Tea cryptosystem has been implemented and it can be used for the purpose of cryptography. The algorithm which we proposed is straightforward and more powerful and it will authenticate in harder way and also it will be very difficult to break by someone without knowing in depth about its internal mechanisms.

  20. Optical Double Image Hiding in the Fractional Hartley Transform Using Structured Phase Filter and Arnold Transform

    NASA Astrophysics Data System (ADS)

    Yadav, Poonam Lata; Singh, Hukum

    2018-06-01

    To maintain the security of the image encryption and to protect the image from intruders, a new asymmetric cryptosystem based on fractional Hartley Transform (FrHT) and the Arnold transform (AT) is proposed. AT is a method of image cropping and edging in which pixels of the image are reorganized. In this cryptosystem we have used AT so as to extent the information content of the two original images onto the encrypted images so as to increase the safety of the encoded images. We have even used Structured Phase Mask (SPM) and Hybrid Mask (HM) as the encryption keys. The original image is first multiplied with the SPM and HM and then transformed with direct and inverse fractional Hartley transform so as to obtain the encrypted image. The fractional orders of the FrHT and the parameters of the AT correspond to the keys of encryption and decryption methods. If both the keys are correctly used only then the original image would be retrieved. Recommended method helps in strengthening the safety of DRPE by growing the key space and the number of parameters and the method is robust against various attacks. By using MATLAB 8.3.0.52 (R2014a) we calculate the strength of the recommended cryptosystem. A set of simulated results shows the power of the proposed asymmetric cryptosystem.

  1. Fourier domain asymmetric cryptosystem for privacy protected multimodal biometric security

    NASA Astrophysics Data System (ADS)

    Choudhury, Debesh

    2016-04-01

    We propose a Fourier domain asymmetric cryptosystem for multimodal biometric security. One modality of biometrics (such as face) is used as the plaintext, which is encrypted by another modality of biometrics (such as fingerprint). A private key is synthesized from the encrypted biometric signature by complex spatial Fourier processing. The encrypted biometric signature is further encrypted by other biometric modalities, and the corresponding private keys are synthesized. The resulting biometric signature is privacy protected since the encryption keys are provided by the human, and hence those are private keys. Moreover, the decryption keys are synthesized using those private encryption keys. The encrypted signatures are decrypted using the synthesized private keys and inverse complex spatial Fourier processing. Computer simulations demonstrate the feasibility of the technique proposed.

  2. Low-power cryptographic coprocessor for autonomous wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Olszyna, Jakub; Winiecki, Wiesław

    2013-10-01

    The concept of autonomous wireless sensor networks involves energy harvesting, as well as effective management of system resources. Public-key cryptography (PKC) offers the advantage of elegant key agreement schemes with which a secret key can be securely established over unsecure channels. In addition to solving the key management problem, the other major application of PKC is digital signatures, with which non-repudiation of messages exchanges can be achieved. The motivation for studying low-power and area efficient modular arithmetic algorithms comes from enabling public-key security for low-power devices that can perform under constrained environment like autonomous wireless sensor networks. This paper presents a cryptographic coprocessor tailored to the autonomous wireless sensor networks constraints. Such hardware circuit is aimed to support the implementation of different public-key cryptosystems based on modular arithmetic in GF(p) and GF(2m). Key components of the coprocessor are described as GEZEL models and can be easily transformed to VHDL and implemented in hardware.

  3. Dynamic Key Management Schemes for Secure Group Access Control Using Hierarchical Clustering in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Tsaur, Woei-Jiunn; Pai, Haw-Tyng

    2008-11-01

    The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). The operation in MANETs' groups performs a decentralized manner and accommodated membership dynamically. Moreover, due to lack of centralized control, MANETs' groups are inherently insecure and vulnerable to attacks from both within and outside the groups. Such features make access control more challenging in MANETs. Recently, several researchers have proposed group access control mechanisms in MANETs based on a variety of threshold signatures. However, these mechanisms cannot actually satisfy MANETs' dynamic environments. This is because the threshold-based mechanisms cannot be achieved when the number of members is not up to the threshold value. Hence, by combining the efficient elliptic curve cryptosystem, self-certified public key cryptosystem and secure filter technique, we construct dynamic key management schemes based on hierarchical clustering for securing group access control in MANETs. Specifically, the proposed schemes can constantly accomplish secure group access control only by renewing the secure filters of few cluster heads, when a cluster head joins or leaves a cross-cluster. In such a new way, we can find that the proposed group access control scheme can be very effective for securing practical applications in MANETs.

  4. Secure chaotic map based block cryptosystem with application to camera sensor networks.

    PubMed

    Guo, Xianfeng; Zhang, Jiashu; Khan, Muhammad Khurram; Alghathbar, Khaled

    2011-01-01

    Recently, Wang et al. presented an efficient logistic map based block encryption system. The encryption system employs feedback ciphertext to achieve plaintext dependence of sub-keys. Unfortunately, we discovered that their scheme is unable to withstand key stream attack. To improve its security, this paper proposes a novel chaotic map based block cryptosystem. At the same time, a secure architecture for camera sensor network is constructed. The network comprises a set of inexpensive camera sensors to capture the images, a sink node equipped with sufficient computation and storage capabilities and a data processing server. The transmission security between the sink node and the server is gained by utilizing the improved cipher. Both theoretical analysis and simulation results indicate that the improved algorithm can overcome the flaws and maintain all the merits of the original cryptosystem. In addition, computational costs and efficiency of the proposed scheme are encouraging for the practical implementation in the real environment as well as camera sensor network.

  5. A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism

    NASA Astrophysics Data System (ADS)

    Chen, Jun-xin; Zhu, Zhi-liang; Fu, Chong; Yu, Hai; Zhang, Li-bo

    2015-03-01

    In recent years, a variety of chaos-based image cryptosystems have been investigated to meet the increasing demand for real-time secure image transmission. Most of them are based on permutation-diffusion architecture, in which permutation and diffusion are two independent procedures with fixed control parameters. This property results in two flaws. (1) At least two chaotic state variables are required for encrypting one plain pixel, in permutation and diffusion stages respectively. Chaotic state variables produced with high computation complexity are not sufficiently used. (2) The key stream solely depends on the secret key, and hence the cryptosystem is vulnerable against known/chosen-plaintext attacks. In this paper, a fast chaos-based image encryption scheme with a dynamic state variables selection mechanism is proposed to enhance the security and promote the efficiency of chaos-based image cryptosystems. Experimental simulations and extensive cryptanalysis have been carried out and the results prove the superior security and high efficiency of the scheme.

  6. Secure Chaotic Map Based Block Cryptosystem with Application to Camera Sensor Networks

    PubMed Central

    Guo, Xianfeng; Zhang, Jiashu; Khan, Muhammad Khurram; Alghathbar, Khaled

    2011-01-01

    Recently, Wang et al. presented an efficient logistic map based block encryption system. The encryption system employs feedback ciphertext to achieve plaintext dependence of sub-keys. Unfortunately, we discovered that their scheme is unable to withstand key stream attack. To improve its security, this paper proposes a novel chaotic map based block cryptosystem. At the same time, a secure architecture for camera sensor network is constructed. The network comprises a set of inexpensive camera sensors to capture the images, a sink node equipped with sufficient computation and storage capabilities and a data processing server. The transmission security between the sink node and the server is gained by utilizing the improved cipher. Both theoretical analysis and simulation results indicate that the improved algorithm can overcome the flaws and maintain all the merits of the original cryptosystem. In addition, computational costs and efficiency of the proposed scheme are encouraging for the practical implementation in the real environment as well as camera sensor network. PMID:22319371

  7. Modular multiplication in GF(p) for public-key cryptography

    NASA Astrophysics Data System (ADS)

    Olszyna, Jakub

    Modular multiplication forms the basis of modular exponentiation which is the core operation of the RSA cryptosystem. It is also present in many other cryptographic algorithms including those based on ECC and HECC. Hence, an efficient implementation of PKC relies on efficient implementation of modular multiplication. The paper presents a survey of most common algorithms for modular multiplication along with hardware architectures especially suitable for cryptographic applications in energy constrained environments. The motivation for studying low-power and areaefficient modular multiplication algorithms comes from enabling public-key security for ultra-low power devices that can perform under constrained environments like wireless sensor networks. Serial architectures for GF(p) are analyzed and presented. Finally proposed architectures are verified and compared according to the amount of power dissipated throughout the operation.

  8. A chaotic cryptosystem for images based on Henon and Arnold cat map.

    PubMed

    Soleymani, Ali; Nordin, Md Jan; Sundararajan, Elankovan

    2014-01-01

    The rapid evolution of imaging and communication technologies has transformed images into a widespread data type. Different types of data, such as personal medical information, official correspondence, or governmental and military documents, are saved and transmitted in the form of images over public networks. Hence, a fast and secure cryptosystem is needed for high-resolution images. In this paper, a novel encryption scheme is presented for securing images based on Arnold cat and Henon chaotic maps. The scheme uses Arnold cat map for bit- and pixel-level permutations on plain and secret images, while Henon map creates secret images and specific parameters for the permutations. Both the encryption and decryption processes are explained, formulated, and graphically presented. The results of security analysis of five different images demonstrate the strength of the proposed cryptosystem against statistical, brute force and differential attacks. The evaluated running time for both encryption and decryption processes guarantee that the cryptosystem can work effectively in real-time applications.

  9. A Chaotic Cryptosystem for Images Based on Henon and Arnold Cat Map

    PubMed Central

    Sundararajan, Elankovan

    2014-01-01

    The rapid evolution of imaging and communication technologies has transformed images into a widespread data type. Different types of data, such as personal medical information, official correspondence, or governmental and military documents, are saved and transmitted in the form of images over public networks. Hence, a fast and secure cryptosystem is needed for high-resolution images. In this paper, a novel encryption scheme is presented for securing images based on Arnold cat and Henon chaotic maps. The scheme uses Arnold cat map for bit- and pixel-level permutations on plain and secret images, while Henon map creates secret images and specific parameters for the permutations. Both the encryption and decryption processes are explained, formulated, and graphically presented. The results of security analysis of five different images demonstrate the strength of the proposed cryptosystem against statistical, brute force and differential attacks. The evaluated running time for both encryption and decryption processes guarantee that the cryptosystem can work effectively in real-time applications. PMID:25258724

  10. Protecting Information

    NASA Astrophysics Data System (ADS)

    Loepp, Susan; Wootters, William K.

    2006-09-01

    For many everyday transmissions, it is essential to protect digital information from noise or eavesdropping. This undergraduate introduction to error correction and cryptography is unique in devoting several chapters to quantum cryptography and quantum computing, thus providing a context in which ideas from mathematics and physics meet. By covering such topics as Shor's quantum factoring algorithm, this text informs the reader about current thinking in quantum information theory and encourages an appreciation of the connections between mathematics and science.Of particular interest are the potential impacts of quantum physics:(i) a quantum computer, if built, could crack our currently used public-key cryptosystems; and (ii) quantum cryptography promises to provide an alternative to these cryptosystems, basing its security on the laws of nature rather than on computational complexity. No prior knowledge of quantum mechanics is assumed, but students should have a basic knowledge of complex numbers, vectors, and matrices. Accessible to readers familiar with matrix algebra, vector spaces and complex numbers First undergraduate text to cover cryptography, error-correction, and quantum computation together Features exercises designed to enhance understanding, including a number of computational problems, available from www.cambridge.org/9780521534765

  11. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Brickell, E.F.; Simmons, G.J.

    In the period since 1976, when Diffie and Hellman published the first discussion of two-key cryptography to appear in the open literature, only a handful of two-key cryptoalgorithms have been proposed - two of which are based on the knapsack problem. Consequently there was enormous interest when Shamir announced in early 1982 a cryptanalytic technique that could break many Merkle-Hellman knapsacks. In a rapid sequence of developments, Simmons and Brickell, Adleman, and Lagarias all announced other attacks on knapsack-based cryptosystems that were either computationally much more efficient or else directed at other knapsack schemes such as the Graham-Shamir or iteratedmore » systems. This paper analyzes the common features of knapsack-based cryptosystems and presents all of the cryptanalytic attacks made in 1982 from a unified viewpoint.« less

  12. Relativistic quantum cryptography

    NASA Astrophysics Data System (ADS)

    Molotkov, S. N.; Nazin, S. S.

    2003-07-01

    The problem of unconditional security of quantum cryptography (i.e. the security which is guaranteed by the fundamental laws of nature rather than by technical limitations) is one of the central points in quantum information theory. We propose a relativistic quantum cryptosystem and prove its unconditional security against any eavesdropping attempts. Relativistitic causality arguments allow to demonstrate the security of the system in a simple way. Since the proposed protocol does not empoly collective measurements and quantum codes, the cryptosystem can be experimentally realized with the present state-of-art in fiber optics technologies. The proposed cryptosystem employs only the individual measurements and classical codes and, in addition, the key distribution problem allows to postpone the choice of the state encoding scheme until after the states are already received instead of choosing it before sending the states into the communication channel (i.e. to employ a sort of "antedate" coding).

  13. Optical image encryption using fresnel zone plate mask based on fast walsh hadamard transform

    NASA Astrophysics Data System (ADS)

    Khurana, Mehak; Singh, Hukum

    2018-05-01

    A new symmetric encryption technique using Fresnel Zone Plate (FZP) based on Fast Walsh Hadamard Transform (FWHT) is proposed for security enhancement. In this technique, bits of plain image is randomized by shuffling the bits randomly. The obtained scrambled image is then masked with FZP using symmetric encryption in FWHT domain to obtain final encrypted image. FWHT has been used in the cryptosystem so as to protect image data from the quantization error and for reconstructing the image perfectly. The FZP used in proposed scheme increases the key space and makes it robust to many traditional attacks. The effectiveness and robustness of the proposed cryptosystem has been analyzed on the basis of various parameters by simulating on MATLAB 8.1.0 (R2012b). The experimental results are provided to highlight suitability of the proposed cryptosystem and prove that the system is secure.

  14. Random ambience using high fidelity images

    NASA Astrophysics Data System (ADS)

    Abu, Nur Azman; Sahib, Shahrin

    2011-06-01

    Most of the secure communication nowadays mandates true random keys as an input. These operations are mostly designed and taken care of by the developers of the cryptosystem. Due to the nature of confidential crypto development today, pseudorandom keys are typically designed and still preferred by the developers of the cryptosystem. However, these pseudorandom keys are predictable, periodic and repeatable, hence they carry minimal entropy. True random keys are believed to be generated only via hardware random number generators. Careful statistical analysis is still required to have any confidence the process and apparatus generates numbers that are sufficiently random to suit the cryptographic use. In this underlying research, each moment in life is considered unique in itself. The random key is unique for the given moment generated by the user whenever he or she needs the random keys in practical secure communication. An ambience of high fidelity digital image shall be tested for its randomness according to the NIST Statistical Test Suite. Recommendation on generating a simple 4 megabits per second random cryptographic keys live shall be reported.

  15. Nonlinear optical cryptosystem based on joint Fresnel transform correlator under vector wave illumination

    NASA Astrophysics Data System (ADS)

    Xueju, Shen; Chao, Lin; Xiao, Zou; Jianjun, Cai

    2015-05-01

    We present a nonlinear optical cryptosystem with multi-dimensional keys including phase, polarization and diffraction distance. To make full use of the degrees of freedom that optical processing offers, an elaborately designed vector wave with both a space-variant phase and locally linear polarization is generated with a common-path interferometer for illumination. The joint transform correlator in the Fresnel domain, implemented with a double optical wedge, is utilized as the encryption framework which provides an additional key known as the Fresnel diffraction distance. Two nonlinear operations imposed on the recorded joint Fresnel power distribution (JFPD) by a charge coupled device (CCD) are adopted. The first one is the division of power distribution of the reference window random function which is previously proposed by researchers and can improve the quality of the decrypted image. The second one is the recording of a hybrid JFPD using a micro-polarizers array with orthogonal and random transmissive axes attached to the CCD. Then the hybrid JFPD is further scrambled by substituting random noise for partial power distribution. The two nonlinear operations break the linearity of this cryptosystem and provide ultra security. We verify our proposal using a quick response code for noise-free recovery.

  16. Hybrid Cryptosystem Using Tiny Encryption Algorithm and LUC Algorithm

    NASA Astrophysics Data System (ADS)

    Rachmawati, Dian; Sharif, Amer; Jaysilen; Andri Budiman, Mohammad

    2018-01-01

    Security becomes a very important issue in data transmission and there are so many methods to make files more secure. One of that method is cryptography. Cryptography is a method to secure file by writing the hidden code to cover the original file. Therefore, if the people do not involve in cryptography, they cannot decrypt the hidden code to read the original file. There are many methods are used in cryptography, one of that method is hybrid cryptosystem. A hybrid cryptosystem is a method that uses a symmetric algorithm to secure the file and use an asymmetric algorithm to secure the symmetric algorithm key. In this research, TEA algorithm is used as symmetric algorithm and LUC algorithm is used as an asymmetric algorithm. The system is tested by encrypting and decrypting the file by using TEA algorithm and using LUC algorithm to encrypt and decrypt the TEA key. The result of this research is by using TEA Algorithm to encrypt the file, the cipher text form is the character from ASCII (American Standard for Information Interchange) table in the form of hexadecimal numbers and the cipher text size increase by sixteen bytes as the plaintext length is increased by eight characters.

  17. Unbounded and revocable hierarchical identity-based encryption with adaptive security, decryption key exposure resistant, and short public parameters

    PubMed Central

    Wang, Baosheng; Tao, Jing

    2018-01-01

    Revocation functionality and hierarchy key delegation are two necessary and crucial requirements to identity-based cryptosystems. Revocable hierarchical identity-based encryption (RHIBE) has attracted a lot of attention in recent years, many RHIBE schemes have been proposed but shown to be either insecure or bounded where they have to fix the maximum hierarchical depth of RHIBE at setup. In this paper, we propose a new unbounded RHIBE scheme with decryption key exposure resilience and with short public system parameters, and prove our RHIBE scheme to be adaptively secure. Our system model is scalable inherently to accommodate more levels of user adaptively with no adding workload or restarting the system. By carefully designing the hybrid games, we overcome the subtle obstacle in applying the dual system encryption methodology for the unbounded and revocable HIBE. To the best of our knowledge, this is the first construction of adaptively secure unbounded RHIBE scheme. PMID:29649326

  18. Efficient reversible data hiding in encrypted image with public key cryptosystem

    NASA Astrophysics Data System (ADS)

    Xiang, Shijun; Luo, Xinrong

    2017-12-01

    This paper proposes a new reversible data hiding scheme for encrypted images by using homomorphic and probabilistic properties of Paillier cryptosystem. The proposed method can embed additional data directly into encrypted image without any preprocessing operations on original image. By selecting two pixels as a group for encryption, data hider can retrieve the absolute differences of groups of two pixels by employing a modular multiplicative inverse method. Additional data can be embedded into encrypted image by shifting histogram of the absolute differences by using the homomorphic property in encrypted domain. On the receiver side, legal user can extract the marked histogram in encrypted domain in the same way as data hiding procedure. Then, the hidden data can be extracted from the marked histogram and the encrypted version of original image can be restored by using inverse histogram shifting operations. Besides, the marked absolute differences can be computed after decryption for extraction of additional data and restoration of original image. Compared with previous state-of-the-art works, the proposed scheme can effectively avoid preprocessing operations before encryption and can efficiently embed and extract data in encrypted domain. The experiments on the standard image files also certify the effectiveness of the proposed scheme.

  19. Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks.

    PubMed

    Park, YoHan; Park, YoungHo

    2016-12-14

    Secure communication is a significant issue in wireless sensor networks. User authentication and key agreement are essential for providing a secure system, especially in user-oriented mobile services. It is also necessary to protect the identity of each individual in wireless environments to avoid personal privacy concerns. Many authentication and key agreement schemes utilize a smart card in addition to a password to support security functionalities. However, these schemes often fail to provide security along with privacy. In 2015, Chang et al. analyzed the security vulnerabilities of previous schemes and presented the two-factor authentication scheme that provided user privacy by using dynamic identities. However, when we cryptanalyzed Chang et al.'s scheme, we found that it does not provide sufficient security for wireless sensor networks and fails to provide accurate password updates. This paper proposes a security-enhanced authentication and key agreement scheme to overcome these security weaknesses using biometric information and an elliptic curve cryptosystem. We analyze the security of the proposed scheme against various attacks and check its viability in the mobile environment.

  20. Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks

    PubMed Central

    Park, YoHan; Park, YoungHo

    2016-01-01

    Secure communication is a significant issue in wireless sensor networks. User authentication and key agreement are essential for providing a secure system, especially in user-oriented mobile services. It is also necessary to protect the identity of each individual in wireless environments to avoid personal privacy concerns. Many authentication and key agreement schemes utilize a smart card in addition to a password to support security functionalities. However, these schemes often fail to provide security along with privacy. In 2015, Chang et al. analyzed the security vulnerabilities of previous schemes and presented the two-factor authentication scheme that provided user privacy by using dynamic identities. However, when we cryptanalyzed Chang et al.’s scheme, we found that it does not provide sufficient security for wireless sensor networks and fails to provide accurate password updates. This paper proposes a security-enhanced authentication and key agreement scheme to overcome these security weaknesses using biometric information and an elliptic curve cryptosystem. We analyze the security of the proposed scheme against various attacks and check its viability in the mobile environment. PMID:27983616

  1. RSA cryptosystem with fuzzy set theory for encryption and decryption

    NASA Astrophysics Data System (ADS)

    Abdullah, Kamilah; Bakar, Sumarni Abu; Kamis, Nor Hanimah; Aliamis, Hardi

    2017-11-01

    In the communication area, user is more focus on communication instead of security of the data communication. Many cryptosystems have been improvised to achieved the effectiveness in communication. RSA cryptosystem is one of well-known cryptosystem used to secure the information and protect the communication by providing a difficulty to the attackers specifically in encryption and decryption. As need arises for guarantee the security of the cryptosystem while the communication must be ensured, we propose a new RSA cryptosystem which is based on fuzzy set theory whereby the plaintext and the ciphertext are in terms of Triangular Fuzzy Number (TFN). Decryption result shows that the message obtained is the same as the original plaintext. This study reveals that the fuzzy set theory is suitable to be used as an alternative tool in securing other cryptosystem.

  2. Asymmetric multiple-image encryption based on the cascaded fractional Fourier transform

    NASA Astrophysics Data System (ADS)

    Li, Yanbin; Zhang, Feng; Li, Yuanchao; Tao, Ran

    2015-09-01

    A multiple-image cryptosystem is proposed based on the cascaded fractional Fourier transform. During an encryption procedure, each of the original images is directly separated into two phase masks. A portion of the masks is subsequently modulated into an interim mask, which is encrypted into the ciphertext image; the others are used as the encryption keys. Using phase truncation in the fractional Fourier domain, one can use an asymmetric cryptosystem to produce a real-valued noise-like ciphertext, while a legal user can reconstruct all of the original images using a different group of phase masks. The encryption key is an indivisible part of the corresponding original image and is still useful during decryption. The proposed system has high resistance to various potential attacks, including the chosen-plaintext attack. Numerical simulations also demonstrate the security and feasibility of the proposed scheme.

  3. Discussion and a new method of optical cryptosystem based on interference

    NASA Astrophysics Data System (ADS)

    Lu, Dajiang; He, Wenqi; Liao, Meihua; Peng, Xiang

    2017-02-01

    A discussion and an objective security analysis of the well-known optical image encryption based on interference are presented in this paper. A new method is also proposed to eliminate the security risk of the original cryptosystem. For a possible practical application, we expand this new method into a hierarchical authentication scheme. In this authentication system, with a pre-generated and fixed random phase lock, different target images indicating different authentication levels are analytically encoded into corresponding phase-only masks (phase keys) and amplitude-only masks (amplitude keys). For the authentication process, a legal user can obtain a specified target image at the output plane if his/her phase key, and amplitude key, which should be settled close against the fixed internal phase lock, are respectively illuminated by two coherent beams. By comparing the target image with all the standard certification images in the database, the system can thus verify the user's legality even his/her identity level. Moreover, in despite of the internal phase lock of this system being fixed, the crosstalk between different pairs of keys held by different users is low. Theoretical analysis and numerical simulation are both provided to demonstrate the validity of this method.

  4. Known-plaintext attack on the double phase encoding and its implementation with parallel hardware

    NASA Astrophysics Data System (ADS)

    Wei, Hengzheng; Peng, Xiang; Liu, Haitao; Feng, Songlin; Gao, Bruce Z.

    2008-03-01

    A known-plaintext attack on the double phase encryption scheme implemented with parallel hardware is presented. The double random phase encoding (DRPE) is one of the most representative optical cryptosystems developed in mid of 90's and derives quite a few variants since then. Although the DRPE encryption system has a strong power resisting to a brute-force attack, the inherent architecture of DRPE leaves a hidden trouble due to its linearity nature. Recently the real security strength of this opto-cryptosystem has been doubted and analyzed from the cryptanalysis point of view. In this presentation, we demonstrate that the optical cryptosystems based on DRPE architecture are vulnerable to known-plain text attack. With this attack the two encryption keys in the DRPE can be accessed with the help of the phase retrieval technique. In our approach, we adopt hybrid input-output algorithm (HIO) to recover the random phase key in the object domain and then infer the key in frequency domain. Only a plaintext-ciphertext pair is sufficient to create vulnerability. Moreover this attack does not need to select particular plaintext. The phase retrieval technique based on HIO is an iterative process performing Fourier transforms, so it fits very much into the hardware implementation of the digital signal processor (DSP). We make use of the high performance DSP to accomplish the known-plaintext attack. Compared with the software implementation, the speed of the hardware implementation is much fast. The performance of this DSP-based cryptanalysis system is also evaluated.

  5. Improved Fake-State Attack to the Quantum Key Distribution Systems

    NASA Astrophysics Data System (ADS)

    Zhang, Sheng; Wang, Jian; Tang, Chao-jing

    2012-09-01

    It has been showed that most commercial quantum cryptosystems are vulnerable to the fake-state attacks, which employ the loophole that the avalanche photodiodes as single photon detectors still produce detection events in the linear mode. However, previous fake-state attacks may be easily prevented by either installing a watch dog or reconfiguring the dead-time assigning component. In this paper, we present a new technique to counteract the after-pulse effect ever enhanced by the fake-state attacks, in order to lower the quantum bit error rate. Obviously, it is more difficult to detect the presented attack scheme. Indeed, it contributes to promoting of implementing a secure quantum cryptosystem in real life.

  6. Color image cryptosystem using Fresnel diffraction and phase modulation in an expanded fractional Fourier transform domain

    NASA Astrophysics Data System (ADS)

    Chen, Hang; Liu, Zhengjun; Chen, Qi; Blondel, Walter; Varis, Pierre

    2018-05-01

    In this letter, what we believe is a new technique for optical color image encryption by using Fresnel diffraction and a phase modulation in an extended fractional Fourier transform domain is proposed. Different from the RGB component separation based method, the color image is converted into one component by improved Chirikov mapping. The encryption system is addressed with Fresnel diffraction and phase modulation. A pair of lenses is placed into the fractional Fourier transform system for the modulation of beam propagation. The structure parameters of the optical system and parameters in Chirikov mapping serve as extra keys. Some numerical simulations are given to test the validity of the proposed cryptosystem.

  7. Color image encryption by using Yang-Gu mixture amplitude-phase retrieval algorithm in gyrator transform domain and two-dimensional Sine logistic modulation map

    NASA Astrophysics Data System (ADS)

    Sui, Liansheng; Liu, Benqing; Wang, Qiang; Li, Ye; Liang, Junli

    2015-12-01

    A color image encryption scheme is proposed based on Yang-Gu mixture amplitude-phase retrieval algorithm and two-coupled logistic map in gyrator transform domain. First, the color plaintext image is decomposed into red, green and blue components, which are scrambled individually by three random sequences generated by using the two-dimensional Sine logistic modulation map. Second, each scrambled component is encrypted into a real-valued function with stationary white noise distribution in the iterative amplitude-phase retrieval process in the gyrator transform domain, and then three obtained functions are considered as red, green and blue channels to form the color ciphertext image. Obviously, the ciphertext image is real-valued function and more convenient for storing and transmitting. In the encryption and decryption processes, the chaotic random phase mask generated based on logistic map is employed as the phase key, which means that only the initial values are used as private key and the cryptosystem has high convenience on key management. Meanwhile, the security of the cryptosystem is enhanced greatly because of high sensitivity of the private keys. Simulation results are presented to prove the security and robustness of the proposed scheme.

  8. Image encryption technique based on new two-dimensional fractional-order discrete chaotic map and Menezes–Vanstone elliptic curve cryptosystem

    NASA Astrophysics Data System (ADS)

    Liu, Zeyu; Xia, Tiecheng; Wang, Jinbo

    2018-03-01

    We propose a new fractional two-dimensional triangle function combination discrete chaotic map (2D-TFCDM) with the discrete fractional difference. Moreover, the chaos behaviors of the proposed map are observed and the bifurcation diagrams, the largest Lyapunov exponent plot, and the phase portraits are derived, respectively. Finally, with the secret keys generated by Menezes–Vanstone elliptic curve cryptosystem, we apply the discrete fractional map into color image encryption. After that, the image encryption algorithm is analyzed in four aspects and the result indicates that the proposed algorithm is more superior than the other algorithms. Project supported by the National Natural Science Foundation of China (Grant Nos. 61072147 and 11271008).

  9. An efficient and provable secure revocable identity-based encryption scheme.

    PubMed

    Wang, Changji; Li, Yuan; Xia, Xiaonan; Zheng, Kangjia

    2014-01-01

    Revocation functionality is necessary and crucial to identity-based cryptosystems. Revocable identity-based encryption (RIBE) has attracted a lot of attention in recent years, many RIBE schemes have been proposed in the literature but shown to be either insecure or inefficient. In this paper, we propose a new scalable RIBE scheme with decryption key exposure resilience by combining Lewko and Waters' identity-based encryption scheme and complete subtree method, and prove our RIBE scheme to be semantically secure using dual system encryption methodology. Compared to existing scalable and semantically secure RIBE schemes, our proposed RIBE scheme is more efficient in term of ciphertext size, public parameters size and decryption cost at price of a little looser security reduction. To the best of our knowledge, this is the first construction of scalable and semantically secure RIBE scheme with constant size public system parameters.

  10. Symmetric and asymmetric hybrid cryptosystem based on compressive sensing and computer generated holography

    NASA Astrophysics Data System (ADS)

    Ma, Lihong; Jin, Weimin

    2018-01-01

    A novel symmetric and asymmetric hybrid optical cryptosystem is proposed based on compressive sensing combined with computer generated holography. In this method there are six encryption keys, among which two decryption phase masks are different from the two random phase masks used in the encryption process. Therefore, the encryption system has the feature of both symmetric and asymmetric cryptography. On the other hand, because computer generated holography can flexibly digitalize the encrypted information and compressive sensing can significantly reduce data volume, what is more, the final encryption image is real function by phase truncation, the method favors the storage and transmission of the encryption data. The experimental results demonstrate that the proposed encryption scheme boosts the security and has high robustness against noise and occlusion attacks.

  11. Encryption method based on pseudo random spatial light modulation for single-fibre data transmission

    NASA Astrophysics Data System (ADS)

    Kowalski, Marcin; Zyczkowski, Marek

    2017-11-01

    Optical cryptosystems can provide encryption and sometimes compression simultaneously. They are increasingly attractive for information securing especially for image encryption. Our studies shown that the optical cryptosystems can be used to encrypt optical data transmission. We propose and study a new method for securing fibre data communication. The paper presents a method for optical encryption of data transmitted with a single optical fibre. The encryption process relies on pseudo-random spatial light modulation, combination of two encryption keys and the Compressed Sensing framework. A linear combination of light pulses with pseudo-random patterns provides a required encryption performance. We propose an architecture to transmit the encrypted data through the optical fibre. The paper describes the method, presents the theoretical analysis, design of physical model and results of experiment.

  12. Hybrid cryptosystem implementation using fast data encipherment algorithm (FEAL) and goldwasser-micali algorithm for file security

    NASA Astrophysics Data System (ADS)

    Rachmawati, D.; Budiman, M. A.; Siburian, W. S. E.

    2018-05-01

    On the process of exchanging files, security is indispensable to avoid the theft of data. Cryptography is one of the sciences used to secure the data by way of encoding. Fast Data Encipherment Algorithm (FEAL) is a block cipher symmetric cryptographic algorithms. Therefore, the file which wants to protect is encrypted and decrypted using the algorithm FEAL. To optimize the security of the data, session key that is utilized in the algorithm FEAL encoded with the Goldwasser-Micali algorithm, which is an asymmetric cryptographic algorithm and using probabilistic concept. In the encryption process, the key was converted into binary form. The selection of values of x that randomly causes the results of the cipher key is different for each binary value. The concept of symmetry and asymmetry algorithm merger called Hybrid Cryptosystem. The use of the algorithm FEAL and Goldwasser-Micali can restore the message to its original form and the algorithm FEAL time required for encryption and decryption is directly proportional to the length of the message. However, on Goldwasser- Micali algorithm, the length of the message is not directly proportional to the time of encryption and decryption.

  13. Space division multiplexing chip-to-chip quantum key distribution.

    PubMed

    Bacco, Davide; Ding, Yunhong; Dalgaard, Kjeld; Rottwitt, Karsten; Oxenløwe, Leif Katsuo

    2017-09-29

    Quantum cryptography is set to become a key technology for future secure communications. However, to get maximum benefit in communication networks, transmission links will need to be shared among several quantum keys for several independent users. Such links will enable switching in quantum network nodes of the quantum keys to their respective destinations. In this paper we present an experimental demonstration of a photonic integrated silicon chip quantum key distribution protocols based on space division multiplexing (SDM), through multicore fiber technology. Parallel and independent quantum keys are obtained, which are useful in crypto-systems and future quantum network.

  14. A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem.

    PubMed

    Zhao, Zhenguo

    2014-05-01

    With the fast advancement of the wireless communication technology and the widespread use of medical systems, the radio frequency identification (RFID) technology has been widely used in healthcare environments. As the first important protocol for ensuring secure communication in healthcare environment, the RFID authentication protocols derive more and more attentions. Most of RFID authentication protocols are based on hash function or symmetric cryptography. To get more security properties, elliptic curve cryptosystem (ECC) has been used in the design of RFID authentication protocol. Recently, Liao and Hsiao proposed a new RFID authentication protocol using ECC and claimed their protocol could withstand various attacks. In this paper, we will show that their protocol suffers from the key compromise problem, i.e. an adversary could get the private key stored in the tag. To enhance the security, we propose a new RFID authentication protocol using ECC. Detailed analysis shows the proposed protocol not only could overcome weaknesses in Liao and Hsiao's protocol but also has the same performance. Therefore, it is more suitable for healthcare environments.

  15. A new method for generating an invariant iris private key based on the fuzzy vault system.

    PubMed

    Lee, Youn Joo; Park, Kang Ryoung; Lee, Sung Joo; Bae, Kwanghyuk; Kim, Jaihie

    2008-10-01

    Cryptographic systems have been widely used in many information security applications. One main challenge that these systems have faced has been how to protect private keys from attackers. Recently, biometric cryptosystems have been introduced as a reliable way of concealing private keys by using biometric data. A fuzzy vault refers to a biometric cryptosystem that can be used to effectively protect private keys and to release them only when legitimate users enter their biometric data. In biometric systems, a critical problem is storing biometric templates in a database. However, fuzzy vault systems do not need to directly store these templates since they are combined with private keys by using cryptography. Previous fuzzy vault systems were designed by using fingerprint, face, and so on. However, there has been no attempt to implement a fuzzy vault system that used an iris. In biometric applications, it is widely known that an iris can discriminate between persons better than other biometric modalities. In this paper, we propose a reliable fuzzy vault system based on local iris features. We extracted multiple iris features from multiple local regions in a given iris image, and the exact values of the unordered set were then produced using the clustering method. To align the iris templates with the new input iris data, a shift-matching technique was applied. Experimental results showed that 128-bit private keys were securely and robustly generated by using any given iris data without requiring prealignment.

  16. File text security using Hybrid Cryptosystem with Playfair Cipher Algorithm and Knapsack Naccache-Stern Algorithm

    NASA Astrophysics Data System (ADS)

    Amalia; Budiman, M. A.; Sitepu, R.

    2018-03-01

    Cryptography is one of the best methods to keep the information safe from security attack by unauthorized people. At present, Many studies had been done by previous researchers to generate a more robust cryptographic algorithm to provide high security for data communication. To strengthen data security, one of the methods is hybrid cryptosystem method that combined symmetric and asymmetric algorithm. In this study, we observed a hybrid cryptosystem method contain Modification Playfair Cipher 16x16 algorithm as a symmetric algorithm and Knapsack Naccache-Stern as an asymmetric algorithm. We observe a running time of this hybrid algorithm with some of the various experiments. We tried different amount of characters to be tested which are 10, 100, 1000, 10000 and 100000 characters and we also examined the algorithm with various key’s length which are 10, 20, 30, 40 of key length. The result of our study shows that the processing time for encryption and decryption process each algorithm is linearly proportional, it means the longer messages character then, the more significant times needed to encrypt and decrypt the messages. The encryption running time of Knapsack Naccache-Stern algorithm takes a longer time than its decryption, while the encryption running time of modification Playfair Cipher 16x16 algorithm takes less time than its decryption.

  17. Step to improve neural cryptography against flipping attacks.

    PubMed

    Zhou, Jiantao; Xu, Qinzhen; Pei, Wenjiang; He, Zhenya; Szu, Harold

    2004-12-01

    Synchronization of neural networks by mutual learning has been demonstrated to be possible for constructing key exchange protocol over public channel. However, the neural cryptography schemes presented so far are not the securest under regular flipping attack (RFA) and are completely insecure under majority flipping attack (MFA). We propose a scheme by splitting the mutual information and the training process to improve the security of neural cryptosystem against flipping attacks. Both analytical and simulation results show that the success probability of RFA on the proposed scheme can be decreased to the level of brute force attack (BFA) and the success probability of MFA still decays exponentially with the weights' level L. The synchronization time of the parties also remains polynomial with L. Moreover, we analyze the security under an advanced flipping attack.

  18. Application of homomorphism to secure image sharing

    NASA Astrophysics Data System (ADS)

    Islam, Naveed; Puech, William; Hayat, Khizar; Brouzet, Robert

    2011-09-01

    In this paper, we present a new approach for sharing images between l players by exploiting the additive and multiplicative homomorphic properties of two well-known public key cryptosystems, i.e. RSA and Paillier. Contrary to the traditional schemes, the proposed approach employs secret sharing in a way that limits the influence of the dealer over the protocol and allows each player to participate with the help of his key-image. With the proposed approach, during the encryption step, each player encrypts his own key-image using the dealer's public key. The dealer encrypts the secret-to-be-shared image with the same public key and then, the l encrypted key-images plus the encrypted to-be shared image are multiplied homomorphically to get another encrypted image. After this step, the dealer can safely get a scrambled image which corresponds to the addition or multiplication of the l + 1 original images ( l key-images plus the secret image) because of the additive homomorphic property of the Paillier algorithm or multiplicative homomorphic property of the RSA algorithm. When the l players want to extract the secret image, they do not need to use keys and the dealer has no role. Indeed, with our approach, to extract the secret image, the l players need only to subtract their own key-image with no specific order from the scrambled image. Thus, the proposed approach provides an opportunity to use operators like multiplication on encrypted images for the development of a secure privacy preserving protocol in the image domain. We show that it is still possible to extract a visible version of the secret image with only l-1 key-images (when one key-image is missing) or when the l key-images used for the extraction are different from the l original key-images due to a lossy compression for example. Experimental results and security analysis verify and prove that the proposed approach is secure from cryptographic viewpoint.

  19. Provably secure Rabin-p cryptosystem in hybrid setting

    NASA Astrophysics Data System (ADS)

    Asbullah, Muhammad Asyraf; Ariffin, Muhammad Rezal Kamel

    2016-06-01

    In this work, we design an efficient and provably secure hybrid cryptosystem depicted by a combination of the Rabin-p cryptosystem with an appropriate symmetric encryption scheme. We set up a hybrid structure which is proven secure in the sense of indistinguishable against the chosen-ciphertext attack. We presume that the integer factorization problem is hard and the hash function that modeled as a random function.

  20. Enhancing Security of Double Random Phase Encoding Based on Random S-Box

    NASA Astrophysics Data System (ADS)

    Girija, R.; Singh, Hukum

    2018-06-01

    In this paper, we propose a novel asymmetric cryptosystem for double random phase encoding (DRPE) using random S-Box. While utilising S-Box separately is not reliable and DRPE does not support non-linearity, so, our system unites the effectiveness of S-Box with an asymmetric system of DRPE (through Fourier transform). The uniqueness of proposed cryptosystem lies on employing high sensitivity dynamic S-Box for our DRPE system. The randomness and scalability achieved due to applied technique is an additional feature of the proposed solution. The firmness of random S-Box is investigated in terms of performance parameters such as non-linearity, strict avalanche criterion, bit independence criterion, linear and differential approximation probabilities etc. S-Boxes convey nonlinearity to cryptosystems which is a significant parameter and very essential for DRPE. The strength of proposed cryptosystem has been analysed using various parameters such as MSE, PSNR, correlation coefficient analysis, noise analysis, SVD analysis, etc. Experimental results are conferred in detail to exhibit proposed cryptosystem is highly secure.

  1. Compression-RSA: New approach of encryption and decryption method

    NASA Astrophysics Data System (ADS)

    Hung, Chang Ee; Mandangan, Arif

    2013-04-01

    Rivest-Shamir-Adleman (RSA) cryptosystem is a well known asymmetric cryptosystem and it has been applied in a very wide area. Many researches with different approaches have been carried out in order to improve the security and performance of RSA cryptosystem. The enhancement of the performance of RSA cryptosystem is our main interest. In this paper, we propose a new method to increase the efficiency of RSA by shortening the number of plaintext before it goes under encryption process without affecting the original content of the plaintext. Concept of simple Continued Fraction and the new special relationship between it and Euclidean Algorithm have been applied on this newly proposed method. By reducing the number of plaintext-ciphertext, the encryption-decryption processes of a secret message can be accelerated.

  2. A fingerprint key binding algorithm based on vector quantization and error correction

    NASA Astrophysics Data System (ADS)

    Li, Liang; Wang, Qian; Lv, Ke; He, Ning

    2012-04-01

    In recent years, researches on seamless combination cryptosystem with biometric technologies, e.g. fingerprint recognition, are conducted by many researchers. In this paper, we propose a binding algorithm of fingerprint template and cryptographic key to protect and access the key by fingerprint verification. In order to avoid the intrinsic fuzziness of variant fingerprints, vector quantization and error correction technique are introduced to transform fingerprint template and then bind with key, after a process of fingerprint registration and extracting global ridge pattern of fingerprint. The key itself is secure because only hash value is stored and it is released only when fingerprint verification succeeds. Experimental results demonstrate the effectiveness of our ideas.

  3. A New Color Image Encryption Scheme Using CML and a Fractional-Order Chaotic System

    PubMed Central

    Wu, Xiangjun; Li, Yang; Kurths, Jürgen

    2015-01-01

    The chaos-based image cryptosystems have been widely investigated in recent years to provide real-time encryption and transmission. In this paper, a novel color image encryption algorithm by using coupled-map lattices (CML) and a fractional-order chaotic system is proposed to enhance the security and robustness of the encryption algorithms with a permutation-diffusion structure. To make the encryption procedure more confusing and complex, an image division-shuffling process is put forward, where the plain-image is first divided into four sub-images, and then the position of the pixels in the whole image is shuffled. In order to generate initial conditions and parameters of two chaotic systems, a 280-bit long external secret key is employed. The key space analysis, various statistical analysis, information entropy analysis, differential analysis and key sensitivity analysis are introduced to test the security of the new image encryption algorithm. The cryptosystem speed is analyzed and tested as well. Experimental results confirm that, in comparison to other image encryption schemes, the new algorithm has higher security and is fast for practical image encryption. Moreover, an extensive tolerance analysis of some common image processing operations such as noise adding, cropping, JPEG compression, rotation, brightening and darkening, has been performed on the proposed image encryption technique. Corresponding results reveal that the proposed image encryption method has good robustness against some image processing operations and geometric attacks. PMID:25826602

  4. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks.

    PubMed

    Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho

    2016-08-16

    In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.'s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.'s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.

  5. Privacy-Preserving RFID Authentication Using Public Exponent Three RSA Algorithm

    NASA Astrophysics Data System (ADS)

    Kim, Yoonjeong; Ohm, Seongyong; Yi, Kang

    In this letter, we propose a privacy-preserving authentication protocol with RSA cryptosystem in an RFID environment. For both overcoming the resource restriction and strengthening security, our protocol uses only modular exponentiation with exponent three at RFID tag side, with the padded random message whose length is greater than one-sixth of the whole message length.

  6. RSA Encryption with the TI-82.

    ERIC Educational Resources Information Center

    Sigmon, Neil; Yankosky, Bill

    2002-01-01

    Description of integrating one of the most widely used cryptosystems into a mathematics course for Liberal Arts majors. Application of this cryptosystem requires understanding of the concepts of exponentiation and modular arithmetic only. (MM)

  7. Phase-retrieval attack free cryptosystem based on cylindrical asymmetric diffraction and double-random phase encoding

    NASA Astrophysics Data System (ADS)

    Wang, Jun; Li, Xiaowei; Hu, Yuhen; Wang, Qiong-Hua

    2018-03-01

    A phase-retrieval attack free cryptosystem based on the cylindrical asymmetric diffraction and double-random phase encoding (DRPE) is proposed. The plaintext is abstract as a cylinder, while the observed diffraction and holographic surfaces are concentric cylinders. Therefore, the plaintext can be encrypted through a two-step asymmetric diffraction process with double pseudo random phase masks located on the object surface and the first diffraction surface. After inverse diffraction from a holographic surface to an object surface, the plaintext can be reconstructed using a decryption process. Since the diffraction propagated from the inner cylinder to the outer cylinder is different from that of the reversed direction, the proposed cryptosystem is asymmetric and hence is free of phase-retrieval attack. Numerical simulation results demonstrate the flexibility and effectiveness of the proposed cryptosystem.

  8. A Low Cost Key Agreement Protocol Based on Binary Tree for EPCglobal Class 1 Generation 2 RFID Protocol

    NASA Astrophysics Data System (ADS)

    Jeng, Albert; Chang, Li-Chung; Chen, Sheng-Hui

    There are many protocols proposed for protecting Radio Frequency Identification (RFID) system privacy and security. A number of these protocols are designed for protecting long-term security of RFID system using symmetric key or public key cryptosystem. Others are designed for protecting user anonymity and privacy. In practice, the use of RFID technology often has a short lifespan, such as commodity check out, supply chain management and so on. Furthermore, we know that designing a long-term security architecture to protect the security and privacy of RFID tags information requires a thorough consideration from many different aspects. However, any security enhancement on RFID technology will jack up its cost which may be detrimental to its widespread deployment. Due to the severe constraints of RFID tag resources (e. g., power source, computing power, communication bandwidth) and open air communication nature of RFID usage, it is a great challenge to secure a typical RFID system. For example, computational heavy public key and symmetric key cryptography algorithms (e. g., RSA and AES) may not be suitable or over-killed to protect RFID security or privacy. These factors motivate us to research an efficient and cost effective solution for RFID security and privacy protection. In this paper, we propose a new effective generic binary tree based key agreement protocol (called BKAP) and its variations, and show how it can be applied to secure the low cost and resource constraint RFID system. This BKAP is not a general purpose key agreement protocol rather it is a special purpose protocol to protect privacy, un-traceability and anonymity in a single RFID closed system domain.

  9. Optical image encryption using chaos-based compressed sensing and phase-shifting interference in fractional wavelet domain

    NASA Astrophysics Data System (ADS)

    Liu, Qi; Wang, Ying; Wang, Jun; Wang, Qiong-Hua

    2018-02-01

    In this paper, a novel optical image encryption system combining compressed sensing with phase-shifting interference in fractional wavelet domain is proposed. To improve the encryption efficiency, the volume data of original image are decreased by compressed sensing. Then the compacted image is encoded through double random phase encoding in asymmetric fractional wavelet domain. In the encryption system, three pseudo-random sequences, generated by three-dimensional chaos map, are used as the measurement matrix of compressed sensing and two random-phase masks in the asymmetric fractional wavelet transform. It not only simplifies the keys to storage and transmission, but also enhances our cryptosystem nonlinearity to resist some common attacks. Further, holograms make our cryptosystem be immune to noises and occlusion attacks, which are obtained by two-step-only quadrature phase-shifting interference. And the compression and encryption can be achieved in the final result simultaneously. Numerical experiments have verified the security and validity of the proposed algorithm.

  10. Defense frontier analysis of quantum cryptographic systems.

    PubMed

    Slutsky, B; Rao, R; Sun, P C; Tancevski, L; Fainman, S

    1998-05-10

    When a quantum cryptographic system operates in the presence of background noise, security of the key can be recovered by a procedure called key distillation. A key-distillation scheme effective against so-called individual (bitwise-independent) eavesdropping attacks involves sacrifice of some of the data through privacy amplification. We derive the amount of data sacrifice sufficient to defend against individual eavesdropping attacks in both BB84 and B92 protocols and show in what sense the communication becomes secure as a result. We also compare the secrecy capacity of various quantum cryptosystems, taking into account data sacrifice during key distillation, and conclude that the BB84 protocol may offer better performance characteristics than the B92.

  11. Modifying the ECC-based grouping-proof RFID system to increase inpatient medication safety.

    PubMed

    Ko, Wen-Tsai; Chiou, Shin-Yan; Lu, Erl-Huei; Chang, Henry Ker-Chang

    2014-09-01

    RFID technology is increasingly used in applications that require tracking, identification, and authentication. It attaches RFID-readable tags to objects for identification and execution of specific RFID-enabled applications. Recently, research has focused on the use of grouping-proofs for preserving privacy in RFID applications, wherein a proof of two or more tags must be simultaneously scanned. In 2010, a privacy-preserving grouping proof protocol for RFID based on ECC in public-key cryptosystem was proposed but was shown to be vulnerable to tracking attacks. A proposed enhancement protocol was also shown to have defects which prevented proper execution. In 2012, Lin et al. proposed a more efficient RFID ECC-based grouping proof protocol to promote inpatient medication safety. However, we found this protocol is also vulnerable to tracking and impersonation attacks. We then propose a secure privacy-preserving RFID grouping proof protocol for inpatient medication safety and demonstrate its resistance to such attacks.

  12. An interference-based optical authentication scheme using two phase-only masks with different diffraction distances

    NASA Astrophysics Data System (ADS)

    Lu, Dajiang; He, Wenqi; Liao, Meihua; Peng, Xiang

    2017-02-01

    A new method to eliminate the security risk of the well-known interference-based optical cryptosystem is proposed. In this method, which is suitable for security authentication application, two phase-only masks are separately placed at different distances from the output plane, where a certification image (public image) can be obtained. To further increase the security and flexibility of this authentication system, we employ one more validation image (secret image), which can be observed at another output plane, for confirming the identity of the user. Only if the two correct masks are properly settled at their positions one could obtain two significant images. Besides, even if the legal users exchange their masks (keys), the authentication process will fail and the authentication results will not reveal any information. Numerical simulations are performed to demonstrate the validity and security of the proposed method.

  13. Three-party authenticated key agreements for optimal communication

    PubMed Central

    Lee, Tian-Fu; Hwang, Tzonelih

    2017-01-01

    Authenticated key agreements enable users to determine session keys, and to securely communicate with others over an insecure channel via the session keys. This study investigates the lower bounds on communications for three-party authenticated key agreements and considers whether or not the sub-keys for generating a session key can be revealed in the channel. Since two clients do not share any common secret key, they require the help of the server to authenticate their identities and exchange confidential and authenticated information over insecure networks. However, if the session key security is based on asymmetric cryptosystems, then revealing the sub-keys cannot compromise the session key. The clients can directly exchange the sub-keys and reduce the transmissions. In addition, authenticated key agreements were developed by using the derived results of the lower bounds on communications. Compared with related approaches, the proposed protocols had fewer transmissions and realized the lower bounds on communications. PMID:28355253

  14. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks

    PubMed Central

    Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho

    2016-01-01

    In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.’s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.’s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes. PMID:27537890

  15. Remote object authentication: confidence model, cryptosystem and protocol

    NASA Astrophysics Data System (ADS)

    Lancrenon, Jean; Gillard, Roland; Fournel, Thierry

    2009-04-01

    This paper follows a paper by Bringer et al.3 to adapt a security model and protocol used for remote biometric authentication to the case of remote morphometric object authentication. We use a different type of encryption technique that requires smaller key sizes and has a built-in mechanism to help control the integrity of the messages received by the server. We also describe the optical technology used to extract the morphometric templates.

  16. Applications of Maple To Algebraic Cryptography.

    ERIC Educational Resources Information Center

    Sigmon, Neil P.

    1997-01-01

    Demonstrates the use of technology to enhance the appreciation of applications involving abstract algebra. The symbolic manipulator Maple can perform computations required for a linear cryptosystem. One major benefit of this process is that students can encipher and decipher messages using a linear cryptosystem without becoming confused and…

  17. Four-dimensional key design in amplitude, phase, polarization and distance for optical encryption based on polarization digital holography and QR code.

    PubMed

    Lin, Chao; Shen, Xueju; Li, Baochen

    2014-08-25

    We demonstrate that all parameters of optical lightwave can be simultaneously designed as keys in security system. This multi-dimensional property of key can significantly enlarge the key space and further enhance the security level of the system. The single-shot off-axis digital holography with orthogonal polarized reference waves is employed to perform polarization state recording on object wave. Two pieces of polarization holograms are calculated and fabricated to be arranged in reference arms to generate random amplitude and phase distribution respectively. When reconstruction, original information which is represented with QR code can be retrieved using Fresnel diffraction with decryption keys and read out noise-free. Numerical simulation results for this cryptosystem are presented. An analysis on the key sensitivity and fault tolerance properties are also provided.

  18. Asymmetric multiple information cryptosystem based on chaotic spiral phase mask and random spectrum decomposition

    NASA Astrophysics Data System (ADS)

    Rafiq Abuturab, Muhammad

    2018-01-01

    A new asymmetric multiple information cryptosystem based on chaotic spiral phase mask (CSPM) and random spectrum decomposition is put forwarded. In the proposed system, each channel of secret color image is first modulated with a CSPM and then gyrator transformed. The gyrator spectrum is randomly divided into two complex-valued masks. The same procedure is applied to multiple secret images to get their corresponding first and second complex-valued masks. Finally, first and second masks of each channel are independently added to produce first and second complex ciphertexts, respectively. The main feature of the proposed method is the different secret images encrypted by different CSPMs using different parameters as the sensitive decryption/private keys which are completely unknown to unauthorized users. Consequently, the proposed system would be resistant to potential attacks. Moreover, the CSPMs are easier to position in the decoding process owing to their own centering mark on axis focal ring. The retrieved secret images are free from cross-talk noise effects. The decryption process can be implemented by optical experiment. Numerical simulation results demonstrate the viability and security of the proposed method.

  19. A Spatiotemporal-Chaos-Based Encryption Having Overall Properties Considerably Better than Advanced Encryption Standard

    NASA Astrophysics Data System (ADS)

    Wang, Shi-Hong; Ye, Wei-Ping; Lü, Hua-Ping; Kuang, Jin-Yu; Li, Jing-Hua; Luo, Yun-Lun; Hu, Gang

    2003-07-01

    Spatiotemporal chaos of a two-dimensional one-way coupled map lattice is used for chaotic cryptography. The chaotic outputs of many space units are used for encryption simultaneously. This system shows satisfactory cryptographic properties of high security, fast encryption (decryption) speed, and robustness against noise disturbances in communication channel. The overall features of this spatiotemporal-chaos-based cryptosystem are better than chaotic cryptosystems known so far, and also than currently used conventional cryptosystems, such as the Advanced Encryption Standard (AES). The project supported by National Natural Science Foundation of China under Grant No. 10175010 and the Special Funds for Major State Basic Research Projects under Grant No. G2000077304

  20. Test and Verification of AES Used for Image Encryption

    NASA Astrophysics Data System (ADS)

    Zhang, Yong

    2018-03-01

    In this paper, an image encryption program based on AES in cipher block chaining mode was designed with C language. The encryption/decryption speed and security performance of AES based image cryptosystem were tested and used to compare the proposed cryptosystem with some existing image cryptosystems based on chaos. Simulation results show that AES can apply to image encryption, which refutes the widely accepted point of view that AES is not suitable for image encryption. This paper also suggests taking the speed of AES based image encryption as the speed benchmark of image encryption algorithms. And those image encryption algorithms whose speeds are lower than the benchmark should be discarded in practical communications.

  1. Some Improvements on Signed Window Algorithms for Scalar Multiplications in Elliptic Curve Cryptosystems

    NASA Technical Reports Server (NTRS)

    Vo, San C.; Biegel, Bryan (Technical Monitor)

    2001-01-01

    Scalar multiplication is an essential operation in elliptic curve cryptosystems because its implementation determines the speed and the memory storage requirements. This paper discusses some improvements on two popular signed window algorithms for implementing scalar multiplications of an elliptic curve point - Morain-Olivos's algorithm and Koyarna-Tsuruoka's algorithm.

  2. Combining Cryptography with EEG Biometrics

    PubMed Central

    Kazanavičius, Egidijus; Woźniak, Marcin

    2018-01-01

    Cryptographic frameworks depend on key sharing for ensuring security of data. While the keys in cryptographic frameworks must be correctly reproducible and not unequivocally connected to the identity of a user, in biometric frameworks this is different. Joining cryptography techniques with biometrics can solve these issues. We present a biometric authentication method based on the discrete logarithm problem and Bose-Chaudhuri-Hocquenghem (BCH) codes, perform its security analysis, and demonstrate its security characteristics. We evaluate a biometric cryptosystem using our own dataset of electroencephalography (EEG) data collected from 42 subjects. The experimental results show that the described biometric user authentication system is effective, achieving an Equal Error Rate (ERR) of 0.024.

  3. Combining Cryptography with EEG Biometrics.

    PubMed

    Damaševičius, Robertas; Maskeliūnas, Rytis; Kazanavičius, Egidijus; Woźniak, Marcin

    2018-01-01

    Cryptographic frameworks depend on key sharing for ensuring security of data. While the keys in cryptographic frameworks must be correctly reproducible and not unequivocally connected to the identity of a user, in biometric frameworks this is different. Joining cryptography techniques with biometrics can solve these issues. We present a biometric authentication method based on the discrete logarithm problem and Bose-Chaudhuri-Hocquenghem (BCH) codes, perform its security analysis, and demonstrate its security characteristics. We evaluate a biometric cryptosystem using our own dataset of electroencephalography (EEG) data collected from 42 subjects. The experimental results show that the described biometric user authentication system is effective, achieving an Equal Error Rate (ERR) of 0.024.

  4. Secure message authentication system for node to node network

    NASA Astrophysics Data System (ADS)

    Sindhu, R.; Vanitha, M. M.; Norman, J.

    2017-10-01

    The Message verification remains some of the best actual methods for prevent the illegal and dis honored communication after presence progressed to WSNs (Wireless Sensor Networks). Intend for this purpose, several message verification systems must stand established, created on both symmetric key cryptography otherwise public key cryptosystems. Best of them will have some limits for great computational then statement above in count of deficiency of climb ability then flexibility in node settlement occurrence. In a polynomial based system was newly presented for these problems. Though, this system then situations delay will must the dimness of integral limitation firm in the point of polynomial: once the amount of message transferred remains the greater than the limitation then the opponent will completely improve the polynomial approaches. This paper suggests using ECC (Elliptic Curve Cryptography). Though using the node verification the technique in this paper permits some nodes to transfer a limitless amount of messages lacking misery in the limit problem. This system will have the message cause secrecy. Equally theoretic study then model effects show our planned system will be effective than the polynomial based method in positions of calculation then statement above in privacy points though message basis privacy.

  5. AIB-OR: improving onion routing circuit construction using anonymous identity-based cryptosystems.

    PubMed

    Wang, Changji; Shi, Dongyuan; Xu, Xilei

    2015-01-01

    The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. However, existing onion routing protocols usually exhibit poor performance due to repeated encryption operations. In this paper, we first present an improved anonymous multi-receiver identity-based encryption (AMRIBE) scheme, and an improved identity-based one-way anonymous key agreement (IBOWAKE) protocol. We then propose an efficient onion routing protocol named AIB-OR that provides provable security and strong anonymity. Our main approach is to use our improved AMRIBE scheme and improved IBOWAKE protocol in onion routing circuit construction. Compared with other onion routing protocols, AIB-OR provides high efficiency, scalability, strong anonymity and fault tolerance. Performance measurements from a prototype implementation show that our proposed AIB-OR can achieve high bandwidths and low latencies when deployed over the Internet.

  6. AIB-OR: Improving Onion Routing Circuit Construction Using Anonymous Identity-Based Cryptosystems

    PubMed Central

    Wang, Changji; Shi, Dongyuan; Xu, Xilei

    2015-01-01

    The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. However, existing onion routing protocols usually exhibit poor performance due to repeated encryption operations. In this paper, we first present an improved anonymous multi-receiver identity-based encryption (AMRIBE) scheme, and an improved identity-based one-way anonymous key agreement (IBOWAKE) protocol. We then propose an efficient onion routing protocol named AIB-OR that provides provable security and strong anonymity. Our main approach is to use our improved AMRIBE scheme and improved IBOWAKE protocol in onion routing circuit construction. Compared with other onion routing protocols, AIB-OR provides high efficiency, scalability, strong anonymity and fault tolerance. Performance measurements from a prototype implementation show that our proposed AIB-OR can achieve high bandwidths and low latencies when deployed over the Internet. PMID:25815879

  7. Continuous-variable quantum cryptography is secure against non-Gaussian attacks.

    PubMed

    Grosshans, Frédéric; Cerf, Nicolas J

    2004-01-30

    A general study of arbitrary finite-size coherent attacks against continuous-variable quantum cryptographic schemes is presented. It is shown that, if the size of the blocks that can be coherently attacked by an eavesdropper is fixed and much smaller than the key size, then the optimal attack for a given signal-to-noise ratio in the transmission line is an individual Gaussian attack. Consequently, non-Gaussian coherent attacks do not need to be considered in the security analysis of such quantum cryptosystems.

  8. Improved diagonal queue medical image steganography using Chaos theory, LFSR, and Rabin cryptosystem.

    PubMed

    Jain, Mamta; Kumar, Anil; Choudhary, Rishabh Charan

    2017-06-01

    In this article, we have proposed an improved diagonal queue medical image steganography for patient secret medical data transmission using chaotic standard map, linear feedback shift register, and Rabin cryptosystem, for improvement of previous technique (Jain and Lenka in Springer Brain Inform 3:39-51, 2016). The proposed algorithm comprises four stages, generation of pseudo-random sequences (pseudo-random sequences are generated by linear feedback shift register and standard chaotic map), permutation and XORing using pseudo-random sequences, encryption using Rabin cryptosystem, and steganography using the improved diagonal queues. Security analysis has been carried out. Performance analysis is observed using MSE, PSNR, maximum embedding capacity, as well as by histogram analysis between various Brain disease stego and cover images.

  9. Short-Exponent RSA

    NASA Astrophysics Data System (ADS)

    Sun, Hung-Min; Yang, Cheng-Ta; Wu, Mu-En

    In some applications, a short private exponent d is chosen to improve the decryption or signing process for RSA public key cryptosystem. However, in a typical RSA, if the private exponent d is selected first, the public exponent e should be of the same order of magnitude as φ(N). Sun et al. devised three RSA variants using unbalanced prime factors p and q to lower the computational cost. Unfortunately, Durfee & Nguyen broke the illustrated instances of the first and third variants by solving small roots to trivariate modular polynomial equations. They also indicated that the instances with unbalanced primes p and q are more insecure than the instances with balanced p and q. This investigation focuses on designing a new RSA variant with balanced p and q, and short exponents d and e, to improve the security of an RSA variant against the Durfee & Nguyen's attack, and the other existing attacks. Furthermore, the proposed variant (Scheme A) is also extended to another RSA variant (Scheme B) in which p and q are balanced, and a trade-off between the lengths of d and e is enable. In addition, we provide the security analysis and feasibility analysis of the proposed schemes.

  10. On the Security of a Two-Factor Authentication and Key Agreement Scheme for Telecare Medicine Information Systems.

    PubMed

    Arshad, Hamed; Teymoori, Vahid; Nikooghadam, Morteza; Abbassi, Hassan

    2015-08-01

    Telecare medicine information systems (TMISs) aim to deliver appropriate healthcare services in an efficient and secure manner to patients. A secure mechanism for authentication and key agreement is required to provide proper security in these systems. Recently, Bin Muhaya demonstrated some security weaknesses of Zhu's authentication and key agreement scheme and proposed a security enhanced authentication and key agreement scheme for TMISs. However, we show that Bin Muhaya's scheme is vulnerable to off-line password guessing attacks and does not provide perfect forward secrecy. Furthermore, in order to overcome the mentioned weaknesses, we propose a new two-factor anonymous authentication and key agreement scheme using the elliptic curve cryptosystem. Security and performance analyses demonstrate that the proposed scheme not only overcomes the weaknesses of Bin Muhaya's scheme, but also is about 2.73 times faster than Bin Muhaya's scheme.

  11. Is QR code an optimal data container in optical encryption systems from an error-correction coding perspective?

    PubMed

    Jiao, Shuming; Jin, Zhi; Zhou, Changyuan; Zou, Wenbin; Li, Xia

    2018-01-01

    Quick response (QR) code has been employed as a data carrier for optical cryptosystems in many recent research works, and the error-correction coding mechanism allows the decrypted result to be noise free. However, in this paper, we point out for the first time that the Reed-Solomon coding algorithm in QR code is not a very suitable option for the nonlocally distributed speckle noise in optical cryptosystems from an information coding perspective. The average channel capacity is proposed to measure the data storage capacity and noise-resistant capability of different encoding schemes. We design an alternative 2D barcode scheme based on Bose-Chaudhuri-Hocquenghem (BCH) coding, which demonstrates substantially better average channel capacity than QR code in numerical simulated optical cryptosystems.

  12. Privacy protection schemes for fingerprint recognition systems

    NASA Astrophysics Data System (ADS)

    Marasco, Emanuela; Cukic, Bojan

    2015-05-01

    The deployment of fingerprint recognition systems has always raised concerns related to personal privacy. A fingerprint is permanently associated with an individual and, generally, it cannot be reset if compromised in one application. Given that fingerprints are not a secret, potential misuses besides personal recognition represent privacy threats and may lead to public distrust. Privacy mechanisms control access to personal information and limit the likelihood of intrusions. In this paper, image- and feature-level schemes for privacy protection in fingerprint recognition systems are reviewed. Storing only key features of a biometric signature can reduce the likelihood of biometric data being used for unintended purposes. In biometric cryptosystems and biometric-based key release, the biometric component verifies the identity of the user, while the cryptographic key protects the communication channel. Transformation-based approaches only a transformed version of the original biometric signature is stored. Different applications can use different transforms. Matching is performed in the transformed domain which enable the preservation of low error rates. Since such templates do not reveal information about individuals, they are referred to as cancelable templates. A compromised template can be re-issued using a different transform. At image-level, de-identification schemes can remove identifiers disclosed for objectives unrelated to the original purpose, while permitting other authorized uses of personal information. Fingerprint images can be de-identified by, for example, mixing fingerprints or removing gender signature. In both cases, degradation of matching performance is minimized.

  13. Quantum exhaustive key search with simplified-DES as a case study.

    PubMed

    Almazrooie, Mishal; Samsudin, Azman; Abdullah, Rosni; Mutter, Kussay N

    2016-01-01

    To evaluate the security of a symmetric cryptosystem against any quantum attack, the symmetric algorithm must be first implemented on a quantum platform. In this study, a quantum implementation of a classical block cipher is presented. A quantum circuit for a classical block cipher of a polynomial size of quantum gates is proposed. The entire work has been tested on a quantum mechanics simulator called libquantum. First, the functionality of the proposed quantum cipher is verified and the experimental results are compared with those of the original classical version. Then, quantum attacks are conducted by using Grover's algorithm to recover the secret key. The proposed quantum cipher is used as a black box for the quantum search. The quantum oracle is then queried over the produced ciphertext to mark the quantum state, which consists of plaintext and key qubits. The experimental results show that for a key of n-bit size and key space of N such that [Formula: see text], the key can be recovered in [Formula: see text] computational steps.

  14. DNA-Cryptography-Based Obfuscated Systolic Finite Field Multiplier for Secure Cryptosystem in Smart Grid

    NASA Astrophysics Data System (ADS)

    Chen, Shaobo; Chen, Pingxiuqi; Shao, Qiliang; Basha Shaik, Nazeem; Xie, Jiafeng

    2017-05-01

    The elliptic curve cryptography (ECC) provides much stronger security per bits compared to the traditional cryptosystem, and hence it is an ideal role in secure communication in smart grid. On the other side, secure implementation of finite field multiplication over GF(2 m ) is considered as the bottle neck of ECC. In this paper, we present a novel obfuscation strategy for secure implementation of systolic field multiplier for ECC in smart grid. First, for the first time, we propose a novel obfuscation technique to derive a novel obfuscated systolic finite field multiplier for ECC implementation. Then, we employ the DNA cryptography coding strategy to obfuscate the field multiplier further. Finally, we obtain the area-time-power complexity of the proposed field multiplier to confirm the efficiency of the proposed design. The proposed design is highly obfuscated with low overhead, suitable for secure cryptosystem in smart grid.

  15. Multiple image encryption scheme based on pixel exchange operation and vector decomposition

    NASA Astrophysics Data System (ADS)

    Xiong, Y.; Quan, C.; Tay, C. J.

    2018-02-01

    We propose a new multiple image encryption scheme based on a pixel exchange operation and a basic vector decomposition in Fourier domain. In this algorithm, original images are imported via a pixel exchange operator, from which scrambled images and pixel position matrices are obtained. Scrambled images encrypted into phase information are imported using the proposed algorithm and phase keys are obtained from the difference between scrambled images and synthesized vectors in a charge-coupled device (CCD) plane. The final synthesized vector is used as an input in a random phase encoding (DRPE) scheme. In the proposed encryption scheme, pixel position matrices and phase keys serve as additional private keys to enhance the security of the cryptosystem which is based on a 4-f system. Numerical simulations are presented to demonstrate the feasibility and robustness of the proposed encryption scheme.

  16. VLSI design of an RSA encryption/decryption chip using systolic array based architecture

    NASA Astrophysics Data System (ADS)

    Sun, Chi-Chia; Lin, Bor-Shing; Jan, Gene Eu; Lin, Jheng-Yi

    2016-09-01

    This article presents the VLSI design of a configurable RSA public key cryptosystem supporting the 512-bit, 1024-bit and 2048-bit based on Montgomery algorithm achieving comparable clock cycles of current relevant works but with smaller die size. We use binary method for the modular exponentiation and adopt Montgomery algorithm for the modular multiplication to simplify computational complexity, which, together with the systolic array concept for electric circuit designs effectively, lower the die size. The main architecture of the chip consists of four functional blocks, namely input/output modules, registers module, arithmetic module and control module. We applied the concept of systolic array to design the RSA encryption/decryption chip by using VHDL hardware language and verified using the TSMC/CIC 0.35 m 1P4 M technology. The die area of the 2048-bit RSA chip without the DFT is 3.9 × 3.9 mm2 (4.58 × 4.58 mm2 with DFT). Its average baud rate can reach 10.84 kbps under a 100 MHz clock.

  17. Privacy-Preserving Electrocardiogram Monitoring for Intelligent Arrhythmia Detection.

    PubMed

    Son, Junggab; Park, Juyoung; Oh, Heekuck; Bhuiyan, Md Zakirul Alam; Hur, Junbeom; Kang, Kyungtae

    2017-06-12

    Long-term electrocardiogram (ECG) monitoring, as a representative application of cyber-physical systems, facilitates the early detection of arrhythmia. A considerable number of previous studies has explored monitoring techniques and the automated analysis of sensing data. However, ensuring patient privacy or confidentiality has not been a primary concern in ECG monitoring. First, we propose an intelligent heart monitoring system, which involves a patient-worn ECG sensor (e.g., a smartphone) and a remote monitoring station, as well as a decision support server that interconnects these components. The decision support server analyzes the heart activity, using the Pan-Tompkins algorithm to detect heartbeats and a decision tree to classify them. Our system protects sensing data and user privacy, which is an essential attribute of dependability, by adopting signal scrambling and anonymous identity schemes. We also employ a public key cryptosystem to enable secure communication between the entities. Simulations using data from the MIT-BIH arrhythmia database demonstrate that our system achieves a 95.74% success rate in heartbeat detection and almost a 96.63% accuracy in heartbeat classification, while successfully preserving privacy and securing communications among the involved entities.

  18. Privacy-Preserving Electrocardiogram Monitoring for Intelligent Arrhythmia Detection †

    PubMed Central

    Son, Junggab; Park, Juyoung; Oh, Heekuck; Bhuiyan, Md Zakirul Alam; Hur, Junbeom; Kang, Kyungtae

    2017-01-01

    Long-term electrocardiogram (ECG) monitoring, as a representative application of cyber-physical systems, facilitates the early detection of arrhythmia. A considerable number of previous studies has explored monitoring techniques and the automated analysis of sensing data. However, ensuring patient privacy or confidentiality has not been a primary concern in ECG monitoring. First, we propose an intelligent heart monitoring system, which involves a patient-worn ECG sensor (e.g., a smartphone) and a remote monitoring station, as well as a decision support server that interconnects these components. The decision support server analyzes the heart activity, using the Pan–Tompkins algorithm to detect heartbeats and a decision tree to classify them. Our system protects sensing data and user privacy, which is an essential attribute of dependability, by adopting signal scrambling and anonymous identity schemes. We also employ a public key cryptosystem to enable secure communication between the entities. Simulations using data from the MIT-BIH arrhythmia database demonstrate that our system achieves a 95.74% success rate in heartbeat detection and almost a 96.63% accuracy in heartbeat classification, while successfully preserving privacy and securing communications among the involved entities. PMID:28604628

  19. Cryptosystem for Securing Image Encryption Using Structured Phase Masks in Fresnel Wavelet Transform Domain

    NASA Astrophysics Data System (ADS)

    Singh, Hukum

    2016-12-01

    A cryptosystem for securing image encryption is considered by using double random phase encoding in Fresnel wavelet transform (FWT) domain. Random phase masks (RPMs) and structured phase masks (SPMs) based on devil's vortex toroidal lens (DVTL) are used in spatial as well as in Fourier planes. The images to be encrypted are first Fresnel transformed and then single-level discrete wavelet transform (DWT) is apply to decompose LL,HL, LH and HH matrices. The resulting matrices from the DWT are multiplied by additional RPMs and the resultants are subjected to inverse DWT for the encrypted images. The scheme is more secure because of many parameters used in the construction of SPM. The original images are recovered by using the correct parameters of FWT and SPM. Phase mask SPM based on DVTL increases security that enlarges the key space for encryption and decryption. The proposed encryption scheme is a lens-less optical system and its digital implementation has been performed using MATLAB 7.6.0 (R2008a). The computed value of mean-squared-error between the retrieved and the input images shows the efficacy of scheme. The sensitivity to encryption parameters, robustness against occlusion, entropy and multiplicative Gaussian noise attacks have been analysed.

  20. Reduced randomness in quantum cryptography with sequences of qubits encoded in the same basis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lamoureux, L.-P.; Cerf, N. J.; Bechmann-Pasquinucci, H.

    2006-03-15

    We consider the cloning of sequences of qubits prepared in the states used in the BB84 or six-state quantum cryptography protocol, and show that the single-qubit fidelity is unaffected even if entire sequences of qubits are prepared in the same basis. This result is only valid provided that the sequences are much shorter than the total key. It is of great importance for practical quantum cryptosystems because it reduces the need for high-speed random number generation without impairing on the security against finite-size cloning attacks.

  1. Integrating security in a group oriented distributed system

    NASA Technical Reports Server (NTRS)

    Reiter, Michael; Birman, Kenneth; Gong, LI

    1992-01-01

    A distributed security architecture is proposed for incorporation into group oriented distributed systems, and in particular, into the Isis distributed programming toolkit. The primary goal of the architecture is to make common group oriented abstractions robust in hostile settings, in order to facilitate the construction of high performance distributed applications that can tolerate both component failures and malicious attacks. These abstractions include process groups and causal group multicast. Moreover, a delegation and access control scheme is proposed for use in group oriented systems. The focus is the security architecture; particular cryptosystems and key exchange protocols are not emphasized.

  2. Security Analysis of a Block Encryption Algorithm Based on Dynamic Sequences of Multiple Chaotic Systems

    NASA Astrophysics Data System (ADS)

    Du, Mao-Kang; He, Bo; Wang, Yong

    2011-01-01

    Recently, the cryptosystem based on chaos has attracted much attention. Wang and Yu (Commun. Nonlin. Sci. Numer. Simulat. 14 (2009) 574) proposed a block encryption algorithm based on dynamic sequences of multiple chaotic systems. We analyze the potential flaws in the algorithm. Then, a chosen-plaintext attack is presented. Some remedial measures are suggested to avoid the flaws effectively. Furthermore, an improved encryption algorithm is proposed to resist the attacks and to keep all the merits of the original cryptosystem.

  3. IPV6 Mobile Network Protocol Weaknesses and a Cryptosystem Approach

    NASA Astrophysics Data System (ADS)

    Balitanas, Maricel; Kim, Tai-Hoon

    This paper reviews some of the improvements associated with the new Internet protocol version 6, an emphasis on its security-related functionality particularly in its authentication and concludes with a hybrid cryptosystem for its authentication issue. Since new generation of Internet protocol is on its way to solve the growth of IP address depletion. It is in a process that may take several years to complete. Thus, as a step to effective solution and efficient implementation this review has been made.

  4. Experimental realization of a highly secure chaos communication under strong channel noise

    NASA Astrophysics Data System (ADS)

    Ye, Weiping; Dai, Qionglin; Wang, Shihong; Lu, Huaping; Kuang, Jinyu; Zhao, Zhenfeng; Zhu, Xiangqing; Tang, Guoning; Huang, Ronghuai; Hu, Gang

    2004-09-01

    A one-way coupled spatiotemporally chaotic map lattice is used to construct cryptosystem. With the combinatorial applications of both chaotic computations and conventional algebraic operations, our system has optimal cryptographic properties much better than the separative applications of known chaotic and conventional methods. We have realized experiments to practice duplex voice secure communications in realistic Wired Public Switched Telephone Network by applying our chaotic system and the system of Advanced Encryption Standard (AES), respectively, for cryptography. Our system can work stably against strong channel noise when AES fails to work.

  5. Compression-RSA technique: A more efficient encryption-decryption procedure

    NASA Astrophysics Data System (ADS)

    Mandangan, Arif; Mei, Loh Chai; Hung, Chang Ee; Che Hussin, Che Haziqah

    2014-06-01

    The efficiency of encryption-decryption procedures has become a major problem in asymmetric cryptography. Compression-RSA technique is developed to overcome the efficiency problem by compressing the numbers of kplaintext, where k∈Z+ and k > 2, becoming only 2 plaintext. That means, no matter how large the numbers of plaintext, they will be compressed to only 2 plaintext. The encryption-decryption procedures are expected to be more efficient since these procedures only receive 2 inputs to be processed instead of kinputs. However, it is observed that as the numbers of original plaintext are increasing, the size of the new plaintext becomes bigger. As a consequence, it will probably affect the efficiency of encryption-decryption procedures, especially for RSA cryptosystem since both of its encryption-decryption procedures involve exponential operations. In this paper, we evaluated the relationship between the numbers of original plaintext and the size of the new plaintext. In addition, we conducted several experiments to show that the RSA cryptosystem with embedded Compression-RSA technique is more efficient than the ordinary RSA cryptosystem.

  6. Images Encryption Method using Steganographic LSB Method, AES and RSA algorithm

    NASA Astrophysics Data System (ADS)

    Moumen, Abdelkader; Sissaoui, Hocine

    2017-03-01

    Vulnerability of communication of digital images is an extremely important issue nowadays, particularly when the images are communicated through insecure channels. To improve communication security, many cryptosystems have been presented in the image encryption literature. This paper proposes a novel image encryption technique based on an algorithm that is faster than current methods. The proposed algorithm eliminates the step in which the secrete key is shared during the encryption process. It is formulated based on the symmetric encryption, asymmetric encryption and steganography theories. The image is encrypted using a symmetric algorithm, then, the secret key is encrypted by means of an asymmetrical algorithm and it is hidden in the ciphered image using a least significant bits steganographic scheme. The analysis results show that while enjoying the faster computation, our method performs close to optimal in terms of accuracy.

  7. A privacy preserving secure and efficient authentication scheme for telecare medical information systems.

    PubMed

    Mishra, Raghavendra; Barnwal, Amit Kumar

    2015-05-01

    The Telecare medical information system (TMIS) presents effective healthcare delivery services by employing information and communication technologies. The emerging privacy and security are always a matter of great concern in TMIS. Recently, Chen at al. presented a password based authentication schemes to address the privacy and security. Later on, it is proved insecure against various active and passive attacks. To erase the drawbacks of Chen et al.'s anonymous authentication scheme, several password based authentication schemes have been proposed using public key cryptosystem. However, most of them do not present pre-smart card authentication which leads to inefficient login and password change phases. To present an authentication scheme with pre-smart card authentication, we present an improved anonymous smart card based authentication scheme for TMIS. The proposed scheme protects user anonymity and satisfies all the desirable security attributes. Moreover, the proposed scheme presents efficient login and password change phases where incorrect input can be quickly detected and a user can freely change his password without server assistance. Moreover, we demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham) logic. The proposed scheme is also comparable in terms of computational overheads with relevant schemes.

  8. Innovative hyperchaotic encryption algorithm for compressed video

    NASA Astrophysics Data System (ADS)

    Yuan, Chun; Zhong, Yuzhuo; Yang, Shiqiang

    2002-12-01

    It is accepted that stream cryptosystem can achieve good real-time performance and flexibility which implements encryption by selecting few parts of the block data and header information of the compressed video stream. Chaotic random number generator, for example Logistics Map, is a comparatively promising substitute, but it is easily attacked by nonlinear dynamic forecasting and geometric information extracting. In this paper, we present a hyperchaotic cryptography scheme to encrypt the compressed video, which integrates Logistics Map with Z(232 - 1) field linear congruential algorithm to strengthen the security of the mono-chaotic cryptography, meanwhile, the real-time performance and flexibility of the chaotic sequence cryptography are maintained. It also integrates with the dissymmetrical public-key cryptography and implements encryption and identity authentification on control parameters at initialization phase. In accord with the importance of data in compressed video stream, encryption is performed in layered scheme. In the innovative hyperchaotic cryptography, the value and the updating frequency of control parameters can be changed online to satisfy the requirement of the network quality, processor capability and security requirement. The innovative hyperchaotic cryprography proves robust security by cryptoanalysis, shows good real-time performance and flexible implement capability through the arithmetic evaluating and test.

  9. Post-quantum cryptography.

    PubMed

    Bernstein, Daniel J; Lange, Tanja

    2017-09-13

    Cryptography is essential for the security of online communication, cars and implanted medical devices. However, many commonly used cryptosystems will be completely broken once large quantum computers exist. Post-quantum cryptography is cryptography under the assumption that the attacker has a large quantum computer; post-quantum cryptosystems strive to remain secure even in this scenario. This relatively young research area has seen some successes in identifying mathematical operations for which quantum algorithms offer little advantage in speed, and then building cryptographic systems around those. The central challenge in post-quantum cryptography is to meet demands for cryptographic usability and flexibility without sacrificing confidence.

  10. Post-quantum cryptography

    NASA Astrophysics Data System (ADS)

    Bernstein, Daniel J.; Lange, Tanja

    2017-09-01

    Cryptography is essential for the security of online communication, cars and implanted medical devices. However, many commonly used cryptosystems will be completely broken once large quantum computers exist. Post-quantum cryptography is cryptography under the assumption that the attacker has a large quantum computer; post-quantum cryptosystems strive to remain secure even in this scenario. This relatively young research area has seen some successes in identifying mathematical operations for which quantum algorithms offer little advantage in speed, and then building cryptographic systems around those. The central challenge in post-quantum cryptography is to meet demands for cryptographic usability and flexibility without sacrificing confidence.

  11. Attack to AN Image Encryption Based on Chaotic Logistic Map

    NASA Astrophysics Data System (ADS)

    Wang, Xing-Yuan; Chen, Feng; Wang, Tian; Xu, Dahai; Ma, Yutian

    2013-10-01

    This paper offers two different attacks on a freshly proposed image encryption based on chaotic logistic map. The cryptosystem under study first uses a secret key of 80-bit and employed two chaotic logistic maps. We derived the initial conditions of the logistic maps from using the secret key by providing different weights to all its bits. Additionally, in this paper eight different types of procedures are used to encrypt the pixels of an image in the proposed encryption process of which one of them will be used for a certain pixel which is determined by the product of the logistic map. The secret key is revised after encrypting each block which consisted of 16 pixels of the image. The encrypting process have weakness, worst of which is that every byte of plaintext is independent when substituted, so the cipher text of the byte will not change even the other bytes have changed. As a result of weakness, a chosen plaintext attack and a chosen cipher text attack can be completed without any knowledge of the key value to recuperate the ciphered image.

  12. Communication channels secured from eavesdropping via transmission of photonic Bell states

    NASA Astrophysics Data System (ADS)

    Shimizu, Kaoru; Imoto, Nobuyuki

    1999-07-01

    This paper proposes a quantum communication scheme for sending a definite binary sequence while confirming the security of the transmission. The scheme is very suitable for sending a ciphertext in a secret-key cryptosystem so that we can detect any eavesdropper who attempts to decipher the key. Thus we can continue to use a secret key unless we detect eavesdropping and the security of a key that is used repeatedly can be enhanced to the level of one-time-pad cryptography. In our scheme, a pair of entangled photon twins is employed as a bit carrier which is encoded in a two-term superposition of four Bell states. Different bases are employed for encoding the binary sequence of a ciphertext and a random test bit. The photon twins are measured with a Bell state analyzer and any bit can be decoded from the resultant Bell state when the receiver is later notified of the coding basis through a classical channel. By opening the positions and the values of test bits, ciphertext can be read and eavesdropping is simultaneously detected.

  13. On the design of henon and logistic map-based random number generator

    NASA Astrophysics Data System (ADS)

    Magfirawaty; Suryadi, M. T.; Ramli, Kalamullah

    2017-10-01

    The key sequence is one of the main elements in the cryptosystem. True Random Number Generators (TRNG) method is one of the approaches to generating the key sequence. The randomness source of the TRNG divided into three main groups, i.e. electrical noise based, jitter based and chaos based. The chaos based utilizes a non-linear dynamic system (continuous time or discrete time) as an entropy source. In this study, a new design of TRNG based on discrete time chaotic system is proposed, which is then simulated in LabVIEW. The principle of the design consists of combining 2D and 1D chaotic systems. A mathematical model is implemented for numerical simulations. We used comparator process as a harvester method to obtain the series of random bits. Without any post processing, the proposed design generated random bit sequence with high entropy value and passed all NIST 800.22 statistical tests.

  14. Security analysis of quadratic phase based cryptography

    NASA Astrophysics Data System (ADS)

    Muniraj, Inbarasan; Guo, Changliang; Malallah, Ra'ed; Healy, John J.; Sheridan, John T.

    2016-09-01

    The linear canonical transform (LCT) is essential in modeling a coherent light field propagation through first-order optical systems. Recently, a generic optical system, known as a Quadratic Phase Encoding System (QPES), for encrypting a two-dimensional (2D) image has been reported. It has been reported together with two phase keys the individual LCT parameters serve as keys of the cryptosystem. However, it is important that such the encryption systems also satisfies some dynamic security properties. Therefore, in this work, we examine some cryptographic evaluation methods, such as Avalanche Criterion and Bit Independence, which indicates the degree of security of the cryptographic algorithms on QPES. We compare our simulation results with the conventional Fourier and the Fresnel transform based DRPE systems. The results show that the LCT based DRPE has an excellent avalanche and bit independence characteristics than that of using the conventional Fourier and Fresnel based encryption systems.

  15. Choice of optical system is critical for the security of double random phase encryption systems

    NASA Astrophysics Data System (ADS)

    Muniraj, Inbarasan; Guo, Changliang; Malallah, Ra'ed; Cassidy, Derek; Zhao, Liang; Ryle, James P.; Healy, John J.; Sheridan, John T.

    2017-06-01

    The linear canonical transform (LCT) is used in modeling a coherent light-field propagation through first-order optical systems. Recently, a generic optical system, known as the quadratic phase encoding system (QPES), for encrypting a two-dimensional image has been reported. In such systems, two random phase keys and the individual LCT parameters (α,β,γ) serve as secret keys of the cryptosystem. It is important that such encryption systems also satisfy some dynamic security properties. We, therefore, examine such systems using two cryptographic evaluation methods, the avalanche effect and bit independence criterion, which indicate the degree of security of the cryptographic algorithms using QPES. We compared our simulation results with the conventional Fourier and the Fresnel transform-based double random phase encryption (DRPE) systems. The results show that the LCT-based DRPE has an excellent avalanche and bit independence characteristics compared to the conventional Fourier and Fresnel-based encryption systems.

  16. Optical image encryption system using nonlinear approach based on biometric authentication

    NASA Astrophysics Data System (ADS)

    Verma, Gaurav; Sinha, Aloka

    2017-07-01

    A nonlinear image encryption scheme using phase-truncated Fourier transform (PTFT) and natural logarithms is proposed in this paper. With the help of the PTFT, the input image is truncated into phase and amplitude parts at the Fourier plane. The phase-only information is kept as the secret key for the decryption, and the amplitude distribution is modulated by adding an undercover amplitude random mask in the encryption process. Furthermore, the encrypted data is kept hidden inside the face biometric-based phase mask key using the base changing rule of logarithms for secure transmission. This phase mask is generated through principal component analysis. Numerical experiments show the feasibility and the validity of the proposed nonlinear scheme. The performance of the proposed scheme has been studied against the brute force attacks and the amplitude-phase retrieval attack. Simulation results are presented to illustrate the enhanced system performance with desired advantages in comparison to the linear cryptosystem.

  17. Comment on "On the security of a spatiotemporal chaotic cryptosystem" [Chaos 17, 033117 (2007)].

    PubMed

    Wang, Shihong; Hu, Gang

    2008-09-01

    This paper comments on a recent paper by R. Rhouma and B. Safya [Chaos 17, 033117 (2007)]. They claimed to find some security weakness of the spatiotemporal chaotic cryptosystem suggested by G. Tang et al. [Phys. Lett. A 318, 388 (2003)] and proposed a chosen-plaintext attack to analyze this system. We find that in their analysis, called a "chosen-plaintext attack," they actually act as a legal receiver (with a machine in their hands during the entire decryption process) rather than an attacker and, therefore, the whole reasoning is not valid. (c) 2008 American Institute of Physics.

  18. Synchronization and an application of a novel fractional order King Cobra chaotic system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Muthukumar, P., E-mail: muthukumardgl@gmail.com; Balasubramaniam, P., E-mail: balugru@gmail.com; Ratnavelu, K., E-mail: kuru052001@gmail.com

    2014-09-01

    In this paper, we design a new three dimensional King Cobra face shaped fractional order chaotic system. The multi-scale synchronization scheme of two fractional order chaotic systems is described. The necessary conditions for the multi-scale synchronization of two identical fractional order King Cobra chaotic systems are derived through feedback control. A new cryptosystem is proposed for an image encryption and decryption by using synchronized fractional order King Cobra chaotic systems with the supports of multiple cryptographic assumptions. The security of the proposed cryptosystem is analyzed by the well known algebraic attacks. Numerical simulations are given to show the effectiveness ofmore » the proposed theoretical results.« less

  19. An in fiber experimental approach to photonic quantum digital signatures that does not require quantum memory

    NASA Astrophysics Data System (ADS)

    Collins, Robert J.; Donaldon, Ross J.; Dunjko, Vedran; Wallden, Petros; Clarke, Patrick J.; Andersson, Erika; Jeffers, John; Buller, Gerald S.

    2014-10-01

    Classical digital signatures are commonly used in e-mail, electronic financial transactions and other forms of electronic communications to ensure that messages have not been tampered with in transit, and that messages are transferrable. The security of commonly used classical digital signature schemes relies on the computational difficulty of inverting certain mathematical functions. However, at present, there are no such one-way functions which have been proven to be hard to invert. With enough computational resources certain implementations of classical public key cryptosystems can be, and have been, broken with current technology. It is nevertheless possible to construct information-theoretically secure signature schemes, including quantum digital signature schemes. Quantum signature schemes can be made information theoretically secure based on the laws of quantum mechanics, while classical comparable protocols require additional resources such as secret communication and a trusted authority. Early demonstrations of quantum digital signatures required quantum memory, rendering them impractical at present. Our present implementation is based on a protocol that does not require quantum memory. It also uses the new technique of unambiguous quantum state elimination, Here we report experimental results for a test-bed system, recorded with a variety of different operating parameters, along with a discussion of aspects of the system security.

  20. An implementation of super-encryption using RC4A and MDTM cipher algorithms for securing PDF Files on android

    NASA Astrophysics Data System (ADS)

    Budiman, M. A.; Rachmawati, D.; Parlindungan, M. R.

    2018-03-01

    MDTM is a classical symmetric cryptographic algorithm. As with other classical algorithms, the MDTM Cipher algorithm is easy to implement but it is less secure compared to modern symmetric algorithms. In order to make it more secure, a stream cipher RC4A is added and thus the cryptosystem becomes super encryption. In this process, plaintexts derived from PDFs are firstly encrypted with the MDTM Cipher algorithm and are encrypted once more with the RC4A algorithm. The test results show that the value of complexity is Θ(n2) and the running time is linearly directly proportional to the length of plaintext characters and the keys entered.

  1. Exponential H ∞ Synchronization of Chaotic Cryptosystems Using an Improved Genetic Algorithm

    PubMed Central

    Hsiao, Feng-Hsiag

    2015-01-01

    This paper presents a systematic design methodology for neural-network- (NN-) based secure communications in multiple time-delay chaotic (MTDC) systems with optimal H ∞ performance and cryptography. On the basis of the Improved Genetic Algorithm (IGA), which is demonstrated to have better performance than that of a traditional GA, a model-based fuzzy controller is then synthesized to stabilize the MTDC systems. A fuzzy controller is synthesized to not only realize the exponential synchronization, but also achieve optimal H ∞ performance by minimizing the disturbance attenuation level. Furthermore, the error of the recovered message is stated by using the n-shift cipher and key. Finally, a numerical example with simulations is given to demonstrate the effectiveness of our approach. PMID:26366432

  2. Security analysis of RSA cryptosystem algorithm and it’s properties

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Liu, Chenglian; Guo, Yongning, E-mail: guoyn@163.com, E-mail: linjuanliucaihong@qq.com; Lin, Juan, E-mail: guoyn@163.com, E-mail: linjuanliucaihong@qq.com

    2014-10-06

    The information technology rapidly development and dramatically changed the life style people, in addition to shortening the distance of communication, but also promote the smooth exchange of information flows. However, derivatives to facilitate the relative safety of these issues, since into the digital information age, the majority of the practitioners of engineering and technical personnel and technical workers in terms of technology, information security is increasingly becoming an important issue. The RSA algorithm was published in 1978. It is a kind of very popular and widely application modem cryptosystem in the world. Even though there are lots of articles tomore » discuss about how to break the RSA, but it is still secure today. In this paper, the authors would like to introduce a variant attack to RSA.« less

  3. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Brickell, E.F.; Davis, J.A.; Simmons, G.J.

    A study of the algorithm and the underlying mathematical concepts of A Polynomial Time Algorithm for Breaking Merkle-Hellman Cryptosystems, by Adi Shamir, is presented. Ways of protecting the Merkle-Hellman knapsack from cryptanalysis are given with derivations. (GHT)

  4. Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms

    NASA Astrophysics Data System (ADS)

    Belazi, Akram; Abd El-Latif, Ahmed A.; Diaconu, Adrian-Viorel; Rhouma, Rhouma; Belghith, Safya

    2017-01-01

    In this paper, a new chaos-based partial image encryption scheme based on Substitution-boxes (S-box) constructed by chaotic system and Linear Fractional Transform (LFT) is proposed. It encrypts only the requisite parts of the sensitive information in Lifting-Wavelet Transform (LWT) frequency domain based on hybrid of chaotic maps and a new S-box. In the proposed encryption scheme, the characteristics of confusion and diffusion are accomplished in three phases: block permutation, substitution, and diffusion. Then, we used dynamic keys instead of fixed keys used in other approaches, to control the encryption process and make any attack impossible. The new S-box was constructed by mixing of chaotic map and LFT to insure the high confidentiality in the inner encryption of the proposed approach. In addition, the hybrid compound of S-box and chaotic systems strengthened the whole encryption performance and enlarged the key space required to resist the brute force attacks. Extensive experiments were conducted to evaluate the security and efficiency of the proposed approach. In comparison with previous schemes, the proposed cryptosystem scheme showed high performances and great potential for prominent prevalence in cryptographic applications.

  5. Quantum key distribution: vulnerable if imperfectly implemented

    NASA Astrophysics Data System (ADS)

    Leuchs, G.

    2013-10-01

    We report several vulnerabilities found in Clavis2, the flagship quantum key distribution (QKD) system from ID Quantique. We show the hacking of a calibration sequence run by Clavis2 to synchronize the Alice and Bob devices before performing the secret key exchange. This hack induces a temporal detection efficiency mismatch in Bob that can allow Eve to break the security of the cryptosystem using faked states. We also experimentally investigate the superlinear behaviour in the single-photon detectors (SPDs) used by Bob. Due to this superlinearity, the SPDs feature an actual multi-photon detection probability which is generally higher than the theoretically-modelled value. We show how this increases the risk of detector control attacks on QKD systems (including Clavis2) employing such SPDs. Finally, we review the experimental feasibility of Trojan-horse attacks. In the case of Clavis2, the objective is to read Bob's phase modulator to acquire knowledge of his basis choice as this information suffices for constructing the raw key in the Scarani-Acin-Ribordy-Gisin 2004 (SARG04) protocol. We work in close collaboration with ID Quantique and for all these loopholes, we notified them in advance. Wherever possible, we or ID Quantique proposed countermeasures and they implemented suitable patches and upgrade their systems.

  6. Optical cryptography with biometrics for multi-depth objects.

    PubMed

    Yan, Aimin; Wei, Yang; Hu, Zhijuan; Zhang, Jingtao; Tsang, Peter Wai Ming; Poon, Ting-Chung

    2017-10-11

    We propose an optical cryptosystem for encrypting images of multi-depth objects based on the combination of optical heterodyne technique and fingerprint keys. Optical heterodyning requires two optical beams to be mixed. For encryption, each optical beam is modulated by an optical mask containing either the fingerprint of the person who is sending, or receiving the image. The pair of optical masks are taken as the encryption keys. Subsequently, the two beams are used to scan over a multi-depth 3-D object to obtain an encrypted hologram. During the decryption process, each sectional image of the 3-D object is recovered by convolving its encrypted hologram (through numerical computation) with the encrypted hologram of a pinhole image that is positioned at the same depth as the sectional image. Our proposed method has three major advantages. First, the lost-key situation can be avoided with the use of fingerprints as the encryption keys. Second, the method can be applied to encrypt 3-D images for subsequent decrypted sectional images. Third, since optical heterodyning scanning is employed to encrypt a 3-D object, the optical system is incoherent, resulting in negligible amount of speckle noise upon decryption. To the best of our knowledge, this is the first time optical cryptography of 3-D object images has been demonstrated in an incoherent optical system with biometric keys.

  7. Secure and Privacy Enhanced Gait Authentication on Smart Phone

    PubMed Central

    Choi, Deokjai

    2014-01-01

    Smart environments established by the development of mobile technology have brought vast benefits to human being. However, authentication mechanisms on portable smart devices, particularly conventional biometric based approaches, still remain security and privacy concerns. These traditional systems are mostly based on pattern recognition and machine learning algorithms, wherein original biometric templates or extracted features are stored under unconcealed form for performing matching with a new biometric sample in the authentication phase. In this paper, we propose a novel gait based authentication using biometric cryptosystem to enhance the system security and user privacy on the smart phone. Extracted gait features are merely used to biometrically encrypt a cryptographic key which is acted as the authentication factor. Gait signals are acquired by using an inertial sensor named accelerometer in the mobile device and error correcting codes are adopted to deal with the natural variation of gait measurements. We evaluate our proposed system on a dataset consisting of gait samples of 34 volunteers. We achieved the lowest false acceptance rate (FAR) and false rejection rate (FRR) of 3.92% and 11.76%, respectively, in terms of key length of 50 bits. PMID:24955403

  8. Optical image encryption using triplet of functions

    NASA Astrophysics Data System (ADS)

    Yatish; Fatima, Areeba; Nishchal, Naveen Kumar

    2018-03-01

    We propose an image encryption scheme that brings into play a technique using a triplet of functions to manipulate complex-valued functions. Optical cryptosystems using this method are an easier approach toward the ciphertext generation that avoids the use of holographic setup to record phase. The features of this method were shown in the context of double random phase encoding and phase-truncated Fourier transform-based cryptosystems using gyrator transform. In the first step, the complex function is split into two matrices. These matrices are separated, so they contain the real and imaginary parts. In the next step, these two matrices and a random distribution function are acted upon by one of the functions in the triplet. During decryption, the other two functions in the triplet help us retrieve the complex-valued function. The simulation results demonstrate the effectiveness of the proposed idea. To check the robustness of the proposed scheme, attack analyses were carried out.

  9. Clone-preventive technique that features magnetic microfibers and cryptography

    NASA Astrophysics Data System (ADS)

    Matsumoto, Hiroyuki; Suzuki, Keiichi; Matsumoto, Tsutomu

    1998-04-01

    We have used the term 'clone' to refer to those things which are produced by methods such as counterfeiting, alteration, duplication or simulation. To satisfy the requirements of secure and low-cost techniques for preventing card fraud, we have recently developed a clone preventive system called 'FibeCrypt (Fiber Cryptosystem)' which utilizes physical characteristics. Each card has a canonical domain (i.e. a distinctive part), similar to fingerprints as the biometric measurement, made up of magnetic micro-fibers scattered randomly inside. We have applied cryptosystems to the system. FibeCrypt examines and authenticates the unique pattern of the canonical domain using pre-stored reference data and a digital signature. In our paper, the schemes and the features of this system are described in detail. The results of our examinations show the accuracy of authentication of the system. We conclude that this authentication technique which utilizes physical characteristics can be very effective for clone prevention in various fields.

  10. A one-time pad color image cryptosystem based on SHA-3 and multiple chaotic systems

    NASA Astrophysics Data System (ADS)

    Wang, Xingyuan; Wang, Siwei; Zhang, Yingqian; Luo, Chao

    2018-04-01

    A novel image encryption algorithm is proposed that combines the SHA-3 hash function and two chaotic systems: the hyper-chaotic Lorenz and Chen systems. First, 384 bit keystream hash values are obtained by applying SHA-3 to plaintext. The sensitivity of the SHA-3 algorithm and chaotic systems ensures the effect of a one-time pad. Second, the color image is expanded into three-dimensional space. During permutation, it undergoes plane-plane displacements in the x, y and z dimensions. During diffusion, we use the adjacent pixel dataset and corresponding chaotic value to encrypt each pixel. Finally, the structure of alternating between permutation and diffusion is applied to enhance the level of security. Furthermore, we design techniques to improve the algorithm's encryption speed. Our experimental simulations show that the proposed cryptosystem achieves excellent encryption performance and can resist brute-force, statistical, and chosen-plaintext attacks.

  11. Chaos based video encryption using maps and Ikeda time delay system

    NASA Astrophysics Data System (ADS)

    Valli, D.; Ganesan, K.

    2017-12-01

    Chaos based cryptosystems are an efficient method to deal with improved speed and highly secured multimedia encryption because of its elegant features, such as randomness, mixing, ergodicity, sensitivity to initial conditions and control parameters. In this paper, two chaos based cryptosystems are proposed: one is the higher-dimensional 12D chaotic map and the other is based on the Ikeda delay differential equation (DDE) suitable for designing a real-time secure symmetric video encryption scheme. These encryption schemes employ a substitution box (S-box) to diffuse the relationship between pixels of plain video and cipher video along with the diffusion of current input pixel with the previous cipher pixel, called cipher block chaining (CBC). The proposed method enhances the robustness against statistical, differential and chosen/known plain text attacks. Detailed analysis is carried out in this paper to demonstrate the security and uniqueness of the proposed scheme.

  12. Shannon: Theory and cryptography

    NASA Astrophysics Data System (ADS)

    Roefs, H. F. A.

    1982-11-01

    The ideas of Shannon as a theoretical basis for cryptography are discussed. The notion of mutual information is introduced to provide a deeper understanding of the functioning of cryptographic systems. Shannon's absolute secure cryptosystem and his notion of unicity distance are explained.

  13. RSA cryptography and multi prime RSA cryptography

    NASA Astrophysics Data System (ADS)

    Sani, Nur Atiqah Abdul; Kamarulhaili, Hailiza

    2017-08-01

    RSA cryptography is one of the most powerful and popular cryptosystem which is being applied until now. There is one variant of RSA cryptography named Multi Prime RSA (MPRSA) cryptography. MPRSA cryptography is the improved version of RSA cryptography. We only need to modify a few steps in key generation part and apply the Chinese Remainder Theorem (CRT) in the decryption part to get the MPRSA algorithm. The focus of this research is to compare between the standard RSA cryptography and MPRSA cryptography in a few aspects. The research shows that MPRSA cryptography is more efficient than the RSA cryptography. Time complexity using Mathematica software is also conducted and it is proven that MPRSA cryptography has shorter time taken. It also implies the computational time is less than RSA cryptography. Mathematica software version 9.0 and a laptop HP ProBook 4331s are used to check the timing and to implement both algorithms.

  14. Image compression-encryption scheme based on hyper-chaotic system and 2D compressive sensing

    NASA Astrophysics Data System (ADS)

    Zhou, Nanrun; Pan, Shumin; Cheng, Shan; Zhou, Zhihong

    2016-08-01

    Most image encryption algorithms based on low-dimensional chaos systems bear security risks and suffer encryption data expansion when adopting nonlinear transformation directly. To overcome these weaknesses and reduce the possible transmission burden, an efficient image compression-encryption scheme based on hyper-chaotic system and 2D compressive sensing is proposed. The original image is measured by the measurement matrices in two directions to achieve compression and encryption simultaneously, and then the resulting image is re-encrypted by the cycle shift operation controlled by a hyper-chaotic system. Cycle shift operation can change the values of the pixels efficiently. The proposed cryptosystem decreases the volume of data to be transmitted and simplifies the keys distribution simultaneously as a nonlinear encryption system. Simulation results verify the validity and the reliability of the proposed algorithm with acceptable compression and security performance.

  15. An Interoperability Consideration in Selecting Domain Parameters for Elliptic Curve Cryptography

    NASA Technical Reports Server (NTRS)

    Ivancic, Will (Technical Monitor); Eddy, Wesley M.

    2005-01-01

    Elliptic curve cryptography (ECC) will be an important technology for electronic privacy and authentication in the near future. There are many published specifications for elliptic curve cryptosystems, most of which contain detailed descriptions of the process for the selection of domain parameters. Selecting strong domain parameters ensures that the cryptosystem is robust to attacks. Due to a limitation in several published algorithms for doubling points on elliptic curves, some ECC implementations may produce incorrect, inconsistent, and incompatible results if domain parameters are not carefully chosen under a criterion that we describe. Few documents specify the addition or doubling of points in such a manner as to avoid this problematic situation. The safety criterion we present is not listed in any ECC specification we are aware of, although several other guidelines for domain selection are discussed in the literature. We provide a simple example of how a set of domain parameters not meeting this criterion can produce catastrophic results, and outline a simple means of testing curve parameters for interoperable safety over doubling.

  16. Customized data container for improved performance in optical cryptosystems

    NASA Astrophysics Data System (ADS)

    Vélez Zea, Alejandro; Fredy Barrera, John; Torroba, Roberto

    2016-12-01

    Coherent optical encryption procedures introduce speckle noise to the output, limiting many practical applications. Until now the only method available to avoid this noise is to codify the information to be processed into a container that is encrypted instead of the original data. Although the decrypted container presents the noise due to the optical processing, their features remain recognizable enough to allow decoding, bringing the original information free of any kind of degradation. The first adopted containers were the quick response (QR) codes. However, the limitations of optical encryption procedures and the features of QR codes imply that in practice only simple codes containing small amounts of data can be processed without large experimental requirements. In order to overcome this problem, we introduce the first tailor made container to be processed in optical cryptosystems, ensuring larger noise tolerance and the ability to process more information with less experimental requirements. We present both simulations and experimental results to demonstrate the advantages of our proposal.

  17. Number theoretical foundations in cryptography

    NASA Astrophysics Data System (ADS)

    Atan, Kamel Ariffin Mohd

    2017-08-01

    In recent times the hazards in relationships among entities in different establishments worldwide have generated exciting developments in cryptography. Central to this is the theory of numbers. This area of mathematics provides very rich source of fundamental materials for constructing secret codes. Some number theoretical concepts that have been very actively used in designing crypto systems will be highlighted in this presentation. This paper will begin with introduction to basic number theoretical concepts which for many years have been thought to have no practical applications. This will include several theoretical assertions that were discovered much earlier in the historical development of number theory. This will be followed by discussion on the "hidden" properties of these assertions that were later exploited by designers of cryptosystems in their quest for developing secret codes. This paper also highlights some earlier and existing cryptosystems and the role played by number theoretical concepts in their constructions. The role played by cryptanalysts in detecting weaknesses in the systems developed by cryptographers concludes this presentation.

  18. An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem.

    PubMed

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2015-03-01

    The telecare medical information systems (TMISs) enable patients to conveniently enjoy telecare services at home. The protection of patient's privacy is a key issue due to the openness of communication environment. Authentication as a typical approach is adopted to guarantee confidential and authorized interaction between the patient and remote server. In order to achieve the goals, numerous remote authentication schemes based on cryptography have been presented. Recently, Arshad et al. (J Med Syst 38(12): 2014) presented a secure and efficient three-factor authenticated key exchange scheme to remedy the weaknesses of Tan et al.'s scheme (J Med Syst 38(3): 2014). In this paper, we found that once a successful off-line password attack that results in an adversary could impersonate any user of the system in Arshad et al.'s scheme. In order to thwart these security attacks, an enhanced biometric and smart card based remote authentication scheme for TMISs is proposed. In addition, the BAN logic is applied to demonstrate the completeness of the enhanced scheme. Security and performance analyses show that our enhanced scheme satisfies more security properties and less computational cost compared with previously proposed schemes.

  19. A novel algorithm for thermal image encryption.

    PubMed

    Hussain, Iqtadar; Anees, Amir; Algarni, Abdulmohsen

    2018-04-16

    Thermal images play a vital character at nuclear plants, Power stations, Forensic labs biological research, and petroleum products extraction. Safety of thermal images is very important. Image data has some unique features such as intensity, contrast, homogeneity, entropy and correlation among pixels that is why somehow image encryption is trickier as compare to other encryptions. With conventional image encryption schemes it is normally hard to handle these features. Therefore, cryptographers have paid attention to some attractive properties of the chaotic maps such as randomness and sensitivity to build up novel cryptosystems. That is why, recently proposed image encryption techniques progressively more depends on the application of chaotic maps. This paper proposed an image encryption algorithm based on Chebyshev chaotic map and S8 Symmetric group of permutation based substitution boxes. Primarily, parameters of chaotic Chebyshev map are chosen as a secret key to mystify the primary image. Then, the plaintext image is encrypted by the method generated from the substitution boxes and Chebyshev map. By this process, we can get a cipher text image that is perfectly twisted and dispersed. The outcomes of renowned experiments, key sensitivity tests and statistical analysis confirm that the proposed algorithm offers a safe and efficient approach for real-time image encryption.

  20. A noise resistant symmetric key cryptosystem based on S8 S-boxes and chaotic maps

    NASA Astrophysics Data System (ADS)

    Hussain, Iqtadar; Anees, Amir; Aslam, Muhammad; Ahmed, Rehan; Siddiqui, Nasir

    2018-04-01

    In this manuscript, we have proposed an encryption algorithm to encrypt any digital data. The proposed algorithm is primarily based on the substitution-permutation in which the substitution process is performed by the S 8 Substitution boxes. The proposed algorithm incorporates three different chaotic maps. We have analysed the behaviour of chaos by secure communication in great length, and accordingly, we have applied those chaotic sequences in the proposed encryption algorithm. The simulation and statistical results revealed that the proposed encryption scheme is secure against different attacks. Moreover, the encryption scheme can tolerate the channel noise as well; if the encrypted data is corrupted by the unauthenticated user or by the channel noise, the decryption can still be successfully done with some distortion. The overall results confirmed that the presented work has good cryptographic features, low computational complexity and resistant to the channel noise which makes it suitable for low profile mobile applications.

  1. Optical asymmetric image encryption using gyrator wavelet transform

    NASA Astrophysics Data System (ADS)

    Mehra, Isha; Nishchal, Naveen K.

    2015-11-01

    In this paper, we propose a new optical information processing tool termed as gyrator wavelet transform to secure a fully phase image, based on amplitude- and phase-truncation approach. The gyrator wavelet transform constitutes four basic parameters; gyrator transform order, type and level of mother wavelet, and position of different frequency bands. These parameters are used as encryption keys in addition to the random phase codes to the optical cryptosystem. This tool has also been applied for simultaneous compression and encryption of an image. The system's performance and its sensitivity to the encryption parameters, such as, gyrator transform order, and robustness has also been analyzed. It is expected that this tool will not only update current optical security systems, but may also shed some light on future developments. The computer simulation results demonstrate the abilities of the gyrator wavelet transform as an effective tool, which can be used in various optical information processing applications, including image encryption, and image compression. Also this tool can be applied for securing the color image, multispectral, and three-dimensional images.

  2. Quantum hacking on a practical continuous-variable quantum cryptosystem by inserting an external light

    NASA Astrophysics Data System (ADS)

    Qin, Hao; Kumar, Rupesh; Alleaume, Romain

    2015-10-01

    We report here a new side channel attack on a practical continuous-variable (CV) quantum key distribution (QKD) system. Inspired by blinding attack in discrete-variable QKD, we formalize an attack strategy by inserting an external light into a CV QKD system implemented Gaussian-modulated coherent state protocol and show that our attack can compromise its practical security. In this attack, we concern imperfections of a balanced homodyne detector used in CV QKD. According to our analysis, if one inserts an external light into Bob's signal port, due to the imperfect subtraction from the homodyne detector, the leakage of the external light contributes a displacement on the homodyne signal which causes detector electronics saturation. In consequence, Bob's quadrature measurement is not linear with the quadrature sent by Alice. By considering such vulnerability, a potential Eve can launch a full intercept-resend attack meanwhile she inserts an external light into Bob's signal port. By selecting proper properties of the external light, Eve actively controls the induced displacement value from the inserted light which results saturation of homodyne detection. In consequence, Eve can bias the excess noise due to the intercept-resend attack and the external light, such that Alice and Bob believe their excess noise estimation is below the null key threshold and they can still share a secret key. Our attack shows that the detector loopholes also exist in CV QKD, and it seems influence all the CV QKD systems using homodyne detection, since all the practical detectors have finite detection range.

  3. Scalability, Complexity and Reliability in Quantum Information Processing

    DTIC Science & Technology

    2007-03-01

    finding short lattice vectors . In [2], we showed that the generalization of the standard method --- random coset state preparation followed by fourier...results in cryptography. In [3], we proposed an efficient new cryptosystem based on the quantum intractability of finding short vectors in a lattice...state. We have explored realizations with neutral atoms as well as a more promising scheme employing polar molecules that allows for much stronger

  4. High-Rate Strong-Signal Quantum Cryptography

    NASA Technical Reports Server (NTRS)

    Yuen, Horace P.

    1996-01-01

    Several quantum cryptosystems utilizing different kinds of nonclassical lights, which can accommodate high intensity fields and high data rate, are described. However, they are all sensitive to loss and both the high rate and the strong-signal character rapidly disappear. A squeezed light homodyne detection scheme is proposed which, with present-day technology, leads to more than two orders of magnitude data rate improvement over other current experimental systems for moderate loss.

  5. Meeting the security requirements of electronic medical records in the ERA of high-speed computing.

    PubMed

    Alanazi, H O; Zaidan, A A; Zaidan, B B; Kiah, M L Mat; Al-Bakri, S H

    2015-01-01

    This study has two objectives. First, it aims to develop a system with a highly secured approach to transmitting electronic medical records (EMRs), and second, it aims to identify entities that transmit private patient information without permission. The NTRU and the Advanced Encryption Standard (AES) cryptosystems are secured encryption methods. The AES is a tested technology that has already been utilized in several systems to secure sensitive data. The United States government has been using AES since June 2003 to protect sensitive and essential information. Meanwhile, NTRU protects sensitive data against attacks through the use of quantum computers, which can break the RSA cryptosystem and elliptic curve cryptography algorithms. A hybrid of AES and NTRU is developed in this work to improve EMR security. The proposed hybrid cryptography technique is implemented to secure the data transmission process of EMRs. The proposed security solution can provide protection for over 40 years and is resistant to quantum computers. Moreover, the technique provides the necessary evidence required by law to identify disclosure or misuse of patient records. The proposed solution can effectively secure EMR transmission and protect patient rights. It also identifies the source responsible for disclosing confidential patient records. The proposed hybrid technique for securing data managed by institutional websites must be improved in the future.

  6. Alignment and bit extraction for secure fingerprint biometrics

    NASA Astrophysics Data System (ADS)

    Nagar, A.; Rane, S.; Vetro, A.

    2010-01-01

    Security of biometric templates stored in a system is important because a stolen template can compromise system security as well as user privacy. Therefore, a number of secure biometrics schemes have been proposed that facilitate matching of feature templates without the need for a stored biometric sample. However, most of these schemes suffer from poor matching performance owing to the difficulty of designing biometric features that remain robust over repeated biometric measurements. This paper describes a scheme to extract binary features from fingerprints using minutia points and fingerprint ridges. The features are amenable to direct matching based on binary Hamming distance, but are especially suitable for use in secure biometric cryptosystems that use standard error correcting codes. Given all binary features, a method for retaining only the most discriminable features is presented which improves the Genuine Accept Rate (GAR) from 82% to 90% at a False Accept Rate (FAR) of 0.1% on a well-known public database. Additionally, incorporating singular points such as a core or delta feature is shown to improve the matching tradeoff.

  7. Real-time and encryption efficiency improvements of simultaneous fusion, compression and encryption method based on chaotic generators

    NASA Astrophysics Data System (ADS)

    Jridi, Maher; Alfalou, Ayman

    2018-03-01

    In this paper, enhancement of an existing optical simultaneous fusion, compression and encryption (SFCE) scheme in terms of real-time requirements, bandwidth occupation and encryption robustness is proposed. We have used and approximate form of the DCT to decrease the computational resources. Then, a novel chaos-based encryption algorithm is introduced in order to achieve the confusion and diffusion effects. In the confusion phase, Henon map is used for row and column permutations, where the initial condition is related to the original image. Furthermore, the Skew Tent map is employed to generate another random matrix in order to carry out pixel scrambling. Finally, an adaptation of a classical diffusion process scheme is employed to strengthen security of the cryptosystem against statistical, differential, and chosen plaintext attacks. Analyses of key space, histogram, adjacent pixel correlation, sensitivity, and encryption speed of the encryption scheme are provided, and favorably compared to those of the existing crypto-compression system. The proposed method has been found to be digital/optical implementation-friendly which facilitates the integration of the crypto-compression system on a very broad range of scenarios.

  8. Subspace Arrangement Codes and Cryptosystems

    DTIC Science & Technology

    2011-05-09

    any other prov1sion of law, no person shall be subject to any penalty for failing to comply w1th a collection of information if it does not display a...NUMBER OF PAGES 49 19a. NAME OF RESPONSIBLE PERSON 19b. TELEPHONE NUMBER (Include area code) Standard Form 298 (Rev. 8/98) Prescribed by ANSI Std...theory is finding codes that have a small number of digits (length) with a high number codewords (dimension), as well as good error-correction properties

  9. A secure protocol for protecting the identity of providers when disclosing data for disease surveillance

    PubMed Central

    Hu, Jun; Mercer, Jay; Peyton, Liam; Kantarcioglu, Murat; Malin, Bradley; Buckeridge, David; Samet, Saeed; Earle, Craig

    2011-01-01

    Background Providers have been reluctant to disclose patient data for public-health purposes. Even if patient privacy is ensured, the desire to protect provider confidentiality has been an important driver of this reluctance. Methods Six requirements for a surveillance protocol were defined that satisfy the confidentiality needs of providers and ensure utility to public health. The authors developed a secure multi-party computation protocol using the Paillier cryptosystem to allow the disclosure of stratified case counts and denominators to meet these requirements. The authors evaluated the protocol in a simulated environment on its computation performance and ability to detect disease outbreak clusters. Results Theoretical and empirical assessments demonstrate that all requirements are met by the protocol. A system implementing the protocol scales linearly in terms of computation time as the number of providers is increased. The absolute time to perform the computations was 12.5 s for data from 3000 practices. This is acceptable performance, given that the reporting would normally be done at 24 h intervals. The accuracy of detection disease outbreak cluster was unchanged compared with a non-secure distributed surveillance protocol, with an F-score higher than 0.92 for outbreaks involving 500 or more cases. Conclusion The protocol and associated software provide a practical method for providers to disclose patient data for sentinel, syndromic or other indicator-based surveillance while protecting patient privacy and the identity of individual providers. PMID:21486880

  10. Cooperating attackers in neural cryptography.

    PubMed

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  11. A cryptologic based trust center for medical images.

    PubMed

    Wong, S T

    1996-01-01

    To investigate practical solutions that can integrate cryptographic techniques and picture archiving and communication systems (PACS) to improve the security of medical images. The PACS at the University of California San Francisco Medical Center consolidate images and associated data from various scanners into a centralized data archive and transmit them to remote display stations for review and consultation purposes. The purpose of this study is to investigate the model of a digital trust center that integrates cryptographic algorithms and protocols seamlessly into such a digital radiology environment to improve the security of medical images. The timing performance of encryption, decryption, and transmission of the cryptographic protocols over 81 volumetric PACS datasets has been measured. Lossless data compression is also applied before the encryption. The transmission performance is measured against three types of networks of different bandwidths: narrow-band Integrated Services Digital Network, Ethernet, and OC-3c Asynchronous Transfer Mode. The proposed digital trust center provides a cryptosystem solution to protect the confidentiality and to determine the authenticity of digital images in hospitals. The results of this study indicate that diagnostic images such as x-rays and magnetic resonance images could be routinely encrypted in PACS. However, applying encryption in teleradiology and PACS is a tradeoff between communications performance and security measures. Many people are uncertain about how to integrate cryptographic algorithms coherently into existing operations of the clinical enterprise. This paper describes a centralized cryptosystem architecture to ensure image data authenticity in a digital radiology department. The system performance has been evaluated in a hospital-integrated PACS environment.

  12. A cryptologic based trust center for medical images.

    PubMed Central

    Wong, S T

    1996-01-01

    OBJECTIVE: To investigate practical solutions that can integrate cryptographic techniques and picture archiving and communication systems (PACS) to improve the security of medical images. DESIGN: The PACS at the University of California San Francisco Medical Center consolidate images and associated data from various scanners into a centralized data archive and transmit them to remote display stations for review and consultation purposes. The purpose of this study is to investigate the model of a digital trust center that integrates cryptographic algorithms and protocols seamlessly into such a digital radiology environment to improve the security of medical images. MEASUREMENTS: The timing performance of encryption, decryption, and transmission of the cryptographic protocols over 81 volumetric PACS datasets has been measured. Lossless data compression is also applied before the encryption. The transmission performance is measured against three types of networks of different bandwidths: narrow-band Integrated Services Digital Network, Ethernet, and OC-3c Asynchronous Transfer Mode. RESULTS: The proposed digital trust center provides a cryptosystem solution to protect the confidentiality and to determine the authenticity of digital images in hospitals. The results of this study indicate that diagnostic images such as x-rays and magnetic resonance images could be routinely encrypted in PACS. However, applying encryption in teleradiology and PACS is a tradeoff between communications performance and security measures. CONCLUSION: Many people are uncertain about how to integrate cryptographic algorithms coherently into existing operations of the clinical enterprise. This paper describes a centralized cryptosystem architecture to ensure image data authenticity in a digital radiology department. The system performance has been evaluated in a hospital-integrated PACS environment. PMID:8930857

  13. Sliding mode control for generalized robust synchronization of mismatched fractional order dynamical systems and its application to secure transmission of voice messages.

    PubMed

    Muthukumar, P; Balasubramaniam, P; Ratnavelu, K

    2017-07-26

    This paper proposes a generalized robust synchronization method for different dimensional fractional order dynamical systems with mismatched fractional derivatives in the presence of function uncertainty and external disturbance by a designing sliding mode controller. Based on the proposed theory of generalized robust synchronization criterion, a novel audio cryptosystem is proposed for sending or sharing voice messages secretly via insecure channel. Numerical examples are given to verify the potency of the proposed theories. Copyright © 2017 ISA. Published by Elsevier Ltd. All rights reserved.

  14. A quantum optical firewall based on simple quantum devices

    NASA Astrophysics Data System (ADS)

    Amellal, H.; Meslouhi, A.; Hassouni, Y.; El Baz, M.

    2015-07-01

    In order to enhance the transmission security in quantum communications via coherent states, we propose a quantum optical firewall device to protect a quantum cryptosystem against eavesdropping through optical attack strategies. Similar to the classical model of the firewall, the proposed device gives legitimate users the possibility of filtering, controlling (input/output states) and making a decision (access or deny) concerning the traveling states. To prove the security and efficiency of the suggested optical firewall, we analyze its performances against the family of intercept and resend attacks, especially against one of the most prominent attack schemes known as "Faked State Attack."

  15. Devil's vortex Fresnel lens phase masks on an asymmetric cryptosystem based on phase-truncation in gyrator wavelet transform domain

    NASA Astrophysics Data System (ADS)

    Singh, Hukum

    2016-06-01

    An asymmetric scheme has been proposed for optical double images encryption in the gyrator wavelet transform (GWT) domain. Grayscale and binary images are encrypted separately using double random phase encoding (DRPE) in the GWT domain. Phase masks based on devil's vortex Fresnel Lens (DVFLs) and random phase masks (RPMs) are jointly used in spatial as well as in the Fourier plane. The images to be encrypted are first gyrator transformed and then single-level discrete wavelet transformed (DWT) to decompose LL , HL , LH and HH matrices of approximation, horizontal, vertical and diagonal coefficients. The resulting coefficients from the DWT are multiplied by other RPMs and the results are applied to inverse discrete wavelet transform (IDWT) for obtaining the encrypted images. The images are recovered from their corresponding encrypted images by using the correct parameters of the GWT, DVFL and its digital implementation has been performed using MATLAB 7.6.0 (R2008a). The mother wavelet family, DVFL and gyrator transform orders associated with the GWT are extra keys that cause difficulty to an attacker. Thus, the scheme is more secure as compared to conventional techniques. The efficacy of the proposed scheme is verified by computing mean-squared-error (MSE) between recovered and the original images. The sensitivity of the proposed scheme is verified with encryption parameters and noise attacks.

  16. Palmprint Based Multidimensional Fuzzy Vault Scheme

    PubMed Central

    Liu, Hailun; Sun, Dongmei; Xiong, Ke; Qiu, Zhengding

    2014-01-01

    Fuzzy vault scheme (FVS) is one of the most popular biometric cryptosystems for biometric template protection. However, error correcting code (ECC) proposed in FVS is not appropriate to deal with real-valued biometric intraclass variances. In this paper, we propose a multidimensional fuzzy vault scheme (MDFVS) in which a general subspace error-tolerant mechanism is designed and embedded into FVS to handle intraclass variances. Palmprint is one of the most important biometrics; to protect palmprint templates; a palmprint based MDFVS implementation is also presented. Experimental results show that the proposed scheme not only can deal with intraclass variances effectively but also could maintain the accuracy and meanwhile enhance security. PMID:24892094

  17. A novel color image encryption scheme using alternate chaotic mapping structure

    NASA Astrophysics Data System (ADS)

    Wang, Xingyuan; Zhao, Yuanyuan; Zhang, Huili; Guo, Kang

    2016-07-01

    This paper proposes an color image encryption algorithm using alternate chaotic mapping structure. Initially, we use the R, G and B components to form a matrix. Then one-dimension logistic and two-dimension logistic mapping is used to generate a chaotic matrix, then iterate two chaotic mappings alternately to permute the matrix. For every iteration, XOR operation is adopted to encrypt plain-image matrix, then make further transformation to diffuse the matrix. At last, the encrypted color image is obtained from the confused matrix. Theoretical analysis and experimental results has proved the cryptosystem is secure and practical, and it is suitable for encrypting color images.

  18. Investigating Encrypted Material

    NASA Astrophysics Data System (ADS)

    McGrath, Niall; Gladyshev, Pavel; Kechadi, Tahar; Carthy, Joe

    When encrypted material is discovered during a digital investigation and the investigator cannot decrypt the material then s/he is faced with the problem of how to determine the evidential value of the material. This research is proposing a methodology of extracting probative value from the encrypted file of a hybrid cryptosystem. The methodology also incorporates a technique for locating the original plaintext file. Since child pornography (KP) images and terrorist related information (TI) are transmitted in encrypted format the digital investigator must ask the question Cui Bono? - who benefits or who is the recipient? By doing this the scope of the digital investigation can be extended to reveal the intended recipient.

  19. An Inexpensive Device for Teaching Public Key Encryption

    ERIC Educational Resources Information Center

    Pendegraft, Norman

    2009-01-01

    An inexpensive device to assist in teaching the main ideas of Public Key encryption and its use in class to illustrate the operation of public key encryption is described. It illustrates that there are two keys, and is particularly useful for illustrating that privacy is achieved by using the public key. Initial data from in class use seem to…

  20. Hybrid cryptosystem for image file using elgamal and double playfair cipher algorithm

    NASA Astrophysics Data System (ADS)

    Hardi, S. M.; Tarigan, J. T.; Safrina, N.

    2018-03-01

    In this paper, we present an implementation of an image file encryption using hybrid cryptography. We chose ElGamal algorithm to perform asymmetric encryption and Double Playfair for the symmetric encryption. Our objective is to show that these algorithms are capable to encrypt an image file with an acceptable running time and encrypted file size while maintaining the level of security. The application was built using C# programming language and ran as a stand alone desktop application under Windows Operating System. Our test shows that the system is capable to encrypt an image with a resolution of 500×500 to a size of 976 kilobytes with an acceptable running time.

  1. Optical double-image cryptography based on diffractive imaging with a laterally-translated phase grating.

    PubMed

    Chen, Wen; Chen, Xudong; Sheppard, Colin J R

    2011-10-10

    In this paper, we propose a method using structured-illumination-based diffractive imaging with a laterally-translated phase grating for optical double-image cryptography. An optical cryptosystem is designed, and multiple random phase-only masks are placed in the optical path. When a phase grating is laterally translated just before the plaintexts, several diffraction intensity patterns (i.e., ciphertexts) can be correspondingly obtained. During image decryption, an iterative retrieval algorithm is developed to extract plaintexts from the ciphertexts. In addition, security and advantages of the proposed method are analyzed. Feasibility and effectiveness of the proposed method are demonstrated by numerical simulation results. © 2011 Optical Society of America

  2. Two-dimensional DFA scaling analysis applied to encrypted images

    NASA Astrophysics Data System (ADS)

    Vargas-Olmos, C.; Murguía, J. S.; Ramírez-Torres, M. T.; Mejía Carlos, M.; Rosu, H. C.; González-Aguilar, H.

    2015-01-01

    The technique of detrended fluctuation analysis (DFA) has been widely used to unveil scaling properties of many different signals. In this paper, we determine scaling properties in the encrypted images by means of a two-dimensional DFA approach. To carry out the image encryption, we use an enhanced cryptosystem based on a rule-90 cellular automaton and we compare the results obtained with its unmodified version and the encryption system AES. The numerical results show that the encrypted images present a persistent behavior which is close to that of the 1/f-noise. These results point to the possibility that the DFA scaling exponent can be used to measure the quality of the encrypted image content.

  3. Authentication and Encryption Using Modified Elliptic Curve Cryptography with Particle Swarm Optimization and Cuckoo Search Algorithm

    NASA Astrophysics Data System (ADS)

    Kota, Sujatha; Padmanabhuni, Venkata Nageswara Rao; Budda, Kishor; K, Sruthi

    2018-05-01

    Elliptic Curve Cryptography (ECC) uses two keys private key and public key and is considered as a public key cryptographic algorithm that is used for both authentication of a person and confidentiality of data. Either one of the keys is used in encryption and other in decryption depending on usage. Private key is used in encryption by the user and public key is used to identify user in the case of authentication. Similarly, the sender encrypts with the private key and the public key is used to decrypt the message in case of confidentiality. Choosing the private key is always an issue in all public key Cryptographic Algorithms such as RSA, ECC. If tiny values are chosen in random the security of the complete algorithm becomes an issue. Since the Public key is computed based on the Private Key, if they are not chosen optimally they generate infinity values. The proposed Modified Elliptic Curve Cryptography uses selection in either of the choices; the first option is by using Particle Swarm Optimization and the second option is by using Cuckoo Search Algorithm for randomly choosing the values. The proposed algorithms are developed and tested using sample database and both are found to be secured and reliable. The test results prove that the private key is chosen optimally not repetitive or tiny and the computations in public key will not reach infinity.

  4. 21 CFR 1311.25 - Requirements for obtaining a CSOS digital certificate.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... public keys, the corresponding private key must be used to sign the certificate request. Verification of the signature using the public key in the request will serve as proof of possession of the private key. ... certification of the public digital signature key. After the request is approved, the Certification Authority...

  5. 21 CFR 1311.25 - Requirements for obtaining a CSOS digital certificate.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... public keys, the corresponding private key must be used to sign the certificate request. Verification of the signature using the public key in the request will serve as proof of possession of the private key. ... certification of the public digital signature key. After the request is approved, the Certification Authority...

  6. 21 CFR 1311.25 - Requirements for obtaining a CSOS digital certificate.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... public keys, the corresponding private key must be used to sign the certificate request. Verification of the signature using the public key in the request will serve as proof of possession of the private key. ... certification of the public digital signature key. After the request is approved, the Certification Authority...

  7. Complexity transitions in global algorithms for sparse linear systems over finite fields

    NASA Astrophysics Data System (ADS)

    Braunstein, A.; Leone, M.; Ricci-Tersenghi, F.; Zecchina, R.

    2002-09-01

    We study the computational complexity of a very basic problem, namely that of finding solutions to a very large set of random linear equations in a finite Galois field modulo q. Using tools from statistical mechanics we are able to identify phase transitions in the structure of the solution space and to connect them to the changes in the performance of a global algorithm, namely Gaussian elimination. Crossing phase boundaries produces a dramatic increase in memory and CPU requirements necessary for the algorithms. In turn, this causes the saturation of the upper bounds for the running time. We illustrate the results on the specific problem of integer factorization, which is of central interest for deciphering messages encrypted with the RSA cryptosystem.

  8. Key management of the double random-phase-encoding method using public-key encryption

    NASA Astrophysics Data System (ADS)

    Saini, Nirmala; Sinha, Aloka

    2010-03-01

    Public-key encryption has been used to encode the key of the encryption process. In the proposed technique, an input image has been encrypted by using the double random-phase-encoding method using extended fractional Fourier transform. The key of the encryption process have been encoded by using the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. The encoded key has then been transmitted to the receiver side along with the encrypted image. In the decryption process, first the encoded key has been decrypted using the secret key and then the encrypted image has been decrypted by using the retrieved key parameters. The proposed technique has advantage over double random-phase-encoding method because the problem associated with the transmission of the key has been eliminated by using public-key encryption. Computer simulation has been carried out to validate the proposed technique.

  9. 27 CFR 73.3 - What terms must I know to understand this part?

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... digest function, and the signer's public key, the recipient can verify: (1) Whether the transformation was accomplished with the private key that corresponds to the signer's public key; and (2) Whether the... verified. A signer creates a digital signature by using public-key encryption to transform a message digest...

  10. 27 CFR 73.3 - What terms must I know to understand this part?

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... digest function, and the signer's public key, the recipient can verify: (1) Whether the transformation was accomplished with the private key that corresponds to the signer's public key; and (2) Whether the... verified. A signer creates a digital signature by using public-key encryption to transform a message digest...

  11. 27 CFR 73.3 - What terms must I know to understand this part?

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... digest function, and the signer's public key, the recipient can verify: (1) Whether the transformation was accomplished with the private key that corresponds to the signer's public key; and (2) Whether the... verified. A signer creates a digital signature by using public-key encryption to transform a message digest...

  12. 75 FR 20364 - Public Buildings Service; Key Largo Beacon Annex Site; Key Largo, FL; Transfer of Property

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-19

    ... GENERAL SERVICES ADMINISTRATION [Wildlife Order 187; 4-D-FL-1218] Public Buildings Service; Key Largo Beacon Annex Site; Key Largo, FL; Transfer of Property Pursuant to section 2 of Public Law 537, 80th Congress, approved May 19, 1948 (16 U.S.C. 667c), notice is hereby given that: 1. The General...

  13. A Spatiotemporal-Chaos-Based Cryptosystem Taking Advantage of Both Synchronous and Self-Synchronizing Schemes

    NASA Astrophysics Data System (ADS)

    Lü, Hua-Ping; Wang, Shi-Hong; Li, Xiao-Wen; Tang, Guo-Ning; Kuang, Jin-Yu; Ye, Wei-Ping; Hu, Gang

    2004-06-01

    Two-dimensional one-way coupled map lattices are used for cryptography where multiple space units produce chaotic outputs in parallel. One of the outputs plays the role of driving for synchronization of the decryption system while the others perform the function of information encoding. With this separation of functions the receiver can establish a self-checking and self-correction mechanism, and enjoys the advantages of both synchronous and self-synchronizing schemes. A comparison between the present system with the system of advanced encryption standard (AES) is presented in the aspect of channel noise influence. Numerical investigations show that our system is much stronger than AES against channel noise perturbations, and thus can be better used for secure communications with large channel noise.

  14. A Double Perturbation Method for Reducing Dynamical Degradation of the Digital Baker Map

    NASA Astrophysics Data System (ADS)

    Liu, Lingfeng; Lin, Jun; Miao, Suoxia; Liu, Bocheng

    2017-06-01

    The digital Baker map is widely used in different kinds of cryptosystems, especially for image encryption. However, any chaotic map which is realized on the finite precision device (e.g. computer) will suffer from dynamical degradation, which refers to short cycle lengths, low complexity and strong correlations. In this paper, a novel double perturbation method is proposed for reducing the dynamical degradation of the digital Baker map. Both state variables and system parameters are perturbed by the digital logistic map. Numerical experiments show that the perturbed Baker map can achieve good statistical and cryptographic properties. Furthermore, a new image encryption algorithm is provided as a simple application. With a rather simple algorithm, the encrypted image can achieve high security, which is competitive to the recently proposed image encryption algorithms.

  15. 12 CFR 7.5005 - National bank acting as digital certification authority.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... persons associated with a particular public/private key pair. As part of this service, the bank may also maintain a listing or repository of public keys. (b) A national bank may issue digital certificates verifying attributes in addition to identity of persons associated with a particular public/private key pair...

  16. 12 CFR 7.5005 - National bank acting as digital certification authority.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... persons associated with a particular public/private key pair. As part of this service, the bank may also maintain a listing or repository of public keys. (b) A national bank may issue digital certificates verifying attributes in addition to identity of persons associated with a particular public/private key pair...

  17. 12 CFR 7.5005 - National bank acting as digital certification authority.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... persons associated with a particular public/private key pair. As part of this service, the bank may also maintain a listing or repository of public keys. (b) A national bank may issue digital certificates verifying attributes in addition to identity of persons associated with a particular public/private key pair...

  18. 12 CFR 7.5005 - National bank acting as digital certification authority.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... persons associated with a particular public/private key pair. As part of this service, the bank may also maintain a listing or repository of public keys. (b) A national bank may issue digital certificates verifying attributes in addition to identity of persons associated with a particular public/private key pair...

  19. Public Key Cryptography.

    ERIC Educational Resources Information Center

    Tapson, Frank

    1996-01-01

    Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)

  20. Key Performance Indicators of Public Universities Based on Quality Assessment Criteria in Thailand

    ERIC Educational Resources Information Center

    Sukboonyasatit, Kritsana; Thanapaisarn, Chaiwit; Manmar, Lampang

    2011-01-01

    The research objective was to develop public universities' key performance indicators. Qualitative research and interviews were employed with each public university's senior executive and quality assessors. The sample group was selected by the office of the public sector development commission and Thailand's public universities can be separated…

  1. An end to end secure CBIR over encrypted medical database.

    PubMed

    Bellafqira, Reda; Coatrieux, Gouenou; Bouslimi, Dalel; Quellec, Gwenole

    2016-08-01

    In this paper, we propose a new secure content based image retrieval (SCBIR) system adapted to the cloud framework. This solution allows a physician to retrieve images of similar content within an outsourced and encrypted image database, without decrypting them. Contrarily to actual CBIR approaches in the encrypted domain, the originality of the proposed scheme stands on the fact that the features extracted from the encrypted images are themselves encrypted. This is achieved by means of homomorphic encryption and two non-colluding servers, we however both consider as honest but curious. In that way an end to end secure CBIR process is ensured. Experimental results carried out on a diabetic retinopathy database encrypted with the Paillier cryptosystem indicate that our SCBIR achieves retrieval performance as good as if images were processed in their non-encrypted form.

  2. An authenticated image encryption scheme based on chaotic maps and memory cellular automata

    NASA Astrophysics Data System (ADS)

    Bakhshandeh, Atieh; Eslami, Ziba

    2013-06-01

    This paper introduces a new image encryption scheme based on chaotic maps, cellular automata and permutation-diffusion architecture. In the permutation phase, a piecewise linear chaotic map is utilized to confuse the plain-image and in the diffusion phase, we employ the Logistic map as well as a reversible memory cellular automata to obtain an efficient and secure cryptosystem. The proposed method admits advantages such as highly secure diffusion mechanism, computational efficiency and ease of implementation. A novel property of the proposed scheme is its authentication ability which can detect whether the image is tampered during the transmission or not. This is particularly important in applications where image data or part of it contains highly sensitive information. Results of various analyses manifest high security of this new method and its capability for practical image encryption.

  3. Optical image encryption using multilevel Arnold transform and noninterferometric imaging

    NASA Astrophysics Data System (ADS)

    Chen, Wen; Chen, Xudong

    2011-11-01

    Information security has attracted much current attention due to the rapid development of modern technologies, such as computer and internet. We propose a novel method for optical image encryption using multilevel Arnold transform and rotatable-phase-mask noninterferometric imaging. An optical image encryption scheme is developed in the gyrator transform domain, and one phase-only mask (i.e., phase grating) is rotated and updated during image encryption. For the decryption, an iterative retrieval algorithm is proposed to extract high-quality plaintexts. Conventional encoding methods (such as digital holography) have been proven vulnerably to the attacks, and the proposed optical encoding scheme can effectively eliminate security deficiency and significantly enhance cryptosystem security. The proposed strategy based on the rotatable phase-only mask can provide a new alternative for data/image encryption in the noninterferometric imaging.

  4. 23 CFR 450.210 - Interested parties, public involvement, and consultation.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... opportunities for public review and comment at key decision points. (1) The State's public involvement process... agencies, representatives of public transportation employees, freight shippers, private providers of... comment at key decision points, including but not limited to a reasonable opportunity to comment on the...

  5. 23 CFR 450.210 - Interested parties, public involvement, and consultation.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... opportunities for public review and comment at key decision points. (1) The State's public involvement process... agencies, representatives of public transportation employees, freight shippers, private providers of... comment at key decision points, including but not limited to a reasonable opportunity to comment on the...

  6. 23 CFR 450.210 - Interested parties, public involvement, and consultation.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... opportunities for public review and comment at key decision points. (1) The State's public involvement process... agencies, representatives of public transportation employees, freight shippers, private providers of... comment at key decision points, including but not limited to a reasonable opportunity to comment on the...

  7. Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography

    NASA Astrophysics Data System (ADS)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2015-09-01

    In this paper, a novel image encryption system with fingerprint used as a secret key is proposed based on the phase retrieval algorithm and RSA public key algorithm. In the system, the encryption keys include the fingerprint and the public key of RSA algorithm, while the decryption keys are the fingerprint and the private key of RSA algorithm. If the users share the fingerprint, then the system will meet the basic agreement of asymmetric cryptography. The system is also applicable for the information authentication. The fingerprint as secret key is used in both the encryption and decryption processes so that the receiver can identify the authenticity of the ciphertext by using the fingerprint in decryption process. Finally, the simulation results show the validity of the encryption scheme and the high robustness against attacks based on the phase retrieval technique.

  8. Electronic Voting Protocol Using Identity-Based Cryptography.

    PubMed

    Gallegos-Garcia, Gina; Tapia-Recillas, Horacio

    2015-01-01

    Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE). With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI). Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps.

  9. Electronic Voting Protocol Using Identity-Based Cryptography

    PubMed Central

    Gallegos-Garcia, Gina; Tapia-Recillas, Horacio

    2015-01-01

    Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE). With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI). Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps. PMID:26090515

  10. Evaluation of unique identifiers used as keys to match identical publications in Pure and SciVal - a case study from health science.

    PubMed

    Madsen, Heidi Holst; Madsen, Dicte; Gauffriau, Marianne

    2016-01-01

    Unique identifiers (UID) are seen as an effective key to match identical publications across databases or identify duplicates in a database. The objective of the present study is to investigate how well UIDs work as match keys in the integration between Pure and SciVal, based on a case with publications from the health sciences. We evaluate the matching process based on information about coverage, precision, and characteristics of publications matched versus not matched with UIDs as the match keys. We analyze this information to detect errors, if any, in the matching process. As an example we also briefly discuss how publication sets formed by using UIDs as the match keys may affect the bibliometric indicators number of publications, number of citations, and the average number of citations per publication.  The objective is addressed in a literature review and a case study. The literature review shows that only a few studies evaluate how well UIDs work as a match key. From the literature we identify four error types: Duplicate digital object identifiers (DOI), incorrect DOIs in reference lists and databases, DOIs not registered by the database where a bibliometric analysis is performed, and erroneous optical or special character recognition. The case study explores the use of UIDs in the integration between the databases Pure and SciVal. Specifically journal publications in English are matched between the two databases. We find all error types except erroneous optical or special character recognition in our publication sets. In particular the duplicate DOIs constitute a problem for the calculation of bibliometric indicators as both keeping the duplicates to improve the reliability of citation counts and deleting them to improve the reliability of publication counts will distort the calculation of average number of citations per publication. The use of UIDs as a match key in citation linking is implemented in many settings, and the availability of UIDs may become critical for the inclusion of a publication or a database in a bibliometric analysis.

  11. Evaluation of unique identifiers used as keys to match identical publications in Pure and SciVal – a case study from health science

    PubMed Central

    Madsen, Heidi Holst; Madsen, Dicte; Gauffriau, Marianne

    2016-01-01

    Unique identifiers (UID) are seen as an effective key to match identical publications across databases or identify duplicates in a database. The objective of the present study is to investigate how well UIDs work as match keys in the integration between Pure and SciVal, based on a case with publications from the health sciences. We evaluate the matching process based on information about coverage, precision, and characteristics of publications matched versus not matched with UIDs as the match keys. We analyze this information to detect errors, if any, in the matching process. As an example we also briefly discuss how publication sets formed by using UIDs as the match keys may affect the bibliometric indicators number of publications, number of citations, and the average number of citations per publication.  The objective is addressed in a literature review and a case study. The literature review shows that only a few studies evaluate how well UIDs work as a match key. From the literature we identify four error types: Duplicate digital object identifiers (DOI), incorrect DOIs in reference lists and databases, DOIs not registered by the database where a bibliometric analysis is performed, and erroneous optical or special character recognition. The case study explores the use of UIDs in the integration between the databases Pure and SciVal. Specifically journal publications in English are matched between the two databases. We find all error types except erroneous optical or special character recognition in our publication sets. In particular the duplicate DOIs constitute a problem for the calculation of bibliometric indicators as both keeping the duplicates to improve the reliability of citation counts and deleting them to improve the reliability of publication counts will distort the calculation of average number of citations per publication. The use of UIDs as a match key in citation linking is implemented in many settings, and the availability of UIDs may become critical for the inclusion of a publication or a database in a bibliometric analysis. PMID:27635223

  12. A Public-Key Based Authentication and Key Establishment Protocol Coupled with a Client Puzzle.

    ERIC Educational Resources Information Center

    Lee, M. C.; Fung, Chun-Kan

    2003-01-01

    Discusses network denial-of-service attacks which have become a security threat to the Internet community and suggests the need for reliable authentication protocols in client-server applications. Presents a public-key based authentication and key establishment protocol coupled with a client puzzle protocol and validates it through formal logic…

  13. Information security system based on virtual-optics imaging methodology and public key infrastructure

    NASA Astrophysics Data System (ADS)

    Peng, Xiang; Zhang, Peng; Cai, Lilong

    In this paper, we present a virtual-optical based information security system model with the aid of public-key-infrastructure (PKI) techniques. The proposed model employs a hybrid architecture in which our previously published encryption algorithm based on virtual-optics imaging methodology (VOIM) can be used to encipher and decipher data while an asymmetric algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). For an asymmetric system, given an encryption key, it is computationally infeasible to determine the decryption key and vice versa. The whole information security model is run under the framework of PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOIM security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network.

  14. Dental Public Health In Action: Putting Oral Health on the Local Public Health Agenda.

    PubMed

    Walker, I F; Eapen-Simon, S; Gibson, S

    2018-04-18

    Oral health is a key public health issue across England. In Wakefield in the north of England, local data suggested the oral health of local children was significantly worse than the national average. This paper describes the work undertaken by Wakefield Council to strategically address this issue. A structured process was adopted. Key lessons include; having senior ownership from the Director of Public Health, partnership working across all key stakeholders, utilising dental public health expertise from Public Health England and the use of extensive engagement with stakeholders. Through this work, oral health is now identified with greater importance in Wakefield as a public health issue. Actions are now strategically co-ordinated across stakeholders to improve oral health in local children. Copyright© 2018 Dennis Barber Ltd.

  15. Modeling, Simulation and Analysis of Public Key Infrastructure

    NASA Technical Reports Server (NTRS)

    Liu, Yuan-Kwei; Tuey, Richard; Ma, Paul (Technical Monitor)

    1998-01-01

    Security is an essential part of network communication. The advances in cryptography have provided solutions to many of the network security requirements. Public Key Infrastructure (PKI) is the foundation of the cryptography applications. The main objective of this research is to design a model to simulate a reliable, scalable, manageable, and high-performance public key infrastructure. We build a model to simulate the NASA public key infrastructure by using SimProcess and MatLab Software. The simulation is from top level all the way down to the computation needed for encryption, decryption, digital signature, and secure web server. The application of secure web server could be utilized in wireless communications. The results of the simulation are analyzed and confirmed by using queueing theory.

  16. NP-hardness of decoding quantum error-correction codes

    NASA Astrophysics Data System (ADS)

    Hsieh, Min-Hsiu; Le Gall, François

    2011-05-01

    Although the theory of quantum error correction is intimately related to classical coding theory and, in particular, one can construct quantum error-correction codes (QECCs) from classical codes with the dual-containing property, this does not necessarily imply that the computational complexity of decoding QECCs is the same as their classical counterparts. Instead, decoding QECCs can be very much different from decoding classical codes due to the degeneracy property. Intuitively, one expects degeneracy would simplify the decoding since two different errors might not and need not be distinguished in order to correct them. However, we show that general quantum decoding problem is NP-hard regardless of the quantum codes being degenerate or nondegenerate. This finding implies that no considerably fast decoding algorithm exists for the general quantum decoding problems and suggests the existence of a quantum cryptosystem based on the hardness of decoding QECCs.

  17. Optical cryptography topology based on a three-dimensional particle-like distribution and diffractive imaging.

    PubMed

    Chen, Wen; Chen, Xudong

    2011-05-09

    In recent years, coherent diffractive imaging has been considered as a promising alternative for information retrieval instead of conventional interference methods. Coherent diffractive imaging using the X-ray light source has opened up a new research perspective for the measurement of non-crystalline and biological specimens, and can achieve unprecedentedly high resolutions. In this paper, we show how a three-dimensional (3D) particle-like distribution and coherent diffractive imaging can be applied for a study of optical cryptography. An optical multiple-random-phase-mask encoding approach is used, and the plaintext is considered as a series of particles distributed in a 3D space. A topology concept is also introduced into the proposed optical cryptosystem. During image decryption, a retrieval algorithm is developed to extract the plaintext from the ciphertexts. In addition, security and advantages of the proposed optical cryptography topology are also analyzed. © 2011 Optical Society of America

  18. Anonymous voting for multi-dimensional CV quantum system

    NASA Astrophysics Data System (ADS)

    Rong-Hua, Shi; Yi, Xiao; Jin-Jing, Shi; Ying, Guo; Moon-Ho, Lee

    2016-06-01

    We investigate the design of anonymous voting protocols, CV-based binary-valued ballot and CV-based multi-valued ballot with continuous variables (CV) in a multi-dimensional quantum cryptosystem to ensure the security of voting procedure and data privacy. The quantum entangled states are employed in the continuous variable quantum system to carry the voting information and assist information transmission, which takes the advantage of the GHZ-like states in terms of improving the utilization of quantum states by decreasing the number of required quantum states. It provides a potential approach to achieve the efficient quantum anonymous voting with high transmission security, especially in large-scale votes. Project supported by the National Natural Science Foundation of China (Grant Nos. 61272495, 61379153, and 61401519), the Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20130162110012), and the MEST-NRF of Korea (Grant No. 2012-002521).

  19. A Novel Byte-Substitution Architecture for the AES Cryptosystem.

    PubMed

    Hossain, Fakir Sharif; Ali, Md Liakot

    2015-01-01

    The performance of Advanced Encryption Standard (AES) mainly depends on speed, area and power. The S-box represents an important factor that affects the performance of AES on each of these factors. A number of techniques have been presented in the literature, which have attempted to improve the performance of the S-box byte-substitution. This paper proposes a new S-box architecture, defining it as ultra low power, robustly parallel and highly efficient in terms of area. The architecture is discussed for both CMOS and FPGA platforms, and the pipelined architecture of the proposed S-box is presented for further time savings and higher throughput along with higher hardware resources utilization. A performance analysis and comparison of the proposed architecture is also conducted with those achieved by the existing techniques. The results of the comparison verify the outperformance of the proposed architecture in terms of power, delay and size.

  20. A Novel Byte-Substitution Architecture for the AES Cryptosystem

    PubMed Central

    Hossain, Fakir Sharif; Ali, Md. Liakot

    2015-01-01

    The performance of Advanced Encryption Standard (AES) mainly depends on speed, area and power. The S-box represents an important factor that affects the performance of AES on each of these factors. A number of techniques have been presented in the literature, which have attempted to improve the performance of the S-box byte-substitution. This paper proposes a new S-box architecture, defining it as ultra low power, robustly parallel and highly efficient in terms of area. The architecture is discussed for both CMOS and FPGA platforms, and the pipelined architecture of the proposed S-box is presented for further time savings and higher throughput along with higher hardware resources utilization. A performance analysis and comparison of the proposed architecture is also conducted with those achieved by the existing techniques. The results of the comparison verify the outperformance of the proposed architecture in terms of power, delay and size. PMID:26491967

  1. Cryptanalysis of a chaotic communication scheme using adaptive observer.

    PubMed

    Liu, Ying; Tang, Wallace K S

    2008-12-01

    This paper addresses the cryptanalysis of a secure communication scheme recently proposed by Wu [Chaos 16, 043118 (2006)], where the information signal is modulated into a system parameter of a unified chaotic system. With the Kerckhoff principle, assuming that the structure of the cryptosystem is known, an adaptive observer can be designed to synchronize the targeted system, so that the transmitted information and the user-specific parameters are obtained. The success of adaptive synchronization is mathematically proved with the use of Lyapunov stability theory, based on the original assumption, i.e., the dynamical evolution of the information signal is available. A more practical case, but yet much more difficult, is also considered. As demonstrated with simulations, generalized synchronization is still possible, even if the derivative of the information signal is kept secret. Hence, the message can be coarsely estimated, making the security of the considered system questionable.

  2. S-Boxes Based on Affine Mapping and Orbit of Power Function

    NASA Astrophysics Data System (ADS)

    Khan, Mubashar; Azam, Naveed Ahmed

    2015-06-01

    The demand of data security against computational attacks such as algebraic, differential, linear and interpolation attacks has been increased as a result of rapid advancement in the field of computation. It is, therefore, necessary to develop such cryptosystems which can resist current cryptanalysis and more computational attacks in future. In this paper, we present a multiple S-boxes scheme based on affine mapping and orbit of the power function used in Advanced Encryption Standard (AES). The proposed technique results in 256 different S-boxes named as orbital S-boxes. Rigorous tests and comparisons are performed to analyse the cryptographic strength of each of the orbital S-boxes. Furthermore, gray scale images are encrypted by using multiple orbital S-boxes. Results and simulations show that the encryption strength of the orbital S-boxes against computational attacks is better than that of the existing S-boxes.

  3. Cryptanalysis and improvement of an optical image encryption scheme using a chaotic Baker map and double random phase encoding

    NASA Astrophysics Data System (ADS)

    Chen, Jun-Xin; Zhu, Zhi-Liang; Fu, Chong; Zhang, Li-Bo; Zhang, Yushu

    2014-12-01

    In this paper, we evaluate the security of an enhanced double random phase encoding (DRPE) image encryption scheme (2013 J. Lightwave Technol. 31 2533). The original system employs a chaotic Baker map prior to DRPE to provide more protection to the plain image and hence promote the security level of DRPE, as claimed. However, cryptanalysis shows that this scheme is vulnerable to a chosen-plaintext attack, and the ciphertext can be precisely recovered. The corresponding improvement is subsequently reported upon the basic premise that no extra equipment or computational complexity is required. The simulation results and security analyses prove its effectiveness and security. The proposed achievements are suitable for all cryptosystems under permutation and, following that, the DRPE architecture, and we hope that our work can motivate the further research on optical image encryption.

  4. Applying elliptic curve cryptography to a chaotic synchronisation system: neural-network-based approach

    NASA Astrophysics Data System (ADS)

    Hsiao, Feng-Hsiag

    2017-10-01

    In order to obtain double encryption via elliptic curve cryptography (ECC) and chaotic synchronisation, this study presents a design methodology for neural-network (NN)-based secure communications in multiple time-delay chaotic systems. ECC is an asymmetric encryption and its strength is based on the difficulty of solving the elliptic curve discrete logarithm problem which is a much harder problem than factoring integers. Because it is much harder, we can get away with fewer bits to provide the same level of security. To enhance the strength of the cryptosystem, we conduct double encryption that combines chaotic synchronisation with ECC. According to the improved genetic algorithm, a fuzzy controller is synthesised to realise the exponential synchronisation and achieves optimal H∞ performance by minimising the disturbances attenuation level. Finally, a numerical example with simulations is given to demonstrate the effectiveness of the proposed approach.

  5. McEliece PKC Calculator

    NASA Astrophysics Data System (ADS)

    Marek, Repka

    2015-01-01

    The original McEliece PKC proposal is interesting thanks to its resistance against all known attacks, even using quantum cryptanalysis, in an IND-CCA2 secure conversion. Here we present a generic implementation of the original McEliece PKC proposal, which provides test vectors (for all important intermediate results), and also in which a measurement tool for side-channel analysis is employed. To our best knowledge, this is the first such an implementation. This Calculator is valuable in implementation optimization, in further McEliece/Niederreiter like PKCs properties investigations, and also in teaching. Thanks to that, one can, for example, examine side-channel vulnerability of a certain implementation, or one can find out and test particular parameters of the cryptosystem in order to make them appropriate for an efficient hardware implementation. This implementation is available [1] in executable binary format, and as a static C++ library, as well as in form of source codes, for Linux and Windows operating systems.

  6. 32 CFR 64.3 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... MOBILIZATION OF REGULAR AND RESERVE RETIRED MILITARY MEMBERS § 64.3 Definitions. (a) Key employee. Any Reservist or any military retiree (Regular or Reserve) identified by his or her employer, private or public, as filling a key position. (b) Key position. A civilian position, public or private (designated by an...

  7. 32 CFR 64.3 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... MOBILIZATION OF REGULAR AND RESERVE RETIRED MILITARY MEMBERS § 64.3 Definitions. (a) Key employee. Any Reservist or any military retiree (Regular or Reserve) identified by his or her employer, private or public, as filling a key position. (b) Key position. A civilian position, public or private (designated by an...

  8. 32 CFR 64.3 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... MOBILIZATION OF REGULAR AND RESERVE RETIRED MILITARY MEMBERS § 64.3 Definitions. (a) Key employee. Any Reservist or any military retiree (Regular or Reserve) identified by his or her employer, private or public, as filling a key position. (b) Key position. A civilian position, public or private (designated by an...

  9. 32 CFR 64.3 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... MOBILIZATION OF REGULAR AND RESERVE RETIRED MILITARY MEMBERS § 64.3 Definitions. (a) Key employee. Any Reservist or any military retiree (Regular or Reserve) identified by his or her employer, private or public, as filling a key position. (b) Key position. A civilian position, public or private (designated by an...

  10. 32 CFR 64.3 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... MOBILIZATION OF REGULAR AND RESERVE RETIRED MILITARY MEMBERS § 64.3 Definitions. (a) Key employee. Any Reservist or any military retiree (Regular or Reserve) identified by his or her employer, private or public, as filling a key position. (b) Key position. A civilian position, public or private (designated by an...

  11. Deducing trapdoor primitives in public key encryption schemes

    NASA Astrophysics Data System (ADS)

    Pandey, Chandra

    2005-03-01

    Semantic security of public key encryption schemes is often interchangeable with the art of building trapdoors. In the frame of reference of Random Oracle methodology, the "Key Privacy" and "Anonymity" has often been discussed. However to a certain degree the security of most public key encryption schemes is required to be analyzed with formal proofs using one-way functions. This paper evaluates the design of El Gamal and RSA based schemes and attempts to parallelize the trapdoor primitives used in the computation of the cipher text, thereby magnifying the decryption error δp in the above schemes.

  12. Data publication and dissemination of interactive keys under the open access model

    USDA-ARS?s Scientific Manuscript database

    The concepts of publication, citation and dissemination of interactive keys and other online keys are discussed and illustrated by a sample paper published in the present issue (doi: 10.3897/zookeys.21.271). The present model is based on previous experience with several existing examples of publishi...

  13. Secure key storage and distribution

    DOEpatents

    Agrawal, Punit

    2015-06-02

    This disclosure describes a distributed, fault-tolerant security system that enables the secure storage and distribution of private keys. In one implementation, the security system includes a plurality of computing resources that independently store private keys provided by publishers and encrypted using a single security system public key. To protect against malicious activity, the security system private key necessary to decrypt the publication private keys is not stored at any of the computing resources. Rather portions, or shares of the security system private key are stored at each of the computing resources within the security system and multiple security systems must communicate and share partial decryptions in order to decrypt the stored private key.

  14. Final report for the Integrated and Robust Security Infrastructure (IRSI) laboratory directed research and development project

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hutchinson, R.L.; Hamilton, V.A.; Istrail, G.G.

    1997-11-01

    This report describes the results of a Sandia-funded laboratory-directed research and development project titled {open_quotes}Integrated and Robust Security Infrastructure{close_quotes} (IRSI). IRSI was to provide a broad range of commercial-grade security services to any software application. IRSI has two primary goals: application transparency and manageable public key infrastructure. IRSI must provide its security services to any application without the need to modify the application to invoke the security services. Public key mechanisms are well suited for a network with many end users and systems. There are many issues that make it difficult to deploy and manage a public key infrastructure. IRSImore » addressed some of these issues to create a more manageable public key infrastructure.« less

  15. Public Key-Based Need-to-Know Authorization Engine Final Report CRADA No. TSB-1553-98

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mark, R.; Williams, R.

    The goals of this project were to develop a public key-based authentication service plug-in based on LLNL's requirements, integrate the public key-based authentication with the Intra Verse authorization service adn the LLNL NTK server by developing a full-featured version of the prototyped Intra Verse need-to-know plug in; and to test the authorization and need-to-know plug-in in a secured extranet prototype among selected national Labs.

  16. Securing resource constraints embedded devices using elliptic curve cryptography

    NASA Astrophysics Data System (ADS)

    Tam, Tony; Alfasi, Mohamed; Mozumdar, Mohammad

    2014-06-01

    The use of smart embedded device has been growing rapidly in recent time because of miniaturization of sensors and platforms. Securing data from these embedded devices is now become one of the core challenges both in industry and research community. Being embedded, these devices have tight constraints on resources such as power, computation, memory, etc. Hence it is very difficult to implement traditional Public Key Cryptography (PKC) into these resource constrained embedded devices. Moreover, most of the public key security protocols requires both public and private key to be generated together. In contrast with this, Identity Based Encryption (IBE), a public key cryptography protocol, allows a public key to be generated from an arbitrary string and the corresponding private key to be generated later on demand. While IBE has been actively studied and widely applied in cryptography research, conventional IBE primitives are also computationally demanding and cannot be efficiently implemented on embedded system. Simplified version of the identity based encryption has proven its competence in being robust and also satisfies tight budget of the embedded platform. In this paper, we describe the choice of several parameters for implementing lightweight IBE in resource constrained embedded sensor nodes. Our implementation of IBE is built using elliptic curve cryptography (ECC).

  17. Analysis of the Skills Used in Public Broadcasting's Key Jobs with Recommended Uses by Public Broadcasting Organizations.

    ERIC Educational Resources Information Center

    Olian, Judy; Schneier, Craig E.

    Designed to provide a listing of knowledge, skills, and abilities (collectively known as KSAs) that could be used by public broadcasting stations for recruitment, selection, promotion, evaluation, training, and staff career development, this document addresses three key broadcasting personnel areas. These areas are programming/production,…

  18. [Brazilian bibliographical output on public oral health in public health and dentistry journals].

    PubMed

    Celeste, Roger Keller; Warmling, Cristine Maria

    2014-06-01

    The scope of this paper is to describe characteristics of the scientific output in the area of public oral health in journals on public health and dentistry nationwide. The Scopus database of abstracts and quotations was used and eight journals in public health, as well as ten in dentistry, dating from 1947 to 2011 were selected. A research strategy using key words regarding oral health in public health and key words about public health in dentistry was used to locate articles. The themes selected were based on the frequency of key words. Of the total number of articles, 4.7% (n = 642) were found in oral health journals and 6.8% (n = 245) in public health journals. Among the authors who published most, only 12% published in both fields. There was a percentile growth of public oral health publications in dentistry journals, though not in public health journals. In dentistry, only studies indexed as being on the topic of epidemiology showed an increase. In the area of public health, planning was predominant in all the phases studied. Research to evaluate the impact of research and postgraduate policies in scientific production is required.

  19. 77 FR 42699 - Gulf of Mexico Fishery Management Council; Public Hearings

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-20

    ... INFORMATION. ADDRESSES: The public hearings will be held in the following locations: Tampa, Key West and..., telephone: (251) 344-5200. Wednesday, August 8, 2012 Harvey Government Center, 1200 Truman Avenue, Key West...

  20. Vital Collaboratives, Alliances, and Partnerships: A Search for Key Elements of an Effective Public-Private Partnership

    ERIC Educational Resources Information Center

    Young, Charles Keith

    2010-01-01

    Owing to the significant structural changes that have occurred in the global marketplace over the past 2 decades, a corresponding increase of public-private partnerships have been established among the business sector, local governments, and public community colleges. This qualitative project sought to identify and substantiate key elements that…

  1. Signature scheme based on bilinear pairs

    NASA Astrophysics Data System (ADS)

    Tong, Rui Y.; Geng, Yong J.

    2013-03-01

    An identity-based signature scheme is proposed by using bilinear pairs technology. The scheme uses user's identity information as public key such as email address, IP address, telephone number so that it erases the cost of forming and managing public key infrastructure and avoids the problem of user private generating center generating forgery signature by using CL-PKC framework to generate user's private key.

  2. Number Theory and Public-Key Cryptography.

    ERIC Educational Resources Information Center

    Lefton, Phyllis

    1991-01-01

    Described are activities in the study of techniques used to conceal the meanings of messages and data. Some background information and two BASIC programs that illustrate the algorithms used in a new cryptographic system called "public-key cryptography" are included. (CW)

  3. An image hiding method based on cascaded iterative Fourier transform and public-key encryption algorithm

    NASA Astrophysics Data System (ADS)

    Zhang, B.; Sang, Jun; Alam, Mohammad S.

    2013-03-01

    An image hiding method based on cascaded iterative Fourier transform and public-key encryption algorithm was proposed. Firstly, the original secret image was encrypted into two phase-only masks M1 and M2 via cascaded iterative Fourier transform (CIFT) algorithm. Then, the public-key encryption algorithm RSA was adopted to encrypt M2 into M2' . Finally, a host image was enlarged by extending one pixel into 2×2 pixels and each element in M1 and M2' was multiplied with a superimposition coefficient and added to or subtracted from two different elements in the 2×2 pixels of the enlarged host image. To recover the secret image from the stego-image, the two masks were extracted from the stego-image without the original host image. By applying public-key encryption algorithm, the key distribution was facilitated, and also compared with the image hiding method based on optical interference, the proposed method may reach higher robustness by employing the characteristics of the CIFT algorithm. Computer simulations show that this method has good robustness against image processing.

  4. A Framework for Developing the Structure of Public Health Economic Models.

    PubMed

    Squires, Hazel; Chilcott, James; Akehurst, Ronald; Burr, Jennifer; Kelly, Michael P

    2016-01-01

    A conceptual modeling framework is a methodology that assists modelers through the process of developing a model structure. Public health interventions tend to operate in dynamically complex systems. Modeling public health interventions requires broader considerations than clinical ones. Inappropriately simple models may lead to poor validity and credibility, resulting in suboptimal allocation of resources. This article presents the first conceptual modeling framework for public health economic evaluation. The framework presented here was informed by literature reviews of the key challenges in public health economic modeling and existing conceptual modeling frameworks; qualitative research to understand the experiences of modelers when developing public health economic models; and piloting a draft version of the framework. The conceptual modeling framework comprises four key principles of good practice and a proposed methodology. The key principles are that 1) a systems approach to modeling should be taken; 2) a documented understanding of the problem is imperative before and alongside developing and justifying the model structure; 3) strong communication with stakeholders and members of the team throughout model development is essential; and 4) a systematic consideration of the determinants of health is central to identifying the key impacts of public health interventions. The methodology consists of four phases: phase A, aligning the framework with the decision-making process; phase B, identifying relevant stakeholders; phase C, understanding the problem; and phase D, developing and justifying the model structure. Key areas for further research involve evaluation of the framework in diverse case studies and the development of methods for modeling individual and social behavior. This approach could improve the quality of Public Health economic models, supporting efficient allocation of scarce resources. Copyright © 2016 International Society for Pharmacoeconomics and Outcomes Research (ISPOR). Published by Elsevier Inc. All rights reserved.

  5. 75 FR 28805 - Science Advisory Board Staff Office; Notification of a Public Teleconference and Public Meeting...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-24

    ... selection of key data sets for analysis; and (3) transparency, thoroughness, and clarity in quantitative... being asked to evaluate: The transparency and clarity in the selection of key data sets for dose...

  6. Public Key Infrastructure Study

    DTIC Science & Technology

    1994-04-01

    commerce. This Public Key Infrastructure (PKI) study focuses on the United States Federal Government operations, but also addresses national and global ... issues in order to facilitate the interoperation of protected electronic commerce among the various levels of government in the U.S., private citizens

  7. Virtual-optical information security system based on public key infrastructure

    NASA Astrophysics Data System (ADS)

    Peng, Xiang; Zhang, Peng; Cai, Lilong; Niu, Hanben

    2005-01-01

    A virtual-optical based encryption model with the aid of public key infrastructure (PKI) is presented in this paper. The proposed model employs a hybrid architecture in which our previously published encryption method based on virtual-optics scheme (VOS) can be used to encipher and decipher data while an asymmetric algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). The whole information security model is run under the framework of international standard ITU-T X.509 PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOS security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network. Numerical experiments prove the effectiveness of the method. The security of proposed model is briefly analyzed by examining some possible attacks from the viewpoint of a cryptanalysis.

  8. Simple group password-based authenticated key agreements for the integrated EPR information system.

    PubMed

    Lee, Tian-Fu; Chang, I-Pin; Wang, Ching-Cheng

    2013-04-01

    The security and privacy are important issues for electronic patient records (EPRs). The goal of EPRs is sharing the patients' medical histories such as the diagnosis records, reports and diagnosis image files among hospitals by the Internet. So the security issue for the integrated EPR information system is essential. That is, to ensure the information during transmission through by the Internet is secure and private. The group password-based authenticated key agreement (GPAKE) allows a group of users like doctors, nurses and patients to establish a common session key by using password authentication. Then the group of users can securely communicate by using this session key. Many approaches about GAPKE employ the public key infrastructure (PKI) in order to have higher security. However, it not only increases users' overheads and requires keeping an extra equipment for storing long-term secret keys, but also requires maintaining the public key system. This investigation presents a simple group password-based authenticated key agreement (SGPAKE) protocol for the integrated EPR information system. The proposed SGPAKE protocol does not require using the server or users' public keys. Each user only remembers his weak password shared with a trusted server, and then can obtain a common session key. Then all users can securely communicate by using this session key. The proposed SGPAKE protocol not only provides users with convince, but also has higher security.

  9. Using Conjoint Analysis to Estimate Employers Preferences for Key Competencies of Master Level Dutch Graduates Entering the Public Health Field

    ERIC Educational Resources Information Center

    Biesma, R. G.; Pavlova, M.; van Merode, G. G.; Groot, W.

    2007-01-01

    This paper uses an experimental design to estimate preferences of employers for key competencies during the transition from initial education to the labor market. The study is restricted to employers of entry-level academic graduates entering public health organizations in the Netherlands. Given the changing and complex demands in public health,…

  10. Public key infrastructure for DOE security research

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Aiken, R.; Foster, I.; Johnston, W.E.

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-keymore » infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.« less

  11. Securing image information using double random phase encoding and parallel compressive sensing with updated sampling processes

    NASA Astrophysics Data System (ADS)

    Hu, Guiqiang; Xiao, Di; Wang, Yong; Xiang, Tao; Zhou, Qing

    2017-11-01

    Recently, a new kind of image encryption approach using compressive sensing (CS) and double random phase encoding has received much attention due to the advantages such as compressibility and robustness. However, this approach is found to be vulnerable to chosen plaintext attack (CPA) if the CS measurement matrix is re-used. Therefore, designing an efficient measurement matrix updating mechanism that ensures resistance to CPA is of practical significance. In this paper, we provide a novel solution to update the CS measurement matrix by altering the secret sparse basis with the help of counter mode operation. Particularly, the secret sparse basis is implemented by a reality-preserving fractional cosine transform matrix. Compared with the conventional CS-based cryptosystem that totally generates all the random entries of measurement matrix, our scheme owns efficiency superiority while guaranteeing resistance to CPA. Experimental and analysis results show that the proposed scheme has a good security performance and has robustness against noise and occlusion.

  12. A new simple technique for improving the random properties of chaos-based cryptosystems

    NASA Astrophysics Data System (ADS)

    Garcia-Bosque, M.; Pérez-Resa, A.; Sánchez-Azqueta, C.; Celma, S.

    2018-03-01

    A new technique for improving the security of chaos-based stream ciphers has been proposed and tested experimentally. This technique manages to improve the randomness properties of the generated keystream by preventing the system to fall into short period cycles due to digitation. In order to test this technique, a stream cipher based on a Skew Tent Map algorithm has been implemented on a Virtex 7 FPGA. The randomness of the keystream generated by this system has been compared to the randomness of the keystream generated by the same system with the proposed randomness-enhancement technique. By subjecting both keystreams to the National Institute of Standards and Technology (NIST) tests, we have proved that our method can considerably improve the randomness of the generated keystreams. In order to incorporate our randomness-enhancement technique, only 41 extra slices have been needed, proving that, apart from effective, this method is also efficient in terms of area and hardware resources.

  13. Elliptic Curve Cryptography with Security System in Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Huang, Xu; Sharma, Dharmendra

    2010-10-01

    The rapid progress of wireless communications and embedded micro-electro-system technologies has made wireless sensor networks (WSN) very popular and even become part of our daily life. WSNs design are generally application driven, namely a particular application's requirements will determine how the network behaves. However, the natures of WSN have attracted increasing attention in recent years due to its linear scalability, a small software footprint, low hardware implementation cost, low bandwidth requirement, and high device performance. It is noted that today's software applications are mainly characterized by their component-based structures which are usually heterogeneous and distributed, including the WSNs. But WSNs typically need to configure themselves automatically and support as hoc routing. Agent technology provides a method for handling increasing software complexity and supporting rapid and accurate decision making. This paper based on our previous works [1, 2], three contributions have made, namely (a) fuzzy controller for dynamic slide window size to improve the performance of running ECC (b) first presented a hidden generation point for protection from man-in-the middle attack and (c) we first investigates multi-agent applying for key exchange together. Security systems have been drawing great attentions as cryptographic algorithms have gained popularity due to the natures that make them suitable for use in constrained environment such as mobile sensor information applications, where computing resources and power availability are limited. Elliptic curve cryptography (ECC) is one of high potential candidates for WSNs, which requires less computational power, communication bandwidth, and memory in comparison with other cryptosystem. For saving pre-computing storages recently there is a trend for the sensor networks that the sensor group leaders rather than sensors communicate to the end database, which highlighted the needs to prevent from the man-in-the middle attack. A designed a hidden generator point that offer a good protection from the man-in-the middle (MinM) attack which becomes one of major worries for the sensor's networks with multiagent system is also discussed.

  14. Distributed Data Networks That Support Public Health Information Needs.

    PubMed

    Tabano, David C; Cole, Elizabeth; Holve, Erin; Davidson, Arthur J

    Data networks, consisting of pooled electronic health data assets from health care providers serving different patient populations, promote data sharing, population and disease monitoring, and methods to assess interventions. Better understanding of data networks, and their capacity to support public health objectives, will help foster partnerships, expand resources, and grow learning health systems. We conducted semistructured interviews with 16 key informants across the United States, identified as network stakeholders based on their respective experience in advancing health information technology and network functionality. Key informants were asked about their experience with and infrastructure used to develop data networks, including each network's utility to identify and characterize populations, usage, and sustainability. Among 11 identified data networks representing hundreds of thousands of patients, key informants described aggregated health care clinical data contributing to population health measures. Key informant interview responses were thematically grouped to illustrate how networks support public health, including (1) infrastructure and information sharing; (2) population health measures; and (3) network sustainability. Collaboration between clinical data networks and public health entities presents an opportunity to leverage infrastructure investments to support public health. Data networks can provide resources to enhance population health information and infrastructure.

  15. A Training Framework for the Department of Defense Public Key Infrastructure

    DTIC Science & Technology

    2001-09-01

    and the growth of electronic commerce within the Department of Defense (DoD) has led to the development and implementation of the DoD Public Key...also grown within the Department of Defense. Electronic commerce and business to business transactions have become more commonplace and have

  16. The Human Factor

    ERIC Educational Resources Information Center

    Johnson, Jean

    2013-01-01

    Unless school leaders do more to help teachers, students, parents, taxpayers, and other key groups understand the need for change and the key roles they can play, school improvement will be spotty and nearly impossible to sustain, writes Public Agenda senior fellow Jean Johnson. Citing multiple surveys of these groups conducted by Public Agenda,…

  17. Willingness to Pay for Mosquito Control in Key West, Florida and Tucson, Arizona.

    PubMed

    Dickinson, Katherine L; Hayden, Mary H; Haenchen, Steven; Monaghan, Andrew J; Walker, Kathleen R; Ernst, Kacey C

    2016-04-01

    Mosquito-borne illnesses like West Nile virus (WNV) and dengue are growing threats to the United States. Proactive mosquito control is one strategy to reduce the risk of disease transmission. In 2012, we measured the public's willingness to pay (WTP) for increased mosquito control in two cities: Key West, FL, where there have been recent dengue outbreaks, and Tucson, AZ, where dengue vectors are established and WNV has been circulating for over a decade. Nearly three quarters of respondents in both cities (74% in Tucson and 73% in Key West) would be willing to pay $25 or more annually toward an increase in publicly funded mosquito control efforts. WTP was positively associated with income (both cities), education (Key West), and perceived mosquito abundance (Tucson). Concerns about environmental impacts of mosquito control were associated with lower WTP in Key West. Expanded mosquito control efforts should incorporate public opinion as they respond to evolving disease risks. © The American Society of Tropical Medicine and Hygiene.

  18. Deterrence of device counterfeiting, cloning, and subversion by substitution using hardware fingerprinting

    DOEpatents

    Hamlet, Jason R; Bauer, Todd M; Pierson, Lyndon G

    2014-09-30

    Deterrence of device subversion by substitution may be achieved by including a cryptographic fingerprint unit within a computing device for authenticating a hardware platform of the computing device. The cryptographic fingerprint unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware platform. The PUF circuit is used to generate a PUF value. A key generator is coupled to generate a private key and a public key based on the PUF value while a decryptor is coupled to receive an authentication challenge posed to the computing device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

  19. What affects public acceptance of recycled and desalinated water?

    PubMed Central

    Dolnicar, Sara; Hurlimann, Anna; Grün, Bettina

    2011-01-01

    This paper identifies factors that are associated with higher levels of public acceptance for recycled and desalinated water. For the first time, a wide range of hypothesized factors, both of socio-demographic and psychographic nature, are included simultaneously. The key results, based on a survey study of about 3000 respondents are that: (1) drivers of the stated likelihood of using desalinated water differ somewhat from drivers of the stated likelihood of using recycled water; (2) positive perceptions of, and knowledge about, the respective water source are key drivers for the stated likelihood of usage; and (3) awareness of water scarcity, as well as prior experience with using water from alternative sources, increases the stated likelihood of use. Practical recommendations for public policy makers, such as key messages to be communicated to the public, are derived. PMID:20950834

  20. Addressing the gap between public health emergency planning and incident response

    PubMed Central

    Freedman, Ariela M; Mindlin, Michele; Morley, Christopher; Griffin, Meghan; Wooten, Wilma; Miner, Kathleen

    2013-01-01

    Objectives: Since 9/11, Incident Command System (ICS) and Emergency Operations Center (EOC) are relatively new concepts to public health, which typically operates using less hierarchical and more collaborative approaches to organizing staff. This paper describes the 2009 H1N1 influenza outbreak in San Diego County to explore the use of ICS and EOC in public health emergency response. Methods: This study was conducted using critical case study methodology consisting of document review and 18 key-informant interviews with individuals who played key roles in planning and response. Thematic analysis was used to analyze data. Results: Several broad elements emerged as key to ensuring effective and efficient public health response: 1) developing a plan for emergency response; 2) establishing the framework for an ICS; 3) creating the infrastructure to support response; 4) supporting a workforce trained on emergency response roles, responsibilities, and equipment; and 5) conducting regular preparedness exercises. Conclusions: This research demonstrates the value of investments made and that effective emergency preparedness requires sustained efforts to maintain personnel and material resources. By having the infrastructure and experience based on ICS and EOC, the public health system had the capability to surge-up: to expand its day-to-day operation in a systematic and prolonged manner. None of these critical actions are possible without sustained funding for the public health infrastructure. Ultimately, this case study illustrates the importance of public health as a key leader in emergency response. PMID:28228983

  1. Key Ingredients-Target Groups, Methods and Messages, and Evaluation-of Local-Level, Public Interventions to Counter Stigma and Discrimination: A Lived Experience Informed Selective Narrative Literature Review.

    PubMed

    Ashton, Laura J; Gordon, Sarah E; Reeves, Racheal A

    2018-04-01

    A proliferation of recent literature provides substantial direction as to the key ingredients-target groups, messages and methods, and evaluation-of local-level, public interventions to counter stigma and discrimination. This paper provides a selective narrative review of that literature from the perspective or standpoint of anti-stigma experts with lived experience of mental distress, the key findings of which have been synthesised and presented in diagrammatic overviews (infographics). These are intended to guide providers in planning, delivering and evaluating lived experience-directed local-level, public interventions to counter stigma and discrimination in accord with current best practice.

  2. An Expert Systems Approach for PR Campaigns Research.

    ERIC Educational Resources Information Center

    Cameron, Glen T.; Curtin, Patricia A.

    1992-01-01

    Describes an expert system (the artificial intelligence program "Publics") that helps users identify key publics for public relations campaigns. Examines advantages and problems encountered in its use in public relations campaigns classrooms. (SR)

  3. Public Expenditures on Children through 2008: Key Facts

    ERIC Educational Resources Information Center

    Macomber, Jennifer; Isaacs, Julia; Kent, Adam; Vericker, Tracy

    2010-01-01

    This report provides the key findings on the public spending on children through 2008. They are: (1) Spending on children increased under the American Recovery and Reinvestment Act (ARRA) and other stimulus spending, but not proportionately to other federal spending. As ARRA expires, we project that spending on children will decline, assuming no…

  4. A PKI Approach for Deploying Modern Secure Distributed E-Learning and M-Learning Environments

    ERIC Educational Resources Information Center

    Kambourakis, Georgios; Kontoni, Denise-Penelope N.; Rouskas, Angelos; Gritzalis, Stefanos

    2007-01-01

    While public key cryptography is continuously evolving and its installed base is growing significantly, recent research works examine its potential use in e-learning or m-learning environments. Public key infrastructure (PKI) and attribute certificates (ACs) can provide the appropriate framework to effectively support authentication and…

  5. Implications of Key Performance Indicator Issues in Ontario Universities Explored

    ERIC Educational Resources Information Center

    Chan, Vivian

    2015-01-01

    Since 1998, the Ministry of Training, Colleges and Universities in Ontario, Canada, has required that data on specific key performance indicators (KPIs) be made public by its publicly funded universities. The information is intended to be used by universities to demonstrate their achievements, to improve their programmes and services, and to…

  6. Public-key encryption with chaos.

    PubMed

    Kocarev, Ljupco; Sterjev, Marjan; Fekete, Attila; Vattay, Gabor

    2004-12-01

    We propose public-key encryption algorithms based on chaotic maps, which are generalization of well-known and commercially used algorithms: Rivest-Shamir-Adleman (RSA), ElGamal, and Rabin. For the case of generalized RSA algorithm we discuss in detail its software implementation and properties. We show that our algorithm is as secure as RSA algorithm.

  7. Public-key encryption with chaos

    NASA Astrophysics Data System (ADS)

    Kocarev, Ljupco; Sterjev, Marjan; Fekete, Attila; Vattay, Gabor

    2004-12-01

    We propose public-key encryption algorithms based on chaotic maps, which are generalization of well-known and commercially used algorithms: Rivest-Shamir-Adleman (RSA), ElGamal, and Rabin. For the case of generalized RSA algorithm we discuss in detail its software implementation and properties. We show that our algorithm is as secure as RSA algorithm.

  8. Education and Success: A Case Study of the Thai Public Service.

    ERIC Educational Resources Information Center

    Fry, Gerald W.

    1980-01-01

    Studied is the bureaucracy in Thailand, and access to an promotion within the system--or the "degree of openness" in the Thai public service. The key dependent variable is occupational attainment. Some key intervening variables include educational attainment, total job experience, sex, and regional remoteness of early schooling. (KC)

  9. 41 CFR Appendix A to Subpart A of... - 3-Key Points and Principles

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false 3-Key Points and Principles A Appendix A to Subpart A of Part 102 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION GENERAL 3-FEDERAL ADVISORY COMMITTEE...

  10. Common Criteria for Information Technology Security Evaluation: Department of Defense Public Key Infrastructure and Key Management Infrastructure Token Protection Profile (Medium Robustness)

    DTIC Science & Technology

    2002-03-22

    may be derived from detailed inspection of the IC itself or from illicit appropriation of design information. Counterfeit smart cards can be mass...Infrastructure (PKI) as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair...interference devices (SQDIS), electrical testing, and electron beam testing. • Other attacks, such as UV or X-rays or high temperatures, could cause erasure

  11. Problems with provision: barriers to drinking water quality and public health in rural Tasmania, Australia.

    PubMed

    Whelan, Jessica J; Willis, Karen

    2007-01-01

    Access to safe drinking water is essential to human life and wellbeing, and is a key public health issue. However, many communities in rural and regional parts of Australia are unable to access drinking water that meets national standards for protecting human health. The aim of this research was to identify the key issues in and barriers to the provision and management of safe drinking water in rural Tasmania, Australia. Semi-structured interviews were conducted with key local government employees and public health officials responsible for management of drinking water in rural Tasmania. Participants were asked about their core public health duties, regulatory responsibilities, perceptions and management of risk, as well as the key barriers that may be affecting the provision of safe drinking water. This research highlights the effect of rural locality on management and safety of fresh water in protecting public health. The key issues contributing to problems with drinking water provision and quality identified by participants included: poor and inadequate water supply infrastructure; lack of resources and staffing; inadequate catchment monitoring; and the effect of competing land uses, such as forestry, on water supply quality. This research raises issues of inequity in the provision of safe drinking water in rural communities. It highlights not only the increasing need for greater funding by state and commonwealth government for basic services such as drinking water, but also the importance of an holistic and integrated approach to managing drinking water resources in rural Tasmania.

  12. Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network

    PubMed Central

    Rajagopalan, S. P.

    2017-01-01

    Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI) and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum dependency. As a classic primitive in public key cryptography, signcryption performs validity of cipher text without decryption by combining authentication, confidentiality, public verifiability and cipher text authenticity much more efficiently than the traditional approach. In this paper, we first define a security model for certificateless-based signcryption called, Complex Conjugate Differential Integrated Factor (CC-DIF) scheme by introducing complex conjugates through introduction of the security parameter and improving secured message distribution rate. However, both partial private key and secret value changes with respect to time. To overcome this weakness, a new certificateless-based signcryption scheme is proposed by setting the private key through Differential (Diff) Equation using an Integration Factor (DiffEIF), minimizing computational cost and communication overhead. The scheme is therefore said to be proven secure (i.e. improving the secured message distributing rate) against certificateless access control and signcryption-based scheme. In addition, compared with the three other existing schemes, the CC-DIF scheme has the least computational cost and communication overhead for secured message communication in mobile network. PMID:29040290

  13. Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network.

    PubMed

    Alagarsamy, Sumithra; Rajagopalan, S P

    2017-01-01

    Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI) and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum dependency. As a classic primitive in public key cryptography, signcryption performs validity of cipher text without decryption by combining authentication, confidentiality, public verifiability and cipher text authenticity much more efficiently than the traditional approach. In this paper, we first define a security model for certificateless-based signcryption called, Complex Conjugate Differential Integrated Factor (CC-DIF) scheme by introducing complex conjugates through introduction of the security parameter and improving secured message distribution rate. However, both partial private key and secret value changes with respect to time. To overcome this weakness, a new certificateless-based signcryption scheme is proposed by setting the private key through Differential (Diff) Equation using an Integration Factor (DiffEIF), minimizing computational cost and communication overhead. The scheme is therefore said to be proven secure (i.e. improving the secured message distributing rate) against certificateless access control and signcryption-based scheme. In addition, compared with the three other existing schemes, the CC-DIF scheme has the least computational cost and communication overhead for secured message communication in mobile network.

  14. Keys to soil taxonomy by soil survey staff (sixth edition)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1994-12-31

    This publication, Keys to Soil Taxonomy, serves two purposes. It provides the taxonomic keys necessary for the classification of soils according to Soil Taxonomy in a form that can be used easily in the field, and it also acquaints users of Soil Taxonomy with recent changes in the classification system. This volume includes all revisions of the keys that have so far been approved, replacing the original keys in Soil Taxonomy: A Basic System of Soil Classification for Making and Interpreting Soil Surveys (1975), the work on which this abridged version, first published in 1983, is based. This publication incorporatesmore » all amendments approved to date and published in National Soil Taxonomy Handbook (NSTH) Issues 1-17.« less

  15. Small Private Key PKS on an Embedded Microprocessor

    PubMed Central

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-01-01

    Multivariate quadratic ( ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012. PMID:24651722

  16. Small private key MQPKS on an embedded microprocessor.

    PubMed

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-03-19

    Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key MQ scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key MQ scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing MQ on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key MQ scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012.

  17. Challenging Assumptions of International Public Relations: When Government Is the Most Important Public.

    ERIC Educational Resources Information Center

    Taylor, Maureen; Kent, Michael L.

    1999-01-01

    Explores assumptions underlying Malaysia's and the United States' public-relations practice. Finds many assumptions guiding Western theories and practices are not applicable to other countries. Examines the assumption that the practice of public relations targets a variety of key organizational publics. Advances international public-relations…

  18. Public open space, physical activity, urban design and public health: Concepts, methods and research agenda.

    PubMed

    Koohsari, Mohammad Javad; Mavoa, Suzanne; Villanueva, Karen; Sugiyama, Takemi; Badland, Hannah; Kaczynski, Andrew T; Owen, Neville; Giles-Corti, Billie

    2015-05-01

    Public open spaces such as parks and green spaces are key built environment elements within neighbourhoods for encouraging a variety of physical activity behaviours. Over the past decade, there has been a burgeoning number of active living research studies examining the influence of public open space on physical activity. However, the evidence shows mixed associations between different aspects of public open space (e.g., proximity, size, quality) and physical activity. These inconsistencies hinder the development of specific evidence-based guidelines for urban designers and policy-makers for (re)designing public open space to encourage physical activity. This paper aims to move this research agenda forward, by identifying key conceptual and methodological issues that may contribute to inconsistencies in research examining relations between public open space and physical activity. Copyright © 2015 Elsevier Ltd. All rights reserved.

  19. Public perceptions of key performance indicators of healthcare in Alberta, Canada.

    PubMed

    Northcott, Herbert C; Harvey, Michael D

    2012-06-01

    To examine the relationship between public perceptions of key performance indicators assessing various aspects of the health-care system. Cross-sequential survey research. Annual telephone surveys of random samples of adult Albertans selected by random digit dialing and stratified according to age, sex and region (n = 4000 for each survey year). The survey questionnaires included single-item measures of key performance indicators to assess public perceptions of availability, accessibility, quality, outcome and satisfaction with healthcare. Cronbach's α and factor analysis were used to assess the relationship between key performance indicators focusing on the health-care system overall and on a recent interaction with the health-care system. The province of Alberta, Canada during the years 1996-2004. Four thousand adults randomly selected each survey year. Survey questions measuring public perceptions of healthcare availability, accessibility, quality, outcome and satisfaction with healthcare. Factor analysis identified two principal components with key performance indicators focusing on the health system overall loading most strongly on the first component and key performance indicators focusing on the most recent health-care encounter loading most strongly on the second component. Assessments of the quality of care most recently received, accessibility of that care and perceived outcome of care tended to be higher than the more general assessments of overall health system quality and accessibility. Assessments of specific health-care encounters and more general assessments of the overall health-care system, while related, nevertheless comprise separate dimensions for health-care evaluation.

  20. Social Media as a Practical Approach in Engaging Key Stakeholders in School Crisis Communication Plans: A Qualitative Analysis

    ERIC Educational Resources Information Center

    Agozzino, Alisa; Kaiser, Candace

    2014-01-01

    The current study examined how public relations specialists within school systems are developing, implementing, and revising their communication crisis plans in an effort to fully engage all key stakeholders. Four research questions and two hypotheses were posed. Members from a state public relations association for schools were asked to…

  1. Understanding Price Elasticities to Inform Public Health Research and Intervention Studies: Key Issues

    PubMed Central

    Nghiem, Nhung; Genç, Murat; Blakely, Tony

    2013-01-01

    Pricing policies such as taxes and subsidies are important tools in preventing and controlling a range of threats to public health. This is particularly so in tobacco and alcohol control efforts and efforts to change dietary patterns and physical activity levels as a means of addressing increases in noncommunicable diseases. To understand the potential impact of pricing policies, it is critical to understand the nature of price elasticities for consumer products. For example, price elasticities are key parameters in models of any food tax or subsidy that aims to quantify health impacts and cost-effectiveness. We detail relevant terms and discuss key issues surrounding price elasticities to inform public health research and intervention studies. PMID:24028228

  2. The EVOTION Decision Support System: Utilizing It for Public Health Policy-Making in Hearing Loss.

    PubMed

    Katrakazas, Panagiotis; Trenkova, Lyubov; Milas, Josip; Brdaric, Dario; Koutsouris, Dimitris

    2017-01-01

    As Decision Support Systems start to play a significant role in decision making, especially in the field of public-health policy making, we present an initial attempt to formulate such a system in the concept of public health policy making for hearing loss related problems. Justification for the system's conceptual architecture and its key functionalities are presented. The introduction of the EVOTION DSS sets a key innovation and a basis for paradigm shift in policymaking, by incorporating relevant models, big data analytics and generic demographic data. Expected outcomes for this joint effort are discussed from a public-health point of view.

  3. Decisive Routing and Admission Control According to Quality of Service Constraints

    DTIC Science & Technology

    2009-03-01

    Level &(Key Size) 1 1 RSA (1280); RSA (1536); Elg-E (1280) 1 2 Elg-E ( 768 ); Elg-E(1024); RSA (1024) 1 3 3DES, BlowFish, CAST5 2 1 Elg-E(1536); Elg-E(1792...upon the intractibility of the discrete logarithm problem [11] RSA A public key encryption scheme named after inventors R. Rivest, A. Shamir, and L...gpgTester would make system calls to the GNU Privacy Guard to choose from system and public key algorithms, ElGamal, RSA , AES, AES192, AES256, TwoFish

  4. Multi-factor authentication

    DOEpatents

    Hamlet, Jason R; Pierson, Lyndon G

    2014-10-21

    Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

  5. Calculation of key reduction for B92 QKD protocol

    NASA Astrophysics Data System (ADS)

    Mehic, Miralem; Partila, Pavol; Tovarek, Jaromir; Voznak, Miroslav

    2015-05-01

    It is well known that Quantum Key Distribution (QKD) can be used with the highest level of security for distribution of the secret key, which is further used for symmetrical encryption. B92 is one of the oldest QKD protocols. It uses only two non-orthogonal states, each one coding for one bit-value. It is much faster and simpler when compared to its predecessors, but with the idealized maximum efficiencies of 25% over the quantum channel. B92 consists of several phases in which initial key is significantly reduced: secret key exchange, extraction of the raw key (sifting), error rate estimation, key reconciliation and privacy amplification. QKD communication is performed over two channels: the quantum channel and the classical public channel. In order to prevent a man-in-the-middle attack and modification of messages on the public channel, authentication of exchanged values must be performed. We used Wegman-Carter authentication because it describes an upper bound for needed symmetric authentication key. We explained the reduction of the initial key in each of QKD phases.

  6. Optimation of Operation System Integration between Main and Feeder Public Transport (Case Study: Trans Jakarta-Kopaja Bus Services)

    NASA Astrophysics Data System (ADS)

    Miharja, M.; Priadi, Y. N.

    2018-05-01

    Promoting a better public transport is a key strategy to cope with urban transport problems which are mostly caused by a huge private vehicle usage. A better public transport service quality not only focuses on one type of public transport mode, but also concerns on inter modes service integration. Fragmented inter mode public transport service leads to a longer trip chain as well as average travel time which would result in its failure to compete with a private vehicle. This paper examines the optimation process of operation system integration between Trans Jakarta Bus as the main public transport mode and Kopaja Bus as feeder public transport service in Jakarta. Using scoring-interview method combined with standard parameters in operation system integration, this paper identifies the key factors that determine the success of the two public transport operation system integrations. The study found that some key integration parameters, such as the cancellation of “system setoran”, passenger get in-get out at official stop points, and systematic payment, positively contribute to a better service integration. However, some parameters such as fine system, time and changing point reliability, and information system reliability are among those which need improvement. These findings are very useful for the authority to set the right strategy to improve operation system integration between Trans Jakarta and Kopaja Bus services.

  7. Claims-Based Authentication for a Web-Based Enterprise

    DTIC Science & Technology

    2013-07-01

    authority must use known and registered (or in specific cases defined ) certificate revocation and currency-checking software . B. Translation of...Machines and services are issued software certificates that contain the public key with the private key generated and remaining in hardware...publicly available) information. A hardware token that contains the certificate is preferred to software -only certificates. For enterprise users

  8. Communicating Herschel Key Programs in Solar System Studies to the Public

    NASA Astrophysics Data System (ADS)

    Rengel, M.; Hartogh, P.; Müller, T.

    2011-10-01

    The Herschel Space Observatory, one of the cornerstone missions of the European Space Agency (ESA) with participation from NASA, is delivering a wealth of far-infrared and sub-millimeter observations of the cold Universe. A considerable part of the observing time for the nominal three year mission lifetime has been awarded in the form of Key Programs. Between the 42 key programs (guaranteed and open times), only two key programs are dedicated to study the Solar System: "Water and Related Chemistry in the Solar System", also known as Herschel Solar System Observations (HssO) project [1], and "TNOs are Cool: A Survey of the Transneptunian Region" [2]. In the framework of these Programs, a serie of public outreach activities and efforts of its results are being carried out. We present some of the outreach strategies developed (e.g. press releases, web pages, logos, public lectures, exhibitions, interviews, reports, etc.) and some plans in this direction. Our activities introduce people to knowledge and beauty of solar system research and wider the opportunities for the public to become more involved in topics like solar system studies, specially in the times of frequent exo-planet discoveries.

  9. Focus on Ethics and Public Relations Practice in a University Classroom

    ERIC Educational Resources Information Center

    Smudde, Peter M.

    2011-01-01

    Public relations action relies on sound decision making about how to inspire cooperation between an organization and its publics. Such thinking must uphold principles for ethical communication. Effectively combining ethics with public relations practice for students is key. A pedagogical approach to public relations ethics, hinging on selected…

  10. What Cultural Values Influence American Public Relations Practitioners?

    ERIC Educational Resources Information Center

    Vasquez, Gabriel M.; Taylor, Maureen

    1999-01-01

    Examines the role of culture as a key variable in public relations research and practice. Finds (1) American practitioners continue to practice one-way models of public relations; and (2) public relations practitioners who have collectivistic values tend to practice two-way models of public relations. Discusses implications for theory and…

  11. Facts about Public Universities: Looking to the Future.

    ERIC Educational Resources Information Center

    National Association of State Universities and Land Grant Colleges, Washington, DC.

    This publication describes key characteristics and statistics on the nation's public universities as they look to the coming century including their role, meeting student needs, maintaining access, obtaining government support, and service the public through outreach and an expanded concept of public service. A section on meeting student needs…

  12. On the Development of Schools' External Public Relations in China.

    ERIC Educational Resources Information Center

    Tianping, Yang

    2003-01-01

    Public relations is a basic function of a modern school's management, while external public relationship is a basic principle and component of it. To develop a school's public relationship, efforts should focus on its key publics, strengthening its coordination and communication with governments, education departments, and local communities.…

  13. Digital camera with apparatus for authentication of images produced from an image file

    NASA Technical Reports Server (NTRS)

    Friedman, Gary L. (Inventor)

    1993-01-01

    A digital camera equipped with a processor for authentication of images produced from an image file taken by the digital camera is provided. The digital camera processor has embedded therein a private key unique to it, and the camera housing has a public key that is so uniquely based upon the private key that digital data encrypted with the private key by the processor may be decrypted using the public key. The digital camera processor comprises means for calculating a hash of the image file using a predetermined algorithm, and second means for encrypting the image hash with the private key, thereby producing a digital signature. The image file and the digital signature are stored in suitable recording means so they will be available together. Apparatus for authenticating at any time the image file as being free of any alteration uses the public key for decrypting the digital signature, thereby deriving a secure image hash identical to the image hash produced by the digital camera and used to produce the digital signature. The apparatus calculates from the image file an image hash using the same algorithm as before. By comparing this last image hash with the secure image hash, authenticity of the image file is determined if they match, since even one bit change in the image hash will cause the image hash to be totally different from the secure hash.

  14. Digital Camera with Apparatus for Authentication of Images Produced from an Image File

    NASA Technical Reports Server (NTRS)

    Friedman, Gary L. (Inventor)

    1996-01-01

    A digital camera equipped with a processor for authentication of images produced from an image file taken by the digital camera is provided. The digital camera processor has embedded therein a private key unique to it, and the camera housing has a public key that is so uniquely related to the private key that digital data encrypted with the private key may be decrypted using the public key. The digital camera processor comprises means for calculating a hash of the image file using a predetermined algorithm, and second means for encrypting the image hash with the private key, thereby producing a digital signature. The image file and the digital signature are stored in suitable recording means so they will be available together. Apparatus for authenticating the image file as being free of any alteration uses the public key for decrypting the digital signature, thereby deriving a secure image hash identical to the image hash produced by the digital camera and used to produce the digital signature. The authenticating apparatus calculates from the image file an image hash using the same algorithm as before. By comparing this last image hash with the secure image hash, authenticity of the image file is determined if they match. Other techniques to address time-honored methods of deception, such as attaching false captions or inducing forced perspectives, are included.

  15. Key handling in wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Li, Y.; Newe, T.

    2007-07-01

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided.

  16. Are essential medicines in Malaysia accessible, affordable and available?

    PubMed

    Saleh, Kamaruzaman; Ibrahim, Mohamed I M

    2005-12-01

    To assess the pharmaceutical sector to know whether people have access to essential medicines. The study was conducted in 20 public health clinics, five public district drug stores and 20 private retail pharmacies selected randomly in five different areas randomly selected (four states and a federal territory). The methodology used was adopted from the World Health Organization study protocol. The degree of attainment of the strategic pharmaceutical objectives of improved access is measured by a list of tested indicators. Access is measured in terms of the availability and affordability of essential medicines, especially to the poor and in the public sector. The first survey in the public health clinics and public district drug stores gathered information about current availability of essential medicines, prevalence of stock-outs and affordability of treatment (except drug stores). The second survey assessed affordability of treatment in public health clinics and private retail pharmacies. Availability, stock-out duration, percent of medicines dispensed, accessibility and affordability of key medicines. The average availability of key medicines in the public health clinics for the country was 95.4%. The average stock-out duration of key medicines was 6.5 days. However, average availability of key medicines in the public district drug stores was 89.2%; with an average stock-out duration of 32.4 days. Medicines prescribed were 100% dispensed to the patients. Average affordability for public health clinics was 1.5 weeks salary and for the private pharmacies, 3.7 weeks salary. The present pharmaceutical situation in the context of essential medicines list implementation reflected that the majority of the population in Malaysia had access to affordable essential medicines. If medicines need to be obtained from the private sector, they are hardly affordable. Although the average availability of essential medicines in Malaysia was high being more than 95.0%, in certain areas in Sabah availability was less than 80.0% and still a problem.

  17. Sustaining Public Involvement in Long Range Planning Using a Stakeholder Based Process: A Case Study from Eugene-Springfield ,Oregon

    DOT National Transportation Integrated Search

    1998-09-16

    The Intermodal Surface Transportation Efficiency Act requires a proactive : public involvement process that provides complete information, timely public : notice, full public access to key decisions, and supports early and continuing : involvement of...

  18. Secure and Efficient Signature Scheme Based on NTRU for Mobile Payment

    NASA Astrophysics Data System (ADS)

    Xia, Yunhao; You, Lirong; Sun, Zhe; Sun, Zhixin

    2017-10-01

    Mobile payment becomes more and more popular, however the traditional public-key encryption algorithm has higher requirements for hardware which is not suitable for mobile terminals of limited computing resources. In addition, these public-key encryption algorithms do not have the ability of anti-quantum computing. This paper researches public-key encryption algorithm NTRU for quantum computation through analyzing the influence of parameter q and k on the probability of generating reasonable signature value. Two methods are proposed to improve the probability of generating reasonable signature value. Firstly, increase the value of parameter q. Secondly, add the authentication condition that meet the reasonable signature requirements during the signature phase. Experimental results show that the proposed signature scheme can realize the zero leakage of the private key information of the signature value, and increase the probability of generating the reasonable signature value. It also improve rate of the signature, and avoid the invalid signature propagation in the network, but the scheme for parameter selection has certain restrictions.

  19. 46 CFR 7.100 - Florida Reefs and Keys from Miami, FL to Marquesas Keys, FL.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... latitude 24°27.7′ N. longitude 81°48.1′ W. (Key West Entrance Lighted Whistle Buoy); thence to Cosgrove... 46 Shipping 1 2014-10-01 2014-10-01 false Florida Reefs and Keys from Miami, FL to Marquesas Keys... TO THE PUBLIC BOUNDARY LINES Atlantic Coast § 7.100 Florida Reefs and Keys from Miami, FL to...

  20. 46 CFR 7.100 - Florida Reefs and Keys from Miami, FL to Marquesas Keys, FL.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... latitude 24°27.7′ N. longitude 81°48.1′ W. (Key West Entrance Lighted Whistle Buoy); thence to Cosgrove... 46 Shipping 1 2012-10-01 2012-10-01 false Florida Reefs and Keys from Miami, FL to Marquesas Keys... TO THE PUBLIC BOUNDARY LINES Atlantic Coast § 7.100 Florida Reefs and Keys from Miami, FL to...

  1. 46 CFR 7.100 - Florida Reefs and Keys from Miami, FL to Marquesas Keys, FL.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... latitude 24°27.7′ N. longitude 81°48.1′ W. (Key West Entrance Lighted Whistle Buoy); thence to Cosgrove... 46 Shipping 1 2010-10-01 2010-10-01 false Florida Reefs and Keys from Miami, FL to Marquesas Keys... TO THE PUBLIC BOUNDARY LINES Atlantic Coast § 7.100 Florida Reefs and Keys from Miami, FL to...

  2. 46 CFR 7.100 - Florida Reefs and Keys from Miami, FL to Marquesas Keys, FL.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... latitude 24°27.7′ N. longitude 81°48.1′ W. (Key West Entrance Lighted Whistle Buoy); thence to Cosgrove... 46 Shipping 1 2011-10-01 2011-10-01 false Florida Reefs and Keys from Miami, FL to Marquesas Keys... TO THE PUBLIC BOUNDARY LINES Atlantic Coast § 7.100 Florida Reefs and Keys from Miami, FL to...

  3. 46 CFR 7.100 - Florida Reefs and Keys from Miami, FL to Marquesas Keys, FL.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... latitude 24°27.7′ N. longitude 81°48.1′ W. (Key West Entrance Lighted Whistle Buoy); thence to Cosgrove... 46 Shipping 1 2013-10-01 2013-10-01 false Florida Reefs and Keys from Miami, FL to Marquesas Keys... TO THE PUBLIC BOUNDARY LINES Atlantic Coast § 7.100 Florida Reefs and Keys from Miami, FL to...

  4. Perceptual security of encrypted images based on wavelet scaling analysis

    NASA Astrophysics Data System (ADS)

    Vargas-Olmos, C.; Murguía, J. S.; Ramírez-Torres, M. T.; Mejía Carlos, M.; Rosu, H. C.; González-Aguilar, H.

    2016-08-01

    The scaling behavior of the pixel fluctuations of encrypted images is evaluated by using the detrended fluctuation analysis based on wavelets, a modern technique that has been successfully used recently for a wide range of natural phenomena and technological processes. As encryption algorithms, we use the Advanced Encryption System (AES) in RBT mode and two versions of a cryptosystem based on cellular automata, with the encryption process applied both fully and partially by selecting different bitplanes. In all cases, the results show that the encrypted images in which no understandable information can be visually appreciated and whose pixels look totally random present a persistent scaling behavior with the scaling exponent α close to 0.5, implying no correlation between pixels when the DFA with wavelets is applied. This suggests that the scaling exponents of the encrypted images can be used as a perceptual security criterion in the sense that when their values are close to 0.5 (the white noise value) the encrypted images are more secure also from the perceptual point of view.

  5. Pseudo-random generator based on Chinese Remainder Theorem

    NASA Astrophysics Data System (ADS)

    Bajard, Jean Claude; Hördegen, Heinrich

    2009-08-01

    Pseudo-Random Generators (PRG) are fundamental in cryptography. Their use occurs at different level in cipher protocols. They need to verify some properties for being qualified as robust. The NIST proposes some criteria and a tests suite which gives informations on the behavior of the PRG. In this work, we present a PRG constructed from the conversion between further residue systems of representation of the elements of GF(2)[X]. In this approach, we use some pairs of co-prime polynomials of degree k and a state vector of 2k bits. The algebraic properties are broken by using different independent pairs during the process. Since this method is reversible, we also can use it as a symmetric crypto-system. We evaluate the cost of a such system, taking into account that some operations are commonly implemented on crypto-processors. We give the results of the different NIST Tests and we explain this choice compare to others found in the literature. We describe the behavior of this PRG and explain how the different rounds are chained for ensuring a fine secure randomness.

  6. An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks.

    PubMed

    Wang, Chenyu; Xu, Guoai; Sun, Jing

    2017-12-19

    As an essential part of Internet of Things (IoT), wireless sensor networks (WSNs) have touched every aspect of our lives, such as health monitoring, environmental monitoring and traffic monitoring. However, due to its openness, wireless sensor networks are vulnerable to various security threats. User authentication, as the first fundamental step to protect systems from various attacks, has attracted much attention. Numerous user authentication protocols armed with formal proof are springing up. Recently, two biometric-based schemes were proposed with confidence to be resistant to the known attacks including offline dictionary attack, impersonation attack and so on. However, after a scrutinization of these two schemes, we found them not secure enough as claimed, and then demonstrated that these schemes suffer from various attacks, such as offline dictionary attack, impersonation attack, no user anonymity, no forward secrecy, etc. Furthermore, we proposed an enhanced scheme to overcome the identified weaknesses, and proved its security via Burrows-Abadi-Needham (BAN) logic and the heuristic analysis. Finally, we compared our scheme with other related schemes, and the results showed the superiority of our scheme.

  7. An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks

    PubMed Central

    Xu, Guoai; Sun, Jing

    2017-01-01

    As an essential part of Internet of Things (IoT), wireless sensor networks (WSNs) have touched every aspect of our lives, such as health monitoring, environmental monitoring and traffic monitoring. However, due to its openness, wireless sensor networks are vulnerable to various security threats. User authentication, as the first fundamental step to protect systems from various attacks, has attracted much attention. Numerous user authentication protocols armed with formal proof are springing up. Recently, two biometric-based schemes were proposed with confidence to be resistant to the known attacks including offline dictionary attack, impersonation attack and so on. However, after a scrutinization of these two schemes, we found them not secure enough as claimed, and then demonstrated that these schemes suffer from various attacks, such as offline dictionary attack, impersonation attack, no user anonymity, no forward secrecy, etc. Furthermore, we proposed an enhanced scheme to overcome the identified weaknesses, and proved its security via Burrows–Abadi–Needham (BAN) logic and the heuristic analysis. Finally, we compared our scheme with other related schemes, and the results showed the superiority of our scheme. PMID:29257066

  8. Public health human resources: a comparative analysis of policy documents in two Canadian provinces

    PubMed Central

    2014-01-01

    Background Amidst concerns regarding the capacity of the public health system to respond rapidly and appropriately to threats such as pandemics and terrorism, along with changing population health needs, governments have focused on strengthening public health systems. A key factor in a robust public health system is its workforce. As part of a nationally funded study of public health renewal in Canada, a policy analysis was conducted to compare public health human resources-relevant documents in two Canadian provinces, British Columbia (BC) and Ontario (ON), as they each implement public health renewal activities. Methods A content analysis of policy and planning documents from government and public health-related organizations was conducted by a research team comprised of academics and government decision-makers. Documents published between 2003 and 2011 were accessed (BC = 27; ON = 20); documents were either publicly available or internal to government and excerpted with permission. Documentary texts were deductively coded using a coding template developed by the researchers based on key health human resources concepts derived from two national policy documents. Results Documents in both provinces highlighted the importance of public health human resources planning and policies; this was particularly evident in early post-SARS documents. Key thematic areas of public health human resources identified were: education, training, and competencies; capacity; supply; intersectoral collaboration; leadership; public health planning context; and priority populations. Policy documents in both provinces discussed the importance of an educated, competent public health workforce with the appropriate skills and competencies for the effective and efficient delivery of public health services. Conclusion This policy analysis identified progressive work on public health human resources policy and planning with early documents providing an inventory of issues to be addressed and later documents providing evidence of beginning policy development and implementation. While many similarities exist between the provinces, the context distinctive to each province has influenced and shaped how they have focused their public health human resources policies. PMID:24564931

  9. Public health human resources: a comparative analysis of policy documents in two Canadian provinces.

    PubMed

    Regan, Sandra; MacDonald, Marjorie; Allan, Diane E; Martin, Cheryl; Peroff-Johnston, Nancy

    2014-02-24

    Amidst concerns regarding the capacity of the public health system to respond rapidly and appropriately to threats such as pandemics and terrorism, along with changing population health needs, governments have focused on strengthening public health systems. A key factor in a robust public health system is its workforce. As part of a nationally funded study of public health renewal in Canada, a policy analysis was conducted to compare public health human resources-relevant documents in two Canadian provinces, British Columbia (BC) and Ontario (ON), as they each implement public health renewal activities. A content analysis of policy and planning documents from government and public health-related organizations was conducted by a research team comprised of academics and government decision-makers. Documents published between 2003 and 2011 were accessed (BC = 27; ON = 20); documents were either publicly available or internal to government and excerpted with permission. Documentary texts were deductively coded using a coding template developed by the researchers based on key health human resources concepts derived from two national policy documents. Documents in both provinces highlighted the importance of public health human resources planning and policies; this was particularly evident in early post-SARS documents. Key thematic areas of public health human resources identified were: education, training, and competencies; capacity; supply; intersectoral collaboration; leadership; public health planning context; and priority populations. Policy documents in both provinces discussed the importance of an educated, competent public health workforce with the appropriate skills and competencies for the effective and efficient delivery of public health services. This policy analysis identified progressive work on public health human resources policy and planning with early documents providing an inventory of issues to be addressed and later documents providing evidence of beginning policy development and implementation. While many similarities exist between the provinces, the context distinctive to each province has influenced and shaped how they have focused their public health human resources policies.

  10. Public engagement with information on renewable energy developments: The case of single, semi-urban wind turbines.

    PubMed

    Parks, J M; Theobald, K S

    2013-01-01

    This paper explores perceptions of public engagement with information on renewable energy developments. It draws on a case study of proposals by a major supermarket chain to construct single wind turbines in two semi-urban locations in the UK, analysing data from interviews with key actors in the planning process and focus groups with local residents. The paper concludes that key actors often had high expectations of how local people should engage with information, and sometimes implied that members of the public who were incapable of filtering or processing information in an organised or targeted fashion had no productive role to play in the planning process. It shows how the specific nature of the proposals (single wind turbines in semi-urban locations proposed by a commercial private sector developer) shaped local residents' information needs and concerns in a way that challenged key actors' expectations of how the public should engage with information.

  11. A systematic literature review of the key challenges for developing the structure of public health economic models.

    PubMed

    Squires, Hazel; Chilcott, James; Akehurst, Ronald; Burr, Jennifer; Kelly, Michael P

    2016-04-01

    To identify the key methodological challenges for public health economic modelling and set an agenda for future research. An iterative literature search identified papers describing methodological challenges for developing the structure of public health economic models. Additional multidisciplinary literature searches helped expand upon important ideas raised within the review. Fifteen articles were identified within the formal literature search, highlighting three key challenges: inclusion of non-healthcare costs and outcomes; inclusion of equity; and modelling complex systems and multi-component interventions. Based upon these and multidisciplinary searches about dynamic complexity, the social determinants of health, and models of human behaviour, six areas for future research were specified. Future research should focus on: the use of systems approaches within health economic modelling; approaches to assist the systematic consideration of the social determinants of health; methods for incorporating models of behaviour and social interactions; consideration of equity; and methodology to help modellers develop valid, credible and transparent public health economic model structures.

  12. Public Health 3.0: A Call to Action for Public Health to Meet the Challenges of the 21st Century

    PubMed Central

    Wang, Y. Claire; Harris, Andrea; Auerbach, John; Koo, Denise; O’Carroll, Patrick

    2017-01-01

    Public health is what we do together as a society to ensure the conditions in which everyone can be healthy. Although many sectors play key roles, governmental public health is an essential component. Recent stressors on public health are driving many local governments to pioneer a new Public Health 3.0 model in which leaders serve as Chief Health Strategists, partnering across multiple sectors and leveraging data and resources to address social, environmental, and economic conditions that affect health and health equity. In 2016, the US Department of Health and Human Services launched the Public Health 3.0 initiative and hosted listening sessions across the country. Local leaders and community members shared successes and provided insight on actions that would ensure a more supportive policy and resource environment to spread and scale this model. This article summarizes the key findings from those listening sessions and recommendations to achieve Public Health 3.0. PMID:28880837

  13. Public Health 3.0: A Call to Action for Public Health to Meet the Challenges of the 21st Century.

    PubMed

    DeSalvo, Karen B; Wang, Y Claire; Harris, Andrea; Auerbach, John; Koo, Denise; O'Carroll, Patrick

    2017-09-07

    Public health is what we do together as a society to ensure the conditions in which everyone can be healthy. Although many sectors play key roles, governmental public health is an essential component. Recent stressors on public health are driving many local governments to pioneer a new Public Health 3.0 model in which leaders serve as Chief Health Strategists, partnering across multiple sectors and leveraging data and resources to address social, environmental, and economic conditions that affect health and health equity. In 2016, the US Department of Health and Human Services launched the Public Health 3.0 initiative and hosted listening sessions across the country. Local leaders and community members shared successes and provided insight on actions that would ensure a more supportive policy and resource environment to spread and scale this model. This article summarizes the key findings from those listening sessions and recommendations to achieve Public Health 3.0.

  14. The Use of Social Marketing to Influence the Development of Problem Gambling in the UK: Implications for Public Health

    ERIC Educational Resources Information Center

    Powell, Jane E.; Tapp, Alan J.

    2009-01-01

    In this paper the authors present and debate the theoretical case for the use of social marketing to help reduce problem gambling in the public health context of the UK. Is triangulated between the key theories and principles of social marketing, the key literature and its theoretical application to the debate about reducing problem gambling in…

  15. Public by Day, Private by Night: Examining the Private Lives of Kenya's Public Universities

    ERIC Educational Resources Information Center

    Wangenge-Ouma, Gerald

    2012-01-01

    This article examines the emergence of the public university in Kenya as a key provider of private higher education, characterised mainly by the phenomenon of the "private public university student." It probes the broader socio-economic reforms circumscribing the privatisation of Kenya's public universities and the local and global…

  16. Florida's Opinion on K-12 Public Education Spending

    ERIC Educational Resources Information Center

    Forster, Greg

    2006-01-01

    This scientifically representative poll of 1,200 Floridians finds that public opinion about K-12 public education spending is seriously misinformed. Floridians think public schools need more money, but the main reason is that they are badly mistaken about how much money the public schools actually get. Key findings of the study include: (1) Half…

  17. Relationships between Organizations and Publics: Development of a Multi-Dimensional Organization-Public Relationship Scale.

    ERIC Educational Resources Information Center

    Bruning, Stephen D.; Ledingham, John A.

    1999-01-01

    Attempts to design a multiple-item, multiple-dimension organization/public relationship scale. Finds that organizations and key publics have three types of relationships: professional, personal, and community. Provides an instrument that can be used to measure the influence that perceptions of the organization/public relationship have on consumer…

  18. 76 FR 1059 - Publicly Available Mass Market Encryption Software and Other Specified Publicly Available...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-07

    .... 100108014-0121-01] RIN 0694-AE82 Publicly Available Mass Market Encryption Software and Other Specified Publicly Available Encryption Software in Object Code AGENCY: Bureau of Industry and Security, Commerce... encryption object code software with a symmetric key length greater than 64-bits, and ``publicly available...

  19. Social media in public health.

    PubMed

    Kass-Hout, Taha A; Alhinnawi, Hend

    2013-01-01

    While social media interactions are currently not fully understood, as individual health behaviors and outcomes are shared online, social media offers an increasingly clear picture of the dynamics of these processes. Social media is becoming an increasingly common platform among clinicians and public health officials to share information with the public, track or predict diseases. Social media can be used for engaging the public and communicating key public health interventions, while providing an important tool for public health surveillance. Social media has advantages over traditional public health surveillance, as well as limitations, such as poor specificity, that warrant additional study. Social media can provide timely, relevant and transparent information of public health importance; such as tracking or predicting the spread or severity of influenza, west nile virus or meningitis as they propagate in the community, and, in identifying disease outbreaks or clusters of chronic illnesses. Further work is needed on social media as a valid data source for detecting or predicting diseases or conditions. Also, whether or not it is an effective tool for communicating key public health messages and engaging both, the general public and policy-makers.

  20. Privacy-preserving photo sharing based on a public key infrastructure

    NASA Astrophysics Data System (ADS)

    Yuan, Lin; McNally, David; Küpçü, Alptekin; Ebrahimi, Touradj

    2015-09-01

    A significant number of pictures are posted to social media sites or exchanged through instant messaging and cloud-based sharing services. Most social media services offer a range of access control mechanisms to protect users privacy. As it is not in the best interest of many such services if their users restrict access to their shared pictures, most services keep users' photos unprotected which makes them available to all insiders. This paper presents an architecture for a privacy-preserving photo sharing based on an image scrambling scheme and a public key infrastructure. A secure JPEG scrambling is applied to protect regional visual information in photos. Protected images are still compatible with JPEG coding and therefore can be viewed by any one on any device. However, only those who are granted secret keys will be able to descramble the photos and view their original versions. The proposed architecture applies an attribute-based encryption along with conventional public key cryptography, to achieve secure transmission of secret keys and a fine-grained control over who may view shared photos. In addition, we demonstrate the practical feasibility of the proposed photo sharing architecture with a prototype mobile application, ProShare, which is built based on iOS platform.

  1. Public lands - from concept to practice

    Treesearch

    John J. Vrablec

    1977-01-01

    Intensive timber management can and is practiced on National Forest lands in the Northeast. There are, however many constraints and limitations which are placed upon the public lands manager. The key issue here is that the National Forests are PUBLIC lands which must be managed for the public.

  2. Exploring Local Public Health Workflow in the Context of Automated Translation Technologies

    PubMed Central

    Mandel, Hannah; Turner, Anne M.

    2013-01-01

    Despite the growing limited English proficiency (LEP) population in the US, and federal regulations requiring multilingual health information be available for LEP individuals, there is a lack of available high quality multilingual health promotion materials. The costs and personnel time associated with creating high quality translations serve as barriers to their creation, especially in resource limited public health settings. To explore the potential adoption of novel machine translation and document dissemination technologies for improving the creation and sharing of translated public health materials, we interviewed key health department personnel in Washington State. We analyzed translation workflow, elucidated key themes regarding public health translation work, and assessed attitudes towards electronic document exchange and machine translation. Public health personnel expressed the need for human quality assurance and oversight, but appreciated the potential of novel information technologies to assist in the production and dissemination of translated materials for public health practice. PMID:24551385

  3. How to Report a Foodborne Illness

    MedlinePlus

    ... Illness General Public Health Departments Healthcare Professionals Public Communication SEDRIC Interpretation of Epidemic Curves Identifying Commercial Entities Size & Extent of Foodborne Outbreaks Key Players ...

  4. Information Theoretic Secret Key Generation: Structured Codes and Tree Packing

    ERIC Educational Resources Information Center

    Nitinawarat, Sirin

    2010-01-01

    This dissertation deals with a multiterminal source model for secret key generation by multiple network terminals with prior and privileged access to a set of correlated signals complemented by public discussion among themselves. Emphasis is placed on a characterization of secret key capacity, i.e., the largest rate of an achievable secret key,…

  5. Security Standards and Best Practice Considerations for Quantum Key Distribution (QKD)

    DTIC Science & Technology

    2012-03-01

    SECURITY STANDARDS AND BEST PRACTICE CONSIDERATIONS FOR QUANTUM KEY DISTRIBUTION (QKD) THESIS...protection in the United States. AFIT/GSE/ENV/12-M05 SECURITY STANDARDS AND BEST PRACTICE CONSIDERATIONS FOR QUANTUM KEY DISTRIBUTION (QKD...FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED. AFIT/GSE/ENV/12-M05 SECURITY STANDARDS AND BEST PRACTICE CONSIDERATIONS FOR QUANTUM KEY

  6. Key-phrase based classification of public health web pages.

    PubMed

    Dolamic, Ljiljana; Boyer, Célia

    2013-01-01

    This paper describes and evaluates the public health web pages classification model based on key phrase extraction and matching. Easily extendible both in terms of new classes as well as the new language this method proves to be a good solution for text classification faced with the total lack of training data. To evaluate the proposed solution we have used a small collection of public health related web pages created by a double blind manual classification. Our experiments have shown that by choosing the adequate threshold value the desired value for either precision or recall can be achieved.

  7. Federation for a Secure Enterprise

    DTIC Science & Technology

    2016-09-10

    12 October 2005 e. RFC Internet X.509 Public Key Infrastructure: Certification Path Building, 2005 f. Public Key Cryptography Standard, PKCS #1...v2.2: RSA Cryptography Standard, RSA Laboratories, October 27, 2012 g. PKCS#12 format PKCS #12 v1.0: Personal Information Exchange Syntax Standard, RSA...ClientHello padding extension, 2015-02-17 f. Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS) Versions 1.2 and Earlier

  8. Access Control to Information in Pervasive Computing Environments

    DTIC Science & Technology

    2005-08-01

    for foo’s public key. (Digital signatures are omitted.) indicate a set of location and time intervals. A service will return location information only...stands for foo’s public key. (Digital signatures are omitted.) it describes the resource to which access is granted. Currently, we allow only resources...information relationship. Alice’s location information is bun- dled in her personal information. (The digital signature is omitted.) We use extended

  9. Overhead-Performance Tradeoffs in Distributed Wireless Networks

    DTIC Science & Technology

    2015-06-26

    grew this fraction. See the tutorial for details and acronym definitions. Key Publication & Abstract • Gwanmo Ku and John MacLaren Walsh, Resource...tradeoffs. Key Publication & Abstract • Gwanmo Ku , Jie Ren, and John MacLaren Walsh, Computing the Rate Distortion Region for the CEO Problem with...IID. • Jie Ren, Bradford Boyle, Gwanmo Ku , Steven Weber, John MacLaren Walsh, Overhead Performance Tradeoffs A Resource Allocation Perspective, IEEE

  10. PKI-based secure mobile access to electronic health services and data.

    PubMed

    Kambourakis, G; Maglogiannis, I; Rouskas, A

    2005-01-01

    Recent research works examine the potential employment of public-key cryptography schemes in e-health environments. In such systems, where a Public Key Infrastructure (PKI) is established beforehand, Attribute Certificates (ACs) and public key enabled protocols like TLS, can provide the appropriate mechanisms to effectively support authentication, authorization and confidentiality services. In other words, mutual trust and secure communications between all the stakeholders, namely physicians, patients and e-health service providers, can be successfully established and maintained. Furthermore, as the recently introduced mobile devices with access to computer-based patient record systems are expanding, the need of physicians and nurses to interact increasingly with such systems arises. Considering public key infrastructure requirements for mobile online health networks, this paper discusses the potential use of Attribute Certificates (ACs) in an anticipated trust model. Typical trust interactions among doctors, patients and e-health providers are presented, indicating that resourceful security mechanisms and trust control can be obtained and implemented. The application of attribute certificates to support medical mobile service provision along with the utilization of the de-facto TLS protocol to offer competent confidentiality and authorization services is also presented and evaluated through experimentation, using both the 802.11 WLAN and General Packet Radio Service (GPRS) networks.

  11. Public Attitudes and Behaviors with Respect to Child Abuse Prevention 1987-1991. Working Paper Number 840.

    ERIC Educational Resources Information Center

    Daro, Deborah; Gelles, Richard

    This report summarizes key findings of a series of national public opinion polls to determine the public's attitudes and actions with respect to child abuse prevention. Findings are reported for four areas: public attitudes toward specific parental discipline practices; the frequency of specific parental discipline practices; the public's support…

  12. Public Health Preparedness Funding: Key Programs and Trends From 2001 to 2017.

    PubMed

    Watson, Crystal R; Watson, Matthew; Sell, Tara Kirk

    2017-09-01

    To evaluate trends in funding over the past 16 years for key federal public health preparedness and response programs at the US Department of Health and Human Services, to improve understanding of federal funding history in this area, and to provide context for future resource allocation decisions for public health preparedness. In this 2017 analysis, we examined the funding history of key federal programs critical to public health preparedness by reviewing program budget data collected for our annual examination of federal funding for biodefense and health security programs since fiscal year (FY) 2001. State and local preparedness at the Centers for Disease Control and Prevention initially received $940 million in FY2002 and resulted in significant preparedness gains, but funding levels have since decreased by 31%. Similarly, the Hospital Preparedness Program within the Office of the Assistant Secretary for Preparedness and Response was funded at a high of $515 million in FY2003, but funding was reduced by 50%. Investments in medical countermeasure development and stockpiling remained relatively stable. The United States has made significant progress in preparing for disasters and advancing public health infrastructure. To enable continued advancement, federal funding commitments must be sustained.

  13. Public Health Preparedness Funding: Key Programs and Trends From 2001 to 2017

    PubMed Central

    Sell, Tara Kirk

    2017-01-01

    Objectives. To evaluate trends in funding over the past 16 years for key federal public health preparedness and response programs at the US Department of Health and Human Services, to improve understanding of federal funding history in this area, and to provide context for future resource allocation decisions for public health preparedness. Methods. In this 2017 analysis, we examined the funding history of key federal programs critical to public health preparedness by reviewing program budget data collected for our annual examination of federal funding for biodefense and health security programs since fiscal year (FY) 2001. Results. State and local preparedness at the Centers for Disease Control and Prevention initially received $940 million in FY2002 and resulted in significant preparedness gains, but funding levels have since decreased by 31%. Similarly, the Hospital Preparedness Program within the Office of the Assistant Secretary for Preparedness and Response was funded at a high of $515 million in FY2003, but funding was reduced by 50%. Investments in medical countermeasure development and stockpiling remained relatively stable. Conclusions. The United States has made significant progress in preparing for disasters and advancing public health infrastructure. To enable continued advancement, federal funding commitments must be sustained. PMID:28892451

  14. Public transportation's role in responding to climate change

    DOT National Transportation Integrated Search

    2010-01-01

    This paper details the role public transportation has in responding to the challenge of climate change. It collects and analyzes data from across the country on public transportation fuel use, vehicles deployed, rides taken, and other key metrics, dr...

  15. Liquefied natural gas (LNG) safety

    NASA Technical Reports Server (NTRS)

    Ordin, P. M.

    1977-01-01

    Bibliography, assembled from computer search of NASA Aerospace Safety Data Bank, including title of report, author, abstract, source, description of figures, key references, and key words or subject terms. Publication is indexed by key subjects and by authors. Items are relevant to design engineers and safety specialists.

  16. Public trust and confidence in legal authorities: What do majority and minority group members want from the law and legal institutions?

    PubMed

    Tyler, T R

    2001-01-01

    Discussions of public trust and confidence in the police and the courts often assume that the key to public feelings is the public's evaluation of the outcomes that the public receives from these legal authorities. In the case of the courts, discontent is often assumed to be linked to issues of cost and delay-instrumental concerns about the outcomes delivered to the public by the courts. In the case of the police, the inability to effectively control crime is frequently seen as driving public evaluations. This article presents an alternative procedural justice based model that links public trust and confidence to views about the manner in which legal authorities treat the public. Drawing upon psychological research about public evaluations of institutions and authorities it is argued that the key issue that shapes public views is a process based evaluation of the fairness of the procedures that the police and courts use to exercise their authority. Analyses from several studies exploring the basis of public views support this procedural justice based model of public evaluation. In addition, the results provide suggestions about the elements of procedures that are central to public judgments about their fairness. Copyright 2001 John Wiley & Sons, Ltd.

  17. From Headline to Hard Grind: The Importance of Understanding Public Administration in Achieving Health Outcomes

    PubMed Central

    O’Flynn, Janine

    2016-01-01

    Many public policy programs fail to translate ambitious headlines to on-the-ground action. The reasons for this are many and varied, but for public administration and management scholars a large part of the gap between ambition and achievement is the challenge associated with the operation of the machinery of government itself, and how it relates to the other parties that it relies on to fulfill these outcomes. In their article, Carey and Friel set out key reasons why public health scholars should seek to better understand important ideas in public administration. In commenting on their contribution, I draw out two critical questions that are raised by this discussion: (i) what are boundaries and what forms do they take? and (ii) why work across boundaries? Expanding on these key questions extends the points made by Carey and Friel on the importance of understanding public administration and will better place public health scholars and practitioners to realise health outcomes. PMID:27694672

  18. Providing long-acting reversible contraception services in Seattle school-based health centers: key themes for facilitating implementation.

    PubMed

    Gilmore, Kelly; Hoopes, Andrea J; Cady, Janet; Amies Oelschlager, Anne-Marie; Prager, Sarah; Vander Stoep, Ann

    2015-06-01

    The purpose of this study was to describe the implementation of a program that provides long-acting reversible contraception (LARC) services within school-based health centers (SBHCs) and to identify barriers and facilitators to implementation as reported by SBHC clinicians and administrators, public health officials, and community partners. We conducted 14 semistructured interviews with key informants involved in the implementation of LARC services. Key informants included SBHC clinicians and administrators, public health officials, and community partners. We used a content analysis approach to analyze interview transcripts for themes. We explored barriers to and facilitators of LARC service delivery across and within key informant groups. The most cited barriers across key informant groups were as follows: perceived lack of provider procedural skills and bias and negative attitudes about LARC methods. The most common facilitators identified across groups were as follows: clear communication strategies, contraceptive counseling practice changes, provider trainings, and stakeholder engagement. Two additional barriers emerged in specific key informant groups. Technical and logistical barriers to LARC service delivery were cited heavily by SBHC administrative staff, community partners, and public health officials. Expense and billing was a major barrier to SBHC administrative staff. LARC counseling and procedural services can be implemented in an SBHC setting to promote access to effective contraceptive options for adolescent women. Copyright © 2015 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  19. Authentication, Time-Stamping and Digital Signatures

    NASA Technical Reports Server (NTRS)

    Levine, Judah

    1996-01-01

    Time and frequency data are often transmitted over public packet-switched networks, and the use of this mode of distribution is likely to increase in the near future as high-speed logical circuits transmitted via networks replace point-to-point physical circuits. ALthough these networks have many technical advantages, they are susceptible to evesdropping, spoofing, and the alteration of messages enroute using techniques that are relatively simple to implement and quite difficult to detect. I will discuss a number of solutions to these problems, including the authentication mechanism used in the Network Time Protocol (NTP) and the more general technique of signing time-stamps using public key cryptography. This public key method can also be used to implement the digital analog of a Notary Public, and I will discuss how such a system could be realized on a public network such as the Internet.

  20. Maternal and reproductive health financing in Burundi: public-sector contribution levels and trends from 2010 to 2012.

    PubMed

    Chaumont, Claire; Muhorane, Carmen; Moreira-Burgos, Isabelle; Juma, Ndereye; Avila-Burgos, Leticia

    2015-10-01

    An understanding of public financial flows to reproductive health (RH) at the country level is key to assessing the extent to which they correspond to political commitments. This is especially relevant for low-income countries facing important challenges in the area of RH. To this end, the present study analyzes public expenditure levels and trends with regards to RH in Burundi between the years 2010 to 2012, looking specifically at financing agents, health providers, and health functions. The analysis was performed using standard RH sub-account methodology. Information regarding public expenditures was gathered from national budgets, the Burundi Ministry of Public Health information system, and from other relevant public institutions. Public RH expenditures in Burundi accounted for $41.163 million international dollars in 2012, which represents an increase of 16 % from 2010. In 2012, this sum represented 0.57 % of the national GDP. The share of total public health spending allocated to RH increased from 15 % in 2010 to 19 % in 2012. In terms of public agents involved in RH financing, the Ministry of Public Health proved to play the most important role. Half of all public RH spending went to primary health care clinics, while more than 70 % of this money was used for maternal health; average public RH spending per woman of childbearing age stagnated during the study period. The flow patterns and levels of public funds to RH in Burundi suggest that RH funding correctly reflects governmental priorities for the period between 2010 and 2012. In a context of general shrinking donor commitment, local governments have come to play a key role in ensuring the efficient use of available resources and the mobilizing of additional domestic funding. A strong and transparent financial tracking system is key to carrying out this role and making progress towards the MDG Goals and development beyond 2015.

  1. Use of acupuncture to treat cerebral infarction in the last 10 years: A Scopus-based literature analysis.

    PubMed

    Chen, Jiajun; Yao, Min; Zhao, Yunhua; Jin, Xiya; Li, Yuanbing; Huang, Lihong

    2012-12-25

    To identify global research trends in the use of acupuncture to treat cerebral infarction. We performed a bibliometric analysis of studies on the use of acupuncture to treat cerebral infarction published during 2002-2011, retrieved from Scopus, using the key words of acupuncture and cerebral infarction or ischemic stroke. peer-reviewed articles on the use of acupuncture to treat cerebral infarction indexed in Scopus and published between 2002 and 2011; types of publications were original research articles, reviews, meeting abstracts, proceedings papers, book chapters, editorial material, and news items. articles that required manual searching or telephone access; documents that were not published in the public domain; and corrected papers. (a) Annual publication output; (b) language of publication; (c) type of publication; (d) key words of publication; (e) publication by research field; (f) publication by journal; (g) publication by country and institution; (h) publication by author; (i) most-cited papers between 2002 and 2006; and (j) most-cited papers between 2007 and 2011. A total of 160 publications on the use of acupuncture to treat cerebral infarction from 2002-2011 were retrieved from Scopus. The number of publications increased gradually over the 10-year study period; most were written in Chinese or English. Articles and reviews constituted the major types. The most frequent key word used was acupuncture. The most prolific journals in this area were Zhongguo Zhen Jiu and the Chinese Journal of Clinical Rehabilitation. Of the 160 publications retrieved, half came from Chinese authors and institutions. Tianjin University of Traditional Chinese Medicine was the most prolific research institute. Two papers were cited 30 times; they were published in 2002 and 2009, respectively. In the field of neuroscience, there is little literature on acupuncture for cerebral infarction. The most-cited papers were cited 30 times in the past 3 years. We believe that, with advances in the study of mechanisms in neurobiology, research on acupuncture will also advance and will become the concern of more scholars.

  2. Multi-bit wavelength coding phase-shift-keying optical steganography based on amplified spontaneous emission noise

    NASA Astrophysics Data System (ADS)

    Wang, Cheng; Wang, Hongxiang; Ji, Yuefeng

    2018-01-01

    In this paper, a multi-bit wavelength coding phase-shift-keying (PSK) optical steganography method is proposed based on amplified spontaneous emission noise and wavelength selection switch. In this scheme, the assignment codes and the delay length differences provide a large two-dimensional key space. A 2-bit wavelength coding PSK system is simulated to show the efficiency of our proposed method. The simulated results demonstrate that the stealth signal after encoded and modulated is well-hidden in both time and spectral domains, under the public channel and noise existing in the system. Besides, even the principle of this scheme and the existence of stealth channel are known to the eavesdropper, the probability of recovering the stealth data is less than 0.02 if the key is unknown. Thus it can protect the security of stealth channel more effectively. Furthermore, the stealth channel will results in 0.48 dB power penalty to the public channel at 1 × 10-9 bit error rate, and the public channel will have no influence on the receiving of the stealth channel.

  3. An application of different dioids in public key cryptography

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Durcheva, Mariana I., E-mail: mdurcheva66@gmail.com

    2014-11-18

    Dioids provide a natural framework for analyzing a broad class of discrete event dynamical systems such as the design and analysis of bus and railway timetables, scheduling of high-throughput industrial processes, solution of combinatorial optimization problems, the analysis and improvement of flow systems in communication networks. They have appeared in several branches of mathematics such as functional analysis, optimization, stochastic systems and dynamic programming, tropical geometry, fuzzy logic. In this paper we show how to involve dioids in public key cryptography. The main goal is to create key – exchange protocols based on dioids. Additionally the digital signature scheme ismore » presented.« less

  4. Identification of Students with Dyslexia in California Public Schools

    ERIC Educational Resources Information Center

    Futterman, Kathy R.

    2017-01-01

    One of the key problems facing public education today is the need for early and accurate identification of students with dyslexia. Students with dyslexia in public schools have historically been largely ignored or under-identified. California public school educators and administrators need to understand what dyslexia is and how to accurately…

  5. Public Relation and Public Information Inservice Training for Occupational Specialists and Other School Personnel.

    ERIC Educational Resources Information Center

    Kershaw, James T., Ed.

    One of several products developed for a comprehensive program of career development (kindergarten through university) for vocational education in Florida, this manual, consisting of two parts, contains a public relations program to introduce occupation specialists to key publics. Part 1 delineates the procedure for making contacts with the key…

  6. 78 FR 14233 - Electronic Retirement Processing

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-05

    .... Public/private key (asymmetric) cryptography is a method of creating a unique mark, known as a digital... delivering a broad array of administrative services to multiple agencies. Shared symmetric key cryptography...

  7. Advances in Cryptology - EUROCRYPT’ 97

    DTIC Science & Technology

    1998-05-03

    public keys is about T/102. For example, one can choose T ~ 227.67 and M ~ 2 35.65. To obtain the secret session key from the determined internal state...scenario, where the objective is to reconstruct the secret key controlled LFSR initial states from the known keystream sequence, for a survey see... the secret message keys defining different initial internal states. This may open new possibilities for the secret key recovery cryptanalytic attacks

  8. Proceedings from the 9th Annual Meeting of International Society for Medical Publication Professionals Roundtable Session: key insights.

    PubMed

    Simcoe, Donna; Juneja, Renu; Scott, Gayle Nicholas; Sridharan, Kanaka; Williams-Hughes, Celeste

    2014-03-01

    During the 9th Annual Meeting of the International Society for Medical Publication Professionals (ISMPP, April 29-May 1, 2013 in Baltimore, MD), ∼650 participants attended two of 13 available roundtable sessions. Participants included medical publication professionals from industry, communication agencies, and journals. DISCUSSION TOPICS: Roundtable participants discussed how to best interpret and implement various guidances, such as Good Publication Practices 2 (GPP2), the International Committee of Medical Journal Editors (ICMJE) guidelines, and the Physician Payment Sunshine Act. The impact of and compliance with Corporate Integrity agreements (CIAs) on medical publication planning practices was debated. Roundtable participants also discussed ways of advancing both advocacy for the medical publication professional field and internal and external collaborations. The development of review manuscripts, publications from regions newly emerging in publication planning, medical devices publications, and real-world experience publications were discussed. Participants also considered the benefits and uncertainties of new technologies in medical publications such as multimedia and social media. This is the first ever article to be published following the well-attended ISMPP roundtable sessions. The objective of this manuscript is to summarize key learnings that will aid continued discussions about challenges and opportunities facing medical publication professionals.

  9. Key populations and human rights in the context of HIV services rendition in Ghana.

    PubMed

    Laar, Amos; DeBruin, Debra

    2017-08-02

    In line with its half century old penal code, Ghana currently criminalizes and penalizes behaviors of some key populations - populations deemed to be at higher risk of acquiring or transmitting Human Immunodeficiency Virus (HIV). Men who have sex with men (MSM), and sex workers (SWs) fit into this categorization. This paper provides an analysis of how enactment and implementation of rights-limiting laws not only limit rights, but also amplify risk and vulnerability to HIV in key and general populations. The paper derives from a project that assessed the ethics sensitivity of key documents guiding Ghana's response to its HIV epidemic. Assessment was guided by leading frameworks from public health ethics, and relevant articles from the international bill of rights. Ghana's response to her HIV epidemic does not adequately address the rights and needs of key populations. Even though the national response has achieved some public health successes, palpable efforts to address rights issues remain nascent. Ghana's guiding documents for HIV response include no advocacy for decriminalization, depenalization or harm reduction approaches for these key populations. The impact of rights-restricting codes on the nation's HIV epidemic is real: criminalization impedes key populations' access to HIV prevention and treatment services. Given that they are bridging populations, whatever affects the Ghanaian key populations directly, affects the general population indirectly. The right to the highest attainable standard of health, without qualification, is generally acknowledged as a fundamental human right. Unfortunately, this right currently eludes the Ghanaian SW and MSM. The paper endorses decriminalization as a means of promoting this right. In the face of opposition to decriminalization, the paper proposes specific harm reduction strategies as approaches to promote health and uplift the diminished rights of key populations. Thus the authors call on Ghana to remove impediments to public health services provision to these populations. Doing so will require political will and sufficient planning toward prioritizing HIV prevention, care and treatment programming for key populations.

  10. Evaluating public housing residents for knowledge, attitudes, and practices following dengue prevention outreach in Key West, Florida.

    PubMed

    Matthias, James; Zielinski-Gutierrez, Emily C; Tisch, Daniel J; Stanek, Danielle; Blanton, Ronald E; Doyle, Michael S; Eadie, Robert B; Gazdick, Elizabeth J; Leal, Andrea L; Pattison, Kimberly J; Perez-Guerra, Carmen L; Tittel, Christopher J; Vyas, Jooi; Wagner, Todd; Blackmore, Carina G M

    2014-11-01

    In 2009-2010, 93 cases of dengue were identified in Key West, Florida. This was the first outbreak of autochthonous transmission of dengue in Florida since 1934. In response to this outbreak, a multifaceted public education outreach campaign was launched. The aim of this study is to compare dengue prevention knowledge, attitudes, perceptions, and prevention practices among residents of subsidized public housing to the general population in Key West and to assess whether there were barriers preventing effective outreach from reaching specific vulnerable populations. A randomized population-based evaluation of knowledge, attitudes, and behaviors toward dengue prevention consisting of 521 separate household interviews was undertaken in July of 2011. A subset analysis was performed on interviews collected from 28 public housing units within four subsidized public housing complexes. Analysis was performed to determine whether knowledge, attitudes, and behaviors exhibited by public housing residents differed from the non-public housing study population. Public housing residents recalled fewer outreach materials (p=0.01) and were 3.4 times (95% confidence interval [CI] 1.4-8.3) more likely not to recall any outreach materials. Public housing residents were less likely to correctly identify how dengue transmission occurs (61% vs. 89%), where mosquitoes lay their eggs (54% vs. 85%), or to identify any signs or symptoms related to dengue (36% vs. 64%). Public housing residents were less likely to perform dengue prevention practices such as removing standing water or always using air conditioning. Examination of public housing residents identified an at-risk population that recalled less exposure to outreach materials and had less knowledge about dengue infection and prevention than the randomized study population. This provides public health systems the opportunity to target or modify future health messages and interventions to this group. Differences identified in the demographics of this population suggest that alternative methods or non-English materials may be required to reach desired outcomes.

  11. A study of incentives to support and promote public health accreditation.

    PubMed

    Thielen, Lee; Leff, Marilyn; Corso, Liza; Monteiro, Erinn; Fisher, Jessica Solomon; Pearsol, Jim

    2014-01-01

    Accreditation of public health agencies through the Public Health Accreditation Board is voluntary. Incentives that encourage agencies to apply for accreditation have been suggested as important factors in facilitating participation by state and local agencies. The project describes both current and potential incentives that are available at the federal, state, and local levels. Thirty-nine key informants from local, state, tribal, federal, and academic settings were interviewed from March through May 2012. Through open-ended interviews, respondents were asked about incentives that were currently in use in their settings and incentives they thought would help encourage participation in Public Health Accreditation Board accreditation. Incentives currently in use by public health agencies based on interviews include (1) financial support, (2) legal mandates, (3) technical assistance, (4) peer support workgroups, and (5) state agencies serving as role models by seeking accreditation themselves. Key informants noted that state agencies are playing valuable and diverse roles in providing incentives for accreditation within their own states. Key informants also identified the Centers for Disease Control and Prevention and other players, such as private foundations, public health institutes, national and state associations, and academia as providing both technical and financial assistance to support accreditation efforts. State, tribal, local, and federal agencies, as well as related organizations can play an important role by providing incentives to move agencies toward accreditation.

  12. Science, the public, and social elites: how the general public, scientists, top politicians and managers perceive science.

    PubMed

    Prpić, Katarina

    2011-11-01

    This paper finds that the Croatian public's and the social elites' perceptions of science are a mixture of scientific and technological optimism, of the tendency to absolve science of social responsibility, of skepticism about the social effects of science, and of cognitive optimism and skepticism. However, perceptions differ significantly according to the different social roles and the wider value system of the observed groups. The survey data show some key similarities, as well as certain specificities in the configuration of the types of views of the four groups--the public, scientists, politicians and managers. The results suggest that the well-known typology of the four cultures reveals some of the ideologies of the key actors of scientific and technological policy. The greatest social, primarily educational and socio-spatial, differentiation of the perceptions of science was found in the general public.

  13. Public health works: blood donation in urban China.

    PubMed

    Adams, Vincanne; Erwin, Kathleen; Le, Phuoc V

    2009-02-01

    Recent shifts in the global health infrastructure warrant consideration of the value and effectiveness of national public health campaigns. These shifts include the globalization of pharmaceutical research, the rise of NGO-funded health interventions, and the rise of biosecurity models of international health. We argue that although these trends have arisen as worthwhile responses to actual health needs, it is important to remember the key role that public health campaigns can play in the promotion of national health, especially in developing nations. Focusing on an example set by China in response to a public health crisis surrounding the national need for a clean and adequate blood supply and the inadvertent spread of HIV by way of blood donation in the early 1990's, we argue that there is an important role for strong national public health programs. We also identify the key factors that enabled China's response to this burgeoning epidemic to be, in the end, largely successful.

  14. Trust Threshold Based Public Key Management in Mobile Ad Hoc Networks

    DTIC Science & Technology

    2016-03-05

    should operate in a self-organized way. Capkun t al. [15] proposed a certificate-based self-organized pub- c key management for MANETs by removing...period allo node started with ignorance interact with other nodes, th not reach T th Table 2 Attack behavior for operations . Operation Attack...section, we discuss the core operations o CTPKM as illustrated by Fig. 1 . Each mobile entity is able t communicate with other entities using public

  15. Design and Development of a Web-Based DOD PKI Common Access Card (CAC) Instruction Tool

    DTIC Science & Technology

    2004-03-01

    institute internal training programs…to help educate the appropriate personnel” (p. 269). This section indicates the need for training when...of “digital certificates” that provide for the integrity and authenticity of the user to public key value binding. • Though public keys can be...known as a digest) is a unique, fixed- length mathematical value that is determined by the content of the message and the ‘hashing’ algorithm used

  16. Variation in Relations with Environmental Publics.

    ERIC Educational Resources Information Center

    Grunig, Larissa A.

    1987-01-01

    Examines how successful public relations practitioners are in dealing with pressure groups and the government. Compares their relationship with key publics and the relationship they enjoy with other, perhaps less threatening entities such as suppliers, the media, and stockholders. Compares relationships across types of organizations. (NKA)

  17. The 39th Annual Phi Delta Kappa/Gallup Poll of the Public's Attitudes toward the Public Schools

    ERIC Educational Resources Information Center

    Rose, Lowell C.; Gallup, Alec M.

    2007-01-01

    In this article, the authors report the results of the 39th Annual Phi Delta Kappa/Gallup Poll of the public's attitudes toward the public schools. This year's report examined the public's assessment of the No Child Left Behind (NCLB) and its principal strategy, standardized testing. The authors include a summary of key findings and tables showing…

  18. Awareness and implementation of the 2000 United States public health service tobacco dependence treatment guideline in a public hospital system.

    PubMed

    Moody-Thomas, Sarah; Horswell, Ronald; Celestin, Michael D; Dellinger, Amy B; Kaiser, Michael; Butler, Michael

    2011-04-01

    The 2000 United States Public Health Service (USPHS) clinical practice guideline, "Treating Tobacco Use and Dependence," recommends systems interventions to integrate the treatment of tobacco into routine health care. The Tobacco Control Initiative employed a systems approach to integrate evidence-based treatment for tobacco use into patient care practices in Louisiana's safety net health care system. The purpose of this study was to assess changes in awareness and implementation of the USPHS clinical practice guideline. Surveys were administered to a purposive sample of hospital personnel from key departments in the Louisiana State University system of public hospitals in 2003 (n = 24) and 2007 (n = 44). Perceptions of implementation success improved for 50 of 59 distinct survey items. Rasch scaling was used to assess overall (scaled) change and showed substantial improvement from 2003 to 2007 (P < 0.001). Survey items also were grouped into 6 logical key concept sets. Improvement occurred in perceptions for all 6 key concepts; however, not uniformly. Results of the 2003 and 2007 surveys illustrate the potential effectiveness of using a systems approach to integrate the assessment and treatment of tobacco use into routine care practices in a public health care delivery system that serves medically vulnerable populations.

  19. Listening to the Public: The Key to a Constructive Debate about Higher Education.

    ERIC Educational Resources Information Center

    Wadsworth, Deborah

    Using recent research on public attitudes about higher education some principles of public opinion formation may help higher education respond to its current challenges. That research shows parallel public attitudes to higher education and health care reform. On both issues people want change. They are not sure what is wrong, but they are scared…

  20. The Perceived and Real Value of Health Information Exchange in Public Health Surveillance

    ERIC Educational Resources Information Center

    Dixon, Brian Edward

    2011-01-01

    Public health agencies protect the health and safety of populations. A key function of public health agencies is surveillance or the ongoing, systematic collection, analysis, interpretation, and dissemination of data about health-related events. Recent public health events, such as the H1N1 outbreak, have triggered increased funding for and…

  1. The Business of Higher Education. The Guardians Initiative: Reclaiming the Public Trust

    ERIC Educational Resources Information Center

    Association of Governing Boards of Universities and Colleges, 2017

    2017-01-01

    This report is first in a series of informational briefings developed as part of "The Guardians Initiative: Reclaiming the Public Trust," an effort to educate and engage trustees as advocates on key issues in higher education. While the tone of public criticism of higher education has sharpened, public understanding about the sector's…

  2. Branding Helped to Promote Our Library and Its Technology

    ERIC Educational Resources Information Center

    Yun, Sejan

    2004-01-01

    The Saint Paul Public Library and its Friends collaborated to create an identity program as part of its public relations efforts. The work started with a team made up of the library's key administrators and its Public Relations and Communications office, plus Friends' staff and the Friends Board's Public Awareness Committee. In this article, the…

  3. Higher Education Public Relations at the Year 2000: Assessing the Status of Public Relations at Colleges and Universities.

    ERIC Educational Resources Information Center

    Peyronel, Anthony C.

    2000-01-01

    Discusses the importance of higher education public relations professionals playing a key role in institutional decision making and not being limited to the role of communication technician or information processor. Reviews studies on relationships between higher education and the media and between public relations professionals and…

  4. An examination of the needs of older patients with chronic mental illness in public mental health services.

    PubMed

    Futeran, Shuli; Draper, Brian M

    2012-01-01

    To describe the needs of patients aged 50 years and over with chronic mental illness being case managed within a public mental health service, and to determine factors that influence these needs. Patients were recruited from community-based Adult Mental Health (AMH) teams and Specialist Mental Health Services for Older People (SMHSOP) teams. Eligibility criteria included a diagnosis of schizophrenia or mood disorder. Patient, carer and key worker interviews were carried out using the Camberwell Assessment of Need for the Elderly (CANE). Of 183 eligible patients, 97 (mean age of 66.4 years) participated, of whom 63 were managed by AMH teams and 34 by SMHSOP teams. The majority (52%) had a diagnosis of schizophrenia, particularly those managed by AMH (71%). Patients self-rated fewer needs overall on the CANE than their key workers or the researcher, and also rated a higher proportion of their needs being met (83%) than the key worker (77%) or researcher (76%). From each perspective, over 80% of psychiatric and around 95% of identified medical needs were being met. The majority of social needs were unmet, with patients reporting only 42%, and key workers only 33%, met needs. The key unmet social needs were company, daily activities and having a close confidant. Key workers, patients and researchers rated SMHSOP service delivery to have significantly less unmet needs. The social needs of older patients with chronic mental illness require greater attention by public mental health services.

  5. The Future of Government Funding for Persons with Disabilities: Some Key Factors.

    ERIC Educational Resources Information Center

    Ross, E. Clarke

    1980-01-01

    The paper identifies and discusses key factors associated with government funding for disabled individuals. An introductory section traces the growth of public expenditures in recent years. Five key factors affecting government funding are examined (sample subtopics in parentheses): state government tax and spending limits (Proposition 13 and the…

  6. Zoos and public health: A partnership on the One Health frontier.

    PubMed

    Robinette, C; Saffran, L; Ruple, A; Deem, S L

    2017-06-01

    Today, accredited zoos are not just places for entertainment, they are actively involved in research for conservation and health. During recent decades in which the challenges for biodiversity conservation and public health have escalated, zoos have made significant changes to address these difficulties. Zoos increasingly have four key areas of focus: education, recreation, conservation, and research. These key areas are important in addressing an interrelated global conservation ( i.e. habitat and wildlife loss) and public health crisis. Zoo and public health professionals working together within a One Health framework represent a powerful alliance to address current and future conservation and public health problems around the world. For researchers, practitioners, and students, the collaboration between zoos and public health institutions offers the opportunity to both teach and operationalize this transdisciplinary approach. Using examples from our programs, we give a template for moving forward with collaborative initiatives and sustainable solutions involving partners in both zoos and public health institutions. We provide examples of cooperative programs and suggest a model for consideration in the development of further activities in this area.

  7. Missouri Public School Accountability Report. 2009-10 School Year

    ERIC Educational Resources Information Center

    Missouri Department of Elementary and Secondary Education, 2010

    2010-01-01

    Each year, the Missouri Department of Elementary and Secondary Education publishes an online "school accountability report card" for each public school district, each building and each charter school. This document provides a statewide report card on key accountability measures about Missouri public schools, including information…

  8. Sustaining Arts Programs in Public Education

    ERIC Educational Resources Information Center

    Dunstan, David

    2016-01-01

    The purpose of this qualitative research case study was to investigate leadership and funding decisions that determine key factors responsible for sustaining arts programs in public schools. While the educational climate, financial constraints, and standardized testing continue to impact arts programs in public education, Eastland High School, the…

  9. Private vs. Public Higher Education Budgeting

    ERIC Educational Resources Information Center

    Beamer, Sarah A.

    2011-01-01

    Private higher education institutions are those entities owned and operated by the private sector, while public institutions are those established, supported, and controlled by a governmental agency, most often a state. Key differences exist between private and public institutions that affect budgeting in critical ways. Such differences include…

  10. Implementation of the Internet of Things on Public Security

    NASA Astrophysics Data System (ADS)

    Lu, Kesheng; Li, Xichun

    The development of the Internet of Things will occur within a new ecosystem that will be driven by a number of key players. The public security as one of the key players is going to make real-time communications will be possible not only by humans but also by things at anytime and from anywhere. This research will present the advent of the Internet of Things to create a plethora of innovative applications and services, which will enhance quality of life and reduce inequalities.

  11. Proof Checking the RSA (Rivest, Shamir and Adleman) Public Key Encryption Algorithm.

    DTIC Science & Technology

    1982-09-01

    Pt- R136 626 PROOF CHECKING THE RSA (RIVEST SNAMIR AND ADLENRN) 1/i PUBLIC KEY ENCRYPTION.. (U) TEXAS UNIV AT AUSTIN INST FOR COMPUTING SCIENCE AND...Austin, Texas 78712 Ir t1 CONTROLLING OFFICE NAME AND ADDRESS 12. REPORT DATE - Software Systems Science Office of Naval Research September. 1982...properties are proved in [11. The third property is not proved; instead the authors of [li) argue that "all the obvious approaches to breaking our system are

  12. The role of women in nuclear - attracting public participation in regulatory decision-making process

    NASA Astrophysics Data System (ADS)

    Mohamad Jais, Azlina; Hassan, Najwa

    2018-01-01

    Public participation is vital in demonstrating transparency and enhancing effectiveness of a nuclear regulatory process. As such, it is necessary for nuclear practitioners to involve the public in key nuclear delivery milestones. This paper specifically discusses challenges faced in attracting public participation throughout the nuclear regulatory decision-making process, and highlights the roles of women in nuclear (WiN) in initiating the said public discourse.

  13. The Public Library in a Changing Society Viewed in the Light of the UNESCO Manifest. The African Experience. Occasional Paper No. 13.

    ERIC Educational Resources Information Center

    Kaungamno, E. E.

    Using the UNESCO Public Library Manifesto as a basis for discussion, this paper examines the role of the public library within developing countries and reviews the major developments in public library services in Africa subsequent to the two UNESCO seminars on Public Library Development held in Nigeria in 1962. A number of key statements from the…

  14. A capacity-building conceptual framework for public health nutrition practice.

    PubMed

    Baillie, Elizabeth; Bjarnholt, Christel; Gruber, Marlies; Hughes, Roger

    2009-08-01

    To describe a conceptual framework to assist in the application of capacity-building principles to public health nutrition practice. A review of the literature and consideration of the determinants of effective public health nutrition practice has been used to inform the development of a conceptual framework for capacity building in the context of public health nutrition practice. The limited literature supports a greater integration and application of capacity-building strategies and principles in public health nutrition practice, and that this application should be overt and strategic. A framework is proposed that identifies a number of determinants of capacity for effective public health nutrition action. The framework represents the key foundations for building capacity including leadership, resourcing and intelligence. Five key strategic domains supported by these foundation elements, including partnerships, organisational development, project management quality, workforce development and community development, are proposed. This framework can be used to assist the systematic assessment, development and evaluation of capacity-building activity within public health nutrition practice. Capacity building is a strategy within public health nutrition practice that needs to be central to public health nutrition intervention management. The present paper defines, contextualises and outlines a framework for integrating and making explicit the importance of capacity building within public health nutrition practice at many levels.

  15. Implementation of Rivest Shamir Adleman Algorithm (RSA) and Vigenere Cipher In Web Based Information System

    NASA Astrophysics Data System (ADS)

    Aryanti, Aryanti; Mekongga, Ikhthison

    2018-02-01

    Data security and confidentiality is one of the most important aspects of information systems at the moment. One attempt to secure data such as by using cryptography. In this study developed a data security system by implementing the cryptography algorithm Rivest, Shamir Adleman (RSA) and Vigenere Cipher. The research was done by combining Rivest, Shamir Adleman (RSA) and Vigenere Cipher cryptographic algorithms to document file either word, excel, and pdf. This application includes the process of encryption and decryption of data, which is created by using PHP software and my SQL. Data encryption is done on the transmit side through RSA cryptographic calculations using the public key, then proceed with Vigenere Cipher algorithm which also uses public key. As for the stage of the decryption side received by using the Vigenere Cipher algorithm still use public key and then the RSA cryptographic algorithm using a private key. Test results show that the system can encrypt files, decrypt files and transmit files. Tests performed on the process of encryption and decryption of files with different file sizes, file size affects the process of encryption and decryption. The larger the file size the longer the process of encryption and decryption.

  16. 75 FR 51088 - Statement of Organization, Functions and Delegations of Authority

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-18

    ..., and evaluation; (3) serves as a key point of contact to coordinate public relations and media...) Office of Shortage Designation (RP2); (4) Office of Policy Coordination (RP3); (5) Division of Public... the public from unsafe health care practitioners and support for the Nation's freestanding children's...

  17. 76 FR 24860 - Request for Public Comments Concerning Regulatory Cooperation Between the United States and the...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-03

    ... mitigate those risks, and the costs and benefits associated with alternative regulatory approaches. This... DEPARTMENT OF COMMERCE International Trade Administration Request for Public Comments Concerning... key trading partners to promote free and open trade and investment while also protecting public health...

  18. Selling School: The Marketing of Public Education

    ERIC Educational Resources Information Center

    DiMartino, Catherine; Jessen, Sarah Butler

    2018-01-01

    This timely book outlines the growth and development of marketing and branding practices in public education. The authors highlight why these practices have become important across key fields within public education, including leadership and governance, budgeting and finance, strategic initiatives, use of new technology, the role of teachers in…

  19. Status of E-Learning in Public Universities in Kenya

    ERIC Educational Resources Information Center

    Makokha, George L.; Mutisya, Dorothy N.

    2016-01-01

    The purpose of this study was to assess the status of e-learning in public universities in Kenya. Data were collected using questionnaires administered to both students and lecturers randomly sampled from seven public universities. Questionnaire responses were triangulated with interviews from key informants and focus group discussions (FGDs).…

  20. Economic Thinking for Strategic Leaders

    DTIC Science & Technology

    2011-03-24

    unprepared to analyze certain complex, ambiguous issues and craft informed decisions. 15. SUBJECT TERMS Behavioral Economics, Public Choice Theory ...COUNT: 7,668 PAGES: 38 KEY TERMS: Behavioral Economics, Public Choice Theory , Army Profession CLASSIFICATION: Unclassified Military senior...various economic fields, including Identity Economics, Neoclassical Economics, Behavioral Economics, and Public Choice Economics. Finally, it

  1. Denver Public Schools: Resegregation, Latino Style

    ERIC Educational Resources Information Center

    Lee, Chungmei

    2006-01-01

    The Denver Public Schools (DPS) provide a unique opportunity to study the dynamics of school segregation within the context of rapid demographic changes and key policy changes. This paper, the first of two reports, focuses on the dynamics of segregation, demographic changes, and implications for graduation rates in the Denver Public Schools. It…

  2. Private vs. Public Care for Juvenile Offenders: A Qualitative Examination.

    ERIC Educational Resources Information Center

    Kronick, Robert F.

    1993-01-01

    Examined effectiveness of methods used by public and private institutions' handling of incarcerated delinquents. Concluded that organizational culture is key concept in delivery of services to incarcerated children and youth; that private sector provides alternative to public in delivery of services; that alcohol and drug treatment programs are…

  3. Public Service Broadcasting: The Challenges of the Twenty-first Century. Reports and Papers on Mass Communication No. 111.

    ERIC Educational Resources Information Center

    Atkinson, Dave; Raboy, Marc, Ed.

    This report presents a review of key research on public broadcasting and a synthesis of the actuality of public service broadcasting today in the face of increasing globalization, with case studies from 16 countries. Following the General Introduction (Pierre Juneau), the report is divided into two parts. Part 1--"Public Service Television in…

  4. International Students, Academic Publications and World University Rankings: The Impact of Globalisation and Responses of a Malaysian Public University

    ERIC Educational Resources Information Center

    Tan, Yao Sua; Goh, Soo Khoon

    2014-01-01

    This paper examines the responses of a Malaysian public university, namely Universiti Sains Malaysia, to the impact of globalisation vis-à-vis three key issues: international students, academic publications and world university rankings. There are concerted efforts put in place by the university to recruit more international students. But a global…

  5. Performance Contracting as a Performance Management Tool in the Public Sector in Kenya: Lessons of learning

    ERIC Educational Resources Information Center

    Hope, Kempe Ronald, Sr.

    2013-01-01

    The purpose of this article is to provide an assessment and analysis of public sector performance contracting as a performance management tool in Kenya. It aims to demonstrate that performance contracting remains a viable and important tool for improving public sector performance as a key element of the on-going public sector transformation…

  6. Sex & Bugs & Rock 'n Roll--getting creative about public engagement.

    PubMed

    Sayer, Emma J; Featherstone, Helen C; Gosling, William D

    2014-02-01

    Public engagement is widely recognized as a key priority for achieving societal support for research. We spotlight creativity in public engagement as a way of reaching wider audiences and incentivising researcher involvement, demonstrating some of the possibilities with a recent initiative to engage the public with ecology at music festivals. Copyright © 2013 Elsevier Ltd. All rights reserved.

  7. From Headline to Hard Grind: The Importance of Understanding Public Administration in Achieving Health OutcomesComment on "Understanding the Role of Public Administration in Implementing Action on the Social Determinants of Health and Health Inequities".

    PubMed

    O'Flynn, Janine

    2016-04-30

    Many public policy programs fail to translate ambitious headlines to on-the-ground action. The reasons for this are many and varied, but for public administration and management scholars a large part of the gap between ambition and achievement is the challenge associated with the operation of the machinery of government itself, and how it relates to the other parties that it relies on to fulfill these outcomes. In their article, Carey and Friel set out key reasons why public health scholars should seek to better understand important ideas in public administration. In commenting on their contribution, I draw out two critical questions that are raised by this discussion: (i) what are boundaries and what forms do they take? and (ii) why work across boundaries? Expanding on these key questions extends the points made by Carey and Friel on the importance of understanding public administration and will better place public health scholars and practitioners to realise health outcomes. © 2016 by Kerman University of Medical Sciences.

  8. RESEARCH: Theory in Practice: Applying Participatory Democracy Theory to Public Land Planning

    PubMed

    Moote; Mcclaran; Chickering

    1997-11-01

    / Application of participatory democracy theory to public participation in public land planning, while widely advocated, has not been closely examined. A case study is used here to explicate the application of participatory democracy concepts to public participation in public land planning and decision making. In this case, a Bureau of Land Management resource area manager decided to make a significant shift from the traditional public involvement process to a more participatory method-coordinated resource management (CRM). This case was assessed using document analysis, direct observation of CRM meetings, questionnaires, and interviews of key participants. These sources were used to examine the CRM case using participatory democracy concepts of efficacy, access and representation, continuous participation throughout planning, information exchange and learning, and decision-making authority. The case study suggests that social deliberation in itself does not ensure successful collaboration and that establishing rules of operation and decision making within the group is critical. Furthermore, conflicts between the concept of shared decision-making authority and the public land management agencies' accountability to Congress, the President, and the courts need further consideration.KEY WORDS: Case study; Coordinated resource management; Public participation; Administrative discretion; Representation; Consensus; Collaboration

  9. The evolution of public relations and the use of the internet: the implications for health care organizations.

    PubMed

    Berkowitz, Eric N

    2007-01-01

    Over the past several years the discipline and practice of public relations has evolved. Historically, this field within health care organizations was a one-way management of communications and often was reactive in nature dealing with a crisis situation with an organization. Recent theoretical development within the discipline suggests that public relations involves more relationship building with key constituencies and on-going-dialogue. Concomitant with this evolution is the technological development of the internet. Most particularly is the use of podcasting and blogging as key tools which have been underutilized by health car providers but have significant potential in both communication and relationship opportunities as discussed in this article.

  10. Advanced technologies for encryption of satellite links

    NASA Astrophysics Data System (ADS)

    McMahan, Sherry S.

    The use of encryption on satellite links is discussed. Advanced technology exists to provide transmission security for large earth station with data rates up to 50 megabits per second. One of the major concerns in the use of encryption equipment with very small aperture terminals (VSAT) is the key management issue and the related operational costs. The low cost requirement and the lack of physical protection of remote VSATs place severe constraints on the design of encryption equipment. Encryption may be accomplished by embedding a tamper proof encryption module into the baseband unit of each VSAT. VSAT networks are usually star networks where there is a single large earth station that serves as a hub and all satellite communications takes place between each VSAT and the hub earth station. The hub earth station has the secret master key of each VSAT. These master keys are used to downline load encrypted session keys to each VSAT. A more secure alternative is to use public key techniques where each embedded VSAT encryption module internally generates its own secret and public numbers. The secret number never leaves the module while the public number is sent to the hub at the time of initialization of the encryption module into the VSAT. Physical access control to encryption modules of VSAT systems can be implemented using passwords, smart cards or biometrics.

  11. Managed Behavioral Health Care: An Instrument to Characterize Critical Elements of Public Sector Programs

    PubMed Central

    Ridgely, M Susan; Giard, Julienne; Shern, David; Mulkern, Virginia; Burnam, M Audrey

    2002-01-01

    Objective To develop an instrument to characterize public sector managed behavioral health care arrangements to capture key differences between managed and “unmanaged” care and among managed care arrangements. Study Design The instrument was developed by a multi-institutional group of collaborators with participation of an expert panel. Included are six domains predicted to have an impact on access, service utilization, costs, and quality. The domains are: characteristics of the managed care plan, enrolled population, benefit design, payment and risk arrangements, composition of provider networks, and accountability. Data are collected at three levels: managed care organization, subcontractor, and network of service providers. Data Collection Methods Data are collected through contract abstraction and key informant interviews. A multilevel coding scheme is used to organize the data into a matrix along key domains, which is then reviewed and verified by the key informants. Principal Findings This instrument can usefully differentiate between and among Medicaid fee-for-service programs and Medicaid managed care plans along key domains of interest. Beyond documenting basic features of the plans and providing contextual information, these data will support the refinement and testing of hypotheses about the impact of public sector managed care on access, quality, costs, and outcomes of care. Conclusions If managed behavioral health care research is to advance beyond simple case study comparisons, a well-conceptualized set of instruments is necessary. PMID:12236386

  12. Key features of an EU health information system: a concept mapping study.

    PubMed

    Rosenkötter, Nicole; Achterberg, Peter W; van Bon-Martens, Marja J H; Michelsen, Kai; van Oers, Hans A M; Brand, Helmut

    2016-02-01

    Despite the acknowledged value of an EU health information system (EU-HISys) and the many achievements in this field, the landscape is still heavily fragmented and incomplete. Through a systematic analysis of the opinions and valuations of public health stakeholders, this study aims to conceptualize key features of an EU-HISys. Public health professionals and policymakers were invited to participate in a concept mapping procedure. First, participants (N = 34) formulated statements that reflected their vision of an EU-HISys. Second, participants (N = 28) rated the relative importance of each statement and grouped conceptually similar ones. Principal Component and cluster analyses were used to condense these results to EU-HISys key features in a concept map. The number of key features and the labelling of the concept map were determined by expert consensus. The concept map contains 10 key features that summarize 93 statements. The map consists of a horizontal axis that represents the relevance of an 'organizational strategy', which deals with the 'efforts' to design and develop an EU-HISys and the 'achievements' gained by a functioning EU-HISys. The vertical axis represents the 'professional orientation' of the EU-HISys, ranging from the 'scientific' through to the 'policy' perspective. The top ranking statement expressed the need to establish a system that is permanent and sustainable. The top ranking key feature focuses on data and information quality. This study provides insights into key features of an EU-HISys. The results can be used to guide future planning and to support the development of a health information system for Europe. © The Author 2015. Published by Oxford University Press on behalf of the European Public Health Association. All rights reserved.

  13. Developing a new course for public transportation education.

    DOT National Transportation Integrated Search

    2015-06-01

    Safe, efficient, and accessible public transportation is a key component of livable and sustainable : transportation systems. It is therefore critical that both undergraduate and graduate-level Civil : Engineering students have a better understanding...

  14. Use of acupuncture to treat cerebral infarction in the last 10 years: A Scopus-based literature analysis☆

    PubMed Central

    Chen, Jiajun; Yao, Min; Zhao, Yunhua; Jin, Xiya; Li, Yuanbing; Huang, Lihong

    2012-01-01

    OBJECTIVE: To identify global research trends in the use of acupuncture to treat cerebral infarction. DATA RETRIEVAL: We performed a bibliometric analysis of studies on the use of acupuncture to treat cerebral infarction published during 2002–2011, retrieved from Scopus, using the key words of acupuncture and cerebral infarction or ischemic stroke. SELECTION CRITERIA: Inclusion criteria: peer-reviewed articles on the use of acupuncture to treat cerebral infarction indexed in Scopus and published between 2002 and 2011; types of publications were original research articles, reviews, meeting abstracts, proceedings papers, book chapters, editorial material, and news items. Exclusion criteria: articles that required manual searching or telephone access; documents that were not published in the public domain; and corrected papers. MAIN OUTCOME MEASURES: (a) Annual publication output; (b) language of publication; (c) type of publication; (d) key words of publication; (e) publication by research field; (f) publication by journal; (g) publication by country and institution; (h) publication by author; (i) most-cited papers between 2002 and 2006; and (j) most-cited papers between 2007 and 2011. RESULTS: A total of 160 publications on the use of acupuncture to treat cerebral infarction from 2002–2011 were retrieved from Scopus. The number of publications increased gradually over the 10-year study period; most were written in Chinese or English. Articles and reviews constituted the major types. The most frequent key word used was acupuncture. The most prolific journals in this area were Zhongguo Zhen Jiu and the Chinese Journal of Clinical Rehabilitation. Of the 160 publications retrieved, half came from Chinese authors and institutions. Tianjin University of Traditional Chinese Medicine was the most prolific research institute. Two papers were cited 30 times; they were published in 2002 and 2009, respectively. CONCLUSION: In the field of neuroscience, there is little literature on acupuncture for cerebral infarction. The most-cited papers were cited 30 times in the past 3 years. We believe that, with advances in the study of mechanisms in neurobiology, research on acupuncture will also advance and will become the concern of more scholars. PMID:25317148

  15. Equity in public health standards: a qualitative document analysis of policies from two Canadian provinces

    PubMed Central

    2012-01-01

    Introduction Promoting health equity is a key goal of many public health systems. However, little is known about how equity is conceptualized in such systems, particularly as standards of public health practice are established. As part of a larger study examining the renewal of public health in two Canadian provinces, Ontario and British Columbia (BC), we undertook an analysis of relevant public health documents related to equity. The aim of this paper is to discuss how equity is considered within documents that outline standards for public health. Methods A research team consisting of policymakers and academics identified key documents related to the public health renewal process in each province. The documents were analyzed using constant comparative analysis to identify key themes related to the conceptualization and integration of health equity as part of public health renewal in Ontario and BC. Documents were coded inductively with higher levels of abstraction achieved through multiple readings. Sets of questions were developed to guide the analysis throughout the process. Results In both sets of provincial documents health inequities were defined in a similar fashion, as the consequence of unfair or unjust structural conditions. Reducing health inequities was an explicit goal of the public health renewal process. In Ontario, addressing “priority populations” was used as a proxy term for health equity and the focus was on existing programs. In BC, the incorporation of an equity lens enhanced the identification of health inequities, with a particular emphasis on the social determinants of health. In both, priority was given to reducing barriers to public health services and to forming partnerships with other sectors to reduce health inequities. Limits to the accountability of public health to reduce health inequities were identified in both provinces. Conclusion This study contributes to understanding how health equity is conceptualized and incorporated into standards for local public health. As reflected in their policies, both provinces have embraced the importance of reducing health inequities. Both concepualized this process as rooted in structural injustices and the social determinants of health. Differences in the conceptualization of health equity likely reflect contextual influences on the public health renewal processes in each jurisdiction. PMID:22632097

  16. Negotiating the new health system: purchasing publicly accountable managed care.

    PubMed

    Rosenbaum, S

    1998-04-01

    The transformation to managed care is one of the most important and complex changes ever to take place in the American health system. One key aspect of this transformation is its implications for public health policy and practice. Both public and private buyers purchase managed care; increasingly, public programs that used to act as their own insurers (i.e., Medicare, Medicaid and CHAMPUS) are purchasing large quantities of managed care insurance from private companies. The transformation to managed care is altering the manner in which public health policy makers conceive of and carry out public health activities (particularly activities that involve the provision of personal health services). The degree to which managed care changes public health and in turn is altered by public health will depend in great measure on the extent to which public and private policy makers understand the implications of their choices for various aspects of public health and take steps to address them. Because both publicly and privately managed care arrangements are relatively deregulated, much of the dialogue between public health and managed care purchasers can be expected to take place within the context of the large service agreements that are negotiated between buyers and sellers of managed care products. This is particularly true for Medicaid because of the importance of Medicaid coverage, payment and access policies to public health policy makers, and because of the public nature of the Medicaid contracting process. A nationwide study of Medicaid managed care contracts offers the first detailed analysis of the content and structure of managed care service agreements and the public health issues they raise. Four major findings emerge from a review of the contracts. First, most of the agreements fail to address key issues regarding which Medicaid-covered services and benefits are the contractor's responsibility and which remain the residual responsibility of the state agency. Second, most contracts fail to address the legal and structural issues arising from the relationship between the managed care service system and the public health system, including such key matters as access to care for communicable diseases and contractors' relationship to state public health laboratories. Third, many contracts are silent on health agencies' access to data for surveillance and community health measurement purposes. Finally, many contracts may be developed with only a limited understanding of the key public health-related issues facing the community from which the members will be drawn. The CDC and state and local public health agencies must expand their activities in the area of managed care contract specifications. For several years the CDC has been involved in an ongoing effort to develop quality of care measures to be collected from all companies through the HEDIS process. As important as this effort is, it represents only an attempt to measure what managed care does rather than an a priori effort to shape the underlying policy and organizational structure of managed care itself. Integrating managed care with public health policy will require this type of affirmative effort with both Medicaid agencies as well as other managed care purchasers.

  17. 76 FR 12340 - Gulf of Mexico Fishery Management Council; Public Meetings

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-07

    .... Petersburg, Key West and Panama City, FL; Kenner, LA; Gulfport, MS; Mobile, AL; Corpus Christi and Galveston...., Key West, FL, telephone: (305) 295-5000; Monday, March 28, 2011, Hilton Garden Inn, 4535 Williams Blvd...

  18. How to Involve Concessionaires & Vendors in Your Recycling Program

    EPA Pesticide Factsheets

    This fact sheet is written for operations managers, recycling and event coordinators, and other key decisionmakers involved in planning and managing public venues and events. It explains the key role in recycling played by concessionaires.

  19. 77 FR 39489 - Notice of Public Meetings for the Naval Air Station Key West Airfield Operations Draft...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-03

    ... via the U.S. Postal Service to Naval Facilities Engineering Command Southeast, NAS Key West Air... the project Web site ( http://www.keywesteis.com ). All statements, oral or written, submitted during... Engineering Command Southeast, NAS Key West Air Operations EIS Project Manager, P.O. Box 30, Building 903, NAS...

  20. Latch Key: Developing Child Care Programs Through Community Education.

    ERIC Educational Resources Information Center

    Cramer, James P.; And Others

    This guide to the Latch Key program for after-school day care explores rationale and methods for developing Latch Key programs in the public schools to provide low cost after-school care for children (grades 1-6) of working or student parents. (Some programs have been provided for kindergarten children and some have been expanded to full time…

  1. 41 CFR Appendix A to Subpart B of... - 3-Key Points and Principles

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Principles A Appendix A to Subpart B of Part 102 Public Contracts and Property Management Federal Property.... B, App. A Appendix A to Subpart B of Part 102-3—Key Points and Principles This appendix provides... principles that may be applied to situations not covered elsewhere in this subpart. The guidance follows: Key...

  2. 41 CFR Appendix A to Subpart D of... - 3-Key Points and Principles

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Principles A Appendix A to Subpart D of Part 102 Public Contracts and Property Management Federal Property... Subpart D of Part 102-3—Key Points and Principles This appendix provides additional guidance in the form of answers to frequently asked questions and identifies key points and principles that may be applied...

  3. 41 CFR Appendix A to Subpart C of... - 3-Key Points and Principles

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Principles A Appendix A to Subpart C of Part 102 Public Contracts and Property Management Federal Property... 102-3—Key Points and Principles This appendix provides additional guidance in the form of answers to frequently asked questions and identifies key points and principles that may be applied to situations not...

  4. 76 FR 26290 - Science Advisory Board Staff Office; Notification of a Public Teleconference of the Chartered...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-06

    ... report entitled ``SAB Review of EPA's Reanalysis of Key Issues Related to Dioxin Toxicity and Response to... of EPA's Reanalysis of Key Issues Related to Dioxin Toxicity and Response to NAS Comments.'' The SAB... Reanalysis of Key Issues Related to Dioxin Toxicity and Response to NAS Comments.'' To conduct this review...

  5. Seaworthy Quantum Key Distribution Design and Validation (SEAKEY)

    DTIC Science & Technology

    2016-03-10

    Contractor Address: 10 Moulton Street, Cambridge, MA 02138 Title of the Project: Seaworthy Quantum Key Distribution Design and Validation (SEAKEY...Technologies Kathryn Carson Program Manager Quantum Information Processing 2 | P a g e Approved for public release; distribution is...we have continued work calculating the key rates achievable parametrically with receiver performance. In addition, we describe the initial designs

  6. A Survey of Research Progress and Development Tendency of Attribute-Based Encryption

    PubMed Central

    Pang, Liaojun; Yang, Jie; Jiang, Zhengtao

    2014-01-01

    With the development of cryptography, the attribute-based encryption (ABE) draws widespread attention of the researchers in recent years. The ABE scheme, which belongs to the public key encryption mechanism, takes attributes as public key and associates them with the ciphertext or the user's secret key. It is an efficient way to solve open problems in access control scenarios, for example, how to provide data confidentiality and expressive access control at the same time. In this paper, we survey the basic ABE scheme and its two variants: the key-policy ABE (KP-ABE) scheme and the ciphertext-policy ABE (CP-ABE) scheme. We also pay attention to other researches relating to the ABE schemes, including multiauthority, user/attribute revocation, accountability, and proxy reencryption, with an extensive comparison of their functionality and performance. Finally, possible future works and some conclusions are pointed out. PMID:25101313

  7. Analyzing the Effectiveness of the Self-organized Public-Key Management System on MANETs under the Lack of Cooperation and the Impersonation Attacks

    NASA Astrophysics Data System (ADS)

    da Silva, Eduardo; Dos Santos, Aldri Luiz; Lima, Michele N.; Albini, Luiz Carlos Pessoa

    Among the key management schemes for MANETs, the Self-Organized Public-Key Management System (PGP-Like) is the main chaining-based key management scheme. It is fully self-organized and does not require any certificate authority. Two kinds of misbehavior attacks are considered to be great threats to PGP-Like: lack of cooperation and impersonation attacks. This work quantifies the impact of such attacks on the PGP-Like. Simulation results show that PGP-Like was able to maintain its effectiveness when submitted to the lack of cooperation attack, contradicting previously theoretical results. It correctly works even in the presence of more than 60% of misbehaving nodes, although the convergence time is affected with only 20% of misbehaving nodes. On the other hand, PGP-Like is completely vulnerable to the impersonation attack. Its functionality is affected with just 5% of misbehaving nodes, confirming previously theoretical results.

  8. What's good for the goose is good for the gander. Guiding principles for the use of financial incentives in health behaviour change.

    PubMed

    Lynagh, Marita C; Sanson-Fisher, Rob W; Bonevski, Billie

    2013-03-01

    The use of financial incentives or pay-for-performance programs for health care providers has triggered emerging interest in the use of financial incentives for encouraging health behaviour change. This paper aims to identify key conditions under which the use of financial incentives for improvements in public health outcomes is most likely to be effective and appropriate. We review recent systematic reviews on their effectiveness in changing health behaviour and identify existing moral concerns concerning personal financial incentives. Current evidence indicates that incentives can be effective in driving health behaviour change under certain provisos, while a number of misgivings continue to be deliberated on. We outline a number of key principles for consideration in decisions about the potential use of incentives in leading to public health improvements. These key principles can assist policy makers in making decisions on the use of financial incentives directed at achieving improvements in public health.

  9. A Lightweight White-Box Symmetric Encryption Algorithm against Node Capture for WSNs †

    PubMed Central

    Shi, Yang; Wei, Wujing; He, Zongjian

    2015-01-01

    Wireless Sensor Networks (WSNs) are often deployed in hostile environments and, thus, nodes can be potentially captured by an adversary. This is a typical white-box attack context, i.e., the adversary may have total visibility of the implementation of the build-in cryptosystem and full control over its execution platform. Handling white-box attacks in a WSN scenario is a challenging task. Existing encryption algorithms for white-box attack contexts require large memory footprint and, hence, are not applicable for wireless sensor networks scenarios. As a countermeasure against the threat in this context, in this paper, we propose a class of lightweight secure implementations of the symmetric encryption algorithm SMS4. The basic idea of our approach is to merge several steps of the round function of SMS4 into table lookups, blended by randomly generated mixing bijections. Therefore, the size of the implementations are significantly reduced while keeping the same security efficiency. The security and efficiency of the proposed solutions are theoretically analyzed. Evaluation shows our solutions satisfy the requirement of sensor nodes in terms of limited memory size and low computational costs. PMID:26007737

  10. Cryptographically secure biometrics

    NASA Astrophysics Data System (ADS)

    Stoianov, A.

    2010-04-01

    Biometric systems usually do not possess a cryptographic level of security: it has been deemed impossible to perform a biometric authentication in the encrypted domain because of the natural variability of biometric samples and of the cryptographic intolerance even to a single bite error. Encrypted biometric data need to be decrypted on authentication, which creates privacy and security risks. On the other hand, the known solutions called "Biometric Encryption (BE)" or "Fuzzy Extractors" can be cracked by various attacks, for example, by running offline a database of images against the stored helper data in order to obtain a false match. In this paper, we present a novel approach which combines Biometric Encryption with classical Blum-Goldwasser cryptosystem. In the "Client - Service Provider (SP)" or in the "Client - Database - SP" architecture it is possible to keep the biometric data encrypted on all the stages of the storage and authentication, so that SP never has an access to unencrypted biometric data. It is shown that this approach is suitable for two of the most popular BE schemes, Fuzzy Commitment and Quantized Index Modulation (QIM). The approach has clear practical advantages over biometric systems using "homomorphic encryption". Future work will deal with the application of the proposed solution to one-to-many biometric systems.

  11. Achieve Location Privacy-Preserving Range Query in Vehicular Sensing

    PubMed Central

    Lu, Rongxing; Ma, Maode; Bao, Haiyong

    2017-01-01

    Modern vehicles are equipped with a plethora of on-board sensors and large on-board storage, which enables them to gather and store various local-relevant data. However, the wide application of vehicular sensing has its own challenges, among which location-privacy preservation and data query accuracy are two critical problems. In this paper, we propose a novel range query scheme, which helps the data requester to accurately retrieve the sensed data from the distributive on-board storage in vehicular ad hoc networks (VANETs) with location privacy preservation. The proposed scheme exploits structured scalars to denote the locations of data requesters and vehicles, and achieves the privacy-preserving location matching with the homomorphic Paillier cryptosystem technique. Detailed security analysis shows that the proposed range query scheme can successfully preserve the location privacy of the involved data requesters and vehicles, and protect the confidentiality of the sensed data. In addition, performance evaluations are conducted to show the efficiency of the proposed scheme, in terms of computation delay and communication overhead. Specifically, the computation delay and communication overhead are not dependent on the length of the scalar, and they are only proportional to the number of vehicles. PMID:28786943

  12. Achieve Location Privacy-Preserving Range Query in Vehicular Sensing.

    PubMed

    Kong, Qinglei; Lu, Rongxing; Ma, Maode; Bao, Haiyong

    2017-08-08

    Modern vehicles are equipped with a plethora of on-board sensors and large on-board storage, which enables them to gather and store various local-relevant data. However, the wide application of vehicular sensing has its own challenges, among which location-privacy preservation and data query accuracy are two critical problems. In this paper, we propose a novel range query scheme, which helps the data requester to accurately retrieve the sensed data from the distributive on-board storage in vehicular ad hoc networks (VANETs) with location privacy preservation. The proposed scheme exploits structured scalars to denote the locations of data requesters and vehicles, and achieves the privacy-preserving location matching with the homomorphic Paillier cryptosystem technique. Detailed security analysis shows that the proposed range query scheme can successfully preserve the location privacy of the involved data requesters and vehicles, and protect the confidentiality of the sensed data. In addition, performance evaluations are conducted to show the efficiency of the proposed scheme, in terms of computation delay and communication overhead. Specifically, the computation delay and communication overhead are not dependent on the length of the scalar, and they are only proportional to the number of vehicles.

  13. Harvesting Entropy for Random Number Generation for Internet of Things Constrained Devices Using On-Board Sensors

    PubMed Central

    Pawlowski, Marcin Piotr; Jara, Antonio; Ogorzalek, Maciej

    2015-01-01

    Entropy in computer security is associated with the unpredictability of a source of randomness. The random source with high entropy tends to achieve a uniform distribution of random values. Random number generators are one of the most important building blocks of cryptosystems. In constrained devices of the Internet of Things ecosystem, high entropy random number generators are hard to achieve due to hardware limitations. For the purpose of the random number generation in constrained devices, this work proposes a solution based on the least-significant bits concatenation entropy harvesting method. As a potential source of entropy, on-board integrated sensors (i.e., temperature, humidity and two different light sensors) have been analyzed. Additionally, the costs (i.e., time and memory consumption) of the presented approach have been measured. The results obtained from the proposed method with statistical fine tuning achieved a Shannon entropy of around 7.9 bits per byte of data for temperature and humidity sensors. The results showed that sensor-based random number generators are a valuable source of entropy with very small RAM and Flash memory requirements for constrained devices of the Internet of Things. PMID:26506357

  14. Query-Biased Preview over Outsourced and Encrypted Data

    PubMed Central

    Luo, Guangchun; Qin, Ke; Chen, Aiguo

    2013-01-01

    For both convenience and security, more and more users encrypt their sensitive data before outsourcing it to a third party such as cloud storage service. However, searching for the desired documents becomes problematic since it is costly to download and decrypt each possibly needed document to check if it contains the desired content. An informative query-biased preview feature, as applied in modern search engine, could help the users to learn about the content without downloading the entire document. However, when the data are encrypted, securely extracting a keyword-in-context snippet from the data as a preview becomes a challenge. Based on private information retrieval protocol and the core concept of searchable encryption, we propose a single-server and two-round solution to securely obtain a query-biased snippet over the encrypted data from the server. We achieve this novel result by making a document (plaintext) previewable under any cryptosystem and constructing a secure index to support dynamic computation for a best matched snippet when queried by some keywords. For each document, the scheme has O(d) storage complexity and O(log(d/s) + s + d/s) communication complexity, where d is the document size and s is the snippet length. PMID:24078798

  15. Query-biased preview over outsourced and encrypted data.

    PubMed

    Peng, Ningduo; Luo, Guangchun; Qin, Ke; Chen, Aiguo

    2013-01-01

    For both convenience and security, more and more users encrypt their sensitive data before outsourcing it to a third party such as cloud storage service. However, searching for the desired documents becomes problematic since it is costly to download and decrypt each possibly needed document to check if it contains the desired content. An informative query-biased preview feature, as applied in modern search engine, could help the users to learn about the content without downloading the entire document. However, when the data are encrypted, securely extracting a keyword-in-context snippet from the data as a preview becomes a challenge. Based on private information retrieval protocol and the core concept of searchable encryption, we propose a single-server and two-round solution to securely obtain a query-biased snippet over the encrypted data from the server. We achieve this novel result by making a document (plaintext) previewable under any cryptosystem and constructing a secure index to support dynamic computation for a best matched snippet when queried by some keywords. For each document, the scheme has O(d) storage complexity and O(log(d/s) + s + d/s) communication complexity, where d is the document size and s is the snippet length.

  16. Homomorphic encryption-based secure SIFT for privacy-preserving feature extraction

    NASA Astrophysics Data System (ADS)

    Hsu, Chao-Yung; Lu, Chun-Shien; Pei, Soo-Chang

    2011-02-01

    Privacy has received much attention but is still largely ignored in the multimedia community. Consider a cloud computing scenario, where the server is resource-abundant and is capable of finishing the designated tasks, it is envisioned that secure media retrieval and search with privacy-preserving will be seriously treated. In view of the fact that scale-invariant feature transform (SIFT) has been widely adopted in various fields, this paper is the first to address the problem of secure SIFT feature extraction and representation in the encrypted domain. Since all the operations in SIFT must be moved to the encrypted domain, we propose a homomorphic encryption-based secure SIFT method for privacy-preserving feature extraction and representation based on Paillier cryptosystem. In particular, homomorphic comparison is a must for SIFT feature detection but is still a challenging issue for homomorphic encryption methods. To conquer this problem, we investigate a quantization-like secure comparison strategy in this paper. Experimental results demonstrate that the proposed homomorphic encryption-based SIFT performs comparably to original SIFT on image benchmarks, while preserving privacy additionally. We believe that this work is an important step toward privacy-preserving multimedia retrieval in an environment, where privacy is a major concern.

  17. Harvesting entropy for random number generation for internet of things constrained devices using on-board sensors.

    PubMed

    Pawlowski, Marcin Piotr; Jara, Antonio; Ogorzalek, Maciej

    2015-10-22

    Entropy in computer security is associated with the unpredictability of a source of randomness. The random source with high entropy tends to achieve a uniform distribution of random values. Random number generators are one of the most important building blocks of cryptosystems. In constrained devices of the Internet of Things ecosystem, high entropy random number generators are hard to achieve due to hardware limitations. For the purpose of the random number generation in constrained devices, this work proposes a solution based on the least-significant bits concatenation entropy harvesting method. As a potential source of entropy, on-board integrated sensors (i.e., temperature, humidity and two different light sensors) have been analyzed. Additionally, the costs (i.e., time and memory consumption) of the presented approach have been measured. The results obtained from the proposed method with statistical fine tuning achieved a Shannon entropy of around 7.9 bits per byte of data for temperature and humidity sensors. The results showed that sensor-based random number generators are a valuable source of entropy with very small RAM and Flash memory requirements for constrained devices of the Internet of Things.

  18. KeySlinger and StarSlinger: Secure Key Exchange and Encrypted File Transfer on Smartphones

    DTIC Science & Technology

    2011-05-01

    format data to exchange because contact information can be exported to V- Cards using existing APIs. For these reasons it was chosen as the medium to... Card format allows customization of this field. The service provider field serves to identify the app the key is for and the username field stores the...public key data. A sample V- Card field looks like Listing 1 below. IMPP;TextSecure

  19. Identifying core competencies for public health epidemiologists.

    PubMed

    Bondy, Susan J; Johnson, Ian; Cole, Donald C; Bercovitz, Kim

    2008-01-01

    Public health authorities have prioritized the identification of competencies, yet little empirical data exist to support decisions on competency selection among particular disciplines. We sought perspectives on important competencies among epidemiologists familiar with or practicing in public health settings (local to national). Using a sequential, qualitative-quantitative mixed method design, we conducted key informant interviews with 12 public health practitioners familiar with front-line epidemiologists' practice, followed by a web-based survey of members of a provincial association of public health epidemiologists (90 respondents of 155 eligible) and a consensus workshop. Competency statements were drawn from existing core competency lists and those identified by key informants, and ranked by extent of agreement in importance for entry-level practitioners. Competencies in quantitative methods and analysis, critical appraisal of scientific evidence and knowledge transfer of scientific data to other members of the public health team were all regarded as very important for public health epidemiologists. Epidemiologist competencies focused on the provision, interpretation and 'translation' of evidence to inform decision-making by other public health professionals. Considerable tension existed around some potential competency items, particularly in the areas of more advanced database and data-analytic skills. Empirical data can inform discussions of discipline-specific competencies as one input to decisions about competencies appropriate for epidemiologists in the public health workforce.

  20. Clinical Trials: Key to Medical Progress

    MedlinePlus

    ... consumer, and it has untold benefits for the public health, too." — National Library of Medicine Director Donald A. ... consumer, and it has untold benefits for the public health, too." How to Participate A variety of federal ...

  1. The Children's Inn at NIH Anniversary Key Messages | NIH MedlinePlus the Magazine

    MedlinePlus

    ... Past Issues / Summer 2014 Table of Contents Anniversary Key Messages Playground and Park at The Children's Inn ... and commitment, and the merging of public and private resources. Merck generously donated $3.7 million for ...

  2. Ethical Issues in Social Media Research for Public Health.

    PubMed

    Hunter, Ruth F; Gough, Aisling; O'Kane, Niamh; McKeown, Gary; Fitzpatrick, Aine; Walker, Tom; McKinley, Michelle; Lee, Mandy; Kee, Frank

    2018-03-01

    Social media (SM) offer huge potential for public health research, serving as a vehicle for surveillance, delivery of health interventions, recruitment to trials, collection of data, and dissemination. However, the networked nature of the data means they are riddled with ethical challenges, and no clear consensus has emerged as to the ethical handling of such data. This article outlines the key ethical concerns for public health researchers using SM and discusses how these concerns might best be addressed. Key issues discussed include privacy; anonymity and confidentiality; authenticity; the rapidly changing SM environment; informed consent; recruitment, voluntary participation, and sampling; minimizing harm; and data security and management. Despite the obvious need, producing a set of prescriptive guidelines for researchers using SM is difficult because the field is evolving quickly. What is clear, however, is that the ethical issues connected to SM-related public health research are also growing. Most importantly, public health researchers must work within the ethical principles set out by the Declaration of Helsinki that protect individual users first and foremost.

  3. Public Health Works: Blood Donation in Urban China

    PubMed Central

    Adams, Vincanne; Erwin, Kathleen; Le, Phuoc V

    2009-01-01

    Recent shifts in the global health infrastructure warrant consideration of the value and effectiveness of national public health campaigns. These shifts include the globalization of pharmaceutical research, the rise of NGO-funded health interventions, and the rise of biosecurity models of international health. We argue that although these trends have arisen as worthwhile responses to actual health needs, it is important to remember the key role that public health campaigns can play in the promotion of national health, especially in developing nations. Focusing on an example set by China in response to a public health crisis surrounding the national need for a clean and adequate blood supply and the inadvertent spread of HIV by way of blood donation in the early 19902, we argue that there is an important role for strong national public health programs. We also identify the key factors that enabled China’s response to this bourgeoning epidemic to be, in the end, largely successful. PMID:19058887

  4. 43 CFR 15.12 - Closing of Preserve.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 43 Public Lands: Interior 1 2012-10-01 2011-10-01 true Closing of Preserve. 15.12 Section 15.12 Public Lands: Interior Office of the Secretary of the Interior KEY LARGO CORAL REEF PRESERVE § 15.12 Closing of Preserve. The Preserve may be closed to public use in the event of emergency conditions...

  5. 43 CFR 15.12 - Closing of Preserve.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 43 Public Lands: Interior 1 2014-10-01 2014-10-01 false Closing of Preserve. 15.12 Section 15.12 Public Lands: Interior Office of the Secretary of the Interior KEY LARGO CORAL REEF PRESERVE § 15.12 Closing of Preserve. The Preserve may be closed to public use in the event of emergency conditions...

  6. 43 CFR 15.12 - Closing of Preserve.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 43 Public Lands: Interior 1 2013-10-01 2013-10-01 false Closing of Preserve. 15.12 Section 15.12 Public Lands: Interior Office of the Secretary of the Interior KEY LARGO CORAL REEF PRESERVE § 15.12 Closing of Preserve. The Preserve may be closed to public use in the event of emergency conditions...

  7. Eyes Wide Open

    ERIC Educational Resources Information Center

    Bodemer, Brett; Brown, Karen; Crowther, Jennifer

    2009-01-01

    The Future Voices in Public Services column is a forum for students in graduate library and information science programs to discuss key issues they see in academic library public services, to envision what they feel librarians in public service have to offer to academia, to tell us of their visions for the profession, or to tell us of research…

  8. Religion & Public Schools: Striking a Constitutional Balance. Revised Edition.

    ERIC Educational Resources Information Center

    Gittins, Naomi E., Ed.

    This document provides comprehensive analysis of new key developments in the law regarding the proper relationship between religion and public schools. There are 12 chapters: (1) "The First Amendment and Public Schools: Overview of the Religion Clauses" (John Walsh, Dorine Lawrence-Hughes, and Usi N. Botros); (2) "Prayer on Campus:…

  9. Modeling Public School Partnerships: Merging Corporate and Community Issues.

    ERIC Educational Resources Information Center

    Clark, Cynthia E.; Brill, Dale A.

    This paper describes a model that merges corporate community relations strategy and public relations pedagogy to accelerate the rate at which Internet-based technologies are integrated into the public schools system. The model provides Internet-based training for a select group of Key Contacts drawn from two urban middle schools. Training is…

  10. 43 CFR 15.12 - Closing of Preserve.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 43 Public Lands: Interior 1 2011-10-01 2011-10-01 false Closing of Preserve. 15.12 Section 15.12 Public Lands: Interior Office of the Secretary of the Interior KEY LARGO CORAL REEF PRESERVE § 15.12 Closing of Preserve. The Preserve may be closed to public use in the event of emergency conditions...

  11. 43 CFR 15.12 - Closing of Preserve.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Closing of Preserve. 15.12 Section 15.12 Public Lands: Interior Office of the Secretary of the Interior KEY LARGO CORAL REEF PRESERVE § 15.12 Closing of Preserve. The Preserve may be closed to public use in the event of emergency conditions...

  12. The public and wildland fire management: social science findings for managers

    Treesearch

    S.M. McCaffrey

    2006-01-01

    Presents key social science findings from three National Fire Plan-sponsored research projects. Articles highlight information of likely interest to individuals working to decrease wildfire hazards on both private and public lands. Three general topic areas are addressed: (1) public views and acceptance of fuels management, (2) working with homeowners and communities,...

  13. Developing a Volunteer Program for Public Environmental Education.

    ERIC Educational Resources Information Center

    Meehan, Donald B.; Berta, Susan

    Volunteers can serve as a means to educate the public about environmental issues and increase stewardship ethic. This booklet is designed to provide much of the key information about designing and managing environmental volunteer programs to educate the general public. The booklet is based on the experiences of a volunteer program called Island…

  14. 76 FR 6784 - Science Advisory Board Staff Office; Notification of Two Public Teleconferences of the Science...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-08

    ... Two Public Teleconferences of the Science Advisory Board Dioxin Review Panel AGENCY: Environmental... two public teleconferences of the SAB Dioxin Review Panel to discuss its draft advisory report concerning EPA's Reanalysis of Key Issues Related to Dioxin Toxicity and Response to NAS Comments, External...

  15. Politics, Religion and Morals: The Symbolism of Public Schooling for the Urban Middle-Class Identity

    ERIC Educational Resources Information Center

    Rowe, Emma E.

    2016-01-01

    Research points to sections of the middle-class repopulating the "ordinary" urban public school and whilst there are key differences in how they are navigating public school choices, from "seeking a critical mass" to resisting traditional methods of choice and going "against-the-grain", or collectively campaigning for…

  16. Lifelong Learning in Public Libraries in 12 European Union Countries: Policy and Considerations

    ERIC Educational Resources Information Center

    Stanziola, Javier

    2010-01-01

    Public libraries have traditionally provided key inputs to support lifelong learning. More recently, significant social and technological changes have challenged this sector to redefine their role in this field. For most public libraries in Europe this has meant continuing their role as providers of information and advice while increasing services…

  17. Public and Private School Costs. A Local Analysis, 1994.

    ERIC Educational Resources Information Center

    Public Policy Forum, Inc., Milwaukee, WI.

    This document presents findings of a study that identified key factors of cost-per-pupil differences between public and private school spending among selected Milwaukee area public and private schools. The analysis was limited to cost factors only, specifically, to per-pupil spending. Methodology included a review of the school budgets of 7 public…

  18. New Public Management and Education

    ERIC Educational Resources Information Center

    Tolofari, Sowaribi

    2005-01-01

    Public administration has always been under constant review. Such reviews were mostly parochial, incremental, initiated or driven by low-key staff and often ended as fads. From the end of the 1970s to the 1990s, however, governments around the world were engaged in widespread and sustained reforms of their public administration. These reforms were…

  19. The Challenges and Future of Public Higher Education Leadership in Kenya

    ERIC Educational Resources Information Center

    Odhiambo, George

    2014-01-01

    This article discusses some of the key challenges and points of tension pertaining to leadership in higher education in Kenya. Effective leadership approaches are discussed including an exploration of why effective leadership is more important in Kenyan public higher education now than ever. Given the complex context within which public higher…

  20. Defining the public, defining sociology: hybrid science-public relations and boundary-work in early American sociology.

    PubMed

    Evans, Michael S

    2009-01-01

    In this paper, I examine how scientific disciplines define their boundaries by defining the publics with whom they engage. The case study is an episode in the development of early American sociology. In response to the dual challenge of credibility set up by the conflict between religious Baconian science and secular positivist science, key actors engaged in specific strategies of boundary-work to create their desired "sociological public"--a hybrid form of science-public relations that appealed to hostile university scientists while excluding a supportive religious audience from participation in the production of scientific knowledge. Using this case, I offer two specific insights. First I illustrate how, in the pursuit of scientific credibility, actors engage in boundary-work to differentiate audiences, not just practitioners. Such defining of publics is constitutive of scientific disciplines in their formative stage. Second, I demonstrate how audience boundaries can be redefined through the capture of existing boundary objects. Specifically, the removal of informational content in key boundary objects creates durable boundaries that are difficult to overcome.

  1. Seaworthy Quantum Key Distribution Design and Validation (SEAKEY)

    DTIC Science & Technology

    2015-05-27

    Address: 10 Moulton Street, Cambridge, MA 02138 Title of the Project: Seaworthy Quantum Key Distribution Design and Validation (SEAKEY...Technologies Kathryn Carson Program Manager Quantum Information Processing Report Documentation Page Form ApprovedOMB No. 0704-0188 Public...2016 4. TITLE AND SUBTITLE Seaworthy Quantum Key Distribution Design and Validation (SEAKEY) 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM

  2. 25 CFR 292.2 - How are key terms defined in this part?

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 25 Indians 1 2012-04-01 2011-04-01 true How are key terms defined in this part? 292.2 Section 292... LANDS ACQUIRED AFTER OCTOBER 17, 1988 General Provisions § 292.2 How are key terms defined in this part... property interest claimed by an individual or entity (private, public, or governmental); and (3) Either...

  3. 25 CFR 292.2 - How are key terms defined in this part?

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 25 Indians 1 2014-04-01 2014-04-01 false How are key terms defined in this part? 292.2 Section 292... LANDS ACQUIRED AFTER OCTOBER 17, 1988 General Provisions § 292.2 How are key terms defined in this part... property interest claimed by an individual or entity (private, public, or governmental); and (3) Either...

  4. 25 CFR 292.2 - How are key terms defined in this part?

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 25 Indians 1 2013-04-01 2013-04-01 false How are key terms defined in this part? 292.2 Section 292... LANDS ACQUIRED AFTER OCTOBER 17, 1988 General Provisions § 292.2 How are key terms defined in this part... property interest claimed by an individual or entity (private, public, or governmental); and (3) Either...

  5. The NIHR Public Health Research Programme: responding to local authority research needs in the United Kingdom.

    PubMed

    Dorling, Hannah; Cook, Andrew; Ollerhead, Liz; Westmore, Matt

    2015-12-11

    The remit of the National Institute for Health Research Public Health Research (PHR) Programme is to evaluate public health interventions, providing new knowledge on the benefits, costs, acceptability and wider impacts of interventions, set outside of the National Health Service, intended to improve the health of the public and reduce inequalities. This paper illustrates how the PHR Programme is providing new knowledge for public health decision makers, based on the nine key areas for local authority public health action, described by the King's Fund. Many funded PHR projects are evaluating interventions, applied in a range of settings, across the identified key areas for local authority influence. For example, research has been funded on children and young people, and for some of the wider determinants of health, such as housing and travel. Other factors, such as spatial planning, or open and green spaces and leisure, are less represented in the PHR Programme. Further opportunities in research include interventions to improve the health of adolescents, adults in workplaces, and communities. Building evidence for public health interventions at local authority level is important to prioritise and implement effective changes to improve population health.

  6. Illinois crash facts and statistics, 2002

    DOT National Transportation Integrated Search

    2002-01-01

    This publication, Illinois Traffic Crash Facts : and Statistics for 2002, is designed to provide an : overview of motor vehicle crash experience in : Illinois. In addition to a plethora of crash data, the : publication includes key events in th...

  7. Illinois crash facts and statistics, 2001

    DOT National Transportation Integrated Search

    2001-01-01

    This publication, Illinois Traffic Crash Facts : and Statistics for 2001, is designed to provide an : overview of motor vehicle crash experience in : Illinois. In addition to a plethora of crash data, the : publication includes key events in th...

  8. Illinois crash facts and statistics, 2003

    DOT National Transportation Integrated Search

    2003-01-01

    This publication, Illinois Traffic Crash Facts : and Statistics for 2003, is designed to provide an : overview of motor vehicle crash experience in : Illinois. In addition to a plethora of crash data, the : publication includes key events in th...

  9. U.S. Food System Working Conditions as an Issue of Food Safety.

    PubMed

    Clayton, Megan L; Smith, Katherine C; Pollack, Keshia M; Neff, Roni A; Rutkow, Lainie

    2017-02-01

    Food workers' health and hygiene are common pathways to foodborne disease outbreaks. Improving food system jobs is important to food safety because working conditions impact workers' health, hygiene, and safe food handling. Stakeholders from key industries have advanced working conditions as an issue of public safety in the United States. Yet, for the food industry, stakeholder engagement with this topic is seemingly limited. To understand this lack of action, we interviewed key informants from organizations recognized for their agenda-setting role on food-worker issues. Findings suggest that participants recognize the work standards/food safety connection, yet perceived barriers limit adoption of a food safety frame, including more pressing priorities (e.g., occupational safety); poor fit with organizational strategies and mission; and questionable utility, including potential negative consequences. Using these findings, we consider how public health advocates may connect food working conditions to food and public safety and elevate it to the public policy agenda.

  10. Ideological and organizational components of differing public health strategies for addressing the social determinants of health.

    PubMed

    Raphael, Dennis; Brassolotto, Julia; Baldeo, Navindra

    2015-12-01

    Despite a history of conceptual contributions to reducing health inequalities by addressing the social determinants of health (SDH), Canadian governmental authorities have struggled to put these concepts into action. Ontario's-Canada's most populous province-public health scene shows a similar pattern. In statements and reports, governmental ministries, professional associations and local public health units (PHUs) recognize the importance of these issues, yet there has been varying implementation of these concepts into public health activity. The purpose of this study was to gain insight into the key features responsible for differences in SDH-related activities among local PHUs. We interviewed Medical Officers of Health (MOH) and key staff members from nine local PHUs in Ontario varying in SDH activity as to their understandings of the SDH, public health's role in addressing the SDH, and their units' SDH-related activities. We also reviewed their unit's documents and their organizational structures in relation to acting on the SDH. Three clusters of PHUs are identified based on their SDH-related activities: service-delivery-oriented; intersectoral and community-based; and public policy/public education-focused. The two key factors that differentiate PHUs are specific ideological commitments held by MOHs and staff and the organizational structures established to carry out SDH-related activities. The ideological commitments and the organizational structures of the most active PHUs showed congruence with frameworks adopted by national jurisdictions known for addressing health inequalities. These include a structural analysis of the SDH and a centralized organizational structure that coordinates SDH-related activities. © The Author (2014). Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  11. Typed Multiset Rewriting Specifications of Security Protocols

    DTIC Science & Technology

    2011-10-01

    to define the type of a tuple as the sequence of the types of its components. Therefore, if A is a principal name and kA is a public key for A, the...tuple (A, kA ) would have type “principal × pubK A” (the Cartesian product symbol “×” is the standard constructor for tuple types). This construction...allows us to associate a generic principal with A’s public key: if B is another principal, then (B, kA ) will have this type as well. We will often need

  12. 23 CFR 450.316 - Interested parties, participation, and consultation.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... public transportation employees, freight shippers, providers of freight transportation services, private... at key decision points, including but not limited to a reasonable opportunity to comment on the... extent practicable, develop a documented process(es) that outlines roles, responsibilities, and key...

  13. 23 CFR 450.316 - Interested parties, participation, and consultation.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... public transportation employees, freight shippers, providers of freight transportation services, private... at key decision points, including but not limited to a reasonable opportunity to comment on the... extent practicable, develop a documented process(es) that outlines roles, responsibilities, and key...

  14. 23 CFR 450.316 - Interested parties, participation, and consultation.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... public transportation employees, freight shippers, providers of freight transportation services, private... at key decision points, including but not limited to a reasonable opportunity to comment on the... extent practicable, develop a documented process(es) that outlines roles, responsibilities, and key...

  15. 76 FR 67454 - Agency Information Collection Request; 30-Day Public Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-01

    ... revising the collection to include changes adopted by the cross-agency R&R working group. This working... Assistance (Cover); R&R Personal Data; R&R Senior/Key Person Profile; R&R Senior/Key Person Profile (Expanded...

  16. Compressed Secret Key Agreement:Maximizing Multivariate Mutual Information per Bit

    NASA Astrophysics Data System (ADS)

    Chan, Chung

    2017-10-01

    The multiterminal secret key agreement problem by public discussion is formulated with an additional source compression step where, prior to the public discussion phase, users independently compress their private sources to filter out strongly correlated components for generating a common secret key. The objective is to maximize the achievable key rate as a function of the joint entropy of the compressed sources. Since the maximum achievable key rate captures the total amount of information mutual to the compressed sources, an optimal compression scheme essentially maximizes the multivariate mutual information per bit of randomness of the private sources, and can therefore be viewed more generally as a dimension reduction technique. Single-letter lower and upper bounds on the maximum achievable key rate are derived for the general source model, and an explicit polynomial-time computable formula is obtained for the pairwise independent network model. In particular, the converse results and the upper bounds are obtained from those of the related secret key agreement problem with rate-limited discussion. A precise duality is shown for the two-user case with one-way discussion, and such duality is extended to obtain the desired converse results in the multi-user case. In addition to posing new challenges in information processing and dimension reduction, the compressed secret key agreement problem helps shed new light on resolving the difficult problem of secret key agreement with rate-limited discussion, by offering a more structured achieving scheme and some simpler conjectures to prove.

  17. Public Trust In Higher Education and A Media Review Of Press Articles In California. Research & Occasional Paper Series

    ERIC Educational Resources Information Center

    Fox, Warren H.; Earl-Novell, Sarah L.

    2004-01-01

    The purpose of this report is to better determine the level of general public trust in public higher education and the content of published articles in the press that may influence and reflect public confidence. By conducting a six-month media scan of four California newspapers, an overview is provided of the key concerns and issues facing higher…

  18. Off-line compatible electronic cash method and system

    DOEpatents

    Kravitz, D.W.; Gemmell, P.S.; Brickell, E.F.

    1998-11-03

    An off-line electronic cash system having an electronic coin, a bank B, a payee S, and a user U with an account at the bank B as well as a user password z{sub u,i}, has a method for performing an electronic cash transfer. An electronic coin is withdrawn from the bank B by the user U and an electronic record of the electronic coin is stored by the bank B. The coin is paid to the payee S by the user U. The payee S deposits the coin with the bank B. A determination is made that the coin is spent and the record of the coin is deleted by the bank B. A further deposit of the same coin after the record is deleted is determined. Additionally, a determination is made which user U originally withdrew the coin after deleting the record. To perform these operations a key pair is generated by the user, including public and secret signature keys. The public signature key along with a user password z{sub u,i} and a withdrawal amount are sent to the bank B by the user U. In response, the bank B sends a coin to the user U signed by the secret key of the bank indicating the value of the coin and the public key of the user U. The payee S transmits a challenge counter to the user U prior to receiving the coin. 16 figs.

  19. Off-line compatible electronic cash method and system

    DOEpatents

    Kravitz, David W.; Gemmell, Peter S.; Brickell, Ernest F.

    1998-01-01

    An off-line electronic cash system having an electronic coin, a bank B, a payee S, and a user U with an account at the bank B as well as a user password z.sub.u,i, has a method for performing an electronic cash transfer. An electronic coin is withdrawn from the bank B by the user U and an electronic record of the electronic coin is stored by the bank B. The coin is paid to the payee S by the user U. The payee S deposits the coin with the bank B. A determination is made that the coin is spent and the record of the coin is deleted by the bank B. A further deposit of the same coin after the record is deleted is determined. Additionally, a determination is made which user U originally withdrew the coin after deleting the record. To perform these operations a key pair is generated by the user, including public and secret signature keys. The public signature key along with a user password z.sub.u,i and a withdrawal amount are sent to the bank B by the user U. In response, the bank B sends a coin to the user U signed by the secret key of the bankindicating the value of the coin and the public key of the user U. The payee S transmits a challenge counter to the user U prior to receiving the coin.

  20. Key stakeholder perceptions regarding acute care psychiatry in distressed publicly funded mental health care markets.

    PubMed

    Frueh, B Christopher; Grubaugh, Anouk L; Lo Sasso, Anthony T; Jones, Walter J; Oldham, John M; Lindrooth, Richard C

    2012-01-01

    The role of acute care inpatient psychiatry, public and private, has changed dramatically since the 1960s, especially as recent market forces affecting the private sector have had ripple effects on publicly funded mental health care. Key stakeholders' experiences, perceptions, and opinions regarding the role of acute care psychiatry in distressed markets of publicly funded mental health care were examined. A qualitative research study was conducted using semi-structured thematic interviews with 52 senior mental health system administrators, clinical directors and managers, and nonclinical policy specialists. Participants were selected from markets in six regions of the United States that experienced recent significant closures of acute care psychiatric beds. Qualitative data analyses yielded findings that clustered around three sets of higher order themes: structure of care, service delivery barriers, and outcomes. Structure of care suggests that acute care psychiatry is seen as part of a continuum of services; service delivery barriers inhibit effective delivery of services and are perceived to include economic, regulatory, and political factors; outcomes include fragmentation of mental health care services across the continuum, the shift of mental health care to the criminal justice system, and market-specific issues affecting mental health care. Findings delineate key stakeholders' perceptions regarding the role acute care psychiatry plays in the continuum of care for publicly funded mental health and suggest that public mental health care is inefficacious. Results carry implications for policy makers regarding strategies/policies to improve optimal utilization of scarce resources for mental health care, including greater focus on psychotherapy.

  1. Key stakeholder perceptions regarding acute care psychiatry in distressed publicly funded mental health care markets

    PubMed Central

    Frueh, B. Christopher; Grubaugh, Anouk L.; Lo Sasso, Anthony T.; Jones, Walter J.; Oldham, John M.; Lindrooth, Richard C.

    2017-01-01

    The role of acute care inpatient psychiatry, public and private, has changed dramatically since the 1960s, especially as recent market forces affecting the private sector have had ripple effects on publicly funded mental health care. Key stakeholders’ experiences, perceptions, and opinions regarding the role of acute care psychiatry in distressed markets of publicly funded mental health care were examined. A qualitative research study was conducted using semi-structured thematic interviews with 52 senior mental health system administrators, clinical directors and managers, and nonclinical policy specialists. Participants were selected from markets in six regions of the United States that experienced recent significant closures of acute care psychiatric beds. Qualitative data analyses yielded findings that clustered around three sets of higher order themes: structure of care, service delivery barriers, and outcomes. Structure of care suggests that acute care psychiatry is seen as part of a continuum of services; service delivery barriers inhibit effective delivery of services and are perceived to include economic, regulatory, and political factors; outcomes include fragmentation of mental health care services across the continuum, the shift of mental health care to the criminal justice system, and market-specific issues affecting mental health care. Findings delineate key stakeholders’ perceptions regarding the role acute care psychiatry plays in the continuum of care for publicly funded mental health and suggest that public mental health care is inefficacious. Results carry implications for policy makers regarding strategies/policies to improve optimal utilization of scarce resources for mental health care, including greater focus on psychotherapy. PMID:22409204

  2. Message framing in the context of the national menu-labelling policy: a comparison of public health and private industry interests.

    PubMed

    Shelton, Rachel C; Colgrove, James; Lee, Grace; Truong, Michelle; Wingood, Gina M

    2017-04-01

    We conducted a content analysis of public comments to understand the key framing approaches used by private industry v. public health sector, with the goal of informing future public health messaging, framing and advocacy in the context of policy making. Comments to the proposed menu-labelling policy were extracted from Regulations.gov and analysed. A framing matrix was used to organize and code key devices and themes. Documents were analysed using content analysis with Dedoose software. Recent national nutrition-labelling regulations in the USA provide a timely opportunity to understand message framing in relation to obesity prevention and policy. We examined a total of ninety-seven documents submitted on behalf of organizations (private industry, n 64; public health, n 33). Public health focused on positive health consequences of the policy, used a social justice frame and supported its arguments with academic data. Industry was more critical of the policy; it used a market justice frame that emphasized minimal regulation, depicted its members as small, family-run businesses, and illustrated points with humanizing examples. Public health framing should counter and consider engaging directly with non-health-related arguments made by industry. Public health should include more powerful framing devices to convey their messages, including metaphors and humanizing examples.

  3. 43 CFR 15.5 - Wrecks.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 43 Public Lands: Interior 1 2014-10-01 2014-10-01 false Wrecks. 15.5 Section 15.5 Public Lands: Interior Office of the Secretary of the Interior KEY LARGO CORAL REEF PRESERVE § 15.5 Wrecks. No person... coral formation. ...

  4. 43 CFR 15.5 - Wrecks.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 43 Public Lands: Interior 1 2012-10-01 2011-10-01 true Wrecks. 15.5 Section 15.5 Public Lands: Interior Office of the Secretary of the Interior KEY LARGO CORAL REEF PRESERVE § 15.5 Wrecks. No person... coral formation. ...

  5. 43 CFR 15.5 - Wrecks.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 43 Public Lands: Interior 1 2013-10-01 2013-10-01 false Wrecks. 15.5 Section 15.5 Public Lands: Interior Office of the Secretary of the Interior KEY LARGO CORAL REEF PRESERVE § 15.5 Wrecks. No person... coral formation. ...

  6. Making connections : intermodal links in the public transportation system

    DOT National Transportation Integrated Search

    2007-09-01

    Since at least 1991, federal transportation policy has sought to encourage intermodal connections the links that allow passengers to switch from one mode of public transportation to another. The intermodal terminal is a key building block for dev...

  7. 43 CFR 15.5 - Wrecks.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 43 Public Lands: Interior 1 2011-10-01 2011-10-01 false Wrecks. 15.5 Section 15.5 Public Lands: Interior Office of the Secretary of the Interior KEY LARGO CORAL REEF PRESERVE § 15.5 Wrecks. No person... coral formation. ...

  8. 43 CFR 15.5 - Wrecks.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Wrecks. 15.5 Section 15.5 Public Lands: Interior Office of the Secretary of the Interior KEY LARGO CORAL REEF PRESERVE § 15.5 Wrecks. No person... coral formation. ...

  9. Life Cycle Impact Assessment Research Developments and Needs

    EPA Science Inventory

    Life Cycle Impact Assessment (LCIA) developments are explained along with key publications which record discussions which comprised ISO 14042 and SETAC document development, UNEP SETAC Life Cycle Initiative research, and research from public and private research institutions. It ...

  10. Research Data Management: A Library Practitioner's Perspective

    ERIC Educational Resources Information Center

    Yu, Siu Hong

    2017-01-01

    The Future Voices in Public Services column is a forum for students in graduate library and information science programs to discuss key issues they see in academic library public services, to envision what they feel librarians in public service have to offer to academia, to relate their visions for the profession, or to describe research that is…

  11. Return on Investment in College Education. The Guardians Initiative: Reclaiming the Public Trust

    ERIC Educational Resources Information Center

    Association of Governing Boards of Universities and Colleges, 2017

    2017-01-01

    "Return on Investment in College Education" is the second publication in a series of informational briefings developed as part of The Guardians Initiative: Reclaiming the Public Trust, an effort to educate and engage trustees as advocates on key issues in higher education. What is the return on investment (ROI) in college education?…

  12. Evaluating Public Spending: A Framework of Public Expenditure Reviews. World Bank Discussion Papers No. 323.

    ERIC Educational Resources Information Center

    Pradhan, Sanjay

    This paper presents a framework for evaluating the level and composition of public expenditures, illustrated by sectoral and country examples. The paper illustrates how this framework can be applied to analyzing broad allocations of spending within and across sectors, drawing upon some key findings and country examples from major sectors (health,…

  13. 75 FR 57779 - Science Advisory Board Staff Office; Notification of a Public Meeting of the SAB Dioxin Review Panel

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-22

    ... a Public Meeting of the SAB Dioxin Review Panel AGENCY: Environmental Protection Agency (EPA...) Staff Office announces a public meeting of the SAB Dioxin Review Panel to continue its review of EPA's Reanalysis of Key Issues Related to Dioxin Toxicity and Response to NAS Comments, External Review Draft...

  14. The Key to the Future of the Library Catalog is Openness

    ERIC Educational Resources Information Center

    Westrum, Anne-Lena

    2011-01-01

    Technology makes it possible to redefine libraries and make them relevant to the public once again. But how good are the digital services offered by public libraries today? The digital services department team of the Pode project at Norway's Oslo Public Library has spent the last 2 years investigating the possibilities available in order to…

  15. Information Technology and Value Creation in the Public Sector Organizations

    ERIC Educational Resources Information Center

    Pang, Min-Seok

    2011-01-01

    In this dissertation, I study the performance impact of information technology (IT) investments in the public sector. IT has been one of the key assets in public administration since the early MIS era. Even though the information systems (IS) discipline has witnessed a considerable amount of research efforts on the subject of IT business value for…

  16. Advancing Public Health through Continuing Education of Health Care Professionals

    ERIC Educational Resources Information Center

    Hudmon, Karen Suchanek; Addleton, Robert L.; Vitale, Frank M.; Christiansen, Bruce A.; Mejicano, George C.

    2011-01-01

    This article describes how the CS2day (Cease Smoking Today) initiative positioned continuing education (CE) in the intersection between medicine and public health. The authors suggest that most CE activities address the medical challenges that clinicians confront, often to the neglect of the public health issues that are key risk factors for the…

  17. The Nature of Conflict in Firm-Client Relations: A Content Analysis of "Public Relations Journal," 1980-89.

    ERIC Educational Resources Information Center

    Bourland, Pamela G.

    1993-01-01

    Finds that key issues recurring in articles regarding public relations firm-client relations were concerns over knowing each other's businesses, contributing to a consistent communication flow, finances, and "chemistry." Finds that conflict issues for public relations firms parallel those for advertising firms as reported in the advertising agency…

  18. Rethinking Leadership Learning in Postgraduate Public Management Programmes

    ERIC Educational Resources Information Center

    Briggs, Ian; Raine, John

    2013-01-01

    Leadership forms a key component of the curriculum of most Master of Public Administration and other public management programmes, usually doing so on the basis of assumptions that leadership is (a) both a subject and a responsibility that all such students might expect to embrace in the course of their careers; and (b) in some respects at least,…

  19. Embedding Social Enterprise Approaches in the Operations of Public Higher Education Institutions: An Exploratory Case Study

    ERIC Educational Resources Information Center

    Mohammad, Esam Sohail

    2017-01-01

    In the second decade of the new century, America's public higher education institutions (PHEIs) face several key challenges: rising demands of accountability, a steady drop in public funding, and competition from virtual and for-profit entities. Limited research had been conducted on the applicability of social enterprise theory to these…

  20. 15 CFR 922.160 - Purpose.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... MARINE SANCTUARY PROGRAM REGULATIONS Florida Keys National Marine Sanctuary § 922.160 Purpose. (a) The... Florida Keys National Marine Sanctuary by regulating activities affecting the resources of the Sanctuary... primary objective of resource protection all public and private uses of the resources of the Sanctuary not...

  1. 15 CFR 922.160 - Purpose.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... MARINE SANCTUARY PROGRAM REGULATIONS Florida Keys National Marine Sanctuary § 922.160 Purpose. (a) The... Florida Keys National Marine Sanctuary by regulating activities affecting the resources of the Sanctuary... primary objective of resource protection all public and private uses of the resources of the Sanctuary not...

  2. 15 CFR 922.160 - Purpose.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... MARINE SANCTUARY PROGRAM REGULATIONS Florida Keys National Marine Sanctuary § 922.160 Purpose. (a) The... Florida Keys National Marine Sanctuary by regulating activities affecting the resources of the Sanctuary... primary objective of resource protection all public and private uses of the resources of the Sanctuary not...

  3. 15 CFR 922.160 - Purpose.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... MARINE SANCTUARY PROGRAM REGULATIONS Florida Keys National Marine Sanctuary § 922.160 Purpose. (a) The... Florida Keys National Marine Sanctuary by regulating activities affecting the resources of the Sanctuary... primary objective of resource protection all public and private uses of the resources of the Sanctuary not...

  4. Post-processing procedure for industrial quantum key distribution systems

    NASA Astrophysics Data System (ADS)

    Kiktenko, Evgeny; Trushechkin, Anton; Kurochkin, Yury; Fedorov, Aleksey

    2016-08-01

    We present algorithmic solutions aimed on post-processing procedure for industrial quantum key distribution systems with hardware sifting. The main steps of the procedure are error correction, parameter estimation, and privacy amplification. Authentication of classical public communication channel is also considered.

  5. 33 CFR 117.261 - Atlantic Intracoastal Waterway from St. Marys River to Key Largo.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... from St. Marys River to Key Largo. 117.261 Section 117.261 Navigation and Navigable Waters COAST GUARD....261 Atlantic Intracoastal Waterway from St. Marys River to Key Largo. (a) General. Public vessels of..., mile 777.9 at St. Augustine. The draw shall open on signal; except that, from 7 a.m. to 6 p.m. the draw...

  6. Group Key Agreement Efficient in Communication

    DTIC Science & Technology

    2003-10-14

    Selected Areas in Communications, 17(9), September 1999. [13] David Chaum . Zero-knowledge undeniable signatures . In I.B. Damgard, editor, Advances in...sender with some sufficiently strong public key signature method such as DSA or RSA (and using a long-term private key).1 All receivers are required...to verify signatures on all received messages and check the aforementioned fields. Consequently, our security model is different from some recent

  7. Agricultural research and development: Public and private investments under alternative markets and institutions, May 1996

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fuglie, K.; Ballenger, N.; Day, K.

    1996-05-01

    Empirical studies indicate high economic returns from the public investment in agricultural research. Yet, even as society is placing broader demands on the research system, taxpayer support for public agricultural research is unlikely to increase. Stronger ownership rights for intellectual property have increased incentives for private investment in agricultural research, but key elements still require direct public support. The USDA is developing new mechanisms to build a more effective public-private partnership in agricultural research.

  8. A Market Analysis of Publications, Trade Conferences, and Key Events for Fleet Readiness Center Southwest

    DTIC Science & Technology

    2007-12-01

    Win and Keep Big Customers. Austin: Bard Press, 2005. Kotler , Philip and Kevin Lane Keller. Marketing Management. Upper Saddle River, NJ...stimulate awareness and demand with little or no cost. Kotler and Keller describe public relations and publicity as “a variety of programs designed to...broadcast media to promote something.”13 Kotler and Keller also argue that there is an appeal to the use of public relations and publicity that is based

  9. Public relations effectiveness in public health institutions.

    PubMed

    Springston, Jeffrey K; Weaver Lariscy, Ruth Ann

    2005-01-01

    This article explores public relations effectiveness in public health institutions. First, the two major elements that comprise public relations effectiveness are discussed: reputation management and stakeholder relations. The factors that define effective reputation management are examined, as are the roles of issues and crisis management in building and maintaining reputation. The article also examines the major facets of stakeholder relations, including an inventory of stakeholder linkages and key audiences, such as the media. Finally, methods of evaluating public relations effectiveness at both the program level and the institutional level are explored.

  10. Public health preparedness: evolution or revolution?

    PubMed

    Lurie, Nicole; Wasserman, Jeffrey; Nelson, Christopher D

    2006-01-01

    The recent emphasis on preparedness has created heightened expectations and has raised questions about the extent to which U.S. public health systems have evolved in recent years. This paper describes how public health preparedness is transforming public health agencies. Key signs of change include new partnerships, changes in the workforce, new technologies, and evolving organizational structures. Each of these elements has had some positive impact on public health; however, integration of preparedness with other public health functions remains challenging. The preparedness mission has also raised challenges in the areas of leadership, governance, quality, and accountability.

  11. Public health nutrition practice in Canada: a situational assessment.

    PubMed

    Fox, Ann; Chenhall, Cathy; Traynor, Marie; Scythes, Cindy; Bellman, Jane

    2008-08-01

    Renewed focus on public health has brought about considerable interest in workforce development among public health nutrition professionals in Canada. The present article describes a situational assessment of public health nutrition practice in Canada that will be used to guide future workforce development efforts. A situational assessment is a planning approach that considers strengths and opportunities as well as needs and challenges, and emphasizes stakeholder participation. This situational assessment consisted of four components: a systematic review of literature on public health nutrition workforce issues; key informant interviews; a PEEST (political, economic, environmental, social, technological) factor analysis; and a consensus meeting. Information gathered from these sources identified key nutrition and health concerns of the population; the need to define public health nutrition practice, roles and functions; demand for increased training, education and leadership opportunities; inconsistent qualification requirements across the country; and the desire for a common vision among practitioners. Findings of the situational assessment were used to create a three-year public health nutrition workforce development strategy. Specific objectives of the strategy are to define public health nutrition practice in Canada, develop competencies, collaborate with other disciplines, and begin to establish a new professional group or leadership structure to promote and enhance public health nutrition practice. The process of conducting the situational assessment not only provided valuable information for planning purposes, but also served as an effective mechanism for engaging stakeholders and building consensus.

  12. PUBLICATIONS - AIR POLLUTION PREVENTION AND CONTROL TECHNOLOGY

    EPA Science Inventory

    The Air Pollution Prevention and Control Division (APPCD)publishes highly scientific and technical information developed through its four research branches. A list of key publications produced by the individual branches can be viewed by visiting the website for the respective bra...

  13. The public's belief in climate change and its human cause are increasing over time.

    PubMed

    Milfont, Taciano L; Wilson, Marc S; Sibley, Chris G

    2017-01-01

    Polls examining public opinion on the subject of climate change are now commonplace, and one-off public opinion polls provide a snapshot of citizen's opinions that can inform policy and communication strategies. However, cross-sectional polls do not track opinions over time, thus making it impossible to ascertain whether key climate change beliefs held by the same group of individuals are changing or not. Here we examine the extent to which individual's level of agreement with two key beliefs ("climate change is real" and "climate change is caused by humans") remain stable or increase/decrease over a six-year period in New Zealand using latent growth curve modelling (n = 10,436). Data were drawn from the New Zealand Attitudes and Values Study, a probabilistic national panel study, and indicated that levels of agreement to both beliefs have steadily increased over the 2009-2015 period. Given that climate change beliefs and concerns are key predictors of climate change action, our findings suggest that a combination of targeted endeavors, as well as serendipitous events, may successfully convey the emergency of the issue.

  14. Review of the History of Non-traumatic Spinal Cord Dysfunction.

    PubMed

    New, Peter Wayne; Biering-Sørensen, Fin

    2017-01-01

    Background: The incidence of non-traumatic spinal cord dysfunction (SCDys) is reported to be higher than traumatic spinal cord injury (SCI) in many countries. No formal review of the history of SCDys has been published. Objective: This article aims to identify key highlights in the history of SCDys. Method: An electronic literature search was conducted (January 2017) using MEDLINE (1946-2016) and Embase (1974-2016) databases for publications regarding the history of SCDys. Publications on the history of SCI and a selection of neurology textbooks and books on the history of neurology were reviewed for potentially relevant references. The focus of the literature search was on identifying publications that detail key highlights regarding the history of the diagnosis and management of the most common SCDys conditions, as well as those of historical significance. Results: The electronic search of MEDLINE and Embase identified 11 relevant publications. The majority of publications included were identified from the authors' libraries and a selection of books on neurology and the history of neurology. Conclusions: This review outlines the history of SCDys, taking a broader historical perspective and covering the increasing awareness of the role of the spinal cord and knowledge of neuroanatomy. Key milestones in the history of the diagnosis and management of the most common SCDys conditions are presented. An appreciation of the history of SCDys increases our understanding of the large number of people who contributed to our current knowledge of these conditions and in some situations helps guide efforts regarding prevention of SCDys.

  15. Strengthening primary health care through primary care and public health collaboration: the influence of intrapersonal and interpersonal factors.

    PubMed

    Valaitis, Ruta K; O'Mara, Linda; Wong, Sabrina T; MacDonald, Marjorie; Murray, Nancy; Martin-Misener, Ruth; Meagher-Stewart, Donna

    2018-04-12

    AimThe aim of this paper is to examine Canadian key informants' perceptions of intrapersonal (within an individual) and interpersonal (among individuals) factors that influence successful primary care and public health collaboration. Primary health care systems can be strengthened by building stronger collaborations between primary care and public health. Although there is literature that explores interpersonal factors that can influence successful inter-organizational collaborations, a few of them have specifically explored primary care and public health collaboration. Furthermore, no papers were found that considered factors at the intrapersonal level. This paper aims to explore these gaps in a Canadian context. This interpretative descriptive study involved key informants (service providers, managers, directors, and policy makers) who participated in one h telephone interviews to explore their perceptions of influences on successful primary care and public health collaboration. Transcripts were analyzed using NVivo 9.FindingsA total of 74 participants [from the provinces of British Columbia (n=20); Ontario (n=19); Nova Scotia (n=21), and representatives from other provinces or national organizations (n=14)] participated. Five interpersonal factors were found that influenced public health and primary care collaborations including: (1) trusting and inclusive relationships; (2) shared values, beliefs and attitudes; (3) role clarity; (4) effective communication; and (5) decision processes. There were two influencing factors found at the intrapersonal level: (1) personal qualities, skills and knowledge; and (2) personal values, beliefs, and attitudes. A few differences were found across the three core provinces involved. There were several complex interactions identified among all inter and intra personal influencing factors: One key factor - effective communication - interacted with all of them. Results support and extend our understanding of what influences successful primary care and public health collaboration at these levels and are important considerations in building and sustaining primary care and public health collaborations.

  16. Public Response to Obamacare on Twitter

    PubMed Central

    Zheng, Kai; Liu, Yang; Levy, Helen

    2017-01-01

    Background The Affordable Care Act (ACA), often called “Obamacare,” is a controversial law that has been implemented gradually since its enactment in 2010. Polls have consistently shown that public opinion of the ACA is quite negative. Objective The aim of our study was to examine the extent to which Twitter data can be used to measure public opinion of the ACA over time. Methods We prospectively collected a 10% random sample of daily tweets (approximately 52 million since July 2011) using Twitter’s streaming application programming interface (API) from July 10, 2011 to July 31, 2015. Using a list of key terms and ACA-specific hashtags, we identified tweets about the ACA and examined the overall volume of tweets about the ACA in relation to key ACA events. We applied standard text sentiment analysis to assign each ACA tweet a measure of positivity or negativity and compared overall sentiment from Twitter with results from the Kaiser Family Foundation health tracking poll. Results Public opinion on Twitter (measured via sentiment analysis) was slightly more favorable than public opinion measured by the Kaiser poll (approximately 50% vs 40%, respectively) but trends over time in both favorable and unfavorable views were similar in both sources. The Twitter-based measures of opinion as well as the Kaiser poll changed very little over time: correlation coefficients for favorable and unfavorable public opinion were .43 and .37, respectively. However, we found substantial spikes in the volume of ACA-related tweets in response to key events in the law’s implementation, such as the first open enrollment period in October 2013 and the Supreme Court decision in June 2012. Conclusions Twitter may be useful for tracking public opinion of health care reform as it appears to be comparable with conventional polling results. Moreover, in contrast with conventional polling, the overall amount of tweets also provides a potential indication of public interest of a particular issue at any point in time. PMID:28550002

  17. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae).

    PubMed

    Attigala, Lakshmi; De Silva, Nuwan I; Clark, Lynn G

    2016-04-01

    Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus.

  18. Creating a Partnering Community Aimed to Foster Climate Literacy in the Southeastern United States

    NASA Astrophysics Data System (ADS)

    Rutherford, D.; McNeal, K. S.; Smith, R.; Hare, D.; Nair, U. S.

    2011-12-01

    The Climate Literacy Partnership in the Southeast (CLiPSE) is a part of the Climate Change Education Program supported by the National Science Foundation (http://CLiPSE-project.org). The established CLiPSE partnership is dedicated to improving climate literacy in the southeast through crafting a shared vision and strategic plan among stakeholders that promotes scientific formal and informal educational resources, materials and programs; a diverse network of key partnering organizations throughout the Southeastern United States (SE US); and effective public dialogues that address diverse learners and audiences and supports learning of climate, climate change, and its relevance upon human and environmental systems. The CLiPSE project has been successful in creating partnerships with more than fifty key stakeholders that stem from a few key publics such as agriculture, education, leisure, religious organizations, and culturally diverse communities. These key publics in the SE US frequently consist of individuals that place great trust in local, private efforts, and CLiPSE has realized the importance of the role of the partnering organizations in providing information through a trusted source. A second unique characteristic of the SE US is the predominately conservative and Protestant citizenry in the region. Working with and through these communities enhances climate change education outreach to this citizenry. The CLiPSE project rests on solid climate science and learning science research in order to formulate an effective plan with desired learning outcomes of critical thinking and civil conversation through effective communication strategies. This paper will present the CLiPSE model in reaching the key publics that traditionally hold ideologies that are traditionally perceived as incompatible with climate change science. We will present the strategies utilized to bring together experts and researchers in climate science, learning science, and social science with practitioners and leaders of key stakeholder groups to formulate a shared climate change education plan in the SE US that is uniquely formatted for each target audience. We will also share what we have learned from interacting with the leaders of our partnering organizations in crafting effective messages for their audiences and addressing learners' affective and cognitive domains.

  19. Avian influenza: risk, preparedness and the roles of public health nurses in Hong Kong.

    PubMed

    Ho, Georgina; Parker, Judith

    2006-03-01

    This paper provides an overview of the Hong Kong government's influenza preparedness plan and the key roles of public health nurses in that plan. The part played by Hong Kong public health nurses in the management of the avian influenza outbreak in Hong Kong in 1997 and the sudden acute respiratory syndrome outbreak in 2003, together with the capacity-building work they are now undertaking in preparing for an influenza pandemic, highlight their crucial role in public health. Recent strengthening of public health infrastructure in Hong Kong and heightened public awareness of public health issues have facilitated more proactive and effective public health nursing activities.

  20. Key exchange using biometric identity based encryption for sharing encrypted data in cloud environment

    NASA Astrophysics Data System (ADS)

    Hassan, Waleed K.; Al-Assam, Hisham

    2017-05-01

    The main problem associated with using symmetric/ asymmetric keys is how to securely store and exchange the keys between the parties over open networks particularly in the open environment such as cloud computing. Public Key Infrastructure (PKI) have been providing a practical solution for session key exchange for loads of web services. The key limitation of PKI solution is not only the need for a trusted third partly (e.g. certificate authority) but also the absent link between data owner and the encryption keys. The latter is arguably more important where accessing data needs to be linked with identify of the owner. Currently available key exchange protocols depend on using trusted couriers or secure channels, which can be subject to man-in-the-middle attack and various other attacks. This paper proposes a new protocol for Key Exchange using Biometric Identity Based Encryption (KE-BIBE) that enables parties to securely exchange cryptographic keys even an adversary is monitoring the communication channel between the parties. The proposed protocol combines biometrics with IBE in order to provide a secure way to access symmetric keys based on the identity of the users in unsecure environment. In the KE-BIOBE protocol, the message is first encrypted by the data owner using a traditional symmetric key before migrating it to a cloud storage. The symmetric key is then encrypted using public biometrics of the users selected by data owner to decrypt the message based on Fuzzy Identity-Based Encryption. Only the selected users will be able to decrypt the message by providing a fresh sample of their biometric data. The paper argues that the proposed solution eliminates the needs for a key distribution centre in traditional cryptography. It will also give data owner the power of finegrained sharing of encrypted data by control who can access their data.

Top