This document provides an introduction to cryptography. It discusses security goals like confidentiality and integrity. Cryptography is defined as transforming messages to make them secure. There are two main types: symmetric key cryptography where the same key is used to encrypt and decrypt, and asymmetric key cryptography where different public and private keys are used. Basic cryptography terms like cipher, ciphertext, encryption and decryption are also explained. Examples of cipher types like substitution and transposition ciphers are given. Applications of cryptography include defense, e-commerce, and data security.
First presentation of a Cryptography series, it aims to provide a high level overview of cryptography, clarify its objectives, define the terminology and explain the basics of how digital security systems, like Bitcoin, are built.
Mike Dance is a web developer and Bitcoin advocate.
----------
Presented at the BitcoinSYD Meetup on 11 February 2015
Our team worked on a Cryptography project. Our project was designed to convert a normal message or text to private and secure cipher text to maintain confidentiality and security in both corporate and national security. Here the plain text is converted into cipher text through a web platform where the user submits the confidential plain text and get the cipher text for the corresponding plain text.
Cryptography is the science of securing information and communication through techniques like encryption. The document discusses various cryptography concepts like encryption algorithms, symmetric and asymmetric key encryption, objectives of cryptography like confidentiality and integrity, and applications of encryption like web browsing, email, and video encryption. It also compares independent encryption with joint compression and encryption techniques for securing video data.
Cryptography ppt ,computer system security. PPTARYANUNIVERSE
This document discusses cryptography and how it provides security. It defines basic cryptography terms like plain text, cipher text, encryption, and decryption. It explains how cryptography works to secure communications from both passive and active security threats. The document also categorizes different types of cryptography like symmetric and asymmetric key cryptography, and compares how each uses keys to encrypt and decrypt messages. Applications of cryptography are listed as well.
Cryptography is the practice and study of techniques for secure communication in the presence of third parties. It involves encrypting plaintext messages into ciphertext that can only be decrypted by authorized parties. There are two main categories of cryptography: symmetric key cryptography which uses the same key for encryption and decryption, and asymmetric key cryptography which uses separate public and private keys. Network security relies heavily on cryptography to protect data transmission over the internet.
COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMP...Neelabja Manna
This document presents a comparative study of symmetric key cryptography and a new technique implementation. It discusses the history and purposes of cryptography. Symmetric algorithms like DES and AES are described along with asymmetric algorithms like RSA. Simple encryption schemes like Caesar cipher, rail fence technique, and Vernam cipher are explained with examples. A modified encryption technique is proposed that splits text into parts and applies different symmetric techniques to each part for added security. The advantages, disadvantages, and future scope of the modified technique are discussed before concluding the presentation.
This document provides an introduction to cryptography. It discusses security goals like confidentiality and integrity. Cryptography is defined as transforming messages to make them secure. There are two main types: symmetric key cryptography where the same key is used to encrypt and decrypt, and asymmetric key cryptography where different public and private keys are used. Basic cryptography terms like cipher, ciphertext, encryption and decryption are also explained. Examples of cipher types like substitution and transposition ciphers are given. Applications of cryptography include defense, e-commerce, and data security.
First presentation of a Cryptography series, it aims to provide a high level overview of cryptography, clarify its objectives, define the terminology and explain the basics of how digital security systems, like Bitcoin, are built.
Mike Dance is a web developer and Bitcoin advocate.
----------
Presented at the BitcoinSYD Meetup on 11 February 2015
Our team worked on a Cryptography project. Our project was designed to convert a normal message or text to private and secure cipher text to maintain confidentiality and security in both corporate and national security. Here the plain text is converted into cipher text through a web platform where the user submits the confidential plain text and get the cipher text for the corresponding plain text.
Cryptography is the science of securing information and communication through techniques like encryption. The document discusses various cryptography concepts like encryption algorithms, symmetric and asymmetric key encryption, objectives of cryptography like confidentiality and integrity, and applications of encryption like web browsing, email, and video encryption. It also compares independent encryption with joint compression and encryption techniques for securing video data.
Cryptography ppt ,computer system security. PPTARYANUNIVERSE
This document discusses cryptography and how it provides security. It defines basic cryptography terms like plain text, cipher text, encryption, and decryption. It explains how cryptography works to secure communications from both passive and active security threats. The document also categorizes different types of cryptography like symmetric and asymmetric key cryptography, and compares how each uses keys to encrypt and decrypt messages. Applications of cryptography are listed as well.
Cryptography is the practice and study of techniques for secure communication in the presence of third parties. It involves encrypting plaintext messages into ciphertext that can only be decrypted by authorized parties. There are two main categories of cryptography: symmetric key cryptography which uses the same key for encryption and decryption, and asymmetric key cryptography which uses separate public and private keys. Network security relies heavily on cryptography to protect data transmission over the internet.
COMPARATIVE STUDY OF DIFFERENT SYMMETRIC KEY CRYPTOGRAPHY & NEW TECHNIQUE IMP...Neelabja Manna
This document presents a comparative study of symmetric key cryptography and a new technique implementation. It discusses the history and purposes of cryptography. Symmetric algorithms like DES and AES are described along with asymmetric algorithms like RSA. Simple encryption schemes like Caesar cipher, rail fence technique, and Vernam cipher are explained with examples. A modified encryption technique is proposed that splits text into parts and applies different symmetric techniques to each part for added security. The advantages, disadvantages, and future scope of the modified technique are discussed before concluding the presentation.
The document discusses research approaches in cryptography. It outlines objectives to analytically study existing cryptographic systems and algorithms, compare their time and space complexity, and simulate vulnerabilities to cryptanalytic attacks. Common network attacks like wiretapping and denial of service are described along with solutions like encryption, authentication, and integrity checking. The RSA and Caesar ciphers are explained along with their encryption/decryption steps. MATLAB was used to implement RSA and Caesar and compare their time complexity.
This document provides an overview of information security and cryptography. It discusses objectives of security like avoiding data threats. It also covers topics like password auditing, data security, authentication, encryption, decryption, public and private key cryptography, digital signatures, and the RSA algorithm. It demonstrates an example of encrypting a message using RSA and decrypting the cipher text. The conclusion emphasizes the importance of information security.
Cryptography is the science and art of securing messages through techniques that transform plaintext into ciphertext. There are two main categories of cryptography: symmetric key cryptography which uses the same key for encryption and decryption, and asymmetric key cryptography which uses separate public and private keys. Cryptography aims to provide security goals such as confidentiality, integrity, non-repudiation and availability of data through the use of encryption algorithms, keys and ciphers.
The document discusses various topics in cryptography including symmetric and asymmetric encryption algorithms. Symmetric algorithms like DES use a shared key for encryption and decryption while asymmetric algorithms like RSA use public-private key pairs. Digital signatures can be generated by encrypting a document hash with a private key and verified using the corresponding public key. Cryptography ensures security goals like confidentiality, integrity, authentication and non-repudiation of digital communications.
Advanced cryptography and implementationAkash Jadhav
The document discusses a technical presentation on advanced cryptography and its implementation. It provides an overview of cryptography, including its history and basic concepts such as encryption, decryption, and cryptanalysis. Examples of cryptography applications discussed include ATM cards, credit cards, e-mail, and lottery tickets.
This document discusses cryptography and network security. Cryptography is defined as the science of protecting data by converting it into an unreadable format. The goals of cryptography are confidentiality, authentication, integrity, and non-repudiation. The document outlines common cryptographic techniques like encryption, decryption, hashes, and digital signatures. It also discusses security threats to network communication like interception, modification, and repudiation. The importance of network security is growing as more applications move to distributed models and operate over the internet.
This document provides an overview of cryptography. It discusses that cryptography is the practice of secure communication in the presence of others. The purpose of cryptography is to defend against hackers and industrial espionage while securing e-commerce, bank accounts, intellectual property, and avoiding liability. Cryptography provides authentication, privacy, integrity, and non-repudiation. Encryption converts plain text to cipher text using a key while decryption converts cipher text to plain text. Common cryptographic algorithms are secret key cryptography, public key cryptography, and hash functions. Secret key cryptography uses a private key for encryption while public key cryptography uses a public key exchanged over an insecure channel. Hash functions produce a checksum of data. AES encryption is now commonly used and
This document provides an overview of cryptography. It defines cryptography as the science of securing messages from attacks. It discusses basic cryptography terms like plain text, cipher text, encryption, decryption, and keys. It describes symmetric key cryptography, where the same key is used for encryption and decryption, and asymmetric key cryptography, which uses different public and private keys. It also covers traditional cipher techniques like substitution and transposition ciphers. The document concludes by listing some applications of cryptography like e-commerce, secure data, and access control.
Cryptanalysis refers to analyzing encrypted messages to find weaknesses without knowing the encryption key. It involves different types of attacks like known plaintext attacks where the cryptanalyst has samples of plaintext and its encrypted version. The goal of cryptanalysis is to break security systems, while cryptographers aim to develop strong systems. Cryptanalysts use techniques like guessing plaintext to analyze encrypted messages in known plaintext attacks.
Cryptography is used to protect information by encrypting messages into an unreadable cipher text format. Modern cryptography uses either secret key cryptography, which uses a single key for encryption and decryption, or public key cryptography, which uses two mathematically related keys with one key to encrypt and the other to decrypt. The purpose of cryptography and security is to defend against hackers, industrial espionage, and to secure e-commerce, bank accounts, intellectual property, and avoid liability.
Secret writing refers to cryptography and steganography. Cryptography involves encrypting messages so only authorized users can read them, while steganography hides information within other files or mediums. Common cryptographic techniques include symmetric and asymmetric encryption methods. Symmetric encryption uses a shared key between sender and receiver, while asymmetric encryption uses public and private key pairs. Steganography hides information by embedding it within images or other files.
Basic Talk. 90 minute talk to an audience of Freshmen and Sophomores of IIT Bombay on 23/02/10 as a part of Science Week. Organised by Web and Coding Club. Place: GG 101 (Elec Department)
This document provides an overview of cryptography. It begins with background information, defining cryptography as using mathematics to encrypt and decrypt data to enable secure transmission. The main purposes of cryptography are then outlined as authentication, privacy/confidentiality, integrity, and non-repudiation. The methodology section describes symmetric and asymmetric encryption methods. Symmetric encryption uses the same key for encryption and decryption while asymmetric uses mathematically related public/private key pairs. Specific symmetric algorithms like block and stream ciphers are then defined along with concepts like padding schemes. The document concludes with sections on key exchange and digital signatures, which enable practical uses of cryptography.
The document discusses the history and concepts of cryptography, especially in the context of e-commerce. It explains how cryptography evolved from ancient times to modern applications. Symmetric and asymmetric encryption methods are described, including how public/private key pairs work. Digital signatures are introduced as a way to provide authentication, integrity, and non-repudiation for electronic transactions.
Cryptanalysis is the study of encrypted messages to understand encryption systems and find weaknesses. Cryptanalysts aim to decrypt messages without knowing the encryption key or algorithm. Their research helps cryptographers strengthen algorithms. Cryptanalysts uncover design flaws that can reduce the number of keys tested on a message. Their work is used by governments and companies to test security products.
This document provides an overview of cryptography. It begins by defining cryptography as the science of encrypting and decrypting written communications. It then discusses the history of cryptography dating back to ancient Egypt and the Spartans. The document outlines some common cryptosystem services like confidentiality, integrity, and authentication. It also discusses key concepts like keyspace, symmetric and asymmetric encryption algorithms like AES and RSA, and hybrid encryption approaches. The presentation concludes by thanking the audience and offering to answer any questions.
This document discusses cryptography, which is the science of secure communication. It covers the basics of cryptography including its objectives, components, terminology, types, and advantages. Specifically, it explains how cryptography ensures confidentiality, integrity, and authentication of information. It also discusses symmetric and asymmetric encryption methods. Symmetric encryption uses a shared key for encryption and decryption while asymmetric encryption uses public and private key pairs. The document highlights how cryptography provides secure communication methods and is important for both military and everyday applications.
Cryptography is the science of using mathematics to encrypt and decrypt data.
Cryptography enables you to store sensitive information or transmit it across insecure networks so that it cannot be read by anyone except the intended recipient.
This document provides an overview of cryptography. It begins with basic definitions related to cryptography and a brief history of its use from ancient times to modern ciphers. It then describes different types of ciphers like stream ciphers, block ciphers, and public key cryptosystems. It also covers cryptography methods like symmetric and asymmetric algorithms. Common types of attacks on cryptosystems like brute force, chosen ciphertext, and frequency analysis are also discussed.
This document provides an overview of cryptography. It discusses traditional cryptography techniques like the Caesar cipher and shift ciphers. It also explains symmetric and asymmetric key cryptography, giving examples like DES, RSA, and their uses. Cryptographic services like authentication, data integrity, non-repudiation, and confidentiality are mentioned. The document notes how cryptography is widely used today in network security, banking transactions, and military communications.
The document discusses cryptography and its key concepts. It defines cryptography as disguising messages so that only the intended recipient can decipher it. It then discusses various cryptographic techniques like encryption, decryption, cryptanalysis, symmetric ciphers, asymmetric ciphers and algorithms like the Caesar cipher, Vigenere cipher, Playfair cipher, Hill cipher, one-time pad, and Diffie-Hellman key exchange. It provides examples to explain these concepts and techniques in cryptography.
The project presentation discusses a cryptography project for providing security. The objective is to securely send confidential files and documents to recipients using encryption algorithms like MD5, SHA1, and RSA. The proposed system aims to securely transmit data over networks using HTTPS and restrict access to authorized users only. The cryptography system has five modules: administrator, user, cryptic messages, cryptic files, and image transformation to allow various encrypted data transmission. The project will use Java web application architecture like MVC2 for development.
The document discusses research approaches in cryptography. It outlines objectives to analytically study existing cryptographic systems and algorithms, compare their time and space complexity, and simulate vulnerabilities to cryptanalytic attacks. Common network attacks like wiretapping and denial of service are described along with solutions like encryption, authentication, and integrity checking. The RSA and Caesar ciphers are explained along with their encryption/decryption steps. MATLAB was used to implement RSA and Caesar and compare their time complexity.
This document provides an overview of information security and cryptography. It discusses objectives of security like avoiding data threats. It also covers topics like password auditing, data security, authentication, encryption, decryption, public and private key cryptography, digital signatures, and the RSA algorithm. It demonstrates an example of encrypting a message using RSA and decrypting the cipher text. The conclusion emphasizes the importance of information security.
Cryptography is the science and art of securing messages through techniques that transform plaintext into ciphertext. There are two main categories of cryptography: symmetric key cryptography which uses the same key for encryption and decryption, and asymmetric key cryptography which uses separate public and private keys. Cryptography aims to provide security goals such as confidentiality, integrity, non-repudiation and availability of data through the use of encryption algorithms, keys and ciphers.
The document discusses various topics in cryptography including symmetric and asymmetric encryption algorithms. Symmetric algorithms like DES use a shared key for encryption and decryption while asymmetric algorithms like RSA use public-private key pairs. Digital signatures can be generated by encrypting a document hash with a private key and verified using the corresponding public key. Cryptography ensures security goals like confidentiality, integrity, authentication and non-repudiation of digital communications.
Advanced cryptography and implementationAkash Jadhav
The document discusses a technical presentation on advanced cryptography and its implementation. It provides an overview of cryptography, including its history and basic concepts such as encryption, decryption, and cryptanalysis. Examples of cryptography applications discussed include ATM cards, credit cards, e-mail, and lottery tickets.
This document discusses cryptography and network security. Cryptography is defined as the science of protecting data by converting it into an unreadable format. The goals of cryptography are confidentiality, authentication, integrity, and non-repudiation. The document outlines common cryptographic techniques like encryption, decryption, hashes, and digital signatures. It also discusses security threats to network communication like interception, modification, and repudiation. The importance of network security is growing as more applications move to distributed models and operate over the internet.
This document provides an overview of cryptography. It discusses that cryptography is the practice of secure communication in the presence of others. The purpose of cryptography is to defend against hackers and industrial espionage while securing e-commerce, bank accounts, intellectual property, and avoiding liability. Cryptography provides authentication, privacy, integrity, and non-repudiation. Encryption converts plain text to cipher text using a key while decryption converts cipher text to plain text. Common cryptographic algorithms are secret key cryptography, public key cryptography, and hash functions. Secret key cryptography uses a private key for encryption while public key cryptography uses a public key exchanged over an insecure channel. Hash functions produce a checksum of data. AES encryption is now commonly used and
This document provides an overview of cryptography. It defines cryptography as the science of securing messages from attacks. It discusses basic cryptography terms like plain text, cipher text, encryption, decryption, and keys. It describes symmetric key cryptography, where the same key is used for encryption and decryption, and asymmetric key cryptography, which uses different public and private keys. It also covers traditional cipher techniques like substitution and transposition ciphers. The document concludes by listing some applications of cryptography like e-commerce, secure data, and access control.
Cryptanalysis refers to analyzing encrypted messages to find weaknesses without knowing the encryption key. It involves different types of attacks like known plaintext attacks where the cryptanalyst has samples of plaintext and its encrypted version. The goal of cryptanalysis is to break security systems, while cryptographers aim to develop strong systems. Cryptanalysts use techniques like guessing plaintext to analyze encrypted messages in known plaintext attacks.
Cryptography is used to protect information by encrypting messages into an unreadable cipher text format. Modern cryptography uses either secret key cryptography, which uses a single key for encryption and decryption, or public key cryptography, which uses two mathematically related keys with one key to encrypt and the other to decrypt. The purpose of cryptography and security is to defend against hackers, industrial espionage, and to secure e-commerce, bank accounts, intellectual property, and avoid liability.
Secret writing refers to cryptography and steganography. Cryptography involves encrypting messages so only authorized users can read them, while steganography hides information within other files or mediums. Common cryptographic techniques include symmetric and asymmetric encryption methods. Symmetric encryption uses a shared key between sender and receiver, while asymmetric encryption uses public and private key pairs. Steganography hides information by embedding it within images or other files.
Basic Talk. 90 minute talk to an audience of Freshmen and Sophomores of IIT Bombay on 23/02/10 as a part of Science Week. Organised by Web and Coding Club. Place: GG 101 (Elec Department)
This document provides an overview of cryptography. It begins with background information, defining cryptography as using mathematics to encrypt and decrypt data to enable secure transmission. The main purposes of cryptography are then outlined as authentication, privacy/confidentiality, integrity, and non-repudiation. The methodology section describes symmetric and asymmetric encryption methods. Symmetric encryption uses the same key for encryption and decryption while asymmetric uses mathematically related public/private key pairs. Specific symmetric algorithms like block and stream ciphers are then defined along with concepts like padding schemes. The document concludes with sections on key exchange and digital signatures, which enable practical uses of cryptography.
The document discusses the history and concepts of cryptography, especially in the context of e-commerce. It explains how cryptography evolved from ancient times to modern applications. Symmetric and asymmetric encryption methods are described, including how public/private key pairs work. Digital signatures are introduced as a way to provide authentication, integrity, and non-repudiation for electronic transactions.
Cryptanalysis is the study of encrypted messages to understand encryption systems and find weaknesses. Cryptanalysts aim to decrypt messages without knowing the encryption key or algorithm. Their research helps cryptographers strengthen algorithms. Cryptanalysts uncover design flaws that can reduce the number of keys tested on a message. Their work is used by governments and companies to test security products.
This document provides an overview of cryptography. It begins by defining cryptography as the science of encrypting and decrypting written communications. It then discusses the history of cryptography dating back to ancient Egypt and the Spartans. The document outlines some common cryptosystem services like confidentiality, integrity, and authentication. It also discusses key concepts like keyspace, symmetric and asymmetric encryption algorithms like AES and RSA, and hybrid encryption approaches. The presentation concludes by thanking the audience and offering to answer any questions.
This document discusses cryptography, which is the science of secure communication. It covers the basics of cryptography including its objectives, components, terminology, types, and advantages. Specifically, it explains how cryptography ensures confidentiality, integrity, and authentication of information. It also discusses symmetric and asymmetric encryption methods. Symmetric encryption uses a shared key for encryption and decryption while asymmetric encryption uses public and private key pairs. The document highlights how cryptography provides secure communication methods and is important for both military and everyday applications.
Cryptography is the science of using mathematics to encrypt and decrypt data.
Cryptography enables you to store sensitive information or transmit it across insecure networks so that it cannot be read by anyone except the intended recipient.
This document provides an overview of cryptography. It begins with basic definitions related to cryptography and a brief history of its use from ancient times to modern ciphers. It then describes different types of ciphers like stream ciphers, block ciphers, and public key cryptosystems. It also covers cryptography methods like symmetric and asymmetric algorithms. Common types of attacks on cryptosystems like brute force, chosen ciphertext, and frequency analysis are also discussed.
This document provides an overview of cryptography. It discusses traditional cryptography techniques like the Caesar cipher and shift ciphers. It also explains symmetric and asymmetric key cryptography, giving examples like DES, RSA, and their uses. Cryptographic services like authentication, data integrity, non-repudiation, and confidentiality are mentioned. The document notes how cryptography is widely used today in network security, banking transactions, and military communications.
The document discusses cryptography and its key concepts. It defines cryptography as disguising messages so that only the intended recipient can decipher it. It then discusses various cryptographic techniques like encryption, decryption, cryptanalysis, symmetric ciphers, asymmetric ciphers and algorithms like the Caesar cipher, Vigenere cipher, Playfair cipher, Hill cipher, one-time pad, and Diffie-Hellman key exchange. It provides examples to explain these concepts and techniques in cryptography.
The project presentation discusses a cryptography project for providing security. The objective is to securely send confidential files and documents to recipients using encryption algorithms like MD5, SHA1, and RSA. The proposed system aims to securely transmit data over networks using HTTPS and restrict access to authorized users only. The cryptography system has five modules: administrator, user, cryptic messages, cryptic files, and image transformation to allow various encrypted data transmission. The project will use Java web application architecture like MVC2 for development.
The document provides an overview of cipher techniques including:
- Classical techniques like transposition ciphers, substitution ciphers including the Caesar and Playfair ciphers, and polyalphabetic ciphers like the Vigenere cipher.
- Modern techniques like stream ciphers which encrypt bits one at a time using a pseudorandom keystream, and block ciphers which encrypt blocks of text.
- It also discusses cryptanalysis techniques for analyzing ciphers and discusses how to build more secure systems using techniques like the one-time pad or combining multiple ciphers.
A detailed description about Cryptography explaining the topic from the very basics. Explaining how it all started, and how is it currently being applied in the real world. Mostly useful for students in engineering and mathematics.
Cryptography involves secret writing and encrypting messages so that only authorized parties can read them. It uses algorithms and keys to encrypt plaintext into ciphertext. Cryptanalysis involves breaking ciphers, while cryptography is designing ciphers. Cryptology encompasses both cryptography and cryptanalysis. Common encryption models involve plaintext being encrypted into ciphertext using a key, which is then transmitted and decrypted by the intended receiver using the same key.
Leonardo Da Vinci was born in 1452 in Italy and died in 1519 in France. He was a universal genius known for his expertise in various areas including fine arts, geometry, mechanics, and music. As an apprentice to artist Andrea Verrocchio at age 14, Da Vinci began painting and experimenting with oil paint techniques. In his youth he traveled to Milan and worked on projects for the Duke of Milan, and in his later years he worked independently and for King François I of France. Da Vinci was an incredible inventor who conceived ideas well ahead of his time, including designs for flying machines, parachutes, cranes, irrigation systems, and what would become the modern helicopter. Though some
Imagine is a song by John Lennon about imagining a world without divisions of nation or religion, where all resources are shared in common. The song advocates for a borderless, stateless world of harmony and peace. It encourages listeners to imagine such a world where people live as one brotherhood.
The document discusses Stalin's "Second Revolution" in the Soviet Union in the 1930s. It aimed to 1) build socialism more fully, 2) defend socialism against external and internal threats, and 3) match Lenin's achievements. Stalin's revolution involved economic modernization through industrialization and collectivization, social transformation to create "Homo Sovieticus," and the establishment of a totalitarian one-party state and cult of personality. Key aspects included collectivization of agriculture into kolkhozes, industrialization through five-year plans, and the use of terror through the Great Purge.
This document discusses the development and simulation of a mobile learning application for rubber cultivation in Tripura, India. It proposes using mobile technologies to provide information to rubber growers, dealers, and extension officers in the field. It describes the mobile learning paradigm and advantages of m-learning. It outlines the architecture of the proposed application, including the user repository, content management system, and interfaces for different user types. It also discusses the simulation tools used and provides screenshots of sample application pages. Finally, it describes the database design and provides areas for future development of mobile learning applications.
An extreme wide shot establishes the landscape setting. Medium shots show a character thinking deeply with a distant facial expression, creating tension over what he is thinking about. Costumes and props like wooden gates, fires, and old style clothing help set the time period, while violence, death, and a misty night set tones of danger, action/adventure, and dark atmosphere. Silhouetted characters in the mist create mystery and suspense.
강의10 geriatric neph,htn in the elderly^^leekyubeck
1. Geriatric nephrology is an emerging field due to the increasing elderly population and prevalence of chronic kidney disease in older adults. Older adults often have multiple comorbidities requiring complex medication management to avoid adverse drug reactions.
2. Studies show treating isolated systolic hypertension in adults over 80 reduces mortality, but uncertainties remain regarding exact target blood pressures and how to approach subgroups with different comorbidities or risk of pseudohypertension.
3. Care of older adults with kidney disease requires consideration of geriatric syndromes and balancing dialysis risks against quality of life based on frailty level.
Chaos Based Direct Public Verifiable Signcryption SchemeIOSR Journals
This document proposes and describes a chaos-based direct public verifiable signcryption scheme. It begins with background on chaos theory and how chaotic systems can provide useful properties for cryptography. It then discusses signcryption schemes generally and properties they should satisfy like confidentiality, integrity, and public verifiability. The document proposes a new signcryption scheme that uses a chaotic key generator and the chaotic function f(x) = 3x(1-x^2) to dynamically generate multiple encryption keys, aiming to provide stronger security. It presents the scheme details, including parameters, key generation, and how it can realize single-recipient and multiple-recipient signcryption with public verifiability. The scheme is then analyzed for
Cryptography originated from Greek words meaning "hidden writing". It involves concealing messages to add secrecy. The earliest techniques include hieroglyphs used by Egyptians and simple substitution ciphers later. Modern cryptography is based on mathematical concepts like number theory and relies on publicly known algorithms rather than secrecy. It aims to provide confidentiality, data integrity, authentication, and non-repudiation. Cryptography tools include encryption, hash functions, message authentication codes, and digital signatures. A cryptosystem uses algorithms, keys, and infrastructure to encrypt plaintext into ciphertext and decrypt it back using the same or related keys. Cryptosystems can be symmetric, using one key, or asymmetric, using separate keys.
This document presents a seminar on cryptography. It begins with an introduction to cryptography and its purpose in ensuring confidentiality, integrity and accuracy of communications. It then defines cryptography and discusses secret key cryptography which uses a single shared key for encryption and decryption, and public key cryptography which uses separate public and private keys. The document outlines the architecture and process of cryptography, along with common cryptographic algorithms like symmetric and asymmetric key cryptography and hash functions. It also discusses different types of attacks on cryptography like cipher text only and chosen plaintext attacks. The conclusion emphasizes using the appropriate cryptographic algorithm according to the requirements for security and speed of message transmission.
This document discusses ethical hacking and penetration testing. It begins by defining ethical hacking as using the same tools and techniques as hackers, but legally in order to test an organization's security. It then covers the history of ethical hacking. The rest of the document outlines the methodology of hacking including reconnaissance, scanning, gaining access, maintaining access, and clearing tracks. It discusses the types of hackers and tools used in ethical hacking. The document concludes by discussing the advantages and disadvantages of ethical hacking.
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHYAsia Smith
This document discusses cryptography and steganography techniques for securing communications. It defines cryptography as encoding messages to disguise their meaning and steganography as hiding messages within other files to conceal their existence. The document proposes combining these methods by encrypting a message with cryptography and then hiding the encrypted output in a file like an image using steganography. This provides two layers of security that are harder for attackers to breach than a single technique alone. The document also compares and contrasts cryptography and steganography, discusses different types of each technique, and analyzes the benefits of an integrated cryptographic-steganographic approach to security.
This document provides an overview of cryptography. It begins with defining cryptography as the practice of hiding information and discusses its purposes, including authentication, privacy, integrity, and non-repudiation. It then describes the basic architecture and types of cryptography, including secret key cryptography, public key cryptography, and hash functions. The document outlines the process of cryptography and different algorithm types, including public/private key cryptography and hash functions. It concludes by discussing different types of attacks on cryptography and thanking the audience.
This document provides an overview of cryptography. It begins with defining cryptography as the practice of hiding information and discusses its purposes, including authentication, privacy, integrity, and non-repudiation. It then describes the basic architecture and types of cryptography, including secret key cryptography, public key cryptography, and hash functions. The document outlines the process of cryptography and different algorithm types, including public/private key cryptography and hash functions. It concludes by discussing different types of attacks on cryptography and thanking the audience.
Presentationon ON THE TOPIC CRYPTOGRAPHYBARATH800940
This document provides an overview of cryptography. It begins with defining cryptography as the practice of hiding information and discusses its purposes, including authentication, privacy, integrity, and non-repudiation. It then describes the basic architecture and types of cryptography, including secret key cryptography, public key cryptography, and hash functions. The document outlines the process of cryptography and different algorithm types, including public/private key cryptography and hash functions. It concludes by discussing different types of attacks on cryptography and thanking the audience.
This document discusses cryptography in GSM networks. It provides background on common security requirements and introduces cryptography techniques like symmetric-key cryptography, public-key cryptography, and cryptographic hashes. It then discusses cryptography specifically used in GSM networks, including the A5/1 and A5/3 algorithms used for encryption. It notes issues with the security of these algorithms and proposes improving GSM network security.
This document discusses data encryption and digital signatures. It defines encryption as disguising information so that only those with the key can access it. There are two main types of encryption - symmetric which uses the same key for encryption and decryption, and asymmetric which uses different keys. Encryption methods include transposition, which rearranges bits or characters, and substitution, which replaces bits or characters. Popular algorithms discussed are DES, RSA, and digital signatures. Digital signatures authenticate the sender, ensure the message isn't altered, and can be used to sign documents and verify certificates from certificate authorities.
This document discusses the topic of computer hacking. It begins by defining hacking and discussing the different types of hackers, including white hat, black hat, and gray hat hackers. It then covers hacking techniques such as port scanning, social engineering, and brute force attacks. The document provides an overview of how hackers operate and highlights both advantages and disadvantages of hacking.
This document provides an overview of cryptography. It defines cryptography as the practice of hiding information and discusses its purposes, including authentication, privacy, integrity, and non-repudiation. The document outlines the basic architecture of cryptography, including secret key cryptography, public key cryptography, hash functions, and types of cryptographic attacks. It describes the processes of public/private key cryptography and different types of cryptographic algorithms.
This document summarizes a research paper that proposes using a hybrid genetic algorithm approach for data encryption. The system uses several modules: image steganography to hide data in images, image merging to combine encrypted images, musical encryption to encrypt data using musical patterns determined by a genetic algorithm, and a genetic algorithm module. The encryption process hides data in multiple files for stronger security. Decryption recovers the hidden data. The hybrid approach aims to provide stronger encryption that is more difficult to crack than existing algorithms.
This document provides a survey of metamorphic cryptography techniques. It begins with an introduction to cryptography and steganography individually, explaining how cryptography encrypts messages and steganography hides messages. It then discusses the benefits of combining these approaches in metamorphic cryptography, including providing multiple layers of security. Two examples of metamorphic cryptography techniques are described: one using static parsing steganography to hide bits of a secret message in cover image pixels, and another combining AES encryption with discrete cosine transform to hide encrypted text in an image. The document concludes that non-metamorphic approaches are less secure because they rely on single methodologies and simpler encoding algorithms.
The Comprehensive Security Policy In The Trojan WarMandy Cross
The document discusses some of the major types of social engineering attacks, including watering holing, whaling, pretexting, and baiting. It emphasizes that social engineering attacks require the same security measures as other types of attacks, such as identifying assets, enabling email security features, managing access controls, conducting user training, and developing incident response plans. Prevention is key to mitigating social engineering attacks.
Traditionally, "Cryptography" is a benediction to information processing and communications, it helps people to store information securely and the private communications over long distances. Cryptovirology is the study of applications of cryptography to build the malicious software. It is an investigation, how modern cryptographic tools and paradigms can be used to strengthen, develop and improve new malicious software attacks. Cryptovirology attacks have been categorized as : give malware enhanced privacy and be more robust against reverse-engineering, secondly give the attacker enhanced anonymity while communicating with deployed malware. This paper presents the idea of ``Cryptovirology'' which introduce a twist on how cryptography can also be used offensively. Being offensive means, it can be used to mount extortion based attacks that cause loss of access to information, loss of confidentiality, and information leakage, tasks which cryptography usually prevents. Also analyze threats and attacks that misuse of cryptography can cause when combined with fraudulent software (viruses, Trojans). Public-key cryptography is very essential for the attacks that based on cryptovirology. This paper also suggest some of the countermeasures, mechanisms to cope with and prevent such attacks. Even if the attackers actions on the host machine are being monitored, it still cannot be proven beyond reasonable doubt that he or she is the attacker; and it is an “originator-concealing attack”. Evidence should be collected from the “author’s own system which was used for the attack”. These attacks have implications on how the use of
cryptographic tools and techniques should be audited and managed in general purpose computing environments, and imply that access to the cryptographic tools should be in well control of the system(such as API routines). The experimental virus would demonstrate how cryptographic packages can be packed into a small space, which may have independent existence. These are many powerful attacks, where the attacker can encrypt the victim’s data for ransom and release it after hostage.
This document provides an overview of cryptography. Cryptography is the practice of hiding information to ensure confidentiality, integrity, and authentication. There are two main types: secret key cryptography which uses a single key for encryption and decryption, and public key cryptography which uses separate public and private keys. Popular cryptographic algorithms include RSA and hash functions. Cryptography aims to provide security against common attacks such as ciphertext-only attacks.
Identity theft through keyloggers has become very popular the last years. One of the most common ways to intercept and steal victim's data are to use a keylogger that transfers data back to the attacker. Covert keyloggers exist either as hardware or software. In the former case they are introduced as devices that can be attached to a computer (e.g. USB sticks), while in the latter case they try to stay invisible and undetectable as a software in the operating system. Writing a static keylogger which operates locally in victim's machine is not very complex. In contrast, the creation of covert communication between the attacker and the victim, and still remain undetectable is more sophisticated. In such a scenario we have to define how data can be delivered to the attacker and how we can make an efficient use of the channel that transfers the information over the network in order to stay undetectable. In this paper we propose a system based on Steganography that takes advantage of a seemingly innocuous Social Network (Tumblr) in order to avoid direct communication between the victim and the attacker. A core part of this study is the security analysis which is also discussed by presenting experimental results of the system and describing issues regarding surveillance resistance of the system as well as limitations.
Cryptographic Algorithms For Secure Data CommunicationCSCJournals
Personal privacy is of utmost importance in the global networked world. One of the best tools to help people safeguard their personal information is the use of cryptography. In this paper we present new cryptographic algorithms that employ the use of asymmetric keys. The proposed algorithms encipher message into nonlinear equations using public key and decipher by the intended party using private key. If a third party intercepted the message, it will be difficult to decipher it due to the multilevel ciphers of the proposed application.
The document discusses developing an embedded system kernel project. It explains that a kernel manages processes, memory, and communication between hardware and processes. While developing one's own kernel allows for full control, it is also very time intensive. Alternatives like FreeRTOS are discussed. The document also covers the differences between monolithic and micro kernels. It states that this project will use a non-preemptive, cooperative microkernel that schedules processes and does not include memory management.
This document provides an overview of a workshop on embedded system design that covers topics ranging from electronics to microkernel development. The workshop schedule includes sessions on electronic building, board programming, and kernel development. Specific topics within the electronics building section include a review of electronics concepts, schematics, prototyping boards, system design procedures, microcontrollers, LCD displays, and potentiometers. The board programming section will cover programmers, integrated development environments, basic programming concepts, and examples. The final section on kernel development does not provide any details.
O documento discute as diferentes engenharias existentes, listando as principais engenharias de acordo com o INEP e o Crea. O INEP lista 218 engenharias, incluindo engenharia mecânica, elétrica, civil, produção e computação. O Crea lista 88 engenharias, incluindo engenheiro civil, elétrico, mecânico, de produção, químico e de minas. O documento também descreve as competências gerais de um engenheiro.
Troca de contexto segura em sistemas operacionais embarcados utilizando de té...Rodrigo Almeida
A segurança e a confiabilidade em sistemas embarcados são áreas críticas e de recente desenvolvimento. Além das complicações inerentes à área de segurança, existem restrições quanto a capacidade de processamento e de armazenamento destes sistemas. Isto é agravado em sistemas de baixo custo. Neste trabalho, é apresentada uma técnica que, aplicada à troca de contexto em sistemas operacionais, aumentando a segurança destes. A técnica é baseada na detecção e correção de erros em sequência de valores binários. Para realização dos testes, foi desenvolvido um sistema operacional de tempo real e implementado numa placa de desenvolvimento. Observou-se que o consumo de processamento das técnicas de detecção de erro são inferiores às de correção, cerca de 2% para CRC e 8% para Hamming. Objetivando-se minimizar o tempo de processamento optou-se por uma abordagem mista entre correção e detecção. Esta abordagem reduz o consumo de processamento medida que os processos que exigem tempo real apresentem uma baixa taxa de execução, quando comparados com o período de troca de contexto. Por fim, fica comprovada a possibilidade de implementação desta técnica em qualquer sistema embarcado, inclusive em processadores de baixo custo.
Troca de contexto segura em sistemas operacionais embarcados utilizando técni...Rodrigo Almeida
A segurança e a confiabilidade em sistemas embarcados são áreas críticas e de recente desenvolvimento. Além das complicações inerentes à área de segurança, existem restrições quanto a capacidade de processamento e de armazenamento destes sistemas. Isto é agravado em sistemas de baixo custo. Neste trabalho, é apresentada uma técnica que, aplicada à troca de contexto em sistemas operacionais, aumentando a segurança destes. A técnica é baseada na detecção e correção de erros em sequência de valores binários. Para realização dos testes, foi desenvolvido um sistema operacional de tempo real e implementado numa placa de desenvolvimento. Observou-se que o consumo de processamento das técnicas de detecção de erro são inferiores às de correção, cerca de 2% para CRC e 8% para Hamming. Objetivando-se minimizar o tempo de processamento optou-se por uma abordagem mista entre correção e detecção. Esta abordagem reduz o consumo de processamento medida que os processos que exigem tempo real apresentem uma baixa taxa de execução, quando comparados com o período de troca de contexto. Por fim, fica comprovada a possibilidade de implementação desta técnica em qualquer sistema embarcado, inclusive em processadores de baixo custo.
Troca de contexto segura em sistemas operacionais embarcados utilizando técni...Rodrigo Almeida
A segurança e a confiabilidade em sistemas embarcados são áreas criticas e de recente desenvolvimento. Além das complicações inerentes a área de segurança, existem restrições quanto a capacidade de processamento e de armazenamento destes sistemas. Isto é agravado em sistemas de baixo custo. Neste trabalho é apresentada uma técnica que, aplicada à troca de contexto em sistemas operacionais, aumenta a segurança destes. A técnica é baseada na detecção e correção de erros em sequência de valores binários. Para realização dos testes foi desenvolvido um sistema operacional de tempo real e implementado numa placa de desenvolvimento. Observou-se que o consumo de processamento das técnicas de detecção de erro são inferiores às de correção, cerca de 2\% para CRC e 8\% para Hamming. Objetivando-se minimizar o tempo de processamento optou-se por uma abordagem mista entre correção e detecção. Esta abordagem se mostrou mais interessante a medida que os processos que exijam tempo real apresentem uma baixa taxa de execução, quando comparados com o período de troca de contexto. Por fim, fica comprovada a possibilidade de implementação desta técnica em qualquer sistema embarcado, inclusive em processadores de baixo custo.
O documento descreve uma controladora de drivers para gerenciar drivers de dispositivos de forma padronizada. A controladora inicializa e mantém os drivers carregados, armazenando informações sobre eles. Ela funciona como uma camada de segurança entre o kernel e os drivers, evitando comandos incorretos. A controladora também suporta callbacks para que drivers possam registrar funções a serem chamadas assincronamente, como em interrupções.
Desenvolvimento de drivers para sistemas embarcadosRodrigo Almeida
Este documento discute:
1. Sistemas em tempo real e seus requisitos temporais, como garantir a periodicidade de tarefas e determinismo.
2. Como implementar um sistema que trabalhe com requisitos temporais, necessitando de um relógio preciso, informar a frequência de cada processo e garantir que os tempos de execução cabem no tempo disponível.
3. A criação de drivers para dispositivos, como o driver para LCD utilizando funções de inicialização, escrita e acesso.
O documento descreve um exemplo de kernel cooperativo para gerenciar processos em um sistema embarcado. O kernel implementa um buffer circular para armazenar os processos, funções para adicionar e remover processos, e um loop infinito que executa os processos de forma cooperativa, reagendando aqueles que precisam ser executados repetidamente. O exercício propõe adaptar o código para a placa e testar o reagendamento e execução de processos que acionam saídas digitais.
O documento descreve um sistema de processos cooperativos implementado através de um buffer circular. O buffer armazena estruturas de processo contendo um ponteiro de função a ser executada. Há funções para adicionar, remover e executar processos no buffer mantendo a ordem de inserção.
O documento descreve um exercício para implementar um buffer circular para armazenar estruturas contendo ponteiros de função. O objetivo é permitir que funções sejam adicionadas ao buffer e executadas via chamada à função apontada pelo ponteiro de função armazenado.
O documento descreve conceitos sobre ponteiros, structs e buffers circulares em C. Especificamente, apresenta: 1) como ponteiros armazenam endereços de memória e apontam para variáveis; 2) como structs agrupam variáveis de diferentes tipos; e 3) como buffers circulares implementam filas FIFO usando um vetor com ponteiros de início e fim.
Introdução aos sistemas operacionais embarcadosRodrigo Almeida
O documento discute sistemas operacionais embarcados, apresentando o cronograma do curso e considerações sobre projeto de kernels, incluindo vantagens e desvantagens de desenvolver seu próprio kernel versus utilizar alternativas existentes. É apresentado o microcontrolador KL02 da Freescale e discutidas alternativas como Windows Embedded Compact, VxWorks, FreeRTOS e decisões importantes no projeto de kernels.
Segurança de sistemas: invasões, engenharia reversa e análise de virusRodrigo Almeida
Este documento resume conceitos sobre invasão de sistemas computacionais, incluindo exemplos de ataques como Stuxnet e SQL injection. Ele discute vulnerabilidades, métodos de ataque ativos e passivos, e técnicas de engenharia reversa para acessar portas seriais. O documento também fornece fontes de informação sobre segurança cibernética.
Este documento descreve protocolos de comunicação serial, incluindo I2C, RS232 e LCD. Ele fornece detalhes sobre como implementar comunicação I2C, como criar uma biblioteca I2C e rotinas para escrita e leitura de bytes. Além disso, explica como enviar dados e comandos para um display LCD.
O documento discute três tópicos principais: 1) leitura de teclas e problemas de bouncing, resolvidos por hardware ou software; 2) leitura matricial de teclado; 3) exibição em display LCD, incluindo conexões, comandos e biblioteca de controle.
O documento discute técnicas de leitura de teclas e teclados matriciais, incluindo displays de 7 segmentos multiplexados, debounce de teclas e leitura matricial.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Cryptology - Antônio Lacerda
1. I Workshop Interamericano de
Segurança de Software e Hardware
em Metrologia Legal
Antônio Lacerda
Researcher – Inmetro
Cryptology
2. I Workshop Interamericano de
Segurança de Software e Hardware
em Metrologia Legal
Antônio Lacerda
Inmetro's Researcher
Cryptography used to be an obscure science, of little relevance to
everyday life. Historically, it always had a special role in military and
diplomatic communications.
It's time for cryptography to step out of the shadows of spies and the
military, and step into the sunshine and be embraced by the rest of us.
(The Code Book, Simon Singh)
3. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Emitter Receiver
Communication
Channel
Normal Flow of Communication
4. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
What is Cryptology?
5. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Cryptology is the science whose goal is to protect
communication against intentional and not allowed
interferences.
Cryptology is supported by several other areas: mathematics,
computer science, physics, psychologhy, philolgy etc.
Is Cryptology a branch of mathematics? I disagree!
6. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Cryptology is a new old science!
Old because it is a millennial science.
In fact, “protection of sensitive information is a desire reaching
back to the beginnings of human culture” (Otto Horak).
New because the first time we saw an announced lecture series
under the open title “Cryptology” took place in German in 1981.
Before this, the few ones took place under the name “Special
Problems of Information Theory”.
7. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Cryptology is divided in two (or four) subareas:
- Cryptography (and its counterparty: cryptanalysis)
- Steganography (and its counterparty: steganalysis)
From Greek:
- kryptos = hidden
- steganos = covered
8. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Cryptography aims to protect the communication in a insecure
channel.
Emitter Receiver
Insecure Communication
Channel
Cryptanalisys aims to break the cryptography.
9. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Steganography aims to protect the existence of the
communication.
Emitter Receiver
Communication
Channel
Steganalisys aims to break the steganography and to discover
the existence of the communication.
10. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Cryptography: overt secret writing
Steganography: covert secret writing
12. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
What is steganography?
Part of Cryptology involving knowledge and techniques to hide
or to camouflage a message inside another.
13. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Steganography
Steganography
14. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Steganography by kids:
Inglourious Bastards
Notting Hill
Mission: Impossible
Edward Scissorhands
True Lies
Raiders of the Lost Ark
October Sky
15. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Steganography by kids:
Inglourious Bastards
Notting Hill
Mission: Impossible
Edward Scissorhands
True Lies
Raiders of the Lost Ark
October Sky
16. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Ancient steganography:
- Tattooed messages on head of messengers.
- Messages in stomach of hunted animals.
- Messages on wood logs covered with wax.
17. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Modern steganography:
- Invisible inks.
- Microdots.
- LSB (Least Significant Bit).
- Covert channels.
18. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Modern steganography: Invisible ink
20. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
What is cryptography?
Part of cryptology involving knowledge and techniques to
transform information in its original form into an illegible form,
so that only the emitter and receiver can access the original
content by using a secret.
21. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Services provided by Cryptography:
- Confidentiality: To allow access only to authorized people.
- Integrity: To assure that the content of the message was not
modified.
- Authenticity: To assure that the emitter and receiver are who
they claim they are.
- Non-repudiation (non-retractability): The emitter cannot deny
he is the message sender.
22. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Attention
There isn't an algorithm that is capable to provide all
cryptographic services. For each service, you will need one or
more algorithms.
23. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Attacks to communication
24. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Emitter Receiver
Communication
Channel
Again: Normal Flow of Communication
Every modification in normal flow not allowed by emitter or
receiver is an attack.
25. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Interception
The attacker has access to the content of the message.
Interception is an attack against confidentiality.
Emitter Receiver
Attacker
26. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Modification
The attacker has access to the content of the message,
furthermore he/she modify the content of the message.
Modification is an attack against integrity.
Emitter Receiver
Attacker
27. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Fabrication
The attacker yields a message and send it to the receiver,
inserting counterfeit data.
Fabrication is an attack against authenticity.
Emitter Receiver
Attacker
28. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Interruption
The attacker interrupts the communication.
Interruption is an attack against availability.
Cryptology is useless in this case!
Emitter Receiver
Attacker
30. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Modification
The attacker has access to the content of the message,
furthermore he/she modify the content of the message.
Modification is an attack against integrity.
Emitter Receiver
Attacker
31. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
How to guarantee the integrity of a message against intentional
modification? Answer: Hash Function.
Integrity
32. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
In Portuguese:
Substantivo
1 - Prato feito de carne moída
misturada com batata assada
ou frita.
2 - Bagunça, confusão.
Verbo
1 - Cortar em pequenos
pedaços.
2 - Misturar, confundir.
What does “hash” means?
In English:
Noun
1 - A dish of chopped meat,
potatoes, and sometimes
vegetables, usually browned.
2 - Mess, confusion.
Verb
1 - To chop into pieces.
2 - To mix or mess up
33. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
In Portuguese:
função de confusão (strange!)
função de dispersão (it sounds better!)
função hash (it's more common.)
So what does “hash function” means?
34. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
It receives as input a sequence of bits, of any size (can be a
character, a string, or even a file) and generates another
sequence of bits of fixed length, called hash or digest.
The digest works as a security seal, because a simple change
in one of the input bits completely changes the original
digest.
A hash function is a one-way function. That is, it's not
possible to recover the original message from the digest.
Hash Function
35. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Nonsense!?
If the original data can not be recovered from the digest, then
why use hash functions?
Although it seems contradictory, it's exactly because this
feature that hash functions are so useful.
Hash Function
36. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
MD5 (Message-Digest algorithm 5): Algorithm of 128 bits
developd in 1991 by Ron Rivest.
SHA (Secure Hash Algorithm): A family of algorithms
developed by NIST and NSA.
Whirlpool: Algorithm developed by Paulo Barreto (USP) and
Vincent Rijmen (co-author of AES).
Some very known Hash Functions
37. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
MD5("Inmetro") = 0101001111101001000011010111000
101011110001000000101100110100010111100101111100
0010101110010100111000111010110011001001001010100
MD5("inmetro") = 0101101100110000101010010001100
110110111001001111101000011110000100110100000011
1100110101000000001100100101111011111100000010110
An example with MD5
38. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Bits 001-032: 0101.0011.1110.1001.0000.1101.0111.0001
Bits 001-032: 0101.1011.0011.0000.1010.1001.0001.1001
Bits 033-064: 0101.1110.0010.0000.0101.1001.1010.0010
Bits 033-064: 1011.0111.0010.0111.1101.0000.1111.0000
Bits 065-096: 1111.0010.1111.1000.0101.0111.0010.1001
Bits 065-096: 1001.1010.0000.0111.1001.1010.1000.0000
Bits 097-128: 1100.0111.0101.1001.1001.0010.0101.0100
Bits 097-128: 0110.0100.1011.1101.1111.1000.0001.0110
Result: 59 bits changed. 46% of bits affected. (Avalanche
Effect)
An example with MD5
40. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Interception
The attacker has access to the content of the message.
Interception is an attack against confidentiality.
Emitter Receiver
Attacker
41. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Confidentiality was the first service provided by Cryptology.
It can be reached by ciphers and codes.
Confidentiality
42. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Contrary to layman's perception, code and cipher are not
synonymous.
Cipher is a manipulation in the representation of the message.
Code is a manipulation in the meaning of the message.
Cipher X Code
43. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Confidentiality
by Code
44. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Replace each word or phrase in the original message with
another character or symbol (or a set of them).
The list of replacements is contained in a codebook.
Code is not flexible. If a codebook is leaked, then the emitter
and receiver must re-writing the entire codebook.
Code
45. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Morse code
NATO phonetic code
Q code
Bar code
QR code
Examples of Public Codes
46. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Famous example: Zimmermann Telegram
Arthur Zimmermann, State
Secretary for Foreign Affairs of
the German Empire, sent a
telegram to the German
ambassador in Mexico, asking
him to propose an alliance to
Mexico's president to attack the
USA.
The aim was to force the USA to
the World War I.
47. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Famous example: Zimmermann Telegram
The telegram is not ciphered; it is coded.
48. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Famous example: Zimmermann Telegram
49. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
The Zimmermann telegram was decoded by famous “Room 40”.
Room 40
↓
Government Code and Cypher School (GC&CS)
↓
Government Communications Headquarters (GCHQ)
51. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Confidentiality
by Cipher
52. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Imagine you have a message well represented. Then you
“mess” this representation in a pre-defined mean that permit
you recover the message in its original representation.
The pre-defined mean is called algorithm. Another input to this
algorithm is the key.
The key is the flexible part of a cipher.
Cipher
53. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Remember: Code is not flexible. If a codebook is leaked, then
the emitter and receiver must re-writing the entire codebook.
If a cipher key is leaked, then emitter and receiver must choose
another key without changing the algorithm.
Cipher X Code
58. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Actor Action Input
Emitter
cipher key
code codebook
Receiver
decipher key
decode codebook
Attacker cryptanalyze (or break) - - -
Encrypt = cipher or code.
Decrypt = decipher or decode.
59. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Substitution Cipher
60. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Example
original: i n m e t r o
ciphered: L Q P H W U R
Caesar Cipher (Substitution Cipher)
61. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Example 1:
key: i n m e t r o i n m e t r o i n
original: w e w e r e d i s c o v e r e d
ciphered: E R I I K V R Q F O S O V F M Q
Example 2:
key: d i m e l d i m e l d i m e l d
original: w e w e r e d i s c o v e r e d
ciphered: Z M I I C H L U W N R D Q V P G
Vigenere Cipher (Substitution Cipher)
63. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Vigenere Cipher (Substitution Cipher)
For a layman, the Vigenere cipher seems unbreakable.
In fact, an article in Scientific American, in 1917, considered the
Vigenere cipher impossible to be broken.
Now, less than a century later, Vigenere cipher is completely
breakable.
64. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Transposition Cipher
65. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
original:
we recovered the money, but we lost two men.
key: i n m e t r o
columns: w e r e c o v
e r e d t h e
m o n e y b u
t w e l o s t
t w o m e n z
ciphered: edelm wemtt reneo eroww veutz ohbsn ctyoe
Transposition Cipher
66. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Substitution and Transposition
to reach
Diffusion and Confusion
Apply many rounds of substitution and transposition to reach
diffusion and confusion.
Diffusion and confusion: two
concepts introduced by
Claude Shannon.
67. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Diffusion and Confusion
Confusion
Formal: It refers to making the relationship between the
ciphered message and the symmetric key as complex and
involved as possible.
Informal: It obscures the relationship between the original
message and ciphered message.
Diffusion
Formal: It refers to dissipating the statistical structure of
original message over bulk of ciphered message.
Informal: Each change in the original message or key affects
many parts of the ciphered message. (Avalanche Effect)
68. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Cryptography – Conventional Model
emitter receivercipher decipher
key
source
secure channel
attacker
M MC C
K K
69. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Conventional Model
The same key used to cipher the message must be used to
decipher. Because of this, the conventional model was called
symmetric cryptography.
Then we have the first problem, the emitter and the receiver
must agree which key will be used.
If there is the possibility of personal and physical meeting,
sharing the key can be safely performed. But the secure
channel always was the weakest part.
Is another way of cryptography possible?
70. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Conventional Model
Is another way of cryptography possible? Is there an
asymmetric cryptography?
The response to this question became the Holy Grail of
Cryptology.
The scientific community had given up looking for this
response, classifying the problem as unsolvable.
Only fools would insist on such nonsense.
71. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
“The Fools”
Ralph Mekle – Martin Hellman – Whitfield Diffie
72. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
“The Fools”
Whitfield Diffie – Martin Hellman
73. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
The New Model
In 1976, Diffie and Hellman published their famous article “New
Directions in Cryptography”.
The article begins with “We stand today on the brink of a
revolution in cryptography”.
74. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
The New Model
The article deals with three problems:
- key exchange
- asymmetric cryptography
- digital signature
But the article presents solution only for the key exchange
problem.
Diffie and Hellman couldn't solve the other two problems.
But it doesn't matter! They broke the paradigm!
75. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
The New Model
They couldn't open the door, but they pointed the right door.
In fact, the two problems were resolved one year later, in 1977.
76. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
The RSA arises!
Shamir – Rivest – Adleman
77. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Asymmetric Cryptography
Since the beginning of Cryptology to modern times, almost all
cryptographic systems had been based on elementary tools of
substitution and permutation.
Asymmetric cryptography has changed this paradigm, because
it's based on mathematical functions.
78. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Asymmetric Cryptography
Diffie and Hellman algorithm has its strength based on the
difficulty to solve the discrete logarithm problem (DLP).
Whilst RSA algorithm has its strength based on the difficulty to
factorize big numbers.
Wait a moment! Why are those problems so difficult?
79. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Computational Complexity
In computer science we use techniques to predict how much
time a problem will take.
These main terms are used to express time growth:
Logarithmic growth
Linear growth
Polynomial growth
Exponencial growth
So the DLP and factorization of big numbers are examples of
exponential growth.
80. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Asymmetric Cryptography – Confidentiality
emitter receivercipher decipher
key
source
attacker
M C MC
Kpub Kpri
81. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Asymmetric Cryptography – Non-repudiation
emitter receivercipher decipher
key
source
attacker
M C MC
Kpri Kpub
M
82. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Asymmetric Cryptography – Non-repudiation
emitter receivercipher decipher
key
source
attacker
M C MC
Kpri Kpub
M
This is the basis for Digital Signature.
83. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Why the conventional model does not provide
non-repudiation?
emitter receivercipher decipher
key
source
secure channel
attacker
M MC C
K K
84. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Why the conventional model does not provide
non-repudiation?
emitter receivercipher decipher
key
source
secure channel
attacker
M MC C
K K
It provides protection against third party
forgeries, but do not protect against
contests between transmitter and receiver.
85. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Confidentiality X Authentication
Only with private/public key schemes is possible to solve the
problem of dispute between transmitter and receiver.
In fact, without asymmetric cryptography the electronic
commerce would not exist.
“The problem of authentication is perhaps an even more
serious barrier to the universal adoption of telecomrnunications
for business transactions than the problem of key distribution.
Authentication is at the heart of any system involving contracts
and billing. Without it, business cannot function.” (DH, New
Directions in Cryptography)
87. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
first common mistake
1) Asymmetric cryptography is safer than symmetric
cryptography.
The security of any cryptographic scheme depends on the size
of the key and the computational work involved to break the
cipher.
88. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
second common mistake
2) Asymmetric cryptography made symmetric cryptography
obsolete.
Due to the computational overhead of asymmetric cryptography,
symmetric cryptography is still far from becoming obsolete.
90. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Digital Signature
Digital signature is the apex of asymmetric cryptography.
It is the most refined service provided by modern cryptology.
91. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Asymmetric Cryptography – Non-repudiation
emitter receivercipher decipher
key
source
attacker
M C MC
Kpri Kpub
M
This is the basis for Digital Signature.
92. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Digital Signature
signer
verifiercipher decipher
key
source
attackerM
C HC
Kpri Kpub
Hash
H
Hash
H'
M M'
93. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Cryptology at Inmetro
94. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Cryptology at Inmetro
Cryptology at Inmetro is in its beginning.
The group for security of software and hardware in measuring
instruments is new.
We foresee to use cryptology in many applications.
95. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
The Two Biggest Problems
96. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Second Big Problem
Brazil is a huge country!
More than 70 million electric energy measuring instruments in
the field.
How to control the software version in this kind of instrument in
the field?
97. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Second Big Problem
Brazil is a huge country!
More than 70 million electric energy measuring instruments in
the field.
How to control the software version in this kind of instrument in
the field?
Solution devised by Inmetro: Digital Signature of the binary file
corresponding to the approved software version.
98. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
ACryptology at Inmetro
99. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
First Big Problem
Brazil has more than 200.000 fuel dispensers.
A lot of frauds.
How to protect fuel dispensers against frauds?
100. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
First Big Problem
Brazil has more than 200.000 of fuel dispensers.
A lot of frauds.
How to protect fuel dispensers against frauds?
Solution devised by Inmetro: Digital Signature of measuring
data for each output.
101. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Questions to answer
102. I Workshop Interamericano de
Segurança de Software e
Hardware em Metrologia Legal
Shall we build a peculiar PKI (Public Key Infrastructure): a
metrological PKI?
If so, then must Inmetro be the TTD (Trusted Third Party)?
Can we associate cryptographic levels to risk levels?
Can we simplify the process of Digital Signature?