Search results for: asymmetric key cryptography
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 356

Search results for: asymmetric key cryptography

326 Torsional Design Method of Asymmetric and Irregular Building under Horizontal Earthquake Action

Authors: Radhwane Boudjelthia

Abstract:

Based upon elaborate analysis on torsional design methods of asymmetric and irregular structure under horizontal earthquake action, it points out that the main design principles of an asymmetric building subjected to horizontal earthquake are: the torsion of vertical members induced by the torsion angle of the floor (rigid diaphragm) cannot exceed the allowable value, the inter-story displacement at outermost frame or shear wall should be less than that required by design code, stresses in plane of the slab should be controlled within acceptable extent under different intensity earthquakes. That current seismic design code only utilizes the torsion displacement ratio to control the floor torsion, which seems not reasonable enough since its connotation is the multiple of the floor torsion angle and the distance of floor mass center to the edge frame or shear wall.

Keywords: earthquake, building, seismic forces, displacement, resonance, response

Procedia PDF Downloads 319
325 Nonreciprocal Optical Effects in Plasmonic Nanoparticle Aggregates

Authors: Ward Brullot, Thierry Verbiest

Abstract:

Nonreciprocal optical effects, such as Faraday rotation or magnetic circular dichroism, are very useful both for fundamental studies as for applications such as magnetic field sensors or optical isolators. In this study, we developed layer-by-layer deposited 20nm thick plasmonic nanoparticle aggregates consisting of gold, silver and magnetite nanoparticles that show broadband nonreciprocal asymmetric transmission. As such, the optical transmittance, or absorbance, depends on the direction of light propagation in the material, which means that looking from one direction or the other, more or less light passes through the sample. Theoretical analysis showed that strong electric quadrupole fields, which are electric field gradients, occur in the aggregates and that these quadrupole fields are responsible for the observed asymmetric transmission and the nonreciprocity of the effect. Apart from nonreciprocal asymmetric transmission, also other effects such as, but not limited to, optical rotation, circular dichroism or nonlinear optical responses were measured in the plasmonic nanoparticle aggregates and the influences of the intense electric quadrupole fields determined. In conclusion, the presence of strong electric quadrupole fields make the developed plasmonic nanoparticle aggregates ideal candidates for the study and application of various nonreciprocal optical effects.

Keywords: asymmetric transmission, electric quadrupoles, nanoparticle aggregates, nonreciprocity

Procedia PDF Downloads 397
324 Double Encrypted Data Communication Using Cryptography and Steganography

Authors: Adine Barett, Jermel Watson, Anteneh Girma, Kacem Thabet

Abstract:

In information security, secure communication of data across networks has always been a problem at the forefront. Transfer of information across networks is susceptible to being exploited by attackers engaging in malicious activity. In this paper, we leverage steganography and cryptography to create a layered security solution to protect the information being transmitted. The first layer of security leverages crypto- graphic techniques to scramble the information so that it cannot be deciphered even if the steganography-based layer is compromised. The second layer of security relies on steganography to disguise the encrypted in- formation so that it cannot be seen. We consider three cryptographic cipher methods in the cryptography layer, namely, Playfair cipher, Blowfish cipher, and Hills cipher. Then, the encrypted message is passed through the least significant bit (LSB) to the steganography algorithm for further encryption. Both encryption approaches are combined efficiently to help secure information in transit over a network. This multi-layered encryption is a solution that will benefit cloud platforms, social media platforms and networks that regularly transfer private information such as banks and insurance companies.

Keywords: cryptography, steganography, layered security, Cipher, encryption

Procedia PDF Downloads 57
323 A Lightweight Authentication and Key Exchange Protocol Design for Smart Homes

Authors: Zhifu Li, Lei Li, Wanting Zhou, Yuanhang He

Abstract:

This paper proposed a lightweight certificate-less authentication and key exchange protocol (Light-CL-PKC) based on elliptic curve cryptography and the Chinese Remainder Theorem for smart home scenarios. Light-CL-PKC can efficiently reduce the computational cost of both sides of authentication by forgoing time-consuming bilinear pair operations and making full use of point-addition and point-multiplication operations on elliptic curves. The authentication and key exchange processes in this system are also completed in a a single round of communication between the two parties. The analysis result demonstrates that it can significantly minimize the communication overhead of more than 32.14% compared with the referenced protocols, while the runtime for both authentication and key exchange have also been significantly reduced.

Keywords: authentication, key exchange, certificateless public key cryptography, elliptic curve cryptography

Procedia PDF Downloads 61
322 Human Security Providers in Fragile State under Asymmetric War Conditions

Authors: Luna Shamieh

Abstract:

Various players are part of the game in an asymmetric war, all making efforts to provide human security to their own adherents. Although a fragile state is not able to provide sufficient and comprehensive services, it still provides special services and security to the elite; the insurgents as well provide services and security to their associates. The humanitarian organisations, on the other hand, provide some fundamental elements of human security, but only in the regions, they are able to access when possible (if possible). The counterinsurgents (security forces of the state and intervention forces) operate within a narrow band defined by the vision of the responsibility to protect and the perspective of the resolution of the conflict through combat; hence, the possibility to provide human security is shaken at this end. This article examines how each player provides human security from the perspective of freedom from want in order to secure basic and strategic needs, freedom from fear through providing protection against all kinds of violence, and the freedom to live in dignity. It identifies a vicious cycle caused by the intervention of the different players causing a centrifugal force that may lead to disintegration of the nation under war.

Keywords: asymmetric war, counterinsurgency, fragile state, human security, insurgency

Procedia PDF Downloads 311
321 Hierarchical Manganese and Nickel Selenide based Ultra-efficient Electrode Material for All-Solid-State Asymmetric Supercapacitors with Extended Energy Efficacy

Authors: Siddhant Srivastav, Soumyaranjan Mishra, Sumanta Kumar Meher

Abstract:

Researchers are attempting to develop extremely efficient electrochemical energy storage technologies as a result of the phenomenal advancement of portable electronic devices. Because of their improved electrical conductivity and narrower band gap, transition metal selenide-based nanostructures have piqued the interest of many researchers in this field. Based on this concept, we present a simple anion exchange hydrothermal synthesis method for synthesizing manganese and nickel based selenide (Mn/NiSe2) nanostructure for use in all-solid-state asymmetric supercapacitors. According to the comprehensive physicochemical characterizations, the material has lowly crystalline properties, a distinct porous microstructure, and a significant bonding contact between the metal and the selenium. The electrochemical investigations of the Mn/NiSe2 electrode material revealed supercapacitive charge discharge properties, excellent electro-kinetic reversibility, and minimal charge transfer resistance (Rct). Furthermore, the all-solid-state asymmetric supercapacitor device assembled using Mn/NiSe2 as positive electrode, nitrogen doped reduced graphene oxide (N-rGO) as negative electrode, and PVA-KOH gel as electrolyte/separator exhibit good redox behaviour, excellent charge-discharge properties with negligible voltage (IR) drop, and lower impedance characteristics. The solid state asymmetric supercapacitor device (Mn/NiSe2||N-rGO) demonstrated the power density of ultra-capacitors and the energy density of rechargeable batteries. Conclusively, the Mn/NiSe2 has been proposed as a potential outstanding electrode material for the next generation of all-solid-state asymmetric supercapacitors.

Keywords: anion exchange, asymmetric supercapacitor, supercapacitive charge-discharge, voltage drop

Procedia PDF Downloads 74
320 Fast-Forward Problem in Asymmetric Double-Well Potential

Authors: Iwan Setiawan, Bobby Eka Gunara, Katshuhiro Nakamura

Abstract:

The theory to accelerate system on quantum dynamics has been constructed to get the desired wave function on shorter time. This theory is developed on adiabatic quantum dynamics which any regulation is done on wave function that satisfies Schrödinger equation. We show accelerated manipulation of WFs with the use of a parameter-dependent in asymmetric double-well potential and also when it’s influenced by electromagnetic fields.

Keywords: driving potential, Adiabatic Quantum Dynamics, regulation, electromagnetic field

Procedia PDF Downloads 309
319 Gas Permeation Behavior of Single and Mixed Gas Components Using an Asymmetric Ceramic Membrane

Authors: Ngozi Claribelle Nwogu, Mohammed Nasir Kajama, Godson Osueke, Edward Gobina

Abstract:

A unique sol–gel dip-coating process to form an asymmetric silica membrane with improved membrane performance and reproducibility has been reported. First, we deposited repeatedly a silica solution on top of a commercial alumina membrane support to improve its structural make up. The coated membrane is further processed under clean room conditions to avoid dust impurity and subsequent drying in an oven for high thermal, chemical and physical stability. The resulting asymmetric membrane exhibits a gradual change in the membrane layer thickness. Compared to a single-layer process using only the membrane support, the dual-layer process improves both flux and selectivity. For the scientifically significant difficulties of natural gas purification, collective CO2, CH4 and H2 gas fluxes and separation factors obtained gave reasonably excellent values. In addition, the membrane selectively separated hydrogen as demonstrated by a high concentration of hydrogen recovery.

Keywords: gas permeation, silica membrane, separation factor, membrane layer thickness

Procedia PDF Downloads 329
318 Influence of Nanoparticles Phenomena on the Peristaltic Flow of Pseudoplastic Fluid in an Inclined Asymmetric Channel with Different Wave Forms

Authors: Safia Akram

Abstract:

The influence of nanofluid with different waveforms in the presence of inclined asymmetric channel on peristaltic transport of a pseudoplastic fluid is examined. The governing equations for two-dimensional and two directional flows of a pseudoplastic fluid along with nanofluid are modeled and then simplified under the assumptions of long wavelength and low Reynolds number approximation. The exact solutions for temperature and nanoparticle volume fraction are calculated. Series solution of the stream function and pressure gradient are carried out using perturbation technique. The flow quantities have been examined for various physical parameters of interest. It was found, that the magnitude value of the velocity profile decreases with an increase in volume flow rate (Q) and relaxation times (ζ) and increases in sinusoidal, multisinusoidal, trapezoidal and triangular waves. It was also observed that the size of the trapping bolus decreases with the drop of the width of the channel ‘d’ and increases with a rise of relaxation times ζ.

Keywords: nanofluid particles, peristaltic flow, pseudoplastic fluid, different waveforms, inclined asymmetric channel

Procedia PDF Downloads 202
317 Modified RSA in Mobile Communication

Authors: Nagaratna Rajur, J. D. Mallapur, Y. B. Kirankumar

Abstract:

The security in mobile communication is very different from the internet or telecommunication, because of its poor user interface and limited processing capacity, as well as combination of complex network protocols. Hence, it poses a challenge for less memory usage and low computation speed based security system. Security involves all the activities that are undertaken to protect the value and on-going usability of assets and the integrity and continuity of operations. An effective network security strategies requires identifying threats and then choosing the most effective set of tools to combat them. Cryptography is a simple and efficient way to provide security in communication. RSA is an asymmetric key approach that is highly reliable and widely used in internet communication. However, it has not been efficiently implemented in mobile communication due its computational complexity and large memory utilization. The proposed algorithm modifies the current RSA to be useful in mobile communication by reducing its computational complexity and memory utilization.

Keywords: M-RSA, sensor networks, sensor applications, security

Procedia PDF Downloads 321
316 Asymmetric Relation between Earnings and Returns

Authors: Seungmin Chee

Abstract:

This paper investigates which of the two arguments, conservatism or liquidation option, is a true underlying driver of the asymmetric slope coefficient result regarding the association between earnings and returns. The analysis of the relation between earnings and returns in four mutually exclusive settings segmented by ‘profits vs. losses’ and ‘positive returns vs. negative returns’ suggests that liquidation option rather than conservatism is likely to cause the asymmetric slope coefficient result. Furthermore, this paper documents the temporal changes between Basu period (1963-1990) and post-Basu period (1990-2005). Although no significant change in degree of conservatism or value relevance of losses is reported, stronger negative relation between losses and positive returns is observed in the post-Basu period. Separate regression analysis of each quintile based on the rankings of price to sales ratio and book to market ratio suggests that the strong negative relation is driven by growth firms.

Keywords: conservatism, earnings, liquidation option, returns

Procedia PDF Downloads 350
315 An Organocatalytic Construction of Vicinal Tetrasubstituted Stereocenters via Mannich Reaction of 2-Substituted Benzofuran-3-One with Isatin-Derived Ketimine

Authors: Koilpitchai Sivamuthuraman, Venkitasamy Kesavan

Abstract:

3-substituted 3-amino-2-oxindole skeleton bearing adjacent tetrasubstituted stereogenic centers is of great importance because of these heterocyclic motifs possess a wide range of pharmacological activity. The catalytic asymmetric construction of multi functionalised heterocyclic compound with adjacent tetrasubstituted stereocenters is one of the most difficult tasks in organic synthesis. To date, the most straightforward methodologies have been developed for synthesis of chiral 3-substituted 3-amino-2-oxindoles through the addition of carbon nucleophiles to isatin-derived ketimines. However, only a few successful examples have been described for the assembly of vicinal tetrasubstituted stereocenters using isatin derived ketimines as electrophiles. On the other hand, 2,2-Disubstituted benzofuran-3(2H)-ones and related frameworks are characteristic of a quaternary stereogenic center at C2 position present in quite a number of natural products and bioactive Molecules.Despite the intensive efforts devoted for the construction of 2,2-Disubstituted Benzofuran-3[2H]-one, there are only a few asymmetric methods such as organocatalytic Michael addition and enantioselective halogenations were reported till now. Due to the biological importance of oxindole and benzofuran-3-one, it is proposed here with the synthesis of hybrid molecule containing tetrasubstituted stereo centers through asymmetric organocatalysis. The addition of 2-substituted Benzofuran-3-one(1a) to isatin-derived ketimines(2a) using a bifunctional organocatalyst(catalyst IV or V), leading to chiral heterocyclic compounds containing both 3-amino 2-oxindole and benzofurn-3-one bearing vicinal quaternary stereocenters with good yields and excellent enantioselectivity. The present study extends the scope of the catalytic asymmetric Mannich reaction with isatin-derived ketimines, providing a new class of amino oxindole derivatives having benzofuran-3-one.

Keywords: asymmetric synthesis, benzofuran-3-one, isatin-derived ketimines, quaternary stereocenters

Procedia PDF Downloads 166
314 Does Stock Markets Asymmetric Information Affect Foreign Capital Flows?

Authors: Farid Habibi Tanha, Mojtaba Jahanbazi, Morteza Foroutan, Rasidah Mohd Rashid

Abstract:

This paper depicts the effects of asymmetric information in determining capital inflows to be captured through stock market microstructure. The model can explain several stylized facts regarding the capital immobility. The first phase of the research involves in collecting and refining 150,000,000 daily data of 11 stock markets over a period of one decade in an effort to minimize the impact of survivorship bias. Three micro techniques were used to measure information asymmetries. The final phase analyzes the model through panel data approach. As a unique contribution, this research will provide valuable information regarding negative effects of information asymmetries in stock markets on attracting foreign investments. The results of this study can be directly considered by policy makers to monitor and control changes of capital flow in order to keep market conditions in a healthy manner, by preventing and managing possible shocks to avoid sudden reversals and market failures.

Keywords: asymmetric information, capital inflow, market microstructure, investment

Procedia PDF Downloads 284
313 Optimization of Tooth Root Profile and Drive Side Pressure Angle to Minimize Bending Stress at Root of Asymmetric Spur Gear Tooth

Authors: Priyakant Vaghela, Jagdish Prajapati

Abstract:

Bending stress at the root of the gear tooth is the very important criteria in gear design and it should be kept the minimum. Minimization of bending stress at the root of the gear tooth is a recent demand from industry. This paper presents an innovative approach to obtain minimum bending stress at the root of a tooth by optimizing tooth root profile and drive side pressure angle. Circular-filleted at the root of the tooth is widely used in the design. Circular fillet creates discontinuity at the root of the tooth. So, at root stress concentration occurs. In order to minimize stress concentration, an important criterion is a G2 continuity at the blending of the gear tooth. A Bezier curve is used with G2 continuity at the root of asymmetric spur gear tooth. The comparison has been done between normal and modified tooth using ANSYS simulation. Tooth root profile and drive side pressure angle are optimized to minimize bending stress at the root of the tooth of the asymmetric involute spur gear. Von Mises stress of optimized profile is analyzed and compared with normal profile symmetric gear. Von Mises stress is reducing by 31.27% by optimization of drive side pressure angle and root profile. Stress concentration of modified gear was significantly reduced.

Keywords: asymmetric spur gear tooth, G2 continuity, pressure angle, stress concentration at the root of tooth, tooth root stress

Procedia PDF Downloads 160
312 Asymmetrically Contacted Tellurium Short-Wave Infrared Photodetector with Low Dark Current and High Sensitivity at Room Temperature

Authors: Huang Haoxin

Abstract:

Large dark current at room temperature has long been the major bottleneck that impedes the development of high-performance infrared photodetectors towards miniaturization and integration. Although infrared photodetectors based on layered 2D narrow bandgap semiconductors have shown admirable advantages compared with those based on conventional compounds, which typically suffer from expensive cryogenic operations, it is still urgent to develop a simple but effective strategy to further reduce the dark current. Herein, a tellurium (Te) based infrared photodetector is reported with a specifically designed asymmetric electrical contact area. The deliberately introduced asymmetric electrical contact raises the electric field intensity difference in the Te channel near the drain and the source electrodes, resulting in spontaneous asymmetric carrier diffusion under global infrared light illumination under zero bias. Specifically, the Te-based photodetector presents promising detector performance at room temperature, including a low dark current of≈1 nA, an ultrahigh photocurrent/dark current ratio of 1.57×10⁴, a high specific detectivity (D*) of 3.24×10⁹ Jones, and relatively fast response speed of ≈720 μs at zero bias. The results prove that the simple design of asymmetric electrical contact areas can provide a promising solution to high-performance 2D semiconductor-based infrared photodetectors working at room temperature.

Keywords: asymmetrical contact, tellurium, dark current, infrared photodetector, sensitivity

Procedia PDF Downloads 17
311 Three-Dimensional Carbon Foam Based Asymmetric Assembly of Metal Oxides Electrodes for High-Performance Solid-State Micro-Supercapacitor

Authors: Sumana Kumar, Abha Misra

Abstract:

Micro-supercapacitors hold great attention as one of the promising energy storage devices satisfying the increasing quest for miniaturized and portable devices. Despite having impressive power density, superior cyclic lifetime, and high charge-discharge rates, micro-supercapacitors still suffer from low energy density, which limits their practical application. The energy density (E=1/2CV²) can be increased either by increasing specific capacitance (C) or voltage range (V). Asymmetric micro-supercapacitors have attracted great attention by using two different electrode materials to expand the voltage window and thus increase the energy density. Currently, versatile fabrication technologies such as inkjet printing, lithography, laser scribing, etc., are used to directly or indirectly pattern the electrode material; these techniques still suffer from scalable production and cost inefficiency. Here, we demonstrate the scalable production of a three-dimensional (3D) carbon foam (CF) based asymmetric micro-supercapacitor by spray printing technique on an array of interdigital electrodes. The solid-state asymmetric micro-supercapacitor comprised of CF-MnO positive electrode and CF-Fe₂O₃ negative electrode achieves a high areal capacitance of 18.4 mF/cm² (2326.8 mF/cm³) at 5 mV/s and a wider potential window of 1.4 V. Consequently, a superior energy density of 5 µWh/cm² is obtained, and high cyclic stability is confirmed with retention of the initial capacitance by 86.1% after 10000 electrochemical cycles. The optimized decoration of pseudocapacitive metal oxides in the 3D carbon network helps in high electrochemical utilization of materials where the 3D interconnected network of carbon provides overall electrical conductivity and structural integrity. The research provides a simple and scalable spray printing method to fabricate an asymmetric micro-supercapacitor using a custom-made mask that can be integrated on a large scale.

Keywords: asymmetric micro-supercapacitors, high energy-density, hybrid materials, three-dimensional carbon-foam

Procedia PDF Downloads 90
310 Analysis and Comparison of Asymmetric H-Bridge Multilevel Inverter Topologies

Authors: Manel Hammami, Gabriele Grandi

Abstract:

In recent years, multilevel inverters have become more attractive for single-phase photovoltaic (PV) systems, due to their known advantages over conventional H-bridge pulse width-modulated (PWM) inverters. They offer improved output waveforms, smaller filter size, lower total harmonic distortion (THD), higher output voltages and others. The most common multilevel converter topologies, presented in literature, are the neutral-point-clamped (NPC), flying capacitor (FC) and Cascaded H-Bridge (CHB) converters. In both NPC and FC configurations, the number of components drastically increases with the number of levels what leads to complexity of the control strategy, high volume, and cost. Whereas, increasing the number of levels in case of the cascaded H-bridge configuration is a flexible solution. However, it needs isolated power sources for each stage, and it can be applied to PV systems only in case of PV sub-fields. In order to improve the ratio between the number of output voltage levels and the number of components, several hybrids and asymmetric topologies of multilevel inverters have been proposed in the literature such as the FC asymmetric H-bridge (FCAH) and the NPC asymmetric H-bridge (NPCAH) topologies. Another asymmetric multilevel inverter configuration that could have interesting applications is the cascaded asymmetric H-bridge (CAH), which is based on a modular half-bridge (two switches and one capacitor, also called level doubling network, LDN) cascaded to a full H-bridge in order to double the output voltage level. This solution has the same number of switches as the above mentioned AH configurations (i.e., six), and just one capacitor (as the FCAH). CAH is becoming popular, due to its simple, modular and reliable structure, and it can be considered as a retrofit which can be added in series to an existing H-Bridge configuration in order to double the output voltage levels. In this paper, an original and effective method for the analysis of the DC-link voltage ripple is given for single-phase asymmetric H-bridge multilevel inverters based on level doubling network (LDN). Different possible configurations of the asymmetric H-Bridge multilevel inverters have been considered and the analysis of input voltage and current are analytically determined and numerically verified by Matlab/Simulink for the case of cascaded asymmetric H-bridge multilevel inverters. A comparison between FCAH and the CAH configurations is done on the basis of the analysis of the DC and voltage ripple for the DC source (i.e., the PV system). The peak-to-peak DC and voltage ripple amplitudes are analytically calculated over the fundamental period as a function of the modulation index. On the basis of the maximum peak-to-peak values of low frequency and switching ripple voltage components, the DC capacitors can be designed. Reference is made to unity output power factor, as in case of most of the grid-connected PV generation systems. Simulation results will be presented in the full paper in order to prove the effectiveness of the proposed developments in all the operating conditions.

Keywords: asymmetric inverters, dc-link voltage, level doubling network, single-phase multilevel inverter

Procedia PDF Downloads 184
309 Analysis of Network Performance Using Aspect of Quantum Cryptography

Authors: Nisarg A. Patel, Hiren B. Patel

Abstract:

Quantum cryptography is described as a point-to-point secure key generation technology that has emerged in recent times in providing absolute security. Researchers have started studying new innovative approaches to exploit the security of Quantum Key Distribution (QKD) for a large-scale communication system. A number of approaches and models for utilization of QKD for secure communication have been developed. The uncertainty principle in quantum mechanics created a new paradigm for QKD. One of the approaches for use of QKD involved network fashioned security. The main goal was point-to-point Quantum network that exploited QKD technology for end-to-end network security via high speed QKD. Other approaches and models equipped with QKD in network fashion are introduced in the literature as. A different approach that this paper deals with is using QKD in existing protocols, which are widely used on the Internet to enhance security with main objective of unconditional security. Our work is towards the analysis of the QKD in Mobile ad-hoc network (MANET).

Keywords: cryptography, networking, quantum, encryption and decryption

Procedia PDF Downloads 145
308 Secure Authentication Scheme Based on Numerical Series Cryptography for Internet of Things

Authors: Maha Aladdin, Khaled Nagaty, Abeer Hamdy

Abstract:

The rapid advancement cellular networks and wireless networks have laid a solid basis for the Internet of Things. IoT has evolved into a unique standard that allows diverse physical devices to collaborate with one another. A service provider gives a variety of services that may be accessed via smart apps anywhere, at any time, and from any location over the Internet. Because of the public environment of mobile communication and the Internet, these services are highly vulnerable to a several malicious attacks, such as unauthorized disclosure by hostile attackers. As a result, the best option for overcoming these vulnerabilities is a strong authentication method. In this paper, a lightweight authentication scheme that is based on numerical series cryptography is proposed for the IoT environments. It allows mutual authentication between IoT devices Parametric study and formal proofs are utilized to illustrate that the pro-posed approach is resistant to a variety of security threats.

Keywords: internet of things, authentication, cryptography, security protocol

Procedia PDF Downloads 84
307 Arithmetic Operations Based on Double Base Number Systems

Authors: K. Sanjayani, C. Saraswathy, S. Sreenivasan, S. Sudhahar, D. Suganya, K. S. Neelukumari, N. Vijayarangan

Abstract:

Double Base Number System (DBNS) is an imminent system of representing a number using two bases namely 2 and 3, which has its application in Elliptic Curve Cryptography (ECC) and Digital Signature Algorithm (DSA).The previous binary method representation included only base 2. DBNS uses an approximation algorithm namely, Greedy Algorithm. By using this algorithm, the number of digits required to represent a larger number is less when compared to the standard binary method that uses base 2 algorithms. Hence, the computational speed is increased and time being reduced. The standard binary method uses binary digits 0 and 1 to represent a number whereas the DBNS method uses binary digit 1 alone to represent any number (canonical form). The greedy algorithm uses two ways to represent the number, one is by using only the positive summands and the other is by using both positive and negative summands. In this paper, arithmetic operations are used for elliptic curve cryptography. Elliptic curve discrete logarithm problem is the foundation for most of the day to day elliptic curve cryptography. This appears to be a momentous hard slog compared to digital logarithm problem. In elliptic curve digital signature algorithm, the key generation requires 160 bit of data by usage of standard binary representation. Whereas, the number of bits required generating the key can be reduced with the help of double base number representation. In this paper, a new technique is proposed to generate key during encryption and extraction of key in decryption.

Keywords: cryptography, double base number system, elliptic curve cryptography, elliptic curve digital signature algorithm

Procedia PDF Downloads 369
306 Asymmetric Synthesis of β- and γ-Borylated Amines via Rh-Catalyzed Hydroboration of Allylamine Derivatives

Authors: Rukshani Wickrama-Arachchi, Tanner Metz, James M. Takacs

Abstract:

Amines bearing γ-stereocenters are important structural motifs found in many biologically active compounds. Regioselective Rh-catalyzed asymmetric hydroboration of acyclic allylamines is used to synthesize amines bearing chiral β- and γ-boronic esters yields up to 70% with 98:2 enantioselectivity. The major enantiomeric outcome can be independent of starting alkene geometry, revealing that cis/trans-isomerization of alkene can occur before hydroboration. Stereospecific transformations of the newly generated C-B bond illustrates the utility of these chiral synthons.

Keywords: allylamines, borylated amines, chiral amines, hydroboration, rhodium-catalysis

Procedia PDF Downloads 159
305 Identity-Based Encryption: A Comparison of Leading Classical and Post-Quantum Implementations in an Enterprise Setting

Authors: Emily Stamm, Neil Smyth, Elizabeth O'Sullivan

Abstract:

In Identity-Based Encryption (IBE), an identity, such as a username, email address, or domain name, acts as the public key. IBE consolidates the PKI by eliminating the repetitive process of requesting public keys for each message encryption. Two of the most popular schemes are Sakai-Kasahara (SAKKE), which is based on elliptic curve pairings, and the Ducas, Lyubashevsky, and Prest lattice scheme (DLP- Lattice), which is based on quantum-secure lattice cryptography. In or- der to embed the schemes in a standard enterprise setting, both schemes are implemented as shared system libraries and integrated into a REST service that functions at the enterprise level. The performance of both schemes as libraries and services is compared, and the practicalities of implementation and application are discussed. Our performance results indicate that although SAKKE has the smaller key and ciphertext sizes, DLP-Lattice is significantly faster overall and we recommend it for most enterprise use cases.

Keywords: identity-based encryption, post-quantum cryptography, lattice-based cryptography, IBE

Procedia PDF Downloads 95
304 Chaos Cryptography in Cloud Architectures with Lower Latency

Authors: Mohammad A. Alia

Abstract:

With the rapid evolution of the internet applications, cloud computing becomes one of today’s hottest research areas due to its ability to reduce costs associated with computing. Cloud is, therefore, increasing flexibility and scalability for computing services in the internet. Cloud computing is Internet based computing due to shared resources and information which are dynamically delivered to consumers. As cloud computing share resources via the open network, hence cloud outsourcing is vulnerable to attack. Therefore, this paper will explore data security of cloud computing by implementing chaotic cryptography. The proposal scenario develops a problem transformation technique that enables customers to secretly transform their information. This work proposes the chaotic cryptographic algorithms have been applied to enhance the security of the cloud computing accessibility. However, the proposed scenario is secure, easy and straightforward process. The chaotic encryption and digital signature systems ensure the security of the proposed scenario. Though, the choice of the key size becomes crucial to prevent a brute force attack.

Keywords: chaos, cloud computing, security, cryptography

Procedia PDF Downloads 314
303 Robustified Asymmetric Logistic Regression Model for Global Fish Stock Assessment

Authors: Osamu Komori, Shinto Eguchi, Hiroshi Okamura, Momoko Ichinokawa

Abstract:

The long time-series data on population assessments are essential for global ecosystem assessment because the temporal change of biomass in such a database reflects the status of global ecosystem properly. However, the available assessment data usually have limited sample sizes and the ratio of populations with low abundance of biomass (collapsed) to those with high abundance (non-collapsed) is highly imbalanced. To allow for the imbalance and uncertainty involved in the ecological data, we propose a binary regression model with mixed effects for inferring ecosystem status through an asymmetric logistic model. In the estimation equation, we observe that the weights for the non-collapsed populations are relatively reduced, which in turn puts more importance on the small number of observations of collapsed populations. Moreover, we extend the asymmetric logistic regression model using propensity score to allow for the sample biases observed in the labeled and unlabeled datasets. It robustified the estimation procedure and improved the model fitting.

Keywords: double robust estimation, ecological binary data, mixed effect logistic regression model, propensity score

Procedia PDF Downloads 239
302 Fingerprint Image Encryption Using a 2D Chaotic Map and Elliptic Curve Cryptography

Authors: D. M. S. Bandara, Yunqi Lei, Ye Luo

Abstract:

Fingerprints are suitable as long-term markers of human identity since they provide detailed and unique individual features which are difficult to alter and durable over life time. In this paper, we propose an algorithm to encrypt and decrypt fingerprint images by using a specially designed Elliptic Curve Cryptography (ECC) procedure based on block ciphers. In addition, to increase the confusing effect of fingerprint encryption, we also utilize a chaotic-behaved method called Arnold Cat Map (ACM) for a 2D scrambling of pixel locations in our method. Experimental results are carried out with various types of efficiency and security analyses. As a result, we demonstrate that the proposed fingerprint encryption/decryption algorithm is advantageous in several different aspects including efficiency, security and flexibility. In particular, using this algorithm, we achieve a margin of about 0.1% in the test of Number of Pixel Changing Rate (NPCR) values comparing to the-state-of-the-art performances.

Keywords: arnold cat map, biometric encryption, block cipher, elliptic curve cryptography, fingerprint encryption, Koblitz’s encoding

Procedia PDF Downloads 175
301 Asymmetric Synthesis of Catalponol Using Chiral Iridium Catalyst

Authors: Takeyuki Suzuki, Ismiyarto, Da-Yang Zhou, Kaori Asano, Hiroaki Sasai

Abstract:

The development of catalytic asymmetric reaction is important for the synthesis of natural products. To construct the multiple stereogenic centers, the desymmetrization of meso compounds is powerful strategy for the synthesis of chiral molecules. Oxidative desymmetrization of meso diols using chiral iridium catalyst provides a chiral hydroxyl ketone. The reaction is practical and an environmentally benign method which does not require the use of stoichiometric amount of heavy metals. This time we report here catalytic asymmetric synthesis of catalponol based on tandem coupling of meso-diols and an aldehyde. The tandem reaction includes oxidative desymmetrization of meso-diols, aldol condensation with an aldehyde. The reaction of meso-diol, benzaldehyde in the presence of a catalytic amount of chiral Ir complex and CsOH in tetrahydrofuran afforded the desired benzylidene ketone in 82% yield with 96% ee (enantiomeric excess). Next, we applied this benzylidene ketone derivative to the synthesis of catalponol. The corresponding benzylidene ketone was obtained in 87% yield with 99% ee. Finally, catalponol was synthesized by the regio- and stereo-selective reduction of dienone moiety in good yield.

Keywords: catalponol, desymmetrization, iridium, oxidation

Procedia PDF Downloads 147
300 Structural Breaks, Asymmetric Effects and Long Memory in the Volatility of Turkey Stock Market

Authors: Serpil Türkyılmaz, Mesut Balıbey

Abstract:

In this study, long memory properties in volatility of Turkey Stock Market are being examined through the FIGARCH, FIEGARCH and FIAPARCH models under different distribution assumptions as normal and skewed student-t distributions. Furthermore, structural changes in volatility of Turkey Stock Market are investigated. The results display long memory property and the presence of asymmetric effects of shocks in volatility of Turkey Stock Market.

Keywords: FIAPARCH model, FIEGARCH model, FIGARCH model, structural break

Procedia PDF Downloads 272
299 Optimized and Secured Digital Watermarking Using Fuzzy Entropy, Bezier Curve and Visual Cryptography

Authors: R. Rama Kishore, Sunesh

Abstract:

Recent development in the usage of internet for different purposes creates a great threat for the copyright protection of the digital images. Digital watermarking can be used to address the problem. This paper presents detailed review of the different watermarking techniques, latest trends in the field of secured, robust and imperceptible watermarking. It also discusses the different optimization techniques used in the field of watermarking in order to improve the robustness and imperceptibility of the method. Different measures are discussed to evaluate the performance of the watermarking algorithm. At the end, this paper proposes a watermarking algorithm using (2, 2) share visual cryptography and Bezier curve based algorithm to improve the security of the watermark. The proposed method uses fractional transformation to improve the robustness of the copyright protection of the method. The algorithm is optimized using fuzzy entropy for better results.

Keywords: digital watermarking, fractional transform, visual cryptography, Bezier curve, fuzzy entropy

Procedia PDF Downloads 337
298 Key Transfer Protocol Based on Non-invertible Numbers

Authors: Luis A. Lizama-Perez, Manuel J. Linares, Mauricio Lopez

Abstract:

We introduce a method to perform remote user authentication on what we call non-invertible cryptography. It exploits the fact that the multiplication of an invertible integer and a non-invertible integer in a ring Zn produces a non-invertible integer making infeasible to compute factorization. The protocol requires the smallest key size when is compared with the main public key algorithms as Diffie-Hellman, Rivest-Shamir-Adleman or Elliptic Curve Cryptography. Since we found that the unique opportunity for the eavesdropper is to mount an exhaustive search on the keys, the protocol seems to be post-quantum.

Keywords: invertible, non-invertible, ring, key transfer

Procedia PDF Downloads 145
297 Revisiting the Impact of Oil Price on Trade Deficit of Pakistan: Evidence from Nonlinear Auto-Regressive Distributed Lag Model and Asymmetric Multipliers

Authors: Qaiser Munir, Hamid Hussain

Abstract:

Oil prices are believed to have a major impact on several economic indicators, leading to several instances where a comparison between oil prices and a trade deficit of oil-importing countries have been carried out. Building upon the narrative, this paper sheds light on the ongoing debate by inquiring upon the possibility of asymmetric linkages between oil prices, industrial production, exchange rate, whole price index, and trade deficit. The analytical tool used to further understand the complexities of a recent approach called nonlinear auto-regressive distributed lag model (NARDL) is utilised. Our results suggest that there are significant asymmetric effects among the main variables of interest. Further, our findings indicate that any variation in oil prices, industrial production, exchange rate, and whole price index on trade deficit tend to fluctuate in the long run. Moreover, the long-run picture denotes that increased oil price leads to a negative impact on the trade deficit, which, in its true essence, is a disproportionate impact. In addition to this, the Wald test simultaneously conducted concludes the absence of any significant evidence of the asymmetry in the oil prices impact on the trade balance in the short-run.

Keywords: trade deficit, oil prices, developing economy, NARDL

Procedia PDF Downloads 112