Search results for: asymmetric key cryptography
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 351

Search results for: asymmetric key cryptography

351 Cryptosystems in Asymmetric Cryptography for Securing Data on Cloud at Various Critical Levels

Authors: Sartaj Singh, Amar Singh, Ashok Sharma, Sandeep Kaur

Abstract:

With upcoming threats in a digital world, we need to work continuously in the area of security in all aspects, from hardware to software as well as data modelling. The rise in social media activities and hunger for data by various entities leads to cybercrime and more attack on the privacy and security of persons. Cryptography has always been employed to avoid access to important data by using many processes. Symmetric key and asymmetric key cryptography have been used for keeping data secrets at rest as well in transmission mode. Various cryptosystems have evolved from time to time to make the data more secure. In this research article, we are studying various cryptosystems in asymmetric cryptography and their application with usefulness, and much emphasis is given to Elliptic curve cryptography involving algebraic mathematics.

Keywords: cryptography, symmetric key cryptography, asymmetric key cryptography

Procedia PDF Downloads 75
350 Improved of Elliptic Curves Cryptography over a Ring

Authors: Abdelhakim Chillali, Abdelhamid Tadmori, Muhammed Ziane

Abstract:

In this article we will study the elliptic curve defined over the ring An and we define the mathematical operations of ECC, which provides a high security and advantage for wireless applications compared to other asymmetric key cryptosystem.

Keywords: elliptic curves, finite ring, cryptography, study

Procedia PDF Downloads 339
349 Development of Ultrasounf Probe Holder for Automatic Scanning Asymmetric Reflector

Authors: Nabilah Ibrahim, Hafiz Mohd Zaini, Wan Fatin Liyana Mutalib

Abstract:

Ultrasound equipment or machine is capable to scan in two dimensional (2D) areas. However there are some limitations occur during scanning an object. The problem will occur when scanning process that involving the asymmetric object. In this project, the ultrasound probe holder for asymmetric reflector scanning in 3D image is proposed to make easier for scanning the phantom or object that has asymmetric shape. Initially, the constructed asymmetric phantom that construct will be used in 2D scanning. Next, the asymmetric phantom will be interfaced by the movement of ultrasound probe holder using the Arduino software. After that, the performance of the ultrasound probe holder will be evaluated by using the various asymmetric reflector or phantom in constructing a 3D image

Keywords: ultrasound 3D images, axial and lateral resolution, asymmetric reflector, Arduino software

Procedia PDF Downloads 521
348 Influence of Different Asymmetric Rolling Processes on Shear Strain

Authors: Alexander Pesin, Denis Pustovoytov, Mikhail Sverdlik

Abstract:

Materials with ultrafine-grained structure and unique physical and mechanical properties can be obtained by methods of severe plastic deformation, which include processes of asymmetric rolling (AR). Asymmetric rolling is a very effective way to create ultrafine-grained structures of metals and alloys. Since the asymmetric rolling is a continuous process, it has great potential for industrial production of ultrafine-grained structure sheets. Basic principles of asymmetric rolling are described in detail in scientific literature. In this work finite element modeling of asymmetric rolling and metal forming processes in multiroll gauge was performed. Parameters of the processes which allow achieving significant values of shear strain were defined. The results of the study will be useful for the research of the evolution of ultra-fine metal structure in asymmetric rolling.

Keywords: asymmetric rolling, equivalent strain, FEM, multiroll gauge, profile, severe plastic deformation, shear strain, sheet

Procedia PDF Downloads 231
347 Asymmetric Information and Composition of Capital Inflows: Stock Market Microstructure Analysis of Asia Pacific Countries

Authors: Farid Habibi Tanha, Hawati Janor, Mojtaba Jahanbazi

Abstract:

The purpose of this study is to examine the effect of asymmetric information on the composition of capital inflows. This study uses the stock market microstructure to capture the asymmetric information. Such an approach allows one to capture the level and extent of the asymmetric information from a firm’s perspective. This study focuses on the two-dimensional measure of the market microstructure in capturing asymmetric information. The composition of capital inflows is measured by running six models simultaneously. By employing the panel data technique, the main finding of this research shows an increase in the asymmetric information of the stock market, in any of the two dimensions of width and depth. This leads to the reduction of foreign investments in both forms of foreign portfolio investment (FPI) and foreign direct investment (FDI), while the reduction in FPI is higher than that of the FDI. The significant effect of asymmetric information on capital inflows implicitly suggests for policymakers to control the changes of foreign capital inflows through transparency in the level of the market.

Keywords: capital flows composition, asymmetric information, stock market microstructure, foreign portfolio investment, foreign direct investment

Procedia PDF Downloads 319
346 SA-SPKC: Secure and Efficient Aggregation Scheme for Wireless Sensor Networks Using Stateful Public Key Cryptography

Authors: Merad Boudia Omar Rafik, Feham Mohammed

Abstract:

Data aggregation in wireless sensor networks (WSNs) provides a great reduction of energy consumption. The limited resources of sensor nodes make the choice of an encryption algorithm very important for providing security for data aggregation. Asymmetric cryptography involves large ciphertexts and heavy computations but solves, on the other hand, the problem of key distribution of symmetric one. The latter provides smaller ciphertexts and speed computations. Also, the recent researches have shown that achieving the end-to-end confidentiality and the end-to-end integrity at the same is a challenging task. In this paper, we propose (SA-SPKC), a novel security protocol which addresses both security services for WSNs, and where only the base station can verify the individual data and identify the malicious node. Our scheme is based on stateful public key encryption (StPKE). The latter combines the best features of both kinds of encryption along with state in order to reduce the computation overhead. Our analysis

Keywords: secure data aggregation, wireless sensor networks, elliptic curve cryptography, homomorphic encryption

Procedia PDF Downloads 251
345 Cryptography and Cryptosystem a Panacea to Security Risk in Wireless Networking

Authors: Modesta E. Ezema, Chikwendu V. Alabekee, Victoria N. Ishiwu, Ifeyinwa NwosuArize, Chinedu I. Nwoye

Abstract:

The advent of wireless networking in computing technology cannot be overemphasized, it opened up easy accessibility to information resources, networking made easier and brought internet accessibility to our doorsteps, but despite all these, some mishap came in with it that is causing mayhem in today ‘s overall information security. The cyber criminals will always compromise the integrity of a message that is not encrypted or that is encrypted with a weak algorithm.In other to correct the mayhem, this study focuses on cryptosystem and cryptography. This ensures end to end crypt messaging. The study of various cryptographic algorithms, as well as the techniques and applications of the cryptography for efficiency, were all considered in the work., present and future applications of cryptography were dealt with as well as Quantum Cryptography was exposed as the current and the future area in the development of cryptography. An empirical study was conducted to collect data from network users.

Keywords: algorithm, cryptography, cryptosystem, network

Procedia PDF Downloads 306
344 Digital Watermarking Based on Visual Cryptography and Histogram

Authors: R. Rama Kishore, Sunesh

Abstract:

Nowadays, robust and secure watermarking algorithm and its optimization have been need of the hour. A watermarking algorithm is presented to achieve the copy right protection of the owner based on visual cryptography, histogram shape property and entropy. In this, both host image and watermark are preprocessed. Host image is preprocessed by using Butterworth filter, and watermark is with visual cryptography. Applying visual cryptography on water mark generates two shares. One share is used for embedding the watermark, and the other one is used for solving any dispute with the aid of trusted authority. Usage of histogram shape makes the process more robust against geometric and signal processing attacks. The combination of visual cryptography, Butterworth filter, histogram, and entropy can make the algorithm more robust, imperceptible, and copy right protection of the owner.

Keywords: digital watermarking, visual cryptography, histogram, butter worth filter

Procedia PDF Downloads 316
343 BigCrypt: A Probable Approach of Big Data Encryption to Protect Personal and Business Privacy

Authors: Abdullah Al Mamun, Talal Alkharobi

Abstract:

As data size is growing up, people are became more familiar to store big amount of secret information into cloud storage. Companies are always required to need transfer massive business files from one end to another. We are going to lose privacy if we transmit it as it is and continuing same scenario repeatedly without securing the communication mechanism means proper encryption. Although asymmetric key encryption solves the main problem of symmetric key encryption but it can only encrypt limited size of data which is inapplicable for large data encryption. In this paper we propose a probable approach of pretty good privacy for encrypt big data using both symmetric and asymmetric keys. Our goal is to achieve encrypt huge collection information and transmit it through a secure communication channel for committing the business and personal privacy. To justify our method an experimental dataset from three different platform is provided. We would like to show that our approach is working for massive size of various data efficiently and reliably.

Keywords: big data, cloud computing, cryptography, hadoop, public key

Procedia PDF Downloads 282
342 Leverage Effect for Volatility with Generalized Laplace Error

Authors: Farrukh Javed, Krzysztof Podgórski

Abstract:

We propose a new model that accounts for the asymmetric response of volatility to positive ('good news') and negative ('bad news') shocks in economic time series the so-called leverage effect. In the past, asymmetric powers of errors in the conditionally heteroskedastic models have been used to capture this effect. Our model is using the gamma difference representation of the generalized Laplace distributions that efficiently models the asymmetry. It has one additional natural parameter, the shape, that is used instead of power in the asymmetric power models to capture the strength of a long-lasting effect of shocks. Some fundamental properties of the model are provided including the formula for covariances and an explicit form for the conditional distribution of 'bad' and 'good' news processes given the past the property that is important for the statistical fitting of the model. Relevant features of volatility models are illustrated using S&P 500 historical data.

Keywords: heavy tails, volatility clustering, generalized asymmetric laplace distribution, leverage effect, conditional heteroskedasticity, asymmetric power volatility, GARCH models

Procedia PDF Downloads 353
341 Chiral Diphosphine Ligands and Their Transition Metal Diphosphine Complexes in Asymmetric Catalysis

Authors: Shannen Lorraine, Paul Maragh, Tara Dasgupta, Kamaluddin Abdur-Rashid

Abstract:

(R)-(4,4',6,6'-tetramethoxybiphenyl-2,2'-diyl)bis(diphenylphosphine) (R-Ph-Garphos), and (S)-(4,4',6,6'-tetramethoxybiphenyl-2,2'-diyl)bis(diphenylphosphine) (S-Ph-Garphos) are novel, nucleophilic, chiral atropisomeric ligands. The research explored the synthesis of chiral transition metal complexes containing these ligands and their applications in various asymmetric catalytic transformations. Herein, the transition metal complexes having ruthenium(II), rhodium(I) and iridium(I) metal centres will be discussed. These are air stable complexes and were characterized by CHN analysis, 1H, 13C, and 31P NMR spectroscopy, and polarimetry. Currently, there is an emphasis on 'greener' catalysts and the need for 'green' solvents in asymmetric catalysis. As such, the Ph-Garphos ligands were demethylated thereby introducing hydroxyl moieties unto the ligand scaffold. The facile tunability of the biaryl diphosphines led to the preparation of the (R)-(4,4',6,6'-tetrahydroxybiphenyl-2,2'-diyl)bis(diphenylphosphine) (R-Ph-Garphos-OH), and (S)-(4,4',6,6'-tetrahydroxybiphenyl-2,2'-diyl)bis(diphenylphosphine) (S-Ph-Garphos-OH) ligands. These were successfully characterized by CHN analysis, 1H, 13C, and 31P NMR spectroscopy, and polarimetry. The use of the Ph-Garphos and Ph-Garphos-OH ligands and their transition metal complexes in asymmetric hydrogenations will be reported. Additionally, the scope of the research will highlight the applicability of the Ph-Garphos-OH ligand and its transitional metal complexes as 'green' catalysts.

Keywords: catalysis, asymmetric hydrogenation, diphosphine transition metal complexes, Ph-Garphos ligands

Procedia PDF Downloads 270
340 Cryptography Based Authentication Methods

Authors: Mohammad A. Alia, Abdelfatah Aref Tamimi, Omaima N. A. Al-Allaf

Abstract:

This paper reviews a comparison study on the most common used authentication methods. Some of these methods are actually based on cryptography. In this study, we show the main cryptographic services. Also, this study presents a specific discussion about authentication service, since the authentication service is classified into several categorizes according to their methods. However, this study gives more about the real life example for each of the authentication methods. It talks about the simplest authentication methods as well about the available biometric authentication methods such as voice, iris, fingerprint, and face authentication.

Keywords: information security, cryptography, system access control, authentication, network security

Procedia PDF Downloads 425
339 Secure E-Pay System Using Steganography and Visual Cryptography

Authors: K. Suganya Devi, P. Srinivasan, M. P. Vaishnave, G. Arutperumjothi

Abstract:

Today’s internet world is highly prone to various online attacks, of which the most harmful attack is phishing. The attackers host the fake websites which are very similar and look alike. We propose an image based authentication using steganography and visual cryptography to prevent phishing. This paper presents a secure steganographic technique for true color (RGB) images and uses Discrete Cosine Transform to compress the images. The proposed method hides the secret data inside the cover image. The use of visual cryptography is to preserve the privacy of an image by decomposing the original image into two shares. Original image can be identified only when both qualified shares are simultaneously available. Individual share does not reveal the identity of the original image. Thus, the existence of the secret message is hard to be detected by the RS steganalysis.

Keywords: image security, random LSB, steganography, visual cryptography

Procedia PDF Downloads 295
338 Chiral Ruthenium Aminophosphine and Phosphine Iminopyridine Complexes: Synthesis and Application to Asymmetric Hydrogenation and Transfer Hydrogenation

Authors: Littlelet N. Scarlet, Kamaluddin Abdur-Rashid, Paul T. Maragh, Tara Dasgupta

Abstract:

Aminophosphines are a privileged class of ancillary ligands with emerging importance in homogeneous catalysis. The unique combination of soft phosphorus (P) and hard nitrogen (N) centres affords a variety of transition metal complexes as potential pre-catalysts for synthetically useful reactions. Herein three ligand systems will be reported; two bidentate ligands - (S)-8-(diphenyl-phosphino)-1,2,3,4-tetrahydronaphthalen-1-amine, (S)THNANH2, and (Rc)-1-((Sp)-2-diphenylphosphino) ferrocenylethylamine, (RcSp)PPFNH2 - and a tridentate (Rc)-1-((Sp)-2-diphenylphosphino) ferrocenylimino-pyridine, (RcSp)PPFNNH2 ligand; the latter prepared from the condensation of selected ferrocene aminophosphines with pyridine-2-carboxaldehyde. Suitable combinations of these aminophosphine ligands with ruthenium precursors have afforded highly efficient systems for the asymmetric hydrogenation and transfer hydrogenation of selected ketones in 2-propanol. The Ru-(S)THNANH2 precatalyst was the most efficient in the asymmetric hydrogenation of selected ketones with 100% conversions within 4 hours at a catalyst loading of 0.1 mol%. The Ru-(RcSp)PPFNNH2 precatalyst was the most efficient in the asymmetric transfer hydrogenation of the ketones with conversions as high as 98% with 0.1 mol% catalyst. However, the enantioselectivities were generally low.

Keywords: aminophosphine, asymmetric hydrogenation, homogeneous catalysis, ruthenium (II), transfer hydrogenation

Procedia PDF Downloads 221
337 Asymmetric Synthesis and Biological Study of Suberosanes

Authors: Mohammad Kousara, Françoise Dumas, Rama Ibrahim, Joëlle Dubois, Joël Raingeaud

Abstract:

Suberosanes are a small group of marine natural sesquiterpenes discovered since 1996 by Boyd, Sheu and Qi from three gorgonians. Their skeleton was previously found in quadranes produced by the terrestrial fungus Aspergillus terreus. Up to date, eleven suberosanes are described from which (-)-suberosanone and (-)-suberosenol A are reaching the picomolar cytotoxicity level on human solid tumors cell lines. Due to their impressive cytotoxic properties and their limited availability, we undertook an asymmetric synthesis of the most active members of this family in order to get insight into their absolute configurations and their biological properties. The challenge of their synthesis is the regio- and stereoselective elaboration of the compact bridged tricyclic skeleton with up to five all adjacent asymmetric centers, including a central quaternary carbon one. Our strategy is based on an aza-ene-synthesis key step which is regio-and stereo-controlled by the choice of a chiral amine enantiomer. it approach is concise and flexible, the enantiopur ABC tricyclic intermediate that have been synthesized being the common precursor of suberosanes.

Keywords: suberosanes, asymmetric synthesis, sesquiterpenes, quadranes

Procedia PDF Downloads 36
336 Digital Watermarking Using Fractional Transform and (k,n) Halftone Visual Cryptography (HVC)

Authors: R. Rama Kishore, Sunesh Malik

Abstract:

Development in the usage of internet for different purposes in recent times creates great threat for the copy right protection of the digital images. Digital watermarking is the best way to rescue from the said problem. This paper presents detailed review of the different watermarking techniques, latest trends in the field and categorized like spatial and transform domain, blind and non-blind methods, visible and non visible techniques etc. It also discusses the different optimization techniques used in the field of watermarking in order to improve the robustness and imperceptibility of the method. Different measures are discussed to evaluate the performance of the watermarking algorithm. At the end, this paper proposes a watermarking algorithm using (k.n) shares of halftone visual cryptography (HVC) instead of (2, 2) share cryptography. (k,n) shares visual cryptography improves the security of the watermark. As halftone is a method of reprographic, it helps in improving the visual quality of watermark image. The proposed method uses fractional transformation to improve the robustness of the copyright protection of the method.

Keywords: digital watermarking, fractional transform, halftone, visual cryptography

Procedia PDF Downloads 312
335 Numerical Buckling of Composite Cylindrical Shells under Axial Compression Using Asymmetric Meshing Technique (AMT)

Authors: Zia R. Tahir, P. Mandal

Abstract:

This paper presents the details of a numerical study of buckling and post buckling behaviour of laminated carbon fiber reinforced plastic (CFRP) thin-walled cylindrical shell under axial compression using asymmetric meshing technique (AMT) by ABAQUS. AMT is considered to be a new perturbation method to introduce disturbance without changing geometry, boundary conditions or loading conditions. Asymmetric meshing affects both predicted buckling load and buckling mode shapes. Cylindrical shell having lay-up orientation [0°/+45°/-45°/0°] with radius to thickness ratio (R/t) equal to 265 and length to radius ratio (L/R) equal to 1.5 is analysed numerically. A series of numerical simulations (experiments) are carried out with symmetric and asymmetric meshing to study the effect of asymmetric meshing on predicted buckling behaviour. Asymmetric meshing technique is employed in both axial direction and circumferential direction separately using two different methods, first by changing the shell element size and varying the total number elements, and second by varying the shell element size and keeping total number of elements constant. The results of linear analysis (Eigenvalue analysis) and non-linear analysis (Riks analysis) using symmetric meshing agree well with analytical results. The results of numerical analysis are presented in form of non-dimensional load factor, which is the ratio of buckling load using asymmetric meshing technique to buckling load using symmetric meshing technique. Using AMT, load factor has about 2% variation for linear eigenvalue analysis and about 2% variation for non-linear Riks analysis. The behaviour of load end-shortening curve for pre-buckling is same for both symmetric and asymmetric meshing but for asymmetric meshing curve behaviour in post-buckling becomes extraordinarily complex. The major conclusions are: different methods of AMT have small influence on predicted buckling load and significant influence on load displacement curve behaviour in post buckling; AMT in axial direction and AMT in circumferential direction have different influence on buckling load and load displacement curve in post-buckling.

Keywords: CFRP composite cylindrical shell, asymmetric meshing technique, primary buckling, secondary buckling, linear eigenvalue analysis, non-linear riks analysis

Procedia PDF Downloads 319
334 Modelling the Dynamics of Corporate Bonds Spreads with Asymmetric GARCH Models

Authors: Sélima Baccar, Ephraim Clark

Abstract:

This paper can be considered as a new perspective to analyse credit spreads. A comprehensive empirical analysis of conditional variance of credit spreads indices is performed using various GARCH models. Based on a comparison between traditional and asymmetric GARCH models with alternative functional forms of the conditional density, we intend to identify what macroeconomic and financial factors have driven daily changes in the US Dollar credit spreads in the period from January 2011 through January 2013. The results provide a strong interdependence between credit spreads and the explanatory factors related to the conditions of interest rates, the state of the stock market, the bond market liquidity and the exchange risk. The empirical findings support the use of asymmetric GARCH models. The AGARCH and GJR models outperform the traditional GARCH in credit spreads modelling. We show, also, that the leptokurtic Student-t assumption is better than the Gaussian distribution and improves the quality of the estimates, whatever the rating or maturity.

Keywords: corporate bonds, default risk, credit spreads, asymmetric garch models, student-t distribution

Procedia PDF Downloads 430
333 Asymmetric Warfare: Exploratory Study of the Implicit Defense Strategy of the People's Republic of China in 2012-2016

Authors: María Victoria Alvarez Magañini, Lautaro Nahuel Rubbi

Abstract:

According to different theories, the hegemonic war between the United States and the People's Republic of China seems to be imminent. However, nowadays, it is clear that China's conventional military capacity is inferior to that of the United States. Nevertheless, the conditions that in the past were considered to be an indicator of validity in asymmetrical warfare, at present, in a possible asymmetric war scenario, are no longer considered to be taken as such. The military capacity is not the only concept that represents the main indicator of victory. The organisation and the use of forces are also an essential part of it. The present paper aims to analyze the Chinese Defense Strategy in relation to the concept of asymmetric warfare in the face of a possible war with the United States. The starting point will be developed on the basis of application of the theory which corresponds to the concept aforementioned making focus on recent developments of the People’s Republic of China in the field of non-conventional defense. A comparative analysis of the conventional forces of both powers/countries will also be carried out.

Keywords: asymmetric warfare, China, United States, hegemonic warfare

Procedia PDF Downloads 221
332 Secure Optical Communication System Using Quantum Cryptography

Authors: Ehab AbdulRazzaq Hussein

Abstract:

Quantum cryptography (QC) is an emerging technology for secure key distribution with single-photon transmissions. In contrast to classical cryptographic schemes, the security of QC schemes is guaranteed by the fundamental laws of nature. Their security stems from the impossibility to distinguish non-orthogonal quantum states with certainty. A potential eavesdropper introduces errors in the transmissions, which can later be discovered by the legitimate participants of the communication. In this paper, the modeling approach is proposed for QC protocol BB84 using polarization coding. The single-photon system is assumed to be used in the designed models. Thus, Eve cannot use beam-splitting strategy to eavesdrop on the quantum channel transmission. The only eavesdropping strategy possible to Eve is the intercept/resend strategy. After quantum transmission of the QC protocol, the quantum bit error rate (QBER) is estimated and compared with a threshold value. If it is above this value the procedure must be stopped and performed later again.

Keywords: security, key distribution, cryptography, quantum protocols, Quantum Cryptography (QC), Quantum Key Distribution (QKD).

Procedia PDF Downloads 365
331 The Asymmetric Proximal Support Vector Machine Based on Multitask Learning for Classification

Authors: Qing Wu, Fei-Yan Li, Heng-Chang Zhang

Abstract:

Multitask learning support vector machines (SVMs) have recently attracted increasing research attention. Given several related tasks, the single-task learning methods trains each task separately and ignore the inner cross-relationship among tasks. However, multitask learning can capture the correlation information among tasks and achieve better performance by training all tasks simultaneously. In addition, the asymmetric squared loss function can better improve the generalization ability of the models on the most asymmetric distributed data. In this paper, we first make two assumptions on the relatedness among tasks and propose two multitask learning proximal support vector machine algorithms, named MTL-a-PSVM and EMTL-a-PSVM, respectively. MTL-a-PSVM seeks a trade-off between the maximum expectile distance for each task model and the closeness of each task model to the general model. As an extension of the MTL-a-PSVM, EMTL-a-PSVM can select appropriate kernel functions for shared information and private information. Besides, two corresponding special cases named MTL-PSVM and EMTLPSVM are proposed by analyzing the asymmetric squared loss function, which can be easily implemented by solving linear systems. Experimental analysis of three classification datasets demonstrates the effectiveness and superiority of our proposed multitask learning algorithms.

Keywords: multitask learning, asymmetric squared loss, EMTL-a-PSVM, classification

Procedia PDF Downloads 74
330 Tamper Resistance Evaluation Tests with Noise Resources

Authors: Masaya Yoshikawa, Toshiya Asai, Ryoma Matsuhisa, Yusuke Nozaki, Kensaku Asahi

Abstract:

Recently, side-channel attacks, which estimate secret keys using side-channel information such as power consumption and compromising emanations of cryptography circuits embedded in hardware, have become a serious problem. In particular, electromagnetic analysis attacks against cryptographic circuits between information processing and electromagnetic fields, which are related to secret keys in cryptography circuits, are the most threatening side-channel attacks. Therefore, it is important to evaluate tamper resistance against electromagnetic analysis attacks for cryptography circuits. The present study performs basic examination of the tamper resistance of cryptography circuits using electromagnetic analysis attacks with noise resources.

Keywords: tamper resistance, cryptographic circuit, hardware security evaluation, noise resources

Procedia PDF Downloads 458
329 Plastic Strain Accumulation Due to Asymmetric Cyclic Loading of Zircaloy-2 at 400°C

Authors: R. S. Rajpurohit, N. C. Santhi Srinivas, Vakil Singh

Abstract:

Asymmetric stress cycling leads to accumulation of plastic strain which is called as ratcheting strain. The problem is generally associated with nuclear fuel cladding materials used in nuclear power plants and pressurized pipelines. In the present investigation, asymmetric stress controlled fatigue tests were conducted with three different parameters namely, mean stress, stress amplitude and stress rate (keeping two parameters constant and varying third parameter) to see the plastic strain accumulation and its effect on fatigue life and deformation behavior of Zircaloy-2 at 400°C. The tests were conducted with variable mean stress (45-70 MPa), stress amplitude (95-120 MPa) and stress rate (30-750 MPa/s) and tested specimens were characterized using transmission and scanning electron microscopy. The experimental results show that with the increase in mean stress and stress amplitude, the ratcheting strain accumulation increases with reduction in fatigue life. However, increase in stress rate leads to improvement in fatigue life of the material due to small ratcheting strain accumulation. Fractographs showed a decrease in area fraction of fatigue failed region.

Keywords: asymmetric cyclic loading, ratcheting fatigue, mean stress, stress amplitude, stress rate, plastic strain

Procedia PDF Downloads 224
328 Hydrogen-Fueled Micro-Thermophotovoltaic Power Generator: Flame Regimes and Flame Stability

Authors: Hosein Faramarzpour

Abstract:

This work presents the optimum operational conditions for a hydrogen-based micro-scale power source, using a verified mathematical model including fluid dynamics and reaction kinetics. Thereafter the stable operational flame regime is pursued as a key factor in optimizing the design of micro-combustors. The results show that with increasing velocities, four H2 flame regimes develop in the micro-combustor, namely: 1) periodic ignition-extinction regime, 2) steady symmetric regime, 3) pulsating asymmetric regime, and 4) steady asymmetric regime. The first regime that appears in 0.8 m/s inlet velocity is a periodic ignition-extinction regime which is characterized by counter flows and tulip-shape flames. For flow velocity above 0.2 m/s, the flame shifts downstream, and the combustion regime switches to a steady symmetric flame where temperature increases considerably due to the increased rate of incoming energy. Further elevation in flow velocity up to 1 m/s leads to the pulsating asymmetric flame formation, which is associated with pulses in various flame properties such as temperature and species concentration. Further elevation in flow velocity up to 1 m/s leads to the pulsating asymmetric flame formation, which is associated with pulses in various flame properties such as temperature and species concentration. Ultimately, when the inlet velocity reached 1.2 m/s, the last regime was observed, and a steady asymmetric regime appeared.

Keywords: thermophotovoltaic generator, micro combustor, micro power generator, combustion regimes, flame dynamic

Procedia PDF Downloads 44
327 Paraplegic Dimensions of Asymmetric Warfare: A Strategic Analysis for Resilience Policy Plan

Authors: Sehrish Qayyum

Abstract:

In this age of constant technology, asymmetrical warfare could not be won. Attuned psychometric study confirms that screaming sometimes is more productive than active retaliation against strong adversaries. Asymmetric warfare is a game of nerves and thoughts with least vigorous participation for large anticipated losses. It creates the condition of paraplegia with partial but permanent immobility, which effects the core warfare operations, being screams rather than active retaliation. When one’s own power is doubted, it gives power to one’s own doubt to ruin all planning either done with superlative cost-benefit analysis. Strategically calculated estimation of asymmetric warfare since the early WWI to WWII, WWII-to Cold War, and then to the current era in three chronological periods exposits that courage makes nations win the battle of warriors to battle of comrades. Asymmetric warfare has been most difficult to fight and survive due to unexpectedness and being lethal despite preparations. Thoughts before action may be the best-assumed strategy to mix Regional Security Complex Theory and OODA loop to develop the Paraplegic Resilience Policy Plan (PRPP) to win asymmetric warfare. PRPP may serve to control and halt the ongoing wave of terrorism, guerilla warfare, and insurgencies, etc. PRPP, along with a strategic work plan, is based on psychometric analysis to deal with any possible war condition and tactic to save millions of innocent lives such that lost in Christchurch New Zealand in 2019, November 2015 Paris attacks, and Berlin market attacks in 2016, etc. Getting tangled into self-imposed epistemic dilemmas results in regret that becomes the only option of performance. It is a descriptive psychometric analysis of war conditions with generic application of probability tests to find the best possible options and conditions to develop PRPP for any adverse condition possible so far. Innovation in technology begets innovation in planning and action-plan to serve as a rheostat approach to deal with asymmetric warfare.

Keywords: asymmetric warfare, psychometric analysis, PRPP, security

Procedia PDF Downloads 97
326 Mathematical Model of a Compound Gear Pump

Authors: Hsueh-Cheng Yang

Abstract:

The generation and design of compound involute spur gearings can be used in gear pump. A compound rack cutter with asymmetric involute teeth is presented for determining the mathematical model of compound gear pumps. This paper covers the following topics: (a) generation and geometry of compound rack cutter is presented and used to generate a compound gear and a compound pinion. (b) Based on the developed compound gears, stress analysis was performed for the symmetric gears and the asymmetric gears. Comparing the results of the stress analysis for the asymmetric involute teeth is superior to the symmetric involute teeth. A numerical example that illustrates the developed compound rack cutter is represented.

Keywords: compound, involute teeth, gear pump, rack cutter

Procedia PDF Downloads 333
325 Asymmetric Linkages Between Global Sustainable Index (Green Bond) and Cryptocurrency Markets with Portfolio Implications

Authors: Faheem Ur Rehman, Muhammad Khalil Khan, Miao Qing

Abstract:

This study investigated the asymmetric links and portfolio strategies between green bonds and the markets of three different cryptocurrencies, i.e., green, Islamic, and conventional, using data from January 1, 2018, to April 8, 2022, and employing asymmetric TVP-VAR model to quantify risk spillovers in the network analysis. In addition, we use the minimum variance, minimum correlation, and minimum connectedness methodologies to assess the portfolio implications. The results of the asymmetric dynamic connectedness index (TCI) model show that by adopting cryptocurrencies for digital finance, risk spillovers are found to be reduced. The findings of net directional connectedness demonstrate that during the study period, green bonds consistently get return spillovers from all other network variables. Positive return spillovers are bigger in magnitude than negative ones. These results imply that the influence of the green bond market on the cryptocurrency markets is decreasing. Positive return spillovers generate higher connectedness values for (HG, BNB, and TRX) coins and persistent net recipients in the specific network. On the other hand, Cardano and ADA coins are persistent net transmitters in the system. XLM and MIOTA's responsibilities shift over time, and there is evidence of asymmetry when both positive and negative returns are considered. According to the pairwise portfolio weights, BNB vs. BTC has the largest portfolio weights in the system, followed by BNB vs. Ethereum, suggesting the best investment strategies in the network.

Keywords: asymmetric TVP-VAR, global sustainable index, cryptocurrency, portfolios

Procedia PDF Downloads 36
324 Implementation of Elliptic Curve Cryptography Encryption Engine on a FPGA

Authors: Mohamad Khairi Ishak

Abstract:

Conventional public key crypto systems such as RSA (Ron Rivest, Adi Shamir and Leonard Adleman), DSA (Digital Signature Algorithm), and Elgamal are no longer efficient to be implemented in the small, memory constrained devices. Elliptic Curve Cryptography (ECC), which allows smaller key length as compared to conventional public key crypto systems, has thus become a very attractive choice for many applications. This paper describes implementation of an elliptic curve cryptography (ECC) encryption engine on a FPGA. The system has been implemented in 2 different key sizes, which are 131 bits and 163 bits. Area and timing analysis are provided for both key sizes for comparison. The crypto system, which has been implemented on Altera’s EPF10K200SBC600-1, has a hardware size of 5945/9984 and 6913/9984 of logic cells for 131 bits implementation and 163 bits implementation respectively. The crypto system operates up to 43 MHz, and performs point multiplication operation in 11.3 ms for 131 bits implementation and 14.9 ms for 163 bits implementation. In terms of speed, our crypto system is about 8 times faster than the software implementation of the same system.

Keywords: elliptic curve cryptography, FPGA, key sizes, memory

Procedia PDF Downloads 273
323 Pythagorean-Platonic Lattice Method for Finding all Co-Prime Right Angle Triangles

Authors: Anthony Overmars, Sitalakshmi Venkatraman

Abstract:

This paper presents a method for determining all of the co-prime right angle triangles in the Euclidean field by looking at the intersection of the Pythagorean and Platonic right angle triangles and the corresponding lattice that this produces. The co-prime properties of each lattice point representing a unique right angle triangle are then considered. This paper proposes a conjunction between these two ancient disparaging theorists. This work has wide applications in information security where cryptography involves improved ways of finding tuples of prime numbers for secure communication systems. In particular, this paper has direct impact in enhancing the encryption and decryption algorithms in cryptography.

Keywords: Pythagorean triples, platonic triples, right angle triangles, co-prime numbers, cryptography

Procedia PDF Downloads 183
322 Finite Elemental Simulation of the Combined Process of Asymmetric Rolling and Plastic Bending

Authors: A. Pesin, D. Pustovoytov, M. Sverdlik

Abstract:

Traditionally, the need in items represents a large body of rotation (e.g. shrouds of various process units: a converter, a mixer, a scrubber, a steel ladle and etc.) is satisfied by using them at engineering enterprises. At these enterprises large parts of bodies of rotation are made on stamping units or bending and forming machines. In Nosov Magnitogorsk State Technical University in alliance with JSC "Magnitogorsk Metal and Steel Works" there was suggested and implemented the technology for producing such items based on a combination of asymmetric rolling processes and plastic bending under conditions of the plate mill. In this paper, based on finite elemental mathematical simulation in technology of a combined process of asymmetric rolling and bending plastic has been improved. It is shown that for the same curvature along the entire length of the metal sheet it is necessary to introduce additional asymmetry speed when rolling front end and tape trailer. Production of large bodies of rotation at mill 4500 JSC "Magnitogorsk Metal and Steel Works" showed good convergence of theoretical and experimental values of the curvature of the metal. Economic effect obtained more than 1.0 million dollars.

Keywords: asymmetric rolling, plastic bending, combined process, FEM

Procedia PDF Downloads 277