• Title/Summary/Keyword: direct attack

Search Result 136, Processing Time 0.022 seconds

An Improved Pseudorandom Sequence Generator and its Application to Image Encryption

  • Sinha, Keshav;Paul, Partha;Amritanjali, Amritanjali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.4
    • /
    • pp.1307-1329
    • /
    • 2022
  • This paper proposes an improved Pseudorandom Sequence Generator (PRSG) based on the concept of modular arithmetic systems with non-integral numbers. The generated random sequence use in various cryptographic applications due to its unpredictability. Here the mathematical model is designed to solve the problem of the non-uniform distribution of the sequences. In addition, PRSG has passed the standard statistical and empirical tests, which shows that the proposed generator has good statistical characteristics. Finally, image encryption has been performed based on the sort-index method and diffusion processing to obtain the encrypted image. After a thorough evaluation of encryption performance, there has been no direct association between the original and encrypted images. The results show that the proposed PRSG has good statistical characteristics and security performance in cryptographic applications.

Phishing Email Detection Using Machine Learning Techniques

  • Alammar, Meaad;Badawi, Maria Altaib
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.277-283
    • /
    • 2022
  • Email phishing has become very prevalent especially now that most of our dealings have become technical. The victim receives a message that looks as if it was sent from a known party and the attack is carried out through a fake cookie that includes a phishing program or through links connected to fake websites, in both cases the goal is to install malicious software on the user's device or direct him to a fake website. Today it is difficult to deploy robust cybersecurity solutions without relying heavily on machine learning algorithms. This research seeks to detect phishing emails using high-accuracy machine learning techniques. using the WEKA tool with data preprocessing we create a proposed methodology to detect emails phishing. outperformed random forest algorithm on Naïve Bayes algorithms by accuracy of 99.03 %.

Improved Flyweight RFID Authentication Protocol

  • Vallent, Thokozani Felix;Yoon, Eun-Jun;Kim, Hyunsung
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.1 no.2
    • /
    • pp.95-105
    • /
    • 2012
  • The widespread implementation of RFID in ubiquitous computing is constrained considerably by privacy and security unreliability of the wireless communication channel. This failure to satisfy the basic, security needs of the technology has a direct impact of the limited computational capability of the tags, which are essential for the implementation of RFID. Because the universal application of RFID means the use of low cost tags, their security is limited to lightweight cryptographic primitives. Therefore, EPCGen2, which is a class of low cost tags, has the enabling properties to support their communication protocols. This means that satisfying the security needs of EPCGen2 could ensure low cost security because EPCGen2 is a class of low cost, passive tags. In that way, a solution to the hindrance of low cost tags lies in the security of EPCGen2. To this effect, many lightweight authentication protocols have been proposed to improve the privacy and security of communication protocols suitable for low cost tags. Although many EPCgen2 compliant protocols have been proposed to ensure the security of low cost tags, the optimum security has not been guaranteed because many protocols are prone to well-known attacks or fall short of acceptable computational load. This paper proposes a remedy protocol to the flyweight RFID authentication protocol proposed by Burmester and Munilla against a desynchronization attack. Based on shared pseudorandom number generator, this protocol provides mutual authentication, anonymity, session unlinkability and forward security in addition to security against a desynchronization attack. The desirable features of this protocol are efficiency and security.

  • PDF

Influence of Fungicidal Spray on Powdery Mildew Epidemics and Major Yield-Attributing Characters of Mungbean

  • Saxen, Deep-Ratna;Moly Saxena
    • The Plant Pathology Journal
    • /
    • v.18 no.2
    • /
    • pp.68-73
    • /
    • 2002
  • The influence of fungicidal spray was assessed on powdery mildew epidemics caused by Erysiphe polygoni D.C. and on yield-attributing characters of mungbean [Vigna radiata (L.) Wilczek]. Mildew attack adversely affected the yield-attributing characters of mungbean and exhibited negative significant correlation with pod length (-0.57), pods/plant (-0.74), pod weight (-0.68), 100 seeds weight (-0.69), 100 seeds swell weight (-0.59), and seed germination (-0.71). These characters had direct or indirect effects on grain yield, which was also adversely affected due to mildew attack (-0.89). Powdery mildew was significantly retarded due to the single spray of carbendazim (0.05%) at 30-day-old crop, where the apparent rate of infection (r) was minimum at 0.0095/ unit/day and with low (11.44%) powdery mildew intensity. Other fungicides like tridemorph (0.075%) and penconazole (0.05%) were equally effective against the mildew disease where the disease intensity was less than 20% and the values of r were 0.0134 and 0.039/unit/day respectively, as compared with the control at 0.267/unit/day. Fungicide spray influenced the yield-attributing characters besides controlling the disease. Such effects were more pronounced in carbendazim (0.05%)-treated plots due to its phytotonic nature where pod length (7.59cm), pods/plant (29.75), pod weight (8.16 g), 100 grain weight (3.94 g), and swell weight of 100 seed (9.49 g) were maximum resulting to the highest yield (480 kg/ha) as compared with that of control (224 kg/ha). Spray of carbendazim also improved seed germination (74.5%). Spray of other fungicides like carbendazim with copper oxychloride in 1:1 ratio, tridemorph (0.075%), and penconazole (0.05%) was equally effective against powdery mildew of mungbean. These fungicides also exhibited positive effects on yield-attributing characters of the crop and finally increased yield. These systemic fungicides were more effective in controlling powdery mildew disease of V. radiata in the rainy season compared with wettable sulphur.

Complete A-V Block 3 Months after Total Correction of Tetralogy of Fallot (활로 4징증의 근치수술후의 원격 방실전도 차단)

  • 송요준
    • Journal of Chest Surgery
    • /
    • v.11 no.3
    • /
    • pp.326-332
    • /
    • 1978
  • There appears some conduction defects frequently after total correction of Tetralogy of Fallot. Common defect is right bundle branch block due to surgical intervention. We experienced complete A-V block which occured 3 months later after total correction of Tetralogy of Fallot in a 8 year old boy. The patient was completely free of any A-V block after the operation for 3 months, and sudden onset of A-V block with coupled premature ventricular contractions resulted him in shock state during the attack of severe bronchopneumonia for 4 days prior to the second visit. Emergency implantation of Cordis demand type temporary pacemaker was necessary to control the complete heart block with bradyarrhythmia and frequent ventricular fibrillation. Permanent cardiac pacemaker was implanted two weeks later as indicated with Cordis Stanicor lambda demand pacemaker, and the patient was discharged uneventfully on the 8th post implantation day with the heart rate of 72/min. Another 3 months after the implantation, the patient was transported to this hospital as dead on arrival after an accidental fall from a 2 meter height, and all possible cardiopulmonary resuscitation was performed for 60 minutes at the emergency room in vain. Autopsy was done to find out the cause of sudden death and the etiology of complete heart block. Microscopic focal infarctions with scar formation were noted along the course of conduction system in the interventricular septum, which might be the main cause of complete heart block during the attack of severe bronchopneumonia complicated with acute bacterial endocarditis. The tip of the pacemaker wire was slipped from the granulation scar at the apex of the right ventricular cavity, and this might be the direct cause of pacing failure and death.

  • PDF

STM-GOMS Model: A Security Model for Authentication Schemes in Mobile Smart Device Environments (STM-GOMS 모델: 모바일 스마트 기기 환경의 인증 기법을 위한 안전성 분석 모델)

  • Shin, Sooyeon;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1243-1252
    • /
    • 2012
  • Due to the widespread use of smart devices, threats of direct observation attacks such as shoulder surfing and recording attacks, by which user secrets can be stolen at user interfaces, are increasing greatly. Although formal security models are necessary to evaluate the possibility of and security against those attacks, such a model does not exist. In this paper, based on the previous work in which a HCI cognitive model was firstly utilized for analyzing security, we propose STM-GOMS model as an improvement of GOMS-based model with regard to memory limitations. We then apply STM-GOMS model for analyzing usability and security of a password entry scheme commonly used in smart devices and show the scheme is vulnerable to the shoulder-surfing attack. We finally conduct user experiments to show the results that support the validity of STM-GOMS modeling and analysis.

Asymmetric Signal Scanning Scheme to Detect Invasive Attacks (침투 공격 검출을 위한 비대칭 신호 스캐닝 기법)

  • Da Bin Yang;Ga Young Lee;Young-woo Lee
    • Smart Media Journal
    • /
    • v.12 no.1
    • /
    • pp.17-23
    • /
    • 2023
  • Design-For-Security (DFS) methodology is to protect integrated circuits from physical attacks, and that can be implemented by adding a security circuit to detect abnormal external access. Among the abnormal accesses called invasive attack, microprobing and FIB circuit editing are classified as the most powerful methods because they have direct access. Microprobing deliberately inject defects into the wire of circuit through probes, or reads and changes data. FIB circuit editing is methods of reconnecting or destroying circuits to neutralize security circuits or to access data. Previous DFS methodology have responded to the attacks by detecting arrival time asymmetry between the two signals or by comparing input/output data based on encrypted communication. This study conducted to reduce hardware overhead, and the proposed circuit detects the reflected signal asymmetry generated through probe or FIB circuit editing and detects the attacks through comparison. Since the proposed security circuit reduces the size and test cycle of the circuit compared to previous studies, the cost used for security can be reduced.

Aerodynamic control capability of a wing-flap in hypersonic, rarefied regime: Part II

  • Zuppardi, Gennaro;Vangone, Daniele
    • Advances in aircraft and spacecraft science
    • /
    • v.4 no.5
    • /
    • pp.503-514
    • /
    • 2017
  • The attitude control of an aircraft is usually fulfilled by means of thrusters at high altitudes. Therefore, the possibility of using also aerodynamic surfaces would produce the advantage of reducing the amount of fuel for the thrusters to be loaded on board. For this purpose, Zuppardi already considered some aerodynamic problems linked to the use of a wing flap in a previous paper. A NACA 0010 airfoil with a trailing edge flap of 35% of the chord, in the range of angle of attack 0-40 deg and flap deflections up to 30 deg was investigated. Computer tests were carried out in hypersonic, rarefied flow by a direct simulation Monte Carlo code at the altitudes of 65 and 85 km of Earth Atmosphere. The present work continues this subject, considering the same airfoil and free stream conditions but two flap extensions of 45% and 25% of the chord and two flap deflections of 15 and 30 deg. The main purpose is to compare the influence of the flap dimension with that of the flap deflection. The present analysis is carried out in terms of: 1) percentage variation of the global aerodynamic coefficients with respect to the no-flap configuration, 2) increment of pressure and heat flux on the airfoil lower surface due to the Shock Wave-Shock Wave Interaction (SWSWI) with respect to the same quantities with no SWSWI or in no-flap configuration, 3) flap hinge moment. Issues 2) and 3) are important for the design of the mechanical and thermal protection system and of the flap actuator, respectively. Under the above mentioned test and geometrical conditions, the flap deflection is aerodynamically more effective than the flap extension, because it involves higher variation of the aerodynamic coefficients. However, tests verify that a smaller deflection angle involves the advantage of a smaller increment of pressure and heat flux on the airfoil lower surface, due to SWSWI, as well as a smaller hinge moment.

Congenital Hypoplasia of Internal Carotid Artery Accompanying with Cerebral Aneurysms

  • Baek, Geum-Seong;Koh, Eun-Jeong;Lee, Woo-Jong;Choi, Ha-Young
    • Journal of Korean Neurosurgical Society
    • /
    • v.41 no.5
    • /
    • pp.343-346
    • /
    • 2007
  • Hypoplasia of the internal carotid artery is a rare congenital anomaly. Agenesis, aplasia, and hypoplasia of the internal carotid artery [ICA] are frequently associated with cerebral aneurysms in the circle of Willis. Authors report two cases with congenital hypoplasia of the ICA accompanying with the aneurysms. Transfemoral cerebral angiography [TFCA] in one patient identified nonvisualization of the left ICA. Bilateral anterior cerebral artery [ACA] and middle cerebral artery [MCA] were supplied from the right ICA accompanying with two aneurysms at anterior communicating artery [AcoA] and A1 portion of the left ACA. TFCA in another patient demonstrated hypoplastic left ICA and left ACA filled from the right ICA accompanying with AcoA aneurysm. Left MCA was filled from basilar artery via posterior communicating artery [PcoA]. Skull base computed tomography [CT] in two patients showed hypoplastic carotid canal. Authors performed direct aneurysmal neck clipping. Follow up CT angiography [CTA] at one year after surgery did not show regrowth or new development of the aneurysm. In patients with hypoplastic ICA, neurosurgeons should be aware of the possibility of development of the aneurysms, presumably because of hemodynamic process. Direct aneurysmal neck clipping is a good treatment modality. After operation, regular CTA, magnetic resonance angiography [MRA] or TFCA is needed to find progressive lesion and to prevent cerebrovascular attack [CVA].

Mutagenicity and Antimutagenicity of Hydrophilic and Lipophilic Extracts of Thai Northern Purple Rice

  • Punvittayagul, Charatda;Sringarm, Korawan;Chaiyasut, Chaiyawat;Wongpoomchai, Rawiwan
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.21
    • /
    • pp.9517-9522
    • /
    • 2014
  • Purple rice (Oryza sativa L. var. indica) cv. Kum Doisaket is cultivated in northern Thailand. This study evaluated the mutagenic and antimutagenic properties of hydrophilic and lipophilic components of purple rice using the Ames test. The seed and hull of purple rice were extracted with hexane, methanol, ethanol, and water. The methanol extracts had the highest amounts of phenolic acids and flavonoids, while the hexane extracts contained large amount of tocols and ${\gamma}$-oryzanol. None of the extracts were mutagenic in Salmonella typhimurium strains TA98 and TA100. The hexane extract of rice hull and the methanol extract of rice seed were strongly effective against aflatoxin B1- and 2-amino-3, 4 dimethylimidazo (4, 5-f) quinoline-induced mutagenesis, while aqueous extracts showed weakly antimutagenic properties. All extracts with the exception of aqueous extracts enhanced the number of revertant colonies from benzo (a) pyrene induced-mutagenesis. None of the extracts inhibited mutagenesis induced by the direct mutagens 2-(2-furyl)-3-(5-nitro-2-furyl)-acrylamide and sodium azide. The hull extracts showed more potent antimutagenicity than the seed extracts. Based on a chemical analysis, ${\gamma}$-oryzanol and ${\gamma}$-tocotrienol in the hull and cyanidin-3-glucoside and peonidin-3-glucoside in the seed are candidate antimutagens in purple rice. The antimutagenic mechanisms of purple rice might be related to either modulation of mutagen metabolizing enzymes or direct attack on electrophiles. These findings supported the use of Thai purple rice as a cancer chemopreventive agent.