6,526 research outputs found
Measured and Simulated Acoustic Signature of a Full-Scale Aircraft with Airframe Noise Reduction Technology Installed
Microphone phased-array and pole-mounted microphone data gathered during the NASA Acoustics Research Measurements flight tests were used to benchmark results from companion full-scale aeroacoustics simulations. Conducted with the lattice Boltzmann solver PowerFLOW, the simulations predicted the acoustic behavior of various tested aircraft configurations. Emphasis was placed on those flown during the third flight test - a Fowler flap-equipped Gulfstream G-III with and without noise abatement technology on the main landing gear. Direct comparisons between experimental and synthetic microphone phasedarray data were achieved by applying the same processing and deconvolution technique to both sets of data. To extend the validation of the computations to the metric used for noise certification, the Effective Perceived Noise Level, a high-fidelity digital model of the nose landing gear, which was excluded from earlier computations, was developed and integrated into the G-III aircraft geometry. The acoustic study presented here demonstrates that the simulated beamform maps and corresponding integrated farfield spectra accurately predict the locations and strengths of the prominent airframe noise sources present on the G-III aircraft
Retrofitting Post-Quantum Cryptography in Internet Protocols:A Case Study of DNSSEC
Quantum computing is threatening current cryptography, especially the asymmetric algorithms used in many Internet protocols. More secure algorithms, colloquially referred to as Post-Quantum Cryptography (PQC), are under active development. These new algorithms differ significantly from current ones. They can have larger signatures or keys, and often require more computational power. This means we cannot just replace existing algorithms by PQC alternatives, but need to evaluate if they meet the requirements of the Internet protocols that rely on them. In this paper we provide a case study, analyzing the impact of PQC on the Domain Name System (DNS) and its Security Extensions (DNSSEC). In its main role, DNS translates human-readable domain names to IP addresses and DNSSEC guarantees message integrity and authenticity. DNSSEC is particularly challenging to transition to PQC, since DNSSEC and its underlying transport protocols require small signatures and keys and efficient validation. We evaluate current candidate PQC signature algorithms in the third round of the NIST competition on their suitability for use in DNSSEC. We show that three algorithms, partially, meet DNSSEC’s requirements but also show where and how we would still need to adapt DNSSEC. Thus, our research lays the foundation for making DNSSEC, and protocols with similar constraints ready for PQC
Reactive control and reasoning assistance for scientific laboratory instruments
Scientific laboratory instruments that are involved in chemical or physical sample identification frequently require substantial human preparation, attention, and interactive control during their operation. Successful real-time analysis of incoming data that supports such interactive control requires: (1) a clear recognition of variance of the data from expected results; and (2) rapid diagnosis of possible alternative hypotheses which might explain the variance. Such analysis then aids in decisions about modifying the experiment protocol, as well as being a goal itself. This paper reports on a collaborative project at the NASA Ames Research Center between artificial intelligence researchers and planetary microbial ecologists. Our team is currently engaged in developing software that autonomously controls science laboratory instruments and that provides data analysis of the real-time data in support of dynamic refinement of the experiment control. the first two instruments to which this technology has been applied are a differential thermal analyzer (DTA) and a gas chromatograph (GC). coupled together, they form a new geochemicstry and microbial analysis tool that is capable of rapid identification of the organiz and mineralogical constituents in soils. The thermal decomposition of the minerals and organics, and the attendance release of evolved gases, provides data about the structural and molecular chemistry of the soil samples
Practices of Using Blockchain Technology in ICT under the Digitalization of the World Economy
Abstract. Pursuing the purpose of effective functioning in today's conditions, the business is forced to transform rapidly, to modernize at all levels. The world
is changing, erasing the limits of its certainty. Companies need quality transformations and strategies that are effective in the face of rapid change towards
"deep" digitization. Massive corporate management systems increasingly need the flexibility to keep pace with change. And companies with an innovative culture
are more in need of creative tasks than implementing detailed regulations.
In the post-industrial time of digital economy, issues related to the development
of the information sphere, the media and communications, the usage of modern
information systems to develop the economy and stabilize social development
as a whole, come first. The basic principles of practical application of Blockchain
are investigated in the work. The stages of development of Blockchain
technology, the stages of development of Blockchain technologies by time, the
application of distributed registry technology in Blockchain applications, the
principles of construction and operation of Blockchain have been specified. The
benefits of using NEM for business are substantiated and the components of
Proxima X technology, protocols and service layers, on-line and off-line protocols,
decentralized applications are exposed
Recommended from our members
Post-quantum blockchain for internet of things domain
This thesis was submitted for the award of Doctor of Philosophy and was awarded by Brunel University LondonIn the evolving realm of quantum computing, emerging advancements reveal substantial challenges and threats to existing cryptographic infrastructures, particularly impacting blockchain technologies. These are pivotal for securing the Internet of Things (IoT) ecosystems. The traditional blockchain structures, integral to myriad IoT applications, are susceptible to potential quantum computations, emphasizing an urgent need for innovations in post-quantum blockchain solutions to reinforce security in the expansive domain of IoT.
This PhD thesis delves into the crucial exploration and meticulous examination of the development and implementation of post-quantum blockchain within the IoT landscape, focusing on the incorporation of advanced post-quantum cryptographic algorithms in Hyperledger Fabric, a forefront blockchain platform renowned for its versatility and robustness. The primary aim is to discern viable post-quantum cryptographic solutions capable of fortifying blockchain systems against impending quantum threats enhancing security and reliability in IoT applications.
The research comprehensively evaluates various post-quantum public-key generation and digital signature algorithms, performing detailed analyses of their computational time and memory usage to identify optimal candidates. Furthermore, the thesis proposes an innovative lattice-based digital signature scheme Fast-Fourier Lattice-based Compact Signature over NTRU (Falcon), which leverages the Monte Carlo Markov Chain (MCMC) algorithm as a trapdoor sampler to augment its security attributes.
The research introduces a post-quantum version of the Hyperledger Fabric blockchain that integrates post-quantum signatures. The system utilizes the Open Quantum Safe (OQS) library, rigorously tested against NIST round 3 candidates for optimal performance. The study highlights the capability to manage IoT data securely on the post-quantum Hyperledger Fabric blockchain through the Message Queue Telemetry Transport (MQTT) protocol. Such a configuration ensures safe data transfer from IoT sensors directly to the blockchain nodes, securing the processing and recording of sensor data within the node ledger. The research addresses the multifaceted challenges of quantum computing advancements and significantly contributes to establishing secure, efficient, and resilient post-quantum blockchain infrastructures tailored explicitly for the IoT domain. These findings are instrumental in elevating the security paradigms of IoT systems against quantum vulnerabilities and catalysing innovations in post-quantum cryptography and blockchain technologies.
Furthermore, this thesis introduces strategies for the optimization of performance and scalability of post-quantum blockchain solutions and explores alternative, energy-efficient consensus mechanisms such as the Raft and Stellar Consensus Protocol (SCP), providing sustainable alternatives to the conventional Proof-of-Work (PoW) approach.
A critical insight emphasized throughout this thesis is the imperative of synergistic collaboration among academia, industry, and regulatory bodies. This collaboration is pivotal to expedite the adoption and standardization of post-quantum blockchain solutions, fostering the development of interoperable and standardized technologies enriched with robust security and privacy frameworks for end users.
In conclusion, this thesis furnishes profound insights and substantial contributions to implementing post-quantum blockchain in the IoT domain. It delineates original contributions to the knowledge and practices in the field, offering practical solutions and advancing the state-of-the-art in post-quantum cryptography and blockchain research, thereby paving the way for a secure and resilient future for interconnected IoT systems
Double Public Key Signing Function Oracle Attack on EdDSA Software Implementations
EdDSA is a standardised elliptic curve digital signature scheme introduced to
overcome some of the issues prevalent in the more established ECDSA standard.
Due to the EdDSA standard specifying that the EdDSA signature be deterministic,
if the signing function were to be used as a public key signing oracle for the
attacker, the unforgeability notion of security of the scheme can be broken.
This paper describes an attack against some of the most popular EdDSA
implementations, which results in an adversary recovering the private key used
during signing. With this recovered secret key, an adversary can sign arbitrary
messages that would be seen as valid by the EdDSA verification function. A list
of libraries with vulnerable APIs at the time of publication is provided.
Furthermore, this paper provides two suggestions for securing EdDSA signing
APIs against this vulnerability while it additionally discusses failed attempts
to solve the issue
- …