189 research outputs found

    A Machine-Checked Formalization of the Generic Model and the Random Oracle Model

    Get PDF
    Most approaches to the formal analyses of cryptographic protocols make the perfect cryptography assumption, i.e. the hypothese that there is no way to obtain knowledge about the plaintext pertaining to a ciphertext without knowing the key. Ideally, one would prefer to rely on a weaker hypothesis on the computational cost of gaining information about the plaintext pertaining to a ciphertext without knowing the key. Such a view is permitted by the Generic Model and the Random Oracle Model which provide non-standard computational models in which one may reason about the computational cost of breaking a cryptographic scheme. Using the proof assistant Coq, we provide a machine-checked account of the Generic Model and the Random Oracle Mode

    A CFD validation roadmap for hypersonic flows

    Get PDF
    A roadmap for computational fluid dynamics (CFD) code validation is developed. The elements of the roadmap are consistent with air-breathing vehicle design requirements and related to the important flow path components: forebody, inlet, combustor, and nozzle. Building block and benchmark validation experiments are identified along with their test conditions and measurements. Based on an evaluation criteria, recommendations for an initial CFD validation data base are given and gaps identified where future experiments would provide the needed validation data

    The Security of Elliptic Curve Cryptosystems - A Survey

    Get PDF
    Elliptic curve cryptography or ECC is a public-key cryptosystem. This paper introduces ECC and describes its present applications. A mathematical background is given initially. Then its2019; major cryptographic uses are given. These include its2019; use in encryption, key sharing and digital signatures. The security of these ECC-based cryptosystems are discussed. It was found that ECC was well suited for low-power and resource constrained devices because of its2019; small key size

    OpenDSU: Digital Sovereignty in PharmaLedger

    Full text link
    Distributed ledger networks, chiefly those based on blockchain technologies, currently are heralding a next generation of computer systems that aims to suit modern users' demands. Over the recent years, several technologies for blockchains, off-chaining strategies, as well as decentralised and respectively self-sovereign identity systems have shot up so fast that standardisation of the protocols is lagging behind, severely hampering the interoperability of different approaches. Moreover, most of the currently available solutions for distributed ledgers focus on either home users or enterprise use case scenarios, failing to provide integrative solutions addressing the needs of both. Herein we introduce the OpenDSU platform that allows to interoperate generic blockchain technologies, organised - and possibly cascaded in a hierarchical fashion - in domains. To achieve this flexibility, we seamlessly integrated a set of well conceived OpenDSU components to orchestrate off-chain data with granularly resolved and cryptographically secure access levels that are nested with sovereign identities across the different domains. Employing our platform to PharmaLedger, an inter-European network for the standardisation of data handling in the pharmaceutical industry and in healthcare, we demonstrate that OpenDSU can cope with generic demands of heterogeneous use cases in both, performance and handling substantially different business policies. Importantly, whereas available solutions commonly require a pre-defined and fixed set of components, no such vendor lock-in restrictions on the blockchain technology or identity system exist in OpenDSU, making systems built on it flexibly adaptable to new standards evolving in the future.Comment: 18 pages, 8 figure

    The Security of Elliptic Curve Cryptosystems - A Survey

    Get PDF
    Elliptic curve cryptography or ECC is a public-key cryptosystem. This paper introduces ECC and describes its present applications. A mathematical background is given initially. Then itsā€™ major cryptographic uses are given. These include itsā€™ use in encryption, key sharing and digital signatures. The security of these ECC-based cryptosystems are discussed. It was found that ECC was well suited for low-power and resource constrained devices because of itsā€™ small key size
    • ā€¦
    corecore