554 research outputs found

    Resolution of Linear Algebra for the Discrete Logarithm Problem Using GPU and Multi-core Architectures

    Get PDF
    In cryptanalysis, solving the discrete logarithm problem (DLP) is key to assessing the security of many public-key cryptosystems. The index-calculus methods, that attack the DLP in multiplicative subgroups of finite fields, require solving large sparse systems of linear equations modulo large primes. This article deals with how we can run this computation on GPU- and multi-core-based clusters, featuring InfiniBand networking. More specifically, we present the sparse linear algebra algorithms that are proposed in the literature, in particular the block Wiedemann algorithm. We discuss the parallelization of the central matrix--vector product operation from both algorithmic and practical points of view, and illustrate how our approach has contributed to the recent record-sized DLP computation in GF(28092^{809}).Comment: Euro-Par 2014 Parallel Processing, Aug 2014, Porto, Portugal. \<http://europar2014.dcc.fc.up.pt/\&gt

    Assessing the Role of Water Users Associations in Operating and Maintaining the Improved Irrigation System in Egypt

    Get PDF
    The current study investigated the influence of Water Users Associations (WUAs) in the operation and the maintenance of the facilities of improved areas in Egypt. With the establishment of irrigation improvement projects, it was planned that WUAs would play an important role in improving water management and ensuring the sustainability of the improved system through enhancing the cooperation between farmers, scheduling the irrigation and maintaining the improved Mesqas (distributaries). The current study aims to check the actual situation after the implementation of irrigation improvement projects through collecting data from samples according to design questionnaires in the improved areas, and analyzing the collected data to investigate the influence of these associations. The results showed that the influence of WUAs in Egypt was still very limited. Irrigation practices were close to the old trend, which was targeting by irrigation improvement projects. The improved system was operated based on the natural relationships between farmers, with no predefined irrigation schedule targeting improving water management. The operator was the main person, and his role was just to arrange the irrigation based on the reservation of the farmers. Old lifting points were still used in the new system. This gave the farmers the chance to work individually, which could decrease the direct conflicts between them, but it had negative impact on water use efficiency. The maintenance of the system was poor, and the target was just to make the system work without considering the sustainability of the system. The study discussed the reasons behind the weak influence of WUAs including the characteristics of such organizations and different factors that affect their performance. In addition, the study suggested the required steps to improve the capacities of these organizations and to enhance the coordination between farmers including the precise distribution of water supply, and the support from the government

    EFFECT OF IRRIGATION SYSTEMS IMPROVEMENT ON WATER UNIT PRODUCTIVITY UNDER NORTH DELTA REGION CONDITIONS OF EGYPT

    Get PDF
    Several field trials and laboratory studies were conducted to evaluate the impact of the implementation of the activities and processes of the development of the field irrigation systems at ElMahmoudia area, El-Beheira Governorate, Egypt, during the successful growing seasons winter 2016/17 and summer 2017 to investigate the effect of irrigation systems improvement projects on water productivity. The measurements were conducted in a tertiary canal (Mesqa) at the head of Nekla canal (Arafa Mousa Mesqa). Water consumption values for different crops were calcaulated, and water application was calculated through calibrating the capacities of the pumps and recording the operation hours. The most important results were as follows: Applied irrigation water decreased after irrigation improvement. Applied irrigation water for wheat, rice, maize, sweet potatoes and watermelon before irrigation improvement were higher than the corresponding values after irrigation improvement by 9.0%, 15%, 11%, 15% and 10% respectively. The productivity of wheat, rice, maize, sweet potatoes and watermelon increased after irrigation improvement by 7.0%, 4.0%, 3.0%, 8.0% and 9.0% respectively. Water productivity increased after irrigation improvement, and the increase ratios for wheat, rice, maize, sweet potatoes were 14.0%, 16.0%, 13.0%, 20.0%, and 18.0% respectively

    Hidden Collisions on DSS

    Full text link

    Dynamic generalized normal distribution optimization for feature selection

    Get PDF
    High dimensionality of data represents a major problem that affects the accuracy of the classification. This problem related with classification is mainly resulted from the availability of irrelevant features. Feature selection represents a solution to a problem by selecting the most informative features and discard the irrelevant features. Generalized normal distribution optimization (GNDO) represents a newly developed optimization that confirmed its outperformance in comparison with well-known optimization algorithms on parameter extraction for photovoltaic models. As an optimization algorithm, however, GNDO suffers from degraded performance when dealing with a problem with a high dimensionality. The main problems of GNDO include exploitation problem by falling into local optima problem. Also, GNDO has solutions diversity problem when it deals with data with high dimensionality. To alleviate the drawbacks of this algorithm and solve feature selection problems, a local search algorithm (LSA) is used. The new algorithm is called dynamic generalized normal distribution optimization (DGNDO), which includes the following main improvements to GNDO: it can improve the best solution to solve the local optima problem, it can improve solution diversity by improving the randomly selected solution, and it can improve both exploration and exploitation combined. To confirm the outperformance and efficiency of the new DGNDO algorithm, DGNDO algorithm is applied on 20 benchmarked datasets from UCI repository of data. In addition, DGNDO algorithm results are compared with seven well-known optimization algorithms using number of evaluation metrics including classification, accuracy, fitness, the number of selected features, statistical results using Wilcoxon test and convergence curves. The obtained results reveal the superiority of DGNDO algorithm over all other competing algorithms

    Encrypted Shared Data Spaces

    Get PDF
    The deployment of Share Data Spaces in open, possibly hostile, environments arises the need of protecting the confidentiality of the data space content. Existing approaches focus on access control mechanisms that protect the data space from untrusted agents. The basic assumption is that the hosts (and their administrators) where the data space is deployed have to be trusted. Encryption schemes can be used to protect the data space content from malicious hosts. However, these schemes do not allow searching on encrypted data. In this paper we present a novel encryption scheme that allows tuple matching on completely encrypted tuples. Since the data space does not need to decrypt tuples to perform the search, tuple confidentiality can be guaranteed even when the data space is deployed on malicious hosts (or an adversary gains access to the host). Our scheme does not require authorised agents to share keys for inserting and retrieving tuples. Each authorised agent can encrypt, decrypt, and search encrypted tuples without having to know other agents’ keys. This is beneficial inasmuch as it simplifies the task of key management. An implementation of an encrypted data space based on this scheme is described and some preliminary performance results are given

    Capture resilient ElGamal signature protocols

    Get PDF
    One of the fundamental problems of public key cryptography is protecting the private key. Private keys are too long to be remembered by the user, and storing them in the device which performs the private key operation is insecure as long as the device is subject to capture. In this paper, we propose server-assisted protocols for the ElGamal signature scheme which make the system capture resilient in the sense that the security of the system is not compromised even if the signature device is captured. The protocols also have a key disabling feature which allows a user to disable the device's private key in case both the device and the password of the user are compromised simultaneously. © Springer-Verlag Berlin Heidelberg 2006

    A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes

    Get PDF
    With their increasing popularity in cryptosystems, biometrics have attracted more and more attention from the information security community. However, how to handle the relevant privacy concerns remains to be troublesome. In this paper, we propose a novel security model to formalize the privacy concerns in biometric-based remote authentication schemes. Our security model covers a number of practical privacy concerns such as identity privacy and transaction anonymity, which have not been formally considered in the literature. In addition, we propose a general biometric-based remote authentication scheme and prove its security in our security model

    Security and Efficiency Analysis of the Hamming Distance Computation Protocol Based on Oblivious Transfer

    Get PDF
    open access articleBringer et al. proposed two cryptographic protocols for the computation of Hamming distance. Their first scheme uses Oblivious Transfer and provides security in the semi-honest model. The other scheme uses Committed Oblivious Transfer and is claimed to provide full security in the malicious case. The proposed protocols have direct implications to biometric authentication schemes between a prover and a verifier where the verifier has biometric data of the users in plain form. In this paper, we show that their protocol is not actually fully secure against malicious adversaries. More precisely, our attack breaks the soundness property of their protocol where a malicious user can compute a Hamming distance which is different from the actual value. For biometric authentication systems, this attack allows a malicious adversary to pass the authentication without knowledge of the honest user's input with at most O(n)O(n) complexity instead of O(2n)O(2^n), where nn is the input length. We propose an enhanced version of their protocol where this attack is eliminated. The security of our modified protocol is proven using the simulation-based paradigm. Furthermore, as for efficiency concerns, the modified protocol utilizes Verifiable Oblivious Transfer which does not require the commitments to outputs which improves its efficiency significantly
    • 

    corecore