5,141 research outputs found

    Conjugative transfer frequencies of mef(A)-containing Tn1207.3 to macrolide-susceptible Streptococcus pyogenes belonging to different emm types

    Get PDF
    The aim of this study was to examine the gene transfer potential of mef(A)-containing Tn120.3 to macrolide-susceptible Streptococcus pyogenes belonging to different emm types. Using the filter mating technique, Tn1207.3 was transferred by conjugation to 23 macrolide-susceptible recipients representing 11 emm types. PCR analysis confirmed the presence of the mef(A) gene and the comEC junction regions of the Tn1207.3 insertion in resultant transconjugants. Significant variation was found in the transfer frequency of Tn1207.3 to different Strep. pyogenes strains, and this phenomenon may contribute to the differences in mef(A) frequency observed among clinical isolates. Significance and Impact of the Study: The spread of antimicrobial resistance among pathogenic bacteria is an important problem, but the mechanisms of horizontal transfer between strains and species are often poorly understood. For instance, little is known on how macrolide resistance spreads between strains of the human pathogen Strep. pyogenes and why certain strains more commonly display resistance than others. Here, we show that Strep. pyogenes strains vary greatly in their ability to acquire a transposon encoding macrolide resistance by horizontal gene transfer in vitro. These data provide a novel insight into the transfer of antibiotic resistance between bacterial strains and offer an explanation for the differences in the frequency of resistance determinates and resistance seen among clinical isolates. © 2014 The Authors Letters in Applied Microbiology

    A geometric view of cryptographic equation solving

    Get PDF
    This paper considers the geometric properties of the Relinearisation algorithm and of the XL algorithm used in cryptology for equation solving. We give a formal description of each algorithm in terms of projective geometry, making particular use of the Veronese variety. We establish the fundamental geometrical connection between the two algorithms and show how both algorithms can be viewed as being equivalent to the problem of finding a matrix of low rank in the linear span of a collection of matrices, a problem sometimes known as the MinRank problem. Furthermore, we generalise the XL algorithm to a geometrically invariant algorithm, which we term the GeometricXL algorithm. The GeometricXL algorithm is a technique which can solve certain equation systems that are not easily soluble by the XL algorithm or by Groebner basis methods

    Re-Inventing Public Education:The New Role of Knowledge in Education Policy-Making

    Get PDF
    This article focuses on the changing role of knowledge in education policy making within the knowledge society. Through an examination of key policy texts, the Scottish case of Integrated Children Services provision is used to exemplify this new trend. We discuss the ways in which knowledge is being used in order to re-configure education as part of a range of public services designed to meet individuals' needs. This, we argue, has led to a 'scientization' of education governance where it is only knowledge, closely intertwined with action (expressed as 'measures') that can reveal problems and shape solutions. The article concludes by highlighting the key role of knowledge policy and governance in orienting education policy making through a re-invention of the public role of education

    Related Randomness Attacks for Public Key Encryption

    Get PDF
    Abstract. Several recent and high-profile incidents give cause to believe that randomness failures of various kinds are endemic in deployed cryptographic systems. In the face of this, it behoves cryptographic researchers to develop methods to immunise – to the extent that it is possible – cryptographic schemes against such failures. This paper considers the practically-motivated situation where an adversary is able to force a public key encryption scheme to reuse random values, and functions of those values, in encryption computations involving adversarially chosen public keys and messages. It presents a security model appropriate to this situation, along with variants of this model. It also provides necessary conditions on the set of functions used in order to attain this security notation, and demonstrates that these conditions are also sufficient in the Random Oracle Model. Further standard model constructions achieving weaker security notions are also given, with these constructions having interesting connections to other primitives including: pseudo-random functions that are secure in the related key attack setting; Correlated Input Secure hash functions; and public key encryption schemes that are secure in the auxiliary input setting (this being a special type of leakage resilience)

    Analysing and exploiting the Mantin biases in RC4

    Get PDF
    We explore the use of the Mantin biases (Mantin, Eurocrypt 2005) to recover plaintexts from RC4-encrypted traffic. We provide a more fine-grained analysis of these biases than in Mantin\u27s original work. We show that, in fact, the original analysis was incorrect in certain cases: the Mantin biases are sometimes non-existent, and sometimes stronger than originally predicted. We then show how to use these biases in a plaintext recovery attack. Our attack targets two unknown bytes of plaintext that are located close to sequences of known plaintext bytes, a situation that arises in practice when RC4 is used in, for example, TLS. We provide a statistical framework that enables us to make predictions about the performance of this attack and its variants. We then extend the attack using standard dynamic programming techniques to tackle the problem of recovering longer plaintexts, a setting of practical interest in recovering HTTP session cookies and user passwords that are protected by RC4 in TLS. We perform experiments showing that we can successfully recover 16-byte plaintexts with 80% success rate using 2312^{31} ciphertexts, an improvement over previous attacks

    Statistical Attacks on Cookie Masking for RC4

    Get PDF
    Levillain et al. (AsiaCCS 2015) proposed two cookie masking methods, TLS Scramble and MCookies, to counter a class of attacks on SSL/TLS in which the attacker is able to exploit its ability to obtain many encryptions of a target HTTP cookie. In particular, the masking methods potentially make it viable to continue to use the RC4 algorithm in SSL/TLS. In this paper, we provide a detailed analysis of TLS Scramble and MCookies when used in conjunction with RC4 in SSL/TLS. We show that, in fact, both are vulnerable to variants of the known attacks against RC4 in SSL/TLS exploiting the Mantin biases (Mantin, EUROCRYPT 2005): * For the TLS Scramble mechanism, we provide a detailed statistical analysis coupled with extensive simulations that show that about 2372^{37} encryptions of the cookie are sufficient to enable its recovery. * For the MCookies mechanism, our analysis is made more complex by the presence of a Base64 encoding step in the mechanism, which (unintentionally) acts like a classical block cipher S-box in the masking process. Despite this, we are able to develop a maximum likelihood analysis which provides a rigorous statistical procedure for estimating the unknown cookie. Based on simulations, we estimate that 2452^{45} encryptions of the cookie are sufficient to enable its recovery. Taken together, our analyses show that the cookie masking mechanisms as proposed by Levillain et al. only moderately increase the security of RC4 in SSL/TLS

    Assessment of hazard metrics for predicting field benthic invertebrate toxicity in the Detroit River, Ontario, Canada

    Get PDF
    Numerical sediment quality guidelines (SQGs) are frequently used to interpret site specific sediment chemistry and predict potential toxicity to benthic communities. These SQGs are useful for a screening line of evidence (LOE) that can be combined with other LOEs in a full weight of evidence (WOE) assessment of impacted sites. Three common multi-chemical hazard quotient methods (PEC-Qavg, PEC-Qmet and PEC-Qsum) and a novel (Hazard Score; HZD) approach were used in conjunction with a consensus based set of SQGs to evaluate the ability of different scoring metrics to predict the biological effects of sediment contamination under field conditions. Multivariate analyses were first used to categorize river sediments into distinct habitats based on a set of physicochemical parameters to include gravel, low and high flow sand and silt. For high flow sand and gravel, no significant dose-response relationships between numerically dominant species and various toxicity metric scores were observed. Significant dose-response relationships were observed for Chironomid abundances and toxicity scores in low flow sand and silt habitats. For silt habitats the HZD scoring metric provided the best predictor of Chironomid abundances compared to various PEC-Q methods according to goodness of fit tests. For low flow sand habitats, PEC-Qsum followed by HZD, provided the best predictors of Chironomid abundance. Differences in apparent Chironomid toxicity between the two habitats suggest habitat specific differences in chemical bioavailability and indicator taxa sensitivity. Using an index of biological integrity (IBI) method, the HZD, PEC-Qavg and PEC-Qmet approaches provided reasonable correlations with calculated IBI values in both silt and low flow sand habitats but not for gravel or high flow sands. Computation differences between the various multi-chemical toxicity scoring metrics and how this contributes to bias in different estimates of chemical mixture toxicity scores are discussed and compared

    Molecular epidemiology of multidrug-resistant Acinetobacter baumannii in a single institution over a 10-year period

    Get PDF
    The molecular epidemiology and mechanisms of resistance of carbapenem-resistant Acinetobacter baumannii (CRAB) were determined in hospitals in the states of the Cooperation Council for the Arab States of the Gulf (Gulf Cooperation Council [GCC]), namely, Saudi Arabia, United Arab Emirates, Oman, Qatar, Bahrain, and Kuwait. Isolates were subjected to PCR-based detection of antibiotic resistance genes and repetitive sequence-based PCR (rep-PCR) assessments of clonality. Selected isolates were subjected to multilocus sequence typing (MLST). We investigated 117 isolates resistant to carbapenem antibiotics (either imipenem or meropenem). All isolates were positive for OXA-51. The most common carbapenemases were the OXA-23-type, found in 107 isolates, followed by OXA-40-type (OXA-24-type), found in 5 isolates; 3 isolates carried the ISAba1 element upstream of blaOXA-51-type. No OXA-58-type, NDM-type, VIM-type, or IMP-type producers were detected. Multiple clones were detected with 16 clusters of clonally related CRAB. Some clusters involved hospitals in different states. MLST analysis of 15 representative isolates from different clusters identified seven different sequence types (ST195, ST208, ST229, ST436, ST450, ST452, and ST499), as well as three novel STs. The vast majority (84%) of the isolates in this study were associated with health care exposure. Awareness of multidrug-resistant organisms in GCC states has important implications for optimizing infection control practices; establishing antimicrobial stewardship programs within hospital, community, and agricultural settings; and emphasizing the need for establishing regional active surveillance systems. This will help to control the spread of CRAB in the Middle East and in hospitals accommodating transferred patients from this region

    Whole-person health and development: two South Indian initiatives

    Get PDF
    In responding to the 2016 reformulation of the United Nation’s Sustainable Development Goals, the development community’s efforts are focused on a sweep of initiatives aiming to promote whole-society, sustainable development. The ambition of the SDGs is inspiring, but also daunting, and does not always sit easily within national models of economic development. This viewpoint profiles two organisations in the south Indian state of Tamil Nadu, that have decades of experience in whole-person development among scheduled tribes and disability communities. Both organisations serve as timely examples of ongoing holistic, whole-person health and development in the context of new ideals and economic realities

    Clinical value of bioelectrical properties of cancerous tissue in advanced epithelial ovarian cancer patients

    Get PDF
    Currently, there are no valid pre-operatively established biomarkers or algorithms that can accurately predict surgical and clinical outcome for patients with advanced epithelial ovarian cancer (EOC). In this study, we suggest that profiling of tumour parameters such as bioelectrical-potential and metabolites, detectable by electronic sensors, could facilitate the future development of devices to better monitor disease and predict surgical and treatment outcomes. Biopotential was recorded, using a potentiometric measurement system, in ex vivo paired non-cancerous and cancerous omental tissues from advanced stage EOC (n = 36), and lysates collected for metabolite measurement by microdialysis. Consistently different biopotential values were detected in cancerous tissue versus non-cancerous tissue across all cases (p < 0.001). High tumour biopotential levels correlated with advanced tumour stage (p = 0.048) and tumour load, and negatively correlated with stroma. Within our EOC cohort and specifically the high-grade serous subtype, low biopotential levels associated with poorer progression-free survival (p = 0.0179, p = 0.0143 respectively). Changes in biopotential levels significantly correlated with common apoptosis related pathways. Lactate and glucose levels measured in paired tissues showed significantly higher lactate/glucose ratio in tissues with low biopotential (p < 0.01, n = 12). Our study proposes the feasibility of biopotential and metabolite monitoring as a biomarker modality profiling EOC to predict surgical and clinical outcomes
    corecore