5,660 research outputs found
Faster Base64 Encoding and Decoding Using AVX2 Instructions
Web developers use base64 formats to include images, fonts, sounds and other
resources directly inside HTML, JavaScript, JSON and XML files. We estimate
that billions of base64 messages are decoded every day. We are motivated to
improve the efficiency of base64 encoding and decoding. Compared to
state-of-the-art implementations, we multiply the speeds of both the encoding
(~10x) and the decoding (~7x). We achieve these good results by using the
single-instruction-multiple-data (SIMD) instructions available on recent Intel
processors (AVX2). Our accelerated software abides by the specification and
reports errors when encountering characters outside of the base64 set. It is
available online as free software under a liberal license.Comment: software at https://github.com/lemire/fastbase6
Faster Base64 Encoding and Decoding Using AVX2 Instructions
Web developers use base64 formats to include images, fonts, sounds and other
resources directly inside HTML, JavaScript, JSON and XML files. We estimate
that billions of base64 messages are decoded every day. We are motivated to
improve the efficiency of base64 encoding and decoding. Compared to
state-of-the-art implementations, we multiply the speeds of both the encoding
(~10x) and the decoding (~7x). We achieve these good results by using the
single-instruction-multiple-data (SIMD) instructions available on recent Intel
processors (AVX2). Our accelerated software abides by the specification and
reports errors when encountering characters outside of the base64 set. It is
available online as free software under a liberal license.Comment: software at https://github.com/lemire/fastbase6
ANALISIS KEMAMPUAN URL TERENKRIPSI BASE64 TERHADAP SERANGAN BRUTE FORCE
Dalam pemrograman web terdapat 2 metode pengiriman data dari client ke server yaitu metode POST dan metode GET. Kelemahan dari metode GET adalah data/variabel yang dikirim dapat dilihat di URL. Pengguna dapat dengan mudah mengubah nilai data/variabel, menghasilkan informasi lain yang seharusnya tidak ditampilkan kepada pengguna. Untuk mengatasi masalah ini, dengan mengenkripsi data/variabel yang dikirim ke URL. Tujuan dari penelitian ini adalah untuk menganalisis tingkat keamanan data/variabel URL terenkripsi base64 terhadap serangan brute force. Dari hasil penelitian: dengan menggunakan URL terenkripsi base64, keamanan URL dari akses ilegal akan lebih baik. URL terenkripsi base64 masih memiliki celah saat serangan dilakukan menggunakan metode Brute Force. Namun, tingkat keberhasilan serangan ini sangat kecil. Tingkat keberhasilan serangan Brute Force pada URL terenkripsi base64 hanya 0,00892%.
Kata Kunci: Base64, Brute Force, URL, Metode GE
Making Digital Artifacts on the Web Verifiable and Reliable
The current Web has no general mechanisms to make digital artifacts --- such
as datasets, code, texts, and images --- verifiable and permanent. For digital
artifacts that are supposed to be immutable, there is moreover no commonly
accepted method to enforce this immutability. These shortcomings have a serious
negative impact on the ability to reproduce the results of processes that rely
on Web resources, which in turn heavily impacts areas such as science where
reproducibility is important. To solve this problem, we propose trusty URIs
containing cryptographic hash values. We show how trusty URIs can be used for
the verification of digital artifacts, in a manner that is independent of the
serialization format in the case of structured data files such as
nanopublications. We demonstrate how the contents of these files become
immutable, including dependencies to external digital artifacts and thereby
extending the range of verifiability to the entire reference tree. Our approach
sticks to the core principles of the Web, namely openness and decentralized
architecture, and is fully compatible with existing standards and protocols.
Evaluation of our reference implementations shows that these design goals are
indeed accomplished by our approach, and that it remains practical even for
very large files.Comment: Extended version of conference paper: arXiv:1401.577
Non-Blocking Signature of very large SOAP Messages
Data transfer and staging services are common components in Grid-based, or
more generally, in service-oriented applications. Security mechanisms play a
central role in such services, especially when they are deployed in sensitive
application fields like e-health. The adoption of WS-Security and related
standards to SOAP-based transfer services is, however, problematic as a
straightforward adoption of SOAP with MTOM introduces considerable
inefficiencies in the signature generation process when large data sets are
involved. This paper proposes a non-blocking, signature generation approach
enabling a stream-like processing with considerable performance enhancements.Comment: 13 pages, 5 figure
Non-Blocking Signature of very large SOAP Messages
Data transfer and staging services are common components in Grid-based, or
more generally, in service-oriented applications. Security mechanisms play a
central role in such services, especially when they are deployed in sensitive
application fields like e-health. The adoption of WS-Security and related
standards to SOAP-based transfer services is, however, problematic as a
straightforward adoption of SOAP with MTOM introduces considerable
inefficiencies in the signature generation process when large data sets are
involved. This paper proposes a non-blocking, signature generation approach
enabling a stream-like processing with considerable performance enhancements.Comment: 13 pages, 5 figure
Shortcuts to Thermodynamic Computing: The Cost of Fast and Faithful Erasure
Landauer's Principle states that the energy cost of information processing
must exceed the product of the temperature and the change in Shannon entropy of
the information-bearing degrees of freedom. However, this lower bound is
achievable only for quasistatic, near-equilibrium computations -- that is, only
over infinite time. In practice, information processing takes place in finite
time, resulting in dissipation and potentially unreliable logical outcomes. For
overdamped Langevin dynamics, we show that counterdiabatic potentials can be
crafted to guide systems rapidly and accurately along desired computational
paths, providing shortcuts that allows for the precise design of finite-time
computations. Such shortcuts require additional work, beyond Landauer's bound,
that is irretrievably dissipated into the environment. We show that this
dissipated work is proportional to the computation rate as well as the square
of the information-storing system's length scale. As a paradigmatic example, we
design shortcuts to erase a bit of information metastably stored in a
double-well potential. Though dissipated work generally increases with erasure
fidelity, we show that it is possible perform perfect erasure in finite time
with finite work. We also show that the robustness of information storage
affects the energetic cost of erasure---specifically, the dissipated work
scales as the information lifetime of the bistable system. Our analysis exposes
a rich and nuanced relationship between work, speed, size of the
information-bearing degrees of freedom, storage robustness, and the difference
between initial and final informational statistics.Comment: 19 pages, 7 figures;
http://csc.ucdavis.edu/~cmg/compmech/pubs/scte.ht
The Hush Cryptosystem
In this paper we describe a new cryptosystem we call "The Hush Cryptosystem"
for hiding encrypted data in innocent Arabic sentences. The main purpose of
this cryptosystem is to fool observer-supporting software into thinking that
the encrypted data is not encrypted at all. We employ a modified Word
Substitution Method known as the Grammatical Substitution Method in our
cryptosystem. We also make use of Hidden Markov Models. We test our
cryptosystem using a computer program written in the Java Programming Language.
Finally, we test the output of our cryptosystem using statistical tests.Comment: 7 pages. 5 figures. Appeared in the 2nd International Conference on
Security of Information and Networks (SIN 2009), North Cyprus, Turkey;
Proceedings of the 2nd International Conference on Security of Information
and Networks (SIN 2009), North Cyprus, Turke
- …