Competency Models
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Efficient Implementation of Elliptic Curve Cryptography in Reconfigurable Hardware
EFFICIENT IMPLEMENTATION OF ELLIPTIC CURVE CRYPTOGRAPHY IN RECONFIGURABLE HARDWARE by E-JEN LIEN Submitted in partial fulfillment of the requirements for the degree of Master of Science Thesis Advisor: Dr. Swarup Bhunia Department of Electrical Engineering and Computer Science CASE WESTERN RESERVE UNIVERSITY May, 2012 CASE WESTERN RESERVE UNIVERSITY SCHOOL OF GRADUATE STUDIES We hereby approve the thesis/dissertation of _____________________________________________________E-Jen Lien candidate for the ______________________degreeMaster of Science *. Swarup Bhunia (signed)_______________________________________________ (chair of the committee) Christos Papachristou ________________________________________________ Frank Merat ________________________________________________ ________________________________________________ ________________________________________________ ________________________________________________ (date) _______________________03/19/2012 *We also certify that written approval has been obtained for any proprietary material contained therein. To my family ⋯ Contents List of Tables iii List of Figures v Acknowledgements vi List of Abbreviations vii Abstract viii 1 Introduction 1 1.1 Research objectives . .1 1.2 Thesis Outline . .3 1.3 Contributions . .4 2 Background and Motivation 6 2.1 MBC Architecture . .6 2.2 Application Mapping to MBC . .7 2.3 FPGA . .9 2.4 Mathematical Preliminary . 10 2.5 Elliptic Curve Cryptography . 10 2.6 Motivation . 16 i 3 Design Principles and Methodology 18 3.1 Curves over Prime Field . 18 3.2 Curves over Binary Field . 25 3.3 Software Code for ECC . 31 3.4 RTL code for FPGA design . 31 3.5 Input Data Flow Graph (DFG) for MBC . 31 4 Implementation of ECC 32 4.1 Software Implementation . 32 4.1.1 Prime Field . 33 4.1.2 Binary Field . 34 4.2 Implementation in FPGA . 35 4.2.1 Prime Field . 36 4.2.2 Binary Field . -
Openfog Reference Architecture for Fog Computing
OpenFog Reference Architecture for Fog Computing Produced by the OpenFog Consortium Architecture Working Group www.OpenFogConsortium.org February 2017 1 OPFRA001.020817 © OpenFog Consortium. All rights reserved. Use of this Document Copyright © 2017 OpenFog Consortium. All rights reserved. Published in the USA. Published February 2017. This is an OpenFog Consortium document and is to be used in accordance with the terms and conditions set forth below. The information contained in this document is subject to change without notice. The information in this publication was developed under the OpenFog Consortium Intellectual Property Rights policy and is provided as is. OpenFog Consortium makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of fitness for a particular purpose. This document contains content that is protected by copyright. Copying or distributing the content from this document without permission is prohibited. OpenFog Consortium and the OpenFog Consortium logo are registered trademarks of OpenFog Consortium in the United States and other countries. All other trademarks used herein are the property of their respective owners. Acknowledgements The OpenFog Reference Architecture is the product of the OpenFog Architecture Workgroup, co-chaired by Charles Byers (Cisco) and Robert Swanson (Intel). It represents the collaborative work of the global membership of the OpenFog Consortium. We wish to thank these organizations for contributing -
A High-Speed Constant-Time Hardware Implementation of Ntruencrypt SVES
A High-Speed Constant-Time Hardware Implementation of NTRUEncrypt SVES Farnoud Farahmand, Malik Umar Sharif, Kevin Briggs, Kris Gaj Department of Electrical and Computer Engineering, George Mason University, Fairfax, VA, U.S.A. fffarahma, msharif2, kbriggs2, [email protected] process a year later. Among the candidates, there are new, Abstract—In this paper, we present a high-speed constant- substantially modified versions of NTRUEncrypt. However, in time hardware implementation of NTRUEncrypt Short Vector an attempt to characterize an already standardized algorithm, Encryption Scheme (SVES), fully compliant with the IEEE 1363.1 Standard Specification for Public Key Cryptographic Techniques in this paper, we focus on the still unbroken version of the Based on Hard Problems over Lattices. Our implementation algorithm published in 2008. We are not aware of any previous follows an earlier proposed Post-Quantum Cryptography (PQC) high-speed hardware implementation of the entire NTRUEn- Hardware Application Programming Interface (API), which crypt SVES scheme reported in the scientific literature or facilitates its fair comparison with implementations of other available commercially. Our implementation is also unique in PQC schemes. The paper contains the detailed flow and block diagrams, timing analysis, as well as results in terms of latency (in that it is the first implementation of any PQC scheme following clock cycles), maximum clock frequency, and resource utilization our newly proposed PQC Hardware API [3]. As such, it in modern high-performance Field Programmable Gate Arrays provides a valuable reference for any future implementers of (FPGAs). Our design takes full advantage of the ability to paral- PQC schemes, which is very important in the context of the lelize the major operation of NTRU, polynomial multiplication, in ongoing NIST standard candidate evaluation process. -
Core System Architecture Viewpoints
Core System System Architecture Document (SAD) www.its.dot.gov/index.htm Draft — September 6, 2011 Produced by Lockheed Martin ITS Joint Program Office Research and Innovative Technology Administration U.S. Department of Transportation Notice This document is disseminated under the sponsorship of the Department of Transportation in the interest of information exchange. The United States Govern- ment assumes no liability for its contents or use thereof. Report Documentation Page Form Approved OMB No. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing the burden, to Department of Defense, Washington Headquarters Services, Directorate for Informa- tion Operations and Reports (0704-0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DD MM YYYY) 2. REPORT TYPE 3. DATES COVERED 06 09 2011 (Draft Specification) Month YYYY – Month YYYY 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Core System: System Architecture Document (SAD) Draft GS-23F-0150S 5b. GRANT NUMBER Xxxx 6. AUTHOR(S) 5c. PROGRAM ELEMENT NUMBER Core System Engineering Team Xxxx 5d. -
FIDO Technical Glossary
Client to Authenticator Protocol (CTAP) Implementation Draft, February 27, 2018 This version: https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-client-to-authenticator-protocol-v2.0-id- 20180227.html Previous Versions: https://fidoalliance.org/specs/fido-v2.0-ps-20170927/ Issue Tracking: GitHub Editors: Christiaan Brand (Google) Alexei Czeskis (Google) Jakob Ehrensvärd (Yubico) Michael B. Jones (Microsoft) Akshay Kumar (Microsoft) Rolf Lindemann (Nok Nok Labs) Adam Powers (FIDO Alliance) Johan Verrept (VASCO Data Security) Former Editors: Matthieu Antoine (Gemalto) Vijay Bharadwaj (Microsoft) Mirko J. Ploch (SurePassID) Contributors: Jeff Hodges (PayPal) Copyright © 2018 FIDO Alliance. All Rights Reserved. Abstract This specification describes an application layer protocol for communication between a roaming authenticator and another client/platform, as well as bindings of this application protocol to a variety of transport protocols using different physical media. The application layer protocol defines requirements for such transport protocols. Each transport binding defines the details of how such transport layer connections should be set up, in a manner that meets the requirements of the application layer protocol. Table of Contents 1 Introduction 1.1 Relationship to Other Specifications 2 Conformance 3 Protocol Structure 4 Protocol Overview 5 Authenticator API 5.1 authenticatorMakeCredential (0x01) 5.2 authenticatorGetAssertion (0x02) 5.3 authenticatorGetNextAssertion (0x08) 5.3.1 Client Logic 5.4 authenticatorGetInfo (0x04) -
White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography
IEICE TRANS. INF. & SYST., VOL.E103–D, NO.2 FEBRUARY 2020 188 INVITED PAPER Special Section on Security, Privacy, Anonymity and Trust in Cyberspace Computing and Communications White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography Yudi ZHANG†,††, Debiao HE†,††a), Xinyi HUANG†††,††††, Ding WANG††,†††††, Kim-Kwang Raymond CHOO††††††, Nonmembers, and Jing WANG†,††, Student Member SUMMARY Unlike black-box cryptography, an adversary in a white- box security model has full access to the implementation of the crypto- graphic algorithm. Thus, white-box implementation of cryptographic algo- rithms is more practical. Nevertheless, in recent years, there is no white- box implementation for public key cryptography. In this paper, we propose Fig. 1 A typical DRM architecture the first white-box implementation of the identity-based signature scheme in the IEEE P1363 standard. Our main idea is to hide the private key to multiple lookup tables, so that the private key cannot be leaked during the algorithm executed in the untrusted environment. We prove its security in both black-box and white-box models. We also evaluate the performance gram. However, the adversary does not have the permis- of our white-box implementations, in order to demonstrate utility for real- sion to access the internal process of the program’s execu- world applications. tion. In practice, an adversary can also observe and mod- key words: white-box implementation, white-box security, IEEE P1363, ify the algorithm’s implementation to obtain the internal de- identity-based signature, key extraction tails, such as the secret key. -
NIST SP 800-175B (DRAFT) Guideline for Using Crypto Standards: Cryptographic Mechanisms
The attached DRAFT document (provided here for historical purposes) has been superseded by the following publication: Publication Number: NIST Special Publication (SP) 800-175B Title: Guideline for Using Cryptographic Standards in the Federal Government: Cryptographic Mechanisms Publication Date: 8/22/2016 • Final Publication: http://dx.doi.org/10.6028/NIST.SP.800-175B (which links to http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-175B.pdf). • Information on other NIST cybersecurity publications and programs can be found at: http://csrc.nist.gov/ The following information was posted with the attached DRAFT document: March 11, 2016 NIST Released Draft SP 800-175B, Guideline for Using Cryptographic Standards in the Federal Government: Cryptographic Mechanisms NIST requests comments on Special Publication 800-175B,Guideline for Using Cryptographic Standards in the Federal Government: Cryptographic Mechanisms. The SP 800-175 publications are intended to be a replacement for SP 800-21, Guideline for Implementing Cryptography in the Federal Government, but with a focus on using the cryptographic offerings currently available, rather than building one’s own implementation. SP 800-175B is intended to provide guidance to the Federal government for using cryptography and NIST’s cryptographic standards to protect sensitive, but unclassified digitized information during transmission and while in storage. The cryptographic methods and services to be used are also discussed. The first document in the series (i.e., SP 800-175A) will be available shortly. Please provide comments on SP 800-175B by Friday, April 29, 2016. Comments may be sent to [email protected], with “Comments on SP 800-175B” as the subject. -
599.061801Er – Movable Bridge Control System
ITEM 599.061801ER – MOVABLE BRIDGE CONTROL SYSTEM DESCRIPTION 1.01 GENERAL REQUIREMENT A. This section includes general requirements for supply, delivery, storage, installation, testing and commissioning of the Control System required under the scope of the contract. B. Provide supervision, labor, and assistance to manufacturer’s field representative and/or technical directors for equipment to be installed as a part of this Contract. C. The Contractor shall provide service of qualified system integration company to develop and produce substantially completed electrical installation shop drawings as integrated system for Engineer’s review and approval. The substantially completed installation shop drawings shall be developed based on the final shop drawings of the actual equipment procured. The substantially completed installation shop drawings shall include layout/assembly/installation drawings of equipment, components terminal boxes and terminations drawings, schematic diagrams, point-to-point interconnection wirings with cable tags and termination identification for field installation. The Contractor shall coordinate all activities required to produce the substantially completed installation shop drawings. D. The design drawings of the control system are intended to convey functional and performance requirements of the movable bridge control system. The design drawings of the control system does not show all of the required components and circuit wiring interconnections required to provide a complete and fully function bridge control system. The contractor shall provide a fully integrated, complete automation control system, fully programmed (in terms of automation, control logic, operator interface, alarm and events logging) and ready for proper operation of the movable bridge. The supply shall be complete and shall include all equipment and components, system interconnections, configuration and software programming necessary to guarantee the proper control of the movable bridge from operator control panel and/or HMI. -
Implementation of a Dependability Framework for Smart Substation Automation Systems : Application to Electric Energy Distribution Ahmed Altaher
Implementation of a dependability framework for smart substation automation systems : application to electric energy distribution Ahmed Altaher To cite this version: Ahmed Altaher. Implementation of a dependability framework for smart substation automation sys- tems : application to electric energy distribution. Electric power. Université Grenoble Alpes, 2018. English. NNT : 2018GREAT012. tel-01863867 HAL Id: tel-01863867 https://tel.archives-ouvertes.fr/tel-01863867 Submitted on 29 Aug 2018 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. THÈSE Pour obtenir le grade de DOCTEUR DE LA COMMUNAUTE UNIVERSITE GRENOBLE ALPES Spécialité : Automatique Productique Arrêté ministériel : 25 mai 2016 Présentée par Ahmed ALTAHER Thèse dirigée par Jean-Marc THIRIET, Professeur, UNIVERSITE GRENOBLE ALPES, et Codirigée par Stéphane MOCANU, Maitre de conférences, GRENOBLE INP Préparée au sein du Laboratoire GIPSA-lab. Dans l'École Doctorale EEATS Mise en œuvre d’un cadre de sûreté de fonctionnement pour les systèmes d'automatisation de sous-stations intelligentes -
Powerline and Coax Adapters
Powerline and Coax Adapters Powerline Ethernet Adapters Powerline Wireless Extenders HomePNA Ethernet Bridges Powerline and Coax Adapters Powerline and Coax Adapters Introduction Introduction ZyXEL Powerline and Coax Adapters Powerline Home Network NSA325 2-Bay Power Plus Turn Your Power Lines or Coaxial Cables into a Smart Home Network Media Server NWD2205 Wireless N ZyXEL’s broad line of Powerline adapters allow you to use your existing power outlets to create a fast and secure home network. You won’t need USB Adapter Study Room to install new cables, which saves you time, money and effort. Your Powerline network will enable you to share your Internet connection as well PLA4231 as all your digital media content, so you can enjoy Broadband content anywhere in your home. In fact, Powerline extends your network to areas 500 Mbps Powerline PLA4211 500 Mbps Mini Powerline even wireless signals may not reach. Wireless N Extender STB2101-HD Pass-Thru Ethernet Adapter HD IP Set-Top Box Game Wired LAN Adapter Product Portfolio Console Internet Blu-ray HDTV xDSL/Cable Player Modem PLA4201 PLA4225 500 Mbps 500 Mbps Mini Powerline Powerline 4-Port Power Line NBG5615 Ethernet Adapter Gigabit Switch Living Room Wireless N Ethernet Simultaneous AV/HDMI Cable Dual-Band Wireless HD Powerline PLA4231 N750 Media Router Extender 500 Mbps Powerline Wireless N Extender Power Line Benefits of Wired LAN Adapter 500 Mbps Mini Powerline Plug-and-Play Design Oce Room Ethernet Adapter 500 Mbps Mini Powerline Pass-Thru Simply plug a ZyXEL Powerline Adapter into an outlet near your Ethernet Adapter IEEE 1901 router and plug your router into it. -
Universidad Nacional De Chimborazo Facultad De Ingeniería Carrera De Electrónica Y Telecomunicaciones
UNIVERSIDAD NACIONAL DE CHIMBORAZO FACULTAD DE INGENIERÍA CARRERA DE ELECTRÓNICA Y TELECOMUNICACIONES Proyecto de Investigación previo a la obtención del título de Ingeniero en Electrónica y Telecomunicaciones TRABAJO DE TITULACIÓN DISEÑO Y SIMULACIÓN DE UNA RED DE COMUNICACIÓN EN VAGONES DE FERROCARRILES A TRAVÉS DE LA UTILIZACIÓN DE LOS ESTÁNDARES IEC 61375 PARA LA RUTA TREN DEL HIELO I (RIOBAMBA – URBINA – LA MOYA – RIOBAMBA) Autor: Denis Andrés Maigualema Quimbita Tutor: Ing. PhD. Ciro Diego Radicelli García Riobamba - Ecuador Año 2020 I Los miembros del tribunal de graduación del proyecto de investigación de título: “DISEÑO Y SIMULACIÓN DE UNA RED DE COMUNICACIÓN EN VAGONES DE FERROCARRILES A TRAVÉS DE LA UTILIZACIÓN DE LOS ESTÁNDARES IEC 61375 PARA LA RUTA TREN DEL HIELO I (RIOBAMBA – URBINA – LA MOYA – RIOBAMBA)”, presentado por: Denis Andrés Maigualema Quimbita, y dirigido por el Ing. PhD. Ciro Diego Radicelli García. Una vez revisado el informe final del proyecto de investigación con fines de graduación escrito en el cual consta el cumplimento de las observaciones realizadas, remite la presente para uso y custodia en la Biblioteca de la Facultad de Ingeniería de la UNACH. Para constancia de lo expuesto firman. Ing. PhD. Ciro Radicelli Tutor Dr. Marlon Basantes Miembro del tribunal Ing. José Jinez Miembro del tribunal II DECLARACIÓN EXPUESTA DE TUTORÍA En calidad de tutor del tema de investigación: “DISEÑO Y SIMULACIÓN DE UNA RED DE COMUNICACIÓN EN VAGONES DE FERROCARRILES A TRAVÉS DE LA UTILIZACIÓN DE LOS ESTÁNDARES IEC 61375 PARA LA RUTA TREN DEL HIELO I (RIOBAMBA – URBINA – LA MOYA – RIOBAMBA ". Realizado por el Sr. -
MLKHN1500 Fully Compliant IEEE 1901 HD-PLC Power Line Communications (PLC) IC
MLKHN1500 Fully compliant IEEE 1901 HD-PLC Power line Communications (PLC) IC Datasheet KDS-HANFF02EAA Rev. 1.00 MegaChips’ Proprietary and Confidential This information shall not be shared or distributed outside the company and will be exchanged based on the signed proprietary information exchange agreement. MegaChips reserves the right to make any change herein at any time without prior notice. MegaChips does not assume any responsibility or liability arising out of application or use of any product or service described herein except as explicitly agreed upon. MegaChips’ Proprietary Information – Strictly Confidential Page 1 of 68 MLKHN1500 Datasheet Rev.1.0.0 Contents 1. Product Overview ....................................................................................................................................... 6 1.1. Functional Overview ............................................................................................................................ 6 1.1.1. Key Features ................................................................................................................................ 6 1.1.2. Applications .................................................................................................................................. 7 1.2. Block Diagram ..................................................................................................................................... 7 2. Pins ............................................................................................................................................................