124 research outputs found

    Secure Digital Signature Scheme Based on Elliptic Curves for Internet of Things

    Get PDF
    Advances in the info and communication knowledge have led to the emergence of Internet of things (IoT). Internet of things (loT) is worthwhile to members, trade, and society seeing that it generates a broad range of services by interconnecting numerous devices and information objects. Throughout the interactions among the many ubiquitous things, security problems emerge as noteworthy, and it is significant to set up more suitable solution for security protection. Nonetheless, as loT devices have limited resource constraints to appoint strong protection mechanisms, they are vulnerable to sophisticated security attacks. For this reason, a sensible authentication mechanism that considers each useful resource constraints and safety is required. Our proposed scheme uses the standards of Elliptic Curve digital signature scheme and evaluates systematically the efficiency of our scheme and observes that our scheme with a smaller key size and lesser infrastructure performs on par with the prevailing schemes without compromising the security level

    Elliptical curve cryptography image encryption scheme with aid of optimization technique using gravitational search algorithm

    Get PDF
    Image encryption enables users to safely transmit digital photographs via a wireless medium while maintaining enhanced anonymity and validity. Numerous studies are being conducted to strengthen picture encryption systems. Elliptical curve cryptography (ECC) is an effective tool for safely transferring images and recovering them at the receiver end in asymmetric cryptosystems. This method's key generation generates a public and private key pair that is used to encrypt and decrypt a picture. They use a public key to encrypt the picture before sending it to the intended user. When the receiver receives the image, they use their private key to decrypt it. This paper proposes an ECC-dependent image encryption scheme utilizing an enhancement strategy based on the gravitational search algorithm (GSA) algorithm. The private key generation step of the ECC system uses a GSA-based optimization process to boost the efficiency of picture encryption. The image's output is used as a health attribute in the optimization phase, such as the peak signal to noise ratio (PSNR) value, which demonstrates the efficacy of the proposed approach. As comparison to the ECC method, it has been discovered that the suggested encryption scheme offers better optimal PSNR values

    A Survey of Elliptic Curve Cryptography Implementation Approaches for Efficient Smart Card Processing

    Get PDF
    Smart cards have been used for many different purposes over the last two decades, from simple prepaid credit counter cards used in parking meters, to high security identity cards intended for national ID programs. This has increased data privacy and security requirements. Data protection and authentication is now demanded for performing Electronic payment and allow secure multi-level access to private information. ECC uses smaller key sizes compared to traditionally used RSA based cryptosystems. Elliptic Curve Cryptography is especially suited to smart card based message authentication because of its smaller memory and computational power requirements than public key cryptosystems. It is observed that the performance of ECC based approach is significantly better than RSA and DSA/DH based approaches because of the low memory and computational requirements, smaller key size, low power and timing consumptions

    Certificateless and provably-secure digital signature scheme based on elliptic curve

    Get PDF
    With the internet today available at the user’s beck, and call data or Information Security plays a vital role. Confidentiality, Integrity, Availability, and Non-repudiation are the pillars of security on which every application on the web is based on. With these basic requirements the users also need the security in low resource constrained environments making it more challenging for the security experts to design secured cryptographic algorithms. Digital Signatures play a pivotal role in Authentication. They help in verifying the integrity of the data being exchanged. Elliptical curves are the strongest contenders in Digital Signatures, and much research is being done to enhance the method in many ways. The paper briefs a secured and improved ECDSA Elliptical Curve Digital Signature Algorithm which is an improved and secured version of the Digital Signature Algorithm

    Assessment of the Awareness among Diabetic Patients of Their Risk for Oral Disease as Complication Associated With Diabetics

    Get PDF
    AIM: To assess the awareness of diabetic patients of their risk for oral disease as complication associated with diabetics. INTRODUCTION: Diabetes mellitus is a metabolic disorder characterized by hyperglycemia due to defective secretion or activity of insulin. Type II diabetes is a common disorder with concomitant oral manifestation that impacts dental care Evidence shows that many patients are unaware about effects of diabetes mellitus on oral health.  METHODOLOGY: A cross sectional descriptive survey was conducted among adult dental patients attending a tertiary care hospital of Bangalore city. A total of 172 patients were included in the study. The tool used to conduct the survey was a close-ended self-administered 14-item questionnaire. Self-rate oral health was assessed using a 4 point scale as good, average, bad and don’t know. RESULT: A total of 172 subjects, among them 120 (69.7%) were males and 52 (30.3%) were females. Among 172 subjects, 87(50%) were aware that diabetics are more prone to oral diseases .91(52%) of the study subjects did not know that diabetes effects gingiva.91(52%) of individuals knew diabetes causes delay in wound healing. 81% of the subjects, self-rated their mouth as good. CONCLUSION: Diabetic patients are less aware of their risk for dental diseases. Thus, it is necessary for dental professionals and related government agencies to promote awareness of the relationship between diabetes mellitus and oral health in order to prevent harmful complications on oral healt

    Macrophage Subset Sensitivity to Endotoxin Tolerisation by Porphyromonas gingivalis

    Get PDF
    Macrophages (MΦs) determine oral mucosal responses; mediating tolerance to commensal microbes and food whilst maintaining the capacity to activate immune defences to pathogens. MΦ responses are determined by both differentiation and activation stimuli, giving rise to two distinct subsets; pro-inflammatory M1- and anti-inflammatory/regulatory M2- MΦs. M2-like subsets predominate tolerance induction whereas M1 MΦs predominate in inflammatory pathologies, mediating destructive inflammatory mechanisms, such as those in chronic P.gingivalis (PG) periodontal infection. MΦ responses can be suppressed to benefit either the host or the pathogen. Chronic stimulation by bacterial pathogen associated molecular patterns (PAMPs), such as LPS, is well established to induce tolerance. The aim of this study was to investigate the susceptibility of MΦ subsets to suppression by P. gingivalis. CD14hi and CD14lo M1- and M2-like MΦs were generated in vitro from the THP-1 monocyte cell line by differentiation with PMA and vitamin D3, respectively. MΦ subsets were pre-treated with heat-killed PG (HKPG) and PG-LPS prior to stimulation by bacterial PAMPs. Modulation of inflammation was measured by TNFα, IL-1β, IL-6, IL-10 ELISA and NFκB activation by reporter gene assay. HKPG and PG-LPS differentially suppress PAMP-induced TNFα, IL-6 and IL-10 but fail to suppress IL-1β expression in M1 and M2 MΦs. In addition, P.gingivalis suppressed NFκB activation in CD14lo and CD14hi M2 regulatory MΦs and CD14lo M1 MΦs whereas CD14hi M1 pro-inflammatory MΦs were refractory to suppression. In conclusion, P.gingivalis selectively tolerises regulatory M2 MΦs with little effect on pro-inflammatory CD14hi M1 MΦs; differential suppression facilitating immunopathology at the expense of immunity

    Proximal Sessile Serrated Adenomas Are More Prevalent in Caucasians, and Gastroenterologists Are Better Than Nongastroenterologists at Their Detection

    Get PDF
    Background and Aim. Proximal sessile serrated adenomas (PSSA) leading to colorectal cancer (CRC) represent an alternate pathway for CRC development. In this study, we aim to determine the prevalence of PSSAs and the impact of patient, colonoscopy, and endoscopist-related factors on PSSA detection. Methods. Patients ≥ 50 years of age undergoing a screening colonoscopy between 2012 and 2014 were included. Detection rates based on patient gender, race, colonoscopy timing, fellow participation, bowel preparation quality, and specialty of the endoscopist were calculated. t-tests were used to compare detection rates and a multivariate-adjusted analysis was performed. Results. 140 PSSAs were detected from 4151 colonoscopies, with a prevalence of 3.4%. Detection rate was higher in Caucasians compared to African-Americans (AA) (3.7 ± 4.1 versus 0.96 ± 3.5; p<0.001). Gastroenterologists detected more PSSAs compared to nongastroenterologists (3.9 ± 3.5 versus 2.2 ± 3.0; p=0.028). These findings were still significant after adjusted multivariate analysis. The rest of the factors did not make significant difference in PSSA detection rate. Conclusions. PSSAs are more prevalent in Caucasians compared to AAs. Racial difference in prevalence of PSSAs is intriguing and warrants further investigation. Gastroenterologists have a significantly higher PSSADR compared to nongastroenterologists. Educational measures should be implemented in nongastroenterologists to improve their PSSA detection rates
    corecore