Main menu

Hello, everyone!

BlueCat is a Linux-based operating system for 64-bits processors.

View details Download

AES: Other attacks

It is clear that so far, none of the attacks carried out against full-AES has been successful, these attacks usually focus on reducing rounds. Many authors claim that none of the following types of attacks have been more effective than an exhaustive-key search: Linear cryptanalysis Differential Cryptanalysis Truncated diferencials Interpolation attacks Square attack However, the ordered structure and the deep mathematical basis that AES uses, make it an object of study for new attacks proposals such as algebraic attacks. These attacks consist on propose an equation system, and with the unknowns of the system, it can deduce the key; one…
Read more...

Femto-cells: others challenges in QoS managing

QoS managing An important point with regard to providing QoS is to reduce signaling and interference. With this, operators can properly manage resources without such problems, in order to improve the services provided to users. In this new scenario, the traffic generated from the UE to the eNodeB is deflected by an IP network before reaching the mobile network. The transmission of a information packet over an IP network is susceptible to delays, so the femto-cell may experience problems for obtaining an immune base time to jitter. Operators should ensure the concept of QoS in femto-cells, the parameters of these…
Read more...

How to install SPAN?

Security Protocol Animator (SPAN) is a free tool to check cryptographic protocols that helps in searching and characterization of attacks. The main advantage of this application is that allows different verification techniques using a same protocol. We can say, it is a graphical interface for managing HLPSL (High-Level Protocol Specification Language) and CAS + (an implementation of the Protocol Central Authentication), which allows the translation between these languages ​​and also provides a friendly graphical user interface. SPAN helps to produce interactively sequences messages or MSC (Message Sequence Charts). This tool is used for simulating cryptographic protocol, allows active or passive…
Read more...

Femto-cell: challenges in managing interferences

Some studies show that over 50% of voice calls and 70% of the data traffic comes from inside [1], voice calls do not require high bandwidth, but certain quality parameters are require to ensure the voice recognition of users at the other end of the communication, on the contrary, the data traffic requires high transmission rates to send information with a lot of megabytes, such as multimedia applications require, to name one example. One way to ensure high transmission rates on radio systems, is to maintain high signal quality at both ends of the communication, and hence, mitigate the effects…
Read more...

Applications for the development of scientific papers, data processing and simulation

Results presentation The way in which the research results are presented has a significant impact on readers. Also, a good way to represent the information gives a clear and easy ideas to understand. For this, we need a selection of tools that allow the reproduction of documents, photographs, graphics, and other associated items. On the other hand, there are various applications which facilitate the data processing when we need to work with research result, whether mathematical or network.
Read more...
Subscribe to this RSS feed

Facebook TwitterRSS