Blocks on Blocks on Blocks on Blocks on Blocks on Blocks on Blocks on Blocks on Blocks on Blocks on Blocks on Blocks on Blocks on Blocks on Blocks on Blocks on Blocks on Blocks on Blocks on Blocks on Blocks on Blocks on Blocks on Blocks on Blocks on Blocks on Blocks on Blocks on Blocks on Blocks on Blocks on Blocks on Blocks on Blocks on Blocks on Blocks on Blocks on Blocks on Blocks on Blocks on Blocks on Blocks on Blocks on Blocks on Blocks on Blocks on Blocks! Dynamically Rearranging Synteny Blocks in Comparative Genomes Nick Egan’s Final Project Presentation for BIO 131 Intro to Computational Biology Taught by Anna Ritz
View full slide show




Crossbar 7 1-bit 16-bit 16-bit 2-bit 2-bit 2-bit 2-bit 2-bit 2-bit 2-bit 2-bit 16 1-bit 16-bit iterations 16-bit 2-bit 2-bit 2-bit 2-bit 2-bit 2-bit 2-bit 2-bit 16-bit 1-bit 16-bit 2-bit 2-bit 2-bit 2-bit 2-bit 2-bit 2-bit 2-bit 16-bit 1-bit 16-bit 2-bit 2-bit 2-bit 2-bit 2-bit 2-bit 2-bit 2-bit Input Neurons
View full slide show




24 Functions are not Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods are are are are are are are are are are are are are are are are are are are are are are are are not not not not not not not not not not not not not not not not not not not not not not not not Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods are are are are are are are are are are are are are are are are are are are are are are are are not not not not not not not not not not not not not not not not not not not not not not not not Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods F are are are are are are are are are are are are are are are are are are are are are are are are not not not not not not not not not not not not not not not not not not not not not not not not Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods Methods are are are are are are are are are are are are are are are are are are are are are are are are not not not not not not not not not not not not not not not not not not not not not not not not Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions Functions
View full slide show




• Common security tools • AES-CTR mode 1 – Confidentiality & integrity scheme 2 – Hardware security management 3 – Security cost AES-GCM: Asolution counter based 4 – End to end checking • Fast Integrity Checking with AESGCM • Confidentiality & integrity in action mode with a low with latency integrity • Comparison previous work IV || @ 32 || IV96 || 96 || @32 TS TS32 32 128 bit 128 bit TS+ TS+ 1 1 128 bit IV || @ 32 || IV96 || 96 || @32 (TS+1) (TS+1)32 32 128 bit 128-bit 128-bit AES AES 128 bit 128-bit 128-bit AES AES 128 bit Plaintext Plaintext 1 1 128 bit 128 bit Plaintext Plaintext 2 2 128 bit ENCRYPTION & DECRYPTION CIRCUITRY 128 bit Ciphertext Ciphertext 1 1 Ciphertext Ciphertext 2 2 128 bit 128 bit Mult MultHH 128 bit 0064 || Len(C) 64 64 || Len(C)64 Mult MultHH 128 bit 128 bit 128 bit AUTHENTICATION CIRCUITRY Mult MultHH 128 bit Tag Tag 12
View full slide show




Data Encryption There are two data encryption schema for SQLite 1. Strong Encryption of DB on the DBMS level, i.e. perform encryption or decryption while DB reading/ writing where the encryption function is embedded into the DBMS, and the encryption and decryption process is transparent to users. 2. Encrypt DB on application layer, where encryption or decryption can be operated on some fields of the records(fields) 3. SQLChiper is an extension of SQLite which provide data encryption based on user password.
View full slide show




View Policy RouterA# RouterA# show show crypto crypto isakmp isakmp policy policy Protection Protection suite suite of of priority priority 110 110 encryption DES encryption algorithm: algorithm: DES -- Data Data Encryption Encryption Standard Standard (56 (56 bit bit keys). keys). hash Message hash algorithm: algorithm: Message Digest Digest 55 authentication authentication method: method: pre-share pre-share Diffie-Hellman #1 Diffie-Hellman group: group: #1 (768 (768 bit) bit) lifetime: 86400 lifetime: 86400 seconds, seconds, no no volume volume limit limit Default Default protection protection suite suite encryption DES encryption algorithm: algorithm: DES -- Data Data Encryption Encryption Standard Standard (56 (56 bit bit keys). keys). hash algorithm: Secure Hash Standard hash algorithm: Secure Hash Standard authentication method: Rivest-Shamir-Adleman authentication method: Rivest-Shamir-Adleman Signature Signature Diffie-Hellman #1 Diffie-Hellman group: group: #1 (768 (768 bit) bit) lifetime: 86400 lifetime: 86400 seconds, seconds, no no volume volume limit limit © 2012 Cisco and/or its affiliates. All rights reserved. 111
View full slide show




Advantages and Limitations of OFB  bit errors do not propagate  Encryption and decryption of blocks can be done in parallel
View full slide show




Different Keys for Encryption and Decryption • • • • • Encryption key, K1 Decryption key, K2 Ek1(M) = C Dk2(C) = M Dk2(Ek1(M)) = M Decryption Key Encryption Key Plaintext Ciphertext Encryption Decryption Original Plaintext
View full slide show




Bit lines Memory Chip Organization Decoder Decoder High half of address bits Low half of address bits Spring 2016, arz bit bit bit bit bit bit bit bit Word lines bit bit bit bit bit bit bit bit Multiplexer Multiplexer Output CPE555A – Real-Time Embedded Systems Stevens Institute of Technology 18
View full slide show




CPU-based execution controls 31 30 29 28 0 25 24 23 0 1 21 20 19 0 12 11 10 9 0 0 1 1 1 1 Core-2 Duo (1=yes, 0=no) Bit 2: Interrupt-window exiting Bit 3: Use TSC offsetting Bit 7: HLT exiting Bit 9: INVLPG exiting Bit 10: MWAIT exiting Bit 11: RDPMC exiting Bit 12: RDTSC exiting 7 1 3 2 1 1 1 0 1 0 Bit 19: CR8-load exiting Bit 20: CR8-store exiting Bit 21: Use TPR shadow Bit 23: Mov-DR exiting Bit 24: Unconditional I/O exiting Bit 25: Activate I/O bitmaps Bit 28: Use MSR bitmaps Bit 29: MONITOR exiting Bit 30: PAUSE exiting
View full slide show