Parallel stream cipher for secure high-speed communications

Size: px
Start display at page:

Download "Parallel stream cipher for secure high-speed communications"

Transcription

1 Signal Processing 82 ( Parallel strea cipher for secure high-speed counications Hoonjae Lee a;, Sangjae Moon b a Departent of Coputer Engineering, Kyungwoon University, Induk-ri 55, Sandong-Myun, Kui, Kyungbuk , South Korea b School of Electronic and Electrical Engineering, Kyungpook National University, 370, Sankyuk-Dong, Taegu , South Korea Received 28 April 2000; received in revised for 9 July 200; accepted 7 Noveber 200 Abstract Due to ongoing iproveents in high-speed counications, the speed of data encryption ust also increase. Accordingly, this paper proposes an PS-LFSR with an ( 2-ties faster shifting during one clock interval and a parallel strea cipher that is faster by paralleling any siilar keystrea generators using the PS-LFSRs. Finally, an -parallel SUM-BSG with 8-parallel for detail is proposed as a design exaple of the proposed parallel strea cipher. When copared with a conventional strea cipher, the properties of the proposed cipher exhibited the sae crypto-degree with -ties faster processing.? 2002 Elsevier Science B.V. All rights reserved. Keywords: Parallel strea cipher; Period; Linear coplexity; Randoness; Suation generator. Introduction Due to ongoing iproveents in high-speed counications, the speed of data encryption ust also increase. Cryptography is the only known practical ethod for protecting inforation transitted through counication networks that use land lines, counication satellites, and icrowave facilities. Cryptographic ethods can be divided into block ciphers, strea ciphers, and public-key cryptosystes [4,8]. There are four application odes of block ciphers: the ECB (electronic codebook ode, CFB (cipher feedback ode, CBC (cipher-block chaining ode, and OFB (output feedback ode [8]. The ECB ode outputs ciphertext blocks fro plaintext blocks via a coplex transforation controlled by a secret key. Corresponding author. Tel.: ; fax: E-ail address: hjlee@kyungwoon.ac.kr (H. Lee. The CFB ode autonoously establishes counication synchronization using feedback fro the ciphertext to the input block. The CBC ode is useful for a general-purpose block-oriented transission or for authentication with block-chaining. The OFB ode is siilar to a strea cipher, in which a block cipher generates rando sequence blocks fro an initial value block [8]. However, all four odes have weaknesses in their application to an erroneous channel as in, for exaple, a wireless channel. In an erroneous channel, a one-bit error in a ciphertext will propagate to any blocks of recovered plaintext in the receiver. In the ECB ode, a one-bit channel error in a ciphertext will propagate to the full range of the recovered plaintext block in the receiver. Accordingly, a channel with a 0 6 BER (bit error rate will be degraded to a channel with a 0 4 ( BER if a block cipher with a 28-bit block size is applied. In ters of error propagation, cases using the CFB and CBC odes will be ore seriously aected than those /02/$ - see front atter? 2002 Elsevier Science B.V. All rights reserved. PII: S (

2 260 H. Lee, S. Moon / Signal Processing 82 ( using the ECB ode. In contrast, the OFB ode oers a unique solution to the block cipher proble, however, it needs a faster encryption speed. For exaple, a DES [7,8] with 6 rounds will generally output 64 bits in 6 syste-clock intervals, therefore, the concept of repetition (round decreases the processing speed. Public-key cryptosystes are not useful for data-encryption because of their slow processing rate and the proble of bit-error propagation as in the ECB ode. Strea ciphers exhibit good properties including no error propagation, security levels properly selectable according to certain security criteria, and a higher processing ability than block ciphers, however, new high-speed counication systes are requiring faster data encryption. This paper focuses on the following three probles in designing a cryptosyste: security, fast enciphering=deciphering, and error propagation persistence in channels including obile counication. As a result, a parallel strea cipher is proposed that cobines the strengths of strea and block ciphers, that is, the security and freedo fro error propagation of a strea cipher and the parallel processing ability of a block cipher. Norally, all LFSRs in a strea cipher shift=output -bit for one clock-tie interval, whereas, in the proposed cipher the LFSRs are elevated to a high-speed type, PS-LFSRs, which shifts=output ( 2-bits for one clock interval. Plus, as an iproved version of the (single nonlinear cobine function, an -parallel nonlinear cobine function (general type is introduced, which generates -bit keystrea sequences for the proposed parallel strea cipher. Finally, an -parallel SUM-BSG is presented as a design exaple, arranged with any Rueppel s suation generators [] in parallel and = 8 for details. Its perforance is analyzed in ters of cryptographic security and the processing speed copared with a conventional strea cipher. 2. Parallel strea cipher 2.. General requireents of a strea cipher The following requireents are assued necessary for cryptosystes [0]: ( Error propagation: The error propagation due to encryption=decryption should be inial. (2 Redundant inforation: The insertion of redundant inforation bits should be inial. (3 Cryptographic security: The nuber of secret keys should be large enough so an exhaustive key search attack is ipossible. (4 Siplicity of ipleentation: The encryption= decryption syste should be realizable with software or hardware. (5 Perforance speed: The encryption=decryption should be perforable at speeds ranging fro T rate (:544 Mbps up to any Gbps. For a secure strea cipher, the keystrea should be unpredictable and subsequent keystreas should not be able to be anticipated fro previous ones. The following are necessary conditions for the unpredictability of a keystrea [7,0]: ( Long period: A keystrea should have a long period. (2 Large linear coplexity: Large linear coplexity iplies that it is ipractical (infeasible to use the equivalent LFSR to predict the keystrea output sequences. (3 Randoness: A large linear coplexity does not iply randoness. The statistical property of the keystrea should be the sae as an ideal rando source. (4 Proper order of correlation iunity: A nonlinear cobining function F is called a kth order correlation iune when any k(6 N cobinations x i ;x i2 ;:::;x ik ( 6 i ;i 2 ;:::;i k 6 N ofall N-input-bits x ;x 2 ;:::;x N, on function F are uncorrelated with the output of F Proposed PS-LFSR Parallel-structured=-shifting LFSRs (PS-LFSRs for use as the basic eleent of the parallel strea cipher are proposed as shown in Fig.. An PS-LFSR can answer the question how can an LFSR be shifted by -bits within one clock interval? For a parallel structure, there are an n-stage PS-LFSR on the right in Fig. (b and an ( -stage LBUF which stores teporally a lot bits of the shifted-out on the left in the gure. Each -bit block of the n-stage PS-LFSR shifts left by syste clock and the feedback paths are independently XORed based on each cobination of the feedback taps, thereafter the results can be siultaneously shifted to the rightost of the LFSR.

3 H. Lee, S. Moon / Signal Processing 82 ( Feedback connection : the original connection SYSTEM CLOCK i n- n-stage LFSR (a n-stage LFSR -bit OUTPUT Feedback connection : -bit left-shifting of the original cobination -(- -(-2 -(-3 n-+ Feedback connection 2 : -bit left-shifting of the original cobination feedback feedback 2-0 n-2 Feedback connection : the original cobination 0 2 n- feedback :: : -(-2 -( : : n- n-2 n-3 n-4 n-5 n-6 n- -bit OUTPUT SYSTEM CLOCK (--stage LBUF n-stage PS-LFSR (b (n, PS-LFSR Fig.. LFSR and proposed PS-LFSR. Feedback connection 8 : s(33+t= s(28+t ^ s(-5+t ^ s(-6+t ^ s(-7+t feedback Feedback connection 2 : s(39+t= s(34+t ^ s(+t ^ s(t ^ s(-+t feedback Feedback connection : s(40+t= s(35+t ^ s(2+t ^ s(+t ^ s(t feedback =8 bits OUTPUT SYSTEM CLOCK 7-stage LBUF 40-stage PS-LFSR Fig. 2. (n =40; = 8 PS-LFSR as an exaple. In this case, the rst path (feedback in the gure is coputed by using the original feedback connection function (fro priitive polynoial, the second path (feedback 2 by using the -bit left shifted function of the original cobination, and the third path (feedback 3 by using the -bit left shifted of the second cobination, and so on. We depict an exaple of a 40-stage, 8-parallel PS-LFSR in Fig. 2.

4 262 H. Lee, S. Moon / Signal Processing 82 ( C C2 CN C C2 CN l -LFSR l 2 -LFSR 2 l 3 -LFSR 3 (x (x 2 (x 3 cobiners: (eoryless or not l -LFSR l 2 -LFSR 2 l 3 -LFSR 3 (x (x 2 (x 3 cobiners: (eoryless or not l N -LFSR N (x N f, f2,, f l N -LFSR N (x N f, f2,, f Plaintext Serial/ Parallel Parallel/ Serial Ciphertext Serial/ Parallel Parallel/ Serial Plaintext Transitter Channel Receiver Fig. 3. Proposed parallel strea cipher. As a result, the processing speed of the PS-LFSR is -ties faster than that of a noral LFSR where the clock only shifts -bit left. Moreover, a PS-LFSR has the sae cryptographic security in ters of randoness, period, and linear coplexity as a conventional LFSR, because it siultaneously generates -bit outputs while -bit shifting and each output is only used once. In addition, recent VLSI technology facilitates the ipleentation of a PS-LFSR, in contrast to the increased coplexity of the hardware ipleentation Proposed parallel strea cipher Unlike a conventional keystrea generator, the proposed parallel strea cipher generates (6 N independent sequences fro nonlinear cobine functions (f ;f 2 ;:::;f via N LFSRs, as in Fig. 3,and each ( sequence enciphers (XORs fro a plaintext block to a ciphertext block in parallel. This akes the proposed cipher -ties faster than a conventional strea cipher in spite of the increased coplexity in the hardware ipleentation. The proposed cipher also retains the channel quality level in the BER using channel error propagation without additional equipent. If required, it can prevent a correlation attack with the use of a correlation iune function with eory bits [3,6,9,]. In Fig. 4, -parallel nonlinear cobine functions (f ;f 2 ;:::;f are proposed as a generalized odel, which use -bit eories (c ;c 2 ;:::;c and PS-LFSRs (Fig. in place of LFSRs. All the LFSRs ust have dierent lengths and that are pair-wise co-prie: gcd(l i ;l j = for all 6 i; j; (i j 6 N. Each function f i (i =; 2;:::; in an algebraic noral for (ANF is dened as follows: f i (x i ;x 2i ;:::;x Ni ;c i ;c i2 ;:::;c imi N N + =a i0 + a ij x ji + j= j=n + a ijc ij + a ijk x ji x ki + a ijkc ij c ik + j;k j;k j;k a ijkx ji c ik + + a ijk N +i x ji x ki x ti c i c i2 c imi ; ( where, x jk is the kth output sequence of the parallel -bit on LFSR j, c jk ( 6 j; k 6 isthekth eory sequence of the jth function, a ij ;a ij;a ijk ;a ijk ;a ijk ;:::; a ijk::n +i [0; ] are all binary coecients, and M j is the nuber of eories used in the jth function f j. Each f i (x i ;x 2i ;:::;x Ni ;c i ;c i2 ;:::;c imi ;i = ; 2;:::;, is required to fulll the conditions in Section 2..

5 H. Lee, S. Moon / Signal Processing 82 ( c,..,, c2 cm l -PS-LFSR (x (x 2 (x N cobiners: f (eoryless or not (y l 2 -PS-LFSR 2 c c,.., c, 2 M M M l N -PS-LFSR N (x (x 2 (x N cobiner f (eoryless or not (y Note: N M M,, M N,, 2 Fig. 4. Generalized -parallel nonlinear cobiners. As an exaple, an -parallel suation generator is proposed with eories (called -parallel SUM-BSG in Fig. 5.In this gure, nuber of SUM-BSGs [,6] used is congured in parallel and all the LFSRs used are the sae type of PS-LFSR. Each PS-LFSR (siply LFSR generates -output sequences: PS-LFSR generates (x ;x 2 ;:::;x sequences for a clock, PS-LFSR 2 generates (x 2 ;x 22 ;:::;x 2 sequences, and the sae ethod PS-LFSR generates (x ;x 2 ;:::;x sequences. For the next clock PS-LFSR generates (x ;+ ;x ;+2 ;:::;x ;2 sequences, and so on. Therefore, (x sequences are as follows: x ;x ;+ ;x ;2+ ;x ;3+ ;:::. The properties of the output sequence y i of the ith SUM-BSG are as follows: (y i ={(x i (x i } {(c i (c im }; (2 where (y i represents the ith output sequences of SUM-BSG i (i =; 2;:::;, (x i the ith output sequences of LFSR,(x 2i the ith output sequences of LFSR 2,(x i the ith output sequences of LFSR, and (c ij the jth carry sequences of the ith function. Property. If gcd(l i ;l j = (6 i; j 6 ; i j; is relatively prie; and the all LFSRs used have a

6 264 H. Lee, S. Moon / Signal Processing 82 ( c,..,, c2 cm The priitive polynoials in the proposed generator are generated by Ref. [5]. l -PS-LFSR l 2 -PS-LFSR 2 (x (x 2 (x Suation Generator: SUM-BSG (y g (x=x 9 + x 9 + x 6 + x 3 + x 2 + x +; g 2 (x=x 23 + x 2 + x 6 + x 3 + x 2 + x +; g 3 (x=x 29 + x + x 7 + x 3 + x 2 + x +; g 4 (x=x 3 + x 3 +; g 5 (x=x 37 + x 8 + x 2 + x +; g 6 (x=x 4 + x 7 + x 4 + x 3 + x 2 + x +; g 7 (x=x 43 + x 6 + x 4 + x 3 + x 2 + x +; g 8 (x=x 47 + x 4 + x 4 + x 3 + x 2 + x +: l -PS-LFSR Note: N =, (x (x 2 (x c c,.., c, 2 M M Suation Generator: SUM-BSG = M 2 =..= M = M Fig. 5. Proposed -parallel SUM-BSG. M (y non-null initial value; then each SUM-BSG i will have the following properties [;7]: ( Period: P i = j= (2lj. (2 Randoness: good. (3 Linear coplexity: LC i P i. (4 The order of the correlation iunity of the function f i : K i =. An SUM-BSG includes a axiu period; good randoness; near axial linear coplexity; and axiu order of correlation iunity; as in Property. An 8-parallel suation generator with a 3-bit carry (called 8-parallel SU -BSG, with an -input in total in detail is also proposed, which can operate a real-su fro an -input (x i ;x 2i ;:::;x 8i ; c i3 ;c i2 ;c i and then convert the decial (sued to binary. Property 2. If gcd(l i ;l j =; ( 6 i; j 6 ; i j and all the LFSRs used have non-null initial values; then the ith SU BSG i of the proposed 8-parallel SU -BSG will have the following properties: ( Period: P i =(2 9 (2 23 (2 29 (2 3 (2 37 (2 4 (2 43 ( ; i=; 2;:::;8: (2 Randoness: good [6,7]. (3 Linear coplexity: LC i P i ;i=; 2;:::;8. (4 The order of the correlation iunity of the function: K i = =7;i=; 2;:::;8. (5 The ciphering speed is =8 ties faster than that of the original application in a strea cipher. (6 The coplexity of the nuber of gates used in the hardware is approxiately 2-ties (upper-liited by ties ore coplex than that of the conventional SU -BSG (Refer to Table, siilar concluded in [2].. Since each SUM-BSG i function generates each output sequence using an independent ethod, the cryptographic properties of a single output sequence of the proposed generator are the sae as those of a single SUM-BSG. Accordingly, the proposed generator guarantees a axiu period, near-axiu linear coplexity, axiu order of correlation iunity, and randoness properties like the conventional generator. Therefore, the proposed parallel

7 H. Lee, S. Moon / Signal Processing 82 ( Table Coparison of siilar generators 8-parallel SU -BSG Ites SU -BSG (M =8 Period Randoness Rando Rando Linear coplexity Approxiate Approxiate to period to period Correlation iunity 7 7 Nuber of F=Fs used (F=F eans ip=op device Nuber of XOR gates used Total nuber of gates used (iff=f = 5 gates (.67 ties coplex Processing rate ratio 8 (M = 8 ties high generator is a secure high-perforance generator with slightly ore coplex hardware. 3. Conclusion This paper proposed a parallel strea cipher which cobines the strengths of strea and block ciphers, that is, the security and freedo fro propagation error of a strea cipher and the block or parallel processing ability of a block cipher. Generally, all LFSRs in a strea cipher shift=output -bit during one clock-tie interval. This was iproved with the use of parallel-structured type PS-LFSRs to -bit shifting=outputting for one clock. In addition, -parallel nonlinear cobine functions (general type were introduced that iprove the nonlinear cobine function, outputting -bit keystrea sequences and generating -bit keystrea sequences for applying the proposed parallel strea cipher. Finally, an -parallel SUM-BSG was presented as a design exaple, arranged with an nuber of Rueppel s suation generators (SUM-BSGs in parallel, and an 8-parallel SU -BSG in detail. The design perforance was analyzed in ters of cryptographic security and the processing speed copared with a conventional strea cipher. The results showed the sae cryptographic security fro the perspective of period, linear coplexity, randoness, and correlation iunity, however, the perforance was -ties faster. References [] Hoonjae Lee, SangJae Moon, On an iproved suation generator with 2-bit eory, Signal Processing 80 ( (January [2] Hoon-jae Lee, Sang-jae Moon, On a high-speed ipleentation of LILI-28 strea cipher using FPGA=VHDL, Journal of Korea Inst. Infor. Security Cryptol. (3 (June [3] W. Meier, O. Staelbach, Correlation properties of cobiners with eory in strea ciphers, J. Cryptol. 5 ( [4] A.J. Menezes, P.C. Oorschot, S.A. Vanstone, Handbook of Applied Cryptography, CRC Press, Boca Raton, FL, 997. [5] B. Park, H. Choi, T. Chang, K. Kang, Period of sequences of priitive polynoials, Electron. Lett. 29 (4 (February [6] R.A. Rueppel, Correlation iunity and the suation generator, Advances in cryptology, Proceedings of CRYPTO 85, Santa Barbara, Aug. 8 22, 985, pp [7] R.A. Rueppel, Analysis and Design of Strea Ciphers, Springer, Berlin, 986. [8] B. Schneier, Applied Cryptography, 2nd Edition, Wiley, New York, 996. [9] T. Siegenthaler, Correlation-iunity of nonlinear cobining functions for cryptographic applications, IEEE Trans. Infor. Theory IT-30 (5 (Septeber [0] M. Tatebayashi, N. Matsuzaki, D.B. Newan, A cryptosyste using digital signal processors for obile counication, ICASSP 90, 990, pp [] G.Z. Xiao, J.L. Massey, A spectral characterization of correlation iune cobining functions, IEEE Trans. Infor. Theory 34 (3 (May

Low complexity bit parallel multiplier for GF(2 m ) generated by equally-spaced trinomials

Low complexity bit parallel multiplier for GF(2 m ) generated by equally-spaced trinomials Inforation Processing Letters 107 008 11 15 www.elsevier.co/locate/ipl Low coplexity bit parallel ultiplier for GF generated by equally-spaced trinoials Haibin Shen a,, Yier Jin a,b a Institute of VLSI

More information

Goals of Cryptography. Definition of a Cryptosystem. Security Kerckhoff's Requirements

Goals of Cryptography. Definition of a Cryptosystem. Security Kerckhoff's Requirements Goals of Cryptography Chapter : Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network Transport Layer Chapter 4: Security

More information

s = (Y Q Y P)/(X Q - X P)

s = (Y Q Y P)/(X Q - X P) Elliptic Curves and their Applications in Cryptography Preeti Shara M.Tech Student Mody University of Science and Technology, Lakshangarh Abstract This paper gives an introduction to elliptic curves. The

More information

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials Fast Montgoery-like Square Root Coputation over GF( ) for All Trinoials Yin Li a, Yu Zhang a, a Departent of Coputer Science and Technology, Xinyang Noral University, Henan, P.R.China Abstract This letter

More information

PEA: Polymorphic Encryption Algorithm based on quantum computation. Nikos Komninos* and Georgios Mantas

PEA: Polymorphic Encryption Algorithm based on quantum computation. Nikos Komninos* and Georgios Mantas Int. J. Systes, Control and Counications, Vol. 3, No., PEA: Polyorphic Encryption Algorith based on quantu coputation Nikos Koninos* and Georgios Mantas Algoriths and Security Group, Athens Inforation

More information

. The univariate situation. It is well-known for a long tie that denoinators of Pade approxiants can be considered as orthogonal polynoials with respe

. The univariate situation. It is well-known for a long tie that denoinators of Pade approxiants can be considered as orthogonal polynoials with respe PROPERTIES OF MULTIVARIATE HOMOGENEOUS ORTHOGONAL POLYNOMIALS Brahi Benouahane y Annie Cuyt? Keywords Abstract It is well-known that the denoinators of Pade approxiants can be considered as orthogonal

More information

Birthday Paradox Calculations and Approximation

Birthday Paradox Calculations and Approximation Birthday Paradox Calculations and Approxiation Joshua E. Hill InfoGard Laboratories -March- v. Birthday Proble In the birthday proble, we have a group of n randoly selected people. If we assue that birthdays

More information

A block cipher enciphers each block with the same key.

A block cipher enciphers each block with the same key. Ciphers are classified as block or stream ciphers. All ciphers split long messages into blocks and encipher each block separately. Block sizes range from one bit to thousands of bits per block. A block

More information

On Concurrent Detection of Errors in Polynomial Basis Multiplication

On Concurrent Detection of Errors in Polynomial Basis Multiplication 1 On Concurrent Detection of Errors in Polynoial Basis Multiplication Siavash Bayat-Saradi and M. Anwar Hasan Abstract The detection of errors in arithetic operations is an iportant issue. This paper discusses

More information

Elliptic Curve Scalar Point Multiplication Algorithm Using Radix-4 Booth s Algorithm

Elliptic Curve Scalar Point Multiplication Algorithm Using Radix-4 Booth s Algorithm Elliptic Curve Scalar Multiplication Algorith Using Radix-4 Booth s Algorith Elliptic Curve Scalar Multiplication Algorith Using Radix-4 Booth s Algorith Sangook Moon, Non-eber ABSTRACT The ain back-bone

More information

Computers and Mathematics with Applications

Computers and Mathematics with Applications Computers and Mathematics with Applications 61 (2011) 1261 1265 Contents lists available at ScienceDirect Computers and Mathematics with Applications journal homepage: wwwelseviercom/locate/camwa Cryptanalysis

More information

SPECTRUM sensing is a core concept of cognitive radio

SPECTRUM sensing is a core concept of cognitive radio World Acadey of Science, Engineering and Technology International Journal of Electronics and Counication Engineering Vol:6, o:2, 202 Efficient Detection Using Sequential Probability Ratio Test in Mobile

More information

A remark on a success rate model for DPA and CPA

A remark on a success rate model for DPA and CPA A reark on a success rate odel for DPA and CPA A. Wieers, BSI Version 0.5 andreas.wieers@bsi.bund.de Septeber 5, 2018 Abstract The success rate is the ost coon evaluation etric for easuring the perforance

More information

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval Unifor Approxiation and Bernstein Polynoials with Coefficients in the Unit Interval Weiang Qian and Marc D. Riedel Electrical and Coputer Engineering, University of Minnesota 200 Union St. S.E. Minneapolis,

More information

Convolutional Codes. Lecture Notes 8: Trellis Codes. Example: K=3,M=2, rate 1/2 code. Figure 95: Convolutional Encoder

Convolutional Codes. Lecture Notes 8: Trellis Codes. Example: K=3,M=2, rate 1/2 code. Figure 95: Convolutional Encoder Convolutional Codes Lecture Notes 8: Trellis Codes In this lecture we discuss construction of signals via a trellis. That is, signals are constructed by labeling the branches of an infinite trellis with

More information

Genetic Quantum Algorithm and its Application to Combinatorial Optimization Problem

Genetic Quantum Algorithm and its Application to Combinatorial Optimization Problem Genetic Quantu Algorith and its Application to Cobinatorial Optiization Proble Kuk-Hyun Han Dept. of Electrical Engineering, KAIST, 373-, Kusong-dong Yusong-gu Taejon, 305-70, Republic of Korea khhan@vivaldi.kaist.ac.kr

More information

A note on the multiplication of sparse matrices

A note on the multiplication of sparse matrices Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani

More information

On Constant Power Water-filling

On Constant Power Water-filling On Constant Power Water-filling Wei Yu and John M. Cioffi Electrical Engineering Departent Stanford University, Stanford, CA94305, U.S.A. eails: {weiyu,cioffi}@stanford.edu Abstract This paper derives

More information

Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers

Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers Muxiang Zhang 1 and Agnes Chan 2 1 GTE Laboratories Inc., 40 Sylvan Road LA0MS59, Waltham, MA 02451 mzhang@gte.com 2 College of Computer

More information

Nonmonotonic Networks. a. IRST, I Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I Povo (Trento) Italy

Nonmonotonic Networks. a. IRST, I Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I Povo (Trento) Italy Storage Capacity and Dynaics of Nononotonic Networks Bruno Crespi a and Ignazio Lazzizzera b a. IRST, I-38050 Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I-38050 Povo (Trento) Italy INFN Gruppo

More information

Improved Cascaded Stream Ciphers Using Feedback

Improved Cascaded Stream Ciphers Using Feedback Improved Cascaded Stream Ciphers Using Feedback Lu Xiao 1, Stafford Tavares 1, Amr Youssef 2, and Guang Gong 3 1 Department of Electrical and Computer Engineering, Queen s University, {xiaolu, tavares}@ee.queensu.ca

More information

The LILI-128 Keystream Generator

The LILI-128 Keystream Generator The LILI-128 Keystream Generator E. Dawson 1 A. Clark 1 J. Golić 2 W. Millan 1 L. Penna 1 L. Simpson 1 1 Information Security Research Centre, Queensland University of Technology GPO Box 2434, Brisbane

More information

The Transactional Nature of Quantum Information

The Transactional Nature of Quantum Information The Transactional Nature of Quantu Inforation Subhash Kak Departent of Coputer Science Oklahoa State University Stillwater, OK 7478 ABSTRACT Inforation, in its counications sense, is a transactional property.

More information

Non-Parametric Non-Line-of-Sight Identification 1

Non-Parametric Non-Line-of-Sight Identification 1 Non-Paraetric Non-Line-of-Sight Identification Sinan Gezici, Hisashi Kobayashi and H. Vincent Poor Departent of Electrical Engineering School of Engineering and Applied Science Princeton University, Princeton,

More information

CRC Press has granted the following specific permissions for the electronic version of this book:

CRC Press has granted the following specific permissions for the electronic version of this book: This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has

More information

Multicollision Attacks on Some Generalized Sequential Hash Functions

Multicollision Attacks on Some Generalized Sequential Hash Functions Multicollision Attacks on Soe Generalized Sequential Hash Functions M. Nandi David R. Cheriton School of Coputer Science University of Waterloo Waterloo, Ontario N2L 3G1, Canada 2nandi@uwaterloo.ca D.

More information

A Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair

A Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair Proceedings of the 6th SEAS International Conference on Siulation, Modelling and Optiization, Lisbon, Portugal, Septeber -4, 006 0 A Siplified Analytical Approach for Efficiency Evaluation of the eaving

More information

Impact of Imperfect Channel State Information on ARQ Schemes over Rayleigh Fading Channels

Impact of Imperfect Channel State Information on ARQ Schemes over Rayleigh Fading Channels This full text paper was peer reviewed at the direction of IEEE Counications Society subject atter experts for publication in the IEEE ICC 9 proceedings Ipact of Iperfect Channel State Inforation on ARQ

More information

Symbolic Analysis as Universal Tool for Deriving Properties of Non-linear Algorithms Case study of EM Algorithm

Symbolic Analysis as Universal Tool for Deriving Properties of Non-linear Algorithms Case study of EM Algorithm Acta Polytechnica Hungarica Vol., No., 04 Sybolic Analysis as Universal Tool for Deriving Properties of Non-linear Algoriths Case study of EM Algorith Vladiir Mladenović, Miroslav Lutovac, Dana Porrat

More information

A new type of lower bound for the largest eigenvalue of a symmetric matrix

A new type of lower bound for the largest eigenvalue of a symmetric matrix Linear Algebra and its Applications 47 7 9 9 www.elsevier.co/locate/laa A new type of lower bound for the largest eigenvalue of a syetric atrix Piet Van Mieghe Delft University of Technology, P.O. Box

More information

Public-key Cryptography: Theory and Practice

Public-key Cryptography: Theory and Practice Public-key Cryptography Theory and Practice Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Appendix A: Symmetric Techniques Block Ciphers A block cipher f of block-size

More information

Soft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis

Soft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Soft Coputing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Beverly Rivera 1,2, Irbis Gallegos 1, and Vladik Kreinovich 2 1 Regional Cyber and Energy Security Center RCES

More information

Multi-Scale/Multi-Resolution: Wavelet Transform

Multi-Scale/Multi-Resolution: Wavelet Transform Multi-Scale/Multi-Resolution: Wavelet Transfor Proble with Fourier Fourier analysis -- breaks down a signal into constituent sinusoids of different frequencies. A serious drawback in transforing to the

More information

Using a De-Convolution Window for Operating Modal Analysis

Using a De-Convolution Window for Operating Modal Analysis Using a De-Convolution Window for Operating Modal Analysis Brian Schwarz Vibrant Technology, Inc. Scotts Valley, CA Mark Richardson Vibrant Technology, Inc. Scotts Valley, CA Abstract Operating Modal Analysis

More information

Estimation of ADC Nonlinearities from the Measurement in Input Voltage Intervals

Estimation of ADC Nonlinearities from the Measurement in Input Voltage Intervals Estiation of ADC Nonlinearities fro the Measureent in Input Voltage Intervals M. Godla, L. Michaeli, 3 J. Šaliga, 4 R. Palenčár,,3 Deptartent of Electronics and Multiedia Counications, FEI TU of Košice,

More information

THEORETICAL SIMPLE POWER ANALYSIS OF THE GRAIN STREAM CIPHER. A. A. Zadeh and Howard M. Heys

THEORETICAL SIMPLE POWER ANALYSIS OF THE GRAIN STREAM CIPHER. A. A. Zadeh and Howard M. Heys THEORETICAL SIMPLE POWER ANALYSIS OF THE GRAIN STREAM CIPHER A. A. Zadeh and Howard M. Heys Electrical and Computer Engineering Faculty of Engineering and Applied Science Memorial University of Newfoundland

More information

Cristina Nita-Rotaru. CS355: Cryptography. Lecture 9: Encryption modes. AES

Cristina Nita-Rotaru. CS355: Cryptography. Lecture 9: Encryption modes. AES CS355: Cryptography Lecture 9: Encryption modes. AES Encryption modes: ECB } Message is broken into independent blocks of block_size bits; } Electronic Code Book (ECB): each block encrypted separately.

More information

A Division Algorithm Using Bisection Method in Residue Number System

A Division Algorithm Using Bisection Method in Residue Number System International Journal of Coputer, Consuer and Control IJ3C), Vol., No. 03) 59 A Division Algorith Using Bisection Method in Residue Nuber Syste * Chin-Chen Chang and Jen-Ho Yang Abstract. Introduction

More information

Lecture 21 Principle of Inclusion and Exclusion

Lecture 21 Principle of Inclusion and Exclusion Lecture 21 Principle of Inclusion and Exclusion Holden Lee and Yoni Miller 5/6/11 1 Introduction and first exaples We start off with an exaple Exaple 11: At Sunnydale High School there are 28 students

More information

Linear recurrences and asymptotic behavior of exponential sums of symmetric boolean functions

Linear recurrences and asymptotic behavior of exponential sums of symmetric boolean functions Linear recurrences and asyptotic behavior of exponential sus of syetric boolean functions Francis N. Castro Departent of Matheatics University of Puerto Rico, San Juan, PR 00931 francis.castro@upr.edu

More information

Randomized Recovery for Boolean Compressed Sensing

Randomized Recovery for Boolean Compressed Sensing Randoized Recovery for Boolean Copressed Sensing Mitra Fatei and Martin Vetterli Laboratory of Audiovisual Counication École Polytechnique Fédéral de Lausanne (EPFL) Eail: {itra.fatei, artin.vetterli}@epfl.ch

More information

Stream ciphers I. Thomas Johansson. May 16, Dept. of EIT, Lund University, P.O. Box 118, Lund, Sweden

Stream ciphers I. Thomas Johansson. May 16, Dept. of EIT, Lund University, P.O. Box 118, Lund, Sweden Dept. of EIT, Lund University, P.O. Box 118, 221 00 Lund, Sweden thomas@eit.lth.se May 16, 2011 Outline: Introduction to stream ciphers Distinguishers Basic constructions of distinguishers Various types

More information

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t.

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t. CS 493: Algoriths for Massive Data Sets Feb 2, 2002 Local Models, Bloo Filter Scribe: Qin Lv Local Models In global odels, every inverted file entry is copressed with the sae odel. This work wells when

More information

The Distribution of the Covariance Matrix for a Subset of Elliptical Distributions with Extension to Two Kurtosis Parameters

The Distribution of the Covariance Matrix for a Subset of Elliptical Distributions with Extension to Two Kurtosis Parameters journal of ultivariate analysis 58, 96106 (1996) article no. 0041 The Distribution of the Covariance Matrix for a Subset of Elliptical Distributions with Extension to Two Kurtosis Paraeters H. S. Steyn

More information

A Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science

A Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science A Better Algorith For an Ancient Scheduling Proble David R. Karger Steven J. Phillips Eric Torng Departent of Coputer Science Stanford University Stanford, CA 9435-4 Abstract One of the oldest and siplest

More information

2 Q 10. Likewise, in case of multiple particles, the corresponding density in 2 must be averaged over all

2 Q 10. Likewise, in case of multiple particles, the corresponding density in 2 must be averaged over all Lecture 6 Introduction to kinetic theory of plasa waves Introduction to kinetic theory So far we have been odeling plasa dynaics using fluid equations. The assuption has been that the pressure can be either

More information

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon Model Fitting CURM Background Material, Fall 014 Dr. Doreen De Leon 1 Introduction Given a set of data points, we often want to fit a selected odel or type to the data (e.g., we suspect an exponential

More information

Divisibility of Polynomials over Finite Fields and Combinatorial Applications

Divisibility of Polynomials over Finite Fields and Combinatorial Applications Designs, Codes and Cryptography anuscript No. (will be inserted by the editor) Divisibility of Polynoials over Finite Fields and Cobinatorial Applications Daniel Panario Olga Sosnovski Brett Stevens Qiang

More information

Comparison of Stability of Selected Numerical Methods for Solving Stiff Semi- Linear Differential Equations

Comparison of Stability of Selected Numerical Methods for Solving Stiff Semi- Linear Differential Equations International Journal of Applied Science and Technology Vol. 7, No. 3, Septeber 217 Coparison of Stability of Selected Nuerical Methods for Solving Stiff Sei- Linear Differential Equations Kwaku Darkwah

More information

Complexity reduction in low-delay Farrowstructure-based. filters utilizing linear-phase subfilters

Complexity reduction in low-delay Farrowstructure-based. filters utilizing linear-phase subfilters Coplexity reduction in low-delay Farrowstructure-based variable fractional delay FIR filters utilizing linear-phase subfilters Air Eghbali and Håkan Johansson Linköping University Post Print N.B.: When

More information

Private-key Systems. Block ciphers. Stream ciphers

Private-key Systems. Block ciphers. Stream ciphers Chapter 2 Stream Ciphers Further Reading: [Sim92, Chapter 2] 21 Introduction Remember classication: Private-key Systems Block ciphers Stream ciphers Figure 21: Private-key cipher classication Block Cipher:

More information

STREAM CIPHER. Chapter - 3

STREAM CIPHER. Chapter - 3 STREAM CIPHER Chapter - 3 S t r e a m C i p h e r P a g e 38 S t r e a m C i p h e r P a g e 39 STREAM CIPHERS Stream cipher is a class of symmetric key algorithm that operates on individual bits or bytes.

More information

Bus transit = 20 ns (one way) access, each module cannot be accessed faster than 120 ns. So, the maximum bandwidth is

Bus transit = 20 ns (one way) access, each module cannot be accessed faster than 120 ns. So, the maximum bandwidth is 32 Flynn: Coputer Architecture { The Solutions Chapter 6. Meory Syste Design Proble 6. The eory odule uses 64 4 M b chips for 32MB of data and 8 4 M b chips for ECC. This allows 64 bits + 8 bits ECC to

More information

Fixed-to-Variable Length Distribution Matching

Fixed-to-Variable Length Distribution Matching Fixed-to-Variable Length Distribution Matching Rana Ali Ajad and Georg Böcherer Institute for Counications Engineering Technische Universität München, Gerany Eail: raa2463@gail.co,georg.boecherer@tu.de

More information

An Attack Bound for Small Multiplicative Inverse of ϕ(n) mod e with a Composed Prime Sum p + q Using Sublattice Based Techniques

An Attack Bound for Small Multiplicative Inverse of ϕ(n) mod e with a Composed Prime Sum p + q Using Sublattice Based Techniques Article An Attack Bound for Sall Multiplicative Inverse of ϕn) od e with a Coposed Prie Su p + q Using Sublattice Based Techniques Pratha Anuradha Kaeswari * and Labadi Jyotsna Departent of Matheatics,

More information

All-Or-Nothing Transforms Using Quasigroups

All-Or-Nothing Transforms Using Quasigroups All-Or-Nothing Transforms Using Quasigroups Stelios I Marnas, Lefteris Angelis, and George L Bleris Department of Informatics, Aristotle University 54124 Thessaloniki, Greece Email: {marnas,lef,bleris}@csdauthgr

More information

Improvement of tandemless transcoding from AMR to EVRC

Improvement of tandemless transcoding from AMR to EVRC Iproveent of tandeless transcoding fro to Wonil Lee, Sunil Lee, Changdong Yoo Dept. of Electrical Engineering and Coputer Science, KAIST illee@kaist.ac.kr, coboysun@kaist.ac.kr, cdyoo@ee.kaist.ac.kr ABSTRACT

More information

Generalized hyper-bent functions over GF(p)

Generalized hyper-bent functions over GF(p) Discrete Applied Mathematics 55 2007) 066 070 Note Generalized hyper-bent functions over GFp) A.M. Youssef Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, H3G

More information

ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS. A Thesis. Presented to. The Faculty of the Department of Mathematics

ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS. A Thesis. Presented to. The Faculty of the Department of Mathematics ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS A Thesis Presented to The Faculty of the Departent of Matheatics San Jose State University In Partial Fulfillent of the Requireents

More information

Polygonal Designs: Existence and Construction

Polygonal Designs: Existence and Construction Polygonal Designs: Existence and Construction John Hegean Departent of Matheatics, Stanford University, Stanford, CA 9405 Jeff Langford Departent of Matheatics, Drake University, Des Moines, IA 5011 G

More information

Transform Domain Analysis of DES. Guang Gong and Solomon W. Golomb. University of Southern California. Tels and

Transform Domain Analysis of DES. Guang Gong and Solomon W. Golomb. University of Southern California. Tels and Transform Domain Analysis of DES Guang Gong and Solomon W. Golomb Communication Sciences Institute University of Southern California Electrical Engineering-Systems, EEB # 500 Los Angeles, California 90089-2565

More information

THE AVERAGE NORM OF POLYNOMIALS OF FIXED HEIGHT

THE AVERAGE NORM OF POLYNOMIALS OF FIXED HEIGHT THE AVERAGE NORM OF POLYNOMIALS OF FIXED HEIGHT PETER BORWEIN AND KWOK-KWONG STEPHEN CHOI Abstract. Let n be any integer and ( n ) X F n : a i z i : a i, ± i be the set of all polynoials of height and

More information

LONG-TERM PREDICTIVE VALUE INTERVAL WITH THE FUZZY TIME SERIES

LONG-TERM PREDICTIVE VALUE INTERVAL WITH THE FUZZY TIME SERIES Journal of Marine Science and Technology, Vol 19, No 5, pp 509-513 (2011) 509 LONG-TERM PREDICTIVE VALUE INTERVAL WITH THE FUZZY TIME SERIES Ming-Tao Chou* Key words: fuzzy tie series, fuzzy forecasting,

More information

List Scheduling and LPT Oliver Braun (09/05/2017)

List Scheduling and LPT Oliver Braun (09/05/2017) List Scheduling and LPT Oliver Braun (09/05/207) We investigate the classical scheduling proble P ax where a set of n independent jobs has to be processed on 2 parallel and identical processors (achines)

More information

ANALYSIS OF HALL-EFFECT THRUSTERS AND ION ENGINES FOR EARTH-TO-MOON TRANSFER

ANALYSIS OF HALL-EFFECT THRUSTERS AND ION ENGINES FOR EARTH-TO-MOON TRANSFER IEPC 003-0034 ANALYSIS OF HALL-EFFECT THRUSTERS AND ION ENGINES FOR EARTH-TO-MOON TRANSFER A. Bober, M. Guelan Asher Space Research Institute, Technion-Israel Institute of Technology, 3000 Haifa, Israel

More information

Probability Distributions

Probability Distributions Probability Distributions In Chapter, we ephasized the central role played by probability theory in the solution of pattern recognition probles. We turn now to an exploration of soe particular exaples

More information

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Tie-Varying Jaing Links Jun Kurihara KDDI R&D Laboratories, Inc 2 5 Ohara, Fujiino, Saitaa, 356 8502 Japan Eail: kurihara@kddilabsjp

More information

FPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integers

FPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integers FPGA Ipleentation of Point Multiplication on Koblitz Curves Using Kleinian Integers V.S. Diitrov 1 K.U. Järvinen 2 M.J. Jacobson, Jr. 3 W.F. Chan 3 Z. Huang 1 February 28, 2012 Diitrov et al. (Univ. Calgary)

More information

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle Network Security Chapter 2 Basics 2.4 Random Number Generation for Cryptographic Protocols Motivation It is

More information

Extension of CSRSM for the Parametric Study of the Face Stability of Pressurized Tunnels

Extension of CSRSM for the Parametric Study of the Face Stability of Pressurized Tunnels Extension of CSRSM for the Paraetric Study of the Face Stability of Pressurized Tunnels Guilhe Mollon 1, Daniel Dias 2, and Abdul-Haid Soubra 3, M.ASCE 1 LGCIE, INSA Lyon, Université de Lyon, Doaine scientifique

More information

CSc 466/566. Computer Security. 5 : Cryptography Basics

CSc 466/566. Computer Security. 5 : Cryptography Basics 1/84 CSc 466/566 Computer Security 5 : Cryptography Basics Version: 2012/03/03 10:44:26 Department of Computer Science University of Arizona collberg@gmail.com Copyright c 2012 Christian Collberg Christian

More information

Interactive Markov Models of Evolutionary Algorithms

Interactive Markov Models of Evolutionary Algorithms Cleveland State University EngagedScholarship@CSU Electrical Engineering & Coputer Science Faculty Publications Electrical Engineering & Coputer Science Departent 2015 Interactive Markov Models of Evolutionary

More information

DTTF/NB479: Dszquphsbqiz Day 27

DTTF/NB479: Dszquphsbqiz Day 27 DTTF/NB479: Dszquphsbqiz Day 27 Announceents: Questions? This week: Discrete Logs, Diffie-Hellan, ElGaal Hash Functions and SHA-1 Birthday attacks Hash Functions Message (long) Cryptographic hash Function,

More information

ARTICLE IN PRESS. Murat Hüsnü Sazlı a,,canişık b. Syracuse, NY 13244, USA

ARTICLE IN PRESS. Murat Hüsnü Sazlı a,,canişık b. Syracuse, NY 13244, USA S1051-200406)00002-9/FLA AID:621 Vol ) [+odel] P1 1-7) YDSPR:3SC+ v 153 Prn:13/02/2006; 15:33 ydspr621 by:laurynas p 1 Digital Signal Processing ) wwwelsevierco/locate/dsp Neural network ipleentation of

More information

Lecture 12: Block ciphers

Lecture 12: Block ciphers Lecture 12: Block ciphers Thomas Johansson T. Johansson (Lund University) 1 / 19 Block ciphers A block cipher encrypts a block of plaintext bits x to a block of ciphertext bits y. The transformation is

More information

Feature Extraction Techniques

Feature Extraction Techniques Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that

More information

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay A Low-Coplexity Congestion Control and Scheduling Algorith for Multihop Wireless Networks with Order-Optial Per-Flow Delay Po-Kai Huang, Xiaojun Lin, and Chih-Chun Wang School of Electrical and Coputer

More information

Constant-Space String-Matching. in Sublinear Average Time. (Extended Abstract) Wojciech Rytter z. Warsaw University. and. University of Liverpool

Constant-Space String-Matching. in Sublinear Average Time. (Extended Abstract) Wojciech Rytter z. Warsaw University. and. University of Liverpool Constant-Space String-Matching in Sublinear Average Tie (Extended Abstract) Maxie Crocheore Universite de Marne-la-Vallee Leszek Gasieniec y Max-Planck Institut fur Inforatik Wojciech Rytter z Warsaw University

More information

a a a a a a a m a b a b

a a a a a a a m a b a b Algebra / Trig Final Exa Study Guide (Fall Seester) Moncada/Dunphy Inforation About the Final Exa The final exa is cuulative, covering Appendix A (A.1-A.5) and Chapter 1. All probles will be ultiple choice

More information

Rateless Codes for MIMO Channels

Rateless Codes for MIMO Channels Rateless Codes for MIMO Channels Marya Modir Shanechi Dept EECS, MIT Cabridge, MA Eail: shanechi@itedu Uri Erez Tel Aviv University Raat Aviv, Israel Eail: uri@engtauacil Gregory W Wornell Dept EECS, MIT

More information

Symmetric Ciphers. Mahalingam Ramkumar (Sections 3.2, 3.3, 3.7 and 6.5)

Symmetric Ciphers. Mahalingam Ramkumar (Sections 3.2, 3.3, 3.7 and 6.5) Symmetric Ciphers Mahalingam Ramkumar (Sections 3.2, 3.3, 3.7 and 6.5) Symmetric Cryptography C = E(P,K) P = D(C,K) Requirements Given C, the only way to obtain P should be with the knowledge of K Any

More information

Design of a New Stream Cipher: PALS

Design of a New Stream Cipher: PALS Design of a New Stream Cipher: PALS Mohammadreza Ashouri, University of Potsdam, Germany Ashouri@uni-potsdam.de Abstract In this paper, a new stream cipher is designed as a clock-controlled one, but with

More information

On the Analysis of the Quantum-inspired Evolutionary Algorithm with a Single Individual

On the Analysis of the Quantum-inspired Evolutionary Algorithm with a Single Individual 6 IEEE Congress on Evolutionary Coputation Sheraton Vancouver Wall Centre Hotel, Vancouver, BC, Canada July 16-1, 6 On the Analysis of the Quantu-inspired Evolutionary Algorith with a Single Individual

More information

Optimal Resource Allocation in Multicast Device-to-Device Communications Underlaying LTE Networks

Optimal Resource Allocation in Multicast Device-to-Device Communications Underlaying LTE Networks 1 Optial Resource Allocation in Multicast Device-to-Device Counications Underlaying LTE Networks Hadi Meshgi 1, Dongei Zhao 1 and Rong Zheng 2 1 Departent of Electrical and Coputer Engineering, McMaster

More information

Quantum public-key cryptosystems based on induced trapdoor one-way transformations

Quantum public-key cryptosystems based on induced trapdoor one-way transformations Quantu public-key cryptosystes based on induced trapdoor one-way transforations Li Yang a, Min Liang a, Bao Li a, Lei Hu a, Deng-Guo Feng b arxiv:1012.5249v2 [quant-ph] 12 Jul 2011 a State Key Laboratory

More information

A method to determine relative stroke detection efficiencies from multiplicity distributions

A method to determine relative stroke detection efficiencies from multiplicity distributions A ethod to deterine relative stroke detection eiciencies ro ultiplicity distributions Schulz W. and Cuins K. 2. Austrian Lightning Detection and Inoration Syste (ALDIS), Kahlenberger Str.2A, 90 Vienna,

More information

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation journal of coplexity 6, 459473 (2000) doi:0.006jco.2000.0544, available online at http:www.idealibrary.co on On the Counication Coplexity of Lipschitzian Optiization for the Coordinated Model of Coputation

More information

Sparse beamforming in peer-to-peer relay networks Yunshan Hou a, Zhijuan Qi b, Jianhua Chenc

Sparse beamforming in peer-to-peer relay networks Yunshan Hou a, Zhijuan Qi b, Jianhua Chenc 3rd International Conference on Machinery, Materials and Inforation echnology Applications (ICMMIA 015) Sparse beaforing in peer-to-peer relay networs Yunshan ou a, Zhijuan Qi b, Jianhua Chenc College

More information

On the Mixed Discretization of the Time Domain Magnetic Field Integral Equation

On the Mixed Discretization of the Time Domain Magnetic Field Integral Equation On the Mixed Discretization of the Tie Doain Magnetic Field Integral Equation H. A. Ülkü 1 I. Bogaert K. Cools 3 F. P. Andriulli 4 H. Bağ 1 Abstract Tie doain agnetic field integral equation (MFIE) is

More information

A Model for the Selection of Internet Service Providers

A Model for the Selection of Internet Service Providers ISSN 0146-4116, Autoatic Control and Coputer Sciences, 2008, Vol. 42, No. 5, pp. 249 254. Allerton Press, Inc., 2008. Original Russian Text I.M. Aliev, 2008, published in Avtoatika i Vychislitel naya Tekhnika,

More information

Curious Bounds for Floor Function Sums

Curious Bounds for Floor Function Sums 1 47 6 11 Journal of Integer Sequences, Vol. 1 (018), Article 18.1.8 Curious Bounds for Floor Function Sus Thotsaporn Thanatipanonda and Elaine Wong 1 Science Division Mahidol University International

More information

MSEC MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL SOLUTION FOR MAINTENANCE AND PERFORMANCE

MSEC MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL SOLUTION FOR MAINTENANCE AND PERFORMANCE Proceeding of the ASME 9 International Manufacturing Science and Engineering Conference MSEC9 October 4-7, 9, West Lafayette, Indiana, USA MSEC9-8466 MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL

More information

The WG Stream Cipher

The WG Stream Cipher The WG Stream Cipher Yassir Nawaz and Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo, ON, N2L 3G1, CANADA ynawaz@engmail.uwaterloo.ca, G.Gong@ece.uwaterloo.ca

More information

The Weierstrass Approximation Theorem

The Weierstrass Approximation Theorem 36 The Weierstrass Approxiation Theore Recall that the fundaental idea underlying the construction of the real nubers is approxiation by the sipler rational nubers. Firstly, nubers are often deterined

More information

A Note on the Applied Use of MDL Approximations

A Note on the Applied Use of MDL Approximations A Note on the Applied Use of MDL Approxiations Daniel J. Navarro Departent of Psychology Ohio State University Abstract An applied proble is discussed in which two nested psychological odels of retention

More information

EMPIRICAL COMPLEXITY ANALYSIS OF A MILP-APPROACH FOR OPTIMIZATION OF HYBRID SYSTEMS

EMPIRICAL COMPLEXITY ANALYSIS OF A MILP-APPROACH FOR OPTIMIZATION OF HYBRID SYSTEMS EMPIRICAL COMPLEXITY ANALYSIS OF A MILP-APPROACH FOR OPTIMIZATION OF HYBRID SYSTEMS Jochen Till, Sebastian Engell, Sebastian Panek, and Olaf Stursberg Process Control Lab (CT-AST), University of Dortund,

More information

Department of Electronic and Optical Engineering, Ordnance Engineering College, Shijiazhuang, , China

Department of Electronic and Optical Engineering, Ordnance Engineering College, Shijiazhuang, , China 6th International Conference on Machinery, Materials, Environent, Biotechnology and Coputer (MMEBC 06) Solving Multi-Sensor Multi-Target Assignent Proble Based on Copositive Cobat Efficiency and QPSO Algorith

More information

ACORN: A Lightweight Authenticated Cipher (v3)

ACORN: A Lightweight Authenticated Cipher (v3) ACORN: A Lightweight Authenticated Cipher (v3) Designer and Submitter: Hongjun Wu Division of Mathematical Sciences Nanyang Technological University wuhongjun@gmail.com 2016.09.15 Contents 1 Specification

More information

Estimating Parameters for a Gaussian pdf

Estimating Parameters for a Gaussian pdf Pattern Recognition and achine Learning Jaes L. Crowley ENSIAG 3 IS First Seester 00/0 Lesson 5 7 Noveber 00 Contents Estiating Paraeters for a Gaussian pdf Notation... The Pattern Recognition Proble...3

More information

A Pseudo-Random Encryption Mode

A Pseudo-Random Encryption Mode A Pseudo-Random Encryption Mode Moni Naor Omer Reingold Block ciphers are length-preserving private-key encryption schemes. I.e., the private key of a block-cipher determines a permutation on strings of

More information