Toolbox for Key Space Testing of RHCS. Toolbox for Key Space Testing of Robust Hyper-Chaotic System

Size: px
Start display at page:

Download "Toolbox for Key Space Testing of RHCS. Toolbox for Key Space Testing of Robust Hyper-Chaotic System"

Transcription

1 Toolbox for Key Space Testing of Robust Hyper-Chaotic System

2 Toolbox for Key Space Testing of Robust Hyper-Chaotic System Content: I. Introduction.. 2 II. Parameter Interface III. SP Interface 9 IV. The Output Files V. Executable File Description

3 I. Introduction The output sequence of Robust Hyper-Chaotic System (RHCS) [1] is non-periodic and non-converging. The sequence can be used as the mask to encrypt plaintext. In other words, the cryptograph system is similar to a one-time-pad block cipher. In this case, the randomness of the key sequence directly affects the secure level of the system. In RHCS, parameters are including r and C. It is difficult to test the parameters one by one manually. This toolbox is designed for automatically creating parameters for RHCS to generate the masking sequences and to test the randomness by statistical methods. The toolbox combines the RHCS for masking sequence generation and the NIST SP [2] random number testing package, STS, for statistic analysis into an integrated tool with graphic user interface. A. Flow of Testing Parameter Setting RHCS Parameter Creating STS Result for current Parameters Final value? Final Result B. Main functions of toolbox 1. Masking stream generation by customized parameters. 2. Parameter strength analysis by automatic incremental parameter value. 3. Up to 15 testing items are included in SP testing package. C. System Requirement Minimum System Requirements Windows System XP OS: Intel Pentium III 800 MHz or AMD Athlon 800 MHz 256 MB or more of RAM 1 GB available HD space -2-

4 II. Parameter Interface A. Parameters Setting Page Toolbox for Key Space Testing of RHCS The main page is designed for a system that coupled by two robust logistic maps (n=2) in default. When user want to test the system with more than 2 coupled maps, the parameters file input is used. The main page is combined with followed sections. 1. Generator Parameters and Initial Values. 2. Space Scan of Parameters and Initial values. 3. Masking Stream Setting. 4. Parameter File. 5. Status. -3-

5 B. Generator Parameters and Initial Values. This section will set the parameters and initial values of the system. All fields are presented in hexadecimal format. Parameters r1 and r2 are separated in two parts, the fixed part and floating part. The basic input unit of all fields is two-hex digit, which is one byte. The input string 1AB in the fixed-point part will be extended to 01AB and input string 9AF12 in floating-point part will be extended to 9AF120 automatically. Length(x) means the length of x in half-byte. If x = , Length(x) = 4. For example, r= , Length(r) = Field Name Description Format Notes 1 r1 Parameter r 1 for robust_logistic_map 1 Hex Length(r1) = Length(r2) 2 r2 Parameter r 2 for robust_logistic_map 2 Hex Length(r1) = Length(r2) 3 c11 Parameter c 11 for robust_logistic_map 1 Hex All Length of c should be equal to each other. 4 c21 Parameter c 21 for robust_logistic_map 1 Hex Length(c) = Length(x1) 5 c12 Parameter c 12 for robust_logistic_map 2 Hex c11+ c12 = c22 Parameter c 22 for robust_logistic_map 2 Hex c21+ c22 = x1 Initial value of robust_logistic_map 1 Hex The system precision is decided by Length(x1). 8 x2 Initial value of robust_logistic_map 2 Hex Length(x1) = Length(x2) All parameters have the same length are recommended. -4-

6 Example: The parameters of system will be: r 1 = r 2 = ab c 11 = 0.23ad01bf c 12 = 0.dc52fe41 c 21 = c 22 = 0.ff98e679 x 1 = fd3f x 2 = 0.443f8592 C. Space Scan of Parameters and Initial values. This section will set the scan target and scale of the parameters or initial values. The base value of target is set by previous section. The toolbox generates the output streams for each step of parameters and performs the statistic analysis Field Name Description Format Notes 1 r1 To select r 1 for space scan 1/0 Only one target 2 r2 To select r 2 for space scan 1/0 is selected in 3 x1 To select x 1 for space scan 1/0 parameter scan 4 x2 To select x 2 for space scan 1/0 5 Stride The number of stride of space scan Hex Default is 1 6 Grid The incremental size. It will be added into target parameter in each stride. Hex Default is 1-5-

7 Example: By these setting, if r1 = from r1 = to FF, there are 255 masking sequences with other parameters are fixed will be generated and tested. C. Masking Stream Setting. This section will set the output range of the masking stream of the system. User can decide to drop how many bytes from the head of streams and rear of streams Field Name Description Format 1 Head dropping Number of Bytes will be drop from head of stream Dec 2 Rear dropping Number of Bytes will be drop from rear of stream Dec 3 Total Number Total Number of Streams will be generated of Streams Dec -6-

8 Example: If Length(x1) = 10, The Length(output stream) = Length(x1) (Head Dropping + Rear Dropping) x 2 = 10 (2 + 1) x 2 = 4 Total half-bytes of output streams = 1000 x 4. D. Parameter File. Parameters can be read from input file. The example of input file of a testing system with n = 3 is as follow: 3 // the number of coupled maps (n=3) r 1 // scan parameter r1 1 2 // Gride = 1, Stride = 2 AA AA11 // r1 = AA.AA11 BB CC00 // r2 = BB.CC // r3 = FE // c11=0.fe00 c12=0.0100, c13= FE // c21=0.fe00 c22=0.0100, c23= FE // c31=0.fe00 c32=0.0100, c33= A02 // x1 = 0.5A02 BA00 // x2 = 0.BA00 1A12 // x3 = 0.1A // head dropping=0, read dropping=0, total 111 streams will be generated -7-

9 E. Status. The status area shows the current setting of the system. From above setting the status area is -8-

10 III. SP Interface After parameters setting page, the following page will be SP-800 testing page. For detailed description of SP testing package, please refer to the reference [1]. Please note it, total bytes of the generated masking stream should be enough for the STS testing requirement. -9-

11 IV. The Output Files The summary of the testing result is in result directory. The description is as follow: File Name result\finalresult result\para_list result\summary result\ Hyper-Chaotic_finalAnalysisReport_x Description Results for the uniformity of p-values and the proportion of pass sequences are shown in this file. The scan values of the target parameter. The proportion of each scan values is shown. For each scan value of target, all the FinalAnalysisReport files generated by STS are stored. -10-

12 V. Executable File Description The executable files description. Toolbox for Key Space Testing of RHCS Name File Size Description ToolBox.exe 778,325 bytes The main program of toolbox. gen_hex.exe 555,080 bytes The RHCS sequence generator. -11-

13 References [1] Random Number Generation and Testing, [2] S. L. Chen, S. M. Chang, T. T. Hwang and W. W. Lin, Digital Secure-Communication Using Robust Hyper-Chaotic Systems, NCTS Preprints Series in Taiwan, ( -12-

14 History Date Version Description Toolbox for Key Space Testing of RHCS It is a preliminary version for reference First Release. -13-

CSE Computer Architecture I Fall 2011 Homework 07 Memory Hierarchies Assigned: November 8, 2011, Due: November 22, 2011, Total Points: 100

CSE Computer Architecture I Fall 2011 Homework 07 Memory Hierarchies Assigned: November 8, 2011, Due: November 22, 2011, Total Points: 100 CSE 30321 Computer Architecture I Fall 2011 Homework 07 Memory Hierarchies Assigned: November 8, 2011, Due: November 22, 2011, Total Points: 100 Problem 1: (30 points) Background: One possible organization

More information

escan for Windows: escan System Requirements

escan for Windows: escan System Requirements : escan System Requirements : escan Anti-Virus for Windows v11 Operating System: (Client) Windows 8 Family, Windows 7 Family, Windows Vista Family, Rollup patch 1 Other Requirements: Disk Space: 750 MB

More information

CIS-331 Spring 2016 Exam 1 Name: Total of 109 Points Version 1

CIS-331 Spring 2016 Exam 1 Name: Total of 109 Points Version 1 Version 1 Instructions Write your name on the exam paper. Write your name and version number on the top of the yellow paper. Answer Question 1 on the exam paper. Answer Questions 2-4 on the yellow paper.

More information

Release 0.8. Multi-Purpose Light Unit Technical Reference Manual

Release 0.8. Multi-Purpose Light Unit Technical Reference Manual Release 0.8 Multi-Purpose Light Unit Technical Reference Manual INTRODUCTION Introduction The Multi-Purpose Light unit is a multi-function DCC decoder that supports the following: DCC Characteristics 14

More information

CIS-331 Final Exam Spring 2018 Total of 120 Points. Version 1

CIS-331 Final Exam Spring 2018 Total of 120 Points. Version 1 Version 1 Instructions 1. Write your name and version number on the top of the yellow paper and the routing tables sheet. 2. Answer Question 2 on the routing tables sheet. 3. Answer Questions 1, 3, 4,

More information

Autodesk Revit Structure 2012 System Requirements and Recommendations. Minimum: Entry-level configuration. Operating System Microsoft Windows 7 32-bit

Autodesk Revit Structure 2012 System Requirements and Recommendations. Minimum: Entry-level configuration. Operating System Microsoft Windows 7 32-bit Autodesk Revit Structure 2012 System s and Recommendations Minimum: Entry-level configuration Operating System Microsoft Windows 7 32-bit Microsoft Windows Vista 32-bit (SP2 or later) Business Microsoft

More information

CIS-331 Exam 2 Spring 2016 Total of 110 Points Version 1

CIS-331 Exam 2 Spring 2016 Total of 110 Points Version 1 Version 1 1. (20 Points) Given the class A network address 121.0.0.0 will be divided into multiple subnets. a. (5 Points) How many bits will be necessary to address 8,100 subnets? b. (5 Points) What is

More information

CSE Computer Architecture I Fall 2009 Homework 08 Pipelined Processors and Multi-core Programming Assigned: Due: Problem 1: (10 points)

CSE Computer Architecture I Fall 2009 Homework 08 Pipelined Processors and Multi-core Programming Assigned: Due: Problem 1: (10 points) CSE 30321 Computer Architecture I Fall 2009 Homework 08 Pipelined Processors and Multi-core Programming Assigned: November 17, 2009 Due: December 1, 2009 This assignment can be done in groups of 1, 2,

More information

data within a computer system are stored in one of 2 physical states (hence the use of binary digits)

data within a computer system are stored in one of 2 physical states (hence the use of binary digits) Binary Digits (bits) data within a computer system are stored in one of 2 physical states (hence the use of binary digits) 0V and 5V charge / NO charge on a transistor gate ferrite core magnetised clockwise

More information

CIS-331 Exam 2 Fall 2015 Total of 105 Points Version 1

CIS-331 Exam 2 Fall 2015 Total of 105 Points Version 1 Version 1 1. (20 Points) Given the class A network address 117.0.0.0 will be divided into multiple subnets. a. (5 Points) How many bits will be necessary to address 4,000 subnets? b. (5 Points) What is

More information

4. Specifications and Additional Information

4. Specifications and Additional Information 4. Specifications and Additional Information AGX52004-1.0 8B/10B Code This section provides information about the data and control codes for Arria GX devices. Code Notation The 8B/10B data and control

More information

Trend Micro Core Protection Module 10.6 SP1 System Requirements

Trend Micro Core Protection Module 10.6 SP1 System Requirements Trend Micro Core Protection Module 10.6 System Requirements Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing

More information

One subset of FEAL, called FEAL-NX, is N round FEAL using a 128-bit key without key parity.

One subset of FEAL, called FEAL-NX, is N round FEAL using a 128-bit key without key parity. FEAL-NX SPECIFICATIONS 1 Introduction 1.1 Outline of the FEAL-NX cipher FEAL, the Fast Data Encipherment Algorithm, is a 64-bit block cipher algorithm that enciphers 64-bit plaintexts into 64-bit ciphertexts

More information

ENGI 8868/9877 Computer and Communications Security III. BLOCK CIPHERS. Symmetric Key Cryptography. insecure channel

ENGI 8868/9877 Computer and Communications Security III. BLOCK CIPHERS. Symmetric Key Cryptography. insecure channel (a) Introduction - recall symmetric key cipher: III. BLOCK CIPHERS k Symmetric Key Cryptography k x e k y yʹ d k xʹ insecure channel Symmetric Key Ciphers same key used for encryption and decryption two

More information

Communications guide. Line Distance Protection System * F1* GE Digital Energy. Title page

Communications guide. Line Distance Protection System * F1* GE Digital Energy. Title page Title page GE Digital Energy D90 Plus Line Distance Protection System Communications guide D90 Plus firmware revision:.9x GE publication code: 60-9070-F (GEK-3469) GE Digital Energy 650 Markland Street

More information

2016 inn In ovatint SYSTEM novatint version 3 REQUIREMENTS System Requirements D ate :

2016 inn In ovatint SYSTEM novatint version 3 REQUIREMENTS System Requirements D ate : 2016 Innovatint innovatint version SYSTEM 3 System REQUIREMENTS Requirements Date: 28-11-2016 Table of contents 1. Innovatint P.O.S 2 1.1 Minimal system requirements 2 1.2 Recommended system requirements

More information

MODBUS Network Communication

MODBUS Network Communication MODBUS Network Communication The IP3416 and IP99 use the MODBUS protocol, originally standardized by Modicon and is used widely in the PLC industry. For instance, many graphic interface packages available

More information

Full file at

Full file at Chapter Two DATA MANIPULATION Formatted Chapter Summary This chapter introduces the role of a computer's CPU. It describes the machine cycle and the various operations (or, and, exclusive or, add, shift,

More information

CIS-331 Fall 2013 Exam 1 Name: Total of 120 Points Version 1

CIS-331 Fall 2013 Exam 1 Name: Total of 120 Points Version 1 Version 1 1. (24 Points) Show the routing tables for routers A, B, C, and D. Make sure you account for traffic to the Internet. NOTE: Router E should only be used for Internet traffic. Router A Router

More information

IMC Intelligent Analysis Report v7.1 (E0301P02) Copyright (c) 2015 Hewlett-Packard Development Company, L.P. and its licensors.

IMC Intelligent Analysis Report v7.1 (E0301P02) Copyright (c) 2015 Hewlett-Packard Development Company, L.P. and its licensors. IMC Intelligent Analysis Report v7.1 (E0301P02) Copyright (c) 2015 Hewlett-Packard Development Company, L.P. and its licensors. Table of Contents 1. What's New in this Release 2. Problems Fixed in this

More information

Fundamentals of Cryptography

Fundamentals of Cryptography Fundamentals of Cryptography Topics in Quantum-Safe Cryptography June 23, 2016 Part III Data Encryption Standard The Feistel network design m m 0 m 1 f k 1 1 m m 1 2 f k 2 2 DES uses a Feistel network

More information

SMART Response PE interactive response system Receiver and clicker

SMART Response PE interactive response system Receiver and clicker Specifications SMART Response PE interactive response system Receiver and clicker Physical specifications Receiver size 4 3/4" W 7/8" H 2 1/4" D (12 cm 2.2 cm 5.7 cm) Receiver weight 5 3/4 oz. (165 g)

More information

System Requirements 2008 R2

System Requirements 2008 R2 System Requirements 2008 R2 Below are the basic system requirements for installing and running Virtual Machine Manager (VMM) 2008 R2. More complete and comprehensive information covering additional system

More information

Perceptive TransForm. Technical Specifications. Version: 8.x Compatible with ImageNow 6.5.x to 6.7.x and Perceptive Content 7.x

Perceptive TransForm. Technical Specifications. Version: 8.x Compatible with ImageNow 6.5.x to 6.7.x and Perceptive Content 7.x Perceptive TransForm Technical s Version: 8.x Compatible with ImageNow 6.5.x to 6.7.x and Perceptive Content 7.x Written by: Product Knowledge, R&D Date: May 2018 2008-2018 Hyland Software, Inc. and its

More information

Management Server Recommendation for Entercept 4.0 looks like this:

Management Server Recommendation for Entercept 4.0 looks like this: created by: Rainer Bemsel Version 1.0 Dated: May/10/2003 The purpose of this document is to provide you with all necessary steps to install Entercept Server and Entercept Console. I ve used a 45 days evaluation

More information

Secret Key Systems (block encoding) Encrypting a small block of text (say 64 bits) General considerations for cipher design:

Secret Key Systems (block encoding) Encrypting a small block of text (say 64 bits) General considerations for cipher design: Secret Key Systems (block encoding) Encrypting a small block of text (say 64 bits) General considerations for cipher design: Secret Key Systems (block encoding) Encrypting a small block of text (say 64

More information

CIS-331 Fall 2014 Exam 1 Name: Total of 109 Points Version 1

CIS-331 Fall 2014 Exam 1 Name: Total of 109 Points Version 1 Version 1 1. (24 Points) Show the routing tables for routers A, B, C, and D. Make sure you account for traffic to the Internet. Router A Router B Router C Router D Network Next Hop Next Hop Next Hop Next

More information

CIS-331 Exam 2 Fall 2014 Total of 105 Points. Version 1

CIS-331 Exam 2 Fall 2014 Total of 105 Points. Version 1 Version 1 1. (20 Points) Given the class A network address 119.0.0.0 will be divided into a maximum of 15,900 subnets. a. (5 Points) How many bits will be necessary to address the 15,900 subnets? b. (5

More information

CMSC 2833 Lecture Memory Organization and Addressing

CMSC 2833 Lecture Memory Organization and Addressing Computer memory consists of a linear array of addressable storage cells that are similar to registers. Memory can be byte-addressable, or word-addressable, where a word typically consists of two or more

More information

Table 1. Minimum Web Console Requirements. Browser Microsoftt Internet Explorer 9.0, 10.0, 11.0 (32 and 64 bit)

Table 1. Minimum Web Console Requirements. Browser Microsoftt Internet Explorer 9.0, 10.0, 11.0 (32 and 64 bit) System s Parent topic: Preparation Web Console Table 1. Minimum Web Console s Browser Microsoftt Internet Explorer 9.0, 10.0, 11.0 (32 and 64 bit) Mozilla Firefox 52.5.0 (ESR), 56.0.2, 57.0.1, 58.0 Google

More information

Gateway Ascii Command Protocol

Gateway Ascii Command Protocol Gateway Ascii Command Protocol Table Of Contents Introduction....2 Ascii Commands.....3 Messages Received From The Gateway....3 Button Down Message.....3 Button Up Message....3 Button Maintain Message....4

More information

538 Lecture Notes Week 1

538 Lecture Notes Week 1 538 Clowes Lecture Notes Week 1 (Sept. 6, 2017) 1/10 538 Lecture Notes Week 1 Announcements No labs this week. Labs begin the week of September 11, 2017. My email: kclowes@ryerson.ca Counselling hours:

More information

Microsoft SQL Server 2012

Microsoft SQL Server 2012 Microsoft SQL Server 2012 INSTALLATION MANUAL Page 1 Table of Contents 1. Microsoft SQL Server 2012... 3 1.1 Microsoft SQL Server 2012 Installation...3 1.1.1 Installation Requirement of Microsoft SQL Server

More information

AES, DES, and RSA Support (Intended for Domestic Use) SASEBO-W Smart Card OS Specification

AES, DES, and RSA Support (Intended for Domestic Use) SASEBO-W Smart Card OS Specification AES, DES, and RSA Support (Intended for Domestic Use) SASEBO-W Smart Card OS Specification Version 0.4-5 April 1, 2011 National Institute of Advanced Industrial Science and Technology (AIST) Table of Contents

More information

Report on the USB Interface

Report on the USB Interface Report on the USB Interface Ian Coulter July 20, 2008 The USB interface, as it was before any changes were made, is found in c:\licas\tools as USB Control.exe. Changes were made using the c++ files in

More information

ECHO Process Instrumentation, Inc. Modbus RS485 Module. Operating Instructions. Version 1.0 June 2010

ECHO Process Instrumentation, Inc. Modbus RS485 Module. Operating Instructions. Version 1.0 June 2010 ECHO Process Instrumentation, Inc. Modbus RS485 Module Operating Instructions Version 1.0 June 2010 ECHO Process Instrumentation, Inc. PO Box 800 Shalimar, FL 32579 PH: 850-609-1300 FX: 850-651-4777 EM:

More information

nèorapportpro 6.9 User Manual Mac OS / Windows Module for Adobe Photoshop July, 2013 Inèdit Software S.L.

nèorapportpro 6.9 User Manual Mac OS / Windows Module for Adobe Photoshop July, 2013 Inèdit Software S.L. Mac OS / Windows Module for Adobe Photoshop User Manual July, 2013 Inèdit Software S.L. INDEX 1. What is nèorapportpro? 2. Starting nèorapportpro 3. Main window 4. Automatic rapport 5. Rapport options

More information

ArcReader 8.3 System Requirements

ArcReader 8.3 System Requirements ArcReader 8.3 System Requirements This PDF contains system requirements information, including hardware requirements, best performance configurations, and limitations, for ArcReader 8.3. PC-Intel Windows

More information

SMART Response XE interactive response system Receiver and clicker

SMART Response XE interactive response system Receiver and clicker Specifications SMART Response XE interactive response system Receiver and clicker Physical specifications Receiver size 4 5/8" W 7/8" H 2 1/8" D (119 mm 22 mm 54 mm) Receiver weight 5 3/4 oz. (165 g) size

More information

ENGINEERING COMMITTEE Digital Video Subcommittee AMERICAN NATIONAL STANDARD ANIS/SCTE

ENGINEERING COMMITTEE Digital Video Subcommittee AMERICAN NATIONAL STANDARD ANIS/SCTE ENGINEERING COMMITTEE Digital Video Subcommittee AMERICAN NATIONAL STANDARD ANIS/SCTE 201 2013 Open Media Security (OMS) Root Key Derivation Profiles and Test Vectors NOTICE The Society of Cable Telecommunications

More information

Chapter. Computer Architecture

Chapter. Computer Architecture Chapter 4 Computer Architecture Figure 4.1 Input device Central processing unit Main memory Output device Bus Data flow Control Figure 4.2 Central processing unit () Status bits ( ) Accumulator ( ) Index

More information

Mark II Aiken Relay Calculator

Mark II Aiken Relay Calculator Introduction to Embedded Microcomputer Systems Lecture 6.1 Mark II Aiken Relay Calculator 2.12. Tutorial 2. Arithmetic and logical operations format descriptions examples h 8-bit unsigned hexadecimal $00

More information

Enhanced Play Fair Cipher

Enhanced Play Fair Cipher P Enhanced Play Fair Cipher 1 1 Naveen KMP P, PDepartment of Information Technology, Velammal Engineering College, Chennai, Tamil Nadu, India. Abstract The theme of this research work is to design and

More information

Overview. Installation Overview CHAPTER

Overview. Installation Overview CHAPTER CHAPTER 1 This chapter provides an overview of the Cisco IPICS server software installation. It also contains information about system requirements for the Cisco IPICS server software and the PMC application.

More information

Lab Determining Data Storage Capacity

Lab Determining Data Storage Capacity Lab 1.3.2 Determining Data Storage Capacity Objectives Determine the amount of RAM (in MB) installed in a PC. Determine the size of the hard disk drive (in GB) installed in a PC. Determine the used and

More information

Network Security. Chapter 4 Symmetric Encryption. Cornelius Diekmann With contributions by Benjamin Hof. Technische Universität München

Network Security. Chapter 4 Symmetric Encryption. Cornelius Diekmann With contributions by Benjamin Hof. Technische Universität München Networ Security Chapter 4 Symmetric Encryption Cornelius Diemann With contributions by Benjamin Hof Lehrstuhl für Netzarchiteturen und Netzdienste Institut für Informati Version: October 29, 2015 IN2101,

More information

Stream Ciphers and Block Ciphers

Stream Ciphers and Block Ciphers Stream Ciphers and Block Ciphers Ruben Niederhagen September 18th, 2013 Introduction 2/22 Recall from last lecture: Public-key crypto: Pair of keys: public key for encryption, private key for decryption.

More information

Professional Edition. Hardware Requirements

Professional Edition. Hardware Requirements Professional Edition Hardware Requirements For Blackbaud FundWare 1 to 8 user environments Revised August 6 th, 2008 Table of Contents Supported Platforms... 3 Single-User Environment... 4 2-User Environment...

More information

The Chameleon Polymorphic Cipher (CC-192) Magdy Saeb

The Chameleon Polymorphic Cipher (CC-192) Magdy Saeb The Chameleon Polymorphic Cipher (CC-192) Magdy Saeb The Chameleon Cipher-192 The Chameleon Cipher-192 is a polymorphic cipher that utilizes a variable word size and variable-size user s key. In the preprocessing

More information

Scream: a software-efficient stream cipher

Scream: a software-efficient stream cipher Scream: a software-efficient stream cipher Shai Halevi, Don Coppersmith, and Charanjit Jutla IBM T.J. Watson Research Center, Yorktown Heights, NY 10598, USA, {shaih,copper,csjutla}@watson.ibm.com Abstract.

More information

ACR1281U-C2. Card UID Reader. Reference Manual Subject to change without prior notice.

ACR1281U-C2. Card UID Reader. Reference Manual Subject to change without prior notice. ACR1281U-C2 Card UID Reader Reference Manual 1.01 Subject to change without prior notice Table of Contents 1.0. Introduction... 3 2.0. Features... 4 3.0. Typical Applications... 5 4.0. Reference Documents...

More information

6. Symmetric Block Cipher BLOWFISH Performance. Memory space. 3. Simplicity The length of the key. The length of the data block is 64.

6. Symmetric Block Cipher BLOWFISH Performance. Memory space. 3. Simplicity The length of the key. The length of the data block is 64. belongs to the same class of conventional symmetric ciphers. The basic principles of have been published in 1994 by Bruce Schneier, as an alternative to the Data encryption standard (DES) to satisfy the

More information

ZN-DN312XE-M Quick User Guide

ZN-DN312XE-M Quick User Guide ZN-DN312XE-M Quick User Guide This manual provides instructions for quick installation and basic configuration of your IP device. Step1. Connect cables to IP device Connect required cables to the device

More information

Cryptography and Network Security. Sixth Edition by William Stallings

Cryptography and Network Security. Sixth Edition by William Stallings Cryptography and Network Security Sixth Edition by William Stallings Chapter 3 Block Ciphers and the Data Encryption Standard All the afternoon Mungo had been working on Stern's code, principally with

More information

MINIMUM HARDWARE AND OS SPECIFICATIONS File Stream Document Management Software - System Requirements for V4.2

MINIMUM HARDWARE AND OS SPECIFICATIONS File Stream Document Management Software - System Requirements for V4.2 MINIMUM HARDWARE AND OS SPECIFICATIONS File Stream Document Management Software - System Requirements for V4.2 NB: please read this page carefully, as it contains 4 separate specifications for a Workstation

More information

Acquirer JCB EMV Test Card Set

Acquirer JCB EMV Test Card Set Acquirer JCB EMV Test Card Set July, 2017 Powered by Disclaimer Information provided in this document describes capabilities available at the time of developing this document and information available

More information

NETWRIX INACTIVE USER TRACKER

NETWRIX INACTIVE USER TRACKER NETWRIX INACTIVE USER TRACKER QUICK-START GUIDE Product Version: 3.0.106 March 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

Scream: A Software-Efficient Stream Cipher

Scream: A Software-Efficient Stream Cipher Scream: A Software-Efficient Stream Cipher Shai Halevi, Don Coppersmith, and Charanjit Jutla IBM T.J. Watson Research Center, Yorktown Heights, NY 10598, USA, {shaih,copper,csjutla}@watson.ibm.com Abstract.

More information

CIS-331 Final Exam Spring 2015 Total of 115 Points. Version 1

CIS-331 Final Exam Spring 2015 Total of 115 Points. Version 1 Version 1 1. (25 Points) Given that a frame is formatted as follows: And given that a datagram is formatted as follows: And given that a TCP segment is formatted as follows: Assuming no options are present

More information

COSC 6385 Computer Architecture. Instruction Set Architectures

COSC 6385 Computer Architecture. Instruction Set Architectures COSC 6385 Computer Architecture Instruction Set Architectures Spring 2012 Instruction Set Architecture (ISA) Definition on Wikipedia: Part of the Computer Architecture related to programming Defines set

More information

More advanced CPUs. August 4, Howard Huang 1

More advanced CPUs. August 4, Howard Huang 1 More advanced CPUs In the last two weeks we presented the design of a basic processor. The datapath performs operations on register and memory data. A control unit translates program instructions into

More information

SANsurfer FC/CNA HBA Command Line Interface (CLI) Table of Contents

SANsurfer FC/CNA HBA Command Line Interface (CLI) Table of Contents SANsurfer FC/CNA HBA Command Line Interface (CLI) QLogic Corporation. All rights reserved. Table of Contents 1. Package Contents 2. Requirements 2.1 Hardware Requirements 2.2 Software Requirements 3. OS

More information

CHAPTER TWELVE - Memory Devices

CHAPTER TWELVE - Memory Devices CHAPTER TWELVE - Memory Devices 12.1 6x1,024 = 16,384 words; 32 bits/word; 16,384x32 = 524,288 cells 12.2 16,384 addresses; one per word. 12.3 2 16 = 65,536 words = 64K. Thus, memory capacity is 64Kx4.

More information

Sentinel Hardware Keys SDK Version for Windows Release Notes

Sentinel Hardware Keys SDK Version for Windows Release Notes Sentinel Hardware Keys SDK Version 1.2.0 for Windows Release Notes Product Overview This document contains an overview of the product, new features, and installation of the Sentinel TM Keys SDK release

More information

Control Center 15 Performance Reference Guide

Control Center 15 Performance Reference Guide Control Center 15 Performance Reference Guide Control Center front-end application This guide provides information about Control Center 15 components that may be useful when planning a system. System specifications

More information

Minimum Hardware and OS Specifications

Minimum Hardware and OS Specifications Hardware and OS Specifications File Stream Document Management Software System Requirements for v4.5 NB: please read through carefully, as it contains 4 separate specifications for a Workstation PC, a

More information

Communication and Networks. Problems

Communication and Networks. Problems Electrical and Information Technology Communication and Networks Problems Network Layer (IP) 2016 Problems 1. The table below describes the next hop for each destination in the network for all nodes in

More information

MICROPROCESSOR TECHNOLOGY

MICROPROCESSOR TECHNOLOGY MICROPROCESSOR TECHNOLOGY Assis. Prof. Hossam El-Din Moustafa Lecture 20 Ch.10 Intel Core Duo Processor Architecture 2-Jun-15 1 Chapter Objectives Understand the concept of dual core technology. Look inside

More information

SANsurfer Fibre Channel Command Line Interface (CLI) Table of Contents

SANsurfer Fibre Channel Command Line Interface (CLI) Table of Contents SANsurfer Fibre Channel Command Line Interface (CLI) QLogic Corporation All rights reserved Table of Contents 1 Package Contents 2 Requirements 2.1 Hardware Requirements 2.2 Software Requirements 3 OS

More information

Operating Manual Ver 1.1

Operating Manual Ver 1.1 8085 Based Microprocessor Operating Manual Ver 1.1 An ISO 9001 : 2000 company 94-101, Electronic Complex Pardeshipura, Indore- 452010, India Tel : 91-731- 2570301/02, 4211100 Fax: 91-731- 2555643 email

More information

Systems Design and Programming. Instructor: Chintan Patel

Systems Design and Programming. Instructor: Chintan Patel Systems Design and Programming Instructor: Chintan Patel Text: Barry B. Brey, 'The Intel Microprocessors, 8086/8088, 80186/80188, 80286, 80386, 80486, Pentium and Pentium Pro Processor, Pentium II, Pentium

More information

JUN / 05 Version 8 T L S T D F 6 5 ME

JUN / 05 Version 8 T L S T D F 6 5 ME JUN / 05 Version 8 TLSTDF65ME www.smar.com Specifications and information are subject to change without notice. Up-to-date address information is available on our website. web: www.smar.com/contactus.asp

More information

ABSTRACT. Dr. Ekhlas Abbas Albahrani, Tayseer Karam Alshekly Department of Computer Science, Mustansiriyah University, Baghdad, Iraq

ABSTRACT. Dr. Ekhlas Abbas Albahrani, Tayseer Karam Alshekly Department of Computer Science, Mustansiriyah University, Baghdad, Iraq 2017 IJSRSET Volume 3 Issue 5 Print ISSN: 2395-1990 Online ISSN : 2394-4099 Themed Section: Engineering and Technology A Text Encryption Algorithm Based on Self-Synchronizing Stream Cipher and Chaotic

More information

KIP AutoCAD Installation and User Guide

KIP AutoCAD Installation and User Guide - 1 - - 2 - Contents 1 Introduction... 4 Recommended PC Specifications:... 5 2 Installation... 6 3 AutoCAD Driver Functionality... 13 4 Using the KIP AutoCAD Driver... 20 5 Appendix A... 22 KIP Track Features

More information

Initial Bootloader. On power-up, when a computer is turned on, the following operations are performed:

Initial Bootloader. On power-up, when a computer is turned on, the following operations are performed: Initial Bootloader Introduction On power-up, when a computer is turned on, the following operations are performed: 1. The computer performs a power on self test (POST) to ensure that it meets the necessary

More information

Parallax Serial LCD 2 rows x 16 characters Non-backlit (#27976) 2 rows x 16 characters Backlit (#27977) 4 rows x 20 characters Backlit (#27979)

Parallax Serial LCD 2 rows x 16 characters Non-backlit (#27976) 2 rows x 16 characters Backlit (#27977) 4 rows x 20 characters Backlit (#27979) 599 Menlo Drive, Suite 100 Rocklin, California 95765, USA Office: (916) 624-8333 Fax: (916) 624-8003 General: info@parallax.com Technical: support@parallax.com Web Site: www.parallax.com Educational: www.stampsinclass.com

More information

Installation Guide. Contents

Installation Guide. Contents Installation Guide Contents System Requirements 2 Minimum PC Configuration 2 Recommended PC Configuration 2 Network Ports & Firewalls 3 Directory & Registry Permissions 3 Installation Procedure 4 Application

More information

An Efficient Stream Cipher Using Variable Sizes of Key-Streams

An Efficient Stream Cipher Using Variable Sizes of Key-Streams An Efficient Stream Cipher Using Variable Sizes of Key-Streams Hui-Mei Chao, Chin-Ming Hsu Department of Electronic Engineering, Kao Yuan University, #1821 Jhongshan Rd., Lujhu Township, Kao-Hsiung County,

More information

ACT! by Sage Corporate Edition 2010 System Requirements

ACT! by Sage Corporate Edition 2010 System Requirements ACT! by Sage Corporate Edition 2010 System Requirements (Includes ACT! by Sage Premium and ACT! by Sage Premium for Web) Important Note: All minimum system requirements are based on a single-user environment

More information

Evolution of Sha-176 Algorithm

Evolution of Sha-176 Algorithm IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 2, Issue 2 (July-Aug. 2012), PP 18-22 Evolution of Sha-176 Algorithm Piyush Garg 1, Namita Tiwari 2 1,2 (Computer Science and Engineering,

More information

Introduction Presentation A

Introduction Presentation A CSE 2421/5042: Systems I Low-Level Programming and Computer Organization Introduction Presentation A Read carefully: Bryant Chapter 1 Study: Reek Chapter 2 Skim: Reek Chapter 1 08/22/2018 Gojko Babić Some

More information

Read this before starting!

Read this before starting! Points missed: Student's Name: Total score: /100 points East Tennessee State University Department of Computer and Information Sciences CSCI 2150 (Tarnoff) Computer Organization TEST 3 for Fall Semester,

More information

Technical Brief: Specifying a PC for Mascot

Technical Brief: Specifying a PC for Mascot Technical Brief: Specifying a PC for Mascot Matrix Science 8 Wyndham Place London W1H 1PP United Kingdom Tel: +44 (0)20 7723 2142 Fax: +44 (0)20 7725 9360 info@matrixscience.com http://www.matrixscience.com

More information

1 of :24 PM

1 of :24 PM 1 of 5 11-12-19 2:24 PM Navigation Intel HEX format Home Knowledge Base File Formats Binary Format HEX Format Intel HEX Format Motorola Sxx Rec FPC Format MOS Technology Signetics Format Tektronix Format

More information

GATE Exercises on Microprocessors

GATE Exercises on Microprocessors 1 GATE Exercises on Microprocessors Abstract This problem set has questions taken from GATE papers over the last twenty years. Teachers can use the problem set for courses tutorials. 1) The clock frequency

More information

CSCI 454/554 Computer and Network Security. Topic 3.1 Secret Key Cryptography Algorithms

CSCI 454/554 Computer and Network Security. Topic 3.1 Secret Key Cryptography Algorithms CSCI 454/554 Computer and Network Security Topic 3.1 Secret Key Cryptography Algorithms Outline Introductory Remarks Feistel Cipher DES AES 2 Introduction Secret Keys or Secret Algorithms? Security by

More information

AttAcc Systems Installation

AttAcc Systems Installation AttAcc Systems Installation Contents Instructions... 2 System Requirements... 3 AttAcc System Requirements... 3... 3 Operating System and Software Requirements... 3.NET Framework 4.5 System Requirements...

More information

ETSI TS V ( )

ETSI TS V ( ) TS 135 233 V12.1.0 (2014-10) TECHNICAL SPECIFICATION Universal Mobile Telecommunications System (UMTS); LTE; Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication

More information

CS 265. Computer Architecture. Wei Lu, Ph.D., P.Eng.

CS 265. Computer Architecture. Wei Lu, Ph.D., P.Eng. CS 265 Computer Architecture Wei Lu, Ph.D., P.Eng. 1 Part 1: Data Representation Our goal: revisit and re-establish fundamental of mathematics for the computer architecture course Overview: what are bits

More information

KRAMER ELECTRONICS LTD. USER MANUAL MODEL: VA-8xl 8-Channel Balanced Stereo Audio Amplifier. P/N: Rev 1

KRAMER ELECTRONICS LTD. USER MANUAL MODEL: VA-8xl 8-Channel Balanced Stereo Audio Amplifier. P/N: Rev 1 KRAMER ELECTRONICS LTD. USER MANUAL MODEL: VA-8xl 8-Channel Balanced Stereo Audio Amplifier P/N: 2900-300151 Rev 1 Contents 1 Introduction 1 2 Getting Started 2 2.1 Achieving the Best Performance 2 3

More information

NETWRIX PASSWORD EXPIRATION NOTIFIER

NETWRIX PASSWORD EXPIRATION NOTIFIER NETWRIX PASSWORD EXPIRATION NOTIFIER QUICK-START GUIDE Product Version: 3.3.247 March 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

AIT 682: Network and Systems Security

AIT 682: Network and Systems Security AIT 682: Network and Systems Security Topic 3.1 Secret Key Cryptography Algorithms Instructor: Dr. Kun Sun Outline Introductory Remarks Feistel Cipher DES AES 2 Introduction Secret Keys or Secret Algorithms?

More information

AES Core Specification. Author: Homer Hsing

AES Core Specification. Author: Homer Hsing AES Core Specification Author: Homer Hsing homer.hsing@gmail.com Rev. 0.1.1 October 30, 2012 This page has been intentionally left blank. www.opencores.org Rev 0.1.1 ii Revision History Rev. Date Author

More information

TEST DVD-VIDEO/ DVD-ROM For Checking DVD Players, DVD Recorders and DVD Drives TDH-940

TEST DVD-VIDEO/ DVD-ROM For Checking DVD Players, DVD Recorders and DVD Drives TDH-940 TEST DVD-VIDEO/ DVD-ROM For Checking DVD Players, DVD Recorders and DVD Drives TDH-940 Product Introduction. Purpose of use, Features TDH-940 is a Test Disc designed for confirmation of operation of DVD

More information

Application Note IC-2-RS485

Application Note IC-2-RS485 Application Note IC-2-RS485 Revision 1.0 July 2010 Serial Control of Iconyx RHAON Series Arrays Abstract: The Iconyx RHAON models have an RS485 connection for serial control via third-party controllers

More information

MW100 CAN Bus Module Configuration Tool (MX118-CAN-M30/S1) User s Manual

MW100 CAN Bus Module Configuration Tool (MX118-CAN-M30/S1) User s Manual MW100 CAN Bus Module Configuration Tool (MX118-CAN-M30/S1) User s Manual 1 Contents Before Using the Software... 3 Explanation of Functions... 3 MX118 Part Names and Functions... 3 Operation Guide... 4

More information

Polycom RealPresence Content Sharing Suite

Polycom RealPresence Content Sharing Suite RELEASE NOTES Version 1.0 February 2013 3725-03262-001 Polycom RealPresence Content Sharing Suite i Trademarks 2013, Polycom, Inc. All rights reserved. POLYCOM, the Polycom logo and the names and marks

More information

HAWKWARE CUSTOMTOOLS INSTALLATION GUIDE

HAWKWARE CUSTOMTOOLS INSTALLATION GUIDE HAWKWARE CUSTOMTOOLS INSTALLATION GUIDE Table of Contents Introduction... 3 About this Document... 3 Intended Audience... 3 Windows 7... 3 Windows 8... 3 Windows Server 2008 R2... 3 Using this Document...

More information

IMAGE ENCRYPTION BASED ON ARNOLD TRANSFORMATION

IMAGE ENCRYPTION BASED ON ARNOLD TRANSFORMATION Gulf Journal of Mathematics Vol 4, Issue 4 (2016) 103-107 IMAGE ENCRYPTION BASED ON ARNOLD TRANSFORMATION M. ESSAID 1, A. JARJAR 2, I. AKHARRAZ 3 A. SAAIDI 4 AND A. MOUHIB 5 Abstract. In this paper we

More information

IDIS Solution Suite. Streaming Service. Software Manual. Powered by

IDIS Solution Suite. Streaming Service. Software Manual. Powered by Solution Suite Software Manual Streaming Service Powered by Before reading this manual This Operation Manual provides instructions for using Solution Suite, a network integration solution enabling remote

More information