A Comparative Analysis of Encryption Algorithms for Better Utilization
|
|
- Griffin Ward
- 5 years ago
- Views:
Transcription
1 A Comparatve Analyss of Encrypton Algorthms for Better Utlzaton Anuj Kumar M.tech(IT) Sapna Snha Astt. Professor Rahul Chaudhary M.tech(CSE) ABSTRACT Cryptographc algorthms provde securty aganst attacks durng encrypton of data. However, they are computatonally ntensve applcaton and consume large amount of CPU tme [1] and space at tme of encrypton. The goal of ths paper s to compare the dfferent encrypton algorthm and to fnd space complexty of the encrypted and decrypted data y usng complextes of encrypton algorthm.. In ths paper provde comparson etween fve most wdely used algorthms. Based on followng expermental t can e seen that TDES n general perform etter than other algorthms. In ths, fnd that how these algorthms etter utlze for mprovng performances of algorthms n terms of space complexty. General Terms Algorthms Key words Cryptographc algorthm, encrypton, lock cpher, stream cpher, space complexty INTRODUCTION Encrypton s ascally hdng of data whle eng transmtted or stored [2].The encrypton process conssts of an algorthm and a key. The key controls the algorthm. The ojectve s to desgn an encrypton technque so that t would e very dffcult or mpossle for an authorzed party to understand the content of the cpher text. A use can recover the orgnal message only y decryptng the cpher text usng securty key. Dependng upon the secret key used, the algorthm wll produce a dfferent output. If the secret key changes then the output of the algorthm also changes. A key s used for performng encrypton and decrypton. Key s a specfc numer (usually large one) whch s usually used y the algorthms and ts calculaton [2]. There are two types of encrypton algorthms. These are dscussed n detal elow- 1. Symmetrc key encrypton 2. Asymmetrc key encrypton 1. SYMMETRIC KEY ENCRYPTION In symmetrc key encrypton algorthm can e used only one secret key for encryptng and decryptng data. Whle usng symmetrc key cryptographc encrypton algorthms, key can e calculated from decrypton key and also ther vce versa. When mplementng symmetrc key encrypton t can e very effcent, due to ths user cannot face any sgnfcant tme delays durng encryptng and decryptng data. It provde a degree of authentcaton.e. data cannot e decrypted through other key. It s only enefcal for the user f encrypton key s kept secret. The authorty of symmetrc key encrypton depends upon sze of the key [1]. Symmetrc key encrypton algorthm s of two types- 1.1 Block cpher 1.2 Stream cpher 1.1 Block cpher A lock cpher can operates on lock of data. Block cpher algorthms that permute N-t lock of plantext data encrypted any other [2]. In ths algorthm reaks nto lock and perform operaton on each lock ndependently. It uses locks of 8 or 16 ytes long. Securty of lock cpher s ascally dependng upon the encrypton functon. Software mplementaton of lock cpher runs faster than software mplementaton of stream cpher. Error transmttng n one lock generally does not affect other lock. The data contans n each lock s encrypted ndependently, usng the same key, dentcal plantext locks produce dentcal cpher text locks. Suppose that plan text s 227 yte long and the cpher text you are usng operates on 16- yte locks. Algorthm takes the frst 16-ytes of data, encrypts them usng the key tale. Algorthm provdes 16-yte of cpher text. After frst lock, algorthm takes next lock. The key tale doesn t change from lock to lock. Plan text= 227 ytes Block sze= 16 ytes = = 14 locks plus 3 ytes Algorthm encrypts 14 ytes and 3 ytes reman. For encrypton last 3 ytes data paddng s used. Extra ytes are added to make the last lock sze of 16 ytes. Whoever decrypts the cpher text must e ale to recognze the paddng. One prolem wth lock cphers s that f the same lock of plan text appears n two places, t encrypts to the same cpher text. To avod havng these knds of copes n the cpher text, feedack modes are used. Cpher lock channg s not contanng the extra nformaton that acqures t space, so every t n the lock s part of the massage. Before plan text s encphered, that lock s XORed wth precedng cpher text lock. It requres an ntalzaton vector to XOR the ntal plan text lock n addton of a key. For decryptng the data, copy a lock of cpher text, decrypt t and XOR the result wth the precedng lock of cpher text. Up to now, there have een numer of research artcles pontng out the performance of the compared algorthms [2]. Takng E to e the decpherment algorthm wth key and ntalzng vector s I, technque used n ths algorthm s- C Ek m ) 0 ( 0 I Ek ( m C 1 C For > 0 There are dfferent lock cpher algorthm- 1. One tme pad 2. IDEA 3. Blowfsh 19
2 4. RC2 5. Serpen 6. CAST-5 7. RC6 1.2 Stream cpher Desgnng of these algorthms to accept a crypto key and a stream of plan text to produce a stream of cpher text. Stream cpher comprses of two man components: a mxng functon and a key stream [2]. Mxng functon s usually exactly an XOR functon, whereas key stream generator s the man unt n stream cpher encrypton [1, 3]. Stream cpher ascally operates on small unts of plan text. It s faster than lock cpher. Stream cpher produces the nput element contnuously producng one output at a tme. It uses fewer amounts of codes and key s uses only once. Many stream cpher algorthms are used for hardware mplementaton. Stream cpher encrypts smaller lock of data, typcally ts or ytes. A key stream generator outputs a stream of ts K1, K2,K3.K. Ths key stream s XORed wth a stream of plan ts p1, P2,P3.P to produce the stream of cpher text ts. C P K.At the descrpton end, the cpher text ts are XORed wth an dentcal key stream to recover the plan text ts. Y1. Wth the message X and encrypton x and encrypton key Ku as nput, X1 forms the cpher text. Y= (Y1, Y2, Y3. Y ) n Y E (X ) Ku The recever, n possesson of the matchng prvate key s ale to nvert the transformaton. Y D (Y) KRB An opponent, oservng y and access to pulc key ( not havng access to prvate key ( K R K u ), ut ), must attempt to recover X. It s assumed that the opponent does have knowledge of the encrypton (E) and decrypton algorthms (D). Pulc key cryptography requres each user to have two keys: A pulc key used y anyone for encryptng messages to e sent to that user and a prvate key, whch the user need to decryptng messages. There s dfferent asymmetrc key encrypton algorthms- 1. RSA encrypton algorthm 2. Dffe Hellman key exchange 3. Dgtal sgnature algorthm 4. ElGamal P C K The system securty depend s entrely on the nsde of keys team generator. There are dfferent stream cpher algorthms- 1. Salasa2 2. HC VMP 4. RC4 5. HC25 6. Gran 2. Asymmetrc key encrypton Asymmetrc key encrypton algorthm also called pulc key encrypton algorthm. It s used n message authentcaton and key dstruton. These algorthms are ased on mathematcal functons. It uses two separate keys.e. encrypton key and decrypton oth are dfferent and the decrypton key could not e derved from the encrypton key. Only the authorzed person can e ale to decrypt the cpher text through hs own prvate key [4]. Followng steps are requred for ths algorthm. 1. Each end system n a computer network generates a par of keys to e used for encrypton and decrypton of messages that I wll receve. 2. Each system pulshes ts encrypton key.e. ths s pulc key. The companon key s kept prvate. 3. If X1 wshes to send a message to Y1, t encrypts the message usng Y1 s pulc key. After Y1 receves the message, t decrypts the message y usng Y1 s prvate key. The pulc key s accessed to all partcpants and prvate key us generated locally y each partcpant. System controls ts prvate key. At any tme, a system can change ts prvate key. Fgure 1 shows the process of pulc key algorthm. A message from source whch s n a plan text, X=(X1, X2, X3 X ). The message s ntended for destnaton m whch generates a related par of keys a pulc key Ku, and a prvate key KR. Prvate Key s secret key and known only to Fg1: Model of cryptographc system for Encrypton and Decrypton 3. IMPLEMENTED ALGORITHMS These are followng encrypton algorthm that are chosen for the mplementaton- 3.1 DES 3.2 TDES 3.3 RSA 3.4 Blowfsh 3.5 XOR 3.1 DES encrypton In may 1973, NIST (then NBS) called for possle encrypton algorthms for use n unclassfed adopted encrypton algorthm and s many standard around the world (e.g. Australan standards AS ) [5]. The plantext locks of data n and put through an ntal permutaton. 1. Put plantext K= {} 2. Dvde plantext K nto n 64-t lock 3. Repeat for each lock for =0 to n-1 4. Performed calculaton of ntal permutaton 5. After that dvded nto two parts 6. Po= left sde su part 7. Qo= rght sde su part 20
3 8. round I has nputs P-1, Q-1 9. Output of t wll e P= Q-1, Q=P-1 XOR f(q-1,m) 10. For th round M s the su key where After completon of round 16, nterchange Lo and Ro// whch conforms decrypton algorthm has same structure as encrypton algorthm At last, compute IP 13. The output wll e cphertext.e. output=cphertext Fg3: TDES Encrypton/Decrypton [7] Fg2: DES Encrypton [7] 3.2 TDES encrypton Trple DES s one of the other modes of encrypton and decrypton. It requres three 64-t keys and havng overall key length s 192 ts. TDES s a proposal ased on the Exstng DES, and was standardzed n ANSI X9.17 & ISO 8732 and n PEM for key management [5]. The procedure for encrypton s exactly the same as regular DES, ut repeat t three tmes. The data s encrypted wth the key (K1), decrypted wth the second key (K2), and fnally encrypted agan wth the thrd key (K3). Trple DES wth three keys s requred quet extensvely n many products ncludng PGP and S/MIME. Brute force search mpossle on trple DES. Meet-n-mddle attacks needs 256 Plantext-Cpher text pars per key. Cpher text s produced as C=Ek3 [Dk2 [Ek1 [P]]]. 3.3 RSA encrypton The RSA algorthm s developed n 1977 y Rvest, Shamr, Adleman (RSA) at MPT. It has een wdely used for many years on the nternet for securty and authentcaton n many applcatons ncludng credt card payments, emal and remote logn sessons [6]. RSA algorthm s pulc key encrypton type algorthm. In ths algorthm, one user (party) uses a pulc key and other user uses a secret key (prvate key) key. In the RSA algorthm each staton ndependently and randomly chooses two large prmes p and q numer, and multples them to produce n=pq whch s the modulus used n the arthmetc calculatons of the algorthm. The process of RSA algorthm s as follows. 1. Select p and q ut oth r prme numers. 2. Calculate n= pq 3. Calculate z= (p-1)(q-1) 4. Select nteger D whch s relatvely prme to 2. gcd ɸ (n)d= 1 (ɸ(n)= z) 5. Calculate ED= 1 mod (ɸ (n)) For encrypton: C P E modn Where P s plan text, C s cpher text(encrypton) For decrypton (for calculatng plan text) P C D modn 3.4 Blowfsh encrypton Many of the encrypton algorthms n today s tme do not, show to pulc- most of them are protected y patents [1] (e.g. Khufu, REDOCII, and IDEA) n whch secrecy provde y the governments. A lowfsh algorthm s a symmetrc lock cpher whch can take a key of varale length, from 32(4 Bytes) to 448t (56 Bytes) [2] that makes t enefcal for exportale and domestc use. The elementary operator of Blowfsh algorthm ncludes tale lookup, addton and XOR [5]. Blowfsh algorthm manly contans two parts- the key expanson part and the data-encrypton part [2]. Key expanson part changes a key length from 48 ts nto 4168 ytes. It 21
4 contans P-array and havng four S-oxes. P-array contans 18 of 32 ts su keys, whle each S-ox contans 256 entres. Encrypton of data performs y 16-round Festal structure. The su keys are calculated y usng followng steps- 1. Frst ntalze P-array and S-oxes. 2. Usng two XOR P-arrays of key ts 32 ts each. 3. Perform aove methods for encryptng all zeros. 4. Otan new output s P1 and P2. 5. Usng su keys encrypts new otan output P1 and P2. 6. Then otan new output s P3 and P4. 7. Repeat same steps upto 521 tmes n order to calculate new su keys for P-array and the four S-oxes. 2. Perform XOR y usng same key 3. Convertng otaned nary code to hexadecmal code 4. After, converts t nto ASCII code 5. Otanng the plan text 4. RESULT ANALYSIS Analyzng of dfferent algorthms can performng y encrypton and decrypton on varous sze of data. An XOR algorthm converts the plan text nto ASCII value and after that converts t nto hexadecmal and then nary. In last, performng XORng wth key whch s easly performed. Whle n lowfsh technque, frst dvde plan text nto 64 ts locks and then separated nto left and rght halves and performng teratve process usng 8 to 448 wth 16 Festal round wth four S-oxes. Due to ths t takes more space than XOR, DES and TDES. Tale1: space complextes of encrypton algorthms of dfferent sze of data Algorthm efore encrypton After encrypton After Decrypton XOR 160 KB 160 KB 160 KB DES 160 KB 218 KB 160 KB TDES 160 KB 390 KB 160 KB BLOWFISH 160 KB 574 KB 160 KB DES can also 16 rounds of Festal usng 56 key wth permutaton whch takes large space than XOR and TDES ut less space than Blowfsh whch s varaton of DES uses 168 key, that requre large space than DES and XOR ut smaller than Blowfsh. Assume that, encryptng same fle y dfferent encrypton technques then results are- Fg4: each round acton n Blowfsh [8] 3.5 XOR encrypton In cryptography, a smple cpher s XOR cpher. Encrypton algorthm can e operate on followng prncples- A 0 = A, A A = 0, (A B) C = A (B C), (B A) A = B 0 = B Where s an exclusve dsjuncton (XOR). Sometmes t can e sad that say that modulus 2 addtons or sutracton. Usng ths logc text of a strng can e encrypted usng twse XOR operator to every character usng a every key. In ths, encrypton s done y- 1. Frst any plan text s nput 2. Plan text s converted nto ASCII representaton. 3. after that converts nto hexadecmal representaton. 4. Converts t nto nary equvalent representaton. 5. Usng XOR wth key that converted nto same plan text. 6. Cpher text s otaned. Decrypton s done y- 1. Input a cpher text Fg5: Comparson encrypton algorthms n terms of space 22
5 5. CONCLUSION AND FUTURE SCOPE On the ass of mplementaton and ther results, notced that XOR s the fastest technque ut t s very smple and acqure less space for storng ntermedate cpher text whch s approxmately same as orgnal plan text whle other two.e. DES and TDES are advanced technque then XOR, these are fast and secure due to ts large sze of the key length and havng 16 Festal rounds wth permutaton n each round. Whle usng Blowfsh s faster than oth DES and TDES ecause t uses four S-oxes n 16 Festel rounds t t has more space complexty. After comparson of all algorthms fnd that TDES s more secure and technque can e chosen accordng to requrement. XOR algorthm s enhances as same as TDES ecause t s less secure and acqure less space than other algorthm. The space complexty s also compared wth other algorthm such as RSA, DES, IDEA. 6. REFERENCES [1] Suhala Omer Sharf, S.P. Mansoor Performance analyss of Stream and Block cpher algorthms. 3 rd Internatonal Conference on Advanced Computer Theory and Engneerng (ICACTE) [2] Allam Mousa Data Encrypton Performance Based on Blowfsh. 47 th Internatonal symposum ELMAR, Zadar, Crota [3] P.Krshnamurthy Encrypton and Power Consumpton n Wreless LANs-N. The Thrd IEEE Workshop on Wreless LANs - - Newton, Massachusetts [4] Monka Agrawal, Pradeep Mshra A Comparatve Survey on Symmetrc Key Encrypton Technques. Internatonal Journal on Computer Scence and Engneerng (IJCSE) [5] Aamer Nadeem, dr M.Younus javed A Performance Comparson of data Encrypton Algorthms. Insttute of Electrcal and Electroncs Engneers (IEEE) [6] Wllam Stallngs Cryptography and Network Securty: Prncples and practces. Dorlng Kndersley (nda) pvt ltd. [7] Krut R. Shah, Bhavka Gamhava New Approach of Data Encrypton Standard Algorthm. Internatonal Journal of Soft Computng and Engneerng (IJSCE) ISSN: Volume-2, Issue-1 [8] Jawahar Thakur and Nagesh Kumar DES, AES and Blowfsh: Symmetrc Key Cryptography Algorthms Smulaton Based Performance Analyss. Internatonal Journal of Emergng Technology and Advanced Engneerng, ISSN Volume 1, Issue 2 IJCA TM : 23
Specifications in 2001
Specfcatons n 200 MISTY (updated : May 3, 2002) September 27, 200 Mtsubsh Electrc Corporaton Block Cpher Algorthm MISTY Ths document shows a complete descrpton of encrypton algorthm MISTY, whch are secret-key
More informationRelated-Mode Attacks on CTR Encryption Mode
Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory
More informationLecture - Data Encryption Standard 4
The Data Encrypton Standard For an encrypton algorthm we requre: secrecy of the key and not of the algorthm tself s the only thng that s needed to ensure the prvacy of the data the best cryptographc algorthms
More informationA Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationMiss in the Middle Attacks on IDEA and Khufu
Mss n the Mddle Attacks on IDEA and Khufu El Bham Alex Bryukov Ad Shamr Abstract. In a recent paper we developed a new cryptanalytc technque based on mpossble dfferentals, and used t to attack the Skpjack
More informationHigh level vs Low Level. What is a Computer Program? What does gcc do for you? Program = Instructions + Data. Basic Computer Organization
What s a Computer Program? Descrpton of algorthms and data structures to acheve a specfc ojectve Could e done n any language, even a natural language lke Englsh Programmng language: A Standard notaton
More informationCluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More informationDistributed Secret Key Management Based on ECC for Ad-hoc Network Yi-xuan WU, Hua-wei CHEN * and Lei WANG
2017 2nd Internatonal Conference on Computer, Network Securty and Communcaton Engneerng (CNSCE 2017) ISBN: 978-1-60595-439-4 Dstrbuted Secret Key Management Based on ECC for Ad-hoc Network Y-xuan WU, Hua-we
More informationNUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS
ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana
More informationPrivate Information Retrieval (PIR)
2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market
More informationAssignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.
Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton
More informationA new remote user authentication scheme for multi-server architecture
Future Generaton Computer Systems 19 (2003) 13 22 A new remote user authentcaton scheme for mult-server archtecture Iuon-Chang Ln a, Mn-Shang Hwang b,, L-Hua L b a Department of Computer Scence and Informaton
More informationAn Efficient Chaos-Based Feedback Stream cipher (ECBFSC) for Image Cryptosystems
An Effcent Chaos-Based Feedback Stream cpher (ECBFSC) for Image Cryptosystems Hossam El-dn H. Ahmed, Hamdy M. Kalash, and Osama S. Farag Allah Abstract. The chaos based cryptographc algorthms have suggested
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationImprovement ofmanik et al. s remote user authentication scheme
Improvement ofmank et al. s remote user authentcaton scheme Abstract Jue-Sam Chou, a,yaln Chen b Jyun-Yu Ln c a Department of Informaton Management, Nanhua Unversty Chay, 622, Tawan schou@mal.nhu.edu.tw
More informationCracking of the Merkle Hellman Cryptosystem Using Genetic Algorithm
Crackng of the Merkle Hellman Cryptosystem Usng Genetc Algorthm Zurab Kochladze 1 * & Lal Besela 2 1 Ivane Javakhshvl Tbls State Unversty, 1, I.Chavchavadze av 1, 0128, Tbls, Georga 2 Sokhum State Unversty,
More informationTwo-Factor User Authentication in Multi-Server Networks
Internatonal Journal of ecurty and Its Applcatons Vol. 6, No., Aprl, 0 Two-Factor ser Authentcaton n Mult-erver Networks Chun-Ta L, Ch-Yao Weng,* and Chun-I Fan Department of Informaton Management, Tanan
More informationThe stream cipher MICKEY-128 (version 1) Algorithm specification issue 1.0
The stream cpher MICKEY-128 (verson 1 Algorthm specfcaton ssue 1. Steve Babbage Vodafone Group R&D, Newbury, UK steve.babbage@vodafone.com Matthew Dodd Independent consultant matthew@mdodd.net www.mdodd.net
More informationSecurity Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments
Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub
More informationA new attack on Jakobsson Hybrid Mix-Net
A new attack on Jakobsson Hybrd Mx-Net Seyyed Amr Mortazav Tehran, Iran. sa.mortezav@gmal.com Abstract The Jakobsson hybrd Mx-net proposed by Jakobsson and Juels, s a very practcal and effcent scheme for
More informationEvaluation of an Enhanced Scheme for High-level Nested Network Mobility
IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.
More informationA Secured Method for Image Steganography Based On Pixel Values
A Secured Method for Image Steganography Based On Pxel Values Tarun Gulat #, Sanskrt Gupta * # Assocate Professor, Electroncs and Communcaton Engneerng Department, MMEC, M.M.U., Mullana, Ambala, Haryana,
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationSequential search. Building Java Programs Chapter 13. Sequential search. Sequential search
Sequental search Buldng Java Programs Chapter 13 Searchng and Sortng sequental search: Locates a target value n an array/lst by examnng each element from start to fnsh. How many elements wll t need to
More informationGenetic Key Guided Neural Deep Learning based Encryption for Online Wireless Communication (GKNDLE)
Genetc Key Guded Neural Deep Learnng based Encrypton for Onlne Wreless Communcaton (GKNDLE) Arndam Sarkar Department of Computer Scence & Electroncs, Ramakrshna Msson Vdyamandra, Belur Math-711202, West
More informationSimulation Based Analysis of FAST TCP using OMNET++
Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months
More informationVRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,
VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual
More informationImprovement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration
Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,
More informationLoad Balancing for Hex-Cell Interconnection Network
Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,
More informationA Fast Content-Based Multimedia Retrieval Technique Using Compressed Data
A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,
More information3D vector computer graphics
3D vector computer graphcs Paolo Varagnolo: freelance engneer Padova Aprl 2016 Prvate Practce ----------------------------------- 1. Introducton Vector 3D model representaton n computer graphcs requres
More informationConcurrent Apriori Data Mining Algorithms
Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng
More informationProblem Definitions and Evaluation Criteria for Computational Expensive Optimization
Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty
More informationA Practical Attack on KeeLoq
Introducton Our Attacks Practce Conclusons A Practcal Attack on KeeLoq Sebastaan Indesteege 1 Nathan Keller 2 Orr Dunkelman 1 El Bham 3 Bart Preneel 1 1 Dept. ESAT/SCD-COSIC, K.U.Leuven, Belgum. 2 Ensten
More informationCourse Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms
Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques
More informationEnhanced Watermarking Technique for Color Images using Visual Cryptography
Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS
More informationEfficient Broadcast Disks Program Construction in Asymmetric Communication Environments
Effcent Broadcast Dsks Program Constructon n Asymmetrc Communcaton Envronments Eleftheros Takas, Stefanos Ougaroglou, Petros copoltds Department of Informatcs, Arstotle Unversty of Thessalonk Box 888,
More informationAn Improved User Authentication and Key Agreement Scheme Providing User Anonymity
35 JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 9, NO. 4, DECEMBER 0 An Improved User Authentcaton and Key Agreement Scheme Provdng User Anonymty Ya-Fen Chang and Pe-Yu Chang Abstract When accessng
More informationCompiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz
Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster
More informationAn enhanced dynamic-id-based remote user authentication protocol with smart card
Internatonal Journal of Engneerng Advanced Research Technology (IJEART) ISSN: 2454-9290 Volume-2 Issue-4 Aprl 206 An enhanced dynamc-id-based remote user authentcaton protocol wth smart card aoran Chen
More informationArray transposition in CUDA shared memory
Array transposton n CUDA shared memory Mke Gles February 19, 2014 Abstract Ths short note s nspred by some code wrtten by Jeremy Appleyard for the transposton of data through shared memory. I had some
More informationToday s Outline. Sorting: The Big Picture. Why Sort? Selection Sort: Idea. Insertion Sort: Idea. Sorting Chapter 7 in Weiss.
Today s Outlne Sortng Chapter 7 n Wess CSE 26 Data Structures Ruth Anderson Announcements Wrtten Homework #6 due Frday 2/26 at the begnnng of lecture Proect Code due Mon March 1 by 11pm Today s Topcs:
More informationAn Optimized Pseudorandom Generator using Packed Matrices
An Optmzed Pseudorandom Generator usng Packed Matrces JOSE-VICENTE AGUIRRE 1, RAFAEL ÁLVAREZ, LEANDRO TORTOSA 3, ANTONIO ZAMORA 4 Dpt. of Computer Scence and Artfcal Intellgence Unversty of Alcante Campus
More informationPositive Semi-definite Programming Localization in Wireless Sensor Networks
Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer
More informationCS1100 Introduction to Programming
Factoral (n) Recursve Program fact(n) = n*fact(n-) CS00 Introducton to Programmng Recurson and Sortng Madhu Mutyam Department of Computer Scence and Engneerng Indan Insttute of Technology Madras nt fact
More informationR s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes
SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges
More informationSum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints
Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan
More informationInsertion Sort. Divide and Conquer Sorting. Divide and Conquer. Mergesort. Mergesort Example. Auxiliary Array
Inserton Sort Dvde and Conquer Sortng CSE 6 Data Structures Lecture 18 What f frst k elements of array are already sorted? 4, 7, 1, 5, 1, 16 We can shft the tal of the sorted elements lst down and then
More informationCMPS 10 Introduction to Computer Science Lecture Notes
CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not
More informationMathematics 256 a course in differential equations for engineering students
Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the
More informationComputer Security 3/23/18
s s encrypt a block of plaintext at a time and produce ciphertext Computer Security 08. Cryptography Part II Paul Krzyzanowski DES & AES are two popular block ciphers DES: 64 bit blocks AES: 128 bit blocks
More informationContent Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers
IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth
More informationAADL : about scheduling analysis
AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng
More informationVectorization of Image Outlines Using Rational Spline and Genetic Algorithm
01 Internatonal Conference on Image, Vson and Computng (ICIVC 01) IPCSIT vol. 50 (01) (01) IACSIT Press, Sngapore DOI: 10.776/IPCSIT.01.V50.4 Vectorzaton of Image Outlnes Usng Ratonal Splne and Genetc
More informationThe Codesign Challenge
ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.
More informationHigh Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting
JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 11, NO. 1, MARCH 2013 9 Hgh Payload Reversble Data Hdng Scheme Usng Dfference Segmentaton and Hstogram Shftng Yung-Chen Chou and Huang-Chng L Abstract
More informationMallathahally, Bangalore, India 1 2
7 IMPLEMENTATION OF HIGH PERFORMANCE BINARY SQUARER PRADEEP M C, RAMESH S, Department of Electroncs and Communcaton Engneerng, Dr. Ambedkar Insttute of Technology, Mallathahally, Bangalore, Inda pradeepmc@gmal.com,
More informationA MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS
Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung
More informationTECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.
TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of
More informationProblem Set 3 Solutions
Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,
More informationFast Computation of Shortest Path for Visiting Segments in the Plane
Send Orders for Reprnts to reprnts@benthamscence.ae 4 The Open Cybernetcs & Systemcs Journal, 04, 8, 4-9 Open Access Fast Computaton of Shortest Path for Vstng Segments n the Plane Ljuan Wang,, Bo Jang
More informationA Fast Visual Tracking Algorithm Based on Circle Pixels Matching
A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng
More informationPYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES
PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES Ruxandra Olmd Faculty of Mathematcs and Computer Scence, Unversty of Bucharest Emal: ruxandra.olmd@fm.unbuc.ro Abstract Vsual secret sharng schemes
More informationUsing Fuzzy Logic to Enhance the Large Size Remote Sensing Images
Internatonal Journal of Informaton and Electroncs Engneerng Vol. 5 No. 6 November 015 Usng Fuzzy Logc to Enhance the Large Sze Remote Sensng Images Trung Nguyen Tu Huy Ngo Hoang and Thoa Vu Van Abstract
More informationUser Authentication Based On Behavioral Mouse Dynamics Biometrics
User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA
More informationBIN XIA et al: AN IMPROVED K-MEANS ALGORITHM BASED ON CLOUD PLATFORM FOR DATA MINING
An Improved K-means Algorthm based on Cloud Platform for Data Mnng Bn Xa *, Yan Lu 2. School of nformaton and management scence, Henan Agrcultural Unversty, Zhengzhou, Henan 450002, P.R. Chna 2. College
More informationX- Chart Using ANOM Approach
ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are
More informationA software agent enabled biometric security algorithm for secure file access in consumer storage devices
A software agent enabled bometrc securty algorthm for secure fle access n consumer storage devces Artcle Accepted Verson Amn, R., Sherratt, R. S., Gr, D., Islam, S. K. H. and Khan, M. K. (2017) A software
More informationSorting Review. Sorting. Comparison Sorting. CSE 680 Prof. Roger Crawfis. Assumptions
Sortng Revew Introducton to Algorthms Qucksort CSE 680 Prof. Roger Crawfs Inserton Sort T(n) = Θ(n 2 ) In-place Merge Sort T(n) = Θ(n lg(n)) Not n-place Selecton Sort (from homework) T(n) = Θ(n 2 ) In-place
More informationRADIX-10 PARALLEL DECIMAL MULTIPLIER
RADIX-10 PARALLEL DECIMAL MULTIPLIER 1 MRUNALINI E. INGLE & 2 TEJASWINI PANSE 1&2 Electroncs Engneerng, Yeshwantrao Chavan College of Engneerng, Nagpur, Inda E-mal : mrunalngle@gmal.com, tejaswn.deshmukh@gmal.com
More informationLoop Transformations, Dependences, and Parallelization
Loop Transformatons, Dependences, and Parallelzaton Announcements Mdterm s Frday from 3-4:15 n ths room Today Semester long project Data dependence recap Parallelsm and storage tradeoff Scalar expanson
More informationConditional Speculative Decimal Addition*
Condtonal Speculatve Decmal Addton Alvaro Vazquez and Elsardo Antelo Dep. of Electronc and Computer Engneerng Unv. of Santago de Compostela, Span Ths work was supported n part by Xunta de Galca under grant
More informationF Geometric Mean Graphs
Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 2 (December 2015), pp. 937-952 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) F Geometrc Mean Graphs A.
More informationSorting: The Big Picture. The steps of QuickSort. QuickSort Example. QuickSort Example. QuickSort Example. Recursive Quicksort
Sortng: The Bg Pcture Gven n comparable elements n an array, sort them n an ncreasng (or decreasng) order. Smple algorthms: O(n ) Inserton sort Selecton sort Bubble sort Shell sort Fancer algorthms: O(n
More informationDesign and Analysis of Algorithms
Desgn and Analyss of Algorthms Heaps and Heapsort Reference: CLRS Chapter 6 Topcs: Heaps Heapsort Prorty queue Huo Hongwe Recap and overvew The story so far... Inserton sort runnng tme of Θ(n 2 ); sorts
More informationParallel Inverse Halftoning by Look-Up Table (LUT) Partitioning
Parallel Inverse Halftonng by Look-Up Table (LUT) Parttonng Umar F. Sddq and Sadq M. Sat umar@ccse.kfupm.edu.sa, sadq@kfupm.edu.sa KFUPM Box: Department of Computer Engneerng, Kng Fahd Unversty of Petroleum
More informationA fast algorithm for color image segmentation
Unersty of Wollongong Research Onlne Faculty of Informatcs - Papers (Arche) Faculty of Engneerng and Informaton Scences 006 A fast algorthm for color mage segmentaton L. Dong Unersty of Wollongong, lju@uow.edu.au
More informationWeaknesses of a dynamic ID-based remote user authentication. He Debiao*, Chen Jianhua, Hu Jin
Weaknesses of a dynamc -based remote user authentcaton scheme He Debao, Chen anhua, Hu n School of Mathematcs Statstcs, Wuhan nversty, Wuhan, Hube 430072, Chna Abstract: he securty of a password authentcaton
More informationTsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance
Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for
More informationSecurity Vulnerabilities of an Enhanced Remote User Authentication Scheme
Contemporary Engneerng Scences, Vol. 7, 2014, no. 26, 1475-1482 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.12988/ces.2014.49186 Securty Vulnerabltes of an Enhanced Remote User Authentcaton Scheme Hae-Soon
More informationELEC 377 Operating Systems. Week 6 Class 3
ELEC 377 Operatng Systems Week 6 Class 3 Last Class Memory Management Memory Pagng Pagng Structure ELEC 377 Operatng Systems Today Pagng Szes Vrtual Memory Concept Demand Pagng ELEC 377 Operatng Systems
More informationSteps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices
Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between
More informationBrave New World Pseudocode Reference
Brave New World Pseudocode Reference Pseudocode s a way to descrbe how to accomplsh tasks usng basc steps lke those a computer mght perform. In ths week s lab, you'll see how a form of pseudocode can be
More informationON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE
Yordzhev K., Kostadnova H. Інформаційні технології в освіті ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Some aspects of programmng educaton
More informationA Frame Packing Mechanism Using PDO Communication Service within CANopen
28 A Frame Packng Mechansm Usng PDO Communcaton Servce wthn CANopen Mnkoo Kang and Kejn Park Dvson of Industral & Informaton Systems Engneerng, Ajou Unversty, Suwon, Gyeongg-do, South Korea Summary The
More informationThe Shortest Path of Touring Lines given in the Plane
Send Orders for Reprnts to reprnts@benthamscence.ae 262 The Open Cybernetcs & Systemcs Journal, 2015, 9, 262-267 The Shortest Path of Tourng Lnes gven n the Plane Open Access Ljuan Wang 1,2, Dandan He
More informationAssembler. Shimon Schocken. Spring Elements of Computing Systems 1 Assembler (Ch. 6) Compiler. abstract interface.
IDC Herzlya Shmon Schocken Assembler Shmon Schocken Sprng 2005 Elements of Computng Systems 1 Assembler (Ch. 6) Where we are at: Human Thought Abstract desgn Chapters 9, 12 abstract nterface H.L. Language
More informationFuzzy Keyword Search over Encrypted Data in Cloud Computing
Fuzzy Keyword Search over Encrypted Data n Cloud Computng Jn L, Qan Wang, Cong Wang, Nng Cao, Ku Ren, and Wenjng Lou Department of ECE, Illnos Insttute of Technology Department of ECE, Worcester Polytechnc
More informationOn Some Entertaining Applications of the Concept of Set in Computer Science Course
On Some Entertanng Applcatons of the Concept of Set n Computer Scence Course Krasmr Yordzhev *, Hrstna Kostadnova ** * Assocate Professor Krasmr Yordzhev, Ph.D., Faculty of Mathematcs and Natural Scences,
More informationCSCI 104 Sorting Algorithms. Mark Redekopp David Kempe
CSCI 104 Sortng Algorthms Mark Redekopp Davd Kempe Algorthm Effcency SORTING 2 Sortng If we have an unordered lst, sequental search becomes our only choce If we wll perform a lot of searches t may be benefcal
More informationConstructing Minimum Connected Dominating Set: Algorithmic approach
Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected
More informationBiclique Cryptanalysis Of PRESENT, LED, And KLEIN
Bclque Cryptanalyss Of PREENT, LED, And KLEIN Reson 2013-05-20 Farzaneh Abed, Chrstan Forler, Ek Lst, tefan Lucks, Jakob Wenzel Bauhaus-Unerstät Wemar, Germany {frstname.lastname}@un-wemar.de Abstract.
More informationAn Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed
More informationParallel matrix-vector multiplication
Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more
More informationEmpirical Distributions of Parameter Estimates. in Binary Logistic Regression Using Bootstrap
Int. Journal of Math. Analyss, Vol. 8, 4, no. 5, 7-7 HIKARI Ltd, www.m-hkar.com http://dx.do.org/.988/jma.4.494 Emprcal Dstrbutons of Parameter Estmates n Bnary Logstc Regresson Usng Bootstrap Anwar Ftranto*
More informationArea Efficient Self Timed Adders For Low Power Applications in VLSI
ISSN(Onlne): 2319-8753 ISSN (Prnt) :2347-6710 Internatonal Journal of Innovatve Research n Scence, Engneerng and Technology (An ISO 3297: 2007 Certfed Organzaton) Area Effcent Self Tmed Adders For Low
More informationHermite Splines in Lie Groups as Products of Geodesics
Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the
More informationLecture 5: Multilayer Perceptrons
Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented
More informationSecure and Fast Fingerprint Authentication on Smart Card
SETIT 2005 3 rd Internatonal Conference: Scences of Electronc, Technologes of Informaton and Telecommuncatons March 27-31, 2005 TUNISIA Secure and Fast Fngerprnt Authentcaton on Smart Card Y. S. Moon*,
More informationMemory Modeling in ESL-RTL Equivalence Checking
11.4 Memory Modelng n ESL-RTL Equvalence Checkng Alfred Koelbl 2025 NW Cornelus Pass Rd. Hllsboro, OR 97124 koelbl@synopsys.com Jerry R. Burch 2025 NW Cornelus Pass Rd. Hllsboro, OR 97124 burch@synopsys.com
More information