Related-Mode Attacks on CTR Encryption Mode
|
|
- Tiffany Murphy
- 6 years ago
- Views:
Transcription
1 Internatonal Journal of Network Securty, Vol.4, No.3, PP , May Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory of Informaton Securty, Insttute of Software, Chnese Academy of Scences Bejng , Chna. (Emal: {wdy, ddln, (Receved Dec. 9, 2005; revsed and accepted Jan. 3, 2006) Abstract In ths paper, we dscuss usng CTR mode, another standard encrypton mode, to attack other standard encrypton modes and usng other standard encrypton modes to attack CTR mode under the related-mode attack model. In partcular, we pont out that when the adversary has access to an oracle under one proper mode, then almost all other related-cpher modes, whether they are encrypton modes or authentcaton modes or authentcated encrypton modes, can be attacked wth ease under the relatedmode attack model. Keywords: Block cpher, modes of operaton, relatedcpher attack, related-mode attack 1 Introducton Block cphers are often proposed wth several varants, n terms of a dfferent secret key sze and correspondng number of rounds. Wu [9] presented the related-cpher attack model applcable to related cphers n the sense that they are exactly dentcal to each other, dfferng only n the key sze and most often also n the total number of rounds. In [7], the authors generalze the concept of the related-cpher attack model to apply to a larger class of related model, n partcular cpher encryptons wth dfferent block cpher modes of operaton, but wth the underlyng block cpher beng dentcal. They called t related mode attack and further show that when the adversary has access to an oracle for any one mode of operaton of ECB, CBC, OFB, CFB, then almost all other related cpher modes can be easly attacked. But they ddn t study another standard encrypton mode CTR. In ths paper, we wll dscuss how to use CTR mode to attack other modes and how to use other modes to attack CTR mode under the related-mode attack model. In Secton 2, we brefly descrbe the standard block cpher modes of operaton. In Secton 3 and 4, we dscuss how to use CTR mode to attack other modes and how to use other modes to attack CTR mode under the relatedmode attack model. We conclude n Secton 5. 1 Fgure 1: ECB mode encrypton 2 Standard Block Cpher Encrypton Modes When encryptng a plantext P, whch s longer than the block sze, n of the underlyng block cpher, ths plantext s dvded nto m number of n-bt blocks, and each one s encrypted at a tme usng a block cpher mode of operaton that ncludes the Electronc Code Book (ECB), the Cpher Block Channg (CBC), the Cpher FeedBack (CFB), the Output FeedBack (OFB) [4, 5] and Counter Mode (CTR) [1]. The ECB mode s the smplest, where each plantext block s ndependently encrypted to a correspondng cphertext block va the underlyng block cpher keyed by secret key K: = ( ). Fgure 1 llustrates the ECB mode encrypton on two consecutve plantext blocks 1 and. Meanwhle, the CBC mode uses the prevous cphertext block as the feedback component that s exclusve- ORed (XORed) to the current plantext block, before the resultng XOR s encrypted to obtan the current cphertext block. In partcular: = ( ) where C 0 = ntalzaton vector (IV ). Fgure 2 llustrates the CBC mode encrypton on two consecutve plantext blocks 1 and.
2 Internatonal Journal of Network Securty, Vol.4, No.3, PP , May P 1 1 Fgure 2: CBC mode encrypton Fgure 4: OFB mode encrypton 1 ctr + ( 1) 1 ctr + Fgure 3: CFB mode encrypton Fgure 5: CTR mode encrypton The CFB mode also uses the prevous cphertext block as feedback, whch s frst encrypted and then XORed to the current plantext block to obtan the current cphertext block : = ( ) where C 0 = ntalsaton vector (IV). The CFB mode can also be vewed as a stream cpher mode by treatng X = ( ) as a keystream that s XORed to the plantext to obtan the cphertext. Fgure 3 shows the CFB mode. The OFB mode s smlar to the CFB n that a keystream s also generated to be XORed to the current plantext block to obtan the current cphertext block. The dfference s that the keystream s not a functon of the prevous cphertext block, but s the prevously encrypted feedback component X : X = (X 1 ) = (X ) where X 0 = ntalsaton vector (IV ). Note that the keystream s ndependent of prevous plantext and cphertext blocks. Fgure 4 llustrates the OFB mode. The CTR mode s smlar to the CFB n that a keystream s also generated to be XORed to the current plantext block to obtan the current cphertext block. The dfference s that the keystream s a functon of a counter, ctr, whch can also be looked on as an ntalsaton vector. Fgure 5 llustrates the CTR mode. = (ctr + ). There are two varants of the mode, one random and the other stateful. No matter whch varant s used, the ntalsaton vector, ctr, s ncluded n the cphertext as the frst block C 0 n order to enable decrypton. The counter s not allowed to wrap around. Thus the decrypton algorthm frst chops off the frst n bts C 0 and uses t as ctr, and then dvdes the rest of the strng nto n-bt blocks and decrypt cphertext usng the same method of encrypton. 3 Usng other Standard Modes to Attack CTR Throughout ths paper, we consder the case where the adversary has access to an oracle that s able to perform ether encrypton or decrypton for some fxed mode. Ths s smlar to havng access to known or chosen plantext/ cphertext queres under that mode. We show that ths oracle allows the adversary to attack other related-cpher modes, where the underlyng block cpher s the same. and respectvely denote the current plantext and cphertext block used n the nteracton wth the oracle beng exploted, whle and respectvely denote the current plantext and cphertext blocks of the related-cpher mode beng attacked. For the mode beng attacked, only the correspondng cphertext blocks, ( = 0, 1,, m) are known, where C 0 = IV s the ntalzaton vector. It s the adversary s objectve to drectly recover these unknown plantext blocks, ( = 0, 1,, m),.e. we assume a cphertext-only scenaro for the mode beng attacked. For the mode beng exploted, access to ts oracle
3 Internatonal Journal of Network Securty, Vol.4, No.3, PP , May P 1 P C 0 + ( 1) C C 1 C Fgure 6: Explotng ECB to attack CTR P 1 P C 0 + ( 1) C C 1 C Fgure 7: Explotng CBC to attack CTR allows the adversary to obtan known or chosen plantext/cphertext queres, and as necessary known or chosen IV queres - though we assume for more concrete and nterestng results that he can only access ether a mode encrypton or mode decrypton oracle, and not both at the same tme. Havng sad ths, note that a standard mode of operaton s expected to be secure aganst attacks where both encrypton and decrypton oracles are possble [2]. 3.1 Explotng an ECB Oracle Consder that the adversary has access to ether an encrypton or decrypton oracle under ECB mode. We wll show how ths oracle can be exploted to obtan the unknown plantext blocks encrypted under the CTR mode. In our current case, the adversary has access to the ECB encrypton oracle, and s explotng t to attack another related cpher n the CTR mode. In partcular, gven that he desres to know the unknown plantext block correspondng to an ntercepted cphertext block of the CTR mode, he chooses = C 0 + to feed to the ECB encrypton oracle and hence obtans the correspondng cphertext. Snce = (C 0 + ), we can get =. Ths s llustrated n Fgure 6, where the exploted oracle and the mode beng attacked are on the left and rght, respectvely, and where the rectangular boxes delmt the parts naccessble to the adversary. In summary, we requre just one chosen plantext(cp) query encrypted under ECB to obtan the plantext block correspondng to any cphertext block encrypted under CTR. 3.2 Explotng a CBC Oracle When the adversary has access to a CBC oracle, he can smlarly use ths to attack CTR mode. Attackng ths requres a CBC encrypton oracle. Frst the adversary queres the encrypton oracle and get the cphertext of plantext 1, then he chooses = (C 0 + ) and queres the oracle to obtan the correspondng cphertext. Snce = ( 1 ) = (C 0 + ) s drectly related to an ntermedate state n CTR, namely that =. Therefore, we can computer =. Ths s llustrated n Fgure 7. In summary, we requre two chosen plantext(cp) queres encrypted under CBC to obtan the plantext block correspondng to any cphertext block encrypted under CTR. 3.3 Explotng a CFB Oracle The adversary accesses a CFB decrypton oracle and chooses = C 0 +, and hence ( ) = (C 0 + ) = X can be drectly related to a smlar ntermedate state wthn CTR, namely X =. He then computes = X. See Fgure 8. Repeatng ths attack wll allow hm to other plantext blocks of the CTR. In summary, we requre just one chosen cphertext (CC) query encrypted under CFB to obtan the plantext block correspondng to any cphertext block encrypted under CTR. 3.4 Explotng an OFB Oracle In ths secton, We wll dscuss how to explot OFB oracle to attack the CTR mode.
4 Internatonal Journal of Network Securty, Vol.4, No.3, PP , May C 0 + ( 1) C 0 + P 1 C 1 X C P X P 1 P Fgure 8: Explotng CFB to attack CTR IV = C 0 + C 0 + ( 1) C 0 + X P 1 P 2 C 1 C 2 X P 1 P Fgure 9: Explotng OFB to attack CTR Ths s so far the hardest attack to mount, and requres a chosen-iv (CIV ) scenaro [8]. In partcular, the adversary chooses IV = C 0 +, and hence (IV ) = (C 0 +) = X. Ths ntermedate state relates between the two modes, OFB and CTR, namely X = P 1 C 1, and so he can compute = X = P 1 C 1. Ths s shown n Fgure 9. Note that n ths case the plantext and cphertext blocks of the exploted oracle do not need to be chosen but are merely known. 4 Explotng a CTR Oracle K In ths case, the adversary has access to a CTR oracle, and uses ths to attack other related-cpher modes. The CTR, CFB and OFB modes are sometmes called stream-cpher modes snce despte startng wth an underlyng block cpher,, usng t n these modes essentally results n a stream cpher. A stream-cpher mode uses the underlyng n both ts mode encrypton and decrypton, n contrast to other non-stream-cpher modes such as the ECB and CBC that use for mode encrypton and correspondngly E 1 for mode decrypton. Because of ths, t appears that stream-cpher mode oracles can only be used to construct encrypton oracles for other non-stream-cpher modes. Ths means that t wll not be possble to explot a stream-cpher mode oracle (such as CTR CFB and OFB) to attack non-stream-cpher modes (such as ECB and CBC). Instead, we consder only how stream-cpher modes can be exploted to attack other stream-cpher modes. Attackng CFB: The adversary accesses CTR decrypton oracle and chooses C 0 = 1, snce C 1 = (C 0 + 1) P 1 = ( ) P 1, and hence ( ) = C 1 P 1 = X can be drectly related to a smlar ntermedate state wthn CFB, namely X = P 1 C 1 =. He then computes = X. See Fgure 10. Repeatng ths attack wll allow hm to obtan other plantext blocks of the CFB. Attackng OFB: The adversary accesses a CTR decrypton oracle and chooses C 0 = IV 1, snce C 1 = (C 0 +1) P 1 = (IV ) P 1, and hence (IV ) = X can be drectly related to a smlar ntermedate state wthn OFB, namely X = P 1 C 1 = P 1 C 1. He then computes P 1 = X C 1. Ths s llustrated n Fgure 11. Repeatng ths attack wll allow hm to teratvely obtan the next plantext blocks of the OFB. 5 Conclusons In ths paper we dscuss how access to chosen plantexts/cphertexts n other standard encrypton modes allows related-cpher CTR mode to be attacked and how access to chosen cphertexts n the CTR mode allows almost all other related-cpher standard encrypton modes to be attacked. In Table 1, we lst our attacks and the correspondng text complextes, whle computatonal complexty s neglgble. The fve modes dscussed above are all standard encrypton modes. There are a lot of standard authentcaton modes and authentcated encrypton modes usng
5 Internatonal Journal of Network Securty, Vol.4, No.3, PP , May C C X C 1 C 2 P 1 P 2 X P 1 P Fgure 10: Explotng CTR to attack CFB C C X C 1 C 2 P 1 P 2 IV X P 1 P 2 C 1 C 2 Fgure 11: Explotng CTR to attack OFB Table 1: Related-mode attacks on standard encrypton modes Oracle Exploted Cpher Mode Text Complexty Attacked ECB CTR 1 CP CBC CTR 2 CP CFB CTR 1 CC OFB CTR 1 CP, 1 CIV CTR CFB 1 CC OFB 1 CC block cphers, such as authentcaton mode CMAC [6], authentcated encrypton mode GCM [3]. We further study the securty of those modes of operaton under relatedmode attack model and fnd they all are nsecure f the adversary can access to an oracle under one proper mode. So when we have the same cpher beng used as the underlyng component n dfferent block cpher modes of operaton, we should avod usng the same key n those modes n practcal applcatons. Acknowledge Ths research s supported by the Natonal Natural Scence Foundaton of Chna under Grant No and No ; the Natonal Basc Research 973 Program of Chna under Grant No.2004CB References [1] proposedmodes/ctr/ [2] A. Joux, Cryptanalyss of the EMD mode of operton, Advances n Cryptology-Eurocrypt 03, LNCS 2656, pp. 1-16, Sprnger-Verlag, [3] D. McGrew and J. Vega, The Galos/Counter Mode of Operaton (GCM), Submsson to NIST Modes of Operaton Process, 2004, Avalable at proposedmodes/ [4] Natonal Insttute of Standards and Technology (NIST), Federal Informaton Processng Standards Publcaton 81 (FIPS PUB 81): DES Modes of Operaton, Dec [5] Natonal Insttute of Standards and Technology (NIST), NIST Specal Publcaton A, Recommendaton for Block Cpher Modes of Operaton: Methods and Technques, Dec [6] Natonal Insttute of Standards and Technology (NIST), NIST Specal Publcaton B, Recommendaton for Block Cpher Modes of Operaton: The CMAC Mode for Authentcaton, May [7] R. C. W. Phan and M. U. Sddq, Related-mode attacks on block cpher modes of operaton, ICCSA 2005, LNCS 3482, pp , Sprnger-Verlag, [8] D. Wagner, Cryptanalyss of some recentlyproposed multple modes of operaton, FSE 98, LNCS 1372, pp , Sprnger-Verlag, [9] H. Wu, Related-Cpher attacks, ICICS 02, LNCS 2513, pp , Sprnger-Verlag, 2002.
6 Internatonal Journal of Network Securty, Vol.4, No.3, PP , May Dayn Wang s now a Ph.D canddate at the State Key Laboratory of Informaton Securty, Insttute of Software, Chnese Academy of Scences. Hs research nterests nclude Message Authentcaton codes and mode of operaton. E-mal address: wdy@s.scas.ac.cn. Dongda Ln s now a full tme research professor and deputy drector of State Key Labortory of Informaton Securty, Insttute of Software of the Chnese Academy of Scences. He receved hs B.S. degree n mathematcs from Shandong Unversty n 1984, and the M.S. degree and Ph. D degree n codng theory and cryptology at Insttute of Systems Scence of the Chnese Academy of Scences n 1987 and 1990 respectvely. Hs current research nterests nclude cryptology, nformaton securty, grd computng, mathematcs mechanzaton and symbolc computatons. Wenlng Wu s now a professor at the State Key Laboratory of Informaton Securty, Insttute of Software, Chnese Academy of Scences. She receved her B.S. degree and M.S. degree nmaths from Northwest Unversty n 1987 and 1990, respectvely. She receved her Ph.D degree n Cryptography from Xdan Unversty n From 1998 to 1999 she was a postdoctoral fellow n the Insttute of Software, Chnese Academy of Scence. Her current research nterests nclude theory of cryptography, mode of operaton, block cpher, stream cpher and hash functon.
Specifications in 2001
Specfcatons n 200 MISTY (updated : May 3, 2002) September 27, 200 Mtsubsh Electrc Corporaton Block Cpher Algorthm MISTY Ths document shows a complete descrpton of encrypton algorthm MISTY, whch are secret-key
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationA Practical Attack on KeeLoq
Introducton Our Attacks Practce Conclusons A Practcal Attack on KeeLoq Sebastaan Indesteege 1 Nathan Keller 2 Orr Dunkelman 1 El Bham 3 Bart Preneel 1 1 Dept. ESAT/SCD-COSIC, K.U.Leuven, Belgum. 2 Ensten
More informationMiss in the Middle Attacks on IDEA and Khufu
Mss n the Mddle Attacks on IDEA and Khufu El Bham Alex Bryukov Ad Shamr Abstract. In a recent paper we developed a new cryptanalytc technque based on mpossble dfferentals, and used t to attack the Skpjack
More informationThe stream cipher MICKEY-128 (version 1) Algorithm specification issue 1.0
The stream cpher MICKEY-128 (verson 1 Algorthm specfcaton ssue 1. Steve Babbage Vodafone Group R&D, Newbury, UK steve.babbage@vodafone.com Matthew Dodd Independent consultant matthew@mdodd.net www.mdodd.net
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationLecture - Data Encryption Standard 4
The Data Encrypton Standard For an encrypton algorthm we requre: secrecy of the key and not of the algorthm tself s the only thng that s needed to ensure the prvacy of the data the best cryptographc algorthms
More informationCluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More informationCracking of the Merkle Hellman Cryptosystem Using Genetic Algorithm
Crackng of the Merkle Hellman Cryptosystem Usng Genetc Algorthm Zurab Kochladze 1 * & Lal Besela 2 1 Ivane Javakhshvl Tbls State Unversty, 1, I.Chavchavadze av 1, 0128, Tbls, Georga 2 Sokhum State Unversty,
More informationFast Computation of Shortest Path for Visiting Segments in the Plane
Send Orders for Reprnts to reprnts@benthamscence.ae 4 The Open Cybernetcs & Systemcs Journal, 04, 8, 4-9 Open Access Fast Computaton of Shortest Path for Vstng Segments n the Plane Ljuan Wang,, Bo Jang
More informationLoad Balancing for Hex-Cell Interconnection Network
Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,
More informationA Star-based Independent Biclique Attack on Full Rounds SQUARE
A Star-based Independent Bclque Attack on Full Rounds SQUARE Zheng Yuan,, Zhen Peng,, Mng Mao,. Beng Electronc Scence &Technology Insttute, Beng 00070,Chna. Xdan Unversty, X an, Chna yuanzheng@best.edu.cn,
More informationFor instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)
Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A
More informationSecurity Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments
Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub
More informationA Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationSupport Vector Machines
/9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.
More informationF Geometric Mean Graphs
Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 2 (December 2015), pp. 937-952 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) F Geometrc Mean Graphs A.
More informationProblem Set 3 Solutions
Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,
More informationHOMOMORPHIC ENCRYPTION SCHEMES: STEPS TO IMPROVE THE PROFICIENCY
HOMOMORPHIC ENCRYPTION SCHEMES: STEPS TO IMPROVE THE PROFICIENCY Pallav 1 Masters n Technology, School of Future Studes and Plannng, DAVV, Indore (Inda) ABSTRACT Homomorphc encrypton schemes are malleable
More informationProblem Definitions and Evaluation Criteria for Computational Expensive Optimization
Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty
More informationCompiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz
Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster
More informationAn Improved User Authentication and Key Agreement Scheme Providing User Anonymity
35 JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 9, NO. 4, DECEMBER 0 An Improved User Authentcaton and Key Agreement Scheme Provdng User Anonymty Ya-Fen Chang and Pe-Yu Chang Abstract When accessng
More informationPrivate Information Retrieval (PIR)
2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market
More informationA Lossless Watermarking Scheme for Halftone Image Authentication
IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February 2006 147 A Lossless Watermarkng Scheme for Halftone Image Authentcaton Jeng-Shyang Pan, Hao Luo, and Zhe-Mng Lu,
More informationSecurity Vulnerabilities of an Enhanced Remote User Authentication Scheme
Contemporary Engneerng Scences, Vol. 7, 2014, no. 26, 1475-1482 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.12988/ces.2014.49186 Securty Vulnerabltes of an Enhanced Remote User Authentcaton Scheme Hae-Soon
More informationSum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints
Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan
More informationImprovement ofmanik et al. s remote user authentication scheme
Improvement ofmank et al. s remote user authentcaton scheme Abstract Jue-Sam Chou, a,yaln Chen b Jyun-Yu Ln c a Department of Informaton Management, Nanhua Unversty Chay, 622, Tawan schou@mal.nhu.edu.tw
More informationCMPS 10 Introduction to Computer Science Lecture Notes
CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not
More informationTsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance
Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for
More informationImprovement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration
Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,
More informationThe Shortest Path of Touring Lines given in the Plane
Send Orders for Reprnts to reprnts@benthamscence.ae 262 The Open Cybernetcs & Systemcs Journal, 2015, 9, 262-267 The Shortest Path of Tourng Lnes gven n the Plane Open Access Ljuan Wang 1,2, Dandan He
More informationA Fast Content-Based Multimedia Retrieval Technique Using Compressed Data
A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,
More informationOn Some Entertaining Applications of the Concept of Set in Computer Science Course
On Some Entertanng Applcatons of the Concept of Set n Computer Scence Course Krasmr Yordzhev *, Hrstna Kostadnova ** * Assocate Professor Krasmr Yordzhev, Ph.D., Faculty of Mathematcs and Natural Scences,
More informationA Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems
A Unfed Framework for Semantcs and Feature Based Relevance Feedback n Image Retreval Systems Ye Lu *, Chunhu Hu 2, Xngquan Zhu 3*, HongJang Zhang 2, Qang Yang * School of Computng Scence Smon Fraser Unversty
More informationHermite Splines in Lie Groups as Products of Geodesics
Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the
More informationEnhanced Watermarking Technique for Color Images using Visual Cryptography
Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS
More informationConstructing Minimum Connected Dominating Set: Algorithmic approach
Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected
More informationThe Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole
Appled Mathematcs, 04, 5, 37-3 Publshed Onlne May 04 n ScRes. http://www.scrp.org/journal/am http://dx.do.org/0.436/am.04.584 The Research of Ellpse Parameter Fttng Algorthm of Ultrasonc Imagng Loggng
More informationGenetic Key Guided Neural Deep Learning based Encryption for Online Wireless Communication (GKNDLE)
Genetc Key Guded Neural Deep Learnng based Encrypton for Onlne Wreless Communcaton (GKNDLE) Arndam Sarkar Department of Computer Scence & Electroncs, Ramakrshna Msson Vdyamandra, Belur Math-711202, West
More informationUsing Fuzzy Logic to Enhance the Large Size Remote Sensing Images
Internatonal Journal of Informaton and Electroncs Engneerng Vol. 5 No. 6 November 015 Usng Fuzzy Logc to Enhance the Large Sze Remote Sensng Images Trung Nguyen Tu Huy Ngo Hoang and Thoa Vu Van Abstract
More informationA NOTE ON FUZZY CLOSURE OF A FUZZY SET
(JPMNT) Journal of Process Management New Technologes, Internatonal A NOTE ON FUZZY CLOSURE OF A FUZZY SET Bhmraj Basumatary Department of Mathematcal Scences, Bodoland Unversty, Kokrajhar, Assam, Inda,
More informationParallel matrix-vector multiplication
Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more
More informationType-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data
Malaysan Journal of Mathematcal Scences 11(S) Aprl : 35 46 (2017) Specal Issue: The 2nd Internatonal Conference and Workshop on Mathematcal Analyss (ICWOMA 2016) MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES
More informationLecture 5: Multilayer Perceptrons
Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented
More informationA mathematical programming approach to the analysis, design and scheduling of offshore oilfields
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and
More informationNon-Split Restrained Dominating Set of an Interval Graph Using an Algorithm
Internatonal Journal of Advancements n Research & Technology, Volume, Issue, July- ISS - on-splt Restraned Domnatng Set of an Interval Graph Usng an Algorthm ABSTRACT Dr.A.Sudhakaraah *, E. Gnana Deepka,
More informationMathematics 256 a course in differential equations for engineering students
Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the
More informationVirtual Machine Migration based on Trust Measurement of Computer Node
Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on
More informationRobust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation
JOURNAL OF MULTIMEDIA, VOL. 8, NO. 2, APRIL 2013 161 Robust Blnd Vdeo Watermark Algorthm n Transform Doman Combnng wth 3D Vdeo Correlaton DING Ha-yang 1,3 1. Informaton Securty Center, Bejng Unversty of
More informationPerformance Evaluation of Information Retrieval Systems
Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence
More informationON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE
Yordzhev K., Kostadnova H. Інформаційні технології в освіті ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Some aspects of programmng educaton
More informationDistributed Secret Key Management Based on ECC for Ad-hoc Network Yi-xuan WU, Hua-wei CHEN * and Lei WANG
2017 2nd Internatonal Conference on Computer, Network Securty and Communcaton Engneerng (CNSCE 2017) ISBN: 978-1-60595-439-4 Dstrbuted Secret Key Management Based on ECC for Ad-hoc Network Y-xuan WU, Hua-we
More informationScheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research
Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research
More informationA MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS
Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung
More informationA Comparative Analysis of Encryption Algorithms for Better Utilization
A Comparatve Analyss of Encrypton Algorthms for Better Utlzaton Anuj Kumar M.tech(IT) Sapna Snha Astt. Professor Rahul Chaudhary M.tech(CSE) ABSTRACT Cryptographc algorthms provde securty aganst attacks
More informationCourse Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms
Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques
More informationPYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES
PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES Ruxandra Olmd Faculty of Mathematcs and Computer Scence, Unversty of Bucharest Emal: ruxandra.olmd@fm.unbuc.ro Abstract Vsual secret sharng schemes
More informationThe Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique
//00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy
More informationQuery Clustering Using a Hybrid Query Similarity Measure
Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan
More informationContent Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers
IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth
More informationAnalysis of Continuous Beams in General
Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,
More information2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements
Module 3: Element Propertes Lecture : Lagrange and Serendpty Elements 5 In last lecture note, the nterpolaton functons are derved on the bass of assumed polynomal from Pascal s trangle for the fled varable.
More informationUser Authentication Based On Behavioral Mouse Dynamics Biometrics
User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA
More informationR s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes
SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges
More informationX- Chart Using ANOM Approach
ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are
More informationVectorization of Image Outlines Using Rational Spline and Genetic Algorithm
01 Internatonal Conference on Image, Vson and Computng (ICIVC 01) IPCSIT vol. 50 (01) (01) IACSIT Press, Sngapore DOI: 10.776/IPCSIT.01.V50.4 Vectorzaton of Image Outlnes Usng Ratonal Splne and Genetc
More informationPaper style and format for the Sixth International Symposium on Turbulence, Heat and Mass Transfer
K. Hanjalć, Y. Nagano and S. Jakrlć (Edtors) 2009 Begell House, Inc. Paper style and format for the Sxth Internatonal Symposum on Turbulence, Heat and Mass Transfer K. Hanjalć 1, Y. Nagano 2 and S. Jakrlć
More informationBiclique Cryptanalysis Of PRESENT, LED, And KLEIN
Bclque Cryptanalyss Of PREENT, LED, And KLEIN Reson 2013-05-20 Farzaneh Abed, Chrstan Forler, Ek Lst, tefan Lucks, Jakob Wenzel Bauhaus-Unerstät Wemar, Germany {frstname.lastname}@un-wemar.de Abstract.
More informationAn Approach in Coloring Semi-Regular Tilings on the Hyperbolic Plane
An Approach n Colorng Sem-Regular Tlngs on the Hyperbolc Plane Ma Louse Antonette N De Las Peñas, mlp@mathscmathadmueduph Glenn R Lago, glago@yahoocom Math Department, Ateneo de Manla Unversty, Loyola
More informationLearning the Kernel Parameters in Kernel Minimum Distance Classifier
Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department
More informationA new attack on Jakobsson Hybrid Mix-Net
A new attack on Jakobsson Hybrd Mx-Net Seyyed Amr Mortazav Tehran, Iran. sa.mortezav@gmal.com Abstract The Jakobsson hybrd Mx-net proposed by Jakobsson and Juels, s a very practcal and effcent scheme for
More informationSLAM Summer School 2006 Practical 2: SLAM using Monocular Vision
SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,
More informationSolitary and Traveling Wave Solutions to a Model. of Long Range Diffusion Involving Flux with. Stability Analysis
Internatonal Mathematcal Forum, Vol. 6,, no. 7, 8 Soltary and Travelng Wave Solutons to a Model of Long Range ffuson Involvng Flux wth Stablty Analyss Manar A. Al-Qudah Math epartment, Rabgh Faculty of
More informationThe Codesign Challenge
ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.
More informationCryptanalysis and Improvement of Mutual Authentication Protocol for EPC C1G2 passive RFID Tag
IJCSI Internatonal Journal of Computer Scence Issues, Volume 14, Issue 6, November 017 ISSN (Prnt): 1694-0814 ISSN (Onlne): 1694-0784 www.ijcsi.org https://do.org/10.0943/0101706.7684 76 Cryptanalyss and
More informationOracle Database: SQL and PL/SQL Fundamentals Certification Course
Oracle Database: SQL and PL/SQL Fundamentals Certfcaton Course 1 Duraton: 5 Days (30 hours) What you wll learn: Ths Oracle Database: SQL and PL/SQL Fundamentals tranng delvers the fundamentals of SQL and
More informationPositive Semi-definite Programming Localization in Wireless Sensor Networks
Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer
More informationSolving two-person zero-sum game by Matlab
Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by
More informationSteps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices
Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between
More informationBridges and cut-vertices of Intuitionistic Fuzzy Graph Structure
Internatonal Journal of Engneerng, Scence and Mathematcs (UGC Approved) Journal Homepage: http://www.jesm.co.n, Emal: jesmj@gmal.com Double-Blnd Peer Revewed Refereed Open Access Internatonal Journal -
More informationTerm Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task
Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto
More informationNAG Fortran Library Chapter Introduction. G10 Smoothing in Statistics
Introducton G10 NAG Fortran Lbrary Chapter Introducton G10 Smoothng n Statstcs Contents 1 Scope of the Chapter... 2 2 Background to the Problems... 2 2.1 Smoothng Methods... 2 2.2 Smoothng Splnes and Regresson
More informationA new remote user authentication scheme for multi-server architecture
Future Generaton Computer Systems 19 (2003) 13 22 A new remote user authentcaton scheme for mult-server archtecture Iuon-Chang Ln a, Mn-Shang Hwang b,, L-Hua L b a Department of Computer Scence and Informaton
More informationCHAPTER 2 DECOMPOSITION OF GRAPHS
CHAPTER DECOMPOSITION OF GRAPHS. INTRODUCTION A graph H s called a Supersubdvson of a graph G f H s obtaned from G by replacng every edge uv of G by a bpartte graph,m (m may vary for each edge by dentfyng
More informationA New Approach For the Ranking of Fuzzy Sets With Different Heights
New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays
More informationNUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS
ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana
More informationCACHE MEMORY DESIGN FOR INTERNET PROCESSORS
CACHE MEMORY DESIGN FOR INTERNET PROCESSORS WE EVALUATE A SERIES OF THREE PROGRESSIVELY MORE AGGRESSIVE ROUTING-TABLE CACHE DESIGNS AND DEMONSTRATE THAT THE INCORPORATION OF HARDWARE CACHES INTO INTERNET
More informationEvaluation of an Enhanced Scheme for High-level Nested Network Mobility
IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.
More informationAn Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices
Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal
More informationTwo-Factor User Authentication in Multi-Server Networks
Internatonal Journal of ecurty and Its Applcatons Vol. 6, No., Aprl, 0 Two-Factor ser Authentcaton n Mult-erver Networks Chun-Ta L, Ch-Yao Weng,* and Chun-I Fan Department of Informaton Management, Tanan
More informationAn Efficient Chaos-Based Feedback Stream cipher (ECBFSC) for Image Cryptosystems
An Effcent Chaos-Based Feedback Stream cpher (ECBFSC) for Image Cryptosystems Hossam El-dn H. Ahmed, Hamdy M. Kalash, and Osama S. Farag Allah Abstract. The chaos based cryptographc algorthms have suggested
More informationWeaknesses of a dynamic ID-based remote user authentication. He Debiao*, Chen Jianhua, Hu Jin
Weaknesses of a dynamc -based remote user authentcaton scheme He Debao, Chen anhua, Hu n School of Mathematcs Statstcs, Wuhan nversty, Wuhan, Hube 430072, Chna Abstract: he securty of a password authentcaton
More informationConcurrent Apriori Data Mining Algorithms
Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng
More informationFault Detection in Rule-Based Software Systems
Fault Detecton n Rule-Based Software Systems Dong Wang, Rubng Hao and Davd Lee Bell Labs Research Chna Bejng, Chna, 100080 {wangd, rbhao, leedavd}@lucent.com Abstract Motvated by packet flterng of frewall
More informationAn Efficient Garbage Collection for Flash Memory-Based Virtual Memory Systems
S. J and D. Shn: An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems 2355 An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems Seunggu J and Dongkun Shn, Member,
More informationThe Erdős Pósa property for vertex- and edge-disjoint odd cycles in graphs on orientable surfaces
Dscrete Mathematcs 307 (2007) 764 768 www.elsever.com/locate/dsc Note The Erdős Pósa property for vertex- and edge-dsjont odd cycles n graphs on orentable surfaces Ken-Ich Kawarabayash a, Atsuhro Nakamoto
More informationA Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing
Int. J. of Computers, Communcatons & Control, ISSN 1841-9836, E-ISSN 1841-9844 Vol. VI (2011), No. 2 (June), pp. 227-235 A Tme-Bound Tcket-Based Mutual Authentcaton Scheme for Cloud Computng Z. Hao, S.
More informationProper Choice of Data Used for the Estimation of Datum Transformation Parameters
Proper Choce of Data Used for the Estmaton of Datum Transformaton Parameters Hakan S. KUTOGLU, Turkey Key words: Coordnate systems; transformaton; estmaton, relablty. SUMMARY Advances n technologes and
More informationMining User Similarity Using Spatial-temporal Intersection
www.ijcsi.org 215 Mnng User Smlarty Usng Spatal-temporal Intersecton Ymn Wang 1, Rumn Hu 1, Wenhua Huang 1 and Jun Chen 1 1 Natonal Engneerng Research Center for Multmeda Software, School of Computer,
More informationHigh Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting
JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 11, NO. 1, MARCH 2013 9 Hgh Payload Reversble Data Hdng Scheme Usng Dfference Segmentaton and Hstogram Shftng Yung-Chen Chou and Huang-Chng L Abstract
More information