49 resultados para collision attack
em Chinese Academy of Sciences Institutional Repositories Grid Portal
Resumo:
IEEE Computer Society
Resumo:
提出了一个基于分组密码的hash函数体制,它的rate小于1但却具有更高的效率,同时,这个hash函数可以使用不安全的压缩函数进行构造,降低了对压缩函数安全性的要求.首先,在黑盒子模型下对这个新的体制的安全性进行了证明,然后给出了能够用于构造该体制的使用分组密码构造的压缩函数,最后通过实验对比发现,新hash函数的速度比rate为1的hash函数快得多.实验结果表明,除了rate以外,密钥编排也是影响基于分组密码hash函数效率的重要因素,甚至比rate影响更大.该体制只有两个密钥,不需要进行大量的密钥扩展运算,大大提高了基于分组密码hash函数的效率,而且该体制可以使用现有的分组密码来构造.
Resumo:
主要探讨了基于MD方式构造hash函数时平衡度的保持问题,说明了压缩函数满足何种条件时hash函数能够取得最好的平衡度,提出了局部平衡度的概念,并利用此概念解决了压缩函数局部平衡度与hash函数平衡度的关系问题.这对于未来的hash函数的设计有非常重要的意义.
Resumo:
A Monte Carlo simulation is performed to study the dependence of collision frequency on interparticle distance for a system composed of two hard-sphere particles. The simulation quantitatively shows that the collision frequency drops down sharply as the distance between two particles increases. This characteristic provides a useful evidence for the collision-reaction dynamics of aggregation process for the two-particle system described in the other reference.
Resumo:
The following points are argued: (i) there are two independent kinds of interaction on interfaces, i.e. the interaction between phases and the collision interaction, and the jump relations on interfaces can accordingly be resolved; (ii) the stress in a particle can also be divided into background stress and collision stress corresponding to the two kinds of interaction on interfaces respectively; (iii) the collision stress, in fact, has no jump on interface, so the averaged value of its derivative is equal to the derivative of its averaged value; (iv) the stress of solid phase in the basic equations for two\|phase flow should include the collision stress, while the stress in the expression of the inter\|phase force contains the background one only. Based on the arguments, the strict method for deriving the equations for two\|phase flow developed by Drew, Ishii et al. is generalized to the dense two\|phase flow, which involves the effect of collision stress.
Computer simulation on the collision-sticking dynamics of two colloidal particles in an optical trap
Resumo:
Collisions of a particle pair induced by optical tweezers have been employed to study colloidal stability. In order to deepen insights regarding the collision-sticking dynamics of a particle pair in the optical trap that were observed in experimental approaches at the particle level, the authors carry out a Brownian dynamics simulation. In the simulation, various contributing factors, including the Derjaguin-Landau-Verwey-Overbeek interaction of particles, hydrodynamic interactions, optical trapping forces on the two particles, and the Brownian motion, were all taken into account. The simulation reproduces the tendencies of the accumulated sticking probability during the trapping duration for the trapped particle pair described in our previous study and provides an explanation for why the two entangled particles in the trap experience two different statuses. (c) 2007 American Institute of Physics.
Resumo:
Point-particle based direct numerical simulation (PPDNS) has been a productive research tool for studying both single-particle and particle-pair statistics of inertial particles suspended in a turbulent carrier flow. Here we focus on its use in addressing particle-pair statistics relevant to the quantification of turbulent collision rate of inertial particles. PPDNS is particularly useful as the interaction of particles with small-scale (dissipative) turbulent motion of the carrier flow is mostly relevant. Furthermore, since the particle size may be much smaller than the Kolmogorov length of the background fluid turbulence, a large number of particles are needed to accumulate meaningful pair statistics. Starting from the relative simple Lagrangian tracking of so-called ghost particles, PPDNS has significantly advanced our theoretical understanding of the kinematic formulation of the turbulent geometric collision kernel by providing essential data on dynamic collision kernel, radial relative velocity, and radial distribution function. A recent extension of PPDNS is a hybrid direct numerical simulation (HDNS) approach in which the effect of local hydrodynamic interactions of particles is considered, allowing quantitative assessment of the enhancement of collision efficiency by fluid turbulence. Limitations and open issues in PPDNS and HDNS are discussed. Finally, on-going studies of turbulent collision of inertial particles using large-eddy simulations and particle- resolved simulations are briefly discussed.
Resumo:
The small-scale motions relevant to the collision of heavy particles represent a general challenge to the conventional large-eddy simulation (LES) of turbulent particle-laden flows. As a first step toward addressing this challenge, we examine the capability of the LES method with an eddy viscosity subgrid scale (SGS) model to predict the collision-related statistics such as the particle radial distribution function at contact, the radial relative velocity at contact, and the collision rate for a wide range of particle Stokes numbers. Data from direct numerical simulation (DNS) are used as a benchmark to evaluate the LES using both a priori and a posteriori tests. It is shown that, without the SGS motions, LES cannot accurately predict the particle-pair statistics for heavy particles with small and intermediate Stokes numbers, and a large relative error in collision rate up to 60% may arise when the particle Stokes number is near St_K=0.5. The errors from the filtering operation and the SGS model are evaluated separately using the filtered-DNS (FDNS) and LES flow fields. The errors increase with the filter width and have nonmonotonic variations with the particle Stokes numbers. It is concluded that the error due to filtering dominates the overall error in LES for most particle Stokes numbers. It is found that the overall collision rate can be reasonably predicted by both FDNS and LES for St_K>3. Our analysis suggests that, for St_K<3, a particle SGS model must include the effects of SGS motions on the turbulent collision of heavy particles. The spectral analysis of the concentration fields of the particles with different Stokes numbers further demonstrates the important effects of the small-scale motions on the preferential concentration of the particles with small Stokes numbers.
Resumo:
The direct numerical simulation of boundary layer transition over a 5° half-cone-angle blunt cone is performed. The free-stream Mach number is 6 and the angle of attack is 1°. Random wall blow-and-suction perturbations are used to trigger the transition. Different from the authors’ previous work [Li et al., AIAA J. 46, 2899(2008)], the whole boundary layer flow over the cone is simulated (while in the author’s previous work, only two 45° regions around the leeward and the windward sections are simulated). The transition location on the cone surface is determined through the rapid increase in skin fraction coefficient (Cf). The transition line on the cone surface shows a nonmonotonic curve and the transition is delayed in the range of 0° ≤ θ ≤ 30° (θ = 0° is the leeward section). The mechanism of the delayed transition is studied by using joint frequency spectrum analysis and linear stability theory (LST). It is shown that the growth rates of unstable waves of the second mode are suppressed in the range of 20° ≤ θ ≤ 30°, which leads to the delayed transition location. Very low frequency waves VLFWs� are found in the time series recorded just before the transition location, and the periodic times of VLFWs are about one order larger than those of ordinary Mack second mode waves. Band-pass filter is used to analyze the low frequency waves, and they are deemed as the effect of large scale nonlinear perturbations triggered by LST waves when they are strong enough.The direct numerical simulation of boundary layer transition over a 5° half-cone-angle blunt cone is performed. The free-stream Mach number is 6 and the angle of attack is 1°. Random wall blow-and-suction perturbations are used to trigger the transition. Different from the authors’ previous work [ Li et al., AIAA J. 46, 2899 (2008) ], the whole boundary layer flow over the cone is simulated (while in the author’s previous work, only two 45° regions around the leeward and the windward sections are simulated). The transition location on the cone surface is determined through the rapid increase in skin fraction coefficient (Cf). The transition line on the cone surface shows a nonmonotonic curve and the transition is delayed in the range of 20° ≤ θ ≤ 30° (θ = 0° is the leeward section). The mechanism of the delayed transition is studied by using joint frequency spectrum analysis and linear stability theory (LST). It is shown that the growth rates of unstable waves of the second mode are suppressed in the range of 20° ≤ θ ≤ 30°, which leads to the delayed transition location. Very low frequency waves (VLFWs) are found in the time series recorded just before the transition location, and the periodic times of VLFWs are about one order larger than those of ordinary Mack second mode waves. Band-pass filter is used to analyze the low frequency waves, and they are deemed as the effect of large scale nonlinear perturbations triggered by LST waves when they are strong enough.
Resumo:
Interpolation attack was presented by Jakobsen and Knudsen at FSE'97. Interpolation attack is effective against ciphers that have a certain algebraic structure like the PURE cipher which is a prototype cipher, but it is difficult to apply the attack to real-world ciphers. This difficulty is due to the difficulty of deriving a low degree polynomial relation between ciphertexts and plaintexts. In other words, it is difficult to evaluate the security against interpolation attack. This paper generalizes the interpolation attack. The generalization makes easier to evaluate the security against interpolation attack. We call the generalized interpolation attack linear sum attack. We present an algorithm that evaluates the security of byte-oriented ciphers against linear sum attack. Moreover, we show the relationship between linear sum attack and higher order differential attack. In addition, we show the security of CRYPTON, E2, and RIJNDAEL against linear sum attack using the algorithm.
Resumo:
FOX是最近推出的系列分组密码,它的设计思想基于可证安全的研究结果,且在各种平台上的性能优良.本文利用碰撞攻击和积分攻击相结合的技术分析FOX的安全性,结果显示碰撞-积分攻击比积分攻击有效,攻击对4轮FOX64的计算复杂度是2^45.4,对5轮FOX64的计算复杂度是2^109.4,对6轮FOX64的计算复杂度是2^173.4,对7轮FOX64的计算复杂度是2^237.4,且攻击所需数据量均为2^9;也就是说4轮FOX64/64、5轮FOX64/128、6轮FOX64/192和7轮FOX64/256对本文攻击是不免疫的.
Resumo:
Sand storm is a serious environmental threat to humans. Sand particles are transported by saltation and suspension, causing soil erosion in one place and deposition in another. In order to prevent and predict sand storms, the causes and the manners of particle motions must be studied in detail. In this paper a standard k-epsilon model is used for the gas phase simulation and the discrete element method (DEM) is used to predict the movements of particles using an in-house procedure. The data are summarized in an Eulerian-Eulerian regime after simulation to get the statistical particle Reynolds stress and particle collision stress. The results show that for the current case the Reynolds stress and the air shear stress predominate in the region 20-250 mm above the initial sand bed surface. However, in the region below 3 mm, the collision stress must be taken into account in predicting particle movement. (C) 2010 Chinese Society of Particuology and Institute of Process Engineering, Chinese Academy of Sciences. Published by Elsevier B.V. All rights reserved.
Resumo:
197Au were irradiated with 47 MeV/u 12C ions. Iridium was produced via the multinucleon transfer reactions in bombardments of 197Au with 12C. and was separated radiochemically from Au and the mixture of the reaction products. The γ radioactivities of Ir isotopes were measured by using a HPGe detector. The production cross sections of Ir isotopes were determined from activities of Ir isotopes at the end of bombardment and the other relative data. It has been found that the cross sections for neutron-rich iso...