11 resultados para lex credendi
em Queensland University of Technology - ePrints Archive
Resumo:
LEX is a stream cipher that progressed to Phase 3 of the eSTREAM stream cipher project. In this paper, we show that the security of LEX against algebraic attacks relies on a small equation system not being solvable faster than exhaustive search. We use the byte leakage in LEX to construct a system of 21 equa- tions in 17 variables. This is very close to the require- ment for an efficient attack, i.e. a system containing 16 variables. The system requires only 36 bytes of keystream, which is very low.
Resumo:
This paper examines the algebraic cryptanalysis of small scale variants of the LEX-BES. LEX-BES is a stream cipher based on the Advanced Encryption Standard (AES) block cipher. LEX is a generic method proposed for constructing a stream cipher from a block cipher, initially introduced by Biryukov at eSTREAM, the ECRYPT Stream Cipher project in 2005. The Big Encryption System (BES) is a block cipher introduced at CRYPTO 2002 which facilitates the algebraic analysis of the AES block cipher. In this paper, experiments were conducted to find solution of the equation system describing small scale LEX-BES using Gröbner Basis computations. This follows a similar approach to the work by Cid, Murphy and Robshaw at FSE 2005 that investigated algebraic cryptanalysis on small scale variants of the BES. The difference between LEX-BES and BES is that due to the way the keystream is extracted, the number of unknowns in LEX-BES equations is fewer than the number in BES. As far as the author knows, this attempt is the first at creating solvable equation systems for stream ciphers based on the LEX method using Gröbner Basis computations.
Resumo:
This work examines the algebraic cryptanalysis of small scale variants of the LEX-BES. LEX-BES is a stream cipher based on the Advanced Encryption Standard (AES) block cipher. LEX is a generic method proposed for constructing a stream cipher from a block cipher, initially introduced by Biryukov at eSTREAM, the ECRYPT Stream Cipher project in 2005. The Big Encryption System (BES) is a block cipher introduced at CRYPTO 2002 which facilitates the algebraic analysis of the AES block cipher. In this article, experiments were conducted to find solutions of equation systems describing small scale LEX-BES using Gröbner Basis computations. This follows a similar approach to the work by Cid, Murphy and Robshaw at FSE 2005 that investigated algebraic cryptanalysis on small scale variants of the BES. The difference between LEX-BES and BES is that due to the way the keystream is extracted, the number of unknowns in LEX-BES equations is fewer than the number in BES. As far as the authors know, this attempt is the first at creating solvable equation systems for stream ciphers based on the LEX method using Gröbner Basis computations.
Resumo:
Law is narration: it is narrative, narrator and the narrated. As a narrative, the law is constituted by a constellation of texts – from official sources such as statutes, treaties and cases, to private arrangements such as commercial contracts, deeds and parenting plans. All are a collection of stories: cases are narrative contests of facts and rights; statutes are recitations of the substantive and procedural bases for social, economic and political interactions; private agreements are plots for future relationships, whether personal or professional. As a narrator, law speaks in the language of modern liberalism. It describes its world in abstractions rather than in concrete experience, universal principles rather than individual subjectivity. It casts people into ‘parties’ to legal relationships; structures human interactions into ‘issues’ or ‘problems’; and tells individual stories within larger narrative arcs such as ‘the rule of law’ and ‘the interests of justice’. As the narrated, the law is a character in its own story. The scholarship of law, for example, is a type of story-telling with law as its central character. For positivists, still the dominant group in the legal genre, law is a closed system of formal rules with an “immanent rationality” and its own “structure, substantive content, procedure and tradition,” dedicated to finality of judgment. For scholars inspired by the interpretative tradition in the humanities, law is a more ambivalent character, susceptible to influences from outside its realm and masking a hidden ideological agenda under its cloak of universality and neutrality. For social scientists, law is a protagonist on a wider social stage, impacting on society, the economy and the polity is often surprising ways.
Resumo:
This thesis is devoted to the study of linear relationships in symmetric block ciphers. A block cipher is designed so that the ciphertext is produced as a nonlinear function of the plaintext and secret master key. However, linear relationships within the cipher can still exist if the texts and components of the cipher are manipulated in a number of ways, as shown in this thesis. There are four main contributions of this thesis. The first contribution is the extension of the applicability of integral attacks from word-based to bitbased block ciphers. Integral attacks exploit the linear relationship between texts at intermediate stages of encryption. This relationship can be used to recover subkey bits in a key recovery attack. In principle, integral attacks can be applied to bit-based block ciphers. However, specific tools to define the attack on these ciphers are not available. This problem is addressed in this thesis by introducing a refined set of notations to describe the attack. The bit patternbased integral attack is successfully demonstrated on reduced-round variants of the block ciphers Noekeon, Present and Serpent. The second contribution is the discovery of a very small system of equations that describe the LEX-AES stream cipher. LEX-AES is based heavily on the 128-bit-key (16-byte) Advanced Encryption Standard (AES) block cipher. In one instance, the system contains 21 equations and 17 unknown bytes. This is very close to the upper limit for an exhaustive key search, which is 16 bytes. One only needs to acquire 36 bytes of keystream to generate the equations. Therefore, the security of this cipher depends on the difficulty of solving this small system of equations. The third contribution is the proposal of an alternative method to measure diffusion in the linear transformation of Substitution-Permutation-Network (SPN) block ciphers. Currently, the branch number is widely used for this purpose. It is useful for estimating the possible success of differential and linear attacks on a particular SPN cipher. However, the measure does not give information on the number of input bits that are left unchanged by the transformation when producing the output bits. The new measure introduced in this thesis is intended to complement the current branch number technique. The measure is based on fixed points and simple linear relationships between the input and output words of the linear transformation. The measure represents the average fraction of input words to a linear diffusion transformation that are not effectively changed by the transformation. This measure is applied to the block ciphers AES, ARIA, Serpent and Present. It is shown that except for Serpent, the linear transformations used in the block ciphers examined do not behave as expected for a random linear transformation. The fourth contribution is the identification of linear paths in the nonlinear round function of the SMS4 block cipher. The SMS4 block cipher is used as a standard in the Chinese Wireless LAN Wired Authentication and Privacy Infrastructure (WAPI) and hence, the round function should exhibit a high level of nonlinearity. However, the findings in this thesis on the existence of linear relationships show that this is not the case. It is shown that in some exceptional cases, the first four rounds of SMS4 are effectively linear. In these cases, the effective number of rounds for SMS4 is reduced by four, from 32 to 28. The findings raise questions about the security provided by SMS4, and might provide clues on the existence of a flaw in the design of the cipher.
Resumo:
Project-based learning (PBL) is widely used in engineering courses. The closer to real-life the project, the greater the relevance and depth of learning experienced by students. Formula Society of Automotive Engineering (FSAE) is a fine example of a team-based project modelled on real-life problems whereby each student team designs and builds a small race car for competitive evaluation. Queensland University of Technology (QUT) has participated in FSAE-Australia since 2004. Based on the success of the project, QUT has gone the additional step of introducing a motor-racing specialization (second major) to complement its mechanical engineering degree. In this paper, the benefits of teaching motor-racing engineering through real-life projects are presented together with a discussion of the challenges faced and how they have been addressed. In order to validate the authors' observations on the teaching approaches used, student feedback was solicited through QUT's online learning experience survey (LEX), as well as a customized paper-based survey. The results of the surveys are analysed and discussed in this paper.
Resumo:
In this paper different aspects of teaching tribology and maintenance-related subjects with a hands-on focus at Queensland University of Technology (QUT) are presented and discussed. As part of the study, a combination of data from core units, such as engineering design units, and elective units, was used, in addition to laboratory experiments, real-life projects, interactive software packages and industry visits. The mechanical engineering curriculum structure used at QUT, consisting of the main specialization (first major) and the second specialization (second major), is also discussed with specific emphasis on the teaching of tribology and maintenance-related subjects. To evaluate students' satisfaction with the novel teaching approaches used, tailored questionnaires were used as well as QUT's online learning experience survey (LEX). Statistical results of these sureveys are presented and discussed. In summary, these showed that students overwhelmingly support the hands-on and practical focus in teaching tribology and maintenance-related subjects and that the teaching approaches used shorten the learning curve and make students better prepared for integration in the workplace.
Resumo:
Who is Superman’s greatest threat? Evil genius Lex Luthor? General Zod from the Phantom Zone? The doppelganger Bizarro? Super-villain Brainiac? Kryptonite? Or is it intellectual property law?
Resumo:
Widening participation brings with it increasing diversity, increased variation in the level of academic preparedness (Clarke, 2011; Nelson, Clarke, & Kift 2010). Cultural capital coupled with negotiating the academic culture creates an environment based on many assumptions about academic writing and university culture. Variations in staff and student expectations relating to the teaching and learning experience is captured in a range of national and institutional data (AUSSE, CEQ, LEX). Nationally, AUSSE data (2009) indicates that communication, writing, speaking and analytic skills, staff expectations are quite a bit higher than students. The research team noted a recognisable shift in the changing cohort of students and their understanding and engagement with feedback and CRAs, as well as variations in teaching staff and student expectations. The current reality of tutor and student roles is that: - Students self select when/how they access lectures and tutorials. - Shorter tutorial times result in reduced opportunity to develop rapport with students. - CRAs are not always used consistently by staff (different marking styles and levels of feedback). - Marking is not always undertaken by the student’s tutor/lecturer. - Student support services might be recommended to students once a poor grade has been given. Students can perceive this as remedial and a further sense of failure. - CRA sheet has a mark /grade attached to it. Stigma attached to low mark. Hard to focus on the CRA feedback with a poor mark etched next to it. - Limited opportunities for sessionals to access professional development to assist with engaging students and feedback. - FYE resources exist, however academic time is a factor in exploring and embedding these resources. Feedback is another area with differing expectations and understandings. Sadler (2009) contends that students are not equipped to decode the statements properly. For students to be able to apply feedback, they need to understand the meaning of the feedback statement. They also need to identify, the particular aspects of their work that need attention. The proposed Checklist/guide would be one page and submitted with each assessment piece thereby providing an interface to engage students and tutors in managing first year understandings and expectations around CRAs, feedback, and academic practice.
The dark side to Australia’s equity revolution: Credit crunch, creditor protection and corporate law