55 resultados para algebraic attack

em Deakin Research Online - Australia


Relevância:

70.00% 70.00%

Publicador:

Resumo:

We present an algebraic attack approach to a family of irregularly clock-controlled bit-based linear feedback shift register systems. In the general set-up, we assume that the output bit of one shift register controls the clocking of other registers in the system and produces a family of equations relating the output bits to the internal state bits. We then apply this general theory to four specific stream ciphers: the (strengthened) stop-and-go generator, the alternating step generator, the self-decimated generator and the step1/step2 generator. In the case of the strengthened stop-and-go generator and of the self-decimated generator, we obtain the initial state of the registers in a significantly faster time than any other known attack. In the other two situations, we do better than or as well as all attacks but the correlation attack. In all cases, we demonstrate that the degree of a functional relationship between the registers can be bounded by two. Finally, we determine the effective key length of all four systems.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Algebraic attacks have been applied to several types of clock-controlled stream ciphers. However, to date there are no such attacks in the literature on mutually clock-controlled ciphers. In this paper, we present a preliminary step in this direction by giving the first algebraic analysis of mutually clock-controlled feedback shift register stream ciphers: the bilateral stop-and-go generator, A5/1, Alpha 1 and the MICKEY cipher. We show that, if there are no regularly clocked shift registers included in the system, mutually clock-controlled feedback shift register ciphers appear to be highly resistant to algebraic attacks. As a demonstration of the weakness inherent in the presence of a regularly clocked shift register, we present a simple algebraic attack on Alpha 1 based on only 29 keystream bits.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper, we mount the first algebraic attacks against clock controlled cascade stream ciphers. We first show how to obtain relations between the internal state bits and the output bits of the Gollmann clock controlled cascade stream ciphers. We demonstrate that the initial states of the last two shift registers can be determined by the initial states of the others. An alternative attack on the Gollmann cascade is also described, which requires solving quadratic equations. We then present an algebraic analysis of Pomaranch, one of the phase two proposals to eSTREAM. A system of equations of maximum degree four that describes the full cipher is derived. We also present weaknesses in the filter functions of Pomaranch by successfully computing annihilators and low degree multiples of the functions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present a new determining set, CZ, of Riemann invariants which possesses the minimum degree property. From an analysis on the possible independence of CZ, we are led to the division of all space-times into two distinct, invariantly characterized, classes: a general class MG+, and a special, singular class MS For each class, we provide an independent set of invariants (IG+) ⊂ CZ and IS ⊂ CZ, respectively) which, with the results of a sequel paper, will be shown to be algebraically complete.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We study the set CZ of invariants [Zakhary and Carminati, J. Math. Phys. 42, 1474 (2001)] for the class of space-times whose Ricci tensors possess a null eigenvector. We show that all cases are maximally backsolvable, in terms of sets of invariants from CZ, but that some cases are not completely backsolvable and these all possess an alignment between an eigenvector of the Ricci tensor with a repeated principal null vector of the Weyl tensor. We provide algebraically complete sets for each canonically different space-time and hence conclude with these results and those of a previous article [Carminati, Zakhary, and McLenaghan, J. Math. Phys. 43, 492 (2002)] that the CZ set is determining or maximal.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recent algebraic attacks on LFSR-based stream ciphers and S-boxes have generated much interest as they appear to be extremely powerful. Theoretical work has been developed focusing around the Boo- lean function case. In this paper, we generalize this theory to arbitrary finite fields and extend the theory of annihilators and ideals introduced at Eurocrypt 2004 by Meier, Pasalic and Carlet. In particular, we prove that for any function f in the multivariate polynomial ring over GF(q), f has a low degree multiple precisely when two low degree functions appear in the same coset of the annihilator of f q – 1 – 1. In this case, many such low degree multiples exist.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Many terrorist attacks are accomplished by bringing explosive devices hidden in ordinary-looking objects to public places. In such case, it is almost impossible to distinguish a terrorist from ordinary people just from the isolated appearance. However, valuable clues might be discovered through analyzing a series of actions of the same person. Abnormal behaviors of object fetching, deposit, or exchange in public places might indicate potential attacks. Based on the widely equipped CCTV surveillance systems at the entrance of many public places, this paper proposes an algorithm to detect such abnormal behaviors for early warning of terrorist attack.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The promise of cancer immunotherapy is that it will not only eradicate primary tumors but will generate systemic antitumor immunity capable of destroying distant metastases. A major problem that must first be surmounted relates to the immune resistance of large tumors. Here we reveal that immune resistance can be overcome by combining immunotherapy with a concerted attack on the tumor vasculature. The functionally related antitumor drugs 5,6-dimethylxanthenone-4-acetic acid (DMXAA) and flavone acetic acid (FAA), which cause tumor vasculature collapse and tumor necrosis, were used to attack the tumor vasculature, whereas the T-cell costimulator B7.1 (CD80), which costimulates T-cell proliferation via the CD28 pathway, was used to stimulate antitumor immunity. The injection of cDNA (60–180 µg) encoding B7.1 into large EL-4 tumors (0.8 cm in diameter) established in C57BL/6 mice, followed 24 h later by i.p. administration of either DMXAA (25 mg/kg) or FAA (300 mg/kg), resulted in complete tumor eradication within 2–6 weeks. In contrast, monotherapies were ineffective. Both vascular attack and B7.1 immunotherapy led to up-regulation of heat shock protein 70 on stressed and dying tumor cells, potentially augmenting immunotherapy. Remarkably, large tumors took on the appearance of a wound that rapidly ameliorated, leaving perfectly healed skin. Combined therapy was mediated by CD8+ T cells and natural killer cells, accompanied by heightened and prolonged antitumor cytolytic activity (P < 0.001), and by a marked increase in tumor cell apoptosis. Cured animals completely rejected a challenge of 1 x 107 parental EL-4 tumor cells but not a challenge of 1 x 104 Lewis lung carcinoma cells, demonstrating that antitumor immunity was tumor specific. Adoptive transfer of 2 x 108 splenocytes from treated mice into recipients bearing established (0.8 cm in diameter) tumors resulted in rapid and complete tumor rejection within 3 weeks. Although DMXAA and B7.1 monotherapies are complicated by a narrow range of effective doses, combined therapy was less dosage dependent. Thus, a broad range of amounts of B7.1 cDNA were effective in combination with 25 mg/kg DMXAA. In contrast, DMXAA, which has a very narrow range of high active doses, was effective at a low dose (18 mg/kg) when administered with a large amount (180 µg) of B7.1 cDNA. Importantly, combinational therapy generated heightened antitumor immunity, such that gene transfer of B7.1 into one tumor, followed by systemic DMXAA treatment, led to the complete rejection of multiple untreated tumor nodules established in the opposing flank. These findings have important implications for the future direction and utility of cancer immunotherapies aimed at harnessing patients’ immune responses to their own tumors.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper uses the H1 tracking ideas in the missile guidance problem. The controller performs as a Precision guidance controller for small desired attack angles although theoretically the formulas are valid (when intercepting a maneuvering target in a precision guidance point of view) only for the case of head on collision. The controller essentially navigates the missile in a unique relative arc that is de ned by the missile and target location and the desired attack angle.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper furthers the research of Rollo, Luther and Atkinson 1999, and Rollo, Honey, Atkinson and Luther 2003, regarding the way in which building shape appears to contribute to the collection of fire-brand debris subject to ember attack. The paper will present a range of 2D fluid-mapping and 3D wind tunnel studies (Melaragno 1982) which have been correlated with the transportation characteristics of an ember laden air-field (Cheney and Sullivan 1997). Working with a range of generic building types the paper also introduces simple spatial modelling techniques which are being developed to illustrate the relationship between ember capture and changes in wind speed and air pressure.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

IP spoofing is a technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host. It causes serious security problem in the cyber world, and is currently exploited widely in the information warfare. This paper at first introduces the IP spoofing attack through examples, technical issues and attacking types. Later its countermeasures are analysed in detail, which include authentication and encription, filtering and IP traceback. In particular, an IP traceback mechanism, Flexible Deterministic Packet Marking (FDPM) is presented. Since the IP spoofing problem can not be solved only by technology, but it also needs social regulation, the legal issues and economic impact are discussed in the later part.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Information is the glue in any organization. It is needed for policy, decision-making, control, and co-ordination. If an organisation's information systems are disrupted or destroyed, then damage to the whole inevitably follows. This paper uses a proven systemic, analytic framework the Viable System Model (VSM) - in a functionalist mode, to analyse the vulnerabilities of an organisation's information resources to this form of aggression. It examines the tactics available, and where they can be used to effectively attack an organisation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This text introduces the concepts of information warfare from a non-military, organizational perspective. It is designed to stimulate managers to develop policies, strategies, and tactics for the aggressive use and defence of their data and knowledge base. The book covers the full gambit of information warfare subjects from the direct attack on computer systems to the more subtle psychological technique of perception management. It provides the framework needed to build management strategies in this area. The topics covered include the basics of information warfare, corporate intelligence systems, the use of deception, security of systems, modes of attack, a methodology to develop defensive measures, plus specific issues associated with information warfare.