976 resultados para slid pairs
Resumo:
A5/1 is a shift register based stream cipher which uses a majority clocking rule to update its registers. It is designed to provide privacy for the GSM system. In this paper, we analyse the initialisation process of A5/1. We demonstrate a sliding property of the A5/1 cipher, where every valid internal state is also a legitimate loaded state and multiple key-IV pairs produce phase shifted keystream sequences. We describe a possible ciphertext only attack based on this property.
Resumo:
Sfinks is a shift register based stream cipher designed for hardware implementation and submitted to the eSTREAM project. In this paper, we analyse the initialisation process of Sfinks. We demonstrate a slid property of the loaded state of the Sfinks cipher, where multiple key-IV pairs may produce phase shifted keystream sequences. The state update functions of both the initialisation process and keystream generation and also the pattern of the padding affect generation of the slid pairs.
Resumo:
Streamciphers are common cryptographic algorithms used to protect the confidentiality of frame-based communications like mobile phone conversations and Internet traffic. Streamciphers are ideal cryptographic algorithms to encrypt these types of traffic as they have the potential to encrypt them quickly and securely, and have low error propagation. The main objective of this thesis is to determine whether structural features of keystream generators affect the security provided by stream ciphers.These structural features pertain to the state-update and output functions used in keystream generators. Using linear sequences as keystream to encrypt messages is known to be insecure. Modern keystream generators use nonlinear sequences as keystream.The nonlinearity can be introduced through a keystream generator's state-update function, output function, or both. The first contribution of this thesis relates to nonlinear sequences produced by the well-known Trivium stream cipher. Trivium is one of the stream ciphers selected in a final portfolio resulting from a multi-year project in Europe called the ecrypt project. Trivium's structural simplicity makes it a popular cipher to cryptanalyse, but to date, there are no attacks in the public literature which are faster than exhaustive keysearch. Algebraic analyses are performed on the Trivium stream cipher, which uses a nonlinear state-update and linear output function to produce keystream. Two algebraic investigations are performed: an examination of the sliding property in the initialisation process and algebraic analyses of Trivium-like streamciphers using a combination of the algebraic techniques previously applied separately by Berbain et al. and Raddum. For certain iterations of Trivium's state-update function, we examine the sets of slid pairs, looking particularly to form chains of slid pairs. No chains exist for a small number of iterations.This has implications for the period of keystreams produced by Trivium. Secondly, using our combination of the methods of Berbain et al. and Raddum, we analysed Trivium-like ciphers and improved on previous on previous analysis with regards to forming systems of equations on these ciphers. Using these new systems of equations, we were able to successfully recover the initial state of Bivium-A.The attack complexity for Bivium-B and Trivium were, however, worse than exhaustive keysearch. We also show that the selection of stages which are used as input to the output function and the size of registers which are used in the construction of the system of equations affect the success of the attack. The second contribution of this thesis is the examination of state convergence. State convergence is an undesirable characteristic in keystream generators for stream ciphers, as it implies that the effective session key size of the stream cipher is smaller than the designers intended. We identify methods which can be used to detect state convergence. As a case study, theMixer streamcipher, which uses nonlinear state-update and output functions to produce keystream, is analysed. Mixer is found to suffer from state convergence as the state-update function used in its initialisation process is not one-to-one. A discussion of several other streamciphers which are known to suffer from state convergence is given. From our analysis of these stream ciphers, three mechanisms which can cause state convergence are identified.The effect state convergence can have on stream cipher cryptanalysis is examined. We show that state convergence can have a positive effect if the goal of the attacker is to recover the initial state of the keystream generator. The third contribution of this thesis is the examination of the distributions of bit patterns in the sequences produced by nonlinear filter generators (NLFGs) and linearly filtered nonlinear feedback shift registers. We show that the selection of stages used as input to a keystream generator's output function can affect the distribution of bit patterns in sequences produced by these keystreamgenerators, and that the effect differs for nonlinear filter generators and linearly filtered nonlinear feedback shift registers. In the case of NLFGs, the keystream sequences produced when the output functions take inputs from consecutive register stages are less uniform than sequences produced by NLFGs whose output functions take inputs from unevenly spaced register stages. The opposite is true for keystream sequences produced by linearly filtered nonlinear feedback shift registers.
Resumo:
Stream ciphers are symmetric key cryptosystems that are used commonly to provide confidentiality for a wide range of applications; such as mobile phone, pay TV and Internet data transmissions. This research examines the features and properties of the initialisation processes of existing stream ciphers to identify flaws and weaknesses, then presents recommendations to improve the security of future cipher designs. This research investigates well-known stream ciphers: A5/1, Sfinks and the Common Scrambling Algorithm Stream Cipher (CSA-SC). This research focused on the security of the initialisation process. The recommendations given are based on both the results in the literature and the work in this thesis.
Resumo:
The Common Scrambling Algorithm Stream Cipher (CSASC) is a shift register based stream cipher designed to encrypt digital video broadcast. CSA-SC produces a pseudo-random binary sequence that is used to mask the contents of the transmission. In this paper, we analyse the initialisation process of the CSA-SC keystream generator and demonstrate weaknesses which lead to state convergence, slid pairs and shifted keystreams. As a result, the cipher may be vulnerable to distinguishing attacks, time-memory-data trade-off attacks or slide attacks.
Resumo:
The consistently high failure rate in Queensland University of Technology’s introductory programming subject reflects a similar dilemma facing other universities worldwide. Experiments were conducted to quantify the effectiveness of collaborative learning on introductory level programming students over a number of semesters, replicating previous studies in this area. A selection of workshops in the introductory programming subject required students to problem-solve and program in pairs, mimicking the eXtreme Programming concept of pair programming. The failure rate for the subject fell from what had been an average of 30% since 2003 (with a high of 41% in 2006), to just 5% for those students who worked consistently in pairs.
Resumo:
This study employs a pairs trading investment strategy on daily commodity futures returns. The study reveals that pairs trading in similarly related commodity futures earns statistically significant excess returns with commensurate volatility. The excess returns from pairs trading in commodity futures are unrelated to conventional market risk factors and they are not associated with classic contrarian investing. The evidence of pairs trading reflect compensation to arbitrageurs for enforcing the law of one price in similarly related market efficiency.
Resumo:
Beam steering with high front-to-back ratio and high directivity on a small platform is proposed. Two closely spaced antenna pairs with eigenmode port decoupling are used as the basic radiating elements. Two orthogonal radiation patterns are obtained for each antenna pair. High front-to-back ratio and high directivity are achieved by combining the two orthogonal radiation patterns. With an infinite groundplane, a front-to-back ratio of 21 dB with a directivity of 9.8 dB can be achieved. Beam steering, at the expense of a slight decrease in directivity, is achieved by placing the two antenna pairs 0.5λ apart. The simulated half power beamwidth is 58°. A prototype was designed and the 2-D radiation patterns were measured. The prototype supports three directions of beam steering. The half power beamwidth was measured as 46°, 48°, and 50° for the three respective beam directions. The measured front-to-back ratio in azimuth plane is 8.5 dB, 8.0 dB and 7.6 dB, respectively.
Resumo:
This article provides an overview on some of the key aspects that relate to the co-evolution of languages and its associated content in the Internet environment. A focus on such a co-evolution is pertinent as the evolution of languages in the Internet environment can be better understood if the development of its existing and emerging content, that is, the content in the respective language, is taken into consideration. By doing so, this article examines two related aspects: the governance of languages at critical sites of the Internet environment, including ICANN, Wikipedia and Google Translate. Following on from this examination, the second part outlines how the co-evolution of languages and associated content in the Internet environment extends policy-making related to linguistic pluralism. It is argued that policies which centre on language availability in the Internet environment must shift their focus to the dynamics of available content instead. The notion of language pairs as a new regime of intersection for both languages and content is discussed to introduce an extended understanding of the uses of linguistic pluralism in the Internet environment. The ultimate extrapolation of such an enhanced approach, it is argued, centres less on 6,000 languages but, instead, on 36 million language pairs. This article describes how such a powerful resource evolves in the Internet environment.
Resumo:
A5/1 is a shift register based stream cipher which provides privacy for the GSM system. In this paper, we analyse the loading of the secret key and IV during the initialisation process of A5/1. We demonstrate the existence of weak key-IV pairs in the A5/1 cipher due to this loading process; these weak key-IV pairs may generate one, two or three registers containing all-zero values, which may lead in turn to weak keystream sequences. In the case where two or three registers contain only zeros, we describe a distinguisher which leads to a complete decryption of the affected messages.
Resumo:
INTRODUCTION Influenza vaccination in pregnancy is recommended for all women in Australia, particularly those who will be in their second or third trimester during the influenza season. However, there has been no systematic monitoring of influenza vaccine uptake among pregnant women in Australia. Evidence is emerging of benefit to the infant with respect to preventing influenza infection in the first 6 months of life. The FluMum study aims to systematically monitor influenza vaccine uptake during pregnancy in Australia and determine the effectiveness of maternal vaccination in preventing laboratory-confirmed influenza in their offspring up to 6 months of age. METHODS AND ANALYSIS A prospective cohort study of 10 106 mother-infant pairs recruited between 38 weeks gestation and 55 days postdelivery in six Australian capital cities. Detailed maternal and infant information is collected at enrolment, including influenza illness and vaccination history with a follow-up data collection time point at infant age 6 months. The primary outcome is laboratory-confirmed influenza in the infant. Case ascertainment occurs through searches of Australian notifiable diseases data sets once the infant turns 6 months of age (with parental consent). The primary analysis involves calculating vaccine effectiveness against laboratory-confirmed influenza by comparing the incidence of influenza in infants of vaccinated mothers to the incidence in infants of unvaccinated mothers. Secondary analyses include annual and pooled estimates of the proportion of mothers vaccinated during pregnancy, the effectiveness of maternal vaccination in preventing hospitalisation for acute respiratory illness and modelling to assess the determinants of vaccination. ETHICS AND DISSEMINATION The study was approved by all institutional Human Research Ethics Committees responsible for participating sites. Study findings will be published in peer review journals and presented at national and international conferences. TRIAL REGISTRATION NUMBER The study is registered with the Australia and New Zealand Clinical Trials Registry (ANZCTR) number: 12612000175875.
Resumo:
Gut bacterial communities are now known to influence a range of fitness related aspects of organisms. But how different the microbial community is in closely related species, and if these differences can be interpreted as adaptive is still unclear. In this study we compared microbial communities in two sets of closely related sympatric crater lake cichlid fish species pairs that show similar adaptations along the limnetic-benthic axis. The gut microbial community composition differs in the species pair inhabiting the older of two crater lakes. One major difference, relative to other fish, is that in these cichlids that live in hypersaline crater lakes, the microbial community is largely made up of Oceanospirillales (52.28%) which are halotolerant or halophilic bacteria. This analysis opens up further avenues to identify candidate symbiotic or co-evolved bacteria playing a role in adaptation to similar diets and life-styles or even have a role in speciation. Future functional and phylosymbiotic analyses might help to address these issues.
Resumo:
Objective. To undertake a systematic wholegenome screen to identify regions exhibiting genetic linkage to rheumatoid arthritis (RA). Methods. Two hundred fifty-two RA-affected sibling pairs from 182 UK families were genotyped using 365 highly informative microsatellite markers. Microsatellite genotyping was performed using fluorescent polymerase chain reaction primers and semiautomated DNA sequencing technology. Linkage analysis was undertaken using MAPMAKER/SIBS for single-point and multipoint analysis. Results. Significant linkage (maximum logarithm of odds score 4.7 [P = 0.000003] at marker D6S276, 1 cM from HLA-DRB1) was identified around the major histocompatibility complex (MHC) region on chromosome 6. Suggestive linkage (P < 7.4 × 10-4) was identified on chromosome 6q by single- and multipoint analysis. Ten other sites of nominal linkage (P < 0.05) were identified on chromosomes 3p, 4q, 7p, 2 regions of 10q, 2 regions of 14q, 16p, 21q, and Xq by single-point analysis and on 3 sites (1q, 14q, and 14q) by multipoint analysis. Conclusion. Linkage to the MHC region was confirmed. Eleven non-HLA regions demonstrated evidence of suggestive or nominal linkage, but none reached the genome-wide threshold for significant linkage (P = 2.2 × 10-5). Results of previous genome screens have suggested that 6 of these regions may be involved in RA susceptibility.
Resumo:
Four new hybrid (bolaphile/amphiphile) ion-pairs were synthesized. Electron microscopy indicated that each of these forms bilayer membranes upon dispersion in aqueous media. Membrane properties have also been examined by differential scanning calorimetry, microcalorimetry, temperature-dependent fluorescence anisotropy measurements, and UV-vis spectroscopy. The T-m values for the vesicular 1, 2, 3, 4, and 5 were 38, 12, 85, 31.3, and 41.6 degrees C, respectively. Interestingly the T-m values for 1 and 3 were found to depend on their concentration. The entrapment of small solute and the release capability have also been examined to demonstrate that these bilayers form enclosed vesicles. X-ray diffraction of the cast films has been performed to understand the nature and the thickness of these membrane organizations. The membrane widths ranged from 33 to 47 Angstrom. Finally, the above observations have been analyzed in light of the results obtained from molecular modeling studies. Thus we have demonstrated that membrane properties can be modulated by simple structural changes at the amphiphile level. It was shown that by judicious incorporation of central, isomeric, disubstituted aromatic units as structural anchors into different bolaphiles, one can modulate the properties of the resulting vesicles.