946 resultados para Related Key Attack


Relevância:

100.00% 100.00%

Publicador:

Resumo:

We examine the security of the 64-bit lightweight block cipher PRESENT-80 against related-key differential attacks. With a computer search we are able to prove that for any related-key differential characteristic on full-round PRESENT-80, the probability of the characteristic only in the 64-bit state is not higher than 2−64. To overcome the exponential (in the state and key sizes) computational complexity of the search we use truncated differences, however as the key schedule is not nibble oriented, we switch to actual differences and apply early abort techniques to prune the tree-based search. With a new method called extended split approach we are able to make the whole search feasible and we implement and run it in real time. Our approach targets the PRESENT-80 cipher however,with small modifications can be reused for other lightweight ciphers as well.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Rakaposhi is a synchronous stream cipher, which uses three main components: a non-linear feedback shift register (NLFSR), a dynamic linear feedback shift register (DLFSR) and a non-linear filtering function (NLF). NLFSR consists of 128 bits and is initialised by the secret key K. DLFSR holds 192 bits and is initialised by an initial vector (IV). NLF takes 8-bit inputs and returns a single output bit. The work identifies weaknesses and properties of the cipher. The main observation is that the initialisation procedure has the so-called sliding property. The property can be used to launch distinguishing and key recovery attacks. The distinguisher needs four observations of the related (K,IV) pairs. The key recovery algorithm allows to discover the secret key K after observing 29 pairs of (K,IV). Based on the proposed related-key attack, the number of related (K,IV) pairs is 2(128 + 192)/4 pairs. Further the cipher is studied when the registers enter short cycles. When NLFSR is set to all ones, then the cipher degenerates to a linear feedback shift register with a non-linear filter. Consequently, the initial state (and Secret Key and IV) can be recovered with complexity 263.87. If DLFSR is set to all zeros, then NLF reduces to a low non-linearity filter function. As the result, the cipher is insecure allowing the adversary to distinguish it from a random cipher after 217 observations of keystream bits. There is also the key recovery algorithm that allows to find the secret key with complexity 2 54.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Capital works procurement and its regulatory policy environment within a country can be complex entities. For example, by virtue of Australia’s governmental division between the Commonwealth, states and local jurisdictions and the associated procurement networks and responsibilities at each level, the tendering process is often convoluted. There are four inter-related key themes identified in the literature in relation to procurement disharmony, including decentralisation, risk & risk mitigation, free trade & competition, and tendering costs. This paper defines and discusses these key areas of conflict that adversely impact upon the business environments of industry through a literature review, policy analysis and consultation with capital works procurement stakeholders. The aim of this national study is to identify policy differences between jurisdictions in Australia, and ascertain whether those differences are a barrier to productivity and innovation. This research forms an element of a broader investigation with an aim of developing efficient, effective and nationally harmonised procurement systems. Keywords: capital works, procurement policy reform Acknowledgement: The research described in this paper carried out by the Australian Cooperative Research Centre for Construction Innovation.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

We present an approach to automating computationally sound proofs of key exchange protocols based on public-key encryption. We show that satisfying the property called occultness in the Dolev-Yao model guarantees the security of a related key exchange protocol in a simple computational model. Security in this simpler model has been shown to imply security in a Bellare {Rogaway-like model. Furthermore, the occultness in the Dolev-Yao model can be searched automatically by a mechanisable procedure. Thus automated proofs for key exchange protocols in the computational model can be achieved. We illustrate the method using the well-known Lowe-Needham-Schroeder protocol.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

In this paper we present truncated differential analysis of reduced-round LBlock by computing the differential distribution of every nibble of the state. LLR statistical test is used as a tool to apply the distinguishing and key-recovery attacks. To build the distinguisher, all possible differences are traced through the cipher and the truncated differential probability distribution is determined for every output nibble. We concatenate additional rounds to the beginning and end of the truncated differential distribution to apply the key-recovery attack. By exploiting properties of the key schedule, we obtain a large overlap of key bits used in the beginning and final rounds. This allows us to significantly increase the differential probabilities and hence reduce the attack complexity. We validate the analysis by implementing the attack on LBlock reduced to 12 rounds. Finally, we apply single-key and related-key attacks on 18 and 21-round LBlock, respectively.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Capital works procurement and its regulatory policy environment within a country can be complex entities. For example, by virtue of Australia’s governmental division between the Commonwealth, states and local jurisdictions and the associated procurement networks and responsibilities at each level, the tendering process is often convoluted. There are four inter-related key themes identified in the literature in relation to procurement disharmony, including decentralisation, risk & risk mitigation, free trade & competition, and tendering costs. This paper defines and discusses these key areas of conflict that adversely impact upon the business environments of industry through a literature review, policy analysis and consultation with capital works procurement stakeholders. The aim of this national study is to identify policy differences between jurisdictions in Australia, and ascertain whether those differences are a barrier to productivity and innovation. This research forms an element of a broader investigation with an aim of developing efficient, effective and nationally harmonised procurement systems.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Several companies are trying to improve their operation efficiency by implementing an enterprise resource planning (ERP) system that makes it possible to control the resources of the company in real time. However, the success of the implementation project is not a foregone conclusion; a significant part of these projects end in a failure, one way or another. Therefore it is important to investigate ERP system implementation more closely in order to increase understanding about factors influencing ERP system success and to improve the probability of a successful ERP implementation project. Consequently, this study was initiated because a manufacturing case company wanted to review the success of their ERP implementation project. To be exact, the case company hoped to gain both information about the success of the project and insight for future implementation improvement. This study investigated ERP success specifically by examining factors that influence ERP key-user satisfaction. User satisfaction is one of the most commonly applied indicators of information system success. The research data was mainly collected by conducting theme interviews. The subjects of the interviews were six key-users of the newly implemented ERP system. The interviewees were closely involved in the implementation project. Furthermore, they act as representative users that utilize the new system in everyday business processes. The collected data was analyzed by thematizing. Both data collection and analysis were guided by a theoretical frame of reference. This frame was based on previous research on the subject. The results of the study aligned with the theoretical framework to large extent. The four principal factors influencing key-user satisfaction were change management, contractor service, key-user’s system knowledge and characteristics of the ERP product itself. One of the most significant contributions of the research is that it confirmed the existence of a connection between change management and ERP key-user satisfaction. Furthermore, it discovered two new sub-factors influencing contractor service related key-user satisfaction. In addition, the research findings indicated that in order to improve the current level of key-user satisfaction, the case company should pay special attention to system functionality improvement and enhancement of the key-users’ knowledge. During similar implementation projects in the future, it would be important to assure the success of change management and contractor service related processes.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

So far, low probability differentials for the key schedule of block ciphers have been used as a straightforward proof of security against related-key differential analysis. To achieve resistance, it is believed that for cipher with k-bit key it suffices the upper bound on the probability to be 2− k . Surprisingly, we show that this reasonable assumption is incorrect, and the probability should be (much) lower than 2− k . Our counter example is a related-key differential analysis of the well established block cipher CLEFIA-128. We show that although the key schedule of CLEFIA-128 prevents differentials with a probability higher than 2− 128, the linear part of the key schedule that produces the round keys, and the Feistel structure of the cipher, allow to exploit particularly chosen differentials with a probability as low as 2− 128. CLEFIA-128 has 214 such differentials, which translate to 214 pairs of weak keys. The probability of each differential is too low, but the weak keys have a special structure which allows with a divide-and-conquer approach to gain an advantage of 27 over generic analysis. We exploit the advantage and give a membership test for the weak-key class and provide analysis of the hashing modes. The proposed analysis has been tested with computer experiments on small-scale variants of CLEFIA-128. Our results do not threaten the practical use of CLEFIA.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

PCYCs, individually and as a whole, are highly valued in communities across Queensland. Participants in this evaluation identified numerous benefits of PCYCs, including: providing structured low-cost activities for young people and other community groups; developing positive relationships and trust between young people and police; developing young people into effective citizens; providing a safe place for young people and a hub for whole communities; addressing disadvantages faced by young people; and fostering social inclusion. Depending on the particular activities and programs delivered by a branch, PCYCs have the capacity to minimise risk factors and enhance protective factors relating to young people’s involvement in crime. For example, PCYCs can play an important role in strengthening young people’s engagement with education and family. However, the crime prevention and community safety aims of PCYCs, and measures that might work towards these aims are not widely- or well-understood, or appreciated, by those working in and with PCYCs. The key recommendation of this evaluation is therefore that the crime prevention and community safety aims of PCYCs in Queensland need to be better articulated, understood and reflected in the practice of those working in and with PCYCs. A related key finding is that many of the activities and programs currently provided by PCYCs could be better oriented towards the goals of crime prevention and community safety without major resource implications.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

卫星激光通信具有巨大的潜在应用价值, 国际上已实现高码率、小型化、轻量化和低功耗激光通信终端, 全文的第一部分即“链路和终端技术”综述了卫星激光通信的国外进展, 介绍了终端的关键技术, 讨论了终端设计思想。第二部分(另文)将讨论和介绍卫星激光通信终端地面检测和验证技术。

Relevância:

80.00% 80.00%

Publicador:

Resumo:

研究AES-256抵抗相关密钥-不可能差分密码分析的能力.首先给出相关密钥的差分,该差分可以扩展到8轮(甚至更多轮)子密钥差分;然后构造出一个5.5轮的相关密钥不可能差分特征.最后,给出一个对7轮AES-256的攻击和4个对8轮AES-256的攻击.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

微制作机器人技术是MEMS技术的一个重要分支,也是当前机器人研究领域的一个热点。本文分析了微操作机器人集成系统的特点,并针对微制作机器人系统研制中涉及的一些关键技术,如驱动、定位、检测和控制等技术进行了论述。

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Background
Sporting organisations provide an important setting for health promotion strategies that involve policies, communication of healthy messages and creation of health promoting environments. The introduction of policy interventions within sporting organisations is one strategy to target high risk behaviours such as smoking, alcohol consumption, excess sun exposure, unhealthy eating and discrimination.

Objectives
To review all controlled evaluation studies of policy interventions organised through sporting settings to increase healthy behaviour (related to smoking, alcohol, healthy eating, sun protection, discrimination, safety and access).

Search strategy
We searched the Cochrane Central Register of Controlled Trials (CENTRAL), MEDLINE, EMBASE, PsyclNFO, CINAHL, SPORTDiscus, Sociological Abstracts, Dissertation Abstracts, freely available online health promotion and sports-related databases hosted by leading agencies, and the internet using sport and policy-related key words. We identified further studies in the bibliographies of articles and by contacting authors of key articles in the area.

Selection criteria
We aimed to identify research that had used study designs that incorporated an evaluated intervention and comparison. Uncontrolled studies, meeting other inclusion criteria, were to be reported in an annex to the review.
Types of studies: Studies in which sporting organisations were allocated to a policy intervention or control/comparison group. No minimum follow-up required.
Types of participants: People of all ages.
Types of interventions: Any policy intervention implemented through sporting organisations to instigate and/or sustain healthy behaviour change, intention to change behaviour, or changes in attitudes, knowledge or awareness of healthy behaviour. Policies must address any of the following: smoking, alcohol, healthy eating, sun protection, access for disadvantaged groups, physical safety (not including injuries), and social and emotional health (e.g.. anti-vilification, anti-discrimination).
Types of outcome measures: Behaviour change, intention to change behaviour, change in attitudes, knowledge or awareness of healthy behaviour, and policy presence.

Data collection and analysis
We assessed whether identified citations were controlled evaluation studies and investigated the use of policy implemented in sporting settings. Abstracts were independently inspected by two reviewers and full papers were obtained where necessary. As no controlled evaluation studies were located, no data collection or analysis was undertaken. No uncontrolled studies meeting other inclusion criteria were identified and therefore no annex is presented.

Main results
No rigorous studies were located to test the effectiveness of policy interventions organised through sporting organisations to increase healthy behaviours, attitudes, knowledge or inclusion of health oriented policies within the organisarions.

Authors' conclusions
We were unable to find any controlled studies to guide the use of policy interventions used in sporting settings. The search process revealed a number of case studies with anecdotal reporting of outcomes. We strongly recommend that rigorous evaluation techniques are employed more commonly in this field to illuminate the impact of health promoting policy on outcomes, and the contexts and processes which are likely ro be effective in reducing harmful behaviours.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Social conflict between mice produces analgesia in the attacked mouse. Both the magnitude and type (opioid or nonopioid) of this analgesia have been related to attack intensity and strain of mouse. In the present study low intensity social conflict (7 bites) did not produce analgesia, whereas high intensity - 30 and 60 bites interactions produced, respectively, short-lasting (5 min) and very short-lasting (1 min) analgesia in Swiss albino mice, when compared with nonaggressive interaction (0 bite). The 30 bites aggressive interaction induced analgesia (AIIA) was not affected by IP injection of either naloxone (5.0 and 7.5 mg/kg) or diazepam (0.5, 1.0, 2.0 and 4.0 mg/kg). However, this attack-induced analgesia was reduced after IP administration of the 5-HT1A agonists, gepirone (0.3 and 3.0 mg/kg) and BAY R 1531 (0.01 mg/kg). These results indicate that the analgesia induced by 30 bites social conflict in Swiss albino mice does not involve opioid and GABA-benzodiazepine (GABA-BZD) mechanisms. In addition, they suggest that high-intensity social conflict activates serotonergic pain modulatory systems that act through 5-HT1A receptors. Copyright (C) 1997 Elsevier B.V.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Global warming may exacerbate inorganic nutrient limitation, including phosphorus (P), in the surface-waters of tropical oceans that are home to extensive blooms of the marine diazotrophic cyanobacterium, Trichodesmium. We examined the combined effects of P limitation and pCO2, forecast under ocean acidification scenarios, on Trichodesmium erythraeum IMS101 cultures. We measured nitrogen acquisition, glutamine synthetase activity, C uptake rates, intracellular Adenosine Triphosphate (ATP) concentration and the pool sizes of related key proteins. Here, we present data supporting the idea that cellular energy re-allocation enables the higher growth and N2 fixation rates detected in Trichodesmium cultured under high pCO2. This is reflected in altered protein abundance and metabolic pools. Also modified are particulate organic carbon and nitrogen production rates, enzymatic activities, and cellular ATP concentrations. We suggest that adjusting these cellular pathways to changing environmental conditions enables Trichodesmium to compensate for low P availability and to thrive in acidified oceans. Moreover, elevated pCO2 could provide Trichodesmium with a competitive dominance that would extend its niche, particularly in P-limited regions of the tropical and subtropical oceans.