1,593 research outputs found

    Multilayer Security of RGB Image in Discrete Hartley Domain

    Get PDF
    In this article, we present RGB image encryption and decryption using random matrix affine cipher (RMAC) associated with discrete Hartley transform (DHT) and random matrix shift cipher (RMSC). The parameters in RMAC and RMSC phases act as two series of secret keys whose arrangement is imperative in the proposed algorithm. The computer simulations with results and examples are given to analyze the efficiency of the proposed approach. Further, security analysis and comparison with the prior techniques successfully supports the robustness and validation of the proposed technique

    Analysis of RMAC

    Full text link

    Polluting production – environmentally sound alternatives; A general model of production externalities

    Get PDF
    With the determination of principal parameters of producing and pollution abatement technologies, this paper quantifies abatement and external costs at the social optimum and analyses the dynamic relationship between technological development and the above-mentioned costs. With the partial analysis of parameters, the paper presents the impacts on the level of pollution and external costs of extensive and intensive environmental protection, market demand change and product fees, and not environmental protection oriented technological development. Parametrical cost calculation makes the drawing up of two useful rules of thumb possible in connection with the rate of government in-terventions. Also, the paradox of technological development aiming at intensive environmental protection will become apparent

    On the Complexity of Solving Quadratic Boolean Systems

    Full text link
    A fundamental problem in computer science is to find all the common zeroes of mm quadratic polynomials in nn unknowns over F2\mathbb{F}_2. The cryptanalysis of several modern ciphers reduces to this problem. Up to now, the best complexity bound was reached by an exhaustive search in 4log2n2n4\log_2 n\,2^n operations. We give an algorithm that reduces the problem to a combination of exhaustive search and sparse linear algebra. This algorithm has several variants depending on the method used for the linear algebra step. Under precise algebraic assumptions on the input system, we show that the deterministic variant of our algorithm has complexity bounded by O(20.841n)O(2^{0.841n}) when m=nm=n, while a probabilistic variant of the Las Vegas type has expected complexity O(20.792n)O(2^{0.792n}). Experiments on random systems show that the algebraic assumptions are satisfied with probability very close to~1. We also give a rough estimate for the actual threshold between our method and exhaustive search, which is as low as~200, and thus very relevant for cryptographic applications.Comment: 25 page
    corecore