84,543 research outputs found

    Bit-Based Division Property and Application to Simon Family

    Get PDF
    Ciphers that do not use S-boxes have been discussed for the demand on lightweight cryptosystems, and their round functions consist of and, rotation, and xor. Especially, the Simon family is one of the most famous ciphers, and there are many cryptanalyses again the Simon family. However, it is very difficult to guarantee the security because we cannot use useful techniques for S-box-based ciphers. Very recently, the division property, which is a new technique to find integral characteristics, was shown in Eurocrypt 2015. The technique is powerful for S-box-based ciphers, and it was used to break, for the first time, the full MISTY1 in CRYPTO 2015. However, it has not been applied to non-S-box-based ciphers like the Simon family effectively, and only the existence of the 10-round integral characteristic on Simon32 was proven. On the other hand, the experimental characteristic, which possibly does not work for all keys, covers 15 rounds, and there is a 5-round gap. To fill the gap, we introduce a bit-based division property, and we apply it to show that the experimental 15-round integral characteristic always works for all keys. Though the bit-based division property finds more accurate integral characteristics, it requires much time and memory complexity. As a result, we cannot apply it to symmetric-key ciphers whose block length is over 32. Therefore, we alternatively propose a method for designers. The method works for ciphers with large block length, and it shows ``provable security\u27\u27 against integral cryptanalyses using the division property. We apply this technique to the Simon family and show that Simon48, 64, 96, and 128 probably do not have 17-, 20-, 25-, and 29-round integral characteristics, respectively

    A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64

    Get PDF
    Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employed in the Internet of Things (IoT) applications. Therefore, this paper presents the security of the Simeck32/64 block cipher against side-channel cube attack. We exhibit our attack against Simeck32/64 using the Hamming weight leakage assumption to extract linearly independent equations in key bits. We have been able to find 32 linearly independent equations in 32 key variables by only considering the second bit from the LSB of the Hamming weight leakage of the internal state on the fourth round of the cipher. This enables our attack to improve previous attacks on Simeck32/64 within side-channel attack model with better time and data complexity of 2^35 and 2^11.29 respectively.Comment: 12 pages, 6 figures, 4 tables, International Journal of Computer Networks & Communication

    Prefix Codes for Power Laws with Countable Support

    Full text link
    In prefix coding over an infinite alphabet, methods that consider specific distributions generally consider those that decline more quickly than a power law (e.g., Golomb coding). Particular power-law distributions, however, model many random variables encountered in practice. For such random variables, compression performance is judged via estimates of expected bits per input symbol. This correspondence introduces a family of prefix codes with an eye towards near-optimal coding of known distributions. Compression performance is precisely estimated for well-known probability distributions using these codes and using previously known prefix codes. One application of these near-optimal codes is an improved representation of rational numbers.Comment: 5 pages, 2 tables, submitted to Transactions on Information Theor

    Computing with and without arbitrary large numbers

    Full text link
    In the study of random access machines (RAMs) it has been shown that the availability of an extra input integer, having no special properties other than being sufficiently large, is enough to reduce the computational complexity of some problems. However, this has only been shown so far for specific problems. We provide a characterization of the power of such extra inputs for general problems. To do so, we first correct a classical result by Simon and Szegedy (1992) as well as one by Simon (1981). In the former we show mistakes in the proof and correct these by an entirely new construction, with no great change to the results. In the latter, the original proof direction stands with only minor modifications, but the new results are far stronger than those of Simon (1981). In both cases, the new constructions provide the theoretical tools required to characterize the power of arbitrary large numbers.Comment: 12 pages (main text) + 30 pages (appendices), 1 figure. Extended abstract. The full paper was presented at TAMC 2013. (Reference given is for the paper version, as it appears in the proceedings.

    Spartan Daily, September 13, 2002

    Get PDF
    Volume 119, Issue 11https://scholarworks.sjsu.edu/spartandaily/10655/thumbnail.jp

    Spartan Daily, November 6, 2002

    Get PDF
    Volume 119, Issue 49https://scholarworks.sjsu.edu/spartandaily/10693/thumbnail.jp

    Modeling Routines and Organizational Learning. A Discussion of the State-of-the-Art

    Get PDF
    This paper presents a critical overview of some recent attempts at building formal models of organizations as information-processing and problem-solving entities. We distinguish between two classes of models according to the different objects of analysis. The first class includes models mainly addressing information processing and learning and analyzes the relations between the structure of information flows, learning patterns, and organizational performances. The second class focuses on the relationship between the division of cognitive labor and search processes in some problem-solving space, addressing more directly the notion of organizations as repositories of problem-solving knowledge. Here the objects of analysis are the problem-solving procedures which the organization embodies. The results begin to highlight important comparative properties regarding the impact on problem-solving efficiency and learning of different forms of hierarchical governance, the dangers of lock-in associated with specific forms of adaptive learning, the relative role of “online” vs. “offline” learning, the impact of the “cognitive maps” which organizations embody, the possible trade-offs between accuracy and speed of convergence associated with different “decomposition schemes”. We argue that these are important formal tools towards the development of a comparative institutional analysis addressing the distinct properties of different forms of organization and accumulation of knowledge.Division of labor, Mental models, Problem-solving, Problem decomposition.

    Shifting new media: from content to consultancy, from heterarchy to hierarchy

    Get PDF
    This is a detailed case history of one of London’s iconic new media companies, AMX Studios. Some of the changes in this firm, we assume, are not untypical for other firms in this sector. Particularly we want to draw attention to two transformations. The first change in AMX and in London’s new media industry more generally refers to the field of industrial relations. What can be observed is a shift from a rather heterarchical towards a more hierarchical organized new media industry, a shift from short-term project networks to long-term client dependency. The second change refers to new media products and services. We want to argue for a shift from cool content production towards consultancy and interactive communications solutions
    • 

    corecore