51 research outputs found

    Bitstream Modification of Trivium

    Get PDF
    In this paper we present a bitstream modification attack on the Trivium cipher, an international standard under ISO/IEC 29192-3. By changing the content of three LUTs in the bitstream, we reduce the non-linear state updating function of Trivium to a linear one. This makes it possible to recover the key from 288 keystream bits using at most 219.412^{19.41} operations. We also propose a countermeasure against bitstream modification attacks which obfuscates the bitstream using dummy and camouflaged LUTs which look legitimate to the attacker. We present an algorithm for injecting dummy LUTs directly into the bitstream without causing any performance or power penalty

    On the design of stream ciphers with Cellular Automata having radius = 2

    Get PDF
    Cellular Automata (CA) have recently evolved as a good cryptographic primitive. It plays an important role in the construction of new fast, efficient and secure stream ciphers. Several studies have been made on CA based stream ciphers and we observe that the cryptographic strength of a CA based stream cipher increases with the increase in the neighbourhood radii if appropriate CA rules are employed. The current work explores the cryptographic feasibility of 5-neighbourhood CA rules also referred to as pentavalent rules. A new CA based stream cipher, CARPenter, which uses pentavalent rules have been proposed. The cipher incorporates maximum length null-boundary linear CA and a non-linear CA along with a good non-linear mixing function. This is implemented in hardware as well as software and exhibits good cryptographic properties which makes the cipher resistant to almost all attacks on stream ciphers, but with the cost of additional computing requirements. This cipher uses 16 cycles for initialization, which is the least number of cycles when compared to other existing stream ciphers

    Student Outcomes in Traditional, Hybrid, and Online Courses in Community College Career and Technical Education Programs

    Get PDF
    The purpose of this quantitative study was to examine whether differences in student course outcomes as defined by final course grades existed between three content delivery methods in career and technical education courses: Traditional (face to face), hybrid, and online. Final course grades in career and technical education courses at one community college for the Fall 2011 through the Fall 2015 semesters were used in this study to compare the success of students in courses employing the three content delivery methods. The outcomes for male and female students and the outcomes for traditional and nontraditional students in career and technical education programs were compared as well. The method of delivery was found to have an impact. Withdrawal rates for career and technical education courses were also impacted by course delivery method. Seven research questions were included in this study, and the data was analyzed using one-sample chi-square tests for the seven research questions in the study. Results indicated that students had significantly higher student learning outcomes in traditional courses in career and technical education programs than in either hybrid or online courses. Withdrawal rates were higher for hybrid and online courses than traditional courses. Student gender and age were related to student final course outcomes with both male and female students more likely to earn transferable final course grades in traditional courses than in hybrid or online courses. Traditional age and nontraditional age students were also more likely to earn transferable final course grades in traditional courses than in hybrid or online courses. Nontraditional age students were significantly more likely than traditional age students to earn a transferable final course grade regardless of delivery method. Overall findings suggest that delivery method may impact student outcomes in career and technical education courses. The study is significant in that it provides insight into specific differences in student outcomes by the three different delivery methods currently used in higher education and may be used for comparison with other institutions’ student outcomes

    Security and Privacy for Modern Wireless Communication Systems

    Get PDF
    The aim of this reprint focuses on the latest protocol research, software/hardware development and implementation, and system architecture design in addressing emerging security and privacy issues for modern wireless communication networks. Relevant topics include, but are not limited to, the following: deep-learning-based security and privacy design; covert communications; information-theoretical foundations for advanced security and privacy techniques; lightweight cryptography for power constrained networks; physical layer key generation; prototypes and testbeds for security and privacy solutions; encryption and decryption algorithm for low-latency constrained networks; security protocols for modern wireless communication networks; network intrusion detection; physical layer design with security consideration; anonymity in data transmission; vulnerabilities in security and privacy in modern wireless communication networks; challenges of security and privacy in node–edge–cloud computation; security and privacy design for low-power wide-area IoT networks; security and privacy design for vehicle networks; security and privacy design for underwater communications networks
    • …
    corecore