2,143 research outputs found

    Multidimensional Zero-Correlation Linear Cryptanalysis of the Block Cipher KASUMI

    Full text link
    The block cipher KASUMI is widely used for security in many synchronous wireless standards. It was proposed by ETSI SAGE for usage in 3GPP (3rd Generation Partnership Project) ciphering algorthms in 2001. There are a great deal of cryptanalytic results on KASUMI, however, its security evaluation against the recent zero-correlation linear attacks is still lacking so far. In this paper, we select some special input masks to refine the general 5-round zero-correlation linear approximations combining with some observations on the FLFL functions and then propose the 6-round zero-correlation linear attack on KASUMI. Moreover, zero-correlation linear attacks on the last 7-round KASUMI are also introduced under some weak keys conditions. These weak keys take 2−142^{-14} of the whole key space. The new zero-correlation linear attack on the 6-round needs about 2852^{85} encryptions with 262.82^{62.8} known plaintexts. For the attack under weak keys conditions on the last 7 round, the data complexity is about 262.12^{62.1} known plaintexts and the time complexity 2110.52^{110.5} encryptions

    Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: Improved cryptanalysis of an ISO standard

    Get PDF
    AbstractHIGHT is a block cipher designed in Korea with the involvement of Korea Information Security Agency. It was proposed at CHES 2006 for usage in lightweight applications such as sensor networks and RFID tags. Lately, it has been adopted as ISO standard. Though there is a great deal of cryptanalytic results on HIGHT, its security evaluation against the recent zero-correlation linear attacks is still lacking. At the same time, the Feistel-type structure of HIGHT suggests that it might be susceptible to this type of cryptanalysis. In this paper, we aim to bridge this gap.We identify zero-correlation linear approximations over 16 rounds of HIGHT. Based upon those, we attack 27-round HIGHT (round 4 to round 30) with improved time complexity and practical memory requirements. This attack of ours is the best result on HIGHT to date in the classical single-key setting. We also provide the first attack on 26-round HIGHT (round 4 to round 29) with the full whitening key

    Preliminary design study of a lateral-directional control system using thrust vectoring

    Get PDF
    A preliminary design of a lateral-directional control system for a fighter airplane capable of controlled operation at extreme angles of attack is developed. The subject airplane is representative of a modern twin-engine high-performance jet fighter, is equipped with ailerons, rudder, and independent horizontal-tail surfaces. Idealized bidirectional thrust-vectoring engine nozzles are appended to the mathematic model of the airplane to provide additional control moments. Optimal schedules for lateral and directional pseudo control variables are calculated. Use of pseudo controls results in coordinated operation of the aerodynamic and thrust-vectoring controls with minimum coupling between the lateral and directional airplane dynamics. Linear quadratic regulator designs are used to specify a preliminary flight control system to improve the stability and response characteristics of the airplane. Simulated responses to step pilot control inputs are stable and well behaved. For lateral stick deflections, peak stability axis roll rates are between 1.25 and 1.60 rad/sec over an angle-of-attack range of 10 deg to 70 deg. For rudder pedal deflections, the roll rates accompanying the sideslip responses can be arrested by small lateral stick motions

    Wind tunnel evaluation of YF-12 inlet response to internal airflow disturbances with and without control

    Get PDF
    The response of terminal-shock position and static pressures in the subsonic duct of a YF-12 aircraft flight-hardware inlet to perturbations in simulated engine corrected airflow were obtained with and without inlet control. Frequency response data, obtained with inlet controls inactive, indicated the general nature of the inherent inlet dynamics, assisted in the design of controls, and provided a baseline reference for responses with active controls. All the control laws were implemented by means of a digital computer that could be programmed to behave like the flight inlet's existing analog control. The experimental controls were designed using an analytical optimization technique. The capabilities of the controls were limited primarily by the actuation hardware. The experimental controls provided somewhat better attenuation of terminal shock excursions than did the YF-13 inlet control. Controls using both the forward and aft bypass systems also provided somewhat better attenuation than those using just the forward bypass. The main advantage of using both bypasses is in the greater control flexibility that is achieved

    Extended Generalized Feistel Networks using Matrix Representation

    Get PDF
    International audienceWhile Generalized Feistel Networks have been widely studied in the literature as a building block of a block cipher, we propose in this paper a unified vision to easily represent them through a matrix representation. We then propose a new class of such schemes called Extended Generalized Feistel Networks well suited for cryptographic applications. We instantiate those proposals into two particular constructions and we finally analyze their security

    Propulsion system-flight control integration and optimization: Flight evaluation and technology transition

    Get PDF
    Integration of propulsion and flight control systems and their optimization offers significant performance improvements. Research programs were conducted which have developed new propulsion and flight control integration concepts, implemented designs on high-performance airplanes, demonstrated these designs in flight, and measured the performance improvements. These programs, first on the YF-12 airplane, and later on the F-15, demonstrated increased thrust, reduced fuel consumption, increased engine life, and improved airplane performance; with improvements in the 5 to 10 percent range achieved with integration and with no changes to hardware. The design, software and hardware developments, and testing requirements were shown to be practical

    Survey on Lightweight Primitives and Protocols for RFID in Wireless Sensor Networks

    Get PDF
    The use of radio frequency identification (RFID) technologies is becoming widespread in all kind of wireless network-based applications. As expected, applications based on sensor networks, ad-hoc or mobile ad hoc networks (MANETs) can be highly benefited from the adoption of RFID solutions. There is a strong need to employ lightweight cryptographic primitives for many security applications because of the tight cost and constrained resource requirement of sensor based networks. This paper mainly focuses on the security analysis of lightweight protocols and algorithms proposed for the security of RFID systems. A large number of research solutions have been proposed to implement lightweight cryptographic primitives and protocols in sensor and RFID integration based resource constraint networks. In this work, an overview of the currently discussed lightweight primitives and their attributes has been done. These primitives and protocols have been compared based on gate equivalents (GEs), power, technology, strengths, weaknesses and attacks. Further, an integration of primitives and protocols is compared with the possibilities of their applications in practical scenarios

    An overview of memristive cryptography

    Full text link
    Smaller, smarter and faster edge devices in the Internet of things era demands secure data analysis and transmission under resource constraints of hardware architecture. Lightweight cryptography on edge hardware is an emerging topic that is essential to ensure data security in near-sensor computing systems such as mobiles, drones, smart cameras, and wearables. In this article, the current state of memristive cryptography is placed in the context of lightweight hardware cryptography. The paper provides a brief overview of the traditional hardware lightweight cryptography and cryptanalysis approaches. The contrast for memristive cryptography with respect to traditional approaches is evident through this article, and need to develop a more concrete approach to developing memristive cryptanalysis to test memristive cryptographic approaches is highlighted.Comment: European Physical Journal: Special Topics, Special Issue on "Memristor-based systems: Nonlinearity, dynamics and applicatio
    • …
    corecore