117,850 research outputs found
A new linear consistency test attack on noised irregularly clocked linear feedback shift registers
Linear Consistency Test (LCT) is a widely used algebraic attack against pseudorandom generator schemes. A system of linear equations depending on a guessed part of the key is assigned to the analyzed generator and checked for consistency. If the guessed part of the key is not the right one, the system will be inconsistent with high probability. In the presence of noise, additional measures are necessary for this attack to be successful. They must reduce the influence of intercepted output bits complemented by noise. In this paper, a technique is described that tries to guess which bit(s) of the intercepted output sequence are complemented by noise and remove all the equations from the linear system assigned to the generator that depend on those bits. The technique is demonstrated on cryptanalysis of a Binary Rate Multiplier (BRM). The experiments on this generator show that such an attack is feasible if the noise level is up to moderate
Behavioural syndrome in a solitary predator is independent of body size and growth rate.
Models explaining behavioural syndromes often focus on state-dependency, linking behavioural variation to individual differences in other phenotypic features. Empirical studies are, however, rare. Here, we tested for a size and growth-dependent stable behavioural syndrome in the juvenile-stages of a solitary apex predator (pike, Esox lucius), shown as repeatable foraging behaviour across risk. Pike swimming activity, latency to prey attack, number of successful and unsuccessful prey attacks was measured during the presence/absence of visual contact with a competitor or predator. Foraging behaviour across risks was considered an appropriate indicator of boldness in this solitary predator where a trade-off between foraging behaviour and threat avoidance has been reported. Support was found for a behavioural syndrome, where the rank order differences in the foraging behaviour between individuals were maintained across time and risk situation. However, individual behaviour was independent of body size and growth in conditions of high food availability, showing no evidence to support the state-dependent personality hypothesis. The importance of a combination of spatial and temporal environmental variation for generating growth differences is highlighted
Recommended from our members
Securing state reconstruction under sensor and actuator attacks: Theory and design
This paper discusses the problem of reconstructing the state of a linear time invariant system when some of its actuators and sensors are compromised by an adversarial agent. In the model considered in this paper, the adversarial agent attacks an input (output) by manipulating its value arbitrarily, i.e., we impose no constraints (statistical or otherwise) on how control commands (sensor measurements) are changed by the adversary other than a bound on the number of attacked actuators and sensors In the first part of this paper, we introduce the notion of sparse strong observability and we show that is a necessary and sufficient condition for correctly reconstructing the state despite the considered attacks. In the second half of this work, we propose an observer to harness the complexity of this intrinsically combinatorial problem, by leveraging satisfiability modulo theory solving. Numerical simulations illustrate the effectiveness and scalability of our observer
Algebraic Attack on the Alternating Step(r,s)Generator
The Alternating Step(r,s) Generator, ASG(r,s), is a clock-controlled sequence
generator which is recently proposed by A. Kanso. It consists of three
registers of length l, m and n bits. The first register controls the clocking
of the two others. The two other registers are clocked r times (or not clocked)
(resp. s times or not clocked) depending on the clock-control bit in the first
register. The special case r=s=1 is the original and well known Alternating
Step Generator. Kanso claims there is no efficient attack against the ASG(r,s)
since r and s are kept secret. In this paper, we present an Alternating Step
Generator, ASG, model for the ASG(r,s) and also we present a new and efficient
algebraic attack on ASG(r,s) using 3(m+n) bits of the output sequence to find
the secret key with O((m^2+n^2)*2^{l+1}+ (2^{m-1})*m^3 + (2^{n-1})*n^3)
computational complexity. We show that this system is no more secure than the
original ASG, in contrast to the claim of the ASG(r,s)'s constructor.Comment: 5 pages, 2 figures, 2 tables, 2010 IEEE International Symposium on
Information Theory (ISIT2010),June 13-18, 2010, Austin, Texa
- …