117,818 research outputs found

    A new linear consistency test attack on noised irregularly clocked linear feedback shift registers

    Get PDF
    Linear Consistency Test (LCT) is a widely used algebraic attack against pseudorandom generator schemes. A system of linear equations depending on a guessed part of the key is assigned to the analyzed generator and checked for consistency. If the guessed part of the key is not the right one, the system will be inconsistent with high probability. In the presence of noise, additional measures are necessary for this attack to be successful. They must reduce the influence of intercepted output bits complemented by noise. In this paper, a technique is described that tries to guess which bit(s) of the intercepted output sequence are complemented by noise and remove all the equations from the linear system assigned to the generator that depend on those bits. The technique is demonstrated on cryptanalysis of a Binary Rate Multiplier (BRM). The experiments on this generator show that such an attack is feasible if the noise level is up to moderate

    Behavioural syndrome in a solitary predator is independent of body size and growth rate.

    Get PDF
    Models explaining behavioural syndromes often focus on state-dependency, linking behavioural variation to individual differences in other phenotypic features. Empirical studies are, however, rare. Here, we tested for a size and growth-dependent stable behavioural syndrome in the juvenile-stages of a solitary apex predator (pike, Esox lucius), shown as repeatable foraging behaviour across risk. Pike swimming activity, latency to prey attack, number of successful and unsuccessful prey attacks was measured during the presence/absence of visual contact with a competitor or predator. Foraging behaviour across risks was considered an appropriate indicator of boldness in this solitary predator where a trade-off between foraging behaviour and threat avoidance has been reported. Support was found for a behavioural syndrome, where the rank order differences in the foraging behaviour between individuals were maintained across time and risk situation. However, individual behaviour was independent of body size and growth in conditions of high food availability, showing no evidence to support the state-dependent personality hypothesis. The importance of a combination of spatial and temporal environmental variation for generating growth differences is highlighted

    Algebraic Attack on the Alternating Step(r,s)Generator

    Full text link
    The Alternating Step(r,s) Generator, ASG(r,s), is a clock-controlled sequence generator which is recently proposed by A. Kanso. It consists of three registers of length l, m and n bits. The first register controls the clocking of the two others. The two other registers are clocked r times (or not clocked) (resp. s times or not clocked) depending on the clock-control bit in the first register. The special case r=s=1 is the original and well known Alternating Step Generator. Kanso claims there is no efficient attack against the ASG(r,s) since r and s are kept secret. In this paper, we present an Alternating Step Generator, ASG, model for the ASG(r,s) and also we present a new and efficient algebraic attack on ASG(r,s) using 3(m+n) bits of the output sequence to find the secret key with O((m^2+n^2)*2^{l+1}+ (2^{m-1})*m^3 + (2^{n-1})*n^3) computational complexity. We show that this system is no more secure than the original ASG, in contrast to the claim of the ASG(r,s)'s constructor.Comment: 5 pages, 2 figures, 2 tables, 2010 IEEE International Symposium on Information Theory (ISIT2010),June 13-18, 2010, Austin, Texa
    • …
    corecore