11,722 research outputs found

    Comparison analysis of stream cipher algorithms for digital communication

    Get PDF
    The broadcast nature of radio communication such as in the HF (High Frequency) spectrum exposes the transmitted information to unauthorized third parties. Confidentiality is ensured by employing cipher system. For bulk transmission of data, stream ciphers are ideal choices over block ciphers due to faster implementation speed and not introducing error propagation. The stream cipher algorithms evaluated are based on the linear feedback shift register (LFSR) with nonlinear combining function. By using a common key length and worst case conditions, the strength of several stream cipher algorithms are evaluated using statistical tests, correlation attack, linear complexity profile and nonstandard test. The best algorithm is the one that exceeds all of the tests

    A Simple Attack on Some Clock-Controlled Generators

    Get PDF
    We present a new approach to edit distance attacks on certain clock-controlled generators, which applies basic concepts of Graph Theory to simplify the search trees of the original attacks in such a way that only the most promising branches are analyzed. In particular, the proposed improvement is based on cut sets defined on some graphs so that certain shortest paths provide the edit distances. The strongest aspects of the proposal are that the obtained results from the attack are absolutely deterministic, and that many inconsistent initial states of the target registers are recognized beforehand and avoided during search

    Diffusion processes in thin tubes and their limits on graphs

    Full text link
    The present paper is concerned with diffusion processes running on tubular domains with conditions on nonreaching the boundary, respectively, reflecting at the boundary, and corresponding processes in the limit where the thin tubular domains are shrinking to graphs. The methods we use are probabilistic ones. For shrinking, we use big potentials, respectively, reflection on the boundary of tubes. We show that there exists a unique limit process, and we characterize the limit process by a second-order differential generator acting on functions defined on the limit graph, with Kirchhoff boundary conditions at the vertices.Comment: Published in at http://dx.doi.org/10.1214/11-AOP667 the Annals of Probability (http://www.imstat.org/aop/) by the Institute of Mathematical Statistics (http://www.imstat.org

    Maximum Principles for Null Hypersurfaces and Null Splitting Theorems

    Full text link
    A maximum principle for C^0 null hypersurfaces is obtained and used to derive a splitting theorem for spacetimes which contain null lines. As a consequence of this null splitting theorem, it is proved that an asymptotically simple vacuum (Ricci flat) spacetime which contains a null line is isometric to Minkowski space.Comment: 26 pages, latex2
    corecore