11,722 research outputs found
Comparison analysis of stream cipher algorithms for digital communication
The broadcast nature of radio communication such as in the HF (High Frequency) spectrum exposes the transmitted information to unauthorized third parties. Confidentiality is ensured by employing cipher system. For bulk transmission of data, stream ciphers are ideal choices over block ciphers due to faster implementation speed and not introducing error propagation. The stream cipher algorithms evaluated are based on the linear feedback shift register (LFSR) with nonlinear combining function. By using a common key length and worst case conditions, the strength of several stream cipher algorithms are evaluated using statistical tests, correlation attack, linear complexity profile and nonstandard test. The best algorithm is the one that exceeds all of the tests
A Simple Attack on Some Clock-Controlled Generators
We present a new approach to edit distance attacks on certain
clock-controlled generators, which applies basic concepts of Graph Theory to
simplify the search trees of the original attacks in such a way that only the
most promising branches are analyzed. In particular, the proposed improvement
is based on cut sets defined on some graphs so that certain shortest paths
provide the edit distances. The strongest aspects of the proposal are that the
obtained results from the attack are absolutely deterministic, and that many
inconsistent initial states of the target registers are recognized beforehand
and avoided during search
Diffusion processes in thin tubes and their limits on graphs
The present paper is concerned with diffusion processes running on tubular
domains with conditions on nonreaching the boundary, respectively, reflecting
at the boundary, and corresponding processes in the limit where the thin
tubular domains are shrinking to graphs. The methods we use are probabilistic
ones. For shrinking, we use big potentials, respectively, reflection on the
boundary of tubes. We show that there exists a unique limit process, and we
characterize the limit process by a second-order differential generator acting
on functions defined on the limit graph, with Kirchhoff boundary conditions at
the vertices.Comment: Published in at http://dx.doi.org/10.1214/11-AOP667 the Annals of
Probability (http://www.imstat.org/aop/) by the Institute of Mathematical
Statistics (http://www.imstat.org
Maximum Principles for Null Hypersurfaces and Null Splitting Theorems
A maximum principle for C^0 null hypersurfaces is obtained and used to derive
a splitting theorem for spacetimes which contain null lines. As a consequence
of this null splitting theorem, it is proved that an asymptotically simple
vacuum (Ricci flat) spacetime which contains a null line is isometric to
Minkowski space.Comment: 26 pages, latex2
- …