129 research outputs found
Practical consequences of the aberration of narrow-pipe hash designs from ideal random functions
In a recent note to the NIST hash-forum list, the following
observation was presented: narrow-pipe hash functions differ
significantly from ideal random functions that map bit strings from a big domain where $N=n+m,\
m\geq nn=256n=512\{0,1\}^{N}Y=\{0,1\}^ny \in YPr\{H^{-1}(y) = \varnothing\} \approx e^{-2^{m}} \approx 0H^{-1}(y) \subseteq \{0,1\}^{N}H^{-1}(y) = \{x \ |\ H(x)=y
\}YNY_\varnothing \subseteq Y|Y_\varnothing|\approx e^{-1}|Y|\approx 0.36 |Y|y \in Y_\varnothing,\ H^{-1}(y) = \varnothing$.
In this paper we extend the same finding to SHA-2 and show
consequences of this abberation when narrow-pipe hash functions are
employed in HMAC and in two widely used protocols: 1. The
pseudo-random function defined in SSL/TLS 1.2 and 2. The
Password-based Key Derivation Function No.1, i.e. PBKDF1
More Rounds, Less Security?
This paper focuses on a surprising class of cryptanalysis results for symmetric-key primitives: when the number of rounds of the primitive is increased, the complexity of the cryptanalysis result decreases. Our primary target will be primitives that consist of identical round functions, such as PBKDF1, the Unix password hashing algorithm, and the Chaskey MAC function. However, some of our results also apply to constructions with non-identical rounds, such as the PRIDE block cipher. First, we construct distinguishers for which the data complexity decreases when the number of rounds is increased. They are based on two well-known observations: iterating a random permutation increases the expected number of fixed points, and iterating a random function decreases the expected number of image points. We explain that these effects also apply to components of cryptographic primitives, such as a round of a block cipher. Second, we introduce a class of key-recovery and preimage-finding techniques that correspond to exhaustive search, however on a smaller part (e.g. one round) of the primitive. As the time complexity of a cryptanalysis result is usually measured by the number of full-round evaluations of the primitive, increasing the number of rounds will lower the time complexity. None of the observations in this paper result in more than a small speed-up over exhaustive search. Therefore, for lightweight applications, implementation advantages may outweigh the presence of these observations
More Rounds, Less Security?
This paper focuses on a surprising class of cryptanalysis results for symmetric-key primitives: when the number of rounds of the primitive is increased, the complexity of the cryptanalysis result decreases. Our primary target will be primitives that consist of identical round functions, such as PBKDF1, the Unix password hashing algorithm, and the Chaskey MAC function. However, some of our results also apply to constructions with non-identical rounds, such as the PRIDE block cipher. First, we construct distinguishers for which the data complexity decreases when the number of rounds is increased. They are based on two well-known observations: iterating a random permutation increases the expected number of fixed points, and iterating a random function decreases the expected number of image points. We explain that these effects also apply to components of cryptographic primitives, such as a round of a block cipher. Second, we introduce a class of key-recovery and preimage-finding techniques that correspond to exhaustive search, however on a smaller part (e.g. one round) of the primitive. As the time complexity of a cryptanalysis result is usually measured by the number of full-round evaluations of the primitive, increasing the number of rounds will lower the time complexity. None of the observations in this paper result in more than a small speed-up over exhaustive search. Therefore, for lightweight applications, implementation advantages may outweigh the presence of these observations
Designing sound : procedural audio research based on the book by Andy Farnell
In
procedural
media,
data
normally
acquired
by
measuring
something,
commonly
described
as
sampling,
is
replaced
by
a
set
of
computational
rules
(procedure)
that
defines
the
typical
structure
and/or
behaviour
of
that
thing.
Here,
a
general
approach
to
sound
as
a
definable
process,
rather
than
a
recording,
is
developed.
By
analysis
of
their
physical
and
perceptual
qualities,
natural
objects
or
processes
that
produce
sound
are
modelled
by
digital
Sounding
Objects
for
use
in
arts
and
entertainments.
This
Thesis
discusses
different
aspects
of
Procedural
Audio
introducing
several
new
approaches
and
solutions
to
this
emerging
field
of
Sound
Design.Em
Media
Procedimental,
os
dados
os
dados
normalmente
adquiridos
através
da
medição
de
algo
habitualmente
designado
como
amostragem,
são
substituídos
por
um
conjunto
de
regras
computacionais
(procedimento)
que
definem
a
estrutura
típica,
ou
comportamento,
desse
elemento.
Neste
caso
é
desenvolvida
uma
abordagem
ao
som
definível
como
um
procedimento
em
vez
de
uma
gravação.
Através
da
análise
das
suas
características
físicas
e
perceptuais
,
objetos
naturais
ou
processos
que
produzem
som,
são
modelados
como
objetos
sonoros
digitais
para
utilização
nas
Artes
e
Entretenimento.
Nesta
Tese
são
discutidos
diferentes
aspectos
de
Áudio
Procedimental,
sendo
introduzidas
várias
novas
abordagens
e
soluções
para
o
campo
emergente
do
Design
Sonoro
Introductory Computer Forensics
INTERPOL (International Police) built cybercrime programs to keep up with emerging cyber threats, and aims to coordinate and assist international operations for ?ghting crimes involving computers. Although signi?cant international efforts are being made in dealing with cybercrime and cyber-terrorism, ?nding effective, cooperative, and collaborative ways to deal with complicated cases that span multiple jurisdictions has proven dif?cult in practic
The 1982 NASA/ASEE Summer Faculty Fellowship Program
A NASA/ASEE Summer Faculty Fellowship Research Program was conducted to further the professional knowledge of qualified engineering and science faculty members, to stimulate an exchange of ideas between participants and NASA, to enrich and refresh the research and teaching activities of participants' institutions, and to contribute to the research objectives of the NASA Centers
Advances in Computer Recognition, Image Processing and Communications, Selected Papers from CORES 2021 and IP&C 2021
As almost all human activities have been moved online due to the pandemic, novel robust and efficient approaches and further research have been in higher demand in the field of computer science and telecommunication. Therefore, this (reprint) book contains 13 high-quality papers presenting advancements in theoretical and practical aspects of computer recognition, pattern recognition, image processing and machine learning (shallow and deep), including, in particular, novel implementations of these techniques in the areas of modern telecommunications and cybersecurity
Social work with airports passengers
Social work at the airport is in to offer to passengers social services. The main
methodological position is that people are under stress, which characterized by a
particular set of characteristics in appearance and behavior. In such circumstances
passenger attracts in his actions some attention. Only person whom he trusts can help him
with the documents or psychologically
Energy, a continuing bibliography with indexes. Issue 33
This bibliography lists 1211 reports, articles, and other documents introduced into the NASA scientific and technical information system from January 1, 1981 through March 31, 1981
- …