49 research outputs found

    Parallel Fast Walsh Transform Algorithm and Its Implementation with CUDA on GPUs

    Get PDF
    Some of the most important cryptographic characteristics of the Boolean and vector Boolean functions (nonlinearity, autocorrelation, differential uniformity) are connected with the Walsh spectrum. In this paper, we present several algorithms for computing the Walsh spectrum implemented in CUDA for parallel execution on GPU. They are based on the most popular sequential algorithm. The algorithms differ in the complexity of implementations, resources used, optimization strategies and techniques. In the end, we give some experimental results

    Wireless network security and cracking security key

    Get PDF
    Wireless technology gives us mobility easy access to the computer network without copper wires. With the increased use of wireless technology, more and more Wi-Fi hotspots, rising number of cell phones, PDAs, Tablet PC, laptops (devices with Wi-Fi module), wireless security is an ever increasing issue for many organizations. In other words wireless networks add another entry point into a network for hackers. Because this technology is relatively new there is many security vulnerabilities. In this paper, we study security on the wireless network and its vulnerability, also we give examples of how hackers can crack security key, explode vulnerabilities and attack the wireless network. We consider the weak points of these networks in order to suggest ways and methods to ensure a good protection

    Bijective S-boxes of different sizes obtained from quasi-cyclic codes

    Get PDF
    The aim of this paper is to construct S-boxes of different sizes with good cryptographic properties. An algebraic construction for bijective S-boxes is described. It uses quasi-cyclic representations of the binary simplex code. Good S-boxes of sizes 4, 6, 8, 9, 10, 11, 12, 14, 15, 16 and 18 are obtained

    Applications of the binary representation of integers in algorithms for boolean functions

    Get PDF
    In this note we describe two transformations of boolean functions based on the binary representation of the nonnegative integers. We present corresponding algorithms which are very important in cryptology

    Use of Educational Hardware and Software to Encourage Children to Code

    Get PDF
    Primary and secondary computer education nowadays requires modern aids to be included throughout the educational process. The purpose of these aids is to encourage children to code, to be more interactive, and to express their creativity. A new class of computing devices, called Single Board Computers (SBC) are tools that can help achieve the modern educational requirements as critical thinking, problem solving, creativity, interaction etc. The main idea here is to present a short survey of educational programmable hardware systems. In our case study, we want to point out the benefits of SBC and their impact on the education process

    BooLSPLG: A Library with Parallel Algorithms for Boolean Functions and S-Boxes for GPU

    Get PDF
    In this paper, we present a library with sequential and parallel functions for computing some of the most important cryptographic characteristics of Boolean and vectorial Boolean functions. The library implements algorithms to calculate the nonlinearity, algebraic degree, autocorrelation, differential uniformity and related tables of vectorial Boolean functions. For the sake of completeness, we provide the mathematical basis of these algorithms. Furthermore, we compare the performance of the parallel functions from the developed software with the corresponding sequential functions and with analogous functions from the well-known SageMath and SET packages. Functions from BooLSPLG can be used to develop efficient algorithms for constructing Boolean and vectorial Boolean functions with good cryptographic properties. The parallel part of the library is implemented using a CUDA parallel programming model for recent NVIDIA GPU architectures. BooLSPLG is an open-source software library written in CUDA C/C++ with explicit documentation, test examples, and detailed input and output descriptions of all functions, both sequential and parallel, and it is available online

    A prototype system for monitoring the deformation and stability of different type of critical constructions

    Get PDF
    In this paper, we present a system prototype for monitoring the deformation and stability of different types of critical constructions. This system can be applied in order to achieve a higher level of risk management and safer working conditions. The system can have a wide application, for example it can be used as a real-time system for detecting deformations of mining construction or other types of critical construction areas. The main component of this system contains a Laser distance measurement module and single-board computers (SBCs) Raspberry Pi. This system can be integrated as a module in an already pre-existing monitoring system or as a stand-alone system. Here the basic functionality of the system platform and what can be done to improve monitoring process will be presented

    Application of Quasigroups in Cryptography and Data Communications

    Get PDF
    In the past decade, quasigroup theory has proven to be a fruitfull field for production of new cryptographic primitives and error-corecting codes. Examples include several finalists in the flagship competitions for new symmetric ciphers, as well as several assimetric proposals and cryptcodes. Since the importance of cryptography and coding theory for secure and reliable data communication can only grow within our modern society, investigating further the power of quasigroups in these fields is highly promising research direction. Our team of researchers has defined several research objectives, which can be devided into four main groups: 1. Design of new cryptosystems or their building blocks based on quasigroups - we plan to make a classification of small quasigroups based on new criteria, as well as to identify new optimal 8–bit S-boxes produced by small quasigroups. The results will be used to design new stream and block ciphers. 2. Cryptanalysis of some cryptosystems based on quasigroups - we will modify and improve the existing automated tools for differential cryptanalysis, so that they can be used for prove the resistance to differential cryptanalysis of several existing ciphers based on quasigroups. This will increase the confidence in these ciphers. 3. Codes based on quasigroups - we will designs new and improve the existing error correcting codes based on combinatorial structures and quasigroups. 4. Algebraic curves over finite fields with their cryptographic applications - using some known and new tools, we will investigate the rational points on algebraic curves over finite fields, and explore the possibilities of applying the results in cryptography

    Usage based insurance

    Get PDF
    There is a need to shift into more customer-centric model, as more insurance companies light up telematics technology. Imagine being able to predict an incident before it happens. Merging data analytics together with driver behavior is a game changing reality companies are just beginning to realize the benefits of. If actuaries can see patterns and trends, that’s where the magic begins to happen

    Increasing efficiency of on-line shopping by optimizing the staff schedule

    Get PDF
    Problem proposed by: COOP Drive (online food shopping service provided by COOP Liguria), http://www.e-COOP.it/virtualShop/. The customers are making an online purchase and choose a time range for pick up. Making optimal staff scheduling such that each employee has ‘constant’ working hours, satisfying customers and employees in the same time. Constraints: Each employee can work at most 6 days a week. Each employee can work maximum 8 hours a day. Each employee needs to work continuous hours
    corecore