• Title/Summary/Keyword: permutation method

Search Result 115, Processing Time 0.026 seconds

A Link Between Integrals and Higher-Order Integrals of SPN Ciphers

  • Li, Ruilin;Sun, Bing;Li, Chao
    • ETRI Journal
    • /
    • v.35 no.1
    • /
    • pp.131-141
    • /
    • 2013
  • Integral cryptanalysis, which is based on the existence of (higher-order) integral distinguishers, is a powerful cryptographic method that can be used to evaluate the security of modern block ciphers. In this paper, we focus on substitution-permutation network (SPN) ciphers and propose a criterion to characterize how an r-round integral distinguisher can be extended to an (r+1)-round higher-order integral distinguisher. This criterion, which builds a link between integrals and higher-order integrals of SPN ciphers, is in fact based on the theory of direct decomposition of a linear space defined by the linear mapping of the cipher. It can be directly utilized to unify the procedure for finding 4-round higher-order integral distinguishers of AES and ARIA and can be further extended to analyze higher-order integral distinguishers of various block cipher structures. We hope that the criterion presented in this paper will benefit the cryptanalysts and may thus lead to better cryptanalytic results.

Secure Block Cipher Algorithm for DC and LC (DC와 LC에 안전한 SPN 구조 암호 알고리즘)

  • Choe, Eun-Hwa;Seo, Chang-Ho;Seong, Su-Hak;Ryu, Hui-Su;Jeon, Gil-Su
    • The KIPS Transactions:PartC
    • /
    • v.9C no.4
    • /
    • pp.445-452
    • /
    • 2002
  • In this paper, we suggest the design of 128bit block cipher which is provable security based on mathematics theory. We have derived the 16$\times$16 matrix(i.e.,linear transformation) which is numerous active S-box, and we proved for DC and LC which prove method about security of SPN structure cipher algorithm. Also, the minimum number of active S-box, the maximum differential probabilities and the maximum linear probabilities in round function of 128bit block cipher algorithm which has an effect to DC and LC are derived.

A Study on the Expression of Optical lIIusion in Textile Design (텍스타일 디자인에 있어서 옵 . 아트의 착시표현 연구)

  • 이혜주;채지영
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.19 no.2
    • /
    • pp.190-202
    • /
    • 1995
  • The Optical Art is based on the principle of visual perception of the illusionary effects which induce psychological responses. It has influenced greatly on the Texile Design in that unique iJlusionary creativity of pattern simulates the visual sense of special movement; the dynamic psylosophy of vitalism. The Optical pattern has become a highly valued item due to its innovative effect in aesthetic direction. According to Vitor Vasarely the pioneer in this area, the integration and the inseparability of form and color which he calls 'Plastic Unity' provides the basis for the composition of infinite variety. The composition of infinite variety. The composition reveals the complex interaction between the space and form relating to order, repetition, combination and permutation. It is not simple to create optical patterns due to the extreme complexity composed by the multi-dimension and the infusion of form and color giving immensely varied movement. The purposes of this study are as follows; 1) to classify the complex processes of optical pattern on the basis of formative method. 2) to develop creative ideas for progressive contemporary textile design In this study, the analysis of applied methods is concentrated, which is based 1) on the gradual modification and on the transformation of the basic plastic elements which depend on thle direction of visual points involVing contradictory perspectives 2) on the composition varied special situations by repeating, overlapping and converging a series of idetUical units or by means of irrdiation, radiation and etc.

  • PDF

Design and Implementation of 3DES crypto-algorithm with Pipeline Architecture (파이프라인 구조의 3DES 암호알고리즘의 설계 및 구현)

  • Lee Wan-Bok;Kim Jung-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.2
    • /
    • pp.333-337
    • /
    • 2006
  • Symmetric block ciper algorithm consists of a chains of operations such as permutation and substitution. There exists four kinds of operation mode, CBC, ECB, CFB, and OFB depending on the operation paradigm. Since the final ciper text is obtained through the many rounds of operations, it consumes much time. This paper proposes a pipelined design methodology which can improve the speed of crypto operations in ECB mode. Because the operations of the many rounds are concatenated in serial and executed concurrently, the overall computation time can be reduced significantly. The experimental result shows that the method can speed up the performance more than ten times.

The Study of Historical Analysis and Educational Extension on Derangement (교란순열에 대한 역사적 탐색과 교육적 확장에 대한 연구)

  • Suh, Bo Euk
    • Journal for History of Mathematics
    • /
    • v.32 no.2
    • /
    • pp.61-77
    • /
    • 2019
  • The study was conducted based on the 'method of mathematical exploration through history'. In recent school education, 'Probability and Statistics' education has been emphasized, and as a result, the study has conducted a study on permutations. Permutation is used in a variety of fields, and in this study, we looked at the Derangement. The results of this study are as follows. First, analysis was made at current school mathematics level and academic mathematics level for Derangement. Second, the historical development process of derangement was examined. Third, based on this, the research direction of this study was decided to be 'Derangement number's triangle(Rencontres number's triangle)', and the inquiry for education expansion was carried out. Fourth, we have presented data on concrete educational expansion by discovering various mathematical facts of the Derangement number's triangle. We hope that the results of this study will provide meaningful implications for the application of mathematics and the presentation of new inquiry directions.

CacheSCDefender: VMM-based Comprehensive Framework against Cache-based Side-channel Attacks

  • Yang, Chao;Guo, Yunfei;Hu, Hongchao;Liu, Wenyan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.6098-6122
    • /
    • 2018
  • Cache-based side-channel attacks have achieved more attention along with the development of cloud computing technologies. However, current host-based mitigation methods either provide bad compatibility with current cloud infrastructure, or turn out too application-specific. Besides, they are defending blindly without any knowledge of on-going attacks. In this work, we present CacheSCDefender, a framework that provides a (Virtual Machine Monitor) VMM-based comprehensive defense framework against all levels of cache attacks. In designing CacheSCDefender, we make three key contributions: (1) an attack-aware framework combining our novel dynamic remapping and traditional cache cleansing, which provides a comprehensive defense against all three cases of cache attacks that we identify in this paper; (2) a new defense method called dynamic remapping which is a developed version of random permutation and is able to deal with two cases of cache attacks; (3) formalization and quantification of security improvement and performance overhead of our defense, which can be applicable to other defense methods. We show that CacheSCDefender is practical for deployment in normal virtualized environment, while providing favorable security guarantee for virtual machines.

On the Security of Rijndael-like Structures against Differential and Linear Cryptanalysis (Rijndael 유사 구조의 차분 공격과 선형 공격에 대한 안전성에 관한 연구)

  • 박상우;성수학;지성택;윤이중;임종인
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.5
    • /
    • pp.3-14
    • /
    • 2002
  • Rijndael-like structure is the special case of SPN structure. The linear transformation of Rijndael-like structure consisits of linear transformations of two types, the one is byte permutation $\pi$ and the other is linear tranformation $\theta$= ($\theta_1, \theta_2, \theta_3, \theta_4$), where each of $\theta_i$ separately operates on each of the four rows of a state. The block cipher, Rijndael is an example of Rijndael-like structures. In this paper. we present a new method for upper bounding the maximum differential probability and the maximum linear hull probability for Rijndael-like structures.

Shipyard Skid Sequence Optimization Using a Hybrid Genetic Algorithm

  • Min-Jae Choi;Yung-Keun Kwon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.12
    • /
    • pp.79-87
    • /
    • 2023
  • In this paper, we propose a novel genetic algorithm to reduce the overall span time by optimizing the skid insertion sequence in the shipyard subassembly process. We represented a solution by a permutation of a set of skid ids and applied genetic operators suitable for such a representation. In addition, we combined the genetic algorithm and the existing heuristic algorithm called UniDev which is properly modified to improve the search performance. In particular, the slow skid search part in UniDev was changed to a greedy algorithm. Through extensive large-scaled simulations, it was observed that the span time of our method was stably minimized compared to Multi-Start search and a genetic algorithm combined with UniDev.

Detection of major genotypes combination by genotype matrix mapping (유전자 행렬 맵핑을 활용한 우수 유전자형 조합 선별)

  • Lee, Jea-Young;Lee, Jong-Hyeong;Lee, Yong-Won
    • Journal of the Korean Data and Information Science Society
    • /
    • v.21 no.3
    • /
    • pp.387-395
    • /
    • 2010
  • It is important to identify the interaction of genes about human disease and characteristic value. Many studies as like logistic analysis, have associated being pursued, but, previous methods did not consider the sub-group of the genotypes. So, QTL interactions and the GMM (genotype matrix mapping) have been developed. In this study, we detect the superior genotype combination to have an impact on economic traits of Korean cattle based on the study over GMM method. Thus, we identified interaction effects of single nucleotide polymorphisms (SNPs) responsible for average daily gain(ADG), marbling score (MS), carcass cold weight (CWT), longissimus muscle dorsiarea (LMA) using GMM method. In addition, we examine significance of the major genotype combination selected by implementing permutation test of the F-measure which was not obtained by Sachiko et al.

Identification of Stearoyl-CoA Desaturase (SCD) Gene Interactions in Korean Native Cattle Based on the Multifactor-dimensionality Reduction Method

  • Oh, Dong-Yep;Jin, Me-Hyun;Lee, Yoon-Seok;Ha, Jae-Jung;Kim, Byung-Ki;Yeo, Jung-Sou;Lee, Jea-Young
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.26 no.9
    • /
    • pp.1218-1228
    • /
    • 2013
  • Fat quality is determined by the composition of fatty acids. Genetic relationships between this composition and single nucleotide polymorphisms (SNPs) in the stearoyl-CoA desaturase1 (SCD1) gene were examined using 513 Korean native cattle. Single and epistatic effects of 7 SNP genetic variations were investigated, and the multifactor dimensionality reduction (MDR) method was used to investigate gene interactions in terms of oleic acid (C18:1), mono-unsaturated fatty acids (MUFAs) and marbling score (MS). The g.6850+77 A>G and g.14047 C>T SNP interactions were identified as the statistically optimal combination (C18:1, MUFAs and MS permutation p-values were 0.000, 0.000 and 0.001 respectively) of two-way gene interactions. The interaction effects of g.6850+77 A>G, g.10213 T>C and g.14047 C>T reflected the highest training-balanced accuracy (63.76%, 64.70% and 61.85% respectively) and was better than the individual effects for C18:1, MUFAs and MS. In addition, the superior genotype groups were AATTCC, AGTTCC, GGTCCC, AGTCCT, GGCCCT and AGCCTT. These results suggest that the selected SNP combination of the SCD1 gene and superior genotype groups can provide useful inferences for the improvement of the fatty acid composition in Korean native cattle.