scholarly journals Complete SAT based Cryptanalysis of RC5 Cipher

2020 ◽  
Vol 44 (2) ◽  
pp. 365-382
Author(s):  
Artur Soboń ◽  
Miroslaw Kurkowski ◽  
Sylwia Stachowiak

Keeping the proper security level of ciphers used in communication networks is today a very important problem. Cryptanalysts ensure a constant need for improvement complexity and ciphers' security by trying to break them. Sometimes they do not instantly try to break the strongest version of the cipher, but they are looking for weaknesses by splitting it and independently checking all algorithm components. Often cryptanalysts also attempt to break cipher by using its weaker version or configuration. There are plenty of mechanisms and approaches to cryptanalysis to solve those challenges. One of them is SAT-based method, that uses logical encoding. In this article, we present our wide analysis and new experimental results of SAT-based, direct cryptanalysis of the RC5 cipher. To perform such actions on the given cipher, we initially create a propositional logical formula, that describes and represents the entire RC5 algorithm. The second step is to randomly generate key and plaintext. Then we determine the ciphertext. In the last step of our computations, we use SAT-solvers. They are particularly designed tools for checking the satisfiability of the Boolean formulas. In our research, we make cryptanalysis of RC5 cipher in the case with plaintext and ciphertext. To get the best result, we compared many SAT-solvers and choose several. Some of them were relatively old, but still very efficient and some were modern and popular.

Author(s):  
Roderick Bloem ◽  
Nicolas Braud-Santoni ◽  
Vedad Hadzic ◽  
Uwe Egly ◽  
Florian Lonsing ◽  
...  

AbstractIn recent years, expansion-based techniques have been shown to be very powerful in theory and practice for solving quantified Boolean formulas (QBF), the extension of propositional formulas with existential and universal quantifiers over Boolean variables. Such approaches partially expand one type of variable (either existential or universal) for obtaining a propositional abstraction of the QBF. If this formula is false, the truth value of the QBF is decided, otherwise further refinement steps are necessary. Classically, expansion-based solvers process the given formula quantifier-block wise and use one SAT solver per quantifier block. In this paper, we present a novel algorithm for expansion-based QBF solving that deals with the whole quantifier prefix at once. Hence recursive applications of the expansion principle are avoided and only two incremental SAT solvers are required. While our algorithm is naturally based on the $$\forall $$ ∀ Exp+Res calculus that is the formal foundation of expansion-based solving, it is conceptually simpler than present recursive approaches. Experiments indicate that the performance of our simple approach is comparable with the state of the art of QBF solving, especially in combination with other solving techniques.


2013 ◽  
Vol 22 (05) ◽  
pp. 1350033
Author(s):  
CHI-CHOU KAO ◽  
YEN-TAI LAI

The Time-Multiplexed FPGA (TMFPGA) architecture can improve dramatically logic utilization by time-sharing logic but it needs a large amount of registers among sub-circuits for partitioning the given sequential circuits. In this paper, we propose an improved TMFPGA architecture to simplify the precedence constraints so that the number of the registers among sub-circuits can be reduced for sequential circuits partitioning. To demonstrate the practicability of the architecture, we also present a greedy algorithm to minimize the maximum number of the registers. Experimental results demonstrate the effectives of the algorithm.


Author(s):  
R. K. Arni ◽  
S. K. Gupta

Abstract This paper describes a systematic approach to analyzing manufacturability of parts produced using Solid Freeform Fabrication (SFF) processes with flatness, parallelism and perpendicularity tolerance requirements on the planar faces of the part. SFF processes approximate objects using layers, therefore the part being produced exhibits stair-case effect. The extent of this stair-case effect depends on the angle between the build orientation and the face normal. Therefore, different faces whose direction normal is oriented differently with respect to the build direction may exhibit different values of inaccuracies. We use a two step approach to perform the manufacturability analysis. We first analyze each specified tolerance on the part and identify the set of feasible build directions that can be used to satisfy that tolerance. As a second step, we take the intersection of all sets of feasible build directions to identify the set of build directions that can simultaneously satisfy all specified tolerance requirements. If there is at least one build direction that can satisfy all tolerance requirements, then the part is considered manufacturable. Otherwise, the part is considered non-manufacturable. Our research will help SFF designers and process providers in the following ways. By evaluating design tolerances against a given process capability, it will help designers in eliminating manufacturing problems and selecting the right SFF process for the given design. It will help process providers in selecting a build direction that can meet all design tolerance requirements.


2013 ◽  
Vol 634-638 ◽  
pp. 382-385
Author(s):  
Ke Guo Liu ◽  
Li Li Gu ◽  
Hui Guang Hu ◽  
Rong Yang ◽  
Jun Tao

The experimental studies for purification of 1,8-cineole by vacuum batch distillation as well as the application of additives in 1,8-cineole purification were carried out. There were two steps during the purification. In the first step, experimental results showed that the optimal operation conditions for purification of 1,8-cineole were the temperature of the reboiler at about 320.15 K under a certain vacuum degree. In the second step, the optimal operation temperature of the reboiler was 331.15 K. The optimal reflux ratio was generated finally. Vacuum degree was controlled between 1.1 kPa and 1.3 kPa.


2011 ◽  
Vol 418-420 ◽  
pp. 1307-1311
Author(s):  
Jun Hu ◽  
Yong Jie Bao ◽  
Hang Gao ◽  
Ke Xin Wang

The experiments were carried out in the paper to investigate the effect of adding hydrogen in titanium alloy TC4 on its machinability. The hydrogen contents selected were 0, 0.25%, 0.49%, 0.63%, 0.89% and 1.32%, respectively. Experiments with varing hydrogen contents and cutting conditions concurrently. Experimental results showed that the cutting force of the titanium alloy can be obviously reduced and the surface roughness can be improved by adding appropriate hydrogen in the material. In the given cutting condition, the titanium alloy TC4 with 0.49% hydrogen content showed better machinability.


Author(s):  
Changdong Xu ◽  
Xin Geng

Hierarchical classification is a challenging problem where the class labels are organized in a predefined hierarchy. One primary challenge in hierarchical classification is the small training set issue of the local module. The local classifiers in the previous hierarchical classification approaches are prone to over-fitting, which becomes a major bottleneck of hierarchical classification. Fortunately, the labels in the local module are correlated, and the siblings of the true label can provide additional supervision information for the instance. This paper proposes a novel method to deal with the small training set issue. The key idea of the method is to represent the correlation among the labels by the label distribution. It generates a label distribution that contains the supervision information of each label for the given instance, and then learns a mapping from the instance to the label distribution. Experimental results on several hierarchical classification datasets show that our method significantly outperforms other state-of-theart hierarchical classification approaches.


Author(s):  
Yanbo J. Wang ◽  
Xinwei Zheng ◽  
Frans Coenen

An association rule (AR) is a common type of mined knowledge in data mining that describes an implicative co-occurring relationship between two sets of binary-valued transaction-database attributes, expressed in the form of an ? rule. A variation of ARs is the (WARs), which addresses the weighting issue in ARs. In this chapter, the authors introduce the concept of “one-sum” WAR and name such WARs as allocating patterns (ALPs). An algorithm is proposed to extract hidden and interesting ALPs from data. The authors further indicate that ALPs can be applied in portfolio management. Firstly by modelling a collection of investment portfolios as a one-sum weighted transaction- database that contains hidden ALPs. Secondly the authors show that ALPs, mined from the given portfolio-data, can be applied to guide future investment activities. The experimental results show good performance that demonstrates the effectiveness of using ALPs in the proposed application.


Information ◽  
2020 ◽  
Vol 11 (3) ◽  
pp. 166
Author(s):  
Yuelei Xiao ◽  
Haiqi Li

Privacy preserving data publishing has received considerable attention for publishing useful information while preserving data privacy. The existing privacy preserving data publishing methods for multiple sensitive attributes do not consider the situation that different values of a sensitive attribute may have different sensitivity requirements. To solve this problem, we defined three security levels for different sensitive attribute values that have different sensitivity requirements, and given an L s l -diversity model for multiple sensitive attributes. Following this, we proposed three specific greed algorithms based on the maximal-bucket first (MBF), maximal single-dimension-capacity first (MSDCF) and maximal multi-dimension-capacity first (MMDCF) algorithms and the maximal security-level first (MSLF) greed policy, named as MBF based on MSLF (MBF-MSLF), MSDCF based on MSLF (MSDCF-MSLF) and MMDCF based on MSLF (MMDCF-MSLF), to implement the L s l -diversity model for multiple sensitive attributes. The experimental results show that the three algorithms can greatly reduce the information loss of the published microdata, but their runtime is only a small increase, and their information loss tends to be stable with the increasing of data volume. And they can solve the problem that the information loss of MBF, MSDCF and MMDCF increases greatly with the increasing of sensitive attribute number.


2013 ◽  
Vol 347-350 ◽  
pp. 3797-3803 ◽  
Author(s):  
Xiao Ning Song ◽  
Zi Liu

Sparse representations using overcomplete dictionaries has concentrated mainly on the study of pursuit algorithms that decompose signals with respect to a given dictionary. Designing dictionaries to better fit the above model can be done by either selecting one from a prespecified set of linear transforms or adapting the dictionary to a set of training signals. The K-SVD algorithm is an iterative method that alternates between sparse coding of the examples based on the current dictionary and a process of updating the dictionary atoms to better fit the data. However, the existing K-SVD algorithm is employed to dwell on the concept of a binary class assignment meaning that the multi-classes samples are assigned to the given classes definitely. The work proposed in this paper provides a novel fuzzy adaptive way to adapting dictionaries in order to achieve the fuzzy sparse signal representations, the update of the dictionary columns is combined with an update of the sparse representations by incorporated a new mechanism of fuzzy set, which is called fuzzy K-SVD. Experimental results conducted on the ORL and Yale face databases demonstrate the effectiveness of the proposed method.


Sign in / Sign up

Export Citation Format

Share Document