• Title/Summary/Keyword: round bound

Search Result 45, Processing Time 0.038 seconds

An Algorithm For Reducing Round Bound of Parallel Exponentiation (병렬 지수승에서 라운드 수 축소를 위한 알고리즘)

  • 김윤정
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.1
    • /
    • pp.113-119
    • /
    • 2004
  • Exponentiation is widely used in practical applications related with cryptography, and as the discrete log is easily solved in case of a low exponent n, a large exponent n is needed for a more secure system. However. since the time complexity for exponentiation algorithm increases in proportion to the n figure, the development of an exponentiation algorithm that can quickly process the results is becoming a crucial problem. In this paper, we propose a parallel exponentiation algorithm which can reduce the number of rounds with a fixed number of processors, where the field elements are in GF($2^m$), and also analyzed the round bound of the proposed algorithm. The proposed method uses window method which divides the exponent in a particular bit length and make idle processors in window value computation phase to multiply some terms of windows where the values are already computed. By this way. the proposed method has improved round bound.

A Study of the Twisting and Extrusion Process of the Product with Involute Helical Fin from the Round Billet by the Upper Bound Analysis (상계해법에 의한 원형빌렛으로부터 인볼루트 헬리컬핀을 가진 제품의 비틀림 압출가공법에 관한 연구)

  • 박대윤;진인태
    • Transactions of Materials Processing
    • /
    • v.10 no.4
    • /
    • pp.302-310
    • /
    • 2001
  • The twisting and extrusion process of the product with involute helical fin from the round billet is developed by the upper bound analysis. The twisting of extruded product is caused by the twisted inclined die surface connecting the die enterance section and the die exit section linearly. In the analysis, the internal shear surface is defined as the curved twisted plane from the twisting of die surface and the shear work is calculated by the consumption of shear energy. The increase rate of angular velocity is determined by the minimization of plastic work. The angular velocity of die exit can be controlled by the land length and the length of inclined die. The alular velocity assums to be increased linearly by the axial distance from the die enterance to the die exit. The results of the analysis show that the angular velocity of the extruded product increases with the die twisting angle, the reduction of area, and decreases with the die length, the friction constant.

  • PDF

An Upper Bound of the Longest Impossible Differentials of Several Block Ciphers

  • Han, Guoyong;Zhang, Wenying;Zhao, Hongluan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.1
    • /
    • pp.435-451
    • /
    • 2019
  • Impossible differential cryptanalysis is an essential cryptanalytic technique and its key point is whether there is an impossible differential path. The main factor of influencing impossible differential cryptanalysis is the length of the rounds of the impossible differential trail because the attack will be more close to the real encryption algorithm with the number becoming longer. We provide the upper bound of the longest impossible differential trails of several important block ciphers. We first analyse the national standard of the Russian Federation in 2015, Kuznyechik, which utilizes the 16-byte LFSR to achieve the linear transformation. We conclude that there is no any 3-round impossible differential trail of the Kuznyechik without the consideration of the specific S-boxes. Then we ascertain the longest impossible differential paths of several other important block ciphers by using the matrix method which can be extended to many other block ciphers. As a result, we show that, unless considering the details of the S-boxes, there is no any more than or equal to 5-round, 7-round and 9-round impossible differential paths for KLEIN, Midori64 and MIBS respectively.

A Study of the Twisting and Extrusion Process of the Product with Involute Helical Fin from the Round Billet (원형빌렛으로부터 인볼루트 헬리컬 핀을 가진 제품의 비틀림 압출가공법에 관한 연구)

  • 김한봉
    • Proceedings of the Korean Society for Technology of Plasticity Conference
    • /
    • 1999.03b
    • /
    • pp.111-114
    • /
    • 1999
  • The twisting and extrusion process of the product with involute helical fin from the round billet is developed by the upper bound analysis. The twisting of extruded product is caused by the twisted die surface connecting the die entrance section and the die exit section linearly. In the analysis, the internal shear surface is defined as the curved twisted plane from the taisting of die surface and the shear work is calculated by the consumption of shear energy The increase rate of angular velocity is determined by the minimization of plastic work. The results of the analysis show that the angular velocity of the extruded product increases with the die twisting angle, the reduction of area, and decreases with the die length, the friction condition.

  • PDF

A Study of the Twisting and Extrusion Process of the Product with Trapezoidal Helical Fin from the Round Billet (원형빌렛으로부터 나선형 사다리꼴 핀을 가진 제품의 비틀림 압출가공법에 관한 연구)

  • 김한봉;진인태
    • Transactions of Materials Processing
    • /
    • v.8 no.2
    • /
    • pp.143-151
    • /
    • 1999
  • The twisting and extrusion process of the product with trapezoidal helical fin from the round billet is developed by the upper bound analysis. The twisting of extruded product is caused by the twisted die surface connecting the die entrance section and the die exit section linearly. In the analysis, the rotational velocity in angular direction is assumed by the multiplication of radial distance and angular velocity. The angular velocity is increased linearly by axial distance from the die entrance. The increase rate of angular velocity is determined by the minimization of plastic work. The results of the analysis show that the angular velocity of the extruded product increases with the die twisting angle, the reduction of area, and decreases with the die length, the friction condition.

  • PDF

Security Analysis of Block Ciphers Designed with BOGI Strategy against Differential Attacks (BOGI 전략으로 설계된 블록 암호의 차분 공격에 대한 안전성 분석)

  • Lee, Sanghyeop;Kim, Seonggyeom;Hong, Deukjo;Sung, Jaechul;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1259-1270
    • /
    • 2019
  • The upper bound of differential characteristic probability is mainly used to determine the number of rounds when constructing a block cipher. As the number of rounds affects the performance of block cipher, it is critical to evaluate the tight upper bound in the constructing process. In order to calculate the upper bound of differential characteristic probability, the previous searching methods for minimum number of active S-boxes constructed constraint equations for non-linear operations and linear operations, independently. However, in the case of BOGI design strategy, where linear operation is dependent on non-linear operation, the previous methods may present the less tight upper bound. In this paper, we exploit the properties of BOGI strategy to propose a new method to evaluate a tighter upper bound of differential characteristic probability than previous ones. Additionally, we mathematically proved the validity of our method. Our proposed method was applied to GIFT-64 and GIFT-128, which are based on BOGI strategy, and the upper bounds of differential characteristic probability were derived until 9 round. Previously, the upper bounds of differential characteristic probability for 7-round GIFT-64 and 9-round GIFT-128 were 2-18.395 and 2-26.885, respectively, while we show that the upper bounds of differential characteristic probability are more tight as 2-19.81 and 2-28.3, respectively.

Ultrastructures of Canine Transmissible Venereal Turner Cells at Stages of Maturation and Regression (개 전이성 생식후 종양 세포의 성숙기 및 퇴축기에 따른 미세구조)

  • Park, Nam-Yong;Rhee, Young-Hwan
    • Applied Microscopy
    • /
    • v.17 no.1
    • /
    • pp.169-176
    • /
    • 1987
  • Naturally occurring canine transmissible venereal tumors of genital organs in mature and regressive stages from 6 dogs were examined by transmission electron microscope. The tumor cells at the stage of maturation were comprised of large round and ovoid cells with prominent nuclei and nucleoli, a few spindle-shaped cells, and irregularly shaped cells. The mature round cells were characterized by the presence of a central ovoid to irregularly round nucleus with a large eccentric nucleolus, vesicular endoplasmic reticulum, round to oval swollen mitochondria with few cristae, Golgi's apparatus, and plasma membranes with numerous microvilli. As the tumor degenerated, the tumor cells were increased in the number of spindle-shaped, fibroblast-like and irregularly shaped cells, collagen bundles, and mainly lymphocytes, in contrast to those of the stage of maturation. Regressing tumor cells were characterized by the swelling and vacuolation of mitochondria and endoplasmic reticulum, membrane-bound granules, lamellar complex, tubular structures, and dense bundles of collagen. It was suggested that transformation might occur in the course of tumor growth causing morphological change from the round to the fibroblast-like cells, and that there was the evidence of cell-mediated tumor cell lysis by lymphocyte infiltration.

  • PDF

Impossible Differential Cryptanalysis on ESF Algorithm with Simplified MILP Model

  • Wu, Xiaonian;Yan, Jiaxu;Li, Lingchen;Zhang, Runlian;Yuan, Pinghai;Wang, Yujue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.10
    • /
    • pp.3815-3833
    • /
    • 2021
  • MILP-based automatic search is the most common method in analyzing the security of cryptographic algorithms. However, this method brings many issues such as low efficiency due to the large size of the model, and the difficulty in finding the contradiction of the impossible differential distinguisher. To analyze the security of ESF algorithm, this paper introduces a simplified MILP-based search model of the differential distinguisher by reducing constrains of XOR and S-box operations, and variables by combining cyclic shift with its adjacent operations. Also, a new method to find contradictions of the impossible differential distinguisher is proposed by introducing temporary variables, which can avoid wrong and miss selection of contradictions. Based on a 9-round impossible differential distinguisher, 15-round attack of ESF can be achieved by extending forward and backward 3-round in single-key setting. Compared with existing results, the exact lower bound of differential active S-boxes in single-key setting for 10-round ESF are improved. Also, 2108 9-round impossible differential distinguishers in single-key setting and 14 12-round impossible differential distinguishers in related-key setting are obtained. Especially, the round of the discovered impossible differential distinguisher in related-key setting is the highest, and compared with the previous results, this attack achieves the highest round number in single-key setting.

Analysis of three-dimensional plastic flow for extrusion of elliptic sections through continuous dies (곡면금형을 통한 타원형 형재의 압출에 대한 3차원 소성유동해석)

  • 한철호;양동렬
    • Transactions of the Korean Society of Mechanical Engineers
    • /
    • v.11 no.1
    • /
    • pp.110-117
    • /
    • 1987
  • A new kinematically admissible velocity field for a generalized three-dimensional flow is introduced, in which the flow is bounded by an analytic die-profile function. Then, by applying the upper-bound method th the velocity field, the flow patterns as the upper-bound method are obtained. Extrusion of elliptic sections from round billets is chosen as a computational example. Computation and experiments are carried out for work-hardening material such as aluminum alloy 2024. In order to visualize the plastic flow, the grid marking technique is employed. The theoretical predictions both in extrusion load and deformed pattern are in good agreement with the experimental data.