Guess and determine attacks are general attacks on stream ciphers. These attacks are classified into ad-hoc and Heuristic Guess and Determine (HGD) attacks. One of the Advantages of HGD attack algorithm over ad-hoc attack is that it is designed algorithmically for a large class of stream ciphers while being powerful. In this paper, we use auxiliary polynomials in addition to the original equations as the inputs to the HGD attack on TIPSY and SNOW 1.0 stream ciphers. Based on the concept of guessed basis, the number of guesses in both HGD attack and the improved one on TIPSY is six, however the attack complexity is reduced from O(2102)to O(296). This amount is equal to that of ad-hoc attack, but the size of the guessed basis is improved from seven to six. Also, the complexity of GD attack on SNOW 1.0 of heuristic one with the guessed basis of size 6 and ad-hoc attack with the guessed basis of size 7areO(2202) and O(2224), respectively. However, the complexity and the size of guessed basis of the improved HGD attack are reduced to O(2160) and 5, respectively.
Application of artificial neural networks (ANN) in areas such as classification of images and audio signals shows the ability of this artificial intelligence technique for solving practical problems. Construction and training of ANNs is usually a time-consuming and hard process. A suitable neural model must be able to learn the training data and also have the generalization ability. In this paper, multiple parallel populations are used for construction of ANN and evolution strategy for its training, so that in each population a particular ANN architecture is evolved. By using a bi-criteria selection method based on error and complexity of ANNs, the proposed algorithm can produce simple ANNs that have high generalization ability. To assess the performance of the algorithm, 7 benchmark classification problems have been used. It has then been compared against the existing evolutionary algorithms that train and/or construct ANNs. Experimental results show the efficiency and robustness of the proposed algorithm compared to the other methods. In this paper, the impact of parallel populations, the bi-criteria selection method, and the crossover operator on the algorithm performance has been analyzed. A key advantage of the proposed algorithm is the use of parallel computing by means of multiple populations.
In this paper, a new structure for image encryption using recursive cellular automatais presented. The image encryption contains three recursive cellular automata in three steps, individually. At the first step, the image is blocked and the pixels are substituted. In the next step, pixels are scrambledby the second cellular automata and at the last step, the blocks are attachedtogether and the pixels substitute by the third cellular automata. Due to reversibility of cellular automata, the decryption of the image is possible by doing the steps reversely. The experimental results show that the encrypted image is not comprehend visually, also this algorithmhas satisfactory performance in terms of quantitative assessment from some other schemes.
In this paper a feature-based modulation classification algorithm is developed for discriminating PSK signals. The candidate modulation types are assumed to be QPSK, OQPSK, π/4 DQOSK and 8PSK. The proposed method applies an 8PSK baseband demodulator in order to extract required features from observed symbols. The received signal with unknown modulation type is demodulated by an 8PSK demodulator whose output is considered as a finite state machine with different states and transitions for each candidate modulation. Estimated probabilities of particular transitions constitute the discriminating features. The obtained features are given to a Bayesian classifier which decides on the modulation type of the received signal. The probability of correct classification is computed with different number of observed symbols and SNR conditions by carrying out several simulations. The results show that the proposed method offers more accurate classification compared to previous methods for classifying variants of QPSK.
Hellman’s time-memory trade-off is a probabilistic method for inverting one-way functions, using pre-computed data. Hellman introduced this method in 1980 and obtained a lower bound for the success probability of his algorithm. After that, all further analyses of researchers are based on this lower bound.
In this paper, we first studied the expected coverage rate (ECR) of the Hellman matrices, which are constructed by a single chain. We showed that the ECR of such matrices is maximum and equal to 0.85. In this process, we find out that there exists a gap between the Hellman’s lower bound and experimental coverage rate of a Hellman matrix. Specifically, this gap is larger, when considering the Hellman matrices constructed with one single chain. So, we are investigated to obtain an accurate formula for the ECR of a Hellman matrix. Subsequently, we presented a new formula that estimate the ECR of a Hellman matrix more accurately than the Hellman’s lower bound. We showed that the given formula is closely match experimental data.
In the last, we introduced a new method to construct matrices which have much more ECR than Hellman matrices. In fact, each matrix in this new method is constructed with one single chain, which is non-repeating trajectory from a random point. So, this approach result in a number of matrices that each one contains a chain with variable length. The main advantage of this method is that we have more probability of success than Hellman method, however online time and memory requirements are increased. We have also verified theory of this new method with experimental results.
Page 1 from 1 |
© 2015 All Rights Reserved | Signal and Data Processing