In Cloud Computing, information exchange frequently via the Internet and on-demand. Modern
Internet protocols support several modes of operation to keep up with varied environments and
provide the variant choice, such as SSL and IPSec support multi-mode. The different mode has
the different characters. For example: CFB/OFB can be design operating without padding with
bit size keystream output, CBC/CFB can self synchronize to avoid channel noise, and CFB/OFB
needs encryption module only. The main emphasis is placed on the problem of case by case
operation mode usage. We describe a structure for the analysis of the block operation mode
combination. This unified operation structure, called UOS, combines existing in common and
popular block modes of operation. UOS does multi-mode of operation with most existing
popular symmetric block ciphers and do not only consist of encryption mode such as ECB, CBC,
CFB and OFB, that provides confidentiality but also message authentication mode such as
CBC-MAC in cryptography. It provides low-resource hardware implementation, which is
proper to ubiquitous computing devices such as a sensor mote or an RFID tag. Our contribution
provides a common solution for multi-mode and this is very suitable for ubiquitous computing with several resources and environments. The study indicates a better well-organized structure for symmetric block ciphers so as to improve their application scenarios.
Modern Block Cipher- Modern Symmetric-Key CipherMahbubur Rahman
Introduction to Modern Symmetric-Key Ciphers- This lecture will cover only "Modern Block Cipher".
Slide Credit: Maleka Khatun & Mahbubur Rahman
Dept. of CSE, JnU, BD.
Modern Block Cipher- Modern Symmetric-Key CipherMahbubur Rahman
Introduction to Modern Symmetric-Key Ciphers- This lecture will cover only "Modern Block Cipher".
Slide Credit: Maleka Khatun & Mahbubur Rahman
Dept. of CSE, JnU, BD.
Combating Bit Losses in Computer Networks using Modified Luby Transform CodeIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Stream Cipher
Block Cipher
Stream Cipher and Block Cipher
The Feistel Cipher
Feistel Cipher Design Features
Data Encryption Standard (DES)
DES is a block cipher
THE AVALANCHE EFFECT
Block Cipher Design Principles
CNIT 141: 5. More About Block Ciphers + Modular Arithmetic 2Sam Bowne
A lecture for a college course -- CNIT 140: Cryptography for Computer Networks at City College San Francisco
Based on "Understanding Cryptography: A Textbook for Students and Practitioners" by Christof Paar, Jan Pelzl, and Bart Preneel, ISBN: 3642041000
Instructor: Sam Bowne
More info: https://samsclass.info/141/141_F17.shtml
In this whole idea of v symmetric cipher model and also cryptography and cryptanalytics, also substitution techniques and transposition techniques and steganography.
This chapter provides an introductory lecture note on the Error Control Coding techniques. Before one goes into the details of different types of Coding schemes, this note will acquaint the readers with all the terms related and associated to Error Control Coding. It is highly recommended that one goes through this article before delving deep into the coding schemes.
15-bit NOVEL Hamming Codec using HSPICE 22nm CMOS Technology based on GDI Tec...theijes
GDI(Gate Diffusion Input) technique allows low power consumption, low propagation delay and also minimum number of transistor count (low chip area) for the logic design. in this paper 15-bit NOVEL hamming codec has been proposed. This Novel hamming codec has been simulated with HSPICE using 22nm CMOS technology with various design methodologies like TG technology, pass transistor logic and GDI Technique and designs are compared to 15-bit simple hamming codec with each of various design methodologies respectively. GDI technique provide excellent result in terms power consumption, chip area and propagation delay and also novel hamming codec provide less transistor count over general hamming codec.
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block CiphersIJNSA Journal
Modern Internet protocols support several modes of operation in encryption tasks for data confidentiality
to keep up with varied environments and provide the various choices, such as multi-mode IPSec support.
To begin with we will provide a brief background on the modes of operation for symmetric-key block
ciphers. Different block cipher modes of operation have distinct characteristics. For example, the cipher
block chaining (CBC) mode is suitable for operating environments that require self-synchronizing
capabilities, and the output feedback (OFB) mode requires encryption modules only. When using
symmetric-key block cipher algorithms such as the Advanced Encryption Standard (AES), users
performing information encryption often encounter difficulties selecting a suitable mode of operation.
This paper describes a structure for analyzing the block operation mode combination. This unified
operation structure (UOS) combines existing common and popular block modes of operation. UOS does
multi-mode of operation with most existing popular symmetric-key block ciphers and do not only consist
of encryption mode such as electronic codebook (ECB) mode, cipher block chaining (CBC) mode, cipher
feedback (CFB) mode and output feedback (OFB) mode, that provides confidentiality but also message
authentication mode such as the cipher block chaining message authentication code (CBC-MAC) in
cryptography. In Cloud Computing, information exchange frequently via the Internet and on-demand.
This research provides an overview and information useful for approaching low-resource hardware
implementation, which is proper to ubiquitous computing devices such as a sensor mote or an RFID tag.
The use of the method is discussed and an example is given. This provides a common solution for multimode and this is very suitable for ubiquitous computing with several resources and environments. This
study indicates a more effectively organized structure for symmetric-key block ciphers to improve their
application scenarios. We can get that it is flexible in modern communication applications.
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERSIJNSA Journal
Modern Internet protocols support several modes of operation in encryption tasks for data confidentiality to keep up with varied environments and provide the various choices, such as multi-mode IPSec support. To begin with we will provide a brief background on the modes of operation for symmetric-key block ciphers. Different block cipher modes of operation have distinct characteristics. For example, the cipher block chaining (CBC) mode is suitable for operating environments that require self-synchronizing capabilities, and the output feedback (OFB) mode requires encryption modules only. When using symmetric-key block cipher algorithms such as the Advanced Encryption Standard (AES), users performing information encryption often encounter difficulties selecting a suitable mode of operation. This paper describes a structure for analyzing the block operation mode combination. This unified operation structure (UOS) combines existing common and popular block modes of operation. UOS does multi-mode of operation with most existing popular symmetric-key block ciphers and do not only consist of encryption mode such as electronic codebook (ECB) mode, cipher block chaining (CBC) mode, cipher feedback (CFB) mode and output feedback (OFB) mode, that provides confidentiality but also message authentication mode such as the cipher block chaining message authentication code (CBC-MAC) in cryptography. In Cloud Computing, information exchange frequently via the Internet and on-demand. This research provides an overview and information useful for approaching low-resource hardware implementation, which is proper to ubiquitous computing devices such as a sensor mote or an RFID tag. The use of the method is discussed and an example is given. This provides a common solution for multimode and this is very suitable for ubiquitous computing with several resources and environments. This study indicates a more effectively organized structure for symmetric-key block ciphers to improve their application scenarios. We can get that it is flexible in modern communication applications.
Combating Bit Losses in Computer Networks using Modified Luby Transform CodeIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Stream Cipher
Block Cipher
Stream Cipher and Block Cipher
The Feistel Cipher
Feistel Cipher Design Features
Data Encryption Standard (DES)
DES is a block cipher
THE AVALANCHE EFFECT
Block Cipher Design Principles
CNIT 141: 5. More About Block Ciphers + Modular Arithmetic 2Sam Bowne
A lecture for a college course -- CNIT 140: Cryptography for Computer Networks at City College San Francisco
Based on "Understanding Cryptography: A Textbook for Students and Practitioners" by Christof Paar, Jan Pelzl, and Bart Preneel, ISBN: 3642041000
Instructor: Sam Bowne
More info: https://samsclass.info/141/141_F17.shtml
In this whole idea of v symmetric cipher model and also cryptography and cryptanalytics, also substitution techniques and transposition techniques and steganography.
This chapter provides an introductory lecture note on the Error Control Coding techniques. Before one goes into the details of different types of Coding schemes, this note will acquaint the readers with all the terms related and associated to Error Control Coding. It is highly recommended that one goes through this article before delving deep into the coding schemes.
15-bit NOVEL Hamming Codec using HSPICE 22nm CMOS Technology based on GDI Tec...theijes
GDI(Gate Diffusion Input) technique allows low power consumption, low propagation delay and also minimum number of transistor count (low chip area) for the logic design. in this paper 15-bit NOVEL hamming codec has been proposed. This Novel hamming codec has been simulated with HSPICE using 22nm CMOS technology with various design methodologies like TG technology, pass transistor logic and GDI Technique and designs are compared to 15-bit simple hamming codec with each of various design methodologies respectively. GDI technique provide excellent result in terms power consumption, chip area and propagation delay and also novel hamming codec provide less transistor count over general hamming codec.
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block CiphersIJNSA Journal
Modern Internet protocols support several modes of operation in encryption tasks for data confidentiality
to keep up with varied environments and provide the various choices, such as multi-mode IPSec support.
To begin with we will provide a brief background on the modes of operation for symmetric-key block
ciphers. Different block cipher modes of operation have distinct characteristics. For example, the cipher
block chaining (CBC) mode is suitable for operating environments that require self-synchronizing
capabilities, and the output feedback (OFB) mode requires encryption modules only. When using
symmetric-key block cipher algorithms such as the Advanced Encryption Standard (AES), users
performing information encryption often encounter difficulties selecting a suitable mode of operation.
This paper describes a structure for analyzing the block operation mode combination. This unified
operation structure (UOS) combines existing common and popular block modes of operation. UOS does
multi-mode of operation with most existing popular symmetric-key block ciphers and do not only consist
of encryption mode such as electronic codebook (ECB) mode, cipher block chaining (CBC) mode, cipher
feedback (CFB) mode and output feedback (OFB) mode, that provides confidentiality but also message
authentication mode such as the cipher block chaining message authentication code (CBC-MAC) in
cryptography. In Cloud Computing, information exchange frequently via the Internet and on-demand.
This research provides an overview and information useful for approaching low-resource hardware
implementation, which is proper to ubiquitous computing devices such as a sensor mote or an RFID tag.
The use of the method is discussed and an example is given. This provides a common solution for multimode and this is very suitable for ubiquitous computing with several resources and environments. This
study indicates a more effectively organized structure for symmetric-key block ciphers to improve their
application scenarios. We can get that it is flexible in modern communication applications.
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERSIJNSA Journal
Modern Internet protocols support several modes of operation in encryption tasks for data confidentiality to keep up with varied environments and provide the various choices, such as multi-mode IPSec support. To begin with we will provide a brief background on the modes of operation for symmetric-key block ciphers. Different block cipher modes of operation have distinct characteristics. For example, the cipher block chaining (CBC) mode is suitable for operating environments that require self-synchronizing capabilities, and the output feedback (OFB) mode requires encryption modules only. When using symmetric-key block cipher algorithms such as the Advanced Encryption Standard (AES), users performing information encryption often encounter difficulties selecting a suitable mode of operation. This paper describes a structure for analyzing the block operation mode combination. This unified operation structure (UOS) combines existing common and popular block modes of operation. UOS does multi-mode of operation with most existing popular symmetric-key block ciphers and do not only consist of encryption mode such as electronic codebook (ECB) mode, cipher block chaining (CBC) mode, cipher feedback (CFB) mode and output feedback (OFB) mode, that provides confidentiality but also message authentication mode such as the cipher block chaining message authentication code (CBC-MAC) in cryptography. In Cloud Computing, information exchange frequently via the Internet and on-demand. This research provides an overview and information useful for approaching low-resource hardware implementation, which is proper to ubiquitous computing devices such as a sensor mote or an RFID tag. The use of the method is discussed and an example is given. This provides a common solution for multimode and this is very suitable for ubiquitous computing with several resources and environments. This study indicates a more effectively organized structure for symmetric-key block ciphers to improve their application scenarios. We can get that it is flexible in modern communication applications.
REAL-TIME MODE HOPPING OF BLOCK CIPHER ALGORITHMS FOR MOBILE STREAMINGijwmn
It has been shown that the encrypted information or ciphertext produced by symmetric-key block ciphers
with Electronic codebook mode is vulnerable to ciphertext searching, replay, insertion and deletion
because it encrypts each block independently. To compensate for this, each block of the encrypted
information should be encrypted dependently. The encrypted information should be operated with a
special mode. The operation mode should be changed. This paper analysis what an operational mode of
block ciphers needs to feedback exactly and proposes a simple real-time changing operation mode
technique that extends the existing mode changing opportunity. The new change operation mode
technique considers the sign differences between the intra-feedback information and the public-feedback
information, and then adaptively determines the corresponding change operation mode factor for each
data block. This mode hopping technique for mobile streaming security is highly suitable for recent block
computing in future various environments.
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...editor1knowledgecuddle
Today is the era of Internet and networks applications. So,Information security is a challenging issue in today’s technological world. There is a demand for a stronger encryption which is very hard to crack. The role of Cryptography is most important in the field of network security. There is a broad range of cryptographic algorithms that are used for securing networks and presently continuous researches on the new cryptographic algorithms are going on for evolving more advanced techniques for secures
communication. In this study is made for the cryptography algorithms, particularly algorithms- AES, DES, RSA, Blowfishare compared and performance is evaluated. Also some enhanced algorithms are described and compared with the enhanced algorithms.
Keywords - AES, DES, BLOWFISH, Decryption, Encryption, Security
With increasing technology development in field of communication and Electronic devices, there is a need for better security service for information transfer in Medical Sectors, Banking, Financial and in other IoT applications etc. Fight against security attacks is of prime importance. Through Cryptographic techniques we can provide Authenticity as well as Confidentiality for the user data. In this paper, hardware implementation has been described for a real-time application of speech data encryption and decryption using AES algorithm along with the speech recognition using cross correlation technique. Verilog programming environment is used for AES cryptography whereas MATLAB is used for Speech recognition. ASIC design on AES core is implemented using Cadence tools. Number of gates, area and power used by AES core design has been drastically reduced by specifying wide range of constraints during front end designing. In Backend designing, layout of AES design, which is the physical geometric representation is also developed.
Training and Tips that are very helpful to gain knowledge in the field of information Security and passing your CISSP Certification Exam.
To be CISSP Certified Please Check out the link below:
http://asmed.com/cissp-isc2/
Information and data security block cipher and the data encryption standard (...Mazin Alwaaly
Information And Data Security Block Cipher and the data encryption standard (DES) seminar
Mustansiriya University
Department of Education
Computer Science
Unit 1
Information System Security
(According RTU Syllabus)
1-Introduction to security attacks Services and mechanism
2-Classical encryption techniques
3-Cryptanalysis, stream and block ciphers
4- Modern Block Ciphers: Block ciphers principals
5- Shannon’s theory of confusion and diffusion
6- Fiestal structure
7- Data encryption standard(DES)
8- Differential and linear cryptanalysis of DES
9- Block cipher modes of operations.
10- Triple Data Encryption Standard (Triple-DES)
Advanced Encryption Standard, Multiple Encryption and Triple DES, Block Cipher Modes of
operation, Stream Ciphers and RC4, Confidentiality using Symmetric Encryption, Introduction
to Number Theory: Prime Numbers, Fermat’s and Euler’s Theorems, Testing for Primality, The
Chinese Remainder Theorem, Discrete Logarithms, Public-Key Cryptography and RSA
VLSI ARCHITECTURE FOR NANO WIRE BASED ADVANCED ENCRYPTION STANDARD (AES) WITH...VLSICS Design
Advanced Encryption Standard (AES) Algorithm has been extensively applied in the present financial
applications. Sub-channel attacks are one of the main problems occurred n the AES Algorithm.
Asynchronous AES Architecture is one of the leading solutions of the sub-channel attacks due to its natural
properties. The AES architecture with the enhanced mix column to be proposed with reduced number of
transistor counts.. Then, the Verilog A modeling is used to evaluate the performance of the proposed AES
Architecture. Finally, the VLSI Implementations of the AES Processor is implemented with CMOS
technology 0.25 µm. By using the net list generations, the proposed AES Architecture is analyzed regarding
the VLSI design environment. The simulation results of the proposed structure are performed with the
minimum number of transistor counts as well as power utilizations. Moreover, the proposed CMOS
technology based AES Algorithm is integrated into the backend based chip technology.
VLSI Architecture for Nano Wire Based Advanced Encryption Standard (AES) with...VLSICS Design
Advanced Encryption Standard (AES) Algorithm has been extensively applied in the present financial applications. Sub-channel attacks are one of the main problems occurred n the AES Algorithm. Asynchronous AES Architecture is one of the leading solutions of the sub-channel attacks due to its natural properties. The AES architecture with the enhanced mix column to be proposed with reduced number of transistor counts.. Then, the Verilog A modeling is used to evaluate the performance of the proposed AES Architecture. Finally, the VLSI Implementations of the AES Processor is implemented with CMOS technology 0.25 µm. By using the net list generations, the proposed AES Architecture is analyzed regarding the VLSI design environment. The simulation results of the proposed structure are performed with the minimum number of transistor counts as well as power utilizations. Moreover, the proposed CMOS technology based AES Algorithm is integrated into the backend based chip technology.
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR cscpconf
The progressive development of Synthetic Aperture Radar (SAR) systems diversify the exploitation of the generated images by these systems in different applications of geoscience. Detection and monitoring surface deformations, procreated by various phenomena had benefited from this evolution and had been realized by interferometry (InSAR) and differential interferometry (DInSAR) techniques. Nevertheless, spatial and temporal decorrelations of the interferometric couples used, limit strongly the precision of analysis results by these techniques. In this context, we propose, in this work, a methodological approach of surface deformation detection and analysis by differential interferograms to show the limits of this technique according to noise quality and level. The detectability model is generated from the deformation signatures, by simulating a linear fault merged to the images couples of ERS1 / ERS2 sensors acquired in a region of the Algerian south.
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATIONcscpconf
A novel based a trajectory-guided, concatenating approach for synthesizing high-quality image real sample renders video is proposed . The lips reading automated is seeking for modeled the closest real image sample sequence preserve in the library under the data video to the HMM predicted trajectory. The object trajectory is modeled obtained by projecting the face patterns into an KDA feature space is estimated. The approach for speaker's face identification by using synthesise the identity surface of a subject face from a small sample of patterns which sparsely each the view sphere. An KDA algorithm use to the Lip-reading image is discrimination, after that work consisted of in the low dimensional for the fundamental lip features vector is reduced by using the 2D-DCT.The mouth of the set area dimensionality is ordered by a normally reduction base on the PCA to obtain the Eigen lips approach, their proposed approach by[33]. The subjective performance results of the cost function under the automatic lips reading modeled , which wasn’t illustrate the superior performance of the
method.
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...cscpconf
Universities offer software engineering capstone course to simulate a real world-working environment in which students can work in a team for a fixed period to deliver a quality product. The objective of the paper is to report on our experience in moving from Waterfall process to Agile process in conducting the software engineering capstone project. We present the capstone course designs for both Waterfall driven and Agile driven methodologies that highlight the structure, deliverables and assessment plans.To evaluate the improvement, we conducted a survey for two different sections taught by two different instructors to evaluate students’ experience in moving from traditional Waterfall model to Agile like process. Twentyeight students filled the survey. The survey consisted of eight multiple-choice questions and an open-ended question to collect feedback from students. The survey results show that students were able to attain hands one experience, which simulate a real world-working environment. The results also show that the Agile approach helped students to have overall better design and avoid mistakes they have made in the initial design completed in of the first phase of the capstone project. In addition, they were able to decide on their team capabilities, training needs and thus learn the required technologies earlier which is reflected on the final product quality
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIEScscpconf
Using social media in education provides learners with an informal way for communication. Informal communication tends to remove barriers and hence promotes student engagement. This paper presents our experience in using three different social media technologies in teaching software project management course. We conducted different surveys at the end of every semester to evaluate students’ satisfaction and engagement. Results show that using social media enhances students’ engagement and satisfaction. However, familiarity with the tool is an important factor for student satisfaction.
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICcscpconf
In real world computing environment with using a computer to answer questions has been a human dream since the beginning of the digital era, Question-answering systems are referred to as intelligent systems, that can be used to provide responses for the questions being asked by the user based on certain facts or rules stored in the knowledge base it can generate answers of questions asked in natural , and the first main idea of fuzzy logic was to working on the problem of computer understanding of natural language, so this survey paper provides an overview on what Question-Answering is and its system architecture and the possible relationship and
different with fuzzy logic, as well as the previous related research with respect to approaches that were followed. At the end, the survey provides an analytical discussion of the proposed QA models, along or combined with fuzzy logic and their main contributions and limitations.
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS cscpconf
Human beings generate different speech waveforms while speaking the same word at different times. Also, different human beings have different accents and generate significantly varying speech waveforms for the same word. There is a need to measure the distances between various words which facilitate preparation of pronunciation dictionaries. A new algorithm called Dynamic Phone Warping (DPW) is presented in this paper. It uses dynamic programming technique for global alignment and shortest distance measurements. The DPW algorithm can be used to enhance the pronunciation dictionaries of the well-known languages like English or to build pronunciation dictionaries to the less known sparse languages. The precision measurement experiments show 88.9% accuracy.
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS cscpconf
In education, the use of electronic (E) examination systems is not a novel idea, as Eexamination systems have been used to conduct objective assessments for the last few years. This research deals with randomly designed E-examinations and proposes an E-assessment system that can be used for subjective questions. This system assesses answers to subjective questions by finding a matching ratio for the keywords in instructor and student answers. The matching ratio is achieved based on semantic and document similarity. The assessment system is composed of four modules: preprocessing, keyword expansion, matching, and grading. A survey and case study were used in the research design to validate the proposed system. The examination assessment system will help instructors to save time, costs, and resources, while increasing efficiency and improving the productivity of exam setting and assessments.
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICcscpconf
African Buffalo Optimization (ABO) is one of the most recent swarms intelligence based metaheuristics. ABO algorithm is inspired by the buffalo’s behavior and lifestyle. Unfortunately, the standard ABO algorithm is proposed only for continuous optimization problems. In this paper, the authors propose two discrete binary ABO algorithms to deal with binary optimization problems. In the first version (called SBABO) they use the sigmoid function and probability model to generate binary solutions. In the second version (called LBABO) they use some logical operator to operate the binary solutions. Computational results on two knapsack problems (KP and MKP) instances show the effectiveness of the proposed algorithm and their ability to achieve good and promising solutions.
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINcscpconf
In recent years, many malware writers have relied on Dynamic Domain Name Services (DDNS) to maintain their Command and Control (C&C) network infrastructure to ensure a persistence presence on a compromised host. Amongst the various DDNS techniques, Domain Generation Algorithm (DGA) is often perceived as the most difficult to detect using traditional methods. This paper presents an approach for detecting DGA using frequency analysis of the character distribution and the weighted scores of the domain names. The approach’s feasibility is demonstrated using a range of legitimate domains and a number of malicious algorithmicallygenerated domain names. Findings from this study show that domain names made up of English characters “a-z” achieving a weighted score of < 45 are often associated with DGA. When a weighted score of < 45 is applied to the Alexa one million list of domain names, only 15% of the domain names were treated as non-human generated.
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...cscpconf
The amount of piracy in the streaming digital content in general and the music industry in specific is posing a real challenge to digital content owners. This paper presents a DRM solution to monetizing, tracking and controlling online streaming content cross platforms for IP enabled devices. The paper benefits from the current advances in Blockchain and cryptocurrencies. Specifically, the paper presents a Global Music Asset Assurance (GoMAA) digital currency and presents the iMediaStreams Blockchain to enable the secure dissemination and tracking of the streamed content. The proposed solution provides the data owner the ability to control the flow of information even after it has been released by creating a secure, selfinstalled, cross platform reader located on the digital content file header. The proposed system provides the content owners’ options to manage their digital information (audio, video, speech, etc.), including the tracking of the most consumed segments, once it is release. The system benefits from token distribution between the content owner (Music Bands), the content distributer (Online Radio Stations) and the content consumer(Fans) on the system blockchain.
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMcscpconf
This paper discusses the importance of verb suffix mapping in Discourse translation system. In
discourse translation, the crucial step is Anaphora resolution and generation. In Anaphora
resolution, cohesion links like pronouns are identified between portions of text. These binders
make the text cohesive by referring to nouns appearing in the previous sentences or nouns
appearing in sentences after them. In Machine Translation systems, to convert the source
language sentences into meaningful target language sentences the verb suffixes should be
changed as per the cohesion links identified. This step of translation process is emphasized in
the present paper. Specifically, the discussion is on how the verbs change according to the
subjects and anaphors. To explain the concept, English is used as the source language (SL) and
an Indian language Telugu is used as Target language (TL)
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...cscpconf
In this paper, based on the definition of conformable fractional derivative, the functional
variable method (FVM) is proposed to seek the exact traveling wave solutions of two higherdimensional
space-time fractional KdV-type equations in mathematical physics, namely the
(3+1)-dimensional space–time fractional Zakharov-Kuznetsov (ZK) equation and the (2+1)-
dimensional space–time fractional Generalized Zakharov-Kuznetsov-Benjamin-Bona-Mahony
(GZK-BBM) equation. Some new solutions are procured and depicted. These solutions, which
contain kink-shaped, singular kink, bell-shaped soliton, singular soliton and periodic wave
solutions, have many potential applications in mathematical physics and engineering. The
simplicity and reliability of the proposed method is verified.
AUTOMATED PENETRATION TESTING: AN OVERVIEWcscpconf
The using of information technology resources is rapidly increasing in organizations,
businesses, and even governments, that led to arise various attacks, and vulnerabilities in the
field. All resources make it a must to do frequently a penetration test (PT) for the environment
and see what can the attacker gain and what is the current environment's vulnerabilities. This
paper reviews some of the automated penetration testing techniques and presents its
enhancement over the traditional manual approaches. To the best of our knowledge, it is the
first research that takes into consideration the concept of penetration testing and the standards
in the area.This research tackles the comparison between the manual and automated
penetration testing, the main tools used in penetration testing. Additionally, compares between
some methodologies used to build an automated penetration testing platform.
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKcscpconf
Since the mid of 1990s, functional connectivity study using fMRI (fcMRI) has drawn increasing
attention of neuroscientists and computer scientists, since it opens a new window to explore
functional network of human brain with relatively high resolution. BOLD technique provides
almost accurate state of brain. Past researches prove that neuro diseases damage the brain
network interaction, protein- protein interaction and gene-gene interaction. A number of
neurological research paper also analyse the relationship among damaged part. By
computational method especially machine learning technique we can show such classifications.
In this paper we used OASIS fMRI dataset affected with Alzheimer’s disease and normal
patient’s dataset. After proper processing the fMRI data we use the processed data to form
classifier models using SVM (Support Vector Machine), KNN (K- nearest neighbour) & Naïve
Bayes. We also compare the accuracy of our proposed method with existing methods. In future,
we will other combinations of methods for better accuracy.
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...cscpconf
In order to treat and analyze real datasets, fuzzy association rules have been proposed. Several
algorithms have been introduced to extract these rules. However, these algorithms suffer from
the problems of utility, redundancy and large number of extracted fuzzy association rules. The
expert will then be confronted with this huge amount of fuzzy association rules. The task of
validation becomes fastidious. In order to solve these problems, we propose a new validation
method. Our method is based on three steps. (i) We extract a generic base of non redundant
fuzzy association rules by applying EFAR-PN algorithm based on fuzzy formal concept analysis.
(ii) we categorize extracted rules into groups and (iii) we evaluate the relevance of these rules
using structural equation model.
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAcscpconf
In many applications of data mining, class imbalance is noticed when examples in one class are
overrepresented. Traditional classifiers result in poor accuracy of the minority class due to the
class imbalance. Further, the presence of within class imbalance where classes are composed of
multiple sub-concepts with different number of examples also affect the performance of
classifier. In this paper, we propose an oversampling technique that handles between class and
within class imbalance simultaneously and also takes into consideration the generalization
ability in data space. The proposed method is based on two steps- performing Model Based
Clustering with respect to classes to identify the sub-concepts; and then computing the
separating hyperplane based on equal posterior probability between the classes. The proposed
method is tested on 10 publicly available data sets and the result shows that the proposed
method is statistically superior to other existing oversampling methods.
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHcscpconf
Data collection is an essential, but manpower intensive procedure in ecological research. An
algorithm was developed by the author which incorporated two important computer vision
techniques to automate data cataloging for butterfly measurements. Optical Character
Recognition is used for character recognition and Contour Detection is used for imageprocessing.
Proper pre-processing is first done on the images to improve accuracy. Although
there are limitations to Tesseract’s detection of certain fonts, overall, it can successfully identify
words of basic fonts. Contour detection is an advanced technique that can be utilized to
measure an image. Shapes and mathematical calculations are crucial in determining the precise
location of the points on which to draw the body and forewing lines of the butterfly. Overall,
92% accuracy were achieved by the program for the set of butterflies measured.
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...cscpconf
Smart cities utilize Internet of Things (IoT) devices and sensors to enhance the quality of the city
services including energy, transportation, health, and much more. They generate massive
volumes of structured and unstructured data on a daily basis. Also, social networks, such as
Twitter, Facebook, and Google+, are becoming a new source of real-time information in smart
cities. Social network users are acting as social sensors. These datasets so large and complex
are difficult to manage with conventional data management tools and methods. To become
valuable, this massive amount of data, known as 'big data,' needs to be processed and
comprehended to hold the promise of supporting a broad range of urban and smart cities
functions, including among others transportation, water, and energy consumption, pollution
surveillance, and smart city governance. In this work, we investigate how social media analytics
help to analyze smart city data collected from various social media sources, such as Twitter and
Facebook, to detect various events taking place in a smart city and identify the importance of
events and concerns of citizens regarding some events. A case scenario analyses the opinions of
users concerning the traffic in three largest cities in the UAE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGEcscpconf
The anonymity of social networks makes it attractive for hate speech to mask their criminal
activities online posing a challenge to the world and in particular Ethiopia. With this everincreasing
volume of social media data, hate speech identification becomes a challenge in
aggravating conflict between citizens of nations. The high rate of production, has become
difficult to collect, store and analyze such big data using traditional detection methods. This
paper proposed the application of apache spark in hate speech detection to reduce the
challenges. Authors developed an apache spark based model to classify Amharic Facebook
posts and comments into hate and not hate. Authors employed Random forest and Naïve Bayes
for learning and Word2Vec and TF-IDF for feature selection. Tested by 10-fold crossvalidation,
the model based on word2vec embedding performed best with 79.83%accuracy. The
proposed method achieve a promising result with unique feature of spark for big data.
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTcscpconf
This article presents Part of Speech tagging for Nepali text using General Regression Neural
Network (GRNN). The corpus is divided into two parts viz. training and testing. The network is
trained and validated on both training and testing data. It is observed that 96.13% words are
correctly being tagged on training set whereas 74.38% words are tagged correctly on testing
data set using GRNN. The result is compared with the traditional Viterbi algorithm based on
Hidden Markov Model. Viterbi algorithm yields 97.2% and 40% classification accuracies on
training and testing data sets respectively. GRNN based POS Tagger is more consistent than the
traditional Viterbi decoding technique.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
2. 400 Computer Science & Information Technology ( CS & IT )
CFB/OFB can be design operating without padding with bit-based size keystream output,
CBC/CFB can self sync to avoid channel noise error propagation, and CFB/OFB encryption and
decryption applications need an encryption module only to reach both usages. In addition, only
the forward cipher function of the block cipher algorithm is used in both encryption and
decryption operations, without the need for the inverse cipher function.
A striking example of the degree to which ECB can leave plaintext data patterns in the ciphertext
can be seen when ECB mode is used to encrypt a bitmap image which uses large areas of uniform
colour. While the colour of each individual pixel is encrypted, the overall image may still be
discerned as the pattern of identically-coloured pixels in the original remains in the encrypted
version. Block cipher modes of encryption beside ECB have been suggested to remedy these
drawbacks.
Modern protocols support several operation modes and ciphers to provide the variant choice. For
example SSL and IPSec support multi-cipher and multi-mode [1][2][3].
2. RELATED WORKS
In cryptography, modes of operation is the procedure of enabling the repeated and secure use of a
block cipher under a single key. A block cipher by itself allows encryption only of a single data
block of the cipher's block length. When targeting a variable-length message, the data must first
be partitioned into separate cipher blocks. Typically, the last block must also be extended to
match the cipher's block length using a suitable padding scheme. A mode of operation describes
the process of encrypting each of these blocks, and generally uses randomization based on an
additional input value, often called an initialization vector, to allow doing so safely [4][5].
In the recent research called multi-mode, it cascades operations with the same data block[6] or in
the same session [7]. The related works about Multi-mode and Multi-cipher, we explore Crypto-
coprocessors and Multi-cipher cryptosystem [8][9][10][11]. Multi-cipher and multi-mode
cryptosystems are widely used for hardware acceleration in modern security protocols, such as
SSL and IPsec. NOP-cycle-padding algorithm (NCPA) [11] is one of those reconfigurable
cryptosystems used for hardware acceleration. NOP-cycle-padding algorithm (NCPA) which
enables crypto-coprocessors reconfigured with diverse encrypting bursts to be pipeline scheduled.
Crypto-coprocessor like CryptoManiac (CM) [8] processor is a flexible crypto-coprocessor which
supports multiple cipher algorithms and multi-mode operations. Research [7] introduces a multi-
cipher cryptosystem (MCC) which enables a cryptosystem to use multiple cipher algorithms
concurrently in a session of communication. The implementation of a sample MCC is introduced
in this paper using Field Programmable Gate Array (FPGA). Here refers to a multi-mode of
operation, the kind of the internal structure of the cryptographic module design considerations for
a specific circuit. For example, [10] is a fast pipelined multi-mode DES architecture operating in
IP representation.
3. THE UNIFIED OPERATION STRUCTURE
A block cipher by itself allows encryption only of a single data block of the cipher's block length.
For a variable-length message, the data must first be partitioned into separate cipher blocks. In the
simplest case, known as the electronic codebook (ECB) mode, and then each block is encrypted
and decrypted independently. There are several common and popular block modes of operation
like CBC, CFB , OFB, etc.
In the popular cipher block chaining (CBC) mode, for encryption to be secure the initialization
vector passed along with the plaintext message must be a random or pseudo-random value, which
3. Computer Science & Information Technology ( CS & IT ) 401
is added in an exclusive-or manner to the first plaintext block before it is being encrypted. The
resultant ciphertext block is then used as the new initialization vector for the next plaintext block.
In the cipher feedback (CFB) mode, which emulates a self-synchronizing stream cipher, the
initialization vector is first encrypted and then added to the plaintext block. The output feedback
(OFB) mode repeatedly encrypts the initialization vector to create a key stream for the emulation
of a synchronous stream cipher.
If users want to combine one more mode to archive multi-mode performance, they must prepare
several feedbacks to suit any one of the target mode needed. This is because people must hold
several data for a proper feedback usage. For example, a user must prepare the current ciphertext
data block feedbacks in operating the CBC mode.
How about solving the feedback problem? We use four buffers to hold the previous period, i.e.
block cycle, parameters: previous input α of UOS, previous output β of UOS, previous inter-input
W of cipher, previous inter-output X of a cipher. Especially in encryption, the previous output of
UOS can be retrieved from ciphertext sequence, so that we do not buffer it. Therefore all the four
buffers can reduce to three buffers. Because of the three buffers, we solved the feedback problem.
The W is inter-input of cipher module and the X is an inter-output of cipher module. The previous
output of UOS is ciphertext in encryption used for CBC and CFB. The previous inter-output of a
cipher is au output feedback used for OFB.
Figure 1. The proposed novel multi-mode structure
parameters:
α previous input of UOS
β previous output of UOS
W previous inter-iuput of cipher
X previous inter-output of cipher
holding the previous period information
( )
( ) baE
ba,,f
⊕⊕=
=
α
αβ
K
( )
( ) baD
ba,,f -1
⊕⊕=
=
α
αβ
K
When ECB/CBC/CFB/OFB encryption When ECB/CBC decryption
CFB/OFB decryption
CBC-MAC
4. 402 Computer Science & Information Technology ( CS & IT )
Table 1. The Parameters for Proposed UOS
Operation
ModeApp
Cipher
module
α β a b
Schematic
diagram
ECBe Ciphere Pi Ci 0 0 Fig 2.(a)
ECBd Cipherd Ci Pi 0 0 Fig 2.(b)
CBCe Ciphere Pi Ci Ci-1 0 Fig 3.(a)
CBCd Cipherd Ci Pi 0 Ci-1 Fig 3.(b)
CFBe Ciphere 0 Ci Ci-1 Pi Fig 4.(a)
CFBd Ciphere 0 Pi Ci-1 Ci Fig 4.(b)
OFBe Ciphere 0 Ci Xi-1 Pi Fig 5.(a)
OFBd Ciphere 0 Pi
Xi-1
/
Wi-1*
Ci Fig 5.(b)
CBC-MAC Ciphere Pn tag Cn-1 0 Fig 6.
P.S. The mask means ciphers with decryption function especially
4. PARTIAL OPERATIONS WITH STANDARD
Several so-called block cipher modes of operation have been designed and specified in national
recommendations such as NIST 800-38A and international standards such as ISO/IEC 10116
[4][12].
5. Computer Science & Information Technology ( CS & IT ) 403
4.1. Electronic CodeBook (ECB) mode
The simplest of the encryption modes is the electronic codebook mode. The message is divided
into blocks and each block is encrypted separately. The disadvantage of this method is that
identical plaintext blocks are encrypted into identical ciphertext blocks; thus, it does not hide data
patterns well. In some senses, it doesn't provide serious message confidentiality, and it is not
recommended for use in cryptographic protocols at all.
ECB mode can also make protocols without integrity protection even more susceptible to replay
attacks, since each block gets decrypted in exactly the same way. For example, the Phantasy Star
Online: Blue Burst online video game uses Blowfish in ECB mode. Before the key exchange
system was cracked leading to even easier methods, cheaters repeated encrypted "monster killed"
message packets, each an encrypted Blowfish block, to illegitimately gain experience points
quickly.
( )
( )
( )i
i
PE
00PE
ba,,f
K
K
=
⊕⊕=
= αβ
(a) Encryption application
( )
( )
( )i
i
-1
CD
00CD
ba,,f
K
K
=
⊕⊕=
= αβ
P’
(b) Decryption application
Figure 2. Electronic CodeBook mode
6. 404 Computer Science & Information Technology ( CS & IT )
4.2. Cipher Block Chaining (CBC) mode
Cipher block chaining is a block cipher mode that provides confidentiality but not message
integrity in cryptography. Cipher block chaining mode of operation was invented by IBM in 1976
[13]. In CBC mode, each block of plaintext is XORed with the previous ciphertext block before
being encrypted. This way, each ciphertext block is dependent on all plaintext blocks processed
up to that point. Also, to make each message unique, an initialization vector must be used in the
first block.
CBC has been the most commonly used mode of operation. Its main drawbacks are that
encryption is sequential (i.e., it cannot be parallelized), and that the message must be padded to a
multiple of the cipher block size. One way to handle this last issue is through the method known
as ciphertext stealing. Note that a one-bit change in a plaintext affects all following ciphertext
blocks.
( )
( ) 0CPE
ba,,f
1-ii ⊕⊕=
=
K
αβ
(a) Encryption application
( )
( )
( ) 1-ii
1-ii
CCD
CCD
ba,,f
⊕=
⊕⊕=
=
K
K
αβ
P’
(b) Decryption application
Figure 3. Cipher Block Chaining mode
7. Computer Science & Information Technology ( CS & IT ) 405
Decrypting with the incorrect previous ciphertext block causes the current block of plaintext to be
corrupt but subsequent plaintext blocks will be correct. This is because a plaintext block can be
recovered from two adjacent blocks of ciphertext. As a consequence, decryption can be
parallelized. Note that a one-bit change to the ciphertext causes complete corruption of the
corresponding block of plaintext, and inverts the corresponding bit in the following block of
plaintext, but the rest of the blocks remain intact.
4.3. Cipher FeedBack (CFB) mode
The cipher feedback mode is a confidentiality mode that features the feedback of successive
ciphertext segments into the input blocks of the forward cipher to generate output blocks that are
exclusive-ORed with the plaintext to produce the ciphertext, and vice versa.
( )
( )
( ) i1-i
i1-i
PCE
PC0E
ba,,f
⊕=
⊕⊕=
=
K
K
αβ
(a) Encryption application
( )
( )
( ) i1-i
i1-i
CCE
CC0E
ba,,f
⊕=
⊕⊕=
=
K
K
αβ
P’
(b) Decryption application
Figure 4. Cipher FeedBack mode.
8. 406 Computer Science & Information Technology ( CS & IT )
Here, a plaintext block is enciphered by being XORed to the encryption module of the previous
ciphertext block. The process is repeated with the successive input blocks until a ciphertext
segment is produced from every plaintext segment. In general, each successive input block is
enciphered to produce an output block.
In CFB encryption, like CBC encryption, the input block to each forward cipher function depends
on the result of the previous forward cipher function; therefore, multiple forward cipher
operations cannot be performed in parallel. In CFB decryption, the required forward cipher
operations can be performed in parallel if the input blocks are first constructed (in series) from the
ciphertext [14].
4.4. Output Feedback (OFB) Mode
One other mode among those originally suggested for use was Output Feedback Mode: this mode
encrypted an initial value with DES, and then the result of the encryption was encrypted again
repeatedly. The resulting values were used as a keystream to XOR with messages.
The Output Feedback (OFB) mode is a confidentiality mode that features the iteration of the
forward cipher on an IV to generate a sequence of output blocks that are exclusive-ORed with the
plaintext to produce the ciphertext, and vice versa. The OFB mode requires that the IV is a nonce,
i.e., the IV must be unique for each execution of the mode under the given key; In OFB
encryption, the IV is transformed by the forward cipher function to produce the first output block.
The first output block is exclusive-ORed with the first plaintext block to produce the first
ciphertext block. The forward cipher function is then invoked on the first output block to produce
the second output block. The second output block is exclusive-ORed with the second plaintext
block to produce the second ciphertext block, and the forward cipher function is invoked on the
second output block to produce the third output block. Thus, the successive output blocks are
produced by applying the forward cipher function to the previous output blocks, and the output
blocks are exclusive-ORed with the corresponding plaintext blocks to produce the ciphertext
blocks.
( )
( )
( ) i1-i
i1-i
PXE
PX0E
ba,,f
⊕=
⊕⊕=
=
K
K
αβ
(a) Encryption application
9. Computer Science & Information Technology ( CS & IT ) 407
( )
( )
( ) i1-i
i1-i
CXE
CX0E
ba,,f
⊕=
⊕⊕=
=
K
K
αβ
P’
*1: When previous mode change is OFB or CFB
E-function
Decryption*2
Ciphertext
( )
( )
( ) i1-i
i1-i
CWE
CW0E
ba,,f
⊕=
⊕⊕=
=
K
K
αβ
Wi-1
0
Ci
Xi
P’
Wi-1
*2: When previous mode change is ECB or CBC
(b) Decryption application
Figure 5. Output FeedBack mode
In OFB decryption, the IV is transformed by the forward cipher function to produce the first
output block. The first output block is exclusive-ORed with the first ciphertext block to recover
the first plaintext block. The first output block is then transformed by the forward cipher function
to produce the second output block. The second output block is exclusive-ORed with the second
ciphertext block to produce the second plaintext block, and the second output block is also
transformed by the forward cipher function to produce the third output block. Thus, the
successive output blocks are produced by applying the forward cipher function to the previous
output blocks, and the output blocks are exclusive-ORed with the corresponding ciphertext blocks
to recover the plaintext blocks.
10. 408 Computer Science & Information Technology ( CS & IT )
4.5. Cipher Block Chaining Message Authentication Code (CBC-MAC)
A cipher block chaining message authentication code (CBC-MAC) is a technique for constructing
a message authentication code from a block cipher. The message is encrypted with some block
cipher algorithm in CBC mode to create a chain of blocks such that each block depends on the
proper encryption of the previous block. This interdependence ensures that a change to any of the
plaintext bits will cause the final encrypted block to change in a way that cannot be predicted or
counteracted without knowing the key to the block cipher.
To calculate the CBC-MAC of message one encrypts in CBC mode with zero initialization
vector. The following figure sketches the computation of the CBC-MAC of a message comprising
P1||P2||P3||..||Pn using a secret key K and a block cipher E():
( )
( ) 0CPE
1-nto1=i,ba,,fC
1-ii
i
⊕⊕=
=
K
forα
( )
( ) 0CPE
ba,,f
1-nn ⊕⊕=
=
K
tag α
Figure 6. Cipher Block Chaining Message Authentication Code.
The simple CBC-MAC operation uses CBC encryption, just CBC-MAC outputs of UOS are the
through passed plaintext block from the first divided message block to the end. A tag only goes
behind the whole message with Cn as the message authentication code, i.e. an integrity check
value.
5. Mode Selecting Scheme and Operating Simulation
We design three schemes for mode selecting, and then using the second scheme, normal change,
to perform an operating simulation in this chapter.
5.1. Mode Selecting Schemes
We define that current mode exchange depends on the two choice bits of last plaintext. For
example, if the choice bits are 012, then we choose the current mode exchange to CBC mode.
Therefore 002 means ECB, 012 means CBC, 102 means CFB and 112 means OFB choice.
Each proposed change mechanism is using 2 bits choice related from the last block plaintext
message before current block operating. The mode change depends on 2-bit choice S, i.e. S0S1.
11. Computer Science & Information Technology ( CS & IT ) 409
5.1.1. Easy Change Scheme
Easy change is using 2 bits plaintext from the previous block plaintext message before
current block operating. We define that current mode exchange depends on the
msb./lsb./middle two bits of last plaintext. The mode change is depended on partial 2-bits
message.
S=(S0S1)=filter(Pi-1)
=MSB2-bit
(Pi-1) or LSB2-bit
(Pi-1) or MID2-bit
(Pi-1) (1)
5.1.2. Normal Change Scheme
This scheme uses two parity check bits, one is from all odd positions sequence and the
other is from all even positions sequence. It can make a simple related effect. If changing
any one bit then infecting effect the current block and behind operating.
S=(S0S1)
S0=fodd
(Pi-1)=Parity (Pi-1
odd
)
S1=feven
(Pi-1)= Parity (Pi-1
even
) (2)
5.1.3. Hash Change Scheme
We improve the normal change by hash functions to instead of parity check functions. This
brings hard scrambled performance but an extra cost of the resource.
S=(S0S1)=f(Pi-1)=hash2-bit
(Pi-1)
=LSB2-bit
( MD5(Pi-1) )or LSB2-bit
( SHA-1(Pi-1) ) (3)
5.2. Operating Simulation
According to the low-resource environment, we suggest using the easy change scheme in cloud
computing. Here we perform an operating simulation with the easy change scheme in the
following. The detail descriptions of one-by-one steps are in the appendix.
Table 2. The Parameters for UOS Simulation
Cipher: AES
Key: 12121212121212123434343434343434
IVs: 00000000000000000000000000000000
Plaintext:
00000000000000000000000000000010
00000000000000000000000000000011
00000000000000000000000000000001
11111111111111111111111111111111
…………………………………………
Ciphertext:
1F8300022FAD7840E51D265C9A1B663F
8EC78F4182557DEE3461681A3061D901
644A48DCC8CB017482399212A5164471
4B095F7288862F4FD4D8F7BFDD18131B
…………………………………………
12. 410 Computer Science & Information Technology ( CS & IT )
7. CONCLUSIONS
In this paper, a novel structure, called unified operation structure (UOS), is proposed. The
technique uses possible options to satisfy any next one of all feedbacks so that UOS can perform
several modes of operation. It is easier to provide multi modes of operation and suit for any kinds
of block ciphers. We design three schemes for mode selecting and then use the normal change
scheme to perform an operating simulation according to the low-resource environment in Cloud
Computing. Our contribution reduces the cost of resource for multi mode implementation and
support continuous mode change application. It provides low-resource hardware implementation
of a common solution for multi-mode. It is proper to ubiquitous computing devices such as a
sensor mote or an RFID tag.
REFERENCES
[1] IPSec Working Group.
http://www.ietf.org/html.charters/ipseccharter.html
[2] OpenSSL.
http://etutorials.org/Programming/secure+programming/Chapter+5.+Symmetric+Encryption/5.17+Per
forming+Block+Cipher+Setup+for+CBC+CFB+OFB+and+ECB+Modes+in+OpenSSL/
[3] SSL 3.0 Specification. http://wp.netscape.com/eng/ssl3/
[4] National Institute of Standards and Technology (NIST), NIST. gov - Computer Security Division -
Computer Security Resource Center, “Recommendation of block cipher security methods and
Techniques,” NIST SP800-38.
[5] Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone (1996). Handbook of Applied
Cryptography. CRC Press. ISBN 0-8493-8523-7.
[6] E. Biham, (1998) “Cryptanalysis of multiple modes of operation,” J. Cryptology, Vol. 11, No. 1, pp.
45-58.
[7] Chung-Ping Young, Yen-Bor Lin & Chung-Chu Chia, (2009) “Software and Hardware Design of a
Multi-cipher Cryptosystem,” Proc. IEEE TENCON 2009, Singapore.
[8] Lisa Wu, Chris Weaver, and Todd Austin, (2001) “CryptoManiac: A Fast Flexible Architecture for
Secure Communication,” Proc. IEEE Int. Symp. Comput. Archit., pp. 110–119.
[9] S. Laovs, A. Priftis, P. Kitsos, and O. Koufopavlou, (2003) “Reconfigurable crypto process design of
encryption algorithms operation modes methods and FPGA integration,” Proc. IEEE Int. Conf.
MWSCAS, pp. 811–814.
[10] S. Guilley, P. Hoogvorst, and R. Pacalet, (2007) “A Fast Pipelined Multi-Mode DES Architecture
Operating in IP Representation,” The VLSI Journal, Vol. 40, No. 4, pp.479-489.
[11] Young, C.-P., (2008) “NCPA: A Scheduling Algorithm for Multi-cipher and Multi-mode
Reconfigurable Cryptosystem,” Proc. IEEE International Conference on Intelligent Information
Hiding and Multimedia Signal Processing), Harbin, China.
[12] International Organization for Standardization (ISO), “Information Technology-Security Techniques-
Modes of Operation for. an n-bit Block Cipher,” ISO/IEC 10116, 1997.
[13] William F. Ehrsam, Carl H. W. Meyer, John L. Smith, Walter L. Tuchman, (1976) “Message
verification and transmission error detection by block chaining,” US Patent 4074066.
[14] H. M. Heys, (2003) “Analysis of the Statistical Cipher Feedback Mode of Block Ciphers,” IEEE
Transactions on Compuiters, Vol. 52, No. 1.
APPENDIX A
Simulation case of sector 5.2, especially marking OFB and then CBC.
People can download the simulation program to verify the results.
(http://dl.dropbox.com/u/54967925/UOS_Win32.exe or
http://dl.dropbox.com/u/54967925/UOS_x64.exe, it is suitable for OS: Windows 2000/XP
Pro./Vista/7 but not Windows XP Home Edition )
A.(1) OFB Encryption and Decryption Applications
13. Computer Science & Information Technology ( CS & IT ) 411
( )
( )
( ) i1-i
i1-i
PXE
PX0E
ba,,f
⊕=
⊕⊕=
=
K
K
αβ
( )
( )
( ) i1-i
i1-i
CXE
CX0E
ba,,f
⊕=
⊕⊕=
=
K
K
αβ
14. 412 Computer Science & Information Technology ( CS & IT )
A. (2) CBC Encryption and Decryption Applications
( )
( ) 0CPE
ba,,f
1-ii ⊕⊕=
=
K
αβ
( )
( )
( )1-ii
1-ii
-1
CCD
0CCD
ba,,f
⊕=
⊕⊕=
=
K
K
αβ