Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection
|
|
- Morgan Marcus Mitchell
- 5 years ago
- Views:
Transcription
1 Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection Sung-Ming Yen 1 and Dongryeol Kim 2 1 Dept of Computer Science and Information Engineering National Central University, Taiwan, ROC 2 Information Security Policy Division Korea Information Security Agency, Korea 1
2 Outline : 1. Preliminary Background of CRT-based Cryptanalysis 2. Review: Two CRT-based RSA Computation Based on Fault Infection 3. Cryptanalysis of CRT-based RSA with Fault Infection 4. Conclusions 2
3 1. Introduction and Preliminary Background RSA speedup with CRT CRT-based fault attack 3
4 RSA Speedup with CRT RSA speedup based on CRT: Given p, q, (n=p*q), d, and m, S=m d mod n can be sped up by s p =(m mod p) d mod (p-1) mod p s q =(m mod q) d mod (q-1) mod q Gauss s CRT recombination S=CRT(s p, s q ) [(s p q (q -1 mod p)+s q p (p -1 mod q)] mod n = [s p X p + s q X q ] mod n Garner s CRT recombination S=CRT(s p, s q ) s q + [(s p -s q ) (q -1 mod p) mod p] q 4
5 CRT-based Fault Attack Fault attack on the computation of s p & s q Given a faulty result of S =CRT(s p, s q ) q=gcd((s e - m) mod n, n) Random error Random error s p CRT S s q 5
6 Shamir s Countermeasure Shamir s countermeasure (extend modulus then reduce modulus) s pr =m pr d pr mod pr d s qr =m qr qr mod qr where m pr = m mod pr & d pr = d mod ψ(pr) and r is a random prime. Output S only if (s pr mod r) = (s qr mod r) S=CRT(s p, s q ) =CRT(s pr mod p, s qr mod q) 6
7 Other possible countermeasures: (All need and strictly depend on the reliability of a comparison operation!) Compute S twice and compare the results Given S = m d mod n, verify whether m?= S e mod n 7
8 Attack on Shamir s Method Possible attacks on the Zero flag! Implementation of checking (s pr mod r) =? (s qr mod r) Implementation of a?= b SUB a,b (or CMP a,b) JZ (jump if zero) It highly depends on the zero flag! 8
9 Another reported CRT-based attack The main weakness: It s assumed that correctness of s pr and s qr implies the correctness of both s p and s q where s p = s pr mod p possibly s p <-- s pr mod p The checking of whether (s pr mod r) =? (s qr mod r) cannot detect the error in s p 9
10 Importance of CRT-based Attack It has already been widely employed But a single fault total break down False alarm attack on RSA+CRT may be initiated by any malicious attacker Denial of service attack So, any potential CRT-based attack should be carefully considered 10
11 2. Review: Two CRT-based RSA Computation Based on Fault Infection No fault-free decision procedure will be assumed in the countermeasure! 11
12 Fault Infective CRT Speedup No checking procedure will be assumed that should be fault free When a random error occurred in s p (or s q ) it will influence computation of s q (or s p ) or the overall computation of S (for example CRT(s p, s q ) or CRT(s p, s q ) is not accessible) 12
13 The CRT-1 Protocol Parameter selection: n=p q (usual key pair e & d=e -1 modψ(n)) additional key pair e r & d r =e r -1 modψ(n) d r =d r (r is a small integer) 13
14 The protocol: Compute k p = m/p & k q = m/q where x means floor function Compute m d r mod n with CRT speedup s p =A d r mod (p-1) mod p where A=m mod p s q = d r mod (p-1) mod q e where  = ((s r p mod p)+k p p) mod q Based on CRT S=CRT(s p, s q ) (à r ) mod n e where Ã=(s r q mod q)+k q q 14
15 If the computation is fault free: Message reconstruction 1: s q = d r mod (p-1) mod q e where  = ((s r p mod p)+k p p) mod q = m mod q Message reconstruction 2: S=CRT(s p, s q ) (à r ) mod n e where Ã=(s r q mod q)+k q q =m 15
16 The CRT-2 Protocol Parameter selection: n=p q (usual key pair e & d=e -1 modψ(n)) additional key pair e r & d r =e r -1 modψ(n) d r =d r (r is a small integer) 16
17 The protocol: Compute k p = m/p & k q = m/q Compute m d r mod n with CRT speedup s p =A d r mod (p-1) mod p where A=m mod p s q =A d r mod (p-1) mod q Based on CRT S=CRT(s p, s q ) (Â r ) mod n where Â= (m 1 +m 2 )/2 e m 1 =(s r p mod p)+k p p m 2 =(s q e r mod q)+k q q 17
18 If the computation is fault free: Message reconstruction: S=CRT(s p, s q ) (Â r ) mod n where Â= (m 1 +m 2 )/2 e m 1 =(s r p mod p)+k p p =m m 2 =(s q e r mod q)+k q q =m 18
19 3. Cryptanalysis of CRT-based RSA with Fault Infection Exploiting faults that usual CRT-based attack did not consider 19
20 Attack Exploiting Fault on Temporary Parameters Attacks exploit faults that usual CRT-based attack did not consider Exploiting faults on temporary parameters that usual CRT speedup does NOT required It has been overlooked previously 20
21 Attack on CRT-1 Protocol In the CRT-1 protocol: Suppose k p, s p, and s q are correct but k q becomes incorrect (when computed or accessed) k q --> k q We got S =m d +R*q mod n (R: random integer) leads to q=gcd((s e - m), n) It can be proven that fault on k p disables the above attack 21
22 Attack on CRT-2 Protocol In the CRT-2 protocol: Suppose k p, s p, and s q are correct but k q becomes incorrect (when computed or accessed) k q --> k q We got S =m d +R*q mod n (R: random integer) leads to q=gcd((s e - m), n) Fault on k p leads to p=gcd((s e - m), n) 22
23 4. Conclusions 23
24 24 Basic consideration: Do not make unreasonable assumption, e.g., all the checking operations are error free Important thing to remind again: Be careful about all CRT-based attack Explicit fault/attack Implicit fault/attack The false alarm attack may lead to the DoS attack One technical issue to notice: More checking operations being used will lead to a less reliable countermeasure Open problem: Is error free checking operation necessary? More research is still necessary
Fault Analysis of Stream Ciphers
Fault Analysis of Stream Ciphers Jonathan J. Hoch and Adi Shamir Department of Computer Science and Applied Mathematics, The Weizmann Institute of Science, Israel Abstract. A fault attack is a powerful
More informationCryptanalysis of LILI-128
Cryptanalysis of LILI-128 Steve Babbage Vodafone Ltd, Newbury, UK 22 nd January 2001 Abstract: LILI-128 is a stream cipher that was submitted to NESSIE. Strangely, the designers do not really seem to have
More informationAn Introduction to Cryptography
An Introduction to http://www.southernct.edu/~fields/ Terminology is the study of secret writing. This is the only branch of mathematics to be designated by the U.S. government as export-controlled. Cryptographic
More informationCRYPTOGRAPHY. Sharafat Ibn Mollah Mosharraf TOUCH-N-PASS EXAM CRAM GUIDE SERIES. Special Edition for CSEDU. Students CSE, DU )
Special Edition for CSEDU Students TOUCH-N-PASS EXAM CRAM GUIDE SERIES CRYPTOGRAPHY Prepared By Sharafat Ibn Mollah Mosharraf CSE, DU 12 th Batch (2005 2005-2006 2006) Table of Contents CHAPTER 1: INTRODUCTION
More informationREVISIONS LTR DESCRIPTION DATE APPROVED - Initial Release 11/5/07 MDB A ECR /9/08 MDB
REVISIONS LTR DESCRIPTION DATE APPROVED - Initial Release 11/5/07 MDB A ECR 8770 4/9/08 MDB CONTRACT NO. DRAWN BY CHECKED BY APPROVED BY DATE P. Phillips 11/2/07 TITLE M. Bester 11/5/07 SIZE A 2120 Old
More informationPseudorandom bit Generators for Secure Broadcasting Systems
+00? IE.Nfejb~lV 4 Pseudorandom bit Generators for Secure Broadcasting Systems Chung-Huang Yang m Computer & Communication Research Laboratories Industrial Technology Research Institute Chutung, Hsinchu
More informationFault Analysis of Stream Ciphers
Fault Analysis of Stream Ciphers M.Sc. Thesis Ya akov Hoch yaakov.hoch@weizmann.ac.il Advisor: Adi Shamir Weizmann Institute of Science Rehovot 76100, Israel Abstract A fault attack is a powerful cryptanalytic
More informationReducing IPTV Channel Zapping Time Based on Viewer s Surfing Behavior and Preference
Reducing IPTV Zapping Time Based on Viewer s Surfing Behavior and Preference Yuna Kim, Jae Keun Park, Hong Jun Choi, Sangho Lee, Heejin Park, Jong Kim Dept. of CSE, POSTECH Pohang, Korea {existion, ohora,
More informationExample the number 21 has the following pairs of squares and numbers that produce this sum.
by Philip G Jackson info@simplicityinstinct.com P O Box 10240, Dominion Road, Mt Eden 1446, Auckland, New Zealand Abstract Four simple attributes of Prime Numbers are shown, including one that although
More informationSequences and Cryptography
Sequences and Cryptography Workshop on Shift Register Sequences Honoring Dr. Solomon W. Golomb Recipient of the 2016 Benjamin Franklin Medal in Electrical Engineering Guang Gong Department of Electrical
More informationCASE HISTORY#3 COOLING TOWER GEARBOX BEARING FAULT. Barry T. Cease Cease Industrial Consulting
CASE HISTORY#3 COOLING TOWER GEARBOX BEARING FAULT Barry T. Cease Cease Industrial Consulting ceasevibration@icloud.com (843) 200-9705 1 COOLING TOWER GEARBOX BEARING FAULT A series of ten cooling tower
More informationLogical Fallacies. Good or Bad?
Logical Fallacies Good or Bad? Period 4 Class Discussion What did you learn? 1. The fallacies used in act 3 attacked the personalities of the characters instead of the positions or arguments being said
More informationXYZ Cinemas - ecna Configuration 12/12/2013 Table of Contents
Table of Contents 1. Overview 2. ecna Control Panel 3. Start of Day Logic 4. Preshow Start and Lamp Control Logic 5. Show Start Logic 6. Lamp Control Logic 7. Show End Early Logic 8. Show End Logic 9.
More information10G E-PON ONU PR-30 Transceiver (20km)
10G E-PON ONU PR-30 Transceiver (20km) P2757-64D20-RSP Features 10G/10G E-PON ONU PR-30 SFP+ BIDI SC/UPC 1270nm Burst Mode Transmitter with DFB Laser 1577nm Continuous Mode Receiver with APD-TIA Up to
More informationStream Cipher. Block cipher as stream cipher LFSR stream cipher RC4 General remarks. Stream cipher
Lecturers: Mark D. Ryan and David Galindo. Cryptography 2015. Slide: 90 Stream Cipher Suppose you want to encrypt a stream of data, such as: the data from a keyboard the data from a sensor Block ciphers
More informationCost Analysis of Integrated Terminal Mobility and Personal Mobility Managements in Mobile Communication Networks
Cost Analysis of Integrated Terminal Mobility and Personal Mobility Managements in Mobile Communication Networks Yun Won Chung, Min Young Chung, and Dan Keun Sung E-mail : ywchung@ieee.org Dept. of EECS
More information1 Introduction Steganography and Steganalysis as Empirical Sciences Objective and Approach Outline... 4
Contents 1 Introduction... 1 1.1 Steganography and Steganalysis as Empirical Sciences... 1 1.2 Objective and Approach... 2 1.3 Outline... 4 Part I Background and Advances in Theory 2 Principles of Modern
More informationA High-Resolution Flash Time-to-Digital Converter Taking Into Account Process Variability. Nikolaos Minas David Kinniment Keith Heron Gordon Russell
A High-Resolution Flash Time-to-Digital Converter Taking Into Account Process Variability Nikolaos Minas David Kinniment Keith Heron Gordon Russell Outline of Presentation Introduction Background in Time-to-Digital
More informationInstallation & Operation Manual. BEC PM1 Controller Time/Flow/Volume Controller. Water Control Solutions
Installation & Operation Manual BEC PM1 Controller Time/Flow/Volume Controller Water Control Solutions Table of Contents Introduction 4 Chapter 1 Technical Data and I/O Connections 6 DC Solenoid 6 Power
More informationContents INFORMATION FLOW TRACK - TRAIN
2017-05-12 3. INFORMATION FLOW TRACK-TRAIN Page 1 (159) Chapter 3: INFORMATION FLOW TRACK - TRAIN Contents 3. INFORMATION FLOW TRACK - TRAIN 5 3.1 INTRODUCTION 5 3.1.1 Scope 5 3.2 INFORMATION FLOW TRACK
More informationDesign for Test. Design for test (DFT) refers to those design techniques that make test generation and test application cost-effective.
Design for Test Definition: Design for test (DFT) refers to those design techniques that make test generation and test application cost-effective. Types: Design for Testability Enhanced access Built-In
More informationCryptography CS 555. Topic 5: Pseudorandomness and Stream Ciphers. CS555 Spring 2012/Topic 5 1
Cryptography CS 555 Topic 5: Pseudorandomness and Stream Ciphers CS555 Spring 2012/Topic 5 1 Outline and Readings Outline Stream ciphers LFSR RC4 Pseudorandomness Readings: Katz and Lindell: 3.3, 3.4.1
More informationNotes Generator Verification SDT Project
Notes Generator Verification SDT Project 2007-09 FERC Office 888 First Street, NE Washington, DC 20426 1. Administration a. The following were in attendance: Bob Snow, Cynthia Pointer, Lim Hansen, Keith
More informationCable Certification. General Testing Criteria (Applies to all cable certification testing) Attachment E Cable Certification
General Testing Criteria (Applies to all cable certification testing) 1. RCIT reserves the right to be present during any or all cable testing procedures. The Contractor shall obtain authorization from
More informationSequencing. Lan-Da Van ( 范倫達 ), Ph. D. Department of Computer Science National Chiao Tung University Taiwan, R.O.C. Fall,
Sequencing ( 范倫達 ), Ph. D. Department of Computer Science National Chiao Tung University Taiwan, R.O.C. Fall, 2013 ldvan@cs.nctu.edu.tw http://www.cs.nctu.edu.tw/~ldvan/ Outlines Introduction Sequencing
More informationProduct Specification. RoHS-6 Compliant 10Gb/s 10km XFP Optical Transceiver FTLX1412M3BCL
Product Specification RoHS-6 Compliant 10Gb/s 10km XFP Optical Transceiver FTLX1412M3BCL PRODUCT FEATURES Supports 9.95Gb/s to 11.3Gb/s bit rates Power dissipation
More information10Gb/s 40km DWDM XFP Optical Transceiver
10Gb/s 40km DWDM XFP Optical Transceiver PRODUCT FEATURES Hot-pluggable XFP footprint Supports 9.95Gb/s to 11.3Gb/s bit rates Supports Lineside and XFI loopback RoHS-6 Compliant (lead-free) Power dissipation
More informationTesting Digital Systems II
Testing Digital Systems II Lecture 5: Built-in Self Test (I) Instructor: M. Tahoori Copyright 2010, M. Tahoori TDS II: Lecture 5 1 Outline Introduction (Lecture 5) Test Pattern Generation (Lecture 5) Pseudo-Random
More informationFrom Theory to Practice: Private Circuit and Its Ambush
Indian Institute of Technology Kharagpur Telecom ParisTech From Theory to Practice: Private Circuit and Its Ambush Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger and Debdeep Mukhopadhyay
More informationLFSR stream cipher RC4. Stream cipher. Stream Cipher
Lecturers: Mark D. Ryan and David Galindo. Cryptography 2016. Slide: 89 Stream Cipher Suppose you want to encrypt a stream of data, such as: the data from a keyboard the data from a sensor Block ciphers
More information10G/1G E-PON ONU SFP+ Bidi Optical Transceiver (20km) P3157-8D20-RSP
10G/1G E-PON ONU SFP+ Bidi Optical Transceiver (20km) P3157-8D20-RSP Features 10G / 1G E-PON ONU SFP+ 1310nm Burst Mode Transmitter with DFB Laser 1577nm Continuous Mode Receiver with APD-TIA Up to 20km
More informationNew Address Shift Linear Feedback Shift Register Generator
New Address Shift Linear Feedback Shift Register Generator Kholood J. Moulood Department of Mathematical, Tikrit University, College of Education for Women, Salahdin. E-mail: khmsc2006@yahoo.com. Abstract
More informationApplying Models in your Testing Process
Applying Models in your Testing Process Steven Rosaria Harry Robinson Intelligent Search Test Group Microsoft Corporation srosaria@microsoft.com harryr@microsoft.com Abstract Model-based testing allows
More informationSigma 1 - Axis Servo Motor and Cables - Troubleshooting Guide
LAST UPDATED: 12/21/2018 Introduction Press [POWER OFF]. Set the main circuit breaker to the OFF position. Wait until the high voltage LED on the vector drive is completely off before disconnecting any
More informationRelease Notes. Multi-Band EPI C2P. Release February 2013
Release Notes Multi-Band EPI C2P Release 008 13 February 2013 Installation 1. Restart the system (reboot host and MRIR) 2. Extract the.zip file to a temporary directory 3. Run the installer.bat file 4.
More informationOutline. Why do we classify? Audio Classification
Outline Introduction Music Information Retrieval Classification Process Steps Pitch Histograms Multiple Pitch Detection Algorithm Musical Genre Classification Implementation Future Work Why do we classify
More informationRYKO Italia s.r.l. V. Casale Morano Po (Al) t f
Italia RYKO Italia s.r.l. V. Casale 43-15025 Morano Po (Al) t.0142 494411 f. 85872 June 30, 2003 ITALIA SERVICE BULLETIN - # 4-013 VFD parameter settings for conveyor equipment with Mitsubishi PLC MACHINES
More informationFORENSIC CASEBOOK. By Bob Huddleston, Eastman Chemical Co. One of the most common. reasons for marriage failure
The Case of the Energized Cable Cutting Incident How miscommunication leads to an electrical helper slicing through live 13.8kV cable and miraculously walking away to tell about it By Bob Huddleston, Eastman
More informationMarks and Grades Project
Marks and Grades Project This project uses the HCS12 to allow for user input of class grades to determine the letter grade and overall GPA for all classes. Interface: The left-most DIP switch (SW1) is
More informationRealizing Waveform Characteristics up to a Digitizer s Full Bandwidth Increasing the effective sampling rate when measuring repetitive signals
Realizing Waveform Characteristics up to a Digitizer s Full Bandwidth Increasing the effective sampling rate when measuring repetitive signals By Jean Dassonville Agilent Technologies Introduction The
More informationAutomatic Commercial Monitoring for TV Broadcasting Using Audio Fingerprinting
Automatic Commercial Monitoring for TV Broadcasting Using Audio Fingerprinting Dalwon Jang 1, Seungjae Lee 2, Jun Seok Lee 2, Minho Jin 1, Jin S. Seo 2, Sunil Lee 1 and Chang D. Yoo 1 1 Korea Advanced
More informationKAMIENIEC. analog resonant phase rotator. Model of operator s manual rev. 1977/1.0
KAMIENIEC analog resonant phase rotator operator s manual rev. 1977/1.0 Model of 1977 module explained 20 SALUT Thank you for purchasing this Xaoc Devices product. Kamieniec is an analog signal processing
More informationSequential Logic Counters and Registers
Sequential Logic ounters and Registers ounters Introduction: ounters Asynchronous (Ripple) ounters Asynchronous ounters with MOD number < 2 n Asynchronous Down ounters ascading Asynchronous ounters svbitec.wordpress.com
More informationBlack and Frozen Frame Detection
Black and Frozen Frame Detection WFM6120/7020/7120 & WVR6020/7020/7120 Version 5.0.2 Software How To Guide How To Guide Figure 1. Input Monitor Mode Configuration. What is Black and Frozen Frame Detection?
More informationAnalysis of local and global timing and pitch change in ordinary
Alma Mater Studiorum University of Bologna, August -6 6 Analysis of local and global timing and pitch change in ordinary melodies Roger Watt Dept. of Psychology, University of Stirling, Scotland r.j.watt@stirling.ac.uk
More informationVLSI Technology used in Auto-Scan Delay Testing Design For Bench Mark Circuits
VLSI Technology used in Auto-Scan Delay Testing Design For Bench Mark Circuits N.Brindha, A.Kaleel Rahuman ABSTRACT: Auto scan, a design for testability (DFT) technique for synchronous sequential circuits.
More information11.1 As mentioned in Experiment 10, sequential logic circuits are a type of logic circuit where the output
EE 2449 Experiment JL and NWP //8 CALIFORNIA STATE UNIVERSITY LOS ANGELES Department of Electrical and Computer Engineering EE-2449 Digital Logic Lab EXPERIMENT SEQUENTIAL CIRCUITS Text: Mano and Ciletti,
More informationDepartment of Computer Science, Cornell University. fkatej, hopkik, Contact Info: Abstract:
A Gossip Protocol for Subgroup Multicast Kate Jenkins, Ken Hopkinson, Ken Birman Department of Computer Science, Cornell University fkatej, hopkik, keng@cs.cornell.edu Contact Info: Phone: (607) 255-9199
More informationDSA-1. The Prism Sound DSA-1 is a hand-held AES/EBU Signal Analyzer and Generator.
DSA-1 The Prism Sound DSA-1 is a hand-held AES/EBU Signal Analyzer and Generator. The DSA-1 is an invaluable trouble-shooting tool for digital audio equipment and installations. It is unique as a handportable,
More informationFriday 5 June 2015 Morning
Oxford Cambridge and RSA Friday 5 June 2015 Morning AS GCE MATHEMATICS 4736/01 Decision Mathematics 1 PRINTED ANSWER BOOK *3248819538* Candidates answer on the Printed Answer Book. OCR supplied materials:
More informationBuilding Trust in Online Rating Systems through Signal Modeling
Building Trust in Online Rating Systems through Signal Modeling Presenter: Yan Sun Yafei Yang, Yan Sun, Ren Jin, and Qing Yang High Performance Computing Lab University of Rhode Island Online Feedback-based
More informationThis is an extended version of:
A Tale of Transaction Put in Verse About an Illicit Kind of Commerce This is an extended version of: http://link.springer.com/chapter/10.1007%2f978-3-319-44618-9_10 A big mistake on author s side: This
More informationMAGIC THipPro. Signalling and Control with. Configuration Guide. using the example of a LAWO crystal mixing console. Version: March 26 th, 2018
MAGIC THipPro Signalling and Control with Configuration Guide using the example of a LAWO crystal mixing console The configuration for MAGIC TH2plus and MAGIC TH6 is identical in most parts Version: 2.700
More informationProblem Points Score USE YOUR TIME WISELY USE CLOSEST DF AVAILABLE IN TABLE SHOW YOUR WORK TO RECEIVE PARTIAL CREDIT
Stat 514 EXAM I Stat 514 Name (6 pts) Problem Points Score 1 32 2 30 3 32 USE YOUR TIME WISELY USE CLOSEST DF AVAILABLE IN TABLE SHOW YOUR WORK TO RECEIVE PARTIAL CREDIT WRITE LEGIBLY. ANYTHING UNREADABLE
More informationAnalogue Versus Digital [5 M]
Q.1 a. Analogue Versus Digital [5 M] There are two basic ways of representing the numerical values of the various physical quantities with which we constantly deal in our day-to-day lives. One of the ways,
More informationGluten-Free Certification Program (GFCP) Trademark Usage Guide
(GFCP) Trademark Usage Guide Owned and operated by the Allergen Control Group Inc. Endorsed by the Canadian Celiac Association (CCA) Endorsed by BEYOND CELIAC SEPTEMBER 2016 Table of Contents Page 1. General
More informationChapter 7 Counters and Registers
Chapter 7 Counters and Registers Chapter 7 Objectives Selected areas covered in this chapter: Operation & characteristics of synchronous and asynchronous counters. Analyzing and evaluating various types
More informationExercise 4. Data Scrambling and Descrambling EXERCISE OBJECTIVE DISCUSSION OUTLINE DISCUSSION. The purpose of data scrambling and descrambling
Exercise 4 Data Scrambling and Descrambling EXERCISE OBJECTIVE When you have completed this exercise, you will be familiar with data scrambling and descrambling using a linear feedback shift register.
More informationSecuring Scan Design Using Lock & Key Technique
Securing Scan Design Using Lock & Key Technique Jeremy Lee, Mohammed Tehranipoor, Chintan Patel, and Jim Plusquellic CSEE Department University of Maryland Baltimore County 1000 Hilltop Circle, Baltimore,
More informationLFSR Test Pattern Crosstalk in Nanometer Technologies. Laboratory for Information Technology University of Hannover, Germany
LFSR Test Pattern Crosstalk in Nanometer Technologies Dieter Treytnar,, Michael Redeker, Hartmut Grabinski and Faïez Ktata Laboratory for Information Technology University of Hannover, Germany Outline!
More informationMATHEMATICAL APPROACH FOR RECOVERING ENCRYPTION KEY OF STREAM CIPHER SYSTEM
MATHEMATICAL APPROACH FOR RECOVERING ENCRYPTION KEY OF STREAM CIPHER SYSTEM Abdul Kareem Murhij Radhi College of Information Engineering, University of Nahrian,Baghdad- Iraq. Abstract Stream cipher system
More informationScan. This is a sample of the first 15 pages of the Scan chapter.
Scan This is a sample of the first 15 pages of the Scan chapter. Note: The book is NOT Pinted in color. Objectives: This section provides: An overview of Scan An introduction to Test Sequences and Test
More informationExperiment 7: Bit Error Rate (BER) Measurement in the Noisy Channel
Experiment 7: Bit Error Rate (BER) Measurement in the Noisy Channel Modified Dr Peter Vial March 2011 from Emona TIMS experiment ACHIEVEMENTS: ability to set up a digital communications system over a noisy,
More information3D IC Test through Power Line Methodology. Alberto Pagani
3D IC Test through Power Line Methodology Alberto Pagani Outline 2 Power Line Communication (PLC) approach 2D Test architecture through PLC Advantages Methodology Feasibility Study Rx test chip for digital
More informationChapter 11 State Machine Design
Chapter State Machine Design CHAPTER OBJECTIVES Upon successful completion of this chapter, you will be able to: Describe the components of a state machine. Distinguish between Moore and Mealy implementations
More information1550 nm / 3 Gb/s Medium Power Single Optical SM Digital Diagnostic Transmitter FVD2-1TR-SM50
1550 nm / 3 Gb/s Medium Power Single Optical SM Digital Diagnostic Transmitter FVD2-1TR-SM50 Features SMPTE 297-2006 Compatible Speed from 50 Mbps to 3Gbps with up to 50 km Single-mode Fiber Distance up
More information1. Introduction. Abstract. 1.1 Logic Criteria
An Evaluation of the Minimal-MUMCUT Logic Criterion and Prime Path Coverage Garrett Kaminski, Upsorn Praphamontripong, Paul Ammann, Jeff Offutt Computer Science Department, George Mason University, Fairfax,
More informationArbitrary Waveform Generator
1 Arbitrary Waveform Generator Client: Agilent Technologies Client Representatives: Art Lizotte, John Michael O Brien Team: Matt Buland, Luke Dunekacke, Drew Koelling 2 Client Description: Agilent Technologies
More informationETSI TS V6.0.0 ( )
Technical Specification Digital cellular telecommunications system (Phase 2+); Half rate speech; Substitution and muting of lost frames for half rate speech traffic channels () GLOBAL SYSTEM FOR MOBILE
More informationQuery By Humming: Finding Songs in a Polyphonic Database
Query By Humming: Finding Songs in a Polyphonic Database John Duchi Computer Science Department Stanford University jduchi@stanford.edu Benjamin Phipps Computer Science Department Stanford University bphipps@stanford.edu
More informationEEE ALERT signal for 100GBASE-KP4
EEE ALERT signal for 100GBASE-KP4 Matt Brown, AppliedMicro Bart Zeydel, AppliedMicro Adee Ran, Intel Kent Lusted, Intel (Regarding Comments 39 and 10234) 1 Supporters Brad Booth, Dell Rich Mellitz, Intel
More informationMain Display (Red) Displays the incident light level or the function name.
E3X-DA-S/E3X-MDA Operation Reference Main Display (Red) Displays the incident light level or the function name. Sub-Display (Green) Displays the threshold and function settings. Operation Keys Used to
More informationThe Mitsubishi DX-TL5000 DVR
The Mitsubishi DX-TL5000 DVR Test, text and photos by Vlado Damjanovski 2006 In this issue of CCTV focus Test Drive we analyse the latest Mitsubishi 16-channel DVR. Sam Boustani, sales representative for
More informationINTERNATIONAL TELECOMMUNICATION UNION SPECIFICATIONS OF MEASURING EQUIPMENT
INTERNATIONAL TELECOMMUNICATION UNION CCITT O.150 THE INTERNATIONAL (10/92) TELEGRAPH AND TELEPHONE CONSULTATIVE COMMITTEE SPECIFICATIONS OF MEASURING EQUIPMENT DIGITAL TEST PATTERNS FOR PERFORMANCE MEASUREMENTS
More informationPersonalized TV Recommendation with Mixture Probabilistic Matrix Factorization
Personalized TV Recommendation with Mixture Probabilistic Matrix Factorization Huayu Li, Hengshu Zhu #, Yong Ge, Yanjie Fu +,Yuan Ge Computer Science Department, UNC Charlotte # Baidu Research-Big Data
More informationONE-WAY DATA TRANSMISSION FOR CABLE APPLICATIONS WEGENER COMMUNICATIONS, INC.
ONE-WAY DATA TRANSMISSION FOR CABLE APPLICATIONS HEINZ W. WEGENER WEGENER COMMUNICATIONS, INC. ONE-WAY DATA TRANSMISSION FOR CABLE APPLICATIONS ABSTRACT The cable industry has created an extensive satellite
More informationSlide Set 8. for ENCM 501 in Winter Term, Steve Norman, PhD, PEng
Slide Set 8 for ENCM 501 in Winter Term, 2017 Steve Norman, PhD, PEng Electrical & Computer Engineering Schulich School of Engineering University of Calgary Winter Term, 2017 ENCM 501 W17 Lectures: Slide
More informationG.709 FEC testing Guaranteeing correct FEC behavior
Technical Note G.709 FEC testing Guaranteeing correct FEC behavior Capabilities and Benefits Techniques in Detail Example The ONT-503/506/5 optical network tester from JDSU which delivers in-depth analysis
More informationMEMORY ERROR COMPENSATION TECHNIQUES FOR JPEG2000. Yunus Emre and Chaitali Chakrabarti
MEMORY ERROR COMPENSATION TECHNIQUES FOR JPEG2000 Yunus Emre and Chaitali Chakrabarti School of Electrical, Computer and Energy Engineering Arizona State University, Tempe, AZ 85287 {yemre,chaitali}@asu.edu
More informationTear and Destroy: Chain voting and destruction problems shared by Prêt à Voter and Punchscan and a solution using Visual Encryption
D. LUNDIN et al: TEAR AND DESTROY Tear and Destroy: Chain voting and destruction problems shared by Prêt à Voter and Punchscan and a solution using Visual Encryption D. Lundin, H. Treharne, P. Y. A. Ryan,
More informationFault Analysis of GRAIN-128
Fault Analysis of GRAIN-128 Alexandre Berzati, Cécile Canovas, Guilhem Castagnos, Blandine Debraize, Louis Goubin, Aline Gouget, Pascal Paillier and Stéphanie Salgado CEA-LETI/MINATEC, 17 rue des Martyrs,
More informationPermutation-based cryptography for the Internet of Things
Permutation-based cryptography for the Internet of Things Gilles Van Assche 1 Joint work with Guido Bertoni, Joan Daemen 1,2, Seth Hoffert, Michaël Peeters 1 and Ronny Van Keer 1 1 STMicroelectronics 2
More informationTEST PATTERNS COMPRESSION TECHNIQUES BASED ON SAT SOLVING FOR SCAN-BASED DIGITAL CIRCUITS
TEST PATTERNS COMPRESSION TECHNIQUES BASED ON SAT SOLVING FOR SCAN-BASED DIGITAL CIRCUITS Jiří Balcárek Informatics and Computer Science, 1-st class, full-time study Supervisor: Ing. Jan Schmidt, Ph.D.,
More informationComponent Video Matrix Switcher Series ITEM NO.: YS04MA, YS04MD
Component Video Matrix Switcher Series ITEM NO.: YS04MA, YS04MD Our component video switcher allows four different component video and stereo/digital audio sources to share two video displays. Manage multiple
More informationMicro/Junior/Pro PL7 Micro PLC Functions Upcounting. TLX DS 37 PL7 40E engv4
Micro/Junior/Pro PL7 Micro PLC Functions Upcounting TLX DS 37 PL7 40E engv4 35002668 00 2 Related Documentation Related Documentation Introduction This manual is in 2 volumes: l Volume 1 l Common application
More informationASYNCHRONOUS COUNTER CIRCUITS
ASYNCHRONOUS COUNTER CIRCUITS Asynchronous counters do not have a common clock that controls all the Hipflop stages. The control clock is input into the first stage, or the LSB stage of the counter. The
More informationFIBRE CHANNEL CONSORTIUM
FIBRE CHANNEL CONSORTIUM FC-PI-2 Clause 6 Optical Physical Layer Test Suite Version 0.51 Technical Document Last Updated: August 15, 2005 Fibre Channel Consortium Durham, NH 03824 Phone: +1-603-862-0701
More informationCWDM / 3 Gb/s Medium Power Optical SM Digital Diagnostic Transmitter/Receiver FVD2-1TR-SM30-XX
CWDM / 3 Gb/s Medium Power Optical SM Digital Diagnostic Transmitter/Receiver Features FVD2-1TR-SM30-XX SMPTE 297-2006 Compatible Speed from 50kbps to 3Gbps Power Budget > 15 db Support Video Pathological
More informationPower (dbm) λ (nm) LINK DISTANCE SDI Bit Rate Max. Link Distance (km) 3G-SDI 2.97Gbps 30 HD-SDI 1.485Gbps 30 SD-SDI 270Mbps 30
1310 nm / 3 Gb/s Medium Power SM Video SFP Transceiver (RoHS Compliant) **********************************************************************************************************************************************************************
More informationToward Metrics for Monitoring Time Reliability NIST Access to Assured and Accurate Time Workshop
Toward Metrics for Monitoring Time Reliability NIST Access to Assured and Accurate Time Workshop Brock Beauchamp June 22, 2018 This work was performed under the auspices of the U.S. Department of Energy
More informationFuture Performance of the LCLS
Future Performance of the LCLS J. Welch for many* SLAC National Accelerator Laboratory FLS 2010, ICFA Beam Dynamics Workshop on Future Light Sources, March 1-5, 2010. SLAC National Accelerator Laboratory,
More information8/30/2010. Chapter 1: Data Storage. Bits and Bit Patterns. Boolean Operations. Gates. The Boolean operations AND, OR, and XOR (exclusive or)
Chapter 1: Data Storage Bits and Bit Patterns 1.1 Bits and Their Storage 1.2 Main Memory 1.3 Mass Storage 1.4 Representing Information as Bit Patterns 1.5 The Binary System 1.6 Storing Integers 1.8 Data
More informationRandomness analysis of A5/1 Stream Cipher for secure mobile communication
Randomness analysis of A5/1 Stream Cipher for secure mobile communication Prof. Darshana Upadhyay 1, Dr. Priyanka Sharma 2, Prof.Sharada Valiveti 3 Department of Computer Science and Engineering Institute
More informationTesting of Cryptographic Hardware
Testing of Cryptographic Hardware Presented by: Debdeep Mukhopadhyay Dept of Computer Science and Engineering, Indian Institute of Technology Madras Motivation Behind the Work VLSI of Cryptosystems have
More informationSC24 Magnetic Field Cancelling System
SPICER CONSULTING SYSTEM SC24 SC24 Magnetic Field Cancelling System Makes the ambient magnetic field OK for the electron microscope Adapts to field changes within 100 µs Touch screen intelligent user interface
More informationThe Keyboard. the pitch of a note a half step. Flats lower the pitch of a note half of a step. means HIGHER means LOWER
The Keyboard The white note ust to the left of a group of 2 black notes is the note C Each white note is identified by alphabet letter. You can find a note s letter by counting up or down from C. A B D
More informationED3. Digital Encoder Display Page 1 of 13. Description. Mechanical Drawing. Features
Description Page 1 of 13 The ED3 is an LCD readout that serves as a position indicator or tachometer. The ED3 can display: Speed or position of a quadrature output incremental encoder Absolute position
More informationAvigilon View Software Release Notes
Version 4.6.5 System Version 4.6.5 includes the following components: Avigilon VIEW Version 4.6.5 R-Series Version 4.6.5 Rialto Version 4.6.5 ICVR-HD Version 3.7.3 ICVR-SD Version 2.6.3 System Requirements
More informationPower-Driven Flip-Flop p Merging and Relocation. Shao-Huan Wang Yu-Yi Liang Tien-Yu Kuo Wai-Kei Tsing Hua University
Power-Driven Flip-Flop p Merging g and Relocation Shao-Huan Wang Yu-Yi Liang Tien-Yu Kuo Wai-Kei Mak @National Tsing Hua University Outline Introduction Problem Formulation Algorithms Experimental Results
More informationVHDL Implementation of Logic BIST (Built In Self Test) Architecture for Multiplier Circuit for High Test Coverage in VLSI Chips
VHDL Implementation of Logic BIST (Built In Self Test) Architecture for Multiplier Circuit for High Test Coverage in VLSI Chips Pushpraj Singh Tanwar, Priyanka Shrivastava Assistant professor, Dept. of
More information