Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection

Size: px
Start display at page:

Download "Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection"

Transcription

1 Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection Sung-Ming Yen 1 and Dongryeol Kim 2 1 Dept of Computer Science and Information Engineering National Central University, Taiwan, ROC 2 Information Security Policy Division Korea Information Security Agency, Korea 1

2 Outline : 1. Preliminary Background of CRT-based Cryptanalysis 2. Review: Two CRT-based RSA Computation Based on Fault Infection 3. Cryptanalysis of CRT-based RSA with Fault Infection 4. Conclusions 2

3 1. Introduction and Preliminary Background RSA speedup with CRT CRT-based fault attack 3

4 RSA Speedup with CRT RSA speedup based on CRT: Given p, q, (n=p*q), d, and m, S=m d mod n can be sped up by s p =(m mod p) d mod (p-1) mod p s q =(m mod q) d mod (q-1) mod q Gauss s CRT recombination S=CRT(s p, s q ) [(s p q (q -1 mod p)+s q p (p -1 mod q)] mod n = [s p X p + s q X q ] mod n Garner s CRT recombination S=CRT(s p, s q ) s q + [(s p -s q ) (q -1 mod p) mod p] q 4

5 CRT-based Fault Attack Fault attack on the computation of s p & s q Given a faulty result of S =CRT(s p, s q ) q=gcd((s e - m) mod n, n) Random error Random error s p CRT S s q 5

6 Shamir s Countermeasure Shamir s countermeasure (extend modulus then reduce modulus) s pr =m pr d pr mod pr d s qr =m qr qr mod qr where m pr = m mod pr & d pr = d mod ψ(pr) and r is a random prime. Output S only if (s pr mod r) = (s qr mod r) S=CRT(s p, s q ) =CRT(s pr mod p, s qr mod q) 6

7 Other possible countermeasures: (All need and strictly depend on the reliability of a comparison operation!) Compute S twice and compare the results Given S = m d mod n, verify whether m?= S e mod n 7

8 Attack on Shamir s Method Possible attacks on the Zero flag! Implementation of checking (s pr mod r) =? (s qr mod r) Implementation of a?= b SUB a,b (or CMP a,b) JZ (jump if zero) It highly depends on the zero flag! 8

9 Another reported CRT-based attack The main weakness: It s assumed that correctness of s pr and s qr implies the correctness of both s p and s q where s p = s pr mod p possibly s p <-- s pr mod p The checking of whether (s pr mod r) =? (s qr mod r) cannot detect the error in s p 9

10 Importance of CRT-based Attack It has already been widely employed But a single fault total break down False alarm attack on RSA+CRT may be initiated by any malicious attacker Denial of service attack So, any potential CRT-based attack should be carefully considered 10

11 2. Review: Two CRT-based RSA Computation Based on Fault Infection No fault-free decision procedure will be assumed in the countermeasure! 11

12 Fault Infective CRT Speedup No checking procedure will be assumed that should be fault free When a random error occurred in s p (or s q ) it will influence computation of s q (or s p ) or the overall computation of S (for example CRT(s p, s q ) or CRT(s p, s q ) is not accessible) 12

13 The CRT-1 Protocol Parameter selection: n=p q (usual key pair e & d=e -1 modψ(n)) additional key pair e r & d r =e r -1 modψ(n) d r =d r (r is a small integer) 13

14 The protocol: Compute k p = m/p & k q = m/q where x means floor function Compute m d r mod n with CRT speedup s p =A d r mod (p-1) mod p where A=m mod p s q = d r mod (p-1) mod q e where  = ((s r p mod p)+k p p) mod q Based on CRT S=CRT(s p, s q ) (à r ) mod n e where Ã=(s r q mod q)+k q q 14

15 If the computation is fault free: Message reconstruction 1: s q = d r mod (p-1) mod q e where  = ((s r p mod p)+k p p) mod q = m mod q Message reconstruction 2: S=CRT(s p, s q ) (à r ) mod n e where Ã=(s r q mod q)+k q q =m 15

16 The CRT-2 Protocol Parameter selection: n=p q (usual key pair e & d=e -1 modψ(n)) additional key pair e r & d r =e r -1 modψ(n) d r =d r (r is a small integer) 16

17 The protocol: Compute k p = m/p & k q = m/q Compute m d r mod n with CRT speedup s p =A d r mod (p-1) mod p where A=m mod p s q =A d r mod (p-1) mod q Based on CRT S=CRT(s p, s q ) (Â r ) mod n where Â= (m 1 +m 2 )/2 e m 1 =(s r p mod p)+k p p m 2 =(s q e r mod q)+k q q 17

18 If the computation is fault free: Message reconstruction: S=CRT(s p, s q ) (Â r ) mod n where Â= (m 1 +m 2 )/2 e m 1 =(s r p mod p)+k p p =m m 2 =(s q e r mod q)+k q q =m 18

19 3. Cryptanalysis of CRT-based RSA with Fault Infection Exploiting faults that usual CRT-based attack did not consider 19

20 Attack Exploiting Fault on Temporary Parameters Attacks exploit faults that usual CRT-based attack did not consider Exploiting faults on temporary parameters that usual CRT speedup does NOT required It has been overlooked previously 20

21 Attack on CRT-1 Protocol In the CRT-1 protocol: Suppose k p, s p, and s q are correct but k q becomes incorrect (when computed or accessed) k q --> k q We got S =m d +R*q mod n (R: random integer) leads to q=gcd((s e - m), n) It can be proven that fault on k p disables the above attack 21

22 Attack on CRT-2 Protocol In the CRT-2 protocol: Suppose k p, s p, and s q are correct but k q becomes incorrect (when computed or accessed) k q --> k q We got S =m d +R*q mod n (R: random integer) leads to q=gcd((s e - m), n) Fault on k p leads to p=gcd((s e - m), n) 22

23 4. Conclusions 23

24 24 Basic consideration: Do not make unreasonable assumption, e.g., all the checking operations are error free Important thing to remind again: Be careful about all CRT-based attack Explicit fault/attack Implicit fault/attack The false alarm attack may lead to the DoS attack One technical issue to notice: More checking operations being used will lead to a less reliable countermeasure Open problem: Is error free checking operation necessary? More research is still necessary

Fault Analysis of Stream Ciphers

Fault Analysis of Stream Ciphers Fault Analysis of Stream Ciphers Jonathan J. Hoch and Adi Shamir Department of Computer Science and Applied Mathematics, The Weizmann Institute of Science, Israel Abstract. A fault attack is a powerful

More information

Cryptanalysis of LILI-128

Cryptanalysis of LILI-128 Cryptanalysis of LILI-128 Steve Babbage Vodafone Ltd, Newbury, UK 22 nd January 2001 Abstract: LILI-128 is a stream cipher that was submitted to NESSIE. Strangely, the designers do not really seem to have

More information

An Introduction to Cryptography

An Introduction to Cryptography An Introduction to http://www.southernct.edu/~fields/ Terminology is the study of secret writing. This is the only branch of mathematics to be designated by the U.S. government as export-controlled. Cryptographic

More information

CRYPTOGRAPHY. Sharafat Ibn Mollah Mosharraf TOUCH-N-PASS EXAM CRAM GUIDE SERIES. Special Edition for CSEDU. Students CSE, DU )

CRYPTOGRAPHY. Sharafat Ibn Mollah Mosharraf TOUCH-N-PASS EXAM CRAM GUIDE SERIES. Special Edition for CSEDU. Students CSE, DU ) Special Edition for CSEDU Students TOUCH-N-PASS EXAM CRAM GUIDE SERIES CRYPTOGRAPHY Prepared By Sharafat Ibn Mollah Mosharraf CSE, DU 12 th Batch (2005 2005-2006 2006) Table of Contents CHAPTER 1: INTRODUCTION

More information

REVISIONS LTR DESCRIPTION DATE APPROVED - Initial Release 11/5/07 MDB A ECR /9/08 MDB

REVISIONS LTR DESCRIPTION DATE APPROVED - Initial Release 11/5/07 MDB A ECR /9/08 MDB REVISIONS LTR DESCRIPTION DATE APPROVED - Initial Release 11/5/07 MDB A ECR 8770 4/9/08 MDB CONTRACT NO. DRAWN BY CHECKED BY APPROVED BY DATE P. Phillips 11/2/07 TITLE M. Bester 11/5/07 SIZE A 2120 Old

More information

Pseudorandom bit Generators for Secure Broadcasting Systems

Pseudorandom bit Generators for Secure Broadcasting Systems +00? IE.Nfejb~lV 4 Pseudorandom bit Generators for Secure Broadcasting Systems Chung-Huang Yang m Computer & Communication Research Laboratories Industrial Technology Research Institute Chutung, Hsinchu

More information

Fault Analysis of Stream Ciphers

Fault Analysis of Stream Ciphers Fault Analysis of Stream Ciphers M.Sc. Thesis Ya akov Hoch yaakov.hoch@weizmann.ac.il Advisor: Adi Shamir Weizmann Institute of Science Rehovot 76100, Israel Abstract A fault attack is a powerful cryptanalytic

More information

Reducing IPTV Channel Zapping Time Based on Viewer s Surfing Behavior and Preference

Reducing IPTV Channel Zapping Time Based on Viewer s Surfing Behavior and Preference Reducing IPTV Zapping Time Based on Viewer s Surfing Behavior and Preference Yuna Kim, Jae Keun Park, Hong Jun Choi, Sangho Lee, Heejin Park, Jong Kim Dept. of CSE, POSTECH Pohang, Korea {existion, ohora,

More information

Example the number 21 has the following pairs of squares and numbers that produce this sum.

Example the number 21 has the following pairs of squares and numbers that produce this sum. by Philip G Jackson info@simplicityinstinct.com P O Box 10240, Dominion Road, Mt Eden 1446, Auckland, New Zealand Abstract Four simple attributes of Prime Numbers are shown, including one that although

More information

Sequences and Cryptography

Sequences and Cryptography Sequences and Cryptography Workshop on Shift Register Sequences Honoring Dr. Solomon W. Golomb Recipient of the 2016 Benjamin Franklin Medal in Electrical Engineering Guang Gong Department of Electrical

More information

CASE HISTORY#3 COOLING TOWER GEARBOX BEARING FAULT. Barry T. Cease Cease Industrial Consulting

CASE HISTORY#3 COOLING TOWER GEARBOX BEARING FAULT. Barry T. Cease Cease Industrial Consulting CASE HISTORY#3 COOLING TOWER GEARBOX BEARING FAULT Barry T. Cease Cease Industrial Consulting ceasevibration@icloud.com (843) 200-9705 1 COOLING TOWER GEARBOX BEARING FAULT A series of ten cooling tower

More information

Logical Fallacies. Good or Bad?

Logical Fallacies. Good or Bad? Logical Fallacies Good or Bad? Period 4 Class Discussion What did you learn? 1. The fallacies used in act 3 attacked the personalities of the characters instead of the positions or arguments being said

More information

XYZ Cinemas - ecna Configuration 12/12/2013 Table of Contents

XYZ Cinemas - ecna Configuration 12/12/2013 Table of Contents Table of Contents 1. Overview 2. ecna Control Panel 3. Start of Day Logic 4. Preshow Start and Lamp Control Logic 5. Show Start Logic 6. Lamp Control Logic 7. Show End Early Logic 8. Show End Logic 9.

More information

10G E-PON ONU PR-30 Transceiver (20km)

10G E-PON ONU PR-30 Transceiver (20km) 10G E-PON ONU PR-30 Transceiver (20km) P2757-64D20-RSP Features 10G/10G E-PON ONU PR-30 SFP+ BIDI SC/UPC 1270nm Burst Mode Transmitter with DFB Laser 1577nm Continuous Mode Receiver with APD-TIA Up to

More information

Stream Cipher. Block cipher as stream cipher LFSR stream cipher RC4 General remarks. Stream cipher

Stream Cipher. Block cipher as stream cipher LFSR stream cipher RC4 General remarks. Stream cipher Lecturers: Mark D. Ryan and David Galindo. Cryptography 2015. Slide: 90 Stream Cipher Suppose you want to encrypt a stream of data, such as: the data from a keyboard the data from a sensor Block ciphers

More information

Cost Analysis of Integrated Terminal Mobility and Personal Mobility Managements in Mobile Communication Networks

Cost Analysis of Integrated Terminal Mobility and Personal Mobility Managements in Mobile Communication Networks Cost Analysis of Integrated Terminal Mobility and Personal Mobility Managements in Mobile Communication Networks Yun Won Chung, Min Young Chung, and Dan Keun Sung E-mail : ywchung@ieee.org Dept. of EECS

More information

1 Introduction Steganography and Steganalysis as Empirical Sciences Objective and Approach Outline... 4

1 Introduction Steganography and Steganalysis as Empirical Sciences Objective and Approach Outline... 4 Contents 1 Introduction... 1 1.1 Steganography and Steganalysis as Empirical Sciences... 1 1.2 Objective and Approach... 2 1.3 Outline... 4 Part I Background and Advances in Theory 2 Principles of Modern

More information

A High-Resolution Flash Time-to-Digital Converter Taking Into Account Process Variability. Nikolaos Minas David Kinniment Keith Heron Gordon Russell

A High-Resolution Flash Time-to-Digital Converter Taking Into Account Process Variability. Nikolaos Minas David Kinniment Keith Heron Gordon Russell A High-Resolution Flash Time-to-Digital Converter Taking Into Account Process Variability Nikolaos Minas David Kinniment Keith Heron Gordon Russell Outline of Presentation Introduction Background in Time-to-Digital

More information

Installation & Operation Manual. BEC PM1 Controller Time/Flow/Volume Controller. Water Control Solutions

Installation & Operation Manual. BEC PM1 Controller Time/Flow/Volume Controller. Water Control Solutions Installation & Operation Manual BEC PM1 Controller Time/Flow/Volume Controller Water Control Solutions Table of Contents Introduction 4 Chapter 1 Technical Data and I/O Connections 6 DC Solenoid 6 Power

More information

Contents INFORMATION FLOW TRACK - TRAIN

Contents INFORMATION FLOW TRACK - TRAIN 2017-05-12 3. INFORMATION FLOW TRACK-TRAIN Page 1 (159) Chapter 3: INFORMATION FLOW TRACK - TRAIN Contents 3. INFORMATION FLOW TRACK - TRAIN 5 3.1 INTRODUCTION 5 3.1.1 Scope 5 3.2 INFORMATION FLOW TRACK

More information

Design for Test. Design for test (DFT) refers to those design techniques that make test generation and test application cost-effective.

Design for Test. Design for test (DFT) refers to those design techniques that make test generation and test application cost-effective. Design for Test Definition: Design for test (DFT) refers to those design techniques that make test generation and test application cost-effective. Types: Design for Testability Enhanced access Built-In

More information

Cryptography CS 555. Topic 5: Pseudorandomness and Stream Ciphers. CS555 Spring 2012/Topic 5 1

Cryptography CS 555. Topic 5: Pseudorandomness and Stream Ciphers. CS555 Spring 2012/Topic 5 1 Cryptography CS 555 Topic 5: Pseudorandomness and Stream Ciphers CS555 Spring 2012/Topic 5 1 Outline and Readings Outline Stream ciphers LFSR RC4 Pseudorandomness Readings: Katz and Lindell: 3.3, 3.4.1

More information

Notes Generator Verification SDT Project

Notes Generator Verification SDT Project Notes Generator Verification SDT Project 2007-09 FERC Office 888 First Street, NE Washington, DC 20426 1. Administration a. The following were in attendance: Bob Snow, Cynthia Pointer, Lim Hansen, Keith

More information

Cable Certification. General Testing Criteria (Applies to all cable certification testing) Attachment E Cable Certification

Cable Certification. General Testing Criteria (Applies to all cable certification testing) Attachment E Cable Certification General Testing Criteria (Applies to all cable certification testing) 1. RCIT reserves the right to be present during any or all cable testing procedures. The Contractor shall obtain authorization from

More information

Sequencing. Lan-Da Van ( 范倫達 ), Ph. D. Department of Computer Science National Chiao Tung University Taiwan, R.O.C. Fall,

Sequencing. Lan-Da Van ( 范倫達 ), Ph. D. Department of Computer Science National Chiao Tung University Taiwan, R.O.C. Fall, Sequencing ( 范倫達 ), Ph. D. Department of Computer Science National Chiao Tung University Taiwan, R.O.C. Fall, 2013 ldvan@cs.nctu.edu.tw http://www.cs.nctu.edu.tw/~ldvan/ Outlines Introduction Sequencing

More information

Product Specification. RoHS-6 Compliant 10Gb/s 10km XFP Optical Transceiver FTLX1412M3BCL

Product Specification. RoHS-6 Compliant 10Gb/s 10km XFP Optical Transceiver FTLX1412M3BCL Product Specification RoHS-6 Compliant 10Gb/s 10km XFP Optical Transceiver FTLX1412M3BCL PRODUCT FEATURES Supports 9.95Gb/s to 11.3Gb/s bit rates Power dissipation

More information

10Gb/s 40km DWDM XFP Optical Transceiver

10Gb/s 40km DWDM XFP Optical Transceiver 10Gb/s 40km DWDM XFP Optical Transceiver PRODUCT FEATURES Hot-pluggable XFP footprint Supports 9.95Gb/s to 11.3Gb/s bit rates Supports Lineside and XFI loopback RoHS-6 Compliant (lead-free) Power dissipation

More information

Testing Digital Systems II

Testing Digital Systems II Testing Digital Systems II Lecture 5: Built-in Self Test (I) Instructor: M. Tahoori Copyright 2010, M. Tahoori TDS II: Lecture 5 1 Outline Introduction (Lecture 5) Test Pattern Generation (Lecture 5) Pseudo-Random

More information

From Theory to Practice: Private Circuit and Its Ambush

From Theory to Practice: Private Circuit and Its Ambush Indian Institute of Technology Kharagpur Telecom ParisTech From Theory to Practice: Private Circuit and Its Ambush Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger and Debdeep Mukhopadhyay

More information

LFSR stream cipher RC4. Stream cipher. Stream Cipher

LFSR stream cipher RC4. Stream cipher. Stream Cipher Lecturers: Mark D. Ryan and David Galindo. Cryptography 2016. Slide: 89 Stream Cipher Suppose you want to encrypt a stream of data, such as: the data from a keyboard the data from a sensor Block ciphers

More information

10G/1G E-PON ONU SFP+ Bidi Optical Transceiver (20km) P3157-8D20-RSP

10G/1G E-PON ONU SFP+ Bidi Optical Transceiver (20km) P3157-8D20-RSP 10G/1G E-PON ONU SFP+ Bidi Optical Transceiver (20km) P3157-8D20-RSP Features 10G / 1G E-PON ONU SFP+ 1310nm Burst Mode Transmitter with DFB Laser 1577nm Continuous Mode Receiver with APD-TIA Up to 20km

More information

New Address Shift Linear Feedback Shift Register Generator

New Address Shift Linear Feedback Shift Register Generator New Address Shift Linear Feedback Shift Register Generator Kholood J. Moulood Department of Mathematical, Tikrit University, College of Education for Women, Salahdin. E-mail: khmsc2006@yahoo.com. Abstract

More information

Applying Models in your Testing Process

Applying Models in your Testing Process Applying Models in your Testing Process Steven Rosaria Harry Robinson Intelligent Search Test Group Microsoft Corporation srosaria@microsoft.com harryr@microsoft.com Abstract Model-based testing allows

More information

Sigma 1 - Axis Servo Motor and Cables - Troubleshooting Guide

Sigma 1 - Axis Servo Motor and Cables - Troubleshooting Guide LAST UPDATED: 12/21/2018 Introduction Press [POWER OFF]. Set the main circuit breaker to the OFF position. Wait until the high voltage LED on the vector drive is completely off before disconnecting any

More information

Release Notes. Multi-Band EPI C2P. Release February 2013

Release Notes. Multi-Band EPI C2P. Release February 2013 Release Notes Multi-Band EPI C2P Release 008 13 February 2013 Installation 1. Restart the system (reboot host and MRIR) 2. Extract the.zip file to a temporary directory 3. Run the installer.bat file 4.

More information

Outline. Why do we classify? Audio Classification

Outline. Why do we classify? Audio Classification Outline Introduction Music Information Retrieval Classification Process Steps Pitch Histograms Multiple Pitch Detection Algorithm Musical Genre Classification Implementation Future Work Why do we classify

More information

RYKO Italia s.r.l. V. Casale Morano Po (Al) t f

RYKO Italia s.r.l. V. Casale Morano Po (Al) t f Italia RYKO Italia s.r.l. V. Casale 43-15025 Morano Po (Al) t.0142 494411 f. 85872 June 30, 2003 ITALIA SERVICE BULLETIN - # 4-013 VFD parameter settings for conveyor equipment with Mitsubishi PLC MACHINES

More information

FORENSIC CASEBOOK. By Bob Huddleston, Eastman Chemical Co. One of the most common. reasons for marriage failure

FORENSIC CASEBOOK. By Bob Huddleston, Eastman Chemical Co. One of the most common. reasons for marriage failure The Case of the Energized Cable Cutting Incident How miscommunication leads to an electrical helper slicing through live 13.8kV cable and miraculously walking away to tell about it By Bob Huddleston, Eastman

More information

Marks and Grades Project

Marks and Grades Project Marks and Grades Project This project uses the HCS12 to allow for user input of class grades to determine the letter grade and overall GPA for all classes. Interface: The left-most DIP switch (SW1) is

More information

Realizing Waveform Characteristics up to a Digitizer s Full Bandwidth Increasing the effective sampling rate when measuring repetitive signals

Realizing Waveform Characteristics up to a Digitizer s Full Bandwidth Increasing the effective sampling rate when measuring repetitive signals Realizing Waveform Characteristics up to a Digitizer s Full Bandwidth Increasing the effective sampling rate when measuring repetitive signals By Jean Dassonville Agilent Technologies Introduction The

More information

Automatic Commercial Monitoring for TV Broadcasting Using Audio Fingerprinting

Automatic Commercial Monitoring for TV Broadcasting Using Audio Fingerprinting Automatic Commercial Monitoring for TV Broadcasting Using Audio Fingerprinting Dalwon Jang 1, Seungjae Lee 2, Jun Seok Lee 2, Minho Jin 1, Jin S. Seo 2, Sunil Lee 1 and Chang D. Yoo 1 1 Korea Advanced

More information

KAMIENIEC. analog resonant phase rotator. Model of operator s manual rev. 1977/1.0

KAMIENIEC. analog resonant phase rotator. Model of operator s manual rev. 1977/1.0 KAMIENIEC analog resonant phase rotator operator s manual rev. 1977/1.0 Model of 1977 module explained 20 SALUT Thank you for purchasing this Xaoc Devices product. Kamieniec is an analog signal processing

More information

Sequential Logic Counters and Registers

Sequential Logic Counters and Registers Sequential Logic ounters and Registers ounters Introduction: ounters Asynchronous (Ripple) ounters Asynchronous ounters with MOD number < 2 n Asynchronous Down ounters ascading Asynchronous ounters svbitec.wordpress.com

More information

Black and Frozen Frame Detection

Black and Frozen Frame Detection Black and Frozen Frame Detection WFM6120/7020/7120 & WVR6020/7020/7120 Version 5.0.2 Software How To Guide How To Guide Figure 1. Input Monitor Mode Configuration. What is Black and Frozen Frame Detection?

More information

Analysis of local and global timing and pitch change in ordinary

Analysis of local and global timing and pitch change in ordinary Alma Mater Studiorum University of Bologna, August -6 6 Analysis of local and global timing and pitch change in ordinary melodies Roger Watt Dept. of Psychology, University of Stirling, Scotland r.j.watt@stirling.ac.uk

More information

VLSI Technology used in Auto-Scan Delay Testing Design For Bench Mark Circuits

VLSI Technology used in Auto-Scan Delay Testing Design For Bench Mark Circuits VLSI Technology used in Auto-Scan Delay Testing Design For Bench Mark Circuits N.Brindha, A.Kaleel Rahuman ABSTRACT: Auto scan, a design for testability (DFT) technique for synchronous sequential circuits.

More information

11.1 As mentioned in Experiment 10, sequential logic circuits are a type of logic circuit where the output

11.1 As mentioned in Experiment 10, sequential logic circuits are a type of logic circuit where the output EE 2449 Experiment JL and NWP //8 CALIFORNIA STATE UNIVERSITY LOS ANGELES Department of Electrical and Computer Engineering EE-2449 Digital Logic Lab EXPERIMENT SEQUENTIAL CIRCUITS Text: Mano and Ciletti,

More information

Department of Computer Science, Cornell University. fkatej, hopkik, Contact Info: Abstract:

Department of Computer Science, Cornell University. fkatej, hopkik, Contact Info: Abstract: A Gossip Protocol for Subgroup Multicast Kate Jenkins, Ken Hopkinson, Ken Birman Department of Computer Science, Cornell University fkatej, hopkik, keng@cs.cornell.edu Contact Info: Phone: (607) 255-9199

More information

DSA-1. The Prism Sound DSA-1 is a hand-held AES/EBU Signal Analyzer and Generator.

DSA-1. The Prism Sound DSA-1 is a hand-held AES/EBU Signal Analyzer and Generator. DSA-1 The Prism Sound DSA-1 is a hand-held AES/EBU Signal Analyzer and Generator. The DSA-1 is an invaluable trouble-shooting tool for digital audio equipment and installations. It is unique as a handportable,

More information

Friday 5 June 2015 Morning

Friday 5 June 2015 Morning Oxford Cambridge and RSA Friday 5 June 2015 Morning AS GCE MATHEMATICS 4736/01 Decision Mathematics 1 PRINTED ANSWER BOOK *3248819538* Candidates answer on the Printed Answer Book. OCR supplied materials:

More information

Building Trust in Online Rating Systems through Signal Modeling

Building Trust in Online Rating Systems through Signal Modeling Building Trust in Online Rating Systems through Signal Modeling Presenter: Yan Sun Yafei Yang, Yan Sun, Ren Jin, and Qing Yang High Performance Computing Lab University of Rhode Island Online Feedback-based

More information

This is an extended version of:

This is an extended version of: A Tale of Transaction Put in Verse About an Illicit Kind of Commerce This is an extended version of: http://link.springer.com/chapter/10.1007%2f978-3-319-44618-9_10 A big mistake on author s side: This

More information

MAGIC THipPro. Signalling and Control with. Configuration Guide. using the example of a LAWO crystal mixing console. Version: March 26 th, 2018

MAGIC THipPro. Signalling and Control with. Configuration Guide. using the example of a LAWO crystal mixing console. Version: March 26 th, 2018 MAGIC THipPro Signalling and Control with Configuration Guide using the example of a LAWO crystal mixing console The configuration for MAGIC TH2plus and MAGIC TH6 is identical in most parts Version: 2.700

More information

Problem Points Score USE YOUR TIME WISELY USE CLOSEST DF AVAILABLE IN TABLE SHOW YOUR WORK TO RECEIVE PARTIAL CREDIT

Problem Points Score USE YOUR TIME WISELY USE CLOSEST DF AVAILABLE IN TABLE SHOW YOUR WORK TO RECEIVE PARTIAL CREDIT Stat 514 EXAM I Stat 514 Name (6 pts) Problem Points Score 1 32 2 30 3 32 USE YOUR TIME WISELY USE CLOSEST DF AVAILABLE IN TABLE SHOW YOUR WORK TO RECEIVE PARTIAL CREDIT WRITE LEGIBLY. ANYTHING UNREADABLE

More information

Analogue Versus Digital [5 M]

Analogue Versus Digital [5 M] Q.1 a. Analogue Versus Digital [5 M] There are two basic ways of representing the numerical values of the various physical quantities with which we constantly deal in our day-to-day lives. One of the ways,

More information

Gluten-Free Certification Program (GFCP) Trademark Usage Guide

Gluten-Free Certification Program (GFCP) Trademark Usage Guide (GFCP) Trademark Usage Guide Owned and operated by the Allergen Control Group Inc. Endorsed by the Canadian Celiac Association (CCA) Endorsed by BEYOND CELIAC SEPTEMBER 2016 Table of Contents Page 1. General

More information

Chapter 7 Counters and Registers

Chapter 7 Counters and Registers Chapter 7 Counters and Registers Chapter 7 Objectives Selected areas covered in this chapter: Operation & characteristics of synchronous and asynchronous counters. Analyzing and evaluating various types

More information

Exercise 4. Data Scrambling and Descrambling EXERCISE OBJECTIVE DISCUSSION OUTLINE DISCUSSION. The purpose of data scrambling and descrambling

Exercise 4. Data Scrambling and Descrambling EXERCISE OBJECTIVE DISCUSSION OUTLINE DISCUSSION. The purpose of data scrambling and descrambling Exercise 4 Data Scrambling and Descrambling EXERCISE OBJECTIVE When you have completed this exercise, you will be familiar with data scrambling and descrambling using a linear feedback shift register.

More information

Securing Scan Design Using Lock & Key Technique

Securing Scan Design Using Lock & Key Technique Securing Scan Design Using Lock & Key Technique Jeremy Lee, Mohammed Tehranipoor, Chintan Patel, and Jim Plusquellic CSEE Department University of Maryland Baltimore County 1000 Hilltop Circle, Baltimore,

More information

LFSR Test Pattern Crosstalk in Nanometer Technologies. Laboratory for Information Technology University of Hannover, Germany

LFSR Test Pattern Crosstalk in Nanometer Technologies. Laboratory for Information Technology University of Hannover, Germany LFSR Test Pattern Crosstalk in Nanometer Technologies Dieter Treytnar,, Michael Redeker, Hartmut Grabinski and Faïez Ktata Laboratory for Information Technology University of Hannover, Germany Outline!

More information

MATHEMATICAL APPROACH FOR RECOVERING ENCRYPTION KEY OF STREAM CIPHER SYSTEM

MATHEMATICAL APPROACH FOR RECOVERING ENCRYPTION KEY OF STREAM CIPHER SYSTEM MATHEMATICAL APPROACH FOR RECOVERING ENCRYPTION KEY OF STREAM CIPHER SYSTEM Abdul Kareem Murhij Radhi College of Information Engineering, University of Nahrian,Baghdad- Iraq. Abstract Stream cipher system

More information

Scan. This is a sample of the first 15 pages of the Scan chapter.

Scan. This is a sample of the first 15 pages of the Scan chapter. Scan This is a sample of the first 15 pages of the Scan chapter. Note: The book is NOT Pinted in color. Objectives: This section provides: An overview of Scan An introduction to Test Sequences and Test

More information

Experiment 7: Bit Error Rate (BER) Measurement in the Noisy Channel

Experiment 7: Bit Error Rate (BER) Measurement in the Noisy Channel Experiment 7: Bit Error Rate (BER) Measurement in the Noisy Channel Modified Dr Peter Vial March 2011 from Emona TIMS experiment ACHIEVEMENTS: ability to set up a digital communications system over a noisy,

More information

3D IC Test through Power Line Methodology. Alberto Pagani

3D IC Test through Power Line Methodology. Alberto Pagani 3D IC Test through Power Line Methodology Alberto Pagani Outline 2 Power Line Communication (PLC) approach 2D Test architecture through PLC Advantages Methodology Feasibility Study Rx test chip for digital

More information

Chapter 11 State Machine Design

Chapter 11 State Machine Design Chapter State Machine Design CHAPTER OBJECTIVES Upon successful completion of this chapter, you will be able to: Describe the components of a state machine. Distinguish between Moore and Mealy implementations

More information

1550 nm / 3 Gb/s Medium Power Single Optical SM Digital Diagnostic Transmitter FVD2-1TR-SM50

1550 nm / 3 Gb/s Medium Power Single Optical SM Digital Diagnostic Transmitter FVD2-1TR-SM50 1550 nm / 3 Gb/s Medium Power Single Optical SM Digital Diagnostic Transmitter FVD2-1TR-SM50 Features SMPTE 297-2006 Compatible Speed from 50 Mbps to 3Gbps with up to 50 km Single-mode Fiber Distance up

More information

1. Introduction. Abstract. 1.1 Logic Criteria

1. Introduction. Abstract. 1.1 Logic Criteria An Evaluation of the Minimal-MUMCUT Logic Criterion and Prime Path Coverage Garrett Kaminski, Upsorn Praphamontripong, Paul Ammann, Jeff Offutt Computer Science Department, George Mason University, Fairfax,

More information

Arbitrary Waveform Generator

Arbitrary Waveform Generator 1 Arbitrary Waveform Generator Client: Agilent Technologies Client Representatives: Art Lizotte, John Michael O Brien Team: Matt Buland, Luke Dunekacke, Drew Koelling 2 Client Description: Agilent Technologies

More information

ETSI TS V6.0.0 ( )

ETSI TS V6.0.0 ( ) Technical Specification Digital cellular telecommunications system (Phase 2+); Half rate speech; Substitution and muting of lost frames for half rate speech traffic channels () GLOBAL SYSTEM FOR MOBILE

More information

Query By Humming: Finding Songs in a Polyphonic Database

Query By Humming: Finding Songs in a Polyphonic Database Query By Humming: Finding Songs in a Polyphonic Database John Duchi Computer Science Department Stanford University jduchi@stanford.edu Benjamin Phipps Computer Science Department Stanford University bphipps@stanford.edu

More information

EEE ALERT signal for 100GBASE-KP4

EEE ALERT signal for 100GBASE-KP4 EEE ALERT signal for 100GBASE-KP4 Matt Brown, AppliedMicro Bart Zeydel, AppliedMicro Adee Ran, Intel Kent Lusted, Intel (Regarding Comments 39 and 10234) 1 Supporters Brad Booth, Dell Rich Mellitz, Intel

More information

Main Display (Red) Displays the incident light level or the function name.

Main Display (Red) Displays the incident light level or the function name. E3X-DA-S/E3X-MDA Operation Reference Main Display (Red) Displays the incident light level or the function name. Sub-Display (Green) Displays the threshold and function settings. Operation Keys Used to

More information

The Mitsubishi DX-TL5000 DVR

The Mitsubishi DX-TL5000 DVR The Mitsubishi DX-TL5000 DVR Test, text and photos by Vlado Damjanovski 2006 In this issue of CCTV focus Test Drive we analyse the latest Mitsubishi 16-channel DVR. Sam Boustani, sales representative for

More information

INTERNATIONAL TELECOMMUNICATION UNION SPECIFICATIONS OF MEASURING EQUIPMENT

INTERNATIONAL TELECOMMUNICATION UNION SPECIFICATIONS OF MEASURING EQUIPMENT INTERNATIONAL TELECOMMUNICATION UNION CCITT O.150 THE INTERNATIONAL (10/92) TELEGRAPH AND TELEPHONE CONSULTATIVE COMMITTEE SPECIFICATIONS OF MEASURING EQUIPMENT DIGITAL TEST PATTERNS FOR PERFORMANCE MEASUREMENTS

More information

Personalized TV Recommendation with Mixture Probabilistic Matrix Factorization

Personalized TV Recommendation with Mixture Probabilistic Matrix Factorization Personalized TV Recommendation with Mixture Probabilistic Matrix Factorization Huayu Li, Hengshu Zhu #, Yong Ge, Yanjie Fu +,Yuan Ge Computer Science Department, UNC Charlotte # Baidu Research-Big Data

More information

ONE-WAY DATA TRANSMISSION FOR CABLE APPLICATIONS WEGENER COMMUNICATIONS, INC.

ONE-WAY DATA TRANSMISSION FOR CABLE APPLICATIONS WEGENER COMMUNICATIONS, INC. ONE-WAY DATA TRANSMISSION FOR CABLE APPLICATIONS HEINZ W. WEGENER WEGENER COMMUNICATIONS, INC. ONE-WAY DATA TRANSMISSION FOR CABLE APPLICATIONS ABSTRACT The cable industry has created an extensive satellite

More information

Slide Set 8. for ENCM 501 in Winter Term, Steve Norman, PhD, PEng

Slide Set 8. for ENCM 501 in Winter Term, Steve Norman, PhD, PEng Slide Set 8 for ENCM 501 in Winter Term, 2017 Steve Norman, PhD, PEng Electrical & Computer Engineering Schulich School of Engineering University of Calgary Winter Term, 2017 ENCM 501 W17 Lectures: Slide

More information

G.709 FEC testing Guaranteeing correct FEC behavior

G.709 FEC testing Guaranteeing correct FEC behavior Technical Note G.709 FEC testing Guaranteeing correct FEC behavior Capabilities and Benefits Techniques in Detail Example The ONT-503/506/5 optical network tester from JDSU which delivers in-depth analysis

More information

MEMORY ERROR COMPENSATION TECHNIQUES FOR JPEG2000. Yunus Emre and Chaitali Chakrabarti

MEMORY ERROR COMPENSATION TECHNIQUES FOR JPEG2000. Yunus Emre and Chaitali Chakrabarti MEMORY ERROR COMPENSATION TECHNIQUES FOR JPEG2000 Yunus Emre and Chaitali Chakrabarti School of Electrical, Computer and Energy Engineering Arizona State University, Tempe, AZ 85287 {yemre,chaitali}@asu.edu

More information

Tear and Destroy: Chain voting and destruction problems shared by Prêt à Voter and Punchscan and a solution using Visual Encryption

Tear and Destroy: Chain voting and destruction problems shared by Prêt à Voter and Punchscan and a solution using Visual Encryption D. LUNDIN et al: TEAR AND DESTROY Tear and Destroy: Chain voting and destruction problems shared by Prêt à Voter and Punchscan and a solution using Visual Encryption D. Lundin, H. Treharne, P. Y. A. Ryan,

More information

Fault Analysis of GRAIN-128

Fault Analysis of GRAIN-128 Fault Analysis of GRAIN-128 Alexandre Berzati, Cécile Canovas, Guilhem Castagnos, Blandine Debraize, Louis Goubin, Aline Gouget, Pascal Paillier and Stéphanie Salgado CEA-LETI/MINATEC, 17 rue des Martyrs,

More information

Permutation-based cryptography for the Internet of Things

Permutation-based cryptography for the Internet of Things Permutation-based cryptography for the Internet of Things Gilles Van Assche 1 Joint work with Guido Bertoni, Joan Daemen 1,2, Seth Hoffert, Michaël Peeters 1 and Ronny Van Keer 1 1 STMicroelectronics 2

More information

TEST PATTERNS COMPRESSION TECHNIQUES BASED ON SAT SOLVING FOR SCAN-BASED DIGITAL CIRCUITS

TEST PATTERNS COMPRESSION TECHNIQUES BASED ON SAT SOLVING FOR SCAN-BASED DIGITAL CIRCUITS TEST PATTERNS COMPRESSION TECHNIQUES BASED ON SAT SOLVING FOR SCAN-BASED DIGITAL CIRCUITS Jiří Balcárek Informatics and Computer Science, 1-st class, full-time study Supervisor: Ing. Jan Schmidt, Ph.D.,

More information

Component Video Matrix Switcher Series ITEM NO.: YS04MA, YS04MD

Component Video Matrix Switcher Series ITEM NO.: YS04MA, YS04MD Component Video Matrix Switcher Series ITEM NO.: YS04MA, YS04MD Our component video switcher allows four different component video and stereo/digital audio sources to share two video displays. Manage multiple

More information

Micro/Junior/Pro PL7 Micro PLC Functions Upcounting. TLX DS 37 PL7 40E engv4

Micro/Junior/Pro PL7 Micro PLC Functions Upcounting. TLX DS 37 PL7 40E engv4 Micro/Junior/Pro PL7 Micro PLC Functions Upcounting TLX DS 37 PL7 40E engv4 35002668 00 2 Related Documentation Related Documentation Introduction This manual is in 2 volumes: l Volume 1 l Common application

More information

ASYNCHRONOUS COUNTER CIRCUITS

ASYNCHRONOUS COUNTER CIRCUITS ASYNCHRONOUS COUNTER CIRCUITS Asynchronous counters do not have a common clock that controls all the Hipflop stages. The control clock is input into the first stage, or the LSB stage of the counter. The

More information

FIBRE CHANNEL CONSORTIUM

FIBRE CHANNEL CONSORTIUM FIBRE CHANNEL CONSORTIUM FC-PI-2 Clause 6 Optical Physical Layer Test Suite Version 0.51 Technical Document Last Updated: August 15, 2005 Fibre Channel Consortium Durham, NH 03824 Phone: +1-603-862-0701

More information

CWDM / 3 Gb/s Medium Power Optical SM Digital Diagnostic Transmitter/Receiver FVD2-1TR-SM30-XX

CWDM / 3 Gb/s Medium Power Optical SM Digital Diagnostic Transmitter/Receiver FVD2-1TR-SM30-XX CWDM / 3 Gb/s Medium Power Optical SM Digital Diagnostic Transmitter/Receiver Features FVD2-1TR-SM30-XX SMPTE 297-2006 Compatible Speed from 50kbps to 3Gbps Power Budget > 15 db Support Video Pathological

More information

Power (dbm) λ (nm) LINK DISTANCE SDI Bit Rate Max. Link Distance (km) 3G-SDI 2.97Gbps 30 HD-SDI 1.485Gbps 30 SD-SDI 270Mbps 30

Power (dbm) λ (nm) LINK DISTANCE SDI Bit Rate Max. Link Distance (km) 3G-SDI 2.97Gbps 30 HD-SDI 1.485Gbps 30 SD-SDI 270Mbps 30 1310 nm / 3 Gb/s Medium Power SM Video SFP Transceiver (RoHS Compliant) **********************************************************************************************************************************************************************

More information

Toward Metrics for Monitoring Time Reliability NIST Access to Assured and Accurate Time Workshop

Toward Metrics for Monitoring Time Reliability NIST Access to Assured and Accurate Time Workshop Toward Metrics for Monitoring Time Reliability NIST Access to Assured and Accurate Time Workshop Brock Beauchamp June 22, 2018 This work was performed under the auspices of the U.S. Department of Energy

More information

Future Performance of the LCLS

Future Performance of the LCLS Future Performance of the LCLS J. Welch for many* SLAC National Accelerator Laboratory FLS 2010, ICFA Beam Dynamics Workshop on Future Light Sources, March 1-5, 2010. SLAC National Accelerator Laboratory,

More information

8/30/2010. Chapter 1: Data Storage. Bits and Bit Patterns. Boolean Operations. Gates. The Boolean operations AND, OR, and XOR (exclusive or)

8/30/2010. Chapter 1: Data Storage. Bits and Bit Patterns. Boolean Operations. Gates. The Boolean operations AND, OR, and XOR (exclusive or) Chapter 1: Data Storage Bits and Bit Patterns 1.1 Bits and Their Storage 1.2 Main Memory 1.3 Mass Storage 1.4 Representing Information as Bit Patterns 1.5 The Binary System 1.6 Storing Integers 1.8 Data

More information

Randomness analysis of A5/1 Stream Cipher for secure mobile communication

Randomness analysis of A5/1 Stream Cipher for secure mobile communication Randomness analysis of A5/1 Stream Cipher for secure mobile communication Prof. Darshana Upadhyay 1, Dr. Priyanka Sharma 2, Prof.Sharada Valiveti 3 Department of Computer Science and Engineering Institute

More information

Testing of Cryptographic Hardware

Testing of Cryptographic Hardware Testing of Cryptographic Hardware Presented by: Debdeep Mukhopadhyay Dept of Computer Science and Engineering, Indian Institute of Technology Madras Motivation Behind the Work VLSI of Cryptosystems have

More information

SC24 Magnetic Field Cancelling System

SC24 Magnetic Field Cancelling System SPICER CONSULTING SYSTEM SC24 SC24 Magnetic Field Cancelling System Makes the ambient magnetic field OK for the electron microscope Adapts to field changes within 100 µs Touch screen intelligent user interface

More information

The Keyboard. the pitch of a note a half step. Flats lower the pitch of a note half of a step. means HIGHER means LOWER

The Keyboard. the pitch of a note a half step. Flats lower the pitch of a note half of a step. means HIGHER means LOWER The Keyboard The white note ust to the left of a group of 2 black notes is the note C Each white note is identified by alphabet letter. You can find a note s letter by counting up or down from C. A B D

More information

ED3. Digital Encoder Display Page 1 of 13. Description. Mechanical Drawing. Features

ED3. Digital Encoder Display Page 1 of 13. Description. Mechanical Drawing. Features Description Page 1 of 13 The ED3 is an LCD readout that serves as a position indicator or tachometer. The ED3 can display: Speed or position of a quadrature output incremental encoder Absolute position

More information

Avigilon View Software Release Notes

Avigilon View Software Release Notes Version 4.6.5 System Version 4.6.5 includes the following components: Avigilon VIEW Version 4.6.5 R-Series Version 4.6.5 Rialto Version 4.6.5 ICVR-HD Version 3.7.3 ICVR-SD Version 2.6.3 System Requirements

More information

Power-Driven Flip-Flop p Merging and Relocation. Shao-Huan Wang Yu-Yi Liang Tien-Yu Kuo Wai-Kei Tsing Hua University

Power-Driven Flip-Flop p Merging and Relocation. Shao-Huan Wang Yu-Yi Liang Tien-Yu Kuo Wai-Kei Tsing Hua University Power-Driven Flip-Flop p Merging g and Relocation Shao-Huan Wang Yu-Yi Liang Tien-Yu Kuo Wai-Kei Mak @National Tsing Hua University Outline Introduction Problem Formulation Algorithms Experimental Results

More information

VHDL Implementation of Logic BIST (Built In Self Test) Architecture for Multiplier Circuit for High Test Coverage in VLSI Chips

VHDL Implementation of Logic BIST (Built In Self Test) Architecture for Multiplier Circuit for High Test Coverage in VLSI Chips VHDL Implementation of Logic BIST (Built In Self Test) Architecture for Multiplier Circuit for High Test Coverage in VLSI Chips Pushpraj Singh Tanwar, Priyanka Shrivastava Assistant professor, Dept. of

More information