The Algebra Properties of the S-Boxes of Several Block Ciphers

2012 ◽  
Vol 546-547 ◽  
pp. 617-621
Author(s):  
Jia Liu ◽  
Yu Li Shen

S-boxes bring nonlinearity to block ciphers and strengthen their cryptographic security. A detailed analysis of the cryptographic properties of S-boxes of several block ciphers, such as SMS4, AES, Camellia and SEED, are made in this paper. Some algebraic properties of boolean function of S-boxes such as balanceness, non-linearity, algebraic degree and walsh spectrums are well investigated. We reveal the advantages and disadvantages of those S-boxes used in SMS4, AES, Camellia and SEED as compared with each other.

2018 ◽  
Vol 11 (2) ◽  
pp. 41-51 ◽  
Author(s):  
I. Ya. Lukasevich

The subject of the research is new tools for business financing using the initial coin offering (ICO) in the context of the development of cryptocurrencies and the blockchain technologies as their basis. The purpose of the work was to analyze the advantages and disadvantages of the ICO in comparison with traditional financial tools as well as prospects, limitations and problems of using digital financial tools. Conclusions are made in relation to possibilities, limitations and application areas of digital business financing tools, particularly in the real sector, taking into account the specifics of the Russian economy and legislation. It is shown that the main problems of using the digital financial tools are related to the economic sphere and caused by the lack of adequate approaches to evaluation of assets as well as the shortage of objective information. The problems and new tasks of corporate finance in the digital economy are defined.


2020 ◽  
Vol 26 ◽  
Author(s):  
Emir Muzurović ◽  
Zoja Stanković ◽  
Zlata Kovačević ◽  
Benida Šahmanović Škrijelj ◽  
Dimitri P Mikhailidis

: Diabetes mellitus (DM) is a chronic and complex metabolic disorder, and also an important cause of cardiovascular (CV) diseases (CVDs). Subclinical inflammation, observed in patients with type 2 DM (T2DM), cannot be considered the sole or primary cause of T2DM in the absence of classical risk factors, but it represents an important mechanism that serves as a bridge between primary causes of T2DM and its manifestation. Progress has been made in the identification of effective strategies to prevent or delay the onset of T2DM. It is important to identify those at increased risk for DM by using specific biomarkers. Inflammatory markers correlate with insulin resistance (IR) and glycoregulation in patients with DM. Also, several inflammatory markers have been shown to be useful in assessing the risk of developing DM and its complications. However, the intertwining of pathophysiological processes and the not-quite-specificity of inflammatory markers for certain clinical entities limits their practical use. In this review we consider the advantages and disadvantages of various inflammatory biomarkers of DM that have been investigated to date as well as possible future directions. Key features of such biomarkers should be high specificity, non-invasiveness and cost-effectiveness.


Author(s):  
A J Kinloch

When considering methods for joining materials, there are many advantages that engineering adhesives can offer, compared to the more traditional methods of joining such as bolting, brazing, welding, mechanical fasteners, etc. The advantages and disadvantages of using engineering adhesives are discussed and it is shown that it is possible to identify three distinct stages in the formation of an adhesive joint. Firstly, the adhesive initially has to be in a ‘liquid’ form so that it can readily spread over and make intimate molecular contact with the substrates. Secondly, in order for the joint to bear the loads that will be applied to it during its service life, the ‘liquid’ adhesive must now harden. In the case of adhesives used in engineering applications, the adhesive is often initially in the form of a ‘liquid’ monomer which polymerizes to give a high molecular weight polymeric adhesive. Thirdly, it must be appreciated that the load-carrying ability of the joint, and how long it will actually last, are affected by: (a) the design of the joint, (b) the manner in which loads are applied to it and (c) the environment that the joint encounters during its service life. Thus, to understand the science involved and to succeed in further developing the technology, the skills and knowledge from many different disciplines are required. Indeed, the input from surface chemists, polymer chemists and physicists, materials engineers and mechanical engineers are needed. Hence, the science and technology of adhesion and adhesives is a truly multidisciplined subject. These different disciplines have been brought together by developing a fracture mechanics approach to the failure of adhesive joints. The advances that have been made in applying the concepts of fracture mechanics to adhesive joints have enabled a better understanding of the fundamental aspects of adhesion and the more rapid extension of adhesives technology into advanced engineering applications.


2017 ◽  
Author(s):  
Sankhanil Dey ◽  
Ranjan Ghosh

US defence sponsored the DES program in 1974 and released it in 1977. It remained as a well-known and well accepted block cipher until 1998. Thirty-two 4-bit DES S-Boxes are grouped in eight each with four and are put in public domain without any mention of their design methodology. S-Boxes, 4-bit, 8-bit or 32-bit, find a permanent seat in all future block ciphers. In this paper, while looking into the design methodology of DES S-Boxes, we find that S-Boxes have 128 balanced and non-linear Boolean Functions, of which 102 used once, while 13 used twice and 92 of 102 satisfy the Boolean Function-level Strict Avalanche Criterion. All the S-Boxes satisfy the Bit Independence Criterion. Their Differential Cryptanalysis exhibits better results than the Linear Cryptanalysis. However, no S-Boxes satisfy the S-Box-level SAC analyses. It seems that the designer emphasized satisfaction of Boolean-Function-level SAC and S-Box-level BIC and DC, not the S-Box-level LC and SAC.


Author(s):  
І. Андрущак ◽  
В. Марценюк ◽  
I. Андрощук ◽  
В. Чудовець ◽  
М. Потейчук

The article discusses the current state of application and development of cloud computing, the main advantages and disadvantages of their use in the states, enterprises and in scientific activity. The standards, regulations and guidance documents in the field of cloud computing information security are developed and analyzed, developed by the Cloud Security Alliance (CSA), the European Network and Information Security Agency (ENISA) and the National Institute of Standards and Technology (NIST), and the results of a detailed analysis of the issues information security in the cloud.


Author(s):  
Kamel Karoui

With the interconnection of computers in networks, particularly through the Internet, it becomes possible to connect applications on distant computers. An application works perfectly whether it isdistant or local. Moreover, a distant applicationallows us to benefit from the following additional advantages: • Data and processes can be stored on a remote server that has a bigger storage capacity than the local host. Data can be shared between users using, for example, Remote Procedure Call (RPC), Remote Method Invocation (RMI), Java Message Service (JMS), and Enterprise JavaBeans (EJB) (Frénot, 2000): • Distant application can be used at the same time by several users; • Updating data and processes can be done only in one host; • Flexibility on distribution of the load: An application can be executed on the available machine; and • High availability: A faulty machine does not affect the others. Many approaches have been proposed and developed for communication between distant hosts on a network such as Message Passing (MP), Remote Evaluation (REV), Remote Object Invocation (ROI), Mobile Agents (MA), Common Object Request Broker Architecture (CORBA), Web Services (WS), RPC, and RMI (Dejan, LaForge, & Chauhan, 1998). In this article, we will focus on two particular paradigms: The Web Services and the Mobile Agents. WS defines a standard to invoke distant applications and to recover results across the Web. Its invocation is made in synchronous mode. MA has the faculty to move easily between a network’s hosts to execute user requests. MA communication is made in asynchronous mode. The fusion of these two complementary technologies will solve many problems. This article is composed of the following sections: In the first two sections, we introduce the concepts of WS and MA, their advantages and disadvantages. In the third section, we present different kinds of interaction between MA and WS. Finally, we study an example in the last section.


2020 ◽  
Vol 198 ◽  
pp. 04011
Author(s):  
Yuqian Zhang

With the rapid development of technologies, the third generation semiconductor is being studied, as it is leading to the significant change in industry like the manufacture of PC, mobile devices, lighting etc. Till now, due to its irreplaceable physical characteristics, third generation semiconductor is applied to lots of fields. This paper analyzes the application of third generation semiconductor, namely, GaN and SiC. Their characteristics including advantages as well as disadvantages will be discussed through reviewing the result of relevant researches. Meanwhile, comparison between the third generation semiconductors and the second as well as the first generation semiconductors is made in this paper. Through the comparison of physical characteristics, recent marketing, production and limitations, the advantages and disadvantages of each semiconductor is analyzed and the suggestion of how to avoid the disadvantage through application is proposed. At last, the future development is predicted. According to the analysis result of this paper, silicon poses more merits. Silicon is not only cheaper but also performs better making it a preference of GaAs, and GaN in the domain of IC. The second generation semiconductor, GaAs, is widely used in the circuits and photoelectric integration. Furthermore, the third semiconductor material GaN is a promising material for power switching and communication and has the great possibility to play a crucial role in market.


2020 ◽  
Vol 2020 ◽  
pp. 1-10
Author(s):  
Yue Leng ◽  
Jinyang Chen ◽  
Tao Xie

Permutations with low differential uniformity, high algebraic degree, and high nonlinearity over F22k can be used as the substitution boxes for many block ciphers. In this paper, several classes of low differential uniformity permutations are constructed based on the method of choosing two permutations over F22k to get the desired permutations. The resulted low differential uniformity permutations have high algebraic degrees and nonlinearities simultaneously, which provide more choices for the substitution boxes. Moreover, some numerical examples are provided to show the efficacy of the theoretical results.


2002 ◽  
Vol 33 (4) ◽  
pp. 1-12 ◽  
Author(s):  
D. Harker ◽  
S. Cassim

The regulation of advertising is a controversial and difficult process, and many schemes around the world opt for a self-regulatory approach to curb unacceptable advertising. However, when schemes are established or reformulated, most countries learn from other, more established, regimes. Whilst Australia and South Africa commenced the advertising self-regulation (ASR) process at similar times and based their systems on the UK model, two attempts have been made in Australia over the past three decades to produce more acceptable ads, whilst South Africa’s system has endured in its original form. This paper reviews the ASR systems in these three countries, using a macro framework for analysis which contextualises advertising in society. The systems have the fundamental process of handling complaints about advertising in common, however there are advantages and disadvantages of each and these are discussed with a view to providing some guidance for Australia’s fledgling, reformulated, system. Important insights for the development of regulation of advertising are presented.


Sign in / Sign up

Export Citation Format

Share Document