scholarly journals Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes

Author(s):  
Xiaoyang Dong ◽  
Xiaoyun Wang

Since Knudsen and Rijmen proposed the known-key attacks in ASIACRYPT 2007, the open-key model becomes more and more popular. As the other component of the open-key model, chosen-key model was applied to the full attacks on AES-256 by Biryukov et al. in CRYPTO 2009. In this paper, we explore how practically the chosen-key model affect the real-world cryptography and show that 11-round generic Feistel-SP block cipher is no longer safe in its hashing modes (MMO and MP mode) as there exist collision attacks. This work improves Sasaki and Yasuda’s collision attacks by 2 rounds with two interesting techniques. First, we for the first time use the available degrees of freedom in the key to reduce the complexity of the inbound phase, which extends the previous 5-round inbound differential to a 7-round one. This results in a 12-round chosen-key distinguisher of Feistel-SP block cipher. Second, inspired by the idea of Wang et al., we construct collisions using two blocks. The rebound attack is used in the second compression function. We carefully balance the freedom of the first block and the complexity of the rebound attack, and extend the chosen-key attack to a 11-round collision attack on its hashing modes (MMO and MP mode).

2018 ◽  
Vol 9 (6) ◽  
pp. 9
Author(s):  
Somayyeh Sabah

The present study considered the definitions of and differences between the concepts of task, exercise, and drill in the related literature on L2 practices. The concept of task has been commonly differentiated from the exercise and drill with respect to certain criteria. Task is, in the main, meaning-based, goal-oriented, and purposeful with a nonlinguistic and communicative outcome. Based on Long (2016), task demands the L2 use in the real world. Also, as said by Swales (1990), tasks are more relatable to the genre than the other two language practices. Moreover, the task performance endows L2 learners with higher degrees of freedom than the accomplishment of the exercise and drilling, respectively. Furthermore, this study examined and supported a systems-thinking perspective on task-based language teaching (TBLT) (Finch, 2001). However, considering the task phase as a complex system seems to be still under debate and thus needs more research and analysis.


Robotics ◽  
2021 ◽  
Vol 10 (2) ◽  
pp. 68
Author(s):  
Lei Shi ◽  
Cosmin Copot ◽  
Steve Vanlanduit

In gaze-based Human-Robot Interaction (HRI), it is important to determine human visual intention for interacting with robots. One typical HRI interaction scenario is that a human selects an object by gaze and a robotic manipulator will pick up the object. In this work, we propose an approach, GazeEMD, that can be used to detect whether a human is looking at an object for HRI application. We use Earth Mover’s Distance (EMD) to measure the similarity between the hypothetical gazes at objects and the actual gazes. Then, the similarity score is used to determine if the human visual intention is on the object. We compare our approach with a fixation-based method and HitScan with a run length in the scenario of selecting daily objects by gaze. Our experimental results indicate that the GazeEMD approach has higher accuracy and is more robust to noises than the other approaches. Hence, the users can lessen cognitive load by using our approach in the real-world HRI scenario.


2010 ◽  
Vol 36 (S1) ◽  
pp. 25-46 ◽  
Author(s):  
WILLIAM BAIN

AbstractThis article takes up Louise Arbour's claim that the doctrine of the ‘Responsibility to Protect’ is grounded in existing obligations of international law, specifically those pertaining to the prevention and punishment of genocide. In doing so, it argues that the aspirations of the R2P project cannot be sustained by the idea of ‘responsibility’ alone. The article proceeds in arguing that the coherence of R2P depends on an unacknowledged and unarticulated theory of obligation that connects notions of culpability, blame, and accountability with the kind of preventive, punitive, and restorative action that Arbour and others advocate. Two theories of obligation are then offered, one natural the other conventional, which make this connection explicit. But the ensuing clarity comes at a cost: the naturalist account escapes the ‘real’ world to redeem the intrinsic dignity of all men and women, while the conventionalist account remains firmly tethered to the ‘real’ world in redeeming whatever dignity can be had by way of an agreement. The article concludes by arguing that the advocate of the responsibility to protect can have one or the other, but not both.


First Monday ◽  
2019 ◽  
Author(s):  
James Brusseau

Compartmentalizing our distinct personal identities is increasingly difficult in big data reality. Pictures of the person we were on past vacations resurface in employers’ Google searches; LinkedIn which exhibits our income level is increasingly used as a dating web site. Whether on vacation, at work, or seeking romance, our digital selves stream together. One result is that a perennial ethical question about personal identity has spilled out of philosophy departments and into the real world. Ought we possess one, unified identity that coherently integrates the various aspects of our lives, or, incarnate deeply distinct selves suited to different occasions and contexts? At bottom, are we one, or many? The question is not only palpable today, but also urgent because if a decision is not made by us, the forces of big data and surveillance capitalism will make it for us by compelling unity. Speaking in favor of the big data tendency, Facebook’s Mark Zuckerberg promotes the ethics of an integrated identity, a single version of selfhood maintained across diverse contexts and human relationships. This essay goes in the other direction by sketching two ethical frameworks arranged to defend our compartmentalized identities, which amounts to promoting the dis-integration of our selves. One framework connects with natural law, the other with language, and both aim to create a sense of selfhood that breaks away from its own past, and from the unifying powers of big data technology.


1971 ◽  
Vol 18 (5) ◽  
pp. 320-321
Author(s):  
Charles Brumfiel

In the November 1970 issue of the Arithmetic Teacher there appeared my article, “Mathematical Systems and Their Relationship to the Real World.” One point I made is that mathematics provides us with a vast array of symbols and concepts to use in solving real-life problems. When we use mathematics to solve a real problem, we make certa in mental associations between mathematical symbols and real objects. I suggested that arguments sometimes arise because two persons may make different associations, mathematical symbols to real objects, and each thinks his associations are correct while the other person's are incorrect.


2017 ◽  
Vol 80 (1) ◽  
Author(s):  
Adam Glaz

Grounded in a rich philosophical and semiotic tradition, the most influential models of the linguistic sign have been Saussure’s intimate connection between the signifier and the signi-fied and Ogden and Richards’ semiotic triangle. Within the triangle, claim the cognitive lin-guists Radden and Kövecses, the sign functions in a metonymic fashion. The triangular semi-otic model is expanded here to a trapezium and calibrated with, on the one hand, Peirce’s conception of virtuality, and on the other hand, with some of the tenets of Langacker’s Cogni-tive Grammar. In conclusion, the question “How does the linguistic sign mean?” is answered thus: it means by virtue of the linguistic form activating (virtually) the entire trapezium-like configuration of forms, concepts, experienced projections, and relationships between all of the above. Activation of the real world remains dubious or indirect. The process is both meto-nymic and virtual, in the sense specified.


Author(s):  
BARTOLOMIEJ SKOWRON ◽  

From an ontological point of view, virtuality is generally considered a simulation: i.e. not a case of true being, and never more than an illusory copy, referring in each instance to its real original. It is treated as something imagined — and, phenomenologically speaking, as an intentional object. It is also often characterized as fictive. On the other hand, the virtual world itself is extremely rich, and thanks to new technologies is growing with unbelievable speed, so that it now influences the real world in quite unexpected ways. Thus, it is also sometimes considered real. In this paper, against those who would regard virtuality as fictional or as real, I claim that the virtual world straddles the boundary between these two ways of existence: that it becomes real. I appeal to Roman Ingarden’s existential ontology to show that virtual objects become existentially autonomous, and so can be attributed a form of actuality and causal efficaciousness. I conclude that the existential autonomy and actuality of virtual objects makes them count as real objects, but also means that they undergo a change in their mode of existence.


2007 ◽  
Vol 7 ◽  
pp. 335
Author(s):  
ΙΚΑΡΟΣ ΜΑΝΤΟΥΒΑΛΟΣ

<p>The dual character of the trade diaspora of the Greeks is substantiated onthe one hand by the way they organized themselves and functioned within theHungarian bourgeois environment and, on the other, by the social andeconomic structures of the regions where they settled. The different historicalmanifestations of the activity of the Greeks are reflected in the archivallocations themselves: in the archive of the Greek Orthodox community ofMiskolc and the municipal archive of Sâtoraljaujhely, which came under theMunicipal Archive of Miskolc (Borsod - Abauj - Zemplén Megyei Levéltâr).The first comprises ledgers, account books, church and school registers, aswell as a mass of loose documents of diverse content, dating back to the early18th up to the mid-19th century, written mostly in the Greek language.Conversely, at the Sâtoraljaujhely archive, the lack of a separate archivalclassification for the Greeks can only be interpreted as proof of the swiftassimilation of the trade immigrants into the social and economic fabric of thehost city. Documents in Latin and Hungarian scattered within the archivalunities take on a special meaning in terms of the depth of the historicalresearch and the examination of individual events, which are interwoven withthe presence of Greek merchants in the province of Zemplén, in northeasternHungary.</p><p>The tracing of the Greek presence in Hungary is completed by a visit tothe Budapest Public Archive. Testaments and inheritance inventoriesbelonging to members of the Greek and Macedonian-Vlach communities ofPest were selected and photocopied. Aspects of private lives, the hierarchy ofrelationships, intertribal roles, the composition and structure of thehouseholds, as well as strategies for the transfer of property are cast in highrelief through the microhistorical examination of the material, illustrating themindset and perceptions that governed people's behaviour in the real world.</p>


There are hundreds of technologies today. Companies and brands continuously try to create and bring something innovative in the market to attract consumers to them in order to get a rise in market share. In the world where people have started getting used to hundreds of technologies, if asked about those which have affected them the most in last ten to twelve years, no one will miss mentioning blockchain. Blockchain has gained very much popularity after the introduction of bitcoin and ethereum in its environment. Blockchain mainly has two types of functionalities. One that involves transactions and the other which talks about contracts. This work highlights some of the very much talked about applications of this technology in the real world. The work also considers various factors and methods by which this technology can be introduced to the audience by suggesting ways in which blockchain can be introduced in the lives. Discussion on how this technology can affect human lives in the future is also an important part of this paper. Because blockchain has huge number of applications that the paper has tried to inculcate, it can be a technology of future which many scientists and industrialists have already started to believe. That is why this work finds a unique and all in one collection of applications and possibilities of Blockchain.


Sign in / Sign up

Export Citation Format

Share Document