THE ALGORITHM OF BLOCK ENCRYPTION "AL03" AND THE RESULTS OF ITS ANALYSIS

2021 ◽  
Vol 75 (3) ◽  
pp. 108-114
Author(s):  
N. Kapalova ◽  
◽  
К. Аlgazy ◽  
К. Sakan ◽  
D. Dyussenbayev ◽  
...  

This paper provides a brief description of the developed block cipher algorithm "AL03" and the results of checking the avalanche effect. This algorithm has the structure of a substitution-permutation network. The check consisted of two stages. At the first stage, the avalanche effect was tested separately for each transformation used in the algorithm. At the second stage, each round of encryption was analyzed. To characterize the degree of the avalanche effect in a transformation, the avalanche parameter is determined and used - the numerical value of the deviation of the probability of changing a bit in the output sequence when a bit in the input sequence changes from the required probability value equal to 0.5. The article presents the results after the 1st, 2nd, 3rd, and 24th rounds in the form of a table. Based on the round results obtained, comparative tests were carried out, as a result of which a positive conclusion was given on further research of this encryption algorithm.

Author(s):  
Jun Peng ◽  
Du Zhang ◽  
Xiaofeng Liao

This paper proposes a novel image block encryption algorithm based on three-dimensional Chen chaotic dynamical system. The algorithm works on 32-bit image blocks with a 192-bit secret key. The idea is that the key is employed to drive the Chen’s system to generate a chaotic sequence that is inputted to a specially designed function G, in which we use new 8x8 S-boxes generated by chaotic maps (Tang, 2005). In order to improve the robustness against differental cryptanalysis and produce desirable avalanche effect, the function G is iteratively performed several times and its last outputs serve as the keystreams to encrypt the original image block. The design of the encryption algorithm is described along with security analyses. The results from key space analysis, differential attack analysis, and information entropy analysis, correlation analysis of two adjacent pixels prove that the proposed algorithm can resist cryptanalytic, statistical and brute force attacks, and achieve a higher level of security. The algorithm can be employed to realize the security cryptosystems over the Internet.


Author(s):  
Jun Peng ◽  
Du Zhang ◽  
Xiaofeng Liao

This paper proposes a novel image block encryption algorithm based on three-dimensional Chen chaotic dynamical system. The algorithm works on 32-bit image blocks with a 192-bit secret key. The idea is that the key is employed to drive the Chen’s system to generate a chaotic sequence that is inputted to a specially designed function G, in which we use new 8x8 S-boxes generated by chaotic maps (Tang, 2005). In order to improve the robustness against differental cryptanalysis and produce desirable avalanche effect, the function G is iteratively performed several times and its last outputs serve as the keystreams to encrypt the original image block. The design of the encryption algorithm is described along with security analyses. The results from key space analysis, differential attack analysis, and information entropy analysis, correlation analysis of two adjacent pixels prove that the proposed algorithm can resist cryptanalytic, statistical and brute force attacks, and achieve a higher level of security. The algorithm can be employed to realize the security cryptosystems over the Internet.


Author(s):  
Abeer F. Shimal ◽  
Baydaa H. Helal ◽  
Ashwaq T. Hashim

<p>This paper introduces an effective image encryption approach that merges a chaotic map and polynomial with a block cipher. According to this scheme, there are three levels of encryption. In the first level, pixel positions of the image are scuffled into blocks randomly based on a chaotic map. In the second level, the polynomials are constructed by taking N unused pixels from the permuted blocks as polynomial coefficients. Finally, the third level a proposed secret-key block cipher called extended of tiny encryption algorithm (ETEA) is used. The proposed ETEA algorithm increased the block size from 64-bit to 256-bit by using F-function in type three Feistel network design. The key schedule generation is very straightforward through admixture the entire major subjects in the identical manner for every round. The proposed ETEA algorithm is word-oriented, where wholly internal operations are executed on words of 32 bits. So, it is possible to efficiently implement the proposed algorithm on smart cards. The results of the experimental demonstration that the proposed encryption algorithm for all methods are efficient and have high security features through statistical analysis using histograms, correlation, entropy, randomness tests, and the avalanche effect.</p>


Author(s):  
Dale E. Bockman ◽  
L. Y. Frank Wu ◽  
Alexander R. Lawton ◽  
Max D. Cooper

B-lymphocytes normally synthesize small amounts of immunoglobulin, some of which is incorporated into the cell membrane where it serves as receptor of antigen. These cells, on contact with specific antigen, proliferate and differentiate to plasma cells which synthesize and secrete large quantities of immunoglobulin. The two stages of differentiation of this cell line (generation of B-lymphocytes and antigen-driven maturation to plasma cells) are clearly separable during ontogeny and in some immune deficiency diseases. The present report describes morphologic aberrations of B-lymphocytes in two diseases in which second stage differentiation is defective.


2020 ◽  
Vol 39 (6) ◽  
pp. 8139-8147
Author(s):  
Ranganathan Arun ◽  
Rangaswamy Balamurugan

In Wireless Sensor Networks (WSN) the energy of Sensor nodes is not certainly sufficient. In order to optimize the endurance of WSN, it is essential to minimize the utilization of energy. Head of group or Cluster Head (CH) is an eminent method to develop the endurance of WSN that aggregates the WSN with higher energy. CH for intra-cluster and inter-cluster communication becomes dependent. For complete, in WSN, the Energy level of CH extends its life of cluster. While evolving cluster algorithms, the complicated job is to identify the energy utilization amount of heterogeneous WSNs. Based on Chaotic Firefly Algorithm CH (CFACH) selection, the formulated work is named “Novel Distributed Entropy Energy-Efficient Clustering Algorithm”, in short, DEEEC for HWSNs. The formulated DEEEC Algorithm, which is a CH, has two main stages. In the first stage, the identification of temporary CHs along with its entropy value is found using the correlative measure of residual and original energy. Along with this, in the clustering algorithm, the rotating epoch and its entropy value must be predicted automatically by its sensor nodes. In the second stage, if any member in the cluster having larger residual energy, shall modify the temporary CHs in the direction of the deciding set. The target of the nodes with large energy has the probability to be CHs which is determined by the above two stages meant for CH selection. The MATLAB is required to simulate the DEEEC Algorithm. The simulated results of the formulated DEEEC Algorithm produce good results with respect to the energy and increased lifetime when it is correlated with the current traditional clustering protocols being used in the Heterogeneous WSNs.


Author(s):  
Fitriah Khoirunnisa ◽  
Friska Septiani Silitonga ◽  
Veri Firmansyah

Penelitian ini bertujuan menganalisis kebutuhan petunjuk praktikum berbasis Keterampilan Proses Sains (KPS) untuk mencapai kemampuan merancang eksperimen pada materi kalor reaksi kalorimetri. Penelitian dilakukan terhadap peserta didik kelas XI SMA Negeri 2 Kota Tanjungpinang. Variabel penelitian mencakup analisis kebutuhan bahan ajar dan analisis kesesuaian Kompetensi Inti (KI) dan Kompetensi Dasar (KD). Jenis penelitian yang dilakukan adalah penelitian deskriptif kualitatif. Tahapan pertama dalam penelitian ini adalah menganalisis kebutuhan bahan ajar dengan cara membandingkan dua petunjuk praktikum yang selama ini telah digunakan di sekolah tersebut, ditinjau dari aspek struktur format penulisan, aspek kreativitas, dan aspek keterampilan proses sains yang terdapat dalam petunjuk praktikum. Sehingga didapatkan kesimpulan bahwa petunjuk praktikum yang selama ini digunakan tidak memberikan kesempatan kepada peserta didiknya untuk merancang eksperimen yang telah ditentukan. Tahapan kedua yaitu menganalisis kesesuaian kompetensi inti dan kompetensi dasar, yang bertujuan untuk menentukan indikator pencapaian kompetensi (IPK) yang akan menjadi acuan dalam mengembangkan petunjuk praktikum berbasis keterampilan proses sains. Dari kedua tahapan yang telah dilakukan maka dapat disimpulkan bahwa peserta didik memerlukan petunjuk praktikum yang mampu mengonstruksi pikiran dan mengaktifkan kinerja mereka, sehingga pendekatan Keterampilan Proses Sains menjadi pilihan dalam mengembangkan petunjuk praktikum yang sesuai dengan karakteristik kurikulum 2013.   This research aims to analyze the needs of Science Process Skills based Practical Instruction to achieve the ability to design experiments on the calor of reaction. This research was done to the students of class XI SMA Negeri 2 Tanjungpinang City. Research Variable includes the analysis of the needs of the learning materials and analysis of the suitability of the Core Competence (KI) and Basic Competence (KD). The type of research conducted is descriptive qualitative research. The first stages in this research is to analyze the needs of learning materials by comparing two practical instructions that had been implementing in the school, from the aspects of the structure of writing format, creativity, and science process skills embedded in practical instructions. The conclusion of this research that current practical instructions does not give an opportunity to the participants to design determined experiments. The second stage, namely analyzing the suitability of core competence and basic competence, which aims to determine the indicators of achievement of the competencies (GPA) which will be a reference in developing process skills-based teaching instructions science. Of the two stages that has been done then it can be concluded that learners need practical instructions to construct  thinking and and their performance, so the Science Process Skills approach is an option in developing practical instruction suitable for the characteristics of the curriculum of 2013.


2014 ◽  
Vol 59 (1) ◽  
pp. 41-52 ◽  
Author(s):  
Norbert Skoczylas

Abstract The Author endeavored to consult some of the Polish experts who deal with assessing and preventing outburst hazards as to their knowledge and experience. On the basis of this knowledge, an expert system, based on fuzzy logic, was created. The system allows automatic assessment of outburst hazard. The work was completed in two stages. The first stage involved researching relevant sources and rules concerning outburst hazard, and, subsequently, determining a number of parameters measured or observed in the mining industry that are potentially connected with the outburst phenomenon and can be useful when estimating outburst hazard. Then, the Author contacted selected experts who are actively involved in preventing outburst hazard, both in the industry and science field. The experts were anonymously surveyed, which made it possible to select the parameters which are the most essential in assessing outburst hazard. The second stage involved gaining knowledge from the experts by means of a questionnaire-interview. Subjective opinions on estimating outburst hazard on the basis of the parameters selected during the first stage were then systematized using the structures typical of the expert system based on fuzzy logic.


2017 ◽  
Vol 924 (6) ◽  
pp. 6-16
Author(s):  
V.S. Tikunov ◽  
O.Yu. Chereshnia

The article presents a methodology for a comprehensive assessment of the environmental situation in Russian Federation regions based on the pollution index and the index of the ecological tension. The evaluation was carried out in two stages. At the first stage, the degree of pollution of the atmosphere, hydrosphere and lithosphere of the regions was estimated on the basis of the emission of pollutants into the atmosphere, departing from stationary sources, the formation of solid domestic wastes (SDW) and the discharge of contaminated wastewater. Based on these three indicators, a pollution index was constructed that estimates aggregate pollution level. In the second stage, the authors made the estimation of loads generated by atmospheric emissions, solid waste and waste water discharged into the territory of each region, per capita and in relation to the environmental capacity of the economy. This allows us to take into account the area of pollution, anthropogenic pressure and environmental responsibility of the population, as well as the environmental friendliness of production. On the basis of relative indicators, the index of ecological tension was created.


2021 ◽  
Vol 11 (2) ◽  
pp. 57
Author(s):  
Roksana Binte Rezwan ◽  
Yoshi Takahashi

This study aimed to understand the psychological process behind employees’ knowledge hiding (KH) behaviors in organizations. KH is an intentional act of concealing knowledge when it is requested by a colleague and can lead to counterproductive consequences for the organization. Therefore, this study synthesized previous studies (n = 88) on KH through a systematic literature review. We used the cognitive–motivational–relational (CMR) theory of emotion to create a framework for the studies’ findings. Based on the framework, the psychological process behind KH has two stages—personal goal generation and the knowledge-request event appraisal process, each of which contains its own CMR process. In the first stage, an individual’s internal and external attributes related to the organization shape their personal goals. In the second stage, an individual appraises the features of a knowledge-request event in terms of both their personal goal and the internal and external attributes that created the goal. If the knowledge request is appraised as harmful for the personal goal, emotion arises and leads to the manifestation of KH. This study contributes to the knowledge management literature as, to our knowledge, it is the first to propose a CMR theory-based framework to understand the overall psychological process behind KH.


2021 ◽  
pp. 105971232110310
Author(s):  
Charles Lenay

The aim of this article is to offer a new approach of perception regarding the position of a distant object. It is also a tribute to John Stewart who accompanied the first stages of this research. Having already examined the difficulties surrounding questions of the perception of exteriority within the framework of enactive approaches, we will proceed in two stages. The first stage will consist of an attempt to explain distal perception in terms of individual sensorimotor invariants. This poses the problem but fails to solve it. The second stage will propose a new pathway to account for spatial perception; a pathway that does not deny the initial intuitions of the autopoietic enactive approaches, but one which radically changes the conception of cognition by considering, from the perceptual stage, the need to take into account interindividual interactions. The protocol of an original experimental study will characterize this new approach considering the perceptual experience of objects at a distance, in exteriority, in a space of possibilities without parting from the domain of interaction. To do this, we have to work at the limits of the perceptual crossing, that is, at the moment when the perceptual reciprocity between different subjects begins to disappear.


Sign in / Sign up

Export Citation Format

Share Document