The search functionality is under construction.
The search functionality is under construction.

Author Search Result

[Author] Qin WANG(7hit)

1-7hit
  • New Differential Cryptanalytic Results for Reduced-Round CAST-128

    Meiqin WANG  Xiaoyun WANG  Kam Pui CHOW  Lucas Chi Kwong HUI  

     
    PAPER-Cryptography and Information Security

      Vol:
    E93-A No:12
      Page(s):
    2744-2754

    CAST-128 is a block cipher used in a number of products, notably as the default cipher in some versions of GPG and PGP. It has been approved for Canadian government use by the Communications Security Establishment. Haruki Seki et al. found 2-round differential characteristics and they can attack 5-round CAST-128. In this paper, we studied the properties of round functions F1 and F3 in CAST-128, and identified differential characteristics for F1 round function and F3 round function. So we identified a 6-round differential characteristic with probability 2-53 under 2-23.8 of the total key space. Then based on 6-round differential characteristic, we can attack 8-round CAST-128 with key sizes greater than or equal to 72 bits and 9-round CAST-128 with key sizes greater than or equal to 104 bits. We give the summary of attacks on reduced-round CAST-128 in Table 10.

  • A New Structure for Radar Sliding MTD

    Yongquan ZHANG  Xiqin WANG  Yingning PENG  

     
    LETTER-Sensing

      Vol:
    E84-B No:2
      Page(s):
    349-350

    A modified moving DFT algorithm and a new SMTD structure are proposed in this paper. The new SMTD structure adopts both batch-mode signal channel estimating and the modified moving DFT algorithm, which leads to dramatic decline of the computational load.

  • New Impossible Differential Attack on SAFER Block Cipher Family

    Jingyuan ZHAO  Meiqin WANG  Jiazhe CHEN  Yuliang ZHENG  

     
    PAPER-Cryptography and Information Security

      Vol:
    E98-A No:3
      Page(s):
    843-852

    SAFER block cipher family consists of SAFER K, SAFER SK, SAFER+ and SAFER++. As the first proposed block cipher of them, SAFER K is strengthened by SAFER SK with improved key schedule. SAFER+ is designed as an AES candidate and Bluetooth uses a customized version of it for security. SAFER++, a variant of SAFER+, is among the cryptographic primitives selected for the second phase of the NESSIE project. In this paper, we take advantage of properties of the linear transformation and S-boxes to identify new impossible differentials for SAFER SK, SAFER+, and SAFER++. Moreover, we give the impossible differential attacks on 4-round SAFER SK/128 and 4-round SAFER+/128(256), 5-round SAFER++/128 and 5.5-round SAFER++/256. Our attacks significantly improve previously known impossible differential attacks on them. Specifically, our attacks on SAFER+ are the best attack in terms of number of rounds.

  • Adaptive MTI Scheme for Airborne Radar in Frequency Domain

    Yong HUANG  Yingning PENG  Xiqin WANG  

     
    LETTER-Sensing

      Vol:
    E84-B No:5
      Page(s):
    1451-1453

    Based on filtering ground clutter power directly in the frequency domain, a new non-coefficient Adaptive MTI (AMTI) scheme is presented in this letter. The results of simulation example show that this scheme has smaller signal-to-noise ratio loss than the classical AMTI based on spectral estimation, as well as high improvement factor.

  • A New High-Resolution Frequency Estimator Based on Pole-Placement AR Model

    Huadong MENG  Xiqin WANG  Hao ZHANG  Yingning PENG  

     
    LETTER-Fundamental Theories

      Vol:
    E86-B No:8
      Page(s):
    2503-2507

    The high-resolution frequency estimators most commonly used, such as Least Square (LS) method based on AR model, MVSE, MUSIC and ESPRIT, determine estimates of the sinusoidal frequencies from the sample noise-corrupted data. In this paper, a new frequency estimation method named Pole-Placement Least Square (PPLS) is presented, which is a modified LS method with a certain number of model poles restricted to the unit circle. The statistical performance of PPLS is studied numerically, and compared with the Cramer-Rao bound as well as the statistical performance corresponding to the LS methods. PPLS is shown to have higher resolution than the conventional LS method. The relationship between poles location and its resolution is also discussed in detail.

  • 2-D DOA Estimation of Multiple Signals Based on Sparse L-Shaped Array

    Zhi ZHENG  Yuxuan YANG  Wen-Qin WANG  Guangjun LI  Jiao YANG  Yan GE  

     
    PAPER-DOA Estimation

      Pubricized:
    2017/08/22
      Vol:
    E101-B No:2
      Page(s):
    383-391

    This paper proposes a novel method for two-dimensional (2-D) direction-of-arrival (DOA) estimation of multiple signals employing a sparse L-shaped array structured by a sparse linear array (SLA), a sparse uniform linear array (SULA) and an auxiliary sensor. In this method, the elevation angles are estimated by using the SLA and an efficient search approach, while the azimuth angle estimation is performed in two stages. In the first stage, the rough azimuth angle estimates are obtained by utilizing a noise-free cross-covariance matrix (CCM), the estimated elevation angles and data from three sensors including the auxiliary sensor. In the second stage, the fine azimuth angle estimates can be achieved by using the shift-invariance property of the SULA and the rough azimuth angle estimates. Without extra pair-matching process, the proposed method can achieve automatic pairing of the 2-D DOA estimates. Simulation results show that our approach outperforms the compared methods, especially in the cases of low SNR, snapshot deficiency and multiple sources.

  • New Distinguisher on Reduced-Round Keccak Sponge Function

    Senyang HUANG  Xiaoyun WANG  Guangwu XU  Meiqin WANG  Jingyuan ZHAO  

     
    PAPER-Cryptography and Information Security

      Vol:
    E102-A No:1
      Page(s):
    242-250

    The security analysis of Keccak, the winner of SHA-3, has attracted considerable interest. Recently, some attention has been paid to distinguishing Keccak sponge function from random permutation. In EUROCRYPT'17, Huang et al. proposed conditional cube tester to recover the key of Keccak-MAC and Keyak and to construct practical distinguishing attacks on Keccak sponge function up to 7 rounds. In this paper, we improve the conditional cube tester model by refining the formulation of cube variables. By classifying cube variables into three different types and working the candidates of these types of cube variable carefully, we are able to establish a new theoretical distinguisher on 8-round Keccak sponge function. Our result is more efficient and greatly improves the existing results. Finally we remark that our distinguishing attack on the the reduced-round Keccak will not threat the security margin of the Keccak sponge function.