The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] ICC(17hit)

1-17hit
  • SAT-Based Analysis of Related-Key Impossible Distinguishers on Piccolo and (Tweakable) TWINE Open Access

    Shion UTSUMI  Kosei SAKAMOTO  Takanori ISOBE  

     
    PAPER-Cryptography and Information Security

      Pubricized:
    2024/02/08
      Vol:
    E107-A No:8
      Page(s):
    1186-1195

    Lightweight block ciphers have gained attention in recent years due to the increasing demand for sensor nodes, RFID tags, and various applications. In such a situation, lightweight block ciphers Piccolo and TWINE have been proposed. Both Piccolo and TWINE are designed based on the Generalized Feistel Structure. However, it is crucial to address the potential vulnerability of these structures to the impossible differential attack. Therefore, detailed security evaluations against this attack are essential. This paper focuses on conducting bit-level evaluations of Piccolo and TWINE against related-key impossible differential attacks by leveraging SAT-aided approaches. We search for the longest distinguishers under the condition that the Hamming weight of the active bits of the input, which includes plaintext and master key differences, and output differences is set to 1, respectively. Additionally, for Tweakable TWINE, we search for the longest distinguishers under the related-tweak and related-tweak-key settings. The result for Piccolo with a 128-bit key, we identify the longest 16-round distinguishers for the first time. In addition, we also demonstrate the ability to extend these distinguishers to 17 rounds by taking into account the cancellation of the round key and plaintext difference. Regarding evaluations of TWINE with a 128-bit key, we search for the first time and reveal the distinguishers up to 19 rounds. For the search for Tweakable TWINE, we evaluate under the related-tweak-key setting for the first time and reveal the distinguishers up to 18 rounds for 80-bit key and 19 rounds for 128-bit key.

  • An Effective Feature Selection Scheme for Android ICC-Based Malware Detection Using the Gap of the Appearance Ratio

    Kyohei OSUGE  Hiroya KATO  Shuichiro HARUTA  Iwao SASASE  

     
    PAPER-Dependable Computing

      Pubricized:
    2019/03/12
      Vol:
    E102-D No:6
      Page(s):
    1136-1144

    Android malwares are rapidly becoming a potential threat to users. Among several Android malware detection schemes, the scheme using Inter-Component Communication (ICC) is gathering attention. That scheme extracts numerous ICC-related features to detect malwares by machine learning. In order to mitigate the degradation of detection performance caused by redundant features, Correlation-based Feature Selection (CFS) is applied to feature before machine learning. CFS selects useful features for detection in accordance with the theory that a good feature subset has little correlation with mutual features. However, CFS may remove useful ICC-related features because of strong correlation between them. In this paper, we propose an effective feature selection scheme for Android ICC-based malware detection using the gap of the appearance ratio. We argue that the features frequently appearing in either benign apps or malwares are useful for malware detection, even if they are strongly correlated with each other. To select useful features based on our argument, we introduce the proportion of the appearance ratio of a feature between benign apps and malwares. Since the proportion can represent whether a feature frequently appears in either benign apps or malwares, this metric is useful for feature selection based on our argument. Unfortunately, the proportion is ineffective when a feature appears only once in all apps. Thus, we also introduce the difference of the appearance ratio of a feature between benign apps and malwares. Since the difference simply represents the gap of the appearance ratio, we can select useful features by using this metric when such a situation occurs. By computer simulation with real dataset, we demonstrate our scheme improves detection accuracy by selecting the useful features discarded in the previous scheme.

  • Bounded Real Balanced Truncation of RLC Networks with Reciprocity Consideration

    Yuichi TANJI  

     
    PAPER

      Vol:
    E100-A No:12
      Page(s):
    2816-2823

    An efficient reciprocity and passivity preserving balanced truncation for RLC networks is presented in this paper. Reciprocity and passivity are fundamental principles of linear passive networks. Hence, reduction with preservation of reciprocity and passivity is necessary to simulate behavior of the circuits including the RLC networks accurately and stably. Moreover, the proposed method is more efficient than the previous balanced truncation methods, because sparsity patterns of the coefficient matrices for the circuit equations of the RLC networks are fully available. In the illustrative examples, we will show that the proposed method is compatible with PRIMA, which is known as a general reduction method of RLC networks, in efficiency and used memory, and is more accurate at high frequencies than PRIMA.

  • Infinite-Horizon Team-Optimal Incentive Stackelberg Games for Linear Stochastic Systems

    Hiroaki MUKAIDANI  

     
    LETTER-Systems and Control

      Vol:
    E99-A No:9
      Page(s):
    1721-1725

    In this paper, an infinite-horizon team-optimal incentive Stackelberg strategy is investigated for a class of stochastic linear systems with many non-cooperative leaders and one follower. An incentive structure is adopted which allows for the leader's team-optimal Nash solution. It is shown that the incentive strategy set can be obtained by solving the cross-coupled stochastic algebraic Riccati equations (CCSAREs). In order to demonstrate the effectiveness of the proposed strategy, a numerical example is solved.

  • Impossible Differential Attack against 14-Round Piccolo-80 without Relying on Full Code Book

    Yosuke TODO  

     
    LETTER

      Vol:
    E99-A No:1
      Page(s):
    154-157

    Piccolo is a lightweight block cipher proposed by Sony Corporation in 2011. The designers showed two key modes, Piccolo-80 and Piccolo-128, which use an 80-bit secret key and a 128-bit one, respectively. Isobe and Shibutani estimated the security of Piccolo-80, and they showed that 14-round (reduced) Piccolo-80 w/o whitening keys is vulnerable against the Meet-in-the-Middle attack. The time complexity of their attack is about 273, but unfortunately it requires 264 texts, namely, the full code book. In this paper, we propose a new impossible differential attack against 14-round Piccolo-80 w/o whitening keys, and it can recover the secret key without relying on the full code book. The time complexity is 268 and it uses 262.2 distinct know plaintexts.

  • Dynamic Game Approach of H2/H Control for Stochastic Discrete-Time Systems

    Hiroaki MUKAIDANI  Ryousei TANABATA  Chihiro MATSUMOTO  

     
    PAPER-Systems and Control

      Vol:
    E97-A No:11
      Page(s):
    2200-2211

    In this paper, the H2/H∞ control problem for a class of stochastic discrete-time linear systems with state-, control-, and external-disturbance-dependent noise or (x, u, v)-dependent noise involving multiple decision makers is investigated. It is shown that the conditions for the existence of a strategy are given by the solvability of cross-coupled stochastic algebraic Riccati equations (CSAREs). Some algorithms for solving these equations are discussed. Moreover, weakly-coupled large-scale stochastic systems are considered as an important application, and some illustrative examples are provided to demonstrate the effectiveness of the proposed decision strategies.

  • Round Addition DFA on 80-bit Piccolo and TWINE

    Hideki YOSHIKAWA  Masahiro KAMINAGA  Arimitsu SHIKODA  Toshinori SUZUKI  

     
    LETTER

      Vol:
    E96-D No:9
      Page(s):
    2031-2035

    We present a round addition differential fault analysis (DFA) for some lightweight 80-bit block ciphers. It is shown that only one correct ciphertext and two faulty ciphertexts are required to reconstruct secret keys in 80-bit Piccolo and TWINE, and the reconstructions are easier than 128-bit CLEFIA.

  • A Novel Half Mode Elliptic SIW (HMESIW) Filter with Bypass Coupling Substrate Integrated Circular Cavity (BCSICC)

    Boren ZHENG  Zhiqin ZHAO  Youxin LV  

     
    BRIEF PAPER-Microwaves, Millimeter-Waves

      Vol:
    E95-C No:3
      Page(s):
    408-411

    A novel half mode elliptic substrate integrated waveguide (HMESIW) filter with bypass coupling substrate integrated circular cavity (BCSICC) is proposed and fabricated by using standard PCB technology. Due to the use of an elliptical waveguide cavity, the tolerance sensitivity of the filter is reduced. The filter optimizing procedure is therefore simplified. The measured results demonstrate its superior performance in tolerance sensitivity and show good agreements with the simulation results.

  • A Novel 3D Power Divider Based on Half-Mode Substrate Integrated Circular Cavity

    Jian GU  Yong FAN  Haiyan JIN  

     
    LETTER-Microwaves, Millimeter-Waves

      Vol:
    E94-C No:3
      Page(s):
    379-382

    A new kind of 3D power divider based on a half-mode substrate integrated circular cavity (HSICC) is proposed. This novel power divider can reduce the size of a power divider based on normal substrate integrated circular cavity (SICC) by nearly a half. To verify the validity of the design method, a two-way X-band HSICC power divider using low temperature co-fired ceramic (LTCC) technology is designed, fabricated and measured.

  • ICCD Observation on Discharge Characteristics in AC Plasma Display Panel Prepared by Vacuum Sealing Process

    Choon-Sang PARK  Heung-Sik TAE  

     
    LETTER-Electronic Displays

      Vol:
    E92-C No:6
      Page(s):
    898-901

    The vacuum sealing process with a base vacuum of 10-5 Torr is adopted to minimize the residual impurity gas. The address and sustain discharges in the 42-in PDP prepared by the vacuum-sealing process are observed by using the ICCD. As a result, the ICCD observation illustrates that thanks to the reduction of the impurity level by the vacuum-sealing process, the surface and plate-gap discharges are initiated and extinguished very fast and the corresponding IR emissions are also intensified.

  • A Numerical Algorithm for Finding Solution of Cross-Coupled Algebraic Riccati Equations

    Hiroaki MUKAIDANI  Seiji YAMAMOTO  Toru YAMAMOTO  

     
    LETTER-Systems and Control

      Vol:
    E91-A No:2
      Page(s):
    682-685

    In this letter, a computational approach for solving cross-coupled algebraic Riccati equations (CAREs) is investigated. The main purpose of this letter is to propose a new algorithm that combines Newton's method with a gradient-based iterative (GI) algorithm for solving CAREs. In particular, it is noteworthy that both a quadratic convergence under an appropriate initial condition and reduction in dimensions for matrix computation are both achieved. A numerical example is provided to demonstrate the efficiency of this proposed algorithm.

  • State-Space Analysis of Power Complementary Filters

    Shunsuke KOSHITA  Masahide ABE  Masayuki KAWAMATA  

     
    PAPER-Analog Signal Processing

      Vol:
    E90-A No:10
      Page(s):
    2265-2271

    This paper presents a new analysis of power complementary filters using the state-space representation. Our analysis is based on the bounded-real Riccati equations that were developed in the field of control theory. Through this new state-space analysis of power complementary filters, we prove that the sum of the controllability/observability Gramians of a pair of power complementary filters is represented by a constant matrix, which is given as a solution to the bounded-real Riccati equations. This result shows that power complementary filters possess complementary properties with respect to the Gramians, as well as the magnitude responses of systems. Furthermore, we derive new theorems on a specific family of power complementary filters that are generated by a pair of invertible solutions to the bounded-real Riccati equations. These theorems show some interesting relationships of this family with respect to the Gramians, zeros, and coefficients of systems. Finally, we give a numerical example to demonstrate our results.

  • Stability-Guaranteed Horizon Size for Receding Horizon Control

    Zhonghua QUAN  Soohee HAN  Wook Hyun KWON  

     
    LETTER-Systems and Control

      Vol:
    E90-A No:2
      Page(s):
    523-525

    We propose a stability-guaranteed horizon size (SgHS) for stabilizing receding horizon control (RHC). It is shown that the proposed SgHS can be represented explicitly in terms of the known parameters of the given system model and is independent of the terminal weighting matrix in the cost function. The proposed SgHS is validated via a numerical example.

  • Novel First-Order Non-inverting and Inverting Output of All-Pass Filter at the Same Configuration Using ICCII

    Hua-Pin CHEN  Ming-Tzau LIN  Wan-Shing YANG  

     
    LETTER-Electronic Circuits

      Vol:
    E89-C No:6
      Page(s):
    865-867

    A novel first order voltage-mode non-inverting and inverting output of all-pass filter using an inverting type current conveyor (ICCII) is given. It is a first announced about a first-order voltage-mode non-inverting and inverting output of all-pass filter at the same configuration in the literature. The proposed circuit is verified using HSPICE simulation with attractive results.

  • High Sensitivity Radar-Optical Observations of Faint Meteors

    Koji NISHIMURA  Toru SATO  Takuji NAKAMURA  Masayoshi UEDA  

     
    PAPER

      Vol:
    E84-C No:12
      Page(s):
    1877-1884

    In order to assess the possible impacts of meteors with spacecraft, which is among major hazard in the space environment, it is essential to establish an accurate statistics of their mass and velocity. We developed a radar-optical combined system for detecting faint meteors consisting of a powerful VHF Doppler radar and an ICCD video camera. The Doppler pulse compression scheme is used to enhance the S/N ratio of the radar echoes with very large Doppler shifts, as well as to determine their range with a resolution of 200 m. A very high sensitivity of more than 14 magnitude and 9 magnitude for radar and optical sensors, respectively, has been obtained. Instantaneous direction of meteor body observed by the radar is determined with the interferometry technique. We examined the optimum way of the receiving antenna arrangements, and also of the signal processing. Its absolute accuracy was confirmed by the optical observations with background stars as a reference. By combining the impinging velocity of meteor bodies derived by the radar with the absolute visual magnitude determined by the video camera simultaneously, the mass of each meteor body was estimated. The developed observation system will be used to create a valuable data base of the mass and velocity information of faint meteors, on which very little is known so far. The data base is expected to play a vital role in our understanding of the space environment needed for designing large space structures.

  • Quadratic Polynomial Solutions of the Hamilton-Jacobi Inequality in Reliable Control Design

    Der-Cherng LIAW  Yew-Wen LIANG  

     
    PAPER-Control and Adaptive Systems

      Vol:
    E81-A No:9
      Page(s):
    1860-1866

    In the design of nonlinear reliable controllers, one major issue is to solve for the solutions of the Hamilton-Jacobi inequality. In general, it is hard to obtain a closed form solutions due to the nonlinear nature of the inequality. In this paper, we seek for the existence conditions of quadratic type positive semidefinite solutions of Hamilton-Jacobi inequality. This is achieved by taking Taylor's series expansion of system dynamics and investigating the negative definiteness of the associated Hamilton up to fourth order. An algorithm is proposed to seek for possible solutions. The candidate of solution is firstly determined from the associated algebraic Riccati inequality. The solution is then obtained from the candidate which makes the truncated fourth order polynomial of the inequality to be locally negative definite. Existence conditions of the solution are explicitly attained for the cases of which system linearization possesses one uncontrollable zero eigenvalue and a pair of pure imaginary uncontrollable eigenvalues. An example is given to demonstrate the application to reliable control design problem.

  • Innovation Models in a Stochastic System Represented by an Input-Output Model

    Kuniharu KISHIDA  

     
    PAPER

      Vol:
    E77-A No:8
      Page(s):
    1337-1344

    A stochastic system represented by an input-output model can be described by mainly two different types of state space representation. Corresponding to state space representations innovation models are examined. The relationship between both representations is made clear systematically. An easy transformation between them is presented. Zeros of innovation models are the same as those of an ARMA model which is stochastically equivalent to innovation models, and related to stable eigenvalues of generalized eigenvalue problem of matrix Riccati equation.