Toshihiro OHIGASHI Yoshiaki SHIRAISHI Masakatu MORII
In a key scheduling algorithm (KSA) of stream ciphers, a secret key is expanded into a large initial state. An internal state reconstruction method is known as a general attack against stream ciphers; it recovers the initial state from a given pair of plaintext and ciphertext more efficiently than exhaustive key search. If the method succeeds, then it is desirable that the inverse of KSA is infeasible in order to avoid the leakage of the secret key information. This paper shows that it is easy to compute a secret key from an initial state of RC4. We propose a method to recover an -bit secret key from only the first bits of the initial state of RC4 using linear equations with the time complexity less than that of one execution of KSA. It can recover the secret keys of which number is 2103.6 when the size of the secret key is 128 bits. That is, the 128-bit secret key can be recovered with a high probability when the first 128 bits of the initial state are determined using the internal state reconstruction method.
This paper presents batch processing protocols for efficiently proving a great deal of partial knowledge. These protocols reduce the computation and communication costs for a MIX-net and secure circuit evaluation. The efficiency levels of the proposed protocols are estimated based on the implementation results of a secure circuit evaluation with batch processing.
Naoki SHINOHARA Blagovest SHISHKOV Hiroshi MATSUMOTO Kozo HASHIMOTO A.K.M. BAKI
The concept of placing enormous Solar Power Satellite (SPS) systems in space represents one of a handful of new technological options that might provide large scale, environmentally clean base load power to terrestrial markets. Recent advances in space exploration have shown a great need for antennas with high resolution, high gain and low side lobe level (SLL). The last characteristic is of paramount importance especially for the Microwave Power Transmission (MPT) in order to achieve higher transmitting efficiency (TE) and higher beam collection efficiency (BCE). In order to achieve low side lobe levels, statistical methods play an important role. Various interesting properties of a large antenna arrays with randomly, uniformly and combined spacing of elements have been studied, especially the relationship between the required number of elements and their appropriate spacing from one viewpoint and the desired SLL, the aperture dimension, the beamwidth and TE from the other. We propose a new unified approach in searching for reducing SLL by exploiting the interaction of deterministic and stochastic workspaces of proposed algorithms. Our models indicate the side lobe levels in a large area around the main beam and strongly reduce SLL in the entire visible range. A new concept of designing a large antenna array system is proposed. Our theoretic study and simulation results clarify how to deal with the problems of side lobes in designing a large antenna array, which seems to be an important step toward the realization of future SPS/MPT systems.
Shih-Bin JHONG Min-Hang WENG Sean WU Cheng-Yuan HUNG Maw-Shung LEE
A novel low insertion-loss and wideband microstrip bandpass filter has been designed and tested. The basic configuration of this novel dual-mode filter is a square ring resonator with direct-connected orthogonal feed lines, and dual-perturbation elements are introduced within the resonator at symmetrical location. The effects of the size of the perturbation element are studied. A new filter having wider bandwidth and transmission zeros are presented. The proposed filter responses are in good agreement with the simulations and experiments.
Ippei AKITA Kazuyuki WADA Yoshiaki TADOKORO
A scheme for a low-voltage CMOS syllabic-companding log domain filter with wide dynamic range is proposed and its prototype is presented. A nodal voltage which is fixed in a conventional filter based on the dynamically adjustable biasing (DAB) technique is adapted for change of input envelope to achieve wide dynamic range. Externally linear and time invariant (ELTI) relation between an input and an output is guaranteed by a state variable correction (SVC) circuit which is also proposed for low-voltage operation. To demonstrate the proposed scheme, a fifth-order Chebychev low-pass filter with 100-kHz cutoff frequency is designed and fabricated in a standard 0.35-µm CMOS process. The filter has a 78-dB dynamic range and consumes 200-µW power from a 0.8-V power supply.
Doo-Hwan KIM Sung-Hyun YANG Kyoung-Rok CHO
This paper proposes a dual-level low voltage differential signaling (DLVDS) circuit aimed at low power consumption and reducing transmission lines for LCD driver IC's. We apply two-bit binary data to the DLVDS circuit as inputs, and then the circuit converts these two inputs into two kinds of fully differential signal levels. In the DLVDS circuit, two transmission lines are sufficient to transfer two-bit binary inputs while keeping the conventional LVDS features. The receiver recovers the original two-bit binary data through a level decoding circuit. The proposed circuit was fabricated using a commercial 0.25 µm CMOS technology. Under a 2.5 V supply voltage, the circuit shows a data rate of 1-Gbps/2-line and power consumption of 35 mW.
In this letter, we analyze symbol error probability (SEP) and diversity gain of orthogonal space-time block codes (OSTBCs) in spatially correlated Rician fading channel. We derive the moment generating function (MGF) of an effective signal-to-noise ratio (SNR) at the receiver and use it to derive the SEP for M-PSK modulation. We use this result to show that the diversity gain is achieved by the product of the rank of the transmit and receive correlation matrix, and the loss in array gain is quantified as a function of the spatial correlation and the line of sight (LOS) component.
Yohei SUZUKI Anas M. BOSTAMAM Mamiko INAMORI Yukitoshi SANADA
In this paper, sampling rate selection diversity (SRSD) scheme for Direct-Sequence/Spread-Spectrum (DS/SS) is proposed. In DS/SS communication systems, oversampling may be employed to increase the signal-to-noise ratio (SNR). However, oversampling enlarges the power consumption because signal processing of the receiver has to be carried out at a higher clock rate. Higher sampling rate does not always maximize the SNR. In the proposed SRSD scheme, the power consumption can be reduced by selecting the optimum sampling rate depending on the characteristics of the channel. The proposed SRSD scheme can also reduce the BER more than the conventional oversampling scheme under certain channel conditions.
Shinichi FURUKAWA Wataru SATOU Takashi HINATA Nao SHIMIZU
In this paper, a fiber with two inhomogeneous sector holes around the core is proposed, and propagation characteristics of polarization maintaining region and single-polarization region are numerically analyzed by circular Fourier expansion method. In each case of the single-polarization region and the polarization maintaining region, a fiber is designed so as to satisfy the zero total dispersion at wavelength of 1.55 µm. Then, the single-polarization bandwidth for the single-polarization region and the modal birefringence for the polarization maintaining region are examined as the specific characteristics in each region. In addition, the power concentrating into the core region and distributions of Poynting vector is also discussed.
Youngjin YU Hidekazu MURATA Koji YAMAMOTO Susumu YOSHIDA
Reliable detection of other radio systems is crucial for systems that share the same frequency band. In wireless communication channels, there is uncertainty in the received signal level due to multipath fading and shadowing. Cooperative sensing techniques in which radio stations share their sensing information can improve the detection probability of other systems. In this paper, a new cooperative sensing scheme that reduces the false detection probability while maintaining the outage probability of other systems is investigated. In the proposed system, sensing information is collected using multi-hop transmission from all sensing stations that detect other systems, and transmission decisions are based on the received sensing information. The proposed system also controls the transmit power based on the received CINRs from the sensing stations. Simulation results reveal that the proposed system can reduce the outage probability of other systems, or improve its link success probability.
Gang Uk HWANG Min Young CHUNG Yutae LEE
In this paper, we consider a network of N identical IEEE 802.11 DCF (Distributed Coordination Function) terminals with RTS/CTS mechanism, each of which is assumed to be saturated. For performance analysis, we propose a simple and efficient mathematical model to derive the statistical characteristics of the network such as the inter-transmission time of packets in the network and the service time (the inter-transmission time of successful packet transmissions) of the network. Numerical results and simulations are provided to validate the accuracy of our model and to study the performance of the IEEE 802.11 DCF network.
Ho-Yin LEE Shih-Lun CHEN Ching-Hsing LUO
This paper describes a smart thermal sensing chip with an integrated vertical bipolar transistor sensor, a Sigma Delta Modulator (SDM), a Micro-Control Unit (MCU), and a bandgap reference voltage generator for biomedical application by using 0.18 µm CMOS process. The npn bipolar transistors with the Deep N-Well (DNW) instead of the pnp bipolar transistor is first adopted as the sensor for good isolation from substrate coupling noise. In addition to data compression, Micro-Control Unit (MCU) plays an important role for executing auto-calibration by digitally trimming the bipolar sensor in parallel to save power consumption and to reduce feedback complexity. It is different from the present analog feedback calibration technologies. Using one sensor, instead of two sensors, to create two differential signals in 180phase difference input to SDM is also a novel design of this work. As a result, in the range of 0 to 80 or body temperature (375), the inaccuracy is less than 0.1 or 0.05 respectively with one-point calibration after packaging. The average power consumption is 268.4 µW with 1.8 V supply voltage.
Jaehun LEE Wooyong CHUNG Euntai KIM
A new structure learning approach for Bayesian networks (BNs) based on dual genetic algorithm (DGA) is proposed in this paper. An individual of the population is represented as a dual chromosome composed of two chromosomes. The first chromosome represents the ordering among the BN nodes and the second represents the conditional dependencies among the ordered BN nodes. It is rigorously shown that there is no BN structure that cannot be encoded by the proposed dual genetic encoding and the proposed encoding explores the entire solution space of the BN structures. In contrast with existing GA-based structure learning methods, the proposed method learns not only the topology of the BN nodes, but also the ordering among the BN nodes, thereby, exploring the wider solution space of a given problem than the existing method. The dual genetic operators are closed in the set of the admissible individuals. The proposed method is applied to real-world and benchmark applications, while its effectiveness is demonstrated through computer simulation.
Chunsheng HUA Qian CHEN Haiyuan WU Toshikazu WADA
This paper presents an RK-means clustering algorithm which is developed for reliable data grouping by introducing a new reliability evaluation to the K-means clustering algorithm. The conventional K-means clustering algorithm has two shortfalls: 1) the clustering result will become unreliable if the assumed number of the clusters is incorrect; 2) during the update of a cluster center, all the data points belong to that cluster are used equally without considering how distant they are to the cluster center. In this paper, we introduce a new reliability evaluation to K-means clustering algorithm by considering the triangular relationship among each data point and its two nearest cluster centers. We applied the proposed algorithm to track objects in video sequence and confirmed its effectiveness and advantages.
Montri PHOTHISONOTHAI Masahiro NAKAGAWA
In this study, we propose a method of classifying a spontaneous electroencephalogram (EEG) approach to a brain-computer interface. Ten subjects, aged 21-32 years, volunteered to imagine left- and right-hand movements. An independent component analysis based on a fixed-point algorithm is used to eliminate the activities found in the EEG signals. We use a fractal dimension value to reveal the embedded potential responses in the human brain. The different fractal dimension values between the relaxing and imaging periods are computed. Featured data is classified by a three-layer feed-forward neural network based on a simple backpropagation algorithm. Two conventional methods, namely, the use of the autoregressive (AR) model and the band power estimation (BPE) as features, and the linear discriminant analysis (LDA) as a classifier, are selected for comparison in this study. Experimental results show that the proposed method is more effective than the conventional methods.
Kazuki TAKEDA Hiromichi TOMEBA Fumiyuki ADACHI
The performance of single-carrier (SC) transmission in a frequency-selective fading channel degrades due to a severe inter-symbol interference (ISI). Using frequency-domain equalization (FDE) based on the minimum mean square error (MMSE) criterion can improve the bit error rate (BER) performance of SC transmission. However, the residual ISI after FDE limits the performance improvement. In this paper, we propose a joint use of Tomlinson-Harashima precoding (THP) and FDE to remove the residual ISI. An approximate conditional BER analysis is presented for the given channel condition. The achievable average BER performance is evaluated by Monte-Carlo numerical computation method using the derived conditional BER. The BER analysis is confirmed by computer simulation of the signal transmission.
Nguyen Hoang HAI Yoshinori NAMIHIRA Feroza BEGUM Shubi F. KAIJAGE Tatsuya KINJO S.M. Abdur RAZZAK Nianyu ZOU
In this paper, we propose and demonstrate a novel type of PCF that has two cladding layers with Ge rods at the center core. We numerically show that it is possible to design a single mode PCF with large effective area greater than 200 µm2 over the whole wavelength above 1.2 µm. The proposed large mode area PCF (LMA-PCF) exhibits a high negative dispersion coefficient from -186 to -158 [ps/(nm-km)] in all wavelengths ranging from 1.2 µm to 1.8 µm. Effective single mode operation of LMA-PCF is confimed for the entire band of interest.
Junichi MARUYAMA Go HASEGAWA Masayuki MURATA
In this paper, we propose new methods which detect tampered-TCP connections at edge routers and protect well-behaved TCP connections from tampered-TCP connections, which results in fairness among TCP connections. The proposed methods monitor the TCP packets at an edge router and estimate the window size or the throughput for each TCP connection. By using estimation results, the proposed methods assess whether each TCP connection is tampered or not and drop packets intentionally if necessary to improve the fairness amongst TCP connections. From the results of simulation experiments, we confirm that the proposed methods can accurately identify tampered-TCP connections and regulate throughput ratio between tampered-TCP connections and competing TCP Reno connections to about 1.
Kazuhide FUKUSHIMA Shinsaku KIYOMOTO Toshiaki TANAKA Kouichi SAKURAI
Program analysis techniques have improved steadily over the past several decades, and software obfuscation schemes have come to be used in many commercial programs. A software obfuscation scheme transforms an original program or a binary file into an obfuscated program that is more complicated and difficult to analyze, while preserving its functionality. However, the security of obfuscation schemes has not been properly evaluated. In this paper, we analyze obfuscation schemes in order to clarify the advantages of our scheme, the XOR-encoding scheme. First, we more clearly define five types of attack models that we defined previously, and define quantitative resistance to these attacks. Then, we compare the security, functionality and efficiency of three obfuscation schemes with encoding variables: (1) Sato et al.'s scheme with linear transformation, (2) our previous scheme with affine transformation, and (3) the XOR-encoding scheme. We show that the XOR-encoding scheme is superior with regard to the following two points: (1) the XOR-encoding scheme is more secure against a data-dependency attack and a brute force attack than our previous scheme, and is as secure against an information-collecting attack and an inverse transformation attack as our previous scheme, (2) the XOR-encoding scheme does not restrict the calculable ranges of programs and the loss of efficiency is less than in our previous scheme.
Chan-Hyun YOUN Jinho KIM Hyewon SONG Desok KIM Eun Bo SHIM
Recently, many studies reported various advanced e-Health service systems in patient care monitoring utilizing sensor networks and questionnaire systems. We propose an informant driven e-Health service system for the identification of heart rate related mental stress factors with a simple operation of informant-client model. Through performance analysis, we show that the proposed system is a cost-effective stress identification system applicable to mobile wireless networks.