Search results for: Crypt%20Analysis
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5

Search results for: Crypt%20Analysis

5 Evaluation on Recent Committed Crypt Analysis Hash Function

Authors: A. Arul Lawrence Selvakumar, C. Suresh Ganandhas

Abstract:

This paper describes the study of cryptographic hash functions, one of the most important classes of primitives used in recent techniques in cryptography. The main aim is the development of recent crypt analysis hash function. We present different approaches to defining security properties more formally and present basic attack on hash function. We recall Merkle-Damgard security properties of iterated hash function. The Main aim of this paper is the development of recent techniques applicable to crypt Analysis hash function, mainly from SHA family. Recent proposed attacks an MD5 & SHA motivate a new hash function design. It is designed not only to have higher security but also to be faster than SHA-256. The performance of the new hash function is at least 30% better than that of SHA-256 in software. And it is secure against any known cryptographic attacks on hash functions.

Keywords: Crypt Analysis, cryptographic.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1290
4 Applications of Cascade Correlation Neural Networks for Cipher System Identification

Authors: B. Chandra, P. Paul Varghese

Abstract:

Crypto System Identification is one of the challenging tasks in Crypt analysis. The paper discusses the possibility of employing Neural Networks for identification of Cipher Systems from cipher texts. Cascade Correlation Neural Network and Back Propagation Network have been employed for identification of Cipher Systems. Very large collection of cipher texts were generated using a Block Cipher (Enhanced RC6) and a Stream Cipher (SEAL). Promising results were obtained in terms of accuracy using both the Neural Network models but it was observed that the Cascade Correlation Neural Network Model performed better compared to Back Propagation Network.

Keywords: Back Propagation Neural Networks, CascadeCorrelation Neural Network, Crypto systems, Block Cipher, StreamCipher.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2384
3 Essential Oil Blend Containing Capsaicin, Carvacrol and Cinnamaldehyde in Broiler Production Performance and Intestinal Morphometrics

Authors: Marianne D. M. Rendon, Sonia P. Acda, Veneranda A. Magpantay, Norma N. Fajardo, Amado A. Angeles

Abstract:

The aim of this study is to evaluate the effect of supplementing broiler starter diet with different levels of an essential oil blend (EOB) containing capsaicin, carvacrol and cinnamaldehyde on the performance of broilers. A total of 300 day-old straight-run Cobb broiler chicks were randomly assigned to three treatments after 7-day group brooding following a completely randomized design (CRD). Birds assigned in treatment 1 were given starter basal diet while those in treatments 2 and 3 were given starter basal diet with 400 mg/kg antibiotic growth promoter (AGP) and 150 mg/kg EOB, respectively, until the 28th day. Basal finisher feed were given for all the treatments until harvest. Following 37 d feeding, body weight gain, feed consumption, feed efficiency, dressing percentage, livability and jejunal villi height were determined. Results showed no significant differences (P>0.05) in growth performance. However, villi height and crypt depth was significantly lower for birds fed EOB.

Keywords: Broiler, capsaicin, carvacrol, cinnamaldehyde, essential oil.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2794
2 Influence of Supplemental Glutamine on Nutrient Digestibility and Utilization, Small Intestinal Morphology and Gastrointestinal Tract and Immune Organ Developments of Broiler Chickens

Authors: Sutisa Khempaka, Supattra Okrathok, Laddawan Hokking, Buntita Thukhanon, Wittawat Molee

Abstract:

This study was conducted to investigate the optimum levels of glutamine (Gln) supplementation in broiler diets. A total of 32 one-day-old male chicks with initial body weight 41.5 g were segregated into 4 groups (8 chicks per group) and subsequently distributed to individual cages. Feed and water were provided ad libitum for 21 days. Four dietary treatments were as follows: control and supplemented Gln at 1, 2 and 3%, respectively. The results found that the addition Gln had no negative effects on dry matter, organic matter, ash digestibility or nitrogen retention. Birds fed with 1% Gln had significantly higher villi wide and villi height : crypt depth ratio in duodenum than the control chicks and 2 and 3% Gln chicks. It is suggested that the addition of Gln at 1% indicated a beneficial effect on improving small intestinal morphology, in addition Gln may stimulate immune organ development of broiler chickens.

Keywords: broiler chicken, digestibility, gastrointestinal tract glutamine, glutamine

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1819
1 Analysis of Message Authentication in Turbo Coded Halftoned Images using Exit Charts

Authors: Andhe Dharani, P. S. Satyanarayana, Andhe Pallavi

Abstract:

Considering payload, reliability, security and operational lifetime as major constraints in transmission of images we put forward in this paper a steganographic technique implemented at the physical layer. We suggest transmission of Halftoned images (payload constraint) in wireless sensor networks to reduce the amount of transmitted data. For low power and interference limited applications Turbo codes provide suitable reliability. Ensuring security is one of the highest priorities in many sensor networks. The Turbo Code structure apart from providing forward error correction can be utilized to provide for encryption. We first consider the Halftoned image and then the method of embedding a block of data (called secret) in this Halftoned image during the turbo encoding process is presented. The small modifications required at the turbo decoder end to extract the embedded data are presented next. The implementation complexity and the degradation of the BER (bit error rate) in the Turbo based stego system are analyzed. Using some of the entropy based crypt analytic techniques we show that the strength of our Turbo based stego system approaches that found in the OTPs (one time pad).

Keywords: Halftoning, Turbo codes, security, operationallifetime, Turbo based stego system.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1473