An Introduction to Wetland Seed Banks Etland Seed Banks

Total Page:16

File Type:pdf, Size:1020Kb

An Introduction to Wetland Seed Banks Etland Seed Banks An Introduction to Wetland Seed Banks By Douglas A. DeBerry and James E. Perry Introduction One of the most important structural compo- ture on wetland seed banks in natural and cre- nents of wetland ecosystems is the seed bank. ated or restored systems, and defines the role Seed banks are present in nearly all ecosystems, seed banks play in created and restored wetland and can be defined as “[an] aggregation of management. ungerminated seed potentially capable of replac- ing adult plants that may be annuals, dying a natural or unnatural death, or perennials, sus- Seeds and Seed Ecology ceptible to death by disease, disturbance, or con- Regeneration of wetland plant communities oc- sumption by animals including man” (Baker curs by sexual reproduction through either the 1989). They are a critical component in the es- development of seeds, or by asexual reproduc- tablishment and development of vegetation tion through clonal propagation by rhizomes or communities in wetlands (van der Valk 1981). other vegetative organs. A plant may employ the Practical principles concerning the “behavior” of former (e.g. annuals), the latter (e.g. submerged seeds in the soil in different wetland types may aquatics), or both (e.g. herbaceous perennials) be derived from past as a principal reproduc- research. The pur- tive strategy (Fenner pose of this and tech- 1985). Much of the lit- nical report number erature on seed bank re- 00-4 is to present to search deals with the reader a general sexually produced overview of seed bank propagules in an- ecology and the role giosperms (flowering seed banks play in plants) (Leck 1989). wetland succession processes. In this re- Seeds port we introduce the concepts of seed Seeds of angiosperms physiology and ecol- develop from a fertilized ogy as applied to seed ovule and consist of the Figure 1. Diagram of a dicot and monocot seeds. The storage in the soil. following: 1) the embryo embryos in these seeds consist of epicotyl, hypocotyl, We conclude with a (includes the epicotyl, radicle, and cotyledon. Left: A dicot seed (bean) in which short introduction to hypocotyl, radicle, and one cotyledon has been removed to reveal remaining parts our current under- cotyledon) which even- of embryo. Right: A monocot seed (corn) has only one standing of wetland tually grows into the cotyledon, but a large endosperm. Modified from Keeton seed banks. Report young plant; 2) the en- and Gould (1993). Endosperm of mature dicot is indistin- number 00-4 dis- dosperm (internal food guishable from cotyledon. cusses recent litera- source for developing 1 seed); and 3) the seed coat (Raven et al. 1992, ploit a particular dispersal vector, such as high figure 1). Although all mature seeds contain an surface to volume ratio in small seeds (e.g. many embryo, even if only poorly developed, and most grasses and sedges), or the presence of append- are surrounded by a seed coat, the extent to ages such as plumes, hairs, or wings to increase which the endosperm and perisperm persist air resistance for wind dispersal (e.g. sea side varies among species. In some cases, the seed goldenrod). Adaptations that facilitate dispersal coat is in rudimentary form and the seed is con- by animals include burrs, hooks, or adhesive tained within the pericarp (fruit coat) derived substances, which increase the opportunities for from the ovary wall. In this condition, the pri- a seed to cling to an animal (ectozoochory, e.g. mary dispersal unit is not a seed, but a fruit marsh beggar ticks). Certain seeds develop spe- (Fenner 1985, Bewley and Black 1994). In ma- cial seed coats that increase buoyancy for water ture dicots (e.g. beans) the endosperm is stored transport (e.g. arrow arum). Special oil bodies in the cotyledon and is indistinguishable. (elaiosomes) are also present on some seeds as an attractant for insects, such as ants, which are exploited in dispersal (myrmecochory). Many Dispersal mechanism plant species have developed large, nutritious fruits (e.g. persimmons) which attract frugivores Growth of the seed embryo is usually delayed (fruit-eating animals). The seeds within the fruit while the seed matures and is dispersed (Baskin are not susceptible to the digestive acids of an and Baskin 1989). Several dispersal mecha- animal’s stomach and are, therefore, viable when nisms are available to seed plants, including eliminated from the animal that ingests the fruit wind (anemonochory), water (hydrochory), and (endozoochory). In some species, the foliage of animals (zoochory - birds in particular) (Fenner the plant may serve as an attractant, alleviating 1985). Wind dispersed seeds of various species the necessity for fruit development (e.g. flower- have morphological adaptations designed to ex- ing and silky dogwoods) (Willson 1992, Raven et al. 1992, Fenner 1985). Wetlands Program Germination requirements School of Marine Science Virginia Institute of Marine Science Seed germination depends on both internal and College of William and Mary external factors (Bewley and Black 1994). The Gloucester Point, Virginia 23062 three most important external (environmental) (804) 684-7380 factors include the proper amounts of water and oxygen and appropriate temperature range. Too Dr. Carl Hershner, Program Director little or too much water, too little oxygen, and Dr. Kirk Havens, Editor temperatures that stay too low may lead to de- Published by: VIMS Publication Center lay or lack of germination. Some seeds from the temperate climate zone may require freezing tem- This technical report was funded, in part, by the peratures for several consecutive days to sclarify Virginia Coastal Resources Management Program (see discussion on stratification below). In ad- of the Dept. of Environmental Quality dition, some seeds have a light requirement for through Grant #NA97O20181-01 of the germination (Leck 1989). National Oceanic and Atmospheric Ad- ministration, Office of Ocean and Coastal Most mature seeds have low moisture content, Resources Management, under the containing only about 5-20% water by weight Coastal Zone Management Act of 1972, as (Fenner 1985), and must imbibe (absorb) wa- amended. ter in order to activate enzymes and initiate me- tabolism. During the early stages of germination, The views expressed herein are those of the authors respiration may be entirely anaerobic (i.e. car- and do not necessarily reflect the views of NOAA or ried out in the lack of oxygen), but as soon as any of its subagencies or DEQ. the seed coat is ruptured, the seed switches to aerobic respiration (Bewley and Black 1994). Commonwealth’s Declared Policy: “to preserve the wet- Too much water may also be a problem since if lands and to prevent their despoliation and destruction...” the seed becomes waterlogged, the amount of oxygen available will be limited and can be inad- Printed on recycled paper. equate for seedling establishment (Karssen and 2 Hilhorst 1992). In wetlands, seeds must there- often referred to as early colonizers or volunteer fore maintain adaptations to overcome the low species (Pickett and McDonnell 1989). There- oxygen levels associated with saturated soil con- fore, certain annual species may be perennially ditions. represented in the seed bank, and will become established when disturbance or some other fac- tor removes the competitive influence of existing Dormancy as an adaptation for vegetation (Fenner 1985). seedling survival Even in favorable conditions some viable seeds Seed Bank Dynamics will fail to germinate and are said to be dormant. Common causes of dormancy include physiologi- The mobility of seeds in the soil is poorly under- cal immaturity of the embryo and impermeabil- stood, but appears to follow some disturbance ity of the seed coat to water and oxygen (Baskin mechanism which may be facilitated by the ac- and Baskin 1989). Seeds with a physiological tivity of burrowing animals or shrink-swell fis- dormancy will sometimes require a complex se- suring of the soil during alternating wet and dry ries of enzymatic and biochemical changes, re- periods. Some seed migration may occur by ferred to as “after-ripening,” in order to ground water percolation, with smaller seeds germinate. In temperate climates, after-ripen- moving more rapidly than larger ones (Leck ing is triggered by the low temperatures of win- 1989). By far, human disturbance through till- ter (stratification). The after-ripening ing and other practices provides the most im- requirement, therefore, is seen as an adaptation mediate mechanism for vertical transport of that delays germination through the stressful seeds within the soil (Simpson et al 1989). For winter climate until warmer temperatures when many soil seed banks, a physical disturbance conditions are more conducive to seedling sur- mechanism must be present in order to bring vival (Raven et al. 1992). Seed dormancy may buried seeds to the surface where germination also be induced by burial in the soil, underde- may occur (Fenner 1985). velopment of the embryo, and chemical inhibi- tion, among other factors (Fenner 1985). These Methods for Studying Seed Banks dormancy mechanisms represent adaptations that adjust germination timing for the seed to The most common method of seed bank analy- coincide with favorable environmental conditions. sis is the seedling emergence technique, where soil samples are extracted and brought back to Seed Bank a greenhouse or lab to be observed under condi- tions favorable for germination. Under this The seed bank includes all viable seeds present method, germinating species are removed from on, or in, the soil or associated litter. Contribu- the soil as they are identified, and the treatment tions are derived from the seed rain, which in- continues until all seedlings have emerged from cludes dispersal from the local vegetation, but the soil. In a review of several methods for esti- may also include major contributions from spa- mating seed numbers in the soil, Gross (1990) tially and temporally distant sources (Simpson found that the seedling emergence technique un- et al.
Recommended publications
  • Advanced Encryption Standard Real-World Alternatives
    Outline Multiple Encryption Birthday Attack Advanced Encryption Standard Real-World Alternatives CPSC 367: Cryptography and Security Michael Fischer Lecture 7 February 5, 2019 Thanks to Ewa Syta for the slides on AES CPSC 367, Lecture 7 1/58 Outline Multiple Encryption Birthday Attack Advanced Encryption Standard Real-World Alternatives Multiple Encryption Composition Group property Birthday Attack Advanced Encryption Standard AES Real-World Issues Alternative Private Key Block Ciphers CPSC 367, Lecture 7 2/58 Outline Multiple Encryption Birthday Attack Advanced Encryption Standard Real-World Alternatives Multiple Encryption CPSC 367, Lecture 7 3/58 Outline Multiple Encryption Birthday Attack Advanced Encryption Standard Real-World Alternatives Composition Composition of cryptosystems Encrypting a message multiple times with the same or different ciphers and keys seems to make the cipher stronger, but that's not always the case. The security of the composition can be difficult to analyze. For example, with the one-time pad, the encryption and decryption functions Ek and Dk are the same. The composition Ek ◦ Ek is the identity function! CPSC 367, Lecture 7 4/58 Outline Multiple Encryption Birthday Attack Advanced Encryption Standard Real-World Alternatives Composition Composition within practical cryptosystems Practical symmetric cryptosystems such as DES and AES are built as a composition of simpler systems. Each component offers little security by itself, but when composed, the layers obscure the message to the point that it is difficult for an adversary to recover. The trick is to find ciphers that successfully hide useful information from a would-be attacker when used in concert. CPSC 367, Lecture 7 5/58 Outline Multiple Encryption Birthday Attack Advanced Encryption Standard Real-World Alternatives Composition Double Encryption Double encryption is when a cryptosystem is composed with itself.
    [Show full text]
  • Implementations of Block Cipher SEED on Smartphone Operating Systems
    SECURWARE 2011 : The Fifth International Conference on Emerging Security Information, Systems and Technologies Implementations of Block Cipher SEED on Smartphone Operating Systems HwanJin Lee, DongHoon Shin, and Hyun-Chul Jung Security R&D Team Korea Internet & Security Agency (KISA) Seoul, Korea {lhj79, dhshin, hcjung}@kisa.or.kr Abstract—As more and more people are using smartphones limited power and offers inferior performance compared to a these days, a great deal of important information, such as PC. Therefore, it is difficult to use an open cryptographic personal information and the important documents of library such as OpenSSL, which is designed for the PC corporations among other things, are being saved on environment, in a smartphone. We need to study on the way smartphones. Unlike a PC, people can access another person’s for the effective use of SEED in smartphone. smartphone without great difficulty, and there is a high This paper presents the results of implementing the block possibility of losing one’s smartphone. If smartphone is lost cipher SEED to a smartphone. The results of a comparison without encryption, important information can be exploited. In with open cryptographic libraries (OpenSSL, BouncyCastle) addition, the open cryptographic library for PCs cannot be will also be presented. The SEED is a block cipher used due to the limited performance of the smartphone. This established as an international standard ISO/IEC and the paper introduces the optimization implementation technique for the smartphone OS and the results of using that technique. Korean standard. Section 2 introduces the SEED and open In addition, the results of a speed comparison with the open cryptographic libraries; Section 3 introduces smartphone cryptographic library will be presented.
    [Show full text]
  • Using Address Independent Seed Encryption and Bonsai Merkle Trees to Make Secure Processors OS- and Performance-Friendly ∗
    Using Address Independent Seed Encryption and Bonsai Merkle Trees to Make Secure Processors OS- and Performance-Friendly ∗ Brian Rogers, Siddhartha Chhabra, Yan Solihin Milos Prvulovic Dept. of Electrical and Computer Engineering College of Computing North Carolina State University Georgia Institute of Technology {bmrogers, schhabr, solihin}@ncsu.edu [email protected] Abstract and feasible threat is physical or hardware attacks which involve placing a bus analyzer that snoops data communicated between the In today’s digital world, computer security issues have become processor chip and other chips [7, 8]. Although physical attacks increasingly important. In particular, researchers have proposed may be more difficult to perform than software-based attacks, they designs for secure processors which utilize hardware-based mem- are very powerful as they can bypass any software security protec- ory encryption and integrity verification to protect the privacy and tion employed in the system. The proliferation of mod-chips that integrity of computation even from sophisticated physical attacks. bypass Digital Rights Management protection in game systems has However, currently proposed schemes remain hampered by prob- demonstrated that given sufficient financial payoffs, physical attacks lems that make them impractical for use in today’s computer sys- are very realistic threats. tems: lack of virtual memory and Inter-Process Communication Recognizing these threats, computer architecture researchers support as well as excessive storage and performance overheads. have recently proposed various types of secure processor architec- In this paper, we propose 1) Address Independent Seed Encryption tures [4, 5, 13, 14, 16, 17, 18, 19, 20, 22, 23, 24, 25, 26]. Secure pro- (AISE), a counter-mode based memory encryption scheme using a cessors assume that off-chip communication is vulnerable to attack novel seed composition, and 2) Bonsai Merkle Trees (BMT), a novel and that the chip boundary provides a natural security boundary.
    [Show full text]
  • FIPS 140-2 Non-Proprietary Security Policy Oracle Linux 7 NSS
    FIPS 140-2 Non-Proprietary Security Policy Oracle Linux 7 NSS Cryptographic Module FIPS 140-2 Level 1 Validation Software Version: R7-4.0.0 Date: January 22nd, 2020 Document Version 2.3 © Oracle Corporation This document may be reproduced whole and intact including the Copyright notice. Title: Oracle Linux 7 NSS Cryptographic Module Security Policy Date: January 22nd, 2020 Author: Oracle Security Evaluations – Global Product Security Contributing Authors: Oracle Linux Engineering Oracle Corporation World Headquarters 500 Oracle Parkway Redwood Shores, CA 94065 U.S.A. Worldwide Inquiries: Phone: +1.650.506.7000 Fax: +1.650.506.7200 oracle.com Copyright © 2020, Oracle and/or its affiliates. All rights reserved. This document is provided for information purposes only and the contents hereof are subject to change without notice. This document is not warranted to be error-free, nor subject to any other warranties or conditions, whether expressed orally or implied in law, including implied warranties and conditions of merchantability or fitness for a particular purpose. Oracle specifically disclaim any liability with respect to this document and no contractual obligations are formed either directly or indirectly by this document. This document may reproduced or distributed whole and intact including this copyright notice. Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. Oracle Linux 7 NSS Cryptographic Module Security Policy i TABLE OF CONTENTS Section Title
    [Show full text]
  • Preliminary Analysis: SEED’S First Year
    SEED Findings Summary stocktondemonstration.org Preliminary Analysis: SEED’s First Year AUTHORS: CONTRIBUTING RESEARCHERS: Dr. Stacia West, Mina Addo, Mae Carlson, Dr. Amy Castro Baker, Conway Homes Residents Council, Sukhi Samra, Pandora Crowder, Meagan Cusack, Stacy Elliott, Erin Coltrera Daniel Horn, Jenna Steckel, Tooma Zaghloul Preliminary Analysis: SEED's First Year Executive Summary “ Poverty is the biggest issue. Everything we deal with stems from that. There’s so many people working incredibly hard, and if life happens, there’s no bottom. “ —Michael D. Tubbs The Stockton Economic Empowerment Key Findings Include: Demonstration, or SEED, was the nation’s • Guaranteed income reduced income volatility, first mayor-led guaranteed income initiative. or the month-to-month income fluctuations Launched in February 2019 by former Mayor that households face. Michael D. Tubbs, SEED gave 125 Stocktonians $500 per month for 24 months. The cash was • Unconditional cash enabled recipients unconditional, with no strings attached and no to find full-time employment. work requirements. • Recipients of guaranteed income were This Randomized Control Trial (RCT) pilot is being healthier, showing less depression and anxiety evaluated by a team of independent researchers, and enhanced wellbeing. Dr. Stacia West of the University of Tennessee • The guaranteed income alleviated financial and Dr. Amy Castro Baker of the University of scarcity creating new opportunities for Pennsylvania, and funded by the Evidence for self-determination, choice, goal-setting, Action Program at the Robert Wood Johnson and risk-taking. Foundation. SEED sought to confront, address, and humanize Our primary research questions are the following: some of the most pressing and pernicious How does guaranteed income impact problems our country faces: inequality, income income volatility? How do changes in income volatility, and poverty.
    [Show full text]
  • Comparative Study of Cryptographic Encryption Algorithms
    IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 12, Issue 3, Ver. II (May - June 2017), PP 66-71 www.iosrjournals.org Comparative Study of Cryptographic Encryption Algorithms Chaitra B1, Kiran Kumar V.G.1, Shantharama Rai C2 1(Electronics & Communication Engineering, Sahyadri College of Engineering& Management, India) 1(Associate Professor Electronics & Communication Engineering, Sahyadri College of Engineering & Management, India) 2(Principal,, AJ Institute of Engineering &Technology, Mangaluru, India) Abstract: Protection of the network to enhance the safety of the information is great challenge in cryptography. With the developments in the cryptography lightweight cryptography has large space towards security by its simplicity in the implementations. For majority of applications PRESENT and TEA are excellent and preferred choices. However PRESENT is suitable for low constrained devices like RFID tags and sensor network. In this paper we describe ultra-lightweight cryptographic algorithms in detail. Both efficiency and security of information are important while designing and implementation considering security, cost and performance. The efficiency of PRESENT and TEA are higher as they have ability to resist cryptographic attacks and also due to their adequate security. In this paper the performance analysis of PRESENT and Tea are described. I. Introduction In digital era secrecy of the information plays important role in cryptography. Cryptography is the integral part of communication organization. PRESENT is newly introduced lightweight cryptographic algorithm. It is mainly designed for devices which have extremely low constrained resources in terms of area power and time. If we relate the performance analysis with other PRESENT is better block ciphers.
    [Show full text]
  • Using of Tiny Encryption Algorithm in CAN-Bus Communication
    Vol. 62, 2016 (2): 50–55 Res. Agr. Eng. doi: 10.17221/12/2015-RAE Using of tiny encryption algorithm in CAN-Bus communication M. Jukl, J. Čupera Department of Engineering and Automobile transport, Faculty of AgriSciences, Mendel University in Brno, Brno, Czech Republic Abstract Jukl M., Čupera J. (2016): Using of tiny encryption algorithm in CAN-Bus communication. Res. Agr. Eng., 62: 50–55. The rising costs of agriculture machine operation force manufacturers to look for solutions that simplify the machine operation to its users and increase user comfort. However, this trend requires farm machinery to be equipped with electronic systems. Electronic control units do not receive only the information from its own sensors. Modern electronic systems communicate with each other via the data bus. The most common data bus in modern agricultural technol- ogy is the CAN-Bus (Controller Area Network). The most common standard used in modern machinery is SAE J1939 standard, which is commonly used for engine control systems. CAN-Bus in modern agricultural technology provides a considerable simplification of the wiring harness of the tractor. Standardized bus also opens the possibility of im- plementation of Plug & Play additional devices in agricultural tractor. This article is focused on the application of the encryption algorithm Tiny on the CAN-Bus, which is realistically applied to recognition of implement. This article aims to verify the suitability of encryption of Tiny algorithm for the CAN-Bus of 250 kbit/s. As the experiment demonstrated Tiny algorithm is suitable for data encrypting on the CAN-Bus. Keywords: Tiny algorithm; encryption; CAN-Bus; implement; cipher The main goal of any encryption system is to dis- operations of this algorithm are derived from the guise the classified message to be unreadable to encryption key.
    [Show full text]
  • GPU Random Numbers Via the Tiny Encryption Algorithm
    Volume xx (200y), Number z, pp. 1–9 GPU Random Numbers via the Tiny Encryption Algorithm Fahad Zafar, Marc Olano, Aaron Curtis University of Maryland, Baltimore County Abstract Random numbers are extensively used on the GPU. As more computation is ported to the GPU, it can no longer be treated as rendering hardware alone. Random number generators (RNG) are expected to cater general purpose and graphics applications alike. Such diversity adds to expected requirements of a RNG. A good GPU RNG should be able to provide repeatability, random access, multiple independent streams, speed, and random numbers free from detectable statistical bias. A specific application may require some if not all of the above characteristics at one time. In particular, we hypothesize that not all algorithms need the highest-quality random numbers, so a good GPU RNG should provide a speed quality tradeoff that can be tuned for fast low quality or slower high quality random numbers. We propose that the Tiny Encryption Algorithm satisfies all of the requirements of a good GPU Pseudo Random Number Generator. We compare our technique against previous approaches, and present an evaluation using standard randomness test suites as well as Perlin noise and a Monte-Carlo shadow algorithm. We show that the quality of random number generation directly affects the quality of the noise produced, however, good quality noise can still be produced with a lower quality random number generator. Categories and Subject Descriptors (according to ACM CCS): G.3 [Probability and Statistics]: Random number generation— I.3.7 [Computer Graphics]: Three-dimensional Graphics and Realism—Color, shading, shadowing, and texture E.2 [Data Encryption]: — Keywords: cryptographic hash, noise, shadows 1.
    [Show full text]
  • Recommendation for Key Management, Part 1: General Publication Date(S) January 2016 Withdrawal Date May 4, 2020 Withdrawal Note SP 800-57 Part 1 Rev
    Withdrawn NIST Technical Series Publication Warning Notice The attached publication has been withdrawn (archived), and is provided solely for historical purposes. It may have been superseded by another publication (indicated below). Withdrawn Publication Series/Number NIST Special Publication 800-57 Part 1 Revision 4 Title Recommendation for Key Management, Part 1: General Publication Date(s) January 2016 Withdrawal Date May 4, 2020 Withdrawal Note SP 800-57 Part 1 Rev. 4 is superseded in its entirety by the publication of SP 800-57 Part 1 Rev. 5. Superseding Publication(s) (if applicable) The attached publication has been superseded by the following publication(s): Series/Number NIST Special Publication 800-57 Part 1 Revision 5 Title Recommendation for Key Management: Part 1 – General Author(s) Elaine Barker Publication Date(s) May 2020 URL/DOI https://doi.org/10.6028/NIST.SP.800-57pt1r5 Additional Information (if applicable) Contact Computer Security Division (Information Technology Laboratory) Latest revision of the attached publication Related Information https://csrc.nist.gov/projects/key-management/key-management-guidelines https://csrc.nist.gov/publications/detail/sp/800-57-part-1/rev-5/final Withdrawal Announcement Link Date updated: May 4, 2020 NIST Special Publication 800-57 Part 1 Revision 4 Recommendation for Key Management Part 1: General Elaine Barker This publication is available free of charge from: http://dx.doi.org/10.6028/NIST.SP.800-57pt1r4 C O M P U T E R S E C U R I T Y NIST Special Publication 800-57 Part 1 Revision 4 Recommendation for Key Management Part 1: General Elaine Barker Computer Security Division Information Technology Laboratory This publication is available free of charge from: http://dx.doi.org/10.6028/NIST.SP.800-57pt1r4 January 2016 U.S.
    [Show full text]
  • Analysis of the Use of Whirlpool's S-Box, S1 and S2 SEED's S- Box In
    Information Systems International Conference (ISICO), 2 – 4 December 2013 Analysis of the Use of Whirlpool’s S-box, S1 and S2 SEED’s S- box in AES Algorithm with SAC Test Novita Angraini, Bety Hayat Susanti, Magfirawaty Novita Angraini, Bety Hayat Susanti, Magfirawaty Sekolah Tinggi Sandi Negara Keywords: ABSTRACT Advanced Encryption Since 2001, Advanced Encryption Standard (AES) block cipher has become Standard(AES) a standard algorithm and widely used in cryptographic applications. The Substitution Box (S-box) heart of AES is a nonlinear substitution box (S-box) that generated using Strict Avalanche Criterion (SAC) Affine transformation. In this paper, we change the original S-box with Bit Independence Criterion (BIC) Whirlpool’s S-box, S1 and S2 Seed’s S-box. After that, we analyze the effect Nonlinearity of their usage in AES and compared them to the original. We decide to use these S-boxes due to the similarity dimension with AES’s S-box. The cryptographic properties such as strict avalanche criterion (SAC), bit independence criterion (BIC), XOR table distribution and nonlinearity of theseS-boxes are analyzed in details. According to our experiments, S1 and S2 Seed’s S-box have an error value close to AES’s S-box error value for all tests but not so with Whirlpool’s S-box. We also test the original and modified AES using SAC. The test results showed that they satisfy SAC. Copyright © 2013 Information Systems International Conference. All rights reserved. Corresponding Author: Bety Hayat Susanti, Sekolah Tinggi Sandi Negara, Jalan H.Usa Putat Nutug, Ciseeng, Bogor, 16330. Email: [email protected] 1.
    [Show full text]
  • The Implementation of ”Kuznyechik” Encryption Algorithm Using NVIDIA CUDA Technology
    The implementation of "Kuznyechik" encryption algorithm using NVIDIA CUDA technology A N Borisov1 and E V Myasnikov1 1Samara National Research University, Moskovskoe Shosse 34А, Samara, Russia, 443086 e-mail: [email protected] Abstract. In this paper, we discuss various options for implementing the "Kuznyechik" block encryption algorithm using the NVIDIA CUDA technology. We use lookup tables as a basis for the implementation. In experiments, we study the influence of the size of the block of threads and the location of lookup tables on the encryption speed. We show that the best results are obtained when the lookup tables are stored in the global memory. The peak encryption speed reaches 30.83 Gbps on the NVIDIA GeForce GTX 1070 graphics processor . 1. Introduction Cryptographic protection is an important part of a modern IT infrastructure. Nowadays, both the volume of information and computing power are continually increasing. Accordingly, there are growing demands on both the robustness and speed of cryptographic algorithms. The idea of using graphics processors to speed up encryption algorithms appeared almost simultaneously with the idea of using them for general-purpose computing[1]. As known, the maximum profit from the use of graphics processors can be achieved only with massive parallel tasks. It is not surprising that the most noticeable results in this field were obtained for block encryption in the ECB (electronic code book) and CTR (gamming) modes, since the blocks of plain text are processed independently in this case. At present, there is a lot of papers, which focuses on using graphics processors for encryption. Most of the papers are devoted to the AES encryption algorithm.
    [Show full text]
  • Hands Beat Machines for Collecting Native Seed Mary Ann Davies, Project Leader, and Scott Jensen, Botanist
    United States Department of Agriculture Reforestation & Forest Service Nurseries Technology & Development Program October 2008 2400 0824–2353–MTDC Hands Beat Machines for Collecting Native Seed Mary Ann Davies, Project Leader, and Scott Jensen, Botanist eed from native plants is needed for restoration projects on all national forests. Often the desired SSplant materials must be collected from wild stands using tedious hand labor. The best collecting methods may differ for different species. In general, seed is beaten, cut, or stripped from a plant. Using a racquet to beat seed into a hopper (figure 1) is a common method. Sickles may be used to cut stems with seeds from forbs, such as lupine and some penstemons (figure 2). Often, berries or seed pods are stripped from plants by collectors wearing gloves (figure 3). • Collecting native seed involves tedious hand work. • A hedge trimmer and a hand-held vacuum were tested to see whether they might do a better job than common methods of collecting seed by hand. • Common methods are still the best. Figure 1—Beating plants with a racket to collect seed in a hopper. For additional information, contact: Mary Ann Davies, project leader; USDA Forest Service, MTDC; 5785 Hwy. 10 West; Missoula, MT 59808–9361. Phone: 406–329–3981; fax: 406–329–3719; e-mail: [email protected] Native seed collectors try to use the most efficient methods Market Search to get the job done quickly and to collect the most seed with the The best instruments for hand collection of native seed least effort. The Missoula Technology and Development Center need to be simple, portable, lightweight, have a collection bin, (MTDC) was asked to find or develop a hand-held collection and be able to beat, suck, or cut seed from a plant.
    [Show full text]