An Examination of the Seed Rain and Seed Bank and Evidence of Seed Exchange Between a Beech Gap and a Spruce Forest in the Great Smoky Mountains

Total Page:16

File Type:pdf, Size:1020Kb

An Examination of the Seed Rain and Seed Bank and Evidence of Seed Exchange Between a Beech Gap and a Spruce Forest in the Great Smoky Mountains University of Tennessee, Knoxville TRACE: Tennessee Research and Creative Exchange Masters Theses Graduate School 8-1981 An Examination of the Seed Rain and Seed Bank and Evidence of Seed Exchange Between a Beech Gap and a Spruce Forest in the Great Smoky Mountains Noel Bruce Pavlovic University of Tennessee - Knoxville Follow this and additional works at: https://trace.tennessee.edu/utk_gradthes Part of the Life Sciences Commons Recommended Citation Pavlovic, Noel Bruce, "An Examination of the Seed Rain and Seed Bank and Evidence of Seed Exchange Between a Beech Gap and a Spruce Forest in the Great Smoky Mountains. " Master's Thesis, University of Tennessee, 1981. https://trace.tennessee.edu/utk_gradthes/1433 This Thesis is brought to you for free and open access by the Graduate School at TRACE: Tennessee Research and Creative Exchange. It has been accepted for inclusion in Masters Theses by an authorized administrator of TRACE: Tennessee Research and Creative Exchange. For more information, please contact [email protected]. To the Graduate Council: I am submitting herewith a thesis written by Noel Bruce Pavlovic entitled "An Examination of the Seed Rain and Seed Bank and Evidence of Seed Exchange Between a Beech Gap and a Spruce Forest in the Great Smoky Mountains." I have examined the final electronic copy of this thesis for form and content and recommend that it be accepted in partial fulfillment of the requirements for the degree of Master of Science, with a major in Ecology and Evolutionary Biology. E. E. C. Clebsch, Major Professor We have read this thesis and recommend its acceptance: H. R. DeSelm, Edward Buckner Accepted for the Council: Carolyn R. Hodges Vice Provost and Dean of the Graduate School (Original signatures are on file with official studentecor r ds.) To the Graduate Council: I am submitting herewith a thesis written by Noel Bruce Pavlovic entitled 11An Examination of the Seed Rain and Seed Bank and Evidence of Seed Exchange Between a Beech Gap and a Spruce Forest in the Great Smoky Mountains_.' I have examined the final copy of this thesis for form and content and recommend that it be accepted in partial fulfill­ ment of the requirements for the degree of Master of Sc ience, with a major in Ecology. " '1 � r /'I I � j- /. ·, . {_ LL,{, c E.l�t\ E. C. Clebsch, Major Professor We have read this thesis and recommend its acceptance: Z>� � H:./2. £J£v�u-�.IA�/ ;_]c.DcL/.- Accepted for the Council: Vice Chancellor Graduate Studies and Research AN EXAMINATION OF THE SEED RA IN AND SEED BANK FOR EVIDENCE OF SEED EXCHANGE BETWEEN A BEECH GAP AND A SPRUCE FOREST IN THE GREAT SMOKY MOUNTAINS A Thesis Presented for the Master of Sci ence Degree The University of Tennessee , Knoxville Noel Bruce Pavlovic August 1981 ACKNOWLEDGMENTS I would like to express my sincerest appreciation for the support and encouragement of my major professor , Dr. E. E. C. Clebsch throughout this study . The guidance and assistance of Dr. Robert Farmer, Dr. Edward Buckner, and Dr. Hal DeSelm are greatly appreciated . Dr. P. Delcourt was hel pful in conifer seed identification. Thanks are in order for the Graduate Program in Ecology that provided transportation vehicles and funds , computer funds, a graduate teaching assistantship, and growth chambers during this project. The permi ssion from Dr. Farmer to use the Tennessee Val ley Authority greenhouse at Norris, TN was vital in being able to complete this study. A Millard Markle Award for Field Biology from Earl ham College, Richmond, IN contributed to the purchase of the majority of equipment used in this study . This work would not have been possible wi thout the permission and assistance of Don Defoe and the National Park Service to conduct field work in the Great Smoky Mountains National Park. En lightening discussions with Paul Schmalzer, Anne Stocum, and Steve Seagle were inval uable in developing some of the ideas within this manuscript and in the data analysis. Paul and Anne al so helped in the field work. Jorge Ganem was kind enough to provide transporta­ tion to the study site for several weeks during the summer of 1979. Thomas Patrick was a big help in identifying the sedges and rushes . Maureen Cunningham was kind enough to provide frequent transportation i i iii to Norris, TN and to water the seed bank flats in the green­ house. Mrs . Marilyn Caponetti was most helpful in providing advice on manuscript preparation and in typing the manuscript as wel l. I wou ld like to express my sincerest appreciation to my parents, Arthur and Barbara Pavlovic, for their encouraging me to follow my own interests and to Charl ie and Virginia Baer for teaching me an appreciation for the natural world. My deepest appreciation extends to my wife, Sarah, who put up with the high elevation Smoky•s weather during her free time, numerous attacks by bird tanglefoot during the field work, and with my long hours of study and writi ng. ABSTRACT The vegetation, seed rain, and seed banks were examined in a beech gap and a spruce stand in the high elevation Smoky Mountains to quantify the seed exchanges between these two plant communities . This information is of interest because these beech gaps are believed to be slowly invaded by Picea rubens along the abrupt boundary between the stands. Five transects of seed traps were set up perpendicular to the boundary, extend ing into each community. Sticky and gravity traps were placed at preset intervals along the transects to collect seed rain for one year. At each seed ra in sample site a soil core was collected to examine viabl e seeds and vegetative propagules in the soil. The vegetation analys is showed quantitative differences rather than compositional differences between the tree canopies of the beech gap and spruce stand . The beech gap was dominated by Fagus grandi­ fol ia, whereas the spruce stand was dominated by Picea rubens and Betula lutea. The shrub layer and herbaceous vegetation differed greatly between these two plant communities. Canopy transects across the boundary demonstrated a narrow ecotonal zone rather than a disti nct boundary between the communities although from a distance the boundary appeared sharp . The seed rain data showed substantial seed dispersal of Betula lutea and Picea rubens and minimal dispersal of Cacal ia rugel ia into iv v the beech gap from the spruce stand . Some seeds of Poa alsodes were able to disperse into the spruce stand from the beech gap. Evidence is presented showing that Eupatorium rugosum wa s dispersed from the Cli ngman 's Dome Road into the beech gap and possibly into the spruce stand as well. The seed bank data confirmed the exchange of seeds of these species except for Cacalia rugel ia. The seed bank results agreed with other seed bank studies, in the absence of seeds of late successional woody species such as Fagus grandifol ia and Picea rubens. In contrast with most seed bank studies , the seed banks in these communities had a high similarity with the overlying vegetation. Multi variate analytical techniques showed significant differences in the seed banks between these adjacent plant communities. Reciprocal averaging showed a beech gap seed bank species gradient which is highly correlated with sample core slope position. This seed bank gradient is probably in response to a moisture topo­ graphic gradient affecting the overlyi ng herbaceous species populations. The implications of the limited seed exchanges between these communities are discussed in terms of the possible invasion of the spruce stand vegetation into the beech gap. The potential role of seeds stored in the soil in succession and vegetation dynamics is discussed . TABLE OF CONTENTS CHAPTER PAGE INTRODUCTION 1 I. LITERATURE REV IEW . 5 II. THE STUDY AREA. 19 Geology .. 19 Soi ls . 22 Cl imate . 23 Vegetation. 26 III. METHODS . 33 Vegetation Data 33 Seed Rain . 34 Seed Bank . 37 Environmental Variables . 39 IV. ANALYTICAL METHODS ... 40 Ordination ....... 41 Cluster Analys is ............ • . • 44 Discriminant Function Analys is .. 46 Diversity ........... 49 Germination Value ....... 50 Jaccard 's Coefficient of Simi larity . 51 Descriptive Statistics. 52 V. THE VEGETATION. 53 VI. THE SEED RA IN .. 64 VII. THE SEED BANK . 78 Reciprocal Averaging ............ 83 Cluster Analysis and Discriminant Analysis.. 89 Reciprocal Averaging Revisited . 91 Seed Bank Depth Distribution . ... 95 Pheno 1 ogy of Emergence. 99 Vegetative Reproduction ................ 102 VIII. THE VEGETATION , SEED RAIN AND SEED BANKS . 105 IX. DISCUSSION ......• .... 117 Dispersal Across Boundaries • . 117 vi vii CHAPTER PAGE Succession and Regeneration ..... 122 Origin and Maintenance of Beech Gaps. 126 X. CONCLUS ION. 132 LITERATURE CITED . 135 APPENDICES . 149 APPENDIX A . 150 APPENDIX B . 151 VITA • • • . 155 LIST OF TABLES TABLE PAGE 1. Summary of Forest Seed Bank Literature ..... 11 2. Beech Gap and Spruce Stand Overstory Vegetation 54 3. Beech Gap and Spruce Stand Shrub Vegetation . 58 4. Beech Gap Herbaceous Vegetation .. 60 5. Spruce Stand Herbaceous Vegetation. 62 6. Summary of the Beech Gap and the Spruce Stand Seed Ra in by Seed Trap Type. 68 7. Summary of Betula lutea Germination and Viability Tests 72 8. Summary of the Beech Gap and Spruce Stand Seed Banks. 80 9. Seed Densities per m2 by Depth in the Beech Gap Seed Bank . 96 10. Summary of Phenology of Emergence . 100 11. Vegetative and Sexual Reproduction .. .•10 3 12. Summary of Woody Vegetation, Seed Rain, and Seed Bank by Densities in Each Community . 106 13. Summary of the Plant or Seed Density in the Beech Gap and Spruce Stand Vegetation, Seed Rain and Seed Bank. 110 14. Similarity Between the Vegetati on, Seed Rain, and Seed Banks Within and Between the Communities.
Recommended publications
  • Cranberry - Wikipedia
    8/16/2018 Cranberry - Wikipedia Cranberry Cranberries are a group of evergreen dwarf shrubs or trailing vines in the Cranberry subgenus Oxycoccus of the genus Vaccinium. In Britain, cranberry may refer to the native species Vaccinium oxycoccos,[1] while in North America, cranberry may refer to Vaccinium macrocarpon.[2] Vaccinium oxycoccos is cultivated in central and northern Europe, while Vaccinium macrocarpon is cultivated throughout the northern United States, Canada and Chile.[3] In some methods of classification, Oxycoccus is regarded as a genus in its own right.[4] They can be found in acidic bogs throughout the cooler regions of the Northern Hemisphere. Cranberry bush with fruit partially Cranberries are low, creeping shrubs or vines up to 2 meters (7 ft) long and 5 submerged to 20 centimeters (2 to 8 in) in height;[5] they have slender, wiry stems that are not thickly woody and have small evergreen leaves. The flowers are dark Scientific classification pink, with very distinct reflexed petals, leaving the style and stamens fully Kingdom: Plantae exposed and pointing forward. They are pollinated by bees. The fruit is a berry that is larger than the leaves of the plant; it is initially light green, Clade: Angiosperms turning red when ripe. It is edible, but with an acidic taste that usually Clade: Eudicots overwhelms its sweetness. Clade: Asterids Cranberries are a major commercial crop in certain American states and Order: Ericales Canadian provinces (see cultivation and uses below). Most cranberries are processed into products such as juice, sauce, jam, and sweetened dried Family: Ericaceae cranberries, with the remainder sold fresh to consumers.
    [Show full text]
  • An Integrated Symmetric Key Cryptographic Method
    I.J.Modern Education and Computer Science, 2012, 5, 1-9 Published Online June 2012 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2012.05.01 An Integrated Symmetric Key Cryptographic Method – Amalgamation of TTJSA Algorithm , Advanced Caesar Cipher Algorithm, Bit Rotation and Reversal Method: SJA Algorithm Somdip Dey Department of Computer Science, St. Xavier’s College [Autonomous], Kolkata, India. Email: [email protected] Joyshree Nath A.K. Chaudhuri School of IT, Calcutta University, Kolkata, India. Email: [email protected] Asoke Nath Department of Computer Science, St. Xavier’s College [Autonomous], Kolkata, India. Email: [email protected] Abstract—In this paper the authors present a new In banking system the data must be fully secured. Under integrated symmetric-key cryptographic method, named no circumstances the authentic data should go to hacker. SJA, which is the combination of advanced Caesar Cipher In defense the security of data is much more prominent. method, TTJSA method, Bit wise Rotation and Reversal The leakage of data in defense system can be highly fatal method. The encryption method consists of three basic and can cause too much destruction. Due to this security steps: 1) Encryption Technique using Advanced Caesar issue different cryptographic methods are used by Cipher, 2) Encryption Technique using TTJSA Algorithm, different organizations and government institutions to and 3) Encryption Technique using Bit wise Rotation and protect their data online. But, cryptography hackers are Reversal. TTJSA Algorithm, used in this method, is again always trying to break the cryptographic methods or a combination of generalized modified Vernam Cipher retrieve keys by different means.
    [Show full text]
  • Flora of the Carolinas, Virginia, and Georgia, Working Draft of 17 March 2004 -- ERICACEAE
    Flora of the Carolinas, Virginia, and Georgia, Working Draft of 17 March 2004 -- ERICACEAE ERICACEAE (Heath Family) A family of about 107 genera and 3400 species, primarily shrubs, small trees, and subshrubs, nearly cosmopolitan. The Ericaceae is very important in our area, with a great diversity of genera and species, many of them rather narrowly endemic. Our area is one of the north temperate centers of diversity for the Ericaceae. Along with Quercus and Pinus, various members of this family are dominant in much of our landscape. References: Kron et al. (2002); Wood (1961); Judd & Kron (1993); Kron & Chase (1993); Luteyn et al. (1996)=L; Dorr & Barrie (1993); Cullings & Hileman (1997). Main Key, for use with flowering or fruiting material 1 Plant an herb, subshrub, or sprawling shrub, not clonal by underground rhizomes (except Gaultheria procumbens and Epigaea repens), rarely more than 3 dm tall; plants mycotrophic or hemi-mycotrophic (except Epigaea, Gaultheria, and Arctostaphylos). 2 Plants without chlorophyll (fully mycotrophic); stems fleshy; leaves represented by bract-like scales, white or variously colored, but not green; pollen grains single; [subfamily Monotropoideae; section Monotropeae]. 3 Petals united; fruit nodding, a berry; flower and fruit several per stem . Monotropsis 3 Petals separate; fruit erect, a capsule; flower and fruit 1-several per stem. 4 Flowers few to many, racemose; stem pubescent, at least in the inflorescence; plant yellow, orange, or red when fresh, aging or drying dark brown ...............................................Hypopitys 4 Flower solitary; stem glabrous; plant white (rarely pink) when fresh, aging or drying black . Monotropa 2 Plants with chlorophyll (hemi-mycotrophic or autotrophic); stems woody; leaves present and well-developed, green; pollen grains in tetrads (single in Orthilia).
    [Show full text]
  • Investigation of Some Cryptographic Properties of the 8X8 S-Boxes Created by Quasigroups
    Computer Science Journal of Moldova, vol.28, no.3(84), 2020 Investigation of Some Cryptographic Properties of the 8x8 S-boxes Created by Quasigroups Aleksandra Mileva, Aleksandra Stojanova, Duˇsan Bikov, Yunqing Xu Abstract We investigate several cryptographic properties in 8-bit S- boxes obtained by quasigroups of order 4 and 16 with several different algebraic constructions. Additionally, we offer a new construction of N-bit S-boxes by using different number of two layers – the layer of bijectional quasigroup string transformations, and the layer of modular addition with N-bit constants. The best produced 8-bit S-boxes so far are regular and have algebraic degree 7, nonlinearity 98 (linearity 60), differential uniformity 8, and autocorrelation 88. Additionally we obtained 8-bit S-boxes with nonlinearity 100 (linearity 56), differential uniformity 10, autocorrelation 88, and minimal algebraic degree 6. Relatively small set of performed experiments compared with the extremly large set of possible experiments suggests that these results can be improved in the future. Keywords: 8-bit S-boxes, nonlinearity, differential unifor- mity, autocorrelation. MSC 2010: 20N05, 94A60. 1 Introduction The main building blocks for obtaining confusion in all modern block ciphers are so called substitution boxes, or S-boxes. Usually, they work with much less data (for example, 4 or 8 bits) than the block size, so they need to be highly nonlinear. Two of the most successful attacks against modern block ciphers are linear cryptanalysis (introduced by ©2020 by CSJM; A. Mileva, A. Stojanova, D. Bikov, Y. Xu 346 Investigation of Some Cryptographic Properties of 8x8 S-boxes .
    [Show full text]
  • Security Evaluation of the K2 Stream Cipher
    Security Evaluation of the K2 Stream Cipher Editors: Andrey Bogdanov, Bart Preneel, and Vincent Rijmen Contributors: Andrey Bodganov, Nicky Mouha, Gautham Sekar, Elmar Tischhauser, Deniz Toz, Kerem Varıcı, Vesselin Velichkov, and Meiqin Wang Katholieke Universiteit Leuven Department of Electrical Engineering ESAT/SCD-COSIC Interdisciplinary Institute for BroadBand Technology (IBBT) Kasteelpark Arenberg 10, bus 2446 B-3001 Leuven-Heverlee, Belgium Version 1.1 | 7 March 2011 i Security Evaluation of K2 7 March 2011 Contents 1 Executive Summary 1 2 Linear Attacks 3 2.1 Overview . 3 2.2 Linear Relations for FSR-A and FSR-B . 3 2.3 Linear Approximation of the NLF . 5 2.4 Complexity Estimation . 5 3 Algebraic Attacks 6 4 Correlation Attacks 10 4.1 Introduction . 10 4.2 Combination Generators and Linear Complexity . 10 4.3 Description of the Correlation Attack . 11 4.4 Application of the Correlation Attack to KCipher-2 . 13 4.5 Fast Correlation Attacks . 14 5 Differential Attacks 14 5.1 Properties of Components . 14 5.1.1 Substitution . 15 5.1.2 Linear Permutation . 15 5.2 Key Ideas of the Attacks . 18 5.3 Related-Key Attacks . 19 5.4 Related-IV Attacks . 20 5.5 Related Key/IV Attacks . 21 5.6 Conclusion and Remarks . 21 6 Guess-and-Determine Attacks 25 6.1 Word-Oriented Guess-and-Determine . 25 6.2 Byte-Oriented Guess-and-Determine . 27 7 Period Considerations 28 8 Statistical Properties 29 9 Distinguishing Attacks 31 9.1 Preliminaries . 31 9.2 Mod n Cryptanalysis of Weakened KCipher-2 . 32 9.2.1 Other Reduced Versions of KCipher-2 .
    [Show full text]
  • Ground Vegetation Patterns of the Spruce-Fir Area of the Great Smoky Mountains National Park
    University of Tennessee, Knoxville TRACE: Tennessee Research and Creative Exchange Doctoral Dissertations Graduate School 12-1957 Ground Vegetation Patterns of the Spruce-Fir Area of the Great Smoky Mountains National Park Dorothy Louise Crandall University of Tennessee - Knoxville Follow this and additional works at: https://trace.tennessee.edu/utk_graddiss Part of the Botany Commons Recommended Citation Crandall, Dorothy Louise, "Ground Vegetation Patterns of the Spruce-Fir Area of the Great Smoky Mountains National Park. " PhD diss., University of Tennessee, 1957. https://trace.tennessee.edu/utk_graddiss/1624 This Dissertation is brought to you for free and open access by the Graduate School at TRACE: Tennessee Research and Creative Exchange. It has been accepted for inclusion in Doctoral Dissertations by an authorized administrator of TRACE: Tennessee Research and Creative Exchange. For more information, please contact [email protected]. To the Graduate Council: I am submitting herewith a dissertation written by Dorothy Louise Crandall entitled "Ground Vegetation Patterns of the Spruce-Fir Area of the Great Smoky Mountains National Park." I have examined the final electronic copy of this dissertation for form and content and recommend that it be accepted in partial fulfillment of the equirr ements for the degree of Doctor of Philosophy, with a major in Botany. Royal E. Shanks, Major Professor We have read this dissertation and recommend its acceptance: James T. Tanner, Fred H. Norris, A. J. Sharp, Lloyd F. Seatz Accepted for the Council: Carolyn R. Hodges Vice Provost and Dean of the Graduate School (Original signatures are on file with official studentecor r ds.) December 11, 19)7 To the Graduate Council: I am submitting herewith a thesis written by DorothY Louise Crandall entitled "Ground Vegetation Patterns of the Spruce-Fir Area of the Great Smoky Hountains National Park." I recommend that it be accepted in partial fulfillment of the requirements for the degree of Doctor of Philosophy, with a major in Botany.
    [Show full text]
  • The Genus Vaccinium in North America
    Agriculture Canada The Genus Vaccinium 630 . 4 C212 P 1828 North America 1988 c.2 Agriculture aid Agri-Food Canada/ ^ Agnculturo ^^In^iikQ Canada V ^njaian Agriculture Library Brbliotheque Canadienno de taricakun otur #<4*4 /EWHE D* V /^ AgricultureandAgri-FoodCanada/ '%' Agrrtur^'AgrntataireCanada ^M'an *> Agriculture Library v^^pttawa, Ontano K1A 0C5 ^- ^^f ^ ^OlfWNE D£ W| The Genus Vaccinium in North America S.P.VanderKloet Biology Department Acadia University Wolfville, Nova Scotia Research Branch Agriculture Canada Publication 1828 1988 'Minister of Suppl) andS Canada ivhh .\\ ailabla in Canada through Authorized Hook nta ami other books! or by mail from Canadian Government Publishing Centre Supply and Services Canada Ottawa, Canada K1A0S9 Catalogue No.: A43-1828/1988E ISBN: 0-660-13037-8 Canadian Cataloguing in Publication Data VanderKloet,S. P. The genus Vaccinium in North America (Publication / Research Branch, Agriculture Canada; 1828) Bibliography: Cat. No.: A43-1828/1988E ISBN: 0-660-13037-8 I. Vaccinium — North America. 2. Vaccinium — North America — Classification. I. Title. II. Canada. Agriculture Canada. Research Branch. III. Series: Publication (Canada. Agriculture Canada). English ; 1828. QK495.E68V3 1988 583'.62 C88-099206-9 Cover illustration Vaccinium oualifolium Smith; watercolor by Lesley R. Bohm. Contract Editor Molly Wolf Staff Editors Sharon Rudnitski Frances Smith ForC.M.Rae Digitized by the Internet Archive in 2011 with funding from Agriculture and Agri-Food Canada - Agriculture et Agroalimentaire Canada http://www.archive.org/details/genusvacciniuminOOvand
    [Show full text]
  • Introduction to the Southern Blue Ridge Ecoregional Conservation Plan
    SOUTHERN BLUE RIDGE ECOREGIONAL CONSERVATION PLAN Summary and Implementation Document March 2000 THE NATURE CONSERVANCY and the SOUTHERN APPALACHIAN FOREST COALITION Southern Blue Ridge Ecoregional Conservation Plan Summary and Implementation Document Citation: The Nature Conservancy and Southern Appalachian Forest Coalition. 2000. Southern Blue Ridge Ecoregional Conservation Plan: Summary and Implementation Document. The Nature Conservancy: Durham, North Carolina. This document was produced in partnership by the following three conservation organizations: The Nature Conservancy is a nonprofit conservation organization with the mission to preserve plants, animals and natural communities that represent the diversity of life on Earth by protecting the lands and waters they need to survive. The Southern Appalachian Forest Coalition is a nonprofit organization that works to preserve, protect, and pass on the irreplaceable heritage of the region’s National Forests and mountain landscapes. The Association for Biodiversity Information is an organization dedicated to providing information for protecting the diversity of life on Earth. ABI is an independent nonprofit organization created in collaboration with the Network of Natural Heritage Programs and Conservation Data Centers and The Nature Conservancy, and is a leading source of reliable information on species and ecosystems for use in conservation and land use planning. Photocredits: Robert D. Sutter, The Nature Conservancy EXECUTIVE SUMMARY This first iteration of an ecoregional plan for the Southern Blue Ridge is a compendium of hypotheses on how to conserve species nearest extinction, rare and common natural communities and the rich and diverse biodiversity in the ecoregion. The plan identifies a portfolio of sites that is a vision for conservation action, enabling practitioners to set priorities among sites and develop site-specific and multi-site conservation strategies.
    [Show full text]
  • Ecosystem Diversity Report George Washington National Forest Draft EIS April 2011
    Appendix E Ecosystem Diversity Report George Washington National Forest Draft EIS April 2011 U.S. Department of Agriculture Forest Service Southern Region Ecosystem Diversity Report George Washington National Forest April 2011 Appendix E Ecosystem Diversity Report George Washington National Forest Draft EIS April 2011 Table of Contents TABLE OF CONTENTS .............................................................................................................. I 1.0 INTRODUCTION.................................................................................................................. 1 2.0 ECOLOGICAL SUSTAINABILITY EVALUATION PROCESS ................................... 3 3.0 ECOLOGICAL SYSTEMS .................................................................................................. 7 3.1 Background and Distribution of Ecosystems ..................................................................................................... 7 North-Central Appalachian Acidic Swamp ............................................................................................................ 10 3.2 Descriptions of the Ecological Systems ............................................................................................................ 10 3.2.1 Spruce Forest: Central and Southern Appalachian Spruce-Fir Forest .......................................................... 10 3.2.2 Northern Hardwood Forest : Appalachian (Hemlock)- Northern Hardwood Forest ..................................... 11 3.2.3 Cove Forest: Southern and Central
    [Show full text]
  • Identifying Open Research Problems in Cryptography by Surveying Cryptographic Functions and Operations 1
    International Journal of Grid and Distributed Computing Vol. 10, No. 11 (2017), pp.79-98 http://dx.doi.org/10.14257/ijgdc.2017.10.11.08 Identifying Open Research Problems in Cryptography by Surveying Cryptographic Functions and Operations 1 Rahul Saha1, G. Geetha2, Gulshan Kumar3 and Hye-Jim Kim4 1,3School of Computer Science and Engineering, Lovely Professional University, Punjab, India 2Division of Research and Development, Lovely Professional University, Punjab, India 4Business Administration Research Institute, Sungshin W. University, 2 Bomun-ro 34da gil, Seongbuk-gu, Seoul, Republic of Korea Abstract Cryptography has always been a core component of security domain. Different security services such as confidentiality, integrity, availability, authentication, non-repudiation and access control, are provided by a number of cryptographic algorithms including block ciphers, stream ciphers and hash functions. Though the algorithms are public and cryptographic strength depends on the usage of the keys, the ciphertext analysis using different functions and operations used in the algorithms can lead to the path of revealing a key completely or partially. It is hard to find any survey till date which identifies different operations and functions used in cryptography. In this paper, we have categorized our survey of cryptographic functions and operations in the algorithms in three categories: block ciphers, stream ciphers and cryptanalysis attacks which are executable in different parts of the algorithms. This survey will help the budding researchers in the society of crypto for identifying different operations and functions in cryptographic algorithms. Keywords: cryptography; block; stream; cipher; plaintext; ciphertext; functions; research problems 1. Introduction Cryptography [1] in the previous time was analogous to encryption where the main task was to convert the readable message to an unreadable format.
    [Show full text]
  • Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT
    Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT Jiazhe Chen1;2;3?, Meiqin Wang1;2;3??, and Bart Preneel2;3 1 Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, School of Mathematics, Shandong University, Jinan 250100, China 2 Department of Electrical Engineering ESAT/SCD-COSIC, Katholieke Universiteit Leuven, Kasteelpark Arenberg 10, B-3001 Heverlee, Belgium 3 Interdisciplinary Institute for BroadBand Technology (IBBT), Belgium [email protected] Abstract. TEA, XTEA and HIGHT are lightweight block ciphers with 64-bit block sizes and 128-bit keys. The round functions of the three ci- phers are based on the simple operations XOR, modular addition and shift/rotation. TEA and XTEA are Feistel ciphers with 64 rounds de- signed by Needham and Wheeler, where XTEA is a successor of TEA, which was proposed by the same authors as an enhanced version of TEA. HIGHT, which is designed by Hong et al., is a generalized Feistel cipher with 32 rounds. These block ciphers are simple and easy to implement but their diffusion is slow, which allows us to find some impossible prop- erties. This paper proposes a method to identify the impossible differentials for TEA and XTEA by using the weak diffusion, where the impossible differential comes from a bit contradiction. Our method finds a 14-round impossible differential of XTEA and a 13-round impossible differential of TEA, which result in impossible differential attacks on 23-round XTEA and 17-round TEA, respectively. These attacks significantly improve the previous impossible differential attacks on 14-round XTEA and 11-round TEA given by Moon et al.
    [Show full text]
  • New Cryptanalysis of Block Ciphers with Low Algebraic Degree
    New Cryptanalysis of Block Ciphers with Low Algebraic Degree Bing Sun1,LongjiangQu1,andChaoLi1,2 1 Department of Mathematics and System Science, Science College of National University of Defense Technology, Changsha, China, 410073 2 State Key Laboratory of Information Security, Graduate University of Chinese Academy of Sciences, China, 10039 happy [email protected], ljqu [email protected] Abstract. Improved interpolation attack and new integral attack are proposed in this paper, and they can be applied to block ciphers using round functions with low algebraic degree. In the new attacks, we can determine not only the degree of the polynomial, but also coefficients of some special terms. Thus instead of guessing the round keys one by one, we can get the round keys by solving some algebraic equations over finite field. The new methods are applied to PURE block cipher successfully. The improved interpolation attacks can recover the first round key of 8-round PURE in less than a second; r-round PURE with r ≤ 21 is breakable with about 3r−2 chosen plaintexts and the time complexity is 3r−2 encryptions; 22-round PURE is breakable with both data and time complexities being about 3 × 320. The new integral attacks can break PURE with rounds up to 21 with 232 encryptions and 22-round with 3 × 232 encryptions. This means that PURE with up to 22 rounds is breakable on a personal computer. Keywords: block cipher, Feistel cipher, interpolation attack, integral attack. 1 Introduction For some ciphers, the round function can be described either by a low degree polynomial or by a quotient of two low degree polynomials over finite field with characteristic 2.
    [Show full text]