NASA Reference Publication 1221 Nimbus- 7 Stratospheric And

Total Page:16

File Type:pdf, Size:1020Kb

NASA Reference Publication 1221 Nimbus- 7 Stratospheric And NASA Reference Publication 1221 1989 Nimbus-7 Stratospheric and Mesospheric Sounder (SAMs) Experiment Data User’s Guide F. W. Taylor and C. D. Rodgers University of Oxford Oxford, England S. T. Nutter and N. Os& ST Systems Corporation (STX) Lanham, Maryland National Aeronautics and Space Administration Off ice of Management Scientific and Technical Information Division FOREWORD ;-7 Stratospheric and Mesospheric Sounder (SAMs) Experiment Data User's Guide is intended to provide Immunity with the background information necessary for understanding and using data products on SAMS lred Temperature Tapes (GRID-T), and Zonal Mean Methane and Nitrous Oxide Tapes (ZMT-G). The :nt was flown aboard the Nimbus-7 spacecraft and collected data from October 26, 1978 through June 9, ument provides users with information concerning the operational principles of the SAMs instrument and the retrieval of temperature and atmospheric constituents, and the scientific validity of SAMS data. nts that influence the quality of data are included along with the mission history. Data formats of the MT-G tape products and descriptions of SAMS data are also given. al discussion in this document was prepared originally by the SAMS processing team at Oxford, England. nvestigator was Dr. F. W. Taylor and the NET chairman was Dr. C. D. Rodgers. All questions of a 5 should be addressed to these individuals, at the address given in Section 1.5. The description of the tape ed upon the data tapes provided for conversion from the DEC format available from Oxford to the IBM I by the Nimbus project. The text provided by the SAMs processing team and the information gained from the data tapes were compiled into this document for NASA by S. T. Nutter and N. Oslik of ST Systems IX) under contract NAS5-28063. PRECEDING PAGE BLANK NOT FILMED ... 111 ,* II JNrE-m ~~ TABLE OF CONTENTS Section ... FOREWORD., ..................................... 111 1 PURPOSE. INTRODUCTION. AND OBJECTIVES ....................1 1.1 Purpose of the Data User's Guide ........................ 1 1.2 Introduction. ................................. 1 1.3 Objectives ................................... 2 1.4 DataROducts ................................. 2 1.5 Principal Investigators ............................. 3 2 INSTRUMENT DESCRIPTION .............................. 5 3 DATA PROCESSING ................................... 7 3.1 Calibration ................................... 7 3.2 Retrieval of Temperature and Constituents ...................10 3.3 SAMS Temperature Gridding .........................11 VALIDATION ....................................... 13 MISSION HISTORY AND CHANNEL STATUS ..................... 15 DATA FORMATS ..................................... 49 6.1 Format of SAMS Gridded Retrieved Temperature Tapes (GRID-T) ................................ 49 6.2 Format of SAMs Zonal Mean Methane and Nitrous Oxide Composition Tape (ZMT-G) .......................... 61 REFERENCES ..............................................67 LIST OF ACRONYMS. INITIALS. AND ABBREVIATIONS ......................69 Amendixes A SEQUENCE NUMBERS OF SAMs DATA TAPES .................... 71 B FORTRAN SOURCE LISTING OF SAMS TAPE DUMP .................73 C STRATOSPHERIC AND MESOSPHERIC SOUNDER ON NIMBUS-7 ..........89 D RETRIEVAL OF TEMPERATURE AND COMPOSITION FROM NIMBUS-7 SAMs MEASUREMENTS .......................... 113 E TEMPERATURE COMPARISONS BETWEEN THE NIMBUS-7 SAMS. ROCKEiT/RADIOSONDES AND THE NOAA 6 SSU .................. 121 F OBSERVATIONS OF CHq AND N20 BY THE NIMBUS-7 SAMS: A C0I"ARISON WITH IN SITU DATA AND TWO-DIMENSIONAL NUMERICAL MODEL CALCULATIONS ........................ 131 G SOME ASPECTS OF THE DESIGN AND BEHAVIOR OF THE STRATOSPHERIC AND MESOSPHERIC SOUNDER ...............149 V SECTION 1 PURPOSE, INTRODUCTION, AND OBJECTIVES 1.1 Purpose of the Data User's Guide The SAMs Data User's Guide is intended to provide the scientific community wit. the background information needed to access data on SAMs GRID-T and ZMT-G tapes. The document describes the SAMs instrument, the method of temperature and constituent retrieval, data calibration, and data validation. Section 1 of this document explains the scientific and technical objectives of the SAMs instrument. Section 2 briefly discusses the literature from which a description of the instrument can be obtained. Reprints of two relevant papers appear as Appendixes C and G to this User's Guide. Section 3 outlines the data processing system, explains instrument calibration, briefly describes the temperature and constituent remeval process, and explains the temperature gridding procedure. Section 4, like Section 2, provides an introduction to literature that discusses the accuracy of the retrievals and compares the SAMs results with those of other measurements. Reprints of two relevant papers are included as Appendixes E and F of this User's Guide. Important dates in the history of the SAMs instrument and information concerning the status of SAMs channels are given in Section 5. The data formats of the SAMs GRID-T and ZMT-G tapes are described in detail in Section 6. A FORTRAN source listing of a SAMs tape dump program is included in Appendix B. This program enables users to access data on GRID-T and ZMT-G tapes. 1.2 Introduction The Stratospheric and Mesospheric Sounder (SAMs) instrument flown on Nimbus-7 is the fourth in a series of multi-channel infrared radiometers designed to measure emission from the upper atmosphere, for which conventional spectral filtering techniques do not give adequate performance. The technique used in these radiometers is known as gas correlation spectroscopy and is based on the use of gas cells to select emission from chosen spectral lines or from particular parts of spectral lines. In the Selective Chopper Radiometer (SCR) on Nimbus-4, a beamchopping technique was employed to switch the scene (at 10 Hz) between the atmosphere and space view in a differential manner between two gas cells containing different amounts of C@. The "difference" signal was then detected by a thermistor bolometer. The chief limitation in performance of the Nimbus4 SCR was the difficulty in maintaining a balance condition due to stray thermal emission from within the instrument. Nimbus-5 employed a variation of this technique, in which cells containing different amounts of C02 were switched in sequence (one each second) into the optical path to a pyroelectric detector. The difference signals were then extracted on the ground. Performance in this case was limited by gas leakage with time, by uncertainties in the effects of degradation, and by contamination of the cell windows (which give spurious difference signals). The Pressure Modulator Radiometer (PMR) on Nimbus-6 overcame earlier difficulties by employing a single gas cell and no moving parts in front of the detector. The gas (C02) amount in the cell is modulated at approximately 35 Hz by an oscillating piston, and the oscillatory component of the signal arriving at the detector is related directly to the radiance of the scene, but only at the frequencies corresponding to the variation in absorption of the spectral lines of the gas in the modulator cell. The SAMs instrument views the limb of the atmosphere, rather than employing vertical sounding as in the earlier radiometers. The technique has been extended to gases other than CW. 1.3 Objectives The SAMs is a 12-channel infrared radiometer observing thermal emission and solar resonance fluorescence from the atmospheric limb. Global measurements are made of radiation from the molecular species listed in Table 1-1. These measurements, when interpreted together with results from the LIMS and SBUV/rOMS instruments, provide extensive data for chemical and dynamical models of the stratosphere and mesosphere. Specific objectives of the SAMs experiment were to derive the following quantities: a) Temperature for altitudes from 15 km to 80 km, from emission in the 15 pm C02 band. b) Vibrational temperature of C02 bands where they depart from local thermodynamic equilibrium (LTE),between 50 km and 140 km. c) Distributions of CO, NO, CHq, N20, and H20 from 15 km to 60 km. d) Distributions of C02 (4.3 pm) from 100 km to 140 km and H20 from 60 km to 100 km, to study dissociation in the lower thermosphere. The study of planetary waves that used data from the Nimbus-5 SCR and Nimbus-6 PMR can be continued and extended by making use of these new data. In addition, the measurements allow calculation of the transfer of momentum, energy, and trace gases by mean motions and eddies. The SAMs instrument is designed to exploit the selectivity, energy grasp, and tuning capability of the pressure modulation technique proved earlier for C02 emission measurements in he Nimbus-6 PMR (Curtis et a1.,1974). The main technical innovations in SAMs are as follows: a) The extension of the pressure modulation technique to other gases. b) The simultaneous use of conventional chopping and pressure modulation to 1) Extend the range of heights that can be sounded 2) Determine the pressure at the viewing level 3) Enable some interfering radiance signals to be eliminated 4) Provide additional calibration information and confidence checks c) The use of a programmable scan system with two independent axes to optimize usage of the observing time and to accommodate uncertainties in spacecraft attitude. 1.4 Data Products Retrieved temperature and constituent information from the SAMs instrument is stored on two data products, GRID-T and ZMT-G tapes, respectively, which are archived at the National
Recommended publications
  • In-Town Business Listing - October 2020 This List Is Based on InformaOn Provided by the Public and Is Only Updated Periodically
    City of Camarillo - In-Town Business Listing - October 2020 This list is based on informaon provided by the public and is only updated periodically. The list is provided for general informaonal purposes only and the City does not represent that the informaon is enrely accurate or current. For the right to access and ulize the City's In-Town Business Lisng, I understand and agree to comply with City of Camarillo's soliciting ordinances and regulations. Classification Page Classification Page Classification Page ACCOUNTING - CPA - TAX SERVICE (93) 2 EMPLOYMENT AGENCY (10) 69 PET SERVICE - TRAINER (39) 112 ACUPUNCTURE (13) 4 ENGINEER - ENGINEERING SVCS (34) 70 PET STORE (7) 113 ADD- LOCATION/BUSINESS (64) 5 ENTERTAINMENT - LIVE (17) 71 PHARMACY (13) 114 ADMINISTRATION OFFICE (53) 7 ESTHETICIAN - HAS MASSAGE PERMIT (2) 72 PHOTOGRAPHY / VIDEOGRAPHY (10) 114 ADVERTISING (14) 8 ESTHETICIAN - NO MASSAGE PERMIT (35) 72 PRINTING - PUBLISHING (25) 114 AGRICULTURE - FARM - GROWER (5) 9 FILM - MOVIE PRODUCTION (2) 73 PRIVATE PATROL - SECURITY (4) 115 ALCOHOLIC BEVERAGE (16) 9 FINANCIAL SERVICES (44) 73 PROFESSIONAL (33) 115 ANTIQUES - COLLECTIBLES (18) 10 FIREARMS - REPAIR / NO SALES (2) 74 PROPERTY MANAGEMENT (39) 117 APARTMENTS (36) 10 FLORAL-SALES - DESIGNS - GRW (10) 74 REAL ESTATE (18) 118 APPAREL - ACCESSORIES (94) 12 FOOD STORE (43) 75 REAL ESTATE AGENT (180) 118 APPRAISER (7) 14 FORTUNES - ASTROLOGY - HYPNOSIS(NON-MED) (3) 76 REAL ESTATE BROKER (31) 124 ARTIST - ART DEALER - GALLERY (32) 15 FUNERAL - CREMATORY - CEMETERIES (2) 76 REAL ESTATE
    [Show full text]
  • Information Summaries
    TIROS 8 12/21/63 Delta-22 TIROS-H (A-53) 17B S National Aeronautics and TIROS 9 1/22/65 Delta-28 TIROS-I (A-54) 17A S Space Administration TIROS Operational 2TIROS 10 7/1/65 Delta-32 OT-1 17B S John F. Kennedy Space Center 2ESSA 1 2/3/66 Delta-36 OT-3 (TOS) 17A S Information Summaries 2 2 ESSA 2 2/28/66 Delta-37 OT-2 (TOS) 17B S 2ESSA 3 10/2/66 2Delta-41 TOS-A 1SLC-2E S PMS 031 (KSC) OSO (Orbiting Solar Observatories) Lunar and Planetary 2ESSA 4 1/26/67 2Delta-45 TOS-B 1SLC-2E S June 1999 OSO 1 3/7/62 Delta-8 OSO-A (S-16) 17A S 2ESSA 5 4/20/67 2Delta-48 TOS-C 1SLC-2E S OSO 2 2/3/65 Delta-29 OSO-B2 (S-17) 17B S Mission Launch Launch Payload Launch 2ESSA 6 11/10/67 2Delta-54 TOS-D 1SLC-2E S OSO 8/25/65 Delta-33 OSO-C 17B U Name Date Vehicle Code Pad Results 2ESSA 7 8/16/68 2Delta-58 TOS-E 1SLC-2E S OSO 3 3/8/67 Delta-46 OSO-E1 17A S 2ESSA 8 12/15/68 2Delta-62 TOS-F 1SLC-2E S OSO 4 10/18/67 Delta-53 OSO-D 17B S PIONEER (Lunar) 2ESSA 9 2/26/69 2Delta-67 TOS-G 17B S OSO 5 1/22/69 Delta-64 OSO-F 17B S Pioneer 1 10/11/58 Thor-Able-1 –– 17A U Major NASA 2 1 OSO 6/PAC 8/9/69 Delta-72 OSO-G/PAC 17A S Pioneer 2 11/8/58 Thor-Able-2 –– 17A U IMPROVED TIROS OPERATIONAL 2 1 OSO 7/TETR 3 9/29/71 Delta-85 OSO-H/TETR-D 17A S Pioneer 3 12/6/58 Juno II AM-11 –– 5 U 3ITOS 1/OSCAR 5 1/23/70 2Delta-76 1TIROS-M/OSCAR 1SLC-2W S 2 OSO 8 6/21/75 Delta-112 OSO-1 17B S Pioneer 4 3/3/59 Juno II AM-14 –– 5 S 3NOAA 1 12/11/70 2Delta-81 ITOS-A 1SLC-2W S Launches Pioneer 11/26/59 Atlas-Able-1 –– 14 U 3ITOS 10/21/71 2Delta-86 ITOS-B 1SLC-2E U OGO (Orbiting Geophysical
    [Show full text]
  • Ray Bradbury Creative Contest Literary Journal
    32nd Annual Ray Bradbury Creative Contest Literary Journal 2016 Val Mayerik Val Ray Bradbury Creative Contest A contest of writing and art by the Waukegan Public Library. This year’s literary journal is edited, designed, and produced by the Waukegan Public Library. Table of Contents Elementary School Written page 1 Middle School Written page 23 High School Written page 52 Adult Written page 98 Jennifer Herrick – Designer Rose Courtney – Staff Judge Diana Wence – Staff Judge Isaac Salgado – Staff Judge Yareli Facundo – Staff Judge Elementary School Written The Haunted School Alexis J. In one wonderful day there was a school-named “Hyde Park”. One day when, a kid named Logan and his friend Mindy went to school they saw something new. Hyde Park is hotel now! Logan and Mindy Went inside to see what was going on. So they could not believe what they say. “Hyde Park is also now haunted! When Logan took one step they saw Slender Man. Then they both walk and there was a scary mask. Then mummies started coming out of the grown and zombies started coming from the grown and they were so stinky yuck! Ghost came out all over the school and all the doors were locked. Now Mindy had a plan to scare all the monsters away. She said “we should put all the monsters we saw all together. So they make Hyde Park normal again. And they live happy ever after and now it is back as normal. THE END The Haunted House Angel A. One day it was night. And it was so dark a lot of people went on a house called “dead”.
    [Show full text]
  • Gene Expression Profile in Different Age Groups and Its Association With
    cells Article Gene Expression Profile in Different Age Groups and Its Association with Cognitive Function in Healthy Malay Adults in Malaysia Nur Fathiah Abdul Sani 1 , Ahmad Imran Zaydi Amir Hamzah 1, Zulzikry Hafiz Abu Bakar 1 , Yasmin Anum Mohd Yusof 2, Suzana Makpol 1 , Wan Zurinah Wan Ngah 1 and Hanafi Ahmad Damanhuri 1,* 1 Department of Biochemistry, Faculty of Medicine, Universiti Kebangsaan Malaysia Medical Center, Jalan Yaacob Latif, Cheras, Kuala Lumpur 56000, Malaysia; [email protected] (N.F.A.S.); [email protected] (A.I.Z.A.H.); zulzikryhafi[email protected] (Z.H.A.B.); [email protected] (S.M.); [email protected] (W.Z.W.N.) 2 Faculty of Medicine and Defence Health, National Defence University of Malaysia, Kem Sungai Besi, Kuala Lumpur 57000, Malaysia; [email protected] * Correspondence: hanafi[email protected] Abstract: The mechanism of cognitive aging at the molecular level is complex and not well under- stood. Growing evidence suggests that cognitive differences might also be caused by ethnicity. Thus, this study aims to determine the gene expression changes associated with age-related cognitive decline among Malay adults in Malaysia. A cross-sectional study was conducted on 160 healthy Malay subjects, aged between 28 and 79, and recruited around Selangor and Klang Valley, Malaysia. Citation: Abdul Sani, N.F.; Amir Gene expression analysis was performed using a HumanHT-12v4.0 Expression BeadChip microarray Hamzah, A.I.Z.; Abu Bakar, Z.H.; kit. The top 20 differentially expressed genes at p < 0.05 and fold change (FC) = 1.2 showed that Mohd Yusof, Y.A.; Makpol, S.; Wan PAFAH1B3, HIST1H1E, KCNA3, TM7SF2, RGS1, and TGFBRAP1 were regulated with increased Ngah, W.Z.; Damanhuri, H.A.
    [Show full text]
  • Arxiv:1911.09312V2 [Cs.CR] 12 Dec 2019
    Revisiting and Evaluating Software Side-channel Vulnerabilities and Countermeasures in Cryptographic Applications Tianwei Zhang Jun Jiang Yinqian Zhang Nanyang Technological University Two Sigma Investments, LP The Ohio State University [email protected] [email protected] [email protected] Abstract—We systematize software side-channel attacks with three questions: (1) What are the common and distinct a focus on vulnerabilities and countermeasures in the cryp- features of various vulnerabilities? (2) What are common tographic implementations. Particularly, we survey past re- mitigation strategies? (3) What is the status quo of cryp- search literature to categorize vulnerable implementations, tographic applications regarding side-channel vulnerabili- and identify common strategies to eliminate them. We then ties? Past work only surveyed attack techniques and media evaluate popular libraries and applications, quantitatively [20–31], without offering unified summaries for software measuring and comparing the vulnerability severity, re- vulnerabilities and countermeasures that are more useful. sponse time and coverage. Based on these characterizations This paper provides a comprehensive characterization and evaluations, we offer some insights for side-channel of side-channel vulnerabilities and countermeasures, as researchers, cryptographic software developers and users. well as evaluations of cryptographic applications related We hope our study can inspire the side-channel research to side-channel attacks. We present this study in three di- community to discover new vulnerabilities, and more im- rections. (1) Systematization of literature: we characterize portantly, to fortify applications against them. the vulnerabilities from past work with regard to the im- plementations; for each vulnerability, we describe the root cause and the technique required to launch a successful 1.
    [Show full text]
  • Proceedings of the Nimbus Program Review
    X-650-62-226 J, / N63 18601--N 63 18622 _,_-/ PROCEEDINGS OF THE NIMBUS PROGRAM REVIEW OTS PRICE XEROX S _9, ,_-_ MICROFILM $ Jg/ _-"/_j . J"- O NOVEMBER 14-16, 1962 PROCEEDINGS OF THE NIMBUS PROGRAM REVIEW \ November 14-16, 1962 GODDARD SPACE FLIGHT CENTER Greenbelt, Md. NATIONAL AERONAUTICS AND SPACE ADMINISTRATION GODDARD SPACE FLIGHT CENTER PROCEEDINGS OF THE NIMBUS PROGRAM REVIEW FOREWORD The Nimbus program review was conducted at the George Washington Motor Lodge and at General Electric Missiles and Space Division, Valley Forge, Pennsylvania, on November 14, 15, and 16, 1962. The purpose of the review was twofold: first, to present to top management of the Goddard Space Flight Center (GSFC), National Aeronautics and Space Administration (NASA) Headquarters, other NASA elements, Joint Meteorological Satellite Advisory Committee (_MSAC), Weather Bureau, subsystem contractors, and others, a clear picture of the Nimbus program, its organization, its past accomplishments, current status, and remaining work, emphasizing the continuing need and opportunity for major contributions by the industrial community; second, to bring together project and contractor technical personnel responsible for the planning, execution, and support of the integration and test of the spacecraft to be initiated at General Electric shortly. This book is a compilation of the papers presented during the review and also contains a list of those attending. Harry P_ress Nimbus Project Manager CONTENTS FOREWORD lo INTRODUCTION TO NIMBUS by W. G. Stroud, GSFC _o THE NIMBUS PROJECT-- ORGANIZATION, PLAN, AND STATUS by H. Press, GSFC o METEOROLOGICAL APPLICATIONS OF NIMBUS DATA by E.G. Albert, U.S.
    [Show full text]
  • Nimbus-7 Earth Radiation Budget Calibration History--Part I: the Solar Channels
    NASA Reference Publication 1316 1993 Nimbus-7 Earth Radiation Budget Calibration History--Part I: The Solar Channels H. Lee Kyle Goddard Space Flight Center Greenbelt, Maryland Douglas V. Hoyt Brenda J. Vallette Research and Data Systems Corporation Greenbelt, Maryland John R. Hickey The Eppley Laboratories Newport, Rhode Island Robert H. Maschhoff Gulton Industries Albuquerque, New Mexico National Aeronautics and Space Administration Scientific and Technical Information Branch ACRONYMS AND ABBREVIATIONS ACRIM Active Cavity Radiometer Irradiance Monitor A/D analog to digital convertor APEX Advanced Photovoltaic Experiment CZCS Coastal Zone Color Scanner DSAS Digital Solar Aspect Sensor ERB Earth Radiation Budget ERBS Earth Radiation Budget Satellite FOV field of view H-F Hickey-Frieden Cavity Radiometer IPS International Pyrheliometric Standard JPL Jet Propulsion Laboratory LDEF Long Duration Exposure Facility LIMS Limb Infrared Monitor of the Stratosphere NASA National Aeronautics and Space Administration NIP Normal Incidence Pyrheliometer NSSDC National Space Science Data Center PEERBEC Passive Exposure Earth Radiation Budget Experiment Components ppm parts per million RSM reference sensor model SEFDT Solar Earth Flux Data Tapes SMM Solar Maximum Mission SMMR Scanning Multichannel Microwave Radiometer UARS Upper Atmosphere Research Satellite UV ultraviolet WRR World Radiometric Reference iii TABLE OF CONTENTS Section 1. INTRODUCTION ............................................ 1 o THE HICKEY-FRIEDEN (H-F) CAVITY RADIOMETER ..................
    [Show full text]
  • Photographs Written Historical and Descriptive
    CAPE CANAVERAL AIR FORCE STATION, MISSILE ASSEMBLY HAER FL-8-B BUILDING AE HAER FL-8-B (John F. Kennedy Space Center, Hanger AE) Cape Canaveral Brevard County Florida PHOTOGRAPHS WRITTEN HISTORICAL AND DESCRIPTIVE DATA HISTORIC AMERICAN ENGINEERING RECORD SOUTHEAST REGIONAL OFFICE National Park Service U.S. Department of the Interior 100 Alabama St. NW Atlanta, GA 30303 HISTORIC AMERICAN ENGINEERING RECORD CAPE CANAVERAL AIR FORCE STATION, MISSILE ASSEMBLY BUILDING AE (Hangar AE) HAER NO. FL-8-B Location: Hangar Road, Cape Canaveral Air Force Station (CCAFS), Industrial Area, Brevard County, Florida. USGS Cape Canaveral, Florida, Quadrangle. Universal Transverse Mercator Coordinates: E 540610 N 3151547, Zone 17, NAD 1983. Date of Construction: 1959 Present Owner: National Aeronautics and Space Administration (NASA) Present Use: Home to NASA’s Launch Services Program (LSP) and the Launch Vehicle Data Center (LVDC). The LVDC allows engineers to monitor telemetry data during unmanned rocket launches. Significance: Missile Assembly Building AE, commonly called Hangar AE, is nationally significant as the telemetry station for NASA KSC’s unmanned Expendable Launch Vehicle (ELV) program. Since 1961, the building has been the principal facility for monitoring telemetry communications data during ELV launches and until 1995 it processed scientifically significant ELV satellite payloads. Still in operation, Hangar AE is essential to the continuing mission and success of NASA’s unmanned rocket launch program at KSC. It is eligible for listing on the National Register of Historic Places (NRHP) under Criterion A in the area of Space Exploration as Kennedy Space Center’s (KSC) original Mission Control Center for its program of unmanned launch missions and under Criterion C as a contributing resource in the CCAFS Industrial Area Historic District.
    [Show full text]
  • Identifying Open Research Problems in Cryptography by Surveying Cryptographic Functions and Operations 1
    International Journal of Grid and Distributed Computing Vol. 10, No. 11 (2017), pp.79-98 http://dx.doi.org/10.14257/ijgdc.2017.10.11.08 Identifying Open Research Problems in Cryptography by Surveying Cryptographic Functions and Operations 1 Rahul Saha1, G. Geetha2, Gulshan Kumar3 and Hye-Jim Kim4 1,3School of Computer Science and Engineering, Lovely Professional University, Punjab, India 2Division of Research and Development, Lovely Professional University, Punjab, India 4Business Administration Research Institute, Sungshin W. University, 2 Bomun-ro 34da gil, Seongbuk-gu, Seoul, Republic of Korea Abstract Cryptography has always been a core component of security domain. Different security services such as confidentiality, integrity, availability, authentication, non-repudiation and access control, are provided by a number of cryptographic algorithms including block ciphers, stream ciphers and hash functions. Though the algorithms are public and cryptographic strength depends on the usage of the keys, the ciphertext analysis using different functions and operations used in the algorithms can lead to the path of revealing a key completely or partially. It is hard to find any survey till date which identifies different operations and functions used in cryptography. In this paper, we have categorized our survey of cryptographic functions and operations in the algorithms in three categories: block ciphers, stream ciphers and cryptanalysis attacks which are executable in different parts of the algorithms. This survey will help the budding researchers in the society of crypto for identifying different operations and functions in cryptographic algorithms. Keywords: cryptography; block; stream; cipher; plaintext; ciphertext; functions; research problems 1. Introduction Cryptography [1] in the previous time was analogous to encryption where the main task was to convert the readable message to an unreadable format.
    [Show full text]
  • Thesis, the Songs of 10 Rappers Were Analyzed
    ABSTRACT Get Rich or Die Tryin’: A Semiotic Approach to the Construct of Wealth in Rap Music Kristine Ann Davis, M.A. Mentor: Sara J. Stone, Ph.D. For the past 30 years, rap music has made its way into the mainstream of America, taking an increasingly prominent place in popular culture, particularly for youth, its main consumers. This thesis looks at wealth through the lens of semiotics, an important component of critical/cultural theory, using a hermeneutical analysis of 11 rap songs, spanning the last decade of rap music to find signification and representation of wealth in the rap song lyrics. The research finds three important themes of wealth - relationship between wealth and the opposite sex, wealth that garners respect from other people, and wealth as a signifier for “living the good life” - and five signifiers of wealth – money, cars, attire, liquor, and bling. Get Rich or Die Tryin': A Semiotic Approach to the Construct of Wealth in Rap Music by Kristine Ann Davis, B.A. A Thesis Approved by the Department of Journalism ___________________________________ Clark Baker, Ph.D., Chairperson Submitted to the Graduate Faculty of Baylor University in Partial Fulfillment of the Requirements for the Degree of Master of Arts Approved by the Thesis Committee ___________________________________ Sara J. Stone, Ph.D., Chairperson ___________________________________ Mia Moody-Ramirez, Ph.D. ___________________________________ Tony L.Talbert, Ed.D. Accepted by the Graduate School August 2011 ___________________________________ J. Larry Lyon, Ph.D., Dean Page bearing signatures is kept on file in the Graduate School. Copyright ! 2011 by Kristine Ann Davis All rights reserved! CONTENTS ACKNOWLEDGMENTS v Chapter 1.
    [Show full text]
  • Multiplicative Differentials
    Multiplicative Differentials Nikita Borisov, Monica Chew, Rob Johnson, and David Wagner University of California at Berkeley Abstract. We present a new type of differential that is particularly suited to an- alyzing ciphers that use modular multiplication as a primitive operation. These differentials are partially inspired by the differential used to break Nimbus, and we generalize that result. We use these differentials to break the MultiSwap ci- pher that is part of the Microsoft Digital Rights Management subsystem, to derive a complementation property in the xmx cipher using the recommended modulus, and to mount a weak key attack on the xmx cipher for many other moduli. We also present weak key attacks on several variants of IDEA. We conclude that cipher designers may have placed too much faith in multiplication as a mixing operator, and that it should be combined with at least two other incompatible group opera- ¡ tions. 1 Introduction Modular multiplication is a popular primitive for ciphers targeted at software because many CPUs have built-in multiply instructions. In memory-constrained environments, multiplication is an attractive alternative to S-boxes, which are often implemented us- ing large tables. Multiplication has also been quite successful at foiling traditional dif- ¢ ¥ ¦ § ferential cryptanalysis, which considers pairs of messages of the form £ ¤ £ or ¢ ¨ ¦ § £ ¤ £ . These differentials behave well in ciphers that use xors, additions, or bit permutations, but they fall apart in the face of modular multiplication. Thus, we con- ¢ sider differential pairs of the form £ ¤ © £ § , which clearly commute with multiplication. The task of the cryptanalyst applying multiplicative differentials is to find values for © that allow the differential to pass through the other operations in a cipher.
    [Show full text]
  • Applications of Search Techniques to Cryptanalysis and the Construction of Cipher Components. James David Mclaughlin Submitted F
    Applications of search techniques to cryptanalysis and the construction of cipher components. James David McLaughlin Submitted for the degree of Doctor of Philosophy (PhD) University of York Department of Computer Science September 2012 2 Abstract In this dissertation, we investigate the ways in which search techniques, and in particular metaheuristic search techniques, can be used in cryptology. We address the design of simple cryptographic components (Boolean functions), before moving on to more complex entities (S-boxes). The emphasis then shifts from the construction of cryptographic arte- facts to the related area of cryptanalysis, in which we first derive non-linear approximations to S-boxes more powerful than the existing linear approximations, and then exploit these in cryptanalytic attacks against the ciphers DES and Serpent. Contents 1 Introduction. 11 1.1 The Structure of this Thesis . 12 2 A brief history of cryptography and cryptanalysis. 14 3 Literature review 20 3.1 Information on various types of block cipher, and a brief description of the Data Encryption Standard. 20 3.1.1 Feistel ciphers . 21 3.1.2 Other types of block cipher . 23 3.1.3 Confusion and diffusion . 24 3.2 Linear cryptanalysis. 26 3.2.1 The attack. 27 3.3 Differential cryptanalysis. 35 3.3.1 The attack. 39 3.3.2 Variants of the differential cryptanalytic attack . 44 3.4 Stream ciphers based on linear feedback shift registers . 48 3.5 A brief introduction to metaheuristics . 52 3.5.1 Hill-climbing . 55 3.5.2 Simulated annealing . 57 3.5.3 Memetic algorithms . 58 3.5.4 Ant algorithms .
    [Show full text]