National Neutron Cross Section Center

Total Page:16

File Type:pdf, Size:1020Kb

National Neutron Cross Section Center BNL17541 (ENDF-201) ENDF-201 ENDF/B SUMMARY DOCUMENTATION Assembled by 0. OZER & D. GARBER May 1973 NATIONAL NEUTRON CROSS SECTION CENTER BROOKHAVEN NATIONAL LABORATORY ASSOCIATED UNIVERSITIES, INC UNDER CONTRACT NO. AT(30-1)-16 WITH THE UNITED STATES ATOMIC ENERGY COMMISSION Research supported by the United States Atomic Energy Commission. NOTICE This report was prepared as an account of work sponsored by the United States Government. Neither the United States nor the United States Atomic Energy Com- mission, nor any of their employees, nor any of their contractors, subcontractors, or their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness or usefulness of any information, apparatus, product or process disclosed, or represents that its use would not infringe privately owned rights. Printed in the United States of America May 1973 600 copies INTRODUCTION The purpose of this publication is to provide a localized source of descriptions for the evaluations contained in the ENDF/B Library. The summary documentation presented in this volume is intended to be a more detailed description than the (File 1) comments contained in the computer readable data files, but not as detailed as the formal reports describing each ENDF/B evaluation. (A list of the published formal reports is given in the table of contents.) The summary documentations were written by the CSEWG (Cross Section Evaluation Working Group) evaluators and compiled by NNCSC (National Neutron Cross Section Center). When assembling the information for this volume, a minimum amount of editing was unavoidable. This editing primarily consisted of removing computer file listings and irreproducible graphs, since these can be easily obtained from the ENDF files with the use of standard editing or plotting programs. In a few instances, sections of the formal document were reproduced. Materials for which no summary documentation has been received to date, are represented by the (File 1) comments contained in the data file only. The loose leaf"independent section format was selected for ease of updating when more documentation and/or evaluations become available. It is hoped that In the future a more standardized documentation will make the updating simplified. The publication is presented in sections, each section describing one (or more) ENDF evaluations. These sections are identified and ordered by element number (Z) and atomic weight (A). Sections describing more than one ENDF material are identified by the Z-A numbers of the lowest material described. The section number corresponding to a particular data set should be determined using the table of contents. (e.g., sLi(HAT-1115) is described in Section 3-6, whereas 1S3Cs(MAT-1141) is described in Section 47-107, which also includes 107Ag and 10SAg.) The ENDF/B-III Library contains 230 materials. (A material may consist of an isotope, element, molecule, or standard mixture of elements.) Ten of these materials contain thermal scattering law data only. Eighty- seven materials consist of photon interaction cross sections for elements. The summary documentations presented in this volume describe the principal part of the library consisting of the remaining 133 materials with neutron cross sections specified for all relevant reactions. The documentation for a number of "lumped" fission product materials is given following the section of the corresponding fissionable material. For additional information concerning the evaluated files as well as the corresponding experimental data, contact: National Neutron Cross Section Center Broofchaven National Laboratory Upton, New York 11973 iii LIST OF AUTHORS AND REFERENCES Z-EL-A MAT LABORATORY REFERENCE DATE AUTHORS (NOTES) 1-H-1 1148 LASL LA-4574 (1971) OCT70 L.STEUART.ET.AU STANDARD H-1 N.P) 1-H-2 1120 BNU.BNL BNU (PRI.COm. 1967) JUN67 LEONARD.STEUART( MOD.BY BNL) 2-HE -.088 AM. ANL- 7462( OCT. 1968) JUN68 E.li.PENNINGTON (NATURAL ELEMENT) 2-HE-3 1146 LASL LASLt PRI. COm. 1971) 1968 L.STEWART (STANDARD HE-3 N.P) 3-LI-6 1115 LASL AURE 0-6C/64( IN PART) AUC71 BATTAT.LABAUVE( STANDARD LI-6 N.A) 3-LI-7 1116 LASL AWRE 0-61/64(IN PART) MAR71 BATTAT.LABAUVE( MOD. DFN-21SA) 4- BE- 9 1154 LLL UCRL-74533 (DEC 72) DEC71 R.J.HOUERTON. S.T.PERKINS S-S-10 1155 LASL.ORNL ORNL-TM-1872( OCT 67) JAN72 D. IRVING.R.LABAUVE( STANDARD B-10) S-B-11 1160 GE.BNL 0FN-49A SEP71 C.COUAN (AURE DATA MOD 1971) 6-C-12 1165 KAPL KAPL-3099C JUN 66) JAN72 C.LUBITZ ET.AL.( STANDARD TOTAL) 7-N-14 1133 LASL LA-4725 (SEP 72) JAN71 P.G.YOUNG.D.G.FOSTER.JR 8-0-16 1134 LASL LA-4780 (AUG 72) AUG71 P.O.YOUNG.D.G.FOSTER.JR 1I-NA-23 1156 WARO.ORNL UARD-4181-2 (FEB 71 1971 PAIIC.PITTERLE(UARD) PEREY(ORNL) 12-MG 1814 ANL ANL-73871 MAR 68) SEP66 E.M.PENNINGTON.J.C.GAJNIAK 13-AL-27 1135 LASL LA-4726 (DEC 72) APR71 D.G.FOSTER.JR..P.O.YOUNG 14- SI 1151 BNL.GGA GA-8628 (MAY 68) AUG71 M.K.DRAKE (MOO.BY R.KINSEY AUG71) 17-CL 1149 GGA GA-7829 VOL 4 (67) FEB67 M.S.ALLEN.M.K.DRAKE 19-(C 1150 GGA GA-7829 VOL 5 (67) FEB67 M.K.DRAKE 20-CA 1152 ORNL.GGA GA-7829 VOL 6 (67) 0CT71 F.PEREY(ORNL) M.K.DRAKE(GGA) 22-TI 1144 ANL TO BE PUBL. MAR71 A.B.SMITH 23-V 1017 ANL ANL-7387 (MAR.68) SEP66 E.M.PENNINGTON.J.C.GAJNIAK 24-CR 1121 UNES.BNL UCAP- 7281 (1969) JUL70 AZZIZ.CORNYN(UNES) DRAKE(BNL) 25-MN-SS 1019 BNL BNL-50060 ( JUN.67) JUN67 STEPHENSON.PRINCE.PEARLSTEIN 26- FE 1180 ORNL ORNL-4617 (1970) JAN72 PENNY.KINNEY.ET.AL.(DATA MOO.72) 27- CO- 59 1118 BNL TO BE PUBL. 1971 T.E.STEPHENSON. A.PRINCE 28-NI 1123 UNES.BNL UCAP-7387 (1969) JUM71 AZZIZ.CORNYN(UNES) DRAKE(BNL> 29-CU 1087 AI AI-AEC-1274KDEC.68) SEP68 J.M.OTTER ET.AL.(»UKNDL EVAL) 29-CU-63 1065 AI AI-AEC-12741 (DEC. 68) SEP68 J.M.OTTER ET.AL.UUKNOL EVAL) 29-CU-65 1086 AI AI-AEC-1274UDEC.68) SEP68 J.M.OTTER ET.AL.(4UKNDL EVAL) 36-KR-83 1201 B.U.UADCO HEDL-TME 71-106(1971) JUL71 SCHENTER.SCHMITTROTH.LIVOLSI 40-ZR-95 1202 B*U.UADCO HEOL-THE 71-ieet 1971) JUL71 SCHENTER.SCHMITTROTH.LIVOLSI 41-NB-93 1164 GGA GA-8133«A00 (67) JAN67 ALLEN.DRAKE.MATHEUS (MOO SEP 71) 41-NB-95 1203 BvU.UAOCO HEDL-TfE 71-106(1971) JUL71 SCHENTER.SCHMITTR07H.LIV0LSI 42-MO 1111 ANL ANL-7387 (1968) 0CT66 E.PENNINGTON (MOD. OCT 69) 42-MO-95 1204 B*U.UAOCO SCHENTER. SCHMTTROW. L IVOLSI HEDL-TME 71-106(1971) JUL71 SCHENTER.SCHMITTROTH.LIVOLSI 42-MO-97 HttlL-TME 71-106(1971) JUL71 42-M0-98 1205 B.U.UADCO SCHENTER.SCHMnTROTH.LlVOLSI 42-MO-99 1206 B»U,UAOCO HEOL-TME 71-106(1971) JUL71 SCHENTER.SCHMITTROTH.LIVOLSI 42-MO-10© 1207 8»U.UADC0 HEDL-TME 71-106(1971) JUL71 SCHENTER.SCK1ITTROTH.LIV0LS2 43-TC-99 1208 B*U.UADCO HEDL- TME 71 -106( 1971) JUL71 Z.LIVOLSI 44-RU-101 1137 B*U BAU-1367 0CT71 44-RU-102 121© B»U.UADCO HEOL-TME 71-106(1971) JU.71 SCHENTER.SCHMITTROTH.LIVOLSI 44-RU-103 1211 B.U.UADCC HEDL.-TME 71-106(1971) JU.71 SCHENTER.SCHMITTROTH.LIVOLSI 44-RU-104 1212 B*ti.WADCO HEDL-TME 71-106(1971) IUL71 SCHENTC.«.SCHMmR0TH.LlV0LS3 44-RU-105 1213 B«U.UAOCO HEOL-TME 71-106(1971) JUL71 SCHENTtW.SCHMITTROTH.LIVOLSI 44-RU-106 1214 B»U.UADCO HEDL-TME 71-106(1971) JUL71 SCHENTER.SCHMITTROTH.LIVOLSI 45-RH-1O3 1215 B*U.UADCO »€OL-TME 71-106(1971) JUL71 SCHENTER.SCHMmROTH.LlVOLSI 45-RH-10S 1125 B.U 8AU-1367 0CT71 Z.LIV0LS1 46-PD-105 1217 B*U.UADCO HEDL- TME 71 -106( 1971) JU.71 SCHENTER.SCHMITTROTH.LIVOLSI 46-PD-106 1218 BtU.UADCO HEOL-TME 71-1064 1971) JU.71 SCHENTER.SCHMITTROTH.LIVOLSI 46-PD-107 1219 B.U.UAOC0 HEDL-TME 71-106(1971) JUL71 SCHENTER.SCHMITTROTH.LIVOLSI 46-PD-109 1220 B«U.UAOCO HEDL-TME 71-106(1971) JUL71 SCHENTER.SCHMJTTROTH.LIVOLSI 47- AC-107 1221 S*U.HADCO HEDL- TME 71 -106( 1971) JU.71 SCHENTER.SCHTinTROTH.Llva.SI 47-AG-109 1138 8NL TO BE PUBL. 0CT71 M.R.BHAT AND A.PRINCE 48-CD-113 1139 BNL TO BE P»JBL. 0C771 M.R.BHAT AND A.PRINCE S3-1-131 1223 B»U.UADCO HEOL-TME 71-106(1971) JU.71 SCHENTER.SCHMITTROTH.LIVOLSI 53-1-135 1224 8+U.UADCO HEDL-TME VI-106( 1971) JU.71 SCHENTER.SCHMITTROTH.LIVOLSI S4-XE-131 1225 B*U.UADCO HEOL-Tt€ 71-106(1971) JU.71 SCHENTER. SCHniTTROTH.LIV0t.SI S4-XE-133 1226 B*U.HADCO HEOL- TME 71 -106( 1971) JU.71 SCHENTER.SCHMITTROTH.LIVOLSI 54-XE-13S 1227 B*U.UADCO HEDL-TME 71-106(1971) JU.71 SCHENTER.SCHMITTROTH.LIVOLSI 55-CS-133 1026 BNU PRI.COflM.1967 JUN67 B.R.LEONARD.K.8.STEUART S5-CS-135 1141 BNL TO BE PUBL. 0CT71 M.R.BHAT AND A.PRINCE S5-CS-137 1229 BtU.UADCO HEDL-TME 71-106(1971) JU.71 SCHENTER.SCHMTTROTH.LJVOLSI 57-LA-139 1230 B«U.UAOCO HEDL-TME 71-106(1971) JU.71 SCHENTER.SCHniTTROTH.HVOLSI 'S8-CE-141 1231 B*U BAW-409 (NOV 71) JX71 LIVOLSI 1232 8*U BAU-409 (NOV 71) JU.71 LIVOLSI 59-PR-141 1233 B*U LIVOLSI BAU-409 (NOV 71) JU.71 LIVOLSI 59-PR-143 1234 B*W BAU-409 (NOV 71) JU.71 iv LIST OF AUTHORS AND REFERENCES 2-EL-A MAT LABORATORY REFERENCE DATE AUTHORS (NOTES) 66-NO-143 1235 B*U BAUI-409 (NOV 71) JUL71 LIVOLSI 60-ND-I45 1236 B*U BAW-409 (NOV 71) JUL71 LIVOLSI 60-ND-147 1237 B*U BAU-409 (NOV 71) JUL71 LIVOLSI 61-PM-147 1238 B*U BAH-409 (NOV 71) JUL71 LIVOLSI 61-PM-148G 1239 B+U BAU-409 (NOV 71) JUL71 LIVOLSI (GROUND STATE) 61-PM-148M 1254 B«U BAU-409 (NOV 71) JUL71 LIVOLSI (META- STABLE STATE) 61-PM-149 1240 B*UI BAU-409 (NOV 71) JUL71 LIVOLSI 61-PT1-151 1241 B«UI BAU-409 (NOV 71) JUL71 LIVOLSI 62-ST1-147 1242 B*U BAU-409 (NOV 71) JUL71 LIVOLSI 62-SM-148 1243 B«U BAU-409 (NOV 71) JUL71 LIVOLSI 62-SM-149 1027 BNU PRI.COm.
Recommended publications
  • Kalyna Country Tourism Development Strategy
    KALYNA COUNTRY TOURISM DEVELOPMENT STRATEGY Table of Contents EXECUTIVE SUMMARY ..............................................................................................................5 INTRODUCTION ........................................................................................................................10 Background..........................................................................................................................10 Project Objectives................................................................................................................11 Process Overview................................................................................................................11 SITUATION ASSESSMENT: Where are we now? ....................................................................16 Study Area...............................................................................................................................17 Themes ...................................................................................................................................18 Lures and Clusters: Kalyna’s Tourism Resource ....................................................................19 Key Attractions and Clusters ...............................................................................................19 Market Analysis .......................................................................................................................27 Trends in Alberta Tourism ...................................................................................................27
    [Show full text]
  • The Sword, November 2020
    NOVEMBER 2020 VOLUME 59 | ISSUE 3 2 Marginalized Students at Concordia Share Grievances: Recent Sit-In BY MARYKATE FENSTERMAKER 6 Milestone in Catholic History with First African American Cardinal BY ERIKA SOUKUP 8 How to Enjoy Thanksgiving Without Killing Grandma BY RYAN SKILLE 11 CSP Baseball Team Sends Uniforms to Nicaragua BY DAVINA BELLINGER 20 Criminal Justice & Sociology Club holds Open Conversation BY REBECCA BEASLEY Photo Credit: Rene Elias *THIS IS NOT AN OFFICIAL CSP PUBLICATION AND DOES NOT NECESSARILY REFLECT THE VIEWS OF THE ADMINISTRATION, FACULTY, OR STAFF. SPECIAL THANKS TO THE CONTRIBUTING SPONSORS. 1 THE SWORD NEWSPAPER NOVEMBER 2020 VOLUME 59 | ISSUE 3 NEWS CONCORDIA ST. PAUL’S OFFICIAL STUDENT NEWSPAPER SINCE 1966 EDITOR IN CHIEF Anna Fritze Letter from the Editor Marginalized Students at Concordia ART DIRECTOR BY ANNA FRITZE Share Grievances: Recent Sit-In Carli Bruckmueller alloween has come and gone, the u.s. NEWS EDITOR is in its second wave of the coronavirus, and our Organized by Black Students Harry Lien H nation will have a new president in January. What a roller coaster this month has been. So, it’s pretty Challenges Administration SPORTS EDITOR much been like every other month since March! Crazy Jaid Perry BY MARYKATE FENSTERMAKER what America can throw at you. ARTS & VARIETY EDITOR Before I released last month’s issue, I was most expectant group of around 30 students staged a sit-on in the Tunnel on Friday Oct. Davina Bellinger of receiving negative feedback due to the majority of the 30th to express their dissatisfaction with Concordia’s response to Black students paper taking the liberal side of the election.
    [Show full text]
  • International Journal of Computer Engineering and Applications, Volume XII, Special Issue, May 18, ISSN 2321-3469
    International Journal of Computer Engineering and Applications, Volume XII, Special Issue, May 18, www.ijcea.com ISSN 2321-3469 PROVIDING RESTRICTIONS AGAINST ATTACK AND CONGESTION CONTROL IN PUBLICINFRASTRUCTURE CLOUD Nousheen R1, Shanmugapriya M2, Sujatha P3,Dhinakaran D4 Student, Computer Science and Engineering, Peri Institute of Technology, Chennai, India 1,2,3 Assistant professor, Computer Science and Engineering, Peri Institute of Technology, Chennai, India 4 ABSTRACT: Cloud computing is current trend in market .It reduce the cost and complexity of service providers by the means of capital and operational cost.It allows users to access application remotely. This construct directs cloud service provider to handle cost of servers, software updates,etc. If the session tokens are not properly protected, an attacker can hijack an active session and assume the identity of a user. To focusing on session hijacking and broken authenticationOTP is generated it will send user mail.Once the user is authenticatedthey will be split into virtual machine it is initiate to the upload process into the cloud.Thecloud user files are uploaded and stored in domain based .Also in our proposed system encryption keys are maintained outside of the IaaS domain.For encryption, we proposed RSA algorithm .For data owner file encryption, we use camellia algorithm. Finally the files are stored in the public cloud named CloudMe. Keywords: Cloud computing, session hijacking, OTP, Virtual machine, Iaas, CloudMe [1] INTRODUCTION Cloud computing is an information technology(IT) standard that enables universal access to share group of configurable system resource and higher-level services that can be quickly provisioned with minimal management effort, often over the internet.
    [Show full text]
  • Ethical Hacking
    Official Certified Ethical Hacker Review Guide Steven DeFino Intense School, Senior Security Instructor and Consultant Contributing Authors Barry Kaufman, Director of Intense School Nick Valenteen, Intense School, Senior Security Instructor Larry Greenblatt, Intense School, Senior Security Instructor Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Official Certified Ethical Hacker © 2010 Course Technology, Cengage Learning Review Guide ALL RIGHTS RESERVED. No part of this work covered by the copyright herein Steven DeFino may be reproduced, transmitted, stored or used in any form or by any means Barry Kaufman graphic, electronic, or mechanical, including but not limited to photocopying, Nick Valenteen recording, scanning, digitizing, taping, Web distribution, information networks, Larry Greenblatt or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior Vice President, Career and written permission of the publisher. Professional Editorial: Dave Garza Executive Editor: Stephen Helba For product information and technology assistance, contact us at Managing Editor: Marah Bellegarde Cengage Learning Customer & Sales Support, 1-800-354-9706 For permission to use material from this text or product, Senior Product Manager: submit all requests online at www.cengage.com/permissions Michelle Ruelos Cannistraci Further permissions questions can be e-mailed to Editorial Assistant: Meghan Orvis [email protected]
    [Show full text]
  • The Kalyna Block Cipher
    A New Encryption Standard of Ukraine: The Kalyna Block Cipher Roman Oliynykov1, Ivan Gorbenko1, Oleksandr Kazymyrov4, Victor Ruzhentsev4, Oleksandr Kuznetsov3, Yurii Gorbenko1, Oleksandr Dyrda2, Viktor Dolgov3, Andrii Pushkaryov2, Ruslan Mordvinov4, Dmytro Kaidalov4 1 JSC Institute of Information Technologies, 2 State Service of Special Communication and Information Protection of Ukraine, 3 V.N.Karazin Kharkiv National University 4 Kharkiv National University of Radio Electronics Ukraine [email protected], [email protected], [email protected] Abstract. The Kalyna block cipher was selected during Ukrainian Na- tional Public Cryptographic Competition (2007-2010) and its slight mod- ification was approved as the new encryption standard of Ukraine in 2015. Main requirements for Kalyna were both high security level and high per- formance of software implementation on general-purpose 64-bit CPUs. The cipher has SPN-based (Rijndael-like) structure with increased MDS matrix size, a new set of four different S-boxes, pre- and postwhitening using modulo 264 addition and a new construction of the key schedule. Kalyna supports block size and key length of 128, 256 and 512 bits (key length can be either equal or double of the block size). On the time of this paper publishing, no more effective cryptanalytic attacks than ex- haustive search are known. In this paper we present the adapted English translated specification of Kalyna as it is given in the national standard of Ukraine. 1 Introducton Block ciphers are the most widely used symmetric cryptographic primitives. Besides providing confidentiality, they are also used as main components in hashing functions, message authentication codes, pseudorandom number generators, etc.
    [Show full text]
  • Cryptographic Analysis of Rijndael-Like Cipher
    Scientific and Practical Cyber Security Journal (SPCSJ) 2(3): 42-46 ISSN 2587-4667 Scientific Cyber Security Association (SCSA) CRYPTOGRAPHIC ANALYSIS OF RIJNDAEL-LIKE CIPHER Kovalov S., Maslova N., Psel V. Donetsk National Technical University, Pokrovsk, Ukraine ABSTRACT. The algorithm of linear-algebraic cryptanalysis of Rijndael-like cipher is proposed. The approach connected with the allocation of round differentials is considered. The description and justification of the algorithm are fulfilled, the requirements are formulated, the general model is described. The parameters for increasing the speed algorithm are specified. KEYWORDS: Linear Cryptanalysis; Algebraic Cryptanalysis; Differentials; Cipher; Algorithm INTRODUCTON The task of analyzing the reliability of cryptographic algorithms is one of the topical problems of information security. In connection with continuously improving technologies, this issue is under the constant supervision of specialists. In 2015 Ukraine introduced a new national cryptographic standard for the block symmetric conversion of DSTU 7624: 2014 [1]. The standard defines the structure of the Kalyna cipher and the modes of its operation and supports the block size and the length of the encryption key 128, 256 and 512 bits. The model has a Square-like SPN-structure. Analogues of this structure are used in algorithms AES / Rijndael, Whirlpool, Stribog, Kuznyechik “Grasshopper” block cipher and a number of others. In addition to the block cipher, DSTU 7624: 2014 defines the modes of operation corresponding to ISO 10116: 2006, includes additional features that are oriented to modern cryptographic protection systems, provides for the possibility of effective implementation on most modern software or hardware and software platforms. At the heart of the standard is a cyclic transformation, built on the basis of tables of substitution (S-blocks) and multiplication by an MDS-matrix over a finite field.
    [Show full text]
  • Durham Research Online
    Durham Research Online Deposited in DRO: 08 November 2018 Version of attached le: Published Version Peer-review status of attached le: Peer-reviewed Citation for published item: Calixto, Cristiane P.G. and Guo, Wenbin and James, Allan B. and Tzioutziou, Nikoleta A. and Entizne, Juan Carlos and Panter, Paige E. and Knight, Heather and Nimmo, Hugh G. and Zhang, Runxuan and Brown, John W.S. (2018) 'Rapid and dynamic alternative splicing impacts the Arabidopsis cold response transcriptome.', Plant cell., 30 . pp. 1424-1444. Further information on publisher's website: https://doi.org/10.1105/tpc.18.00177 Publisher's copyright statement: Article available via a Creative Commons CC-BY 4.0 license. Additional information: Use policy The full-text may be used and/or reproduced, and given to third parties in any format or medium, without prior permission or charge, for personal research or study, educational, or not-for-prot purposes provided that: • a full bibliographic reference is made to the original source • a link is made to the metadata record in DRO • the full-text is not changed in any way The full-text must not be sold in any format or medium without the formal permission of the copyright holders. Please consult the full DRO policy for further details. Durham University Library, Stockton Road, Durham DH1 3LY, United Kingdom Tel : +44 (0)191 334 3042 | Fax : +44 (0)191 334 2971 https://dro.dur.ac.uk CM The Plant Cell, Vol. 30: 1424–1444, July 2018, www.plantcell.org © 2018 The author(s). LARGE-SCALE BIOLOGY ARTICLE Rapid and Dynamic Alternative Splicing Impacts the Arabidopsis Cold Response Transcriptome[CC-BY] Cristiane P.G.
    [Show full text]
  • High-Speed and Secure Hash Function for Blockchain Security Mechanisms
    Scientific and Practical Cyber Security Journal (SPCSJ) 4(1): 65 – 70 ISSN 2587-4667 Scientific Cyber Security Association (SCSA) HIGH-SPEED AND SECURE HASH FUNCTION FOR BLOCKCHAIN SECURITY MECHANISMS Anatoliy Hrytsak1, Vasyl Kinzeryavyy2, Dmytro Prysiazhnyi1, Yuliia Burmak3, Yevhen Samoylik2 1Vinnytsia National Technical University, Vinnytsia, Ukraine 2National Aviation University, Kyiv, Ukraine 2Kyiv College of Communication, Kyiv, Ukraine ABSTRACT: Information communication technologies development and the emergence of new attack types leads to increasing the amount of existing hash functions vulnerabilities and other disadvantages. In every blockchain security mechanisms each block contains a cryptographic hash of the previous block, a timestamp, and transaction data. New hash function development is very actual and value research task. Thus, in this paper a new hash function was proposed, which was based on well-known hash function. Improvements involved a number of changes: increased the size of words and an increase in the message digest; at the pre-processing stage, the incoming message is supplemented by a pseudo-random sequence; the numbers of nonlinear functions are increased. The proposed changes allow reducing the number of rounds in the compression function, which will guarantee at least similar security indicators with simultaneous increase in data processing speed. KEYWORDS: Information Communication Technologies, Cybersecurity, Blockchain Security, High-Speed, Hash Function, Data Processing, Confidentiality and Integrity. I. Introduction Every year the level of information security is increasing in organizations of different forms ownership. First of all, this is due to an increase in the flow of information that is provided in real time with the help of Internet resources. Through the web-portals of the organization highlight results of its activities, provide online services and financial services, conduct financial transactions and etc.
    [Show full text]
  • Boomerang Uniformity of Popular S-Box Constructions
    Boomerang Uniformity of Popular S-box Constructions Shizhu Tian1;3;4, Christina Boura1;2, and Leo´ Perrin1 1 Inria, Paris, France. [email protected] 2 Universite´ de Versailles, Versailles, France [email protected] 3 State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China 4 School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China [email protected] Abstract. In order to study the resistance of a block cipher against boomerang attacks, a tool called the Boomerang Connectivity Table (BCT) for S-boxes was recently introduced. Very little is known today about the properties of this table especially for bijective S-boxes defined for n variables with n 0 mod 4. In this work we study the boomerang uniformity of some popular constructions used≡ for building large S-boxes, e.g. for 8 variables, from smaller ones. We show that the BCTs of all the studied constructions have abnormally high values in some positions. This remark permits us in some cases to link the boomerang properties of an S-box with other well-known cryptanalytic techniques on such constructions while in other cases it leads to the discovery of new ones. A surprising outcome concerns notably the Feistel and MISTY networks. While these two structures are very similar, their boomerang uniformity can be very different. In a second time, we investigate the boomerang uniformity under EA-equivalence for Gold and the inverse function (as used respectively in MPC-friendly ciphers and the AES) and we prove that the boomerang uniformity is EA-invariant in these cases.
    [Show full text]
  • Efficient Large-State Tweakable Block Ciphers from the AES Round Function
    Pholkos – Efficient Large-state Tweakable Block Ciphers from the AES Round Function Jannis Bossert, Eik List, Stefan Lucks and Sebastian Schmitz Bauhaus-Universität Weimar, Weimar Germany <firstname>.<lastname>(at)uni-weimar.de Abstract. With the dawn of quantum computers, higher security than 128 bits has become desirable for primitives and modes. During the past decade, highly secure hash functions, MACs, and encryption schemes have been built primarily on top of keyless permutations, which simplified their analyses and implementation due to the absence of a key schedule. However, the security of these modes is most often limited to the birthday bound of the state size, and their analysis may require a different security model than the easier-to-handle secret-permutation setting. Yet, larger state and key sizes are desirable not only for permutations but also for other primitives such as block ciphers. Using the additional public input of tweakable block ciphers for domain separation allows for exceptionally high security or performance as recently proposed modes have shown. Therefore, it appears natural to ask for such designs. While security is fundamental for cryptographic primitives, performance is of similar relevance. Since 2009, processor-integrated instructions have allowed high throughput for the AES round function, which already motivated various constructions based on it. Moreover, the four-fold vectorization of the AES instruction sets in Intel’s Ice Lake architecture is yet another leap in terms of performance and gives rise to exploit the AES round function for even more efficient designs. This work tries to combine all aspects above into a primitive and to build upon years of existing analysis on its components.
    [Show full text]
  • Seed Dormancy in Arabidopsis Requires Self-Binding Ability Of
    RESEARCH ARTICLE Seed Dormancy in Arabidopsis Requires Self- Binding Ability of DOG1 Protein and the Presence of Multiple Isoforms Generated by Alternative Splicing Kazumi Nakabayashi¤a☯, Melanie Bartsch¤b☯, Jia Ding, Wim J. J. Soppe* Department of Plant Breeding and Genetics, Max Planck Institute for Plant Breeding Research, Cologne, Germany a11111 ☯ These authors contributed equally to this work. ¤a Current address: School of Biological Sciences, Royal Holloway University of London, Egham, Surrey, United Kingdom ¤b Current address: Institute of Horticultural Production Systems, Section Woody Plant and Propagation Physiology, Leibniz Universität Hannover, Germany * [email protected] OPEN ACCESS Abstract Citation: Nakabayashi K, Bartsch M, Ding J, Soppe WJJ (2015) Seed Dormancy in Arabidopsis Requires The Arabidopsis protein DELAY OF GERMINATION 1 (DOG1) is a key regulator of seed Self-Binding Ability of DOG1 Protein and the dormancy, which is a life history trait that determines the timing of seedling emergence. The Presence of Multiple Isoforms Generated by Alternative Splicing. PLoS Genet 11(12): e1005737. amount of DOG1 protein in freshly harvested seeds determines their dormancy level. doi:10.1371/journal.pgen.1005737 DOG1 has been identified as a major dormancy QTL and variation in DOG1 transcript levels Editor: Steven Penfield, University of York, UNITED between accessions contributes to natural variation for seed dormancy. The DOG1 gene is KINGDOM alternatively spliced. Alternative splicing increases the transcriptome and proteome diver- Received: August 21, 2015 sity in higher eukaryotes by producing transcripts that encode for proteins with altered or lost function. It can also generate tissue specific transcripts or affect mRNA stability. Here Accepted: November 23, 2015 we suggest a different role for alternative splicing of the DOG1 gene.
    [Show full text]
  • The Ukrainian Weekly 2001, No.21
    www.ukrweekly.com INSIDE:• Follow-up on Taras Shevchenko Place controversy — page 3. • Latvia’s president on defending our languages — page 8. • Literary awards and celebrations in the news — page 13. Published by the Ukrainian National Association Inc., a fraternal non-profit association Vol. LXIX No. 21 THE UKRAINIAN WEEKLY SUNDAY, MAY 27, 2001 $1/$2 in Ukraine HE KRAINIANKuchma namesEEKLY Anatolii Kinakh MemorialT to slain journalistsU disappears W by Roman Woronowycz of what would have been Mr. as Ukraine’s 10th prime minister Kyiv Press Bureau Gongadze’s 32 birthday and was one of several actions held on May 21 in memo- KYIV – A damaged memorial to ry of the late journalist, including the by Roman Woronowycz Parliament, however, that a good number Heorhii Gongadze and other slain establishment of a small tent city before Kyiv Press Bureau of leftist lawmakers are ready to support his nomination if he offers to adopt a few Ukrainian journalists disappeared on the Verkhovna Rada building by support- KYIV – After extensive consultations May 23, not fully two days after it was ers of the Patriotic Party of Ukraine. planks of their political agendas. with leaders of most all Verkhovna Rada The Verkhovna Rada’s powerful first erected outside the offices of an inde- Few supporters of the Ukraine factions in order to smooth the confirma- pendent news agency in Kyiv. Without Kuchma oppositionist group, vice-chairman, Viktor Medvedchuk – tion process, President Leonid Kuchma whose endorsement is crucial if Mr. The monument had appeared in honor which commissioned the monument, had nominated Anatolii Kinakh to be Ukraine’s believed the four-foot-high black marble Kinakh is to be confirmed by the lawmak- 10th prime minister on May 21.
    [Show full text]