Analysis of Venkaiah Et Al.’S AES Design

Total Page:16

File Type:pdf, Size:1020Kb

Analysis of Venkaiah Et Al.’S AES Design International Journal of Network Security, Vol.9, No.3, PP.285–289, Nov. 2009 285 Analysis of Venkaiah et al.’s AES Design Jorge Nakahara Jr Department of Informatics, Universidade Catolica de Santos, UNISANTOS R. Dr. Carvalho de Mendon¸ca, 144, POBOX 11070-906, S˜ao Paulo, Brazil (Email: jorge [email protected]) (Received Oct. 25, 2006; revised and accepted June 27, 2007) Abstract overview of the impossible-differential technique. Sec- tion 5 concludes the paper. This paper describes impossible differential (ID) attacks on an AES variant designed by Venkaiah et al.. They claim that their cipher has improved resistance to ID at- 2 Venkaiah et al.’s AES Design tacks due to a new MixColumns matrix with a branch number 4, which is smaller than that of the original AES. In [14], Venkaiah et al. suggested a variant of AES with We argue against this statement. The contributions of a new S-box, a modified MixColumns matrix, and a new this paper include ID distinguishers for Venkaiah et al.’s irreducible polynomial for GF(28). They used x8 + x6 + cipher, and a discussion of the susceptibility of such vari- x5 + x + 1 as primitive irreducible polynomial for GF(28), ants to impossible differential and other modern cryptan- in contrast to the AES irreducible (but not primitive) alytic techniques. polynomial x8 + x4 + x3 + x + 1. Their new S-box was Keywords: AES, block cipher cryptanalysis, impossible constructed based on two transformations in this order: differentials ∗ • powers of 3, a primitive element in F257. If the power is 256, the result is treated as 0. 1 Introduction • take multiplicative inverse in GF(28), with 0 mapped to itself. Rijndael is a Substitution Permutation Network (SPN) type block cipher designed by Joan Daemen and Vincent One feature of their new S-box is its algebraic expres- Rijmen for the AES Development Process, initiated by the sion in GF(28) = GF(2)[x] / (x8+ x6 + x5 + x + 1): 0 2 3 4 5 National Institute of Standards and Technology (NIST) S [x]= 01x + 2fx.x + d2x.x + 23x.x + ddx.x + edx.x + 6 7 8 9 10 11 in the USA in 1997 [1, 9]. The 128-bit block version of a8x.x + 98x.x + 49x.x + 03x.x + a4x.x + 39x.x + 12 13 14 15 16 17 Rijndael, with a key of 128, 192 or 256 bits, is officially 78x.x + 8ex.x + 94x.x + f2x.x + 19x.x + 66x.x + 18 19 20 21 22 23 known as the AES [10]. Typically, text blocks, keys and bcx.x + 46x.x + 6fx.x + 74x.x + dbx.x + 70x.x + 24 25 26 27 28 29 subkeys are represented compactly by a 4 × Nb state ma- 75x.x + 43x.x + e3x.x + ebx.x + ebx.x + adx.x + 30 31 32 33 34 35 trix of bytes, where Nb is the number of 32-bit words in 79x.x + 22x.x + fbx.x + edx.x + 28x.x + 62x.x + 36 37 38 39 40 41 a block. For instance, the state matrix for a 4t-byte text f4x.x + 24x.x + 36x.x + 4bx.x + 31x.x + aex.x + 42 43 44 45 46 47 block, A = (a0,a1,a2,a3,a4,...,a4t−1), is denoted bfx.x + 3fx.x + 57x.x + 22x.x + 9fx.x + a4x.x + 48 49 50 51 52 53 b7x.x + 96x.x + 56x.x + 25x.x + 56x.x + 8ex.x + 54 55 56 57 58 59 a0 a4 ... a4t−4 c7x.x + 9cx.x + 26x.x + 57x.x + 05x.x + 82x.x + 60 61 62 63 64 65 a1 a5 ... a4t−3 eax.x + bbx.x + 2bx.x + f6x.x + 13x.x + 96x.x + State = (1) 66 67 68 69 70 71 a2 a6 ... a4t−2 c8x.x + 5ax.x + bax.x + dax.x + 27x.x + 60x.x + 72 73 74 75 76 77 a3 a7 ... a4t−1 c8x.x + 74x.x + b8x.x + d5x.x + f2x.x + c2x.x + 78 79 80 81 82 83 71x.x + a1x.x + c3x.x + 85x.x + b7x.x + 6dx.x + 84 85 86 87 88 89 namely, with bytes inserted columnwise. Note that byte 18x.x + c7x.x + 72x.x + eax.x + 07x.x + acx.x + 90 91 92 93 94 95 positions in a state matrix follows the subscripts of the 18x.x + 13x.x + 85x.x + b7x.x + a4x.x + c2x.x + 96 97 98 99 100 101 bytes in (1). 23x.x +eex.x +e2x.x +59x.x +46x.x +34x.x + 102 103 104 105 106 There are four layers in a full round of Rijndael, in a1x.x + 38x.x + 3cx.x + 0bx.x + 7dx.x + 107 108 109 110 111 order: SubBytes (denoted SB), ShiftRows (SR), Mix- b4x.x + 41x.x + 05x.x + e7x.x + eex.x + 112 113 114 115 116 Columns (MC) and AddRoundKey (AKi, where i is the 5dx.x + 80x.x + b5x.x + 15x.x + d4x.x + 117 118 119 120 121 round number) [10]. 65x.x + 85x.x + 8fx.x + ecx.x + 50x.x + 122 123 124 125 126 This paper is organized as follows: Section 2 describes ccx.x + 2ax.x + 8fx.x + 0cx.x + 85x.x + 127 128 129 130 131 the AES variant by Venkaiah et al.. Section 3 gives a brief 9ex.x + 3fx.x + 02x.x + e9x.x + 6ax.x + International Journal of Network Security, Vol.9, No.3, PP.285–289, Nov. 2009 286 132 133 134 135 136 c4x.x + 1ex.x + 7ax.x + 16x.x + c6x.x + there are 2 × 2 singular submatrices of MC’, such as 137 138 139 140 141 cfx.x + 3dx.x + 1cx.x + 9bx.x + eax.x + fc 142 96 143 64 144 02 145 85 146 01x 01x x.x + x.x + x.x + x.x + x.x + (3) 147 148 149 150 151 01x 01x 55x.x + 9fx.x + 20x.x + 96x.x + acx.x + 152 153 154 155 156 6dx.x + 96x.x + a7x.x + 0ex.x + 4fx.x + 75 157 29 158 a8 159 b5 160 fd 161 Notice that MC’ uses the same coefficients as the original x.x + x.x + x.x + x.x + x.x + MixColumns matrix of the AES, but in a different order. 162 163 164 165 166 66x.x + 6dx.x + 1fx.x + 51x.x + fex.x + The apparent motivation for the choice of MC’ was to 167 168 169 170 171 6dx.x + 98x.x + cbx.x + f2x.x + d6x.x + speed up the decryption procedure, since MC’ is involu- 61 172 4d 173 e6 174 10 175 4d 176 tory (it is its own inverse). But, this discrepancy between x.x + x.x + x.x + x.x + x.x + the performance of AES encryption and decryption pro- 80 177 88 178 a1 179 d8 180 f4 181 x.x + x.x + x.x + x.x + x.x + cedures can be diminished by other means, as pointed out 182 183 184 185 186 20x.x + f1x.x + 17x.x + 49x.x + 09x.x + by Barreto in [2], in which the InvMixColumns matrix is 187 188 189 190 191 f8x.x + 90x.x + cex.x + e6x.x + 2fx.x + split as 192 193 194 195 196 acx.x + 94x.x + 19x.x + b8x.x + 32x.x + 0ex 0bx 0dx 09x 05x 00x 04x 00x 02x 03x 01x 01x 3e 197 b7 198 06 199 93 200 60 201 09x 0ex 0bx 0dx 00x 05x 00x 04x 01x 02x 03x 01x x.x + x.x + x.x + x.x + x.x + . = 202 203 204 205 206 0dx 09x 0ex 0bx 04x 00x 05x 00x 01x 01x 02x 03x 09x.x + 22x.x + eex.x + 85x.x + d1x.x + 0bx 0dx 09x 0ex 00x 04x 00x 05x 03x 01x 01x 02x 5e 207 49 208 d6 209 61 210 47 211 x.x + x.x + x.x + x.x + x.x + (4) 79 212 1d 213 27 214 7a 215 19 216 x.x + x.x + x.x + x.x + x.x + The matrix in the right-hand-side of (4) is the AES ma- 68 217 ed 218 59 219 c4 220 e7 221 x.x + x.x + x.x + x.x + x.x + trix used in encryption mode. The leftmost matrix in (4) 4d 222 7a 223 75 224 a3 225 dd 226 x.x + x.x + x.x + x.x + x.x + is used in decryption mode. According to [2] “InvMix- f0 227 67 228 0e 229 0c 230 da 231 x.x + x.x + x.x + x.x + x.x + Column can be efficiently implemented with the same 53 232 ce 233 3c 234 a6 235 c0 236 x.x + x.x + x.x + x.x + x.x + resources as MixColumn, plus six exclusive-ors and four 70 237 32 238 77 239 56 240 95 241 x.x + x.x + x.x + x.x + x.x + xtime calls”. 20 242 d1 243 8b 244 20 245 a2 246 x.x + x.x + x.x + x.x + x.x + The main drawback of MC’ is that it is not an MDS d9 247 ea 248 a7 249 58 250 49 251 x.x + x.x + x.x + x.x + x.x + matrix like AES’s MixColumn matrix. Venkaiah et al. c9 252 0d 253 29 254 x.x + x.x + x.x , which is much more in- stated in [14] that MC’ “... has branch number 4 and, volved and certainly not as sparse as AES S-box expres- correspondingly, has low diffusion power.
Recommended publications
  • Miss in the Middle
    Miss in the middle By: Gal Leonard Keret Miss in the Middle Attacks on IDEA, Khufu and Khafre • Written by: – Prof. Eli Biham. – Prof. Alex Biryukov. – Prof. Adi Shamir. Introduction • So far we used traditional differential which predict and detect statistical events of highest possible probability. Introduction • A new approach is to search for events with probability one, whose condition cannot be met together (events that never happen). Impossible Differential • Random permutation: 휎 푀0 = 푎푛푦 퐶 표푓 푠푖푧푒 푀0. • Cipher (not perfect): 퐸 푀0 = 푠표푚푒 퐶 표푓 푠푖푧푒 푀0. • Events (푚 ↛ 푐) that never happen distinguish a cipher from a random permutation. Impossible Differential • Impossible events (푚 ↛ 푐) can help performing key elimination. • All the keys that lead to impossibility are obviously wrong. • This way we can filter wrong key guesses and leaving the correct key. Enigma – for example • Some of the attacks on Enigma were based on the observation that letters can not be encrypted to themselves. 퐸푛푖푔푚푎(푀0) ≠ 푀0 In General • (푀0, 퐶1) is a pair. If 푀0 푀0 → 퐶1. • 푀 ↛ 퐶 . 0 0 Some rounds For any key • ∀ 푘푒푦| 퐶1 → 퐶0 ↛ is an impossible key. Cannot lead to 퐶0. Some rounds Find each keys Decrypt 퐶1back to 퐶0. IDEA • International Data Encryption Algorithm. • First described in 1991. • Block cipher. • Symmetric. • Key sizes: 128 bits. • Block sizes: 64 bits. ⊕ - XOR. ⊞ - Addition modulo 216 ⊙ - Multiplication modulo 216+1 Encryption security • Combination of different mathematical groups. • Creation of "incompatibility“: ∗ • 푍216+1 → 푍216 ∗ • 푍216 → 푍216+1 ∗ ∗ Remark: 푍216+1 doesn’t contain 0 like 푍216 , so in 푍216+1 0 will be converted to 216 since 0 ≡ 216(푚표푑 216).
    [Show full text]
  • Miss in the Middle Attacks on IDEA and Khufu
    Miss in the Middle Attacks on IDEA and Khufu Eli Biham? Alex Biryukov?? Adi Shamir??? Abstract. In a recent paper we developed a new cryptanalytic techni- que based on impossible differentials, and used it to attack the Skipjack encryption algorithm reduced from 32 to 31 rounds. In this paper we describe the application of this technique to the block ciphers IDEA and Khufu. In both cases the new attacks cover more rounds than the best currently known attacks. This demonstrates the power of the new cryptanalytic technique, shows that it is applicable to a larger class of cryptosystems, and develops new technical tools for applying it in new situations. 1 Introduction In [5,17] a new cryptanalytic technique based on impossible differentials was proposed, and its application to Skipjack [28] and DEAL [17] was described. In this paper we apply this technique to the IDEA and Khufu cryptosystems. Our new attacks are much more efficient and cover more rounds than the best previously known attacks on these ciphers. The main idea behind these new attacks is a bit counter-intuitive. Unlike tra- ditional differential and linear cryptanalysis which predict and detect statistical events of highest possible probability, our new approach is to search for events that never happen. Such impossible events are then used to distinguish the ci- pher from a random permutation, or to perform key elimination (a candidate key is obviously wrong if it leads to an impossible event). The fact that impossible events can be useful in cryptanalysis is an old idea (for example, some of the attacks on Enigma were based on the observation that letters can not be encrypted to themselves).
    [Show full text]
  • Giza and the Pyramids, Veteran Hosni Mubarak
    An aeroplane flies over the pyramids and Sphinx on the Giza Plateau near Cairo. ARCHAEOLOGY The wonder of the pyramids Andrew Robinson enjoys a volume rounding up research on the complex at Giza, Egypt. n Giza and the Pyramids, veteran Hosni Mubarak. After AERAGRAM 16(2), 8–14; 2015), the tomb’s Egyptologists Mark Lehner and Zahi Mubarak fell from four sides, each a little more than 230 metres Hawass cite an Arab proverb: “Man power during the long, vary by at most just 18.3 centimetres. Ifears time, but time fears the pyramids.” It’s Arab Spring that year, Lehner and Hawass reject the idea that a reminder that the great Egyptian complex Hawass resigned, amid armies of Egyptian slaves constructed the on the Giza Plateau has endured for some controversy. pyramids, as the classical Greek historian four and a half millennia — the last monu- The Giza complex Herodotus suggested. They do, however, ment standing of that classical-era must-see invites speculation embrace the concept that the innovative list, the Seven Wonders of the World. and debate. Its three administrative and social organization Lehner and Hawass have produced an pyramids are the Giza and the demanded by the enormous task of build- astonishingly comprehensive study of the tombs of pharaohs Pyramids ing the complex were key factors in creating excavations and scientific investigations Khufu, Khafre and MARK LEHNER & ZAHI Egyptian civilization. CREATIVE GEOGRAPHIC L. STANFIELD/NATL JAMES that have, over two centuries, uncovered Menkaure, also known HAWASS The authors are also in accord over a the engineering techniques, religious and as Cheops, Chephren Thames & Hudson: theory regarding the purpose of the Giza cultural significance and other aspects of and Mycerinus, 2017.
    [Show full text]
  • Encryption Block Cipher
    10/29/2007 Encryption Encryption Block Cipher Dr.Talal Alkharobi 2 Block Cipher A symmetric key cipher which operates on fixed-length groups of bits, termed blocks, with an unvarying transformation. When encrypting, a block cipher take n-bit block of plaintext as input, and output a corresponding n-bit block of ciphertext. The exact transformation is controlled using a secret key. Decryption is similar: the decryption algorithm takes n-bit block of ciphertext together with the secret key, and yields the original n-bit block of plaintext. Mode of operation is used to encrypt messages longer than the block size. 1 Dr.Talal Alkharobi 10/29/2007 Encryption 3 Encryption 4 Decryption 2 Dr.Talal Alkharobi 10/29/2007 Encryption 5 Block Cipher Consists of two algorithms, encryption, E, and decryption, D. Both require two inputs: n-bits block of data and key of size k bits, The output is an n-bit block. Decryption is the inverse function of encryption: D(E(B,K),K) = B For each key K, E is a permutation over the set of input blocks. n Each key K selects one permutation from the possible set of 2 !. 6 Block Cipher The block size, n, is typically 64 or 128 bits, although some ciphers have a variable block size. 64 bits was the most common length until the mid-1990s, when new designs began to switch to 128-bit. Padding scheme is used to allow plaintexts of arbitrary lengths to be encrypted. Typical key sizes (k) include 40, 56, 64, 80, 128, 192 and 256 bits.
    [Show full text]
  • Foreword by Whitfield Diffie Preface About the Author Chapter 1
    Applied Cryptography: Second Edition - Bruce Schneier Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C by Bruce Schneier Wiley Computer Publishing, John Wiley & Sons, Inc. ISBN: 0471128457 Pub Date: 01/01/96 Foreword By Whitfield Diffie Preface About the Author Chapter 1—Foundations 1.1 Terminology 1.2 Steganography 1.3 Substitution Ciphers and Transposition Ciphers 1.4 Simple XOR 1.5 One-Time Pads 1.6 Computer Algorithms 1.7 Large Numbers Part I—Cryptographic Protocols Chapter 2—Protocol Building Blocks 2.1 Introduction to Protocols 2.2 Communications Using Symmetric Cryptography 2.3 One-Way Functions 2.4 One-Way Hash Functions 2.5 Communications Using Public-Key Cryptography 2.6 Digital Signatures 2.7 Digital Signatures with Encryption 2.8 Random and Pseudo-Random-Sequence Generation Chapter 3—Basic Protocols 3.1 Key Exchange 3.2 Authentication 3.3 Authentication and Key Exchange 3.4 Formal Analysis of Authentication and Key-Exchange Protocols 3.5 Multiple-Key Public-Key Cryptography 3.6 Secret Splitting 3.7 Secret Sharing 3.8 Cryptographic Protection of Databases Chapter 4—Intermediate Protocols 4.1 Timestamping Services 4.2 Subliminal Channel 4.3 Undeniable Digital Signatures 4.4 Designated Confirmer Signatures 4.5 Proxy Signatures 4.6 Group Signatures 4.7 Fail-Stop Digital Signatures 4.8 Computing with Encrypted Data 4.9 Bit Commitment 4.10 Fair Coin Flips 4.11 Mental Poker 4.12 One-Way Accumulators 4.13 All-or-Nothing Disclosure of Secrets Page 1 of 666 Applied Cryptography: Second Edition - Bruce
    [Show full text]
  • On Probability of Success in Linear and Differential Cryptanalysis
    J. Cryptol. (2008) 21: 131–147 DOI: 10.1007/s00145-007-9013-7 On Probability of Success in Linear and Differential Cryptanalysis Ali Aydın Selçuk Department of Computer Engineering, Bilkent University, Ankara, 06800, Turkey [email protected] Communicated by Eli Biham Received 28 April 2003 and revised 7 August 2007 Online publication 14 September 2007 Abstract. Despite their widespread usage in block cipher security, linear and dif- ferential cryptanalysis still lack a robust treatment of their success probability, and the success chances of these attacks have commonly been estimated in a rather ad hoc fashion. In this paper, we present an analytical calculation of the success probability of linear and differential cryptanalytic attacks. The results apply to an extended sense of the term “success” where the correct key is found not necessarily as the highest-ranking candidate but within a set of high-ranking candidates. Experimental results show that the analysis provides accurate results in most cases, especially in linear cryptanalysis. In cases where the results are less accurate, as in certain cases of differential cryptanaly- sis, the results are useful to provide approximate estimates of the success probability and the necessary plaintext requirement. The analysis also reveals that the attacked key length in differential cryptanalysis is one of the factors that affect the success probabil- ity directly besides the signal-to-noise ratio and the available plaintext amount. Key words. Block ciphers, Linear cryptanalysis, Differential cryptanalysis, Success probability, Order statistics. 1. Introduction Differential cryptanalysis (DC) [1] and linear cryptanalysis (LC) [11,12]aretwoofthe most important techniques in block cipher cryptanalysis today.
    [Show full text]
  • Analyses of Curupira Block Cipher
    VIII Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais 89 Analyses of Curupira Block Cipher Jorge Nakahara Jr 1jorge [email protected] Abstract. Curupira is a 96-bit block cipher, with keys of 96, 144 or 192 bits, and variable number of rounds, an algorithm described at SBRC 2007. This paper1 presents impossible-differential, boomerang and higher-order multiset attacks on reduced-round versions of Curupira, that were not previously considered in the security analysis by its designers. Also, we provide security analyses based solely on the block size and on the key size of the cipher, such as plaintext leakage and related-key attacks. Our analyses indicate new attacks on up to 6-round Curupira. 1. Introduction Curupira is a block cipher designed by Barreto and Simpl´ıcio and presented at SBRC 2007 [Barreto and Simpl´ıcio Jr 2007]. This cipher has a Substitution Permutation Net- work (SPN) structure, like the AES [AES 1997] and is based on the wide-trail design strategy [Daemen 1995]. In [Barreto and Simpl´ıcio Jr 2007], the designers of Curupira argued about its security under several attack settings. The best reported attack was the square or saturation attack [Daemen et al. 1997] on up to seven rounds of Curupira, with a complexity smaller than that of an exhaustive key search. In this paper, we describe impossible-differential (ID), boomerang and higher-order multiset attacks on reduced- round versions of Curupira. The motivation for the ID and boomerang attacks are the fact that these techniques exploit the cipher from both the encryption and decryption di- rections, namely, the corresponding distinguishers are based on differentials constructed from both ends of a given cipher.
    [Show full text]
  • Pyramids of the Giza Plateau Pyramid Complexes of Khufu, Khafre, and Menkaure
    Pyramids of the Giza Plateau Pyramid Complexes of Khufu, Khafre, and Menkaure Charles Rigano AuthorHouse™ 1663 Liberty Drive Bloomington, IN 47403 www.authorhouse.com Phone: 1-800-839-8640 © 2014 Charles Rigano. All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted by any means without the written permission of the author. Published by AuthorHouse 05/14/2015 ISBN: 978-1-4969-5249-3 (sc) ISBN: 978-1-4969-5248-6 (e) Any people depicted in stock imagery provided by Thinkstock are models, and such images are being used for illustrative purposes only. Certain stock imagery © Thinkstock. Because of the dynamic nature of the Internet, any web addresses or links contained in this book may have changed since publication and may no longer be valid. The views expressed in this work are solely those of the author and do not necessarily reflect the views of the publisher, and the publisher hereby disclaims any responsibility for them. Front Cover: - Khufu’s Great Pyramid at dusk as seen from near the Sphinx. Photo by the author. Back Cover: Top - The three Giza Pyramids from close to far: Menkaure and subsidiary pyramids, Khafre, and Khufu. Photo by author. Bottom - Author Charles Rigano with Menkaure’s Pyramid in the background. Author’s photo. Contents Preface The Gizeh Plateau Area Surrounding the Giza Plateau Giza Plateau Pyramid Complexes Chapter 1: The Giza Plateau Chapter 2: Khufu’s Pyramid Exterior Chapter 3: Khufu’s Pyramid Interior Chapter 4: Khufu’s Mortuary Complex Chapter 5: Khufu’s Pyramid – Designing, Closing, and Opening Chapter 6: Khafre’s Pyramid Site Chapter 7: Khafre’s Pyramid Interior Chapter 8: Khafre’s Mortuary Complex Chapter 9: The Sphinx Complex Chapter 10: Menkaure’s Pyramid Exterior Chapter 11: Menkaure’s Pyramid Interior Chapter 12: Menkaure’s Mortuary Complex Appendix: The Tuthmosis IV Stele Between the Sphinx Paws Photo Credits Suggested Reading and References Preface I remember the moment in 1970 that my fascination for Ancient Egypt started.
    [Show full text]
  • 2019: Alexandria, Virginia
    THE 70TH ANNUAL MEETING OF THE AMERICAN RESEARCH CENTER IN EGYPT April 12-14, 2019 Washington, D.C. ANNUAL MEETING OF THE AMERICAN RESEARCH CENTER IN EGYPT April 12-14, 2019 Washington, D.C. U.S. Headquarters 909 North Washington Street, Suite 320 Alexandria, Virginia, 22314 703.721.3479 Cairo Center 2 Midan Simón Bolívar Garden City, Cairo, 11461 20.2.2794.8239 [email protected] 2 3 *Dr. Ahmed Abu-Zayed, Head of Libraries and Archives TABLE CONTENTS Janie Abdul Aziz, Grant Administrator of *Djodi Deutsch, Academic Programs Manager Itinerary 12 Zakaria Yacoub, IT Manager Session Schedule 14 *Sally El Sabbahy, Communications & Outreach Associate *Samira El Adawy, Programs Coordinator Presentation Abstracts 18 Andreas Kostopoulos, Project Archives Specialist Student Poster Abstracts 99 Noha Atef Halim, Assistant Finance Manager Yasser Tharwat, Project Financial & Reporting Manager ARCE STAFF Doaa Adel, Accountant U.S. Staff Salah Metwally, Associate for Governmental Affairs Osama Abdel Fatah Mohamed , Supervising Librarian *Dr. Fatma Ismail, Interim US Operations Director Amira Gamal, Cataloguing Librarian *Michael Wiles, Chief Financial Officier Reda Anwar, Administrative Assistant to Office Manager *Laura Rheintgen, Director of Development Salah Rawash, Security & Reception Coordinator *Dr. Heba Abdel Salam, US Programs Advisor Abdrabou Ali Hassan, Maintenance Assistant & Director’s Driver *Claire Haymes, Board Relations Manager Ahmed Hassan, Senior Traffic Department Officer & Driver *Megan Allday, Annual Meeting Coordinator (Consultant) Ramadan Khalil Abdou, ARCE Representative Ellen Flanagan, US Human Resources Coordinator (Consultant) Mohamed Hassan Mohamed, Transportation Assistant & Messenger *Rebecca Cook, Membership & Development Manager Eid Fawzy, Technical Clerk & Messenger Freddy Feliz, IT Manager Nour Ibrahim, Messenger *Beth Wang, Development & Research Assistant ARCE STAFF ARCE STAFF Cairo Staff Luxor Staff *Dr.
    [Show full text]
  • Petrie, W. M. Flinders. the Pyramids and Temples of Gizeh. London
    THE PYRAMIDS AND TEMPLES OF GIZEH Drawing by F. Petrie W.M FLINDERS PETRIE with an update by ZAHI HAWASS THE PYRAMIDS AND TEMPLES OF GIZEH. GREAT PYRAMID. SMALL PYRAMIDS. PE.R1 BOLUS. SMALL PYRAMIDS. THIRD PYRAMID. PERlBOLUS. EXCAVATION. SEGOND PYRAMID. THE NINE PYRAMIDS OF GIZEH. FROM THE SOUTH . THE PYRAMIDS AND TEMPLES OF GIZEH. BY W. M. FLINDERS PETRIE, Author of "Inductive Metrology," "Stonehenge," "Tanis," &c. NEW AND REVISED EDITION. HISTORIES & MYSTERIES OF MAN LTD. LONDON, ENGLAND 1990 Printed in the U.S.A. © Zahi Hawass Further Titles in Series include: I) BALLAS by J. E. Quibell II) The RAMESSEUM by J. E. Quibell & The Tomb of PTAHHETEP by F. L. L. Griffith III) EL KAB by J. E. Quibell IV) HIERAKONPOLIS I by J. E. Quibell V) HIERAKONPOLIS II by F. W. Green and J. E. Quibell VI) EL ARABAH by J. Garstang VII) MAHASNA by J. Garstang VIII) TEMPLE OF THE KINGS AT ABYDOS by A. St. G. Caulfield IX) The OSIREION by Margaret Alice Murray X) SAQQARA MASTABAS I by Margaret Alice Murray SAQQARA MASTABAS II by Margaret Alice Murray HYKSOS & ISRAELITE CITIES Double Volume by Petrie & Duncan ANCIENT RECORDS OF EGYPT by James Henry Breasted ANCIENT RECORDS OF ASSYRIA by David Luckenbill THE CHRONOLOGY OF ANCIENT KINGDOMS AMENDED by Sir Isaac Newton STONEHENGE by Petrie. Updated by Gerald Hawkins TELL EL HESY (LACHISH) by W. M. Flinders Petrie A HISTORY OF EGYPTIAN ARCHITECTURE by Alexander Badawy For further details please write for catalogue to HISTORIES & MYSTERIES OF MAN LTD. The Glassmill 1, Battersea Bridge Road London SW11 3BG ENGLAND ISBN 1-85417-051-1 THE FIRST EDITION OF THIS WORK WAS PUBLISHED WITH THE ASSISTANCE OF A VOTE OF ONE HUNDRED POUNDS FROM THE GOVERNMENT-GRANT COMMITTEE OF THE ROYAL SOCIETY.
    [Show full text]
  • This Is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. Van Oorschot, and S. Vanstone, CRC Press, 1996. F
    This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the following specific permissions for the electronic version of this book: Permission is granted to retrieve, print and store a single copy of this chapter for personal use. This permission does not extend to binding multiple chapters of the book, photocopying or producing copies for other than personal use of the person creating the copy, or making electronic copies available for retrieval by others without prior permission in writing from CRC Press. Except where over-ridden by the specific permission above, the standard copyright notice from CRC Press applies to this electronic version: Neither this book nor any part may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, microfilming, and recording, or by any information storage or retrieval system, without prior permission in writing from the publisher. The consent of CRC Press does not extend to copying for general distribution, for promotion, for creating new works, or for resale. Specific permission must be obtained in writing from CRC Press for such copying. c 1997 by CRC Press, Inc. Chapter 15 Patents and Standards Contents in Brief 15.1 Introduction :::::::::::::::::::::::::::::635 15.2 Patents on cryptographic techniques ::::::::::::::::635 15.3 Cryptographic standards ::::::::::::::::::::::645 15.4 Notes and further references ::::::::::::::::::::657 15.1 Introduction This chapter discusses two topics which have signi®cant impact on the use of cryptogra- phy in practice: patents and standards.
    [Show full text]
  • A New Symmetric Cryptosystem Based on Kronecker's
    KronCrypt - A New Symmetric Cryptosystem Based on Kronecker's Approximation Theorem Carsten Elsner Fachhochschule f¨urdie Wirtschaft, Freundallee 15, 30173 Hannover [email protected] Martin Schmidt Leibniz Universit¨atHannover, Institute of Applied Mathematics, Welfengarten 1, 30167 Hannover [email protected] Abstract. In this paper we show how to use an old mathematical concept of diophantine analysis, the approximation theorem of Kronecker, in symmetric cryptography. As a first practical application we propose and analyze the new symmetric 128-bit block cipher KronCrypt. The cipher is a 4-round Feistel network with a non-bijective round function f made up of a variable number of large key-dependent S-boxes, XORs and modular additions. Its key length is variable but not less than 128 bit. The main innovation of KronCrypt in the area of symmetric cryptography is the fact that the key-dependent S-boxes are based upon a constructive proof of the approximation theorem of Kronecker used as a boolean function. We prove the correctness of our concept in general and show how we designe the new cipher KronCrypt. Furthermore, results concerning statistical behaviour, i.e. confusion, diffusion and completeness, and differential cryptanalysis are presented. 1. Introduction The resumption of old mathematical ideas sometimes led to new concepts in cryptography, e.g. the modular arithmetic and its usage in public-key cryptography and the application of finite fields in AES. A lot of concepts of number theory and algebra influenced new research topics in cryptography or gave rise to new ciphers. In this paper we present a new idea for symmetric cryptography based on a well-known result from diophantine analysis.
    [Show full text]