CHUCK CHONSON: AMERICAN CIPHER by ERIC NOLAN A

Total Page:16

File Type:pdf, Size:1020Kb

CHUCK CHONSON: AMERICAN CIPHER by ERIC NOLAN A CHUCK CHONSON: AMERICAN CIPHER By ERIC NOLAN A THESIS PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF FINE ARTS UNIVERSITY OF FLORIDA 2003 Copyright 2003 by Eric Nolan To my parents, and to Nicky ACKNOWLEDGMENTS I thank my parents, my teachers, and my colleagues. Special thanks go to Dominique Wilkins and Don Mattingly. iv TABLE OF CONTENTS ACKNOWLEDGMENTS..................................................................................................iv ABSTRACT......................................................................................................................vii CHAPTER 1 LIVE-IN GIRLFRIEND, SHERRY CRAVENS ...................................................... 1 2 DEPARTMENT CHAIR, FURRY LUISSON..........................................................8 3 TRAIN CONDUCTOR, BISHOP PROBERT........................................................ 12 4 TWIN BROTHER, MARTY CHONSON .............................................................. 15 5 DEALER, WILLIE BARTON ................................................................................ 23 6 LADY ON BUS, MARIA WOESSNER................................................................. 33 7 CHILDHOOD PLAYMATE, WHELPS REMIEN ................................................ 36 8 GUY IN TRUCK, JOE MURHPY .........................................................................46 9 EX-WIFE, NORLITTA FUEGOS...........................................................................49 10 ABANDONED SON, PHUC CHONSON..............................................................52 v 11 HOMELESS BUM, DEVON..................................................................................58 12 EX-GIRLFRIEND, REGINA..................................................................................61 13 MIME, SQUIGGLES..............................................................................................72 14 EX-GIRLFRIEND, EVA GALET...........................................................................77 15 PROSTITUTE, VINEGAR......................................................................................83 16 PROSTITUTE, CIMMANIM..................................................................................89 17 BLUES MUSICIAN, TROT VERSION.................................................................93 18 EX-GIRLFRIEND'S FATHER, PAYNE CAVE...................................................100 19 EX-GIRLFRIEND, TAMMY CAVE....................................................................108 20 FORMER AQUAINTANCE, KRILL CRIMP......................................................115 21 FRIEND, ROLPH..................................................................................................122 BIOGRAPHICAL SKETCH .......................................................................................... 131 vi Abstract of Thesis Presented to the Graduate School of the University of Florida in Partial Fulfillment of the Requirements for the Degree of Master of Fine Arts CHUCK CHONSON: AMERICAN CIPHER By Eric Nolan May 2003 Chair: Padgett Powell Major Department: English This is the beginning of an unfinished work of fiction. The story is not found yet, and the plot is not found yet, and the reason for writing it is still unknown to the author. There is no driving force behind the story, and the main story is abandoned on almost every page and a tangential story hogs the stage. Don't think that the author doesn't know this. He was trying to do something. The opening moment in the second book of Gogol's Dead Souls--the exact place where Nabokov believed the book began to be unworthy of being read--the narrator informs us that Chichikov, the hero of the book, is gone and that we are left alone once again in a remote corner of the country. Instead of ending the story, the narrator says, "Ah, but what a corner!" and the story continues for another hundred or so pages. I would like this thesis to begin in that same frame of mind. vii CHAPTER 1 LIVE-IN GIRLFRIEND, SHERRY CRAVENS Pascagoula, Mississippi I know you're Mister Seniority over at the Sociology Department Lounge, but in this house your tenure just got revoked. I told myself repeatedly that you weren't going to remember my birthday, and that you wouldn't remember that my birthday is the same day as our anniversary. And that this year it fell on Easter. I hadn't seen you in a few days and over and over I tried to prepare myself for the doped-up Chuck Chonson who appears like an oncoming truck through a bad morning fog. Who, wearing a dirty American-flag bandana and hauling a case of peppermint schnapps, doesn't seem to recognize me or the children. As I heard the door struggling to open this morning, I knew who it was on the other side and I believed in my heart that you'd have a present for me. I believed that you'd have your hair combed like you used to and that maybe you'd be wearing the same tweed jacket that only a few months ago was your favorite. "I was just on a business trip," you were going to say. "I left a note on the fridge. You must've just overlooked it, darling. I'm sorry about that tiny drinking spree--it's simply a defect of a good, hardworking man, and I wish you didn't have to witness it. Here is a new silverware set I brought back from New York." Even though I knew better, I rushed to 1 2 unlock the door, then heard you puke, then re-locked it and double-locked it, then doubled over and began to cry. "Mariee! Mariee!" you were screaming and then Shamus and Lowey rushed downstairs in their pajamas, and you know how impressionable they are. They saw me crouched in the corner and then they started crying too. I whispered to them: "Daddy's been drinking. Don't move." You were screaming, "Mary! Mary!" and banging on the door and then Shamus got up enough nerve to yell at you to go away and you screamed back, "Shut up!" Then to me, "Sherry, Sherry, I love you, I love you, I love you, I want to fuck you, I'm sorry!" I could hear you crying and puffing and I knew you were in a blackout and I started to feel sorry for you and I looked over at Lowey hiding behind the vase and Shamus trying to pull him out and I started to feel sorry for all of us, as a family, and my mind shut off to the chaos around me and, because I was looking at the wall, I began to think that we could use a paint job. Maybe green, like a forest green. Or maybe just a nice forest-landscape wallpaper. With birds in it. I thought of how much you like wallpaper, and how much you like the forest. It seemed like the perfect combination, but then I remembered back when we lived in the Ozarks and I remembered the time that you dragged me along camping with you up Magazine Mountain and all we did was munch on cactus you brought and throw up and talk with God and those loser friends of yours. So then I said fudge the paint job and the wallpaper, then I started thinking about my job, and how much I like it. I started thinking about how I like putting on the uniform, slowly and respectfully. The mask, then the tank, then how Howie would pick me up in the bug van, and how we'd go all over the county spraying at the little creatures that didn't belong where they were. Then I had a deep thought--Who am I to judge bugs? What if I am not 3 where I belong? And why is it that Shamus and Lowey hardly know their dad anymore? They have so many problems already that you can see pain in everything they do--they eat spaghetti politely and they play in their sandbox without making noise. Then bang, bang, you tried again on the door and my thoughts got shaken out like sand from a shoe. I stood up to unlock the door with a clear head and let you in and tell you that I'm sorry, but then I heard another beer can open and I knew that you weren't going to remember a damn thing. After a session of studying my insect text books, which seems now to be my only escape, I told myself that I'd give Chuck Chonson another chance. I told myself that this Chuck Chonson who is banging up my flower garden is not the one that I know, and is not the real Chuck Chonson, either. These last three months have been so distorted. I mean, you had it. Five years without drinking a drop. I had nothing to do with that either--I am so confused--why would you just throw it away? You think you can keep preaching to those confused students while you act like this? You should just see how the cashier looks at me when I go to the bank. She knows, Chuck. How the hell can she know? And if she knows, this whole town probably knows as well. You think I liked it when the country-club lady called me up telling me that you stalled out the car in a sand trap? You remember that one? Don't even think that I'm going to put up with this any longer. We got this house with our own washing machine and dryer, and Shamus and Lowey get pretty much all the video games that they want, and we're a good family. Those squash lessons with Shamus, and those times you used to get your ukulele from the attic and make up songs using Lowey's name--didn't they mean anything to you? 4 So I sat down on my mother's treasure chest and actually made a list of every bad thing you did to me since you drank again, just to see them in front of me, instead of swimming with them up in my brain. The first thing I wrote down was that you turned me on to peyote. That was a bad thing. For some reason I didn't associate the words hallucinogens with drugs. I can still see the colors. The first handful didn't seem to be working for me, so I sneaked another bunch into my mouth, then you were mumbling about the weather in the desert being pliable. Your face melted and my skin boiled. I kept hearing an eagle behind me then looking back quickly and everything took twice as long to move as usual. You locked yourself in the attic, leaving me alone with the twisting tables and the kids who'd scream in my face. The outdoors were seeping into the kitchen and I was trying to clean it up with a wet rag.
Recommended publications
  • Fish-Stream Identification Guidebook
    of BRITISH COLUMBIA Fish-stream Identification Guidebook Second edition Version 2.1 August 1998 BC Environment Fish-stream Identification Guidebook of BRITISH COLUMBIA Fish-stream Identification Guidebook Second edition Version 2.1 August 1998 Authority Forest Practices Code of British Columbia Act Operational Planning Regulation Canadian Cataloguing in Publication Data Main entry under title: Fish-stream identification guidebook. – 2nd ed. (Forest practices code of British Columbia) ISBN 0-7726-3664-8 1. Fishes – Habitat – British Columbia. 2. River surveys – British Columbia. 3. Forest management – British Columbia. 4. Riparian forests – British Columbia – Management. I. British Columbia. Ministry of Forests. SH177.L63F58 1998 634.9 C98-960250-8 Fish-stream Identification Guidebook Preface This guidebook has been prepared to help forest resource managers plan, prescribe and implement sound forest practices that comply with the Forest Practices Code. Guidebooks are one of the four components of the Forest Practices Code. The others are the Forest Practices Code of British Columbia Act, the regulations, and the standards. The Forest Practices Code of British Columbia Act is the legislative umbrella authorizing the Code’s other components. It enables the Code, establishes mandatory requirements for planning and forest practices, sets enforcement and penalty provisions, and specifies administrative arrangements. The regulations lay out the forest practices that apply province-wide. The chief forester may establish standards, where required, to expand on a regulation. Both regulations and standards are mandatory requirements under the Code. Forest Practices Code guidebooks have been developed to support the regulations, however, only those portions of guidebooks cited in regulation are part of the legislation.
    [Show full text]
  • Comparison of 256-Bit Stream Ciphers at the Beginning of 2006
    Comparison of 256-bit stream ciphers at the beginning of 2006 Daniel J. Bernstein ? [email protected] Abstract. This paper evaluates and compares several stream ciphers that use 256-bit keys: counter-mode AES, CryptMT, DICING, Dragon, FUBUKI, HC-256, Phelix, Py, Py6, Salsa20, SOSEMANUK, VEST, and YAMB. 1 Introduction ECRYPT, a consortium of European research organizations, issued a Call for Stream Cipher Primitives in November 2004. A remarkable variety of ciphers were proposed in response by a total of 97 authors spread among Australia, Belgium, Canada, China, Denmark, England, France, Germany, Greece, Israel, Japan, Korea, Macedonia, Norway, Russia, Singapore, Sweden, Switzerland, and the United States. Evaluating a huge pool of stream ciphers, to understand the merits of each cipher, is not an easy task. This paper simplifies the task by focusing on the relatively small pool of ciphers that allow 256-bit keys. Ciphers limited to 128- bit keys (or 80-bit keys) are ignored. See Section 2 to understand my interest in 256-bit keys. The ciphers allowing 256-bit keys are CryptMT, DICING, Dragon, FUBUKI, HC-256, Phelix, Py, Py6, Salsa20, SOSEMANUK, VEST, and YAMB. I included 256-bit AES in counter mode as a basis for comparison. Beware that there are unresolved claims of attacks against Py (see [4] and [3]), SOSEMANUK (see [1]), and YAMB (see [5]). ECRYPT, using measurement tools written by Christophe De Canni`ere, has published timings for each cipher on several common general-purpose CPUs. The original tools and timings used reference implementations (from the cipher authors) but were subsequently updated for faster implementations (also from the cipher authors).
    [Show full text]
  • The Mathemathics of Secrets.Pdf
    THE MATHEMATICS OF SECRETS THE MATHEMATICS OF SECRETS CRYPTOGRAPHY FROM CAESAR CIPHERS TO DIGITAL ENCRYPTION JOSHUA HOLDEN PRINCETON UNIVERSITY PRESS PRINCETON AND OXFORD Copyright c 2017 by Princeton University Press Published by Princeton University Press, 41 William Street, Princeton, New Jersey 08540 In the United Kingdom: Princeton University Press, 6 Oxford Street, Woodstock, Oxfordshire OX20 1TR press.princeton.edu Jacket image courtesy of Shutterstock; design by Lorraine Betz Doneker All Rights Reserved Library of Congress Cataloging-in-Publication Data Names: Holden, Joshua, 1970– author. Title: The mathematics of secrets : cryptography from Caesar ciphers to digital encryption / Joshua Holden. Description: Princeton : Princeton University Press, [2017] | Includes bibliographical references and index. Identifiers: LCCN 2016014840 | ISBN 9780691141756 (hardcover : alk. paper) Subjects: LCSH: Cryptography—Mathematics. | Ciphers. | Computer security. Classification: LCC Z103 .H664 2017 | DDC 005.8/2—dc23 LC record available at https://lccn.loc.gov/2016014840 British Library Cataloging-in-Publication Data is available This book has been composed in Linux Libertine Printed on acid-free paper. ∞ Printed in the United States of America 13579108642 To Lana and Richard for their love and support CONTENTS Preface xi Acknowledgments xiii Introduction to Ciphers and Substitution 1 1.1 Alice and Bob and Carl and Julius: Terminology and Caesar Cipher 1 1.2 The Key to the Matter: Generalizing the Caesar Cipher 4 1.3 Multiplicative Ciphers 6
    [Show full text]
  • (Not) to Design and Implement Post-Quantum Cryptography
    SoK: How (not) to Design and Implement Post-Quantum Cryptography James Howe1 , Thomas Prest1 , and Daniel Apon2 1 PQShield, Oxford, UK. {james.howe,thomas.prest}@pqshield.com 2 National Institute of Standards and Technology, USA. [email protected] Abstract Post-quantum cryptography has known a Cambrian explo- sion in the last decade. What started as a very theoretical and mathe- matical area has now evolved into a sprawling research ˝eld, complete with side-channel resistant embedded implementations, large scale de- ployment tests and standardization e˙orts. This study systematizes the current state of knowledge on post-quantum cryptography. Compared to existing studies, we adopt a transversal point of view and center our study around three areas: (i) paradigms, (ii) implementation, (iii) deployment. Our point of view allows to cast almost all classical and post-quantum schemes into just a few paradigms. We highlight trends, common methodologies, and pitfalls to look for and recurrent challenges. 1 Introduction Since Shor's discovery of polynomial-time quantum algorithms for the factoring and discrete logarithm problems, researchers have looked at ways to manage the potential advent of large-scale quantum computers, a prospect which has become much more tangible of late. The proposed solutions are cryptographic schemes based on problems assumed to be resistant to quantum computers, such as those related to lattices or hash functions. Post-quantum cryptography (PQC) is an umbrella term that encompasses the design, implementation, and integration of these schemes. This document is a Systematization of Knowledge (SoK) on this diverse and progressive topic. We have made two editorial choices.
    [Show full text]
  • Applications of Search Techniques to Cryptanalysis and the Construction of Cipher Components. James David Mclaughlin Submitted F
    Applications of search techniques to cryptanalysis and the construction of cipher components. James David McLaughlin Submitted for the degree of Doctor of Philosophy (PhD) University of York Department of Computer Science September 2012 2 Abstract In this dissertation, we investigate the ways in which search techniques, and in particular metaheuristic search techniques, can be used in cryptology. We address the design of simple cryptographic components (Boolean functions), before moving on to more complex entities (S-boxes). The emphasis then shifts from the construction of cryptographic arte- facts to the related area of cryptanalysis, in which we first derive non-linear approximations to S-boxes more powerful than the existing linear approximations, and then exploit these in cryptanalytic attacks against the ciphers DES and Serpent. Contents 1 Introduction. 11 1.1 The Structure of this Thesis . 12 2 A brief history of cryptography and cryptanalysis. 14 3 Literature review 20 3.1 Information on various types of block cipher, and a brief description of the Data Encryption Standard. 20 3.1.1 Feistel ciphers . 21 3.1.2 Other types of block cipher . 23 3.1.3 Confusion and diffusion . 24 3.2 Linear cryptanalysis. 26 3.2.1 The attack. 27 3.3 Differential cryptanalysis. 35 3.3.1 The attack. 39 3.3.2 Variants of the differential cryptanalytic attack . 44 3.4 Stream ciphers based on linear feedback shift registers . 48 3.5 A brief introduction to metaheuristics . 52 3.5.1 Hill-climbing . 55 3.5.2 Simulated annealing . 57 3.5.3 Memetic algorithms . 58 3.5.4 Ant algorithms .
    [Show full text]
  • Algorithms and Mechanisms Historical Ciphers
    Algorithms and Mechanisms Cryptography is nothing more than a mathematical framework for discussing the implications of various paranoid delusions — Don Alvarez Historical Ciphers Non-standard hieroglyphics, 1900BC Atbash cipher (Old Testament, reversed Hebrew alphabet, 600BC) Caesar cipher: letter = letter + 3 ‘fish’ ‘ilvk’ rot13: Add 13/swap alphabet halves •Usenet convention used to hide possibly offensive jokes •Applying it twice restores the original text Substitution Ciphers Simple substitution cipher: a=p,b=m,c=f,... •Break via letter frequency analysis Polyalphabetic substitution cipher 1. a = p, b = m, c = f, ... 2. a = l, b = t, c = a, ... 3. a = f, b = x, c = p, ... •Break by decomposing into individual alphabets, then solve as simple substitution One-time Pad (1917) Message s e c r e t 18 5 3 17 5 19 OTP +15 8 1 12 19 5 7 13 4 3 24 24 g m d c x x OTP is unbreakable provided •Pad is never reused (VENONA) •Unpredictable random numbers are used (physical sources, e.g. radioactive decay) One-time Pad (ctd) Used by •Russian spies •The Washington-Moscow “hot line” •CIA covert operations Many snake oil algorithms claim unbreakability by claiming to be a OTP •Pseudo-OTPs give pseudo-security Cipher machines attempted to create approximations to OTPs, first mechanically, then electronically Cipher Machines (~1920) 1. Basic component = wired rotor •Simple substitution 2. Step the rotor after each letter •Polyalphabetic substitution, period = 26 Cipher Machines (ctd) 3. Chain multiple rotors Each rotor steps the next one when a full
    [Show full text]
  • Island County Fish and Wildlife Habitat Conservation Areas Audit and Policy / Regulation Framework
    ISLAND COUNTY FISH AND WILDLIFE HABITAT CONSERVATION AREAS AUDIT AND POLICY / REGULATION FRAMEWORK Prepared for: Island County Planning and Community Development Department PO Box 5000 Coupeville, WA 98239 Prepared By: BERK Consulting, in collaboration with The Watershed Company Parametrix March 2014 This report was funded through a grant from the Washington Department of Commerce: Grant No. 12‐6401‐010 ISLAND COUNTY FISH AND WILDLIFE HABITAT CONSERVATION AREAS AUDIT AND POLICY / REGULATION FRAMEWORK Table of Contents 1.0 INTRODUCTION ............................................................................................... 4 1.1 Purpose ................................................................................................................................. 4 1.2 Summary Best Available Science & Existing Conditions Recommendations ............... 4 1.3 Summary Policy & Code Recommendations .................................................................... 9 2.0 AUDIT .............................................................................................................. 11 2.1 Overview .............................................................................................................................. 11 2.2 Growth Management Act & Procedural Criteria Audit .................................................... 11 Department of Commerce Growth Management Act Checklist ......................................................... 11 Washington Administrative Code Minimum Guidelines to Classify FWHCAs ...................................
    [Show full text]
  • Cryptology: an Historical Introduction DRAFT
    Cryptology: An Historical Introduction DRAFT Jim Sauerberg February 5, 2013 2 Copyright 2013 All rights reserved Jim Sauerberg Saint Mary's College Contents List of Figures 8 1 Caesar Ciphers 9 1.1 Saint Cyr Slide . 12 1.2 Running Down the Alphabet . 14 1.3 Frequency Analysis . 15 1.4 Linquist's Method . 20 1.5 Summary . 22 1.6 Topics and Techniques . 22 1.7 Exercises . 23 2 Cryptologic Terms 29 3 The Introduction of Numbers 31 3.1 The Remainder Operator . 33 3.2 Modular Arithmetic . 38 3.3 Decimation Ciphers . 40 3.4 Deciphering Decimation Ciphers . 42 3.5 Multiplication vs. Addition . 44 3.6 Koblitz's Kid-RSA and Public Key Codes . 44 3.7 Summary . 48 3.8 Topics and Techniques . 48 3.9 Exercises . 49 4 The Euclidean Algorithm 55 4.1 Linear Ciphers . 55 4.2 GCD's and the Euclidean Algorithm . 56 4.3 Multiplicative Inverses . 59 4.4 Deciphering Decimation and Linear Ciphers . 63 4.5 Breaking Decimation and Linear Ciphers . 65 4.6 Summary . 67 4.7 Topics and Techniques . 67 4.8 Exercises . 68 3 4 CONTENTS 5 Monoalphabetic Ciphers 71 5.1 Keyword Ciphers . 72 5.2 Keyword Mixed Ciphers . 73 5.3 Keyword Transposed Ciphers . 74 5.4 Interrupted Keyword Ciphers . 75 5.5 Frequency Counts and Exhaustion . 76 5.6 Basic Letter Characteristics . 77 5.7 Aristocrats . 78 5.8 Summary . 80 5.9 Topics and Techniques . 81 5.10 Exercises . 81 6 Decrypting Monoalphabetic Ciphers 89 6.1 Letter Interactions . 90 6.2 Decrypting Monoalphabetic Ciphers .
    [Show full text]
  • Voice Encryption Using Twin Stream Cipher Algorithm تشفير الصوت باستخدام خوارزمية التوأم
    Voice Encryption Using Twin Stream Cipher Algorithm تشفير الصوت باستخدام خوارزمية التوأم اﻻنسيابية Prepared by Omar Mejbel Hammad Aljouani ((401320142)) Supervisor Dr. Hebah H. O. Nasereddin Dr. Abdulkareem O. Ibadi Master Thesis Submitted in Partial Fulfillment of the Requirements of the Master Degree in Computer Science Department of Computer Science Faculty of Information Technology Middle East University Amman - Jordan January - 2016 II ((بسم هللا الرحمن الرحيم(( ّ يَ ْر ف عَََللاَهَا ّل ذي نََآ مَ هنواَ م ْن هك ْمََ وَا ّلَ ذي نََ} ه ه ْ ْ {أَوتواَال عل مََ دَ ر جات ))صدق هللا العظيم(( II III IV Acknowledgment I utilize this opportunity to thank everyone helped me reach this stage and everyone who encourage me during performing this thesis. I want to thank Dr. Hebah H. O. Nasereddin for her guidance and supervision during writing this thesis. Extended thanks are also for my family and friends who encourage me during writing this thesis. I also want to thank everyone who believes that the knowledge is right for everyone. The greatest thank ever to assistant prof. Abdulkareem O. Ibadi, the head of software engineering department at Baghdad College for economic sciences. V Dedication اهدي خﻻصة جهدي العلمي المتواضع الى : قرة عيني الرسول محمد عليه افضل الصﻻة واتم التسليم ...... وطني العراق الجريح .................................... اخي الشهيد الحاضر الغائب صهيب ................... والدي ووالدتي واختي رفاق دربي ومسيرتي ............... كل من كان له بصمة بجهدي العلمي هذا............. كل الشهداء الذين استشهدوا برصاص الغدر والخيانة ...... كل من كان يدعي لي ويوجهني ويتمنى لي الخير ......... جامعة بغداد أخص بها كلية التربية ابن الهيثم ....... اﻻعدادية المركزية للبنين .................. VI Table of Contents AUTHORIZATION STATEMENT ..........................................................
    [Show full text]
  • Golden Fish an Intelligent Stream Cipher Fuse Memory Modules
    Golden Fish: An Intelligent Stream Cipher Fuse Memory Modules Lan Luo 1,2,QiongHai Dai 1,ZhiGuang Qin 2 ,ChunXiang Xu 2 1Broadband Networks & Digital Media Lab School of Information Science & Technology Automation Dep. Tsinghua University ,BeiJing, China,100084 2 School of Computer Science and Technology University of Electronic Science Technology of China, ChengDu, China, 610054 E-mail: [email protected] Abstract Furthermore, we can intelligent design the ciphers according to different network environments [4-5]. In In this paper, we use a high-order iterated function order to demonstrate our approach, we construct a generated by block cipher as the nonlinear filter to simple synchronous stream cipher, which provides a improve the security of stream cipher. Moreover, by significant flexibility for hardware implementations, combining the published rounds function in block with many desirable cryptographic advantages. The cipher and OFB as the nonlinear functional mode with security of the encryption and decryption are based on an extra memory module, we enable to control the the computational complexity, which is demonstrated nonlinear complexity of the design. This new approach by AES and NESSIE competition recently, where all fuses the block cipher operation mode with two the finalists fall into the category “no attack or memory modules in one stream cipher. The security of weakness demonstrated”, in which people can go for this design is proven by the both periodic and the simplest, and most elegant design comparing an nonlinear evaluation. The periods of this structure is more complicate and non-transparent one. To guaranteed by the traditional Linear Feedback Shift implement the idea above, we take output feedback Register design and the security of nonlinear mode (OFB) of the block cipher as the nonlinear filter characteristic is demonstrated by block cipher in stream cipher design.
    [Show full text]
  • (Not) to Design and Implement Post-Quantum Cryptography
    SoK: How (not) to Design and Implement Post-Quantum Cryptography James Howe1, Thomas Prest1, and Daniel Apon2 1 PQShield, Oxford, UK. {james.howe,thomas.prest}@pqshield.com 2 National Institute of Standards and Technology, USA. [email protected] Abstract Post-quantum cryptography has known a Cambrian explosion in the last decade. What started as a very theoretical and mathematical area has now evolved into a sprawling research field, complete with side-channel resistant embedded implementations, large scale deployment tests and standardization efforts. This study systematizes the current state of knowledge on post-quantum cryptography. Compared to existing studies, we adopt a transversal point of view and center our study around three areas: (i) paradigms, (ii) implementation, (iii) deployment. Our point of view allows to cast almost all classical and post-quantum schemes into just a few paradigms. We highlight trends, common methodologies, and pitfalls to look for and recurrent challenges. 1 Introduction Since Shor’s discovery of polynomial-time quantum algorithms for the factoring and discrete log- arithm problems, researchers have looked at ways to manage the potential advent of large-scale quantum computers, a prospect which has become much more tangible of late. The proposed solutions are cryptographic schemes based on problems assumed to be resistant to quantum com- puters, such as those related to lattices or hash functions. Post-quantum cryptography (PQC) is an umbrella term that encompasses the design, implementation, and integration of these schemes. This document is a Systematization of Knowledge (SoK) on this diverse and progressive topic. We have made two editorial choices. First, an exhaustive SoK on PQC could span several books, so we limited our study to signatures and key-establishment schemes, as these are the backbone of the immense majority of protocols.
    [Show full text]
  • Keys to the Freshwater and Anadromous Fishes of California'
    KEYS TO THE FRESHWATER AND ANADROMOUS FISHES OF CALIFORNIA' J. B. KIMSEY 2 U.S. Bureau of Commercial Fisheries Washington, D.C. LEONARD 0. FISK California Department of Fish and Game The need for keys to all the freshwater and anadromous fishes of California long has been apparent to both scientific workers and laymen. Although numerous keys to California fishes have been published, they have been either restricted to certain drainages (i.e., Miller, 1952; Murphy, 1941; Rutter, 1908) or to groups of fishes (i.e., Beland, 1953; Curtis, 1949; Neale, 1931; Robins and Miller, 1957; Shapovalov, 1947). The first check list of the freshwater and anadromous fishes of Cali- fornia (Shapovalov and Dill, 1950) listed 101 full species, of which 65 were native species and 26 introduced species. The second check list (Shapovalov, Dill, and Cordone, 1959), issued nine years later, contains 11 species and 7 subspecies not listed in 1950. Six species and one sub- species resulted from introductions into fresh water. Two freshwater and three euryhaline species, and three euryhaline subspecies were added by new collecting or more complete examination of old collec- tions. Three subspecies resulted from taxonomic revisions. The rate of addition to our fish fauna is somewhat less than that to our avian fauna, and it is unlikely that all North American fish species will some day occur in California, as Grinnell (1922) postulated for birds. It is apparent, however, that the Californian fish fauna is losing its unique character at an accelerated rate. About 18 successful intro- ductions were made prior to 1900.
    [Show full text]